ACME passive revocation #1038
-
Hi, I apologize for my stupidity, but I can't passively revoke a cert via acme. I use: I added the ACME prosivioner to Step-CA and set up acme.sh to issue and renew certificates (everything successful). I guessed that (passive) revocation over acme is not supported and tried to revoke the cert via Step CLI revoke command: I was assuming that when I revoke a private key (through acme prosivioner or JWK (default) provisioner) it is passively revoked, so no provisioner in Step-CA can renew it. Is my assumption correct? And if it is not how is the way to go to revoke a cert in an ACME / Step-CA environment? Thanks in Advance Stephan |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 3 replies
-
Hey Stephan, What you've tried so far, sounds OK to me. What you're trying to do, however, is in fact active revocation. We call revocation passive when certificates have short lifetimes and thus expire frequently. Active revocation is the "classical" method of revocation, involving CRLs and OCSP. When a certificate is revoked, this generally means that only that specific certificate is revoked, based on its serial number. This serial number is then recorded in a CRL or its revocation status can be requested using OCSP. I'm not aware of a requirement that the private key that corresponds to a certificate to be revoked MUST be marked as not usable anymore; at least not in the Web PKI. I have heard about specific cases in which CAs put known compromised private keys on a blocklist, but not for all revocations. I think it thus boils down to the user/system revoking the certificate to getting rid of the private key too and generate a new one to request a new certificate. The reason the That said, this issue got me thinking, and I think what you're after does make sense. It could be an option to implement additional validation to not allow known compromised keys from being reused. A key would be known if a cert were revoked with the As an aside: we also support a |
Beta Was this translation helpful? Give feedback.
Hey Stephan,
What you've tried so far, sounds OK to me. What you're trying to do, however, is in fact active revocation. We call revocation passive when certificates have short lifetimes and thus expire frequently. Active revocation is the "classical" method of revocation, involving CRLs and OCSP.
When a certificate is revoked, this generally means that only that specific certificate is revoked, based on its serial number. This serial number is then recorded in a CRL or its revocation status can be requested using OCSP. I'm not aware of a requirement that the private key that corresponds to a certificate to be revoked MUST be marked as not usable anymore; at least not in the Web PKI. I ha…