59 lines
		
	
	
		
			2.4 KiB
		
	
	
	
		
			Markdown
		
	
	
	
	
	
			
		
		
	
	
			59 lines
		
	
	
		
			2.4 KiB
		
	
	
	
		
			Markdown
		
	
	
	
	
	
| Upgrading to Easy-RSA 3 from earlier versions
 | |
| =========
 | |
| 
 | |
| People upgrading to Easy-RSA 3 from a 2.x version should note some important
 | |
| changes starting with version 3. For a better overview of version 3 in general,
 | |
| see the Readme in the doc/ directory.
 | |
| 
 | |
| List of important changes
 | |
| ----
 | |
| 
 | |
|  * nsCertType extensions are no longer included by default. Use of such
 | |
|    "Netscape" attributes have been deprecated upstream and their use is
 | |
|    discouraged. Configure `EASYRSA_NS_SUPPORT` in vars if you want to enable
 | |
|    this legacy behavior.
 | |
| 
 | |
|    Notably, this is important for OpenVPN deployments relying on the
 | |
|    `--ns-cert-type` directive. Either have OpenVPN use the preferred
 | |
|    `--remote-cert-tls` option, or enable legacy NS extensions.
 | |
| 
 | |
|  * The default request Subject (or DN, Distinguished Name) includes just the
 | |
|    commonName. This is more suitable for VPNs and environments that don't wish
 | |
|    to include info about the Country/State/City/Org/OU in certs. Configure
 | |
|    `EASYRSA_DN` in vars if you want to enable the legacy behavior.
 | |
| 
 | |
|  * The 3.0 release lacks PKCS#11 (smartcard/token) support. This is anticipated
 | |
|    to be supported in a future point-release to target each platform's need.
 | |
| 
 | |
|  * The -utf8 option has been added for all supported commands.  This should be
 | |
|    backwards compatible with ASCII strings.
 | |
| 
 | |
|  * The default private key encryption has been changed from 3des to aes256.
 | |
| 
 | |
| 
 | |
| Some new concepts
 | |
| ----
 | |
| 
 | |
| Easy-RSA 3 has some new concepts compared to the prior v2 series.
 | |
| 
 | |
| ### Request-Import-Sign workflow
 | |
| 
 | |
|   v3 is now designed to support keypairs generated on the target system where
 | |
|   they will be used, thus improving security as no keys need to be transferred
 | |
|   between hosts. The old workflow of generating everything in a single PKI is
 | |
|   still supported as well.
 | |
| 
 | |
|   The recommended workflow when using Easy-RSA as a CA is to import requests,
 | |
|   sign them, and return the issued & CA certs. Each requesting system can use
 | |
|   Easy-RSA without a CA to generate keypairs & requests.
 | |
| 
 | |
| ### "Org"-style DN flexibility
 | |
| 
 | |
|   When using Easy-RSA in the "org" DN mode, it is no longer required to match
 | |
|   some of the field values. This improves flexibility, and enables easier remote
 | |
|   generation as the requester doesn't need to know the CA's values in advance.
 | |
| 
 | |
|   Previously in v2, the Country, State, and Org values all had to match or a
 | |
|   request couldn't be signed. If you want the old behavior you can change the
 | |
|   OpenSSL config to require it or simply look over the DN at signing time.
 |