Renewing the complete SSL certificate chain

Problem:

How can a full reneweal of the complete SSL chain be achieved?

Solution:

To recreate CAkey.pem and demanding certificates, please to the following:

Backup the old certificates /etc/univention/ssl/:

mv /etc/univention/ssl  /etc/univention/ssl_$(date  +"%d%m%Y")

Create a new SSL-chain and a new certificate for the DC master:

apt-get install --reinstall univention-ssl

Fix the permissions:

chgrp 'DC Backup Hosts' -R /etc/univention/ssl/openssl.cnf /etc/univention/ssl/password /etc/univention/ssl/ucsCA/
chgrp 'DC Backup Hosts' /etc/univention/ssl/ucsCA/CAcert.pem
find /etc/univention/ssl/ucsCA/ -type d -exec chmod g+rwX {} +

Renew the certificate for the DNS alias univention-directory-manager and recreate the certificates for each machine in your domain:

eval "$(univention-config-registry shell)"
univention-certificate new -name "univention-directory-manager.$domainname" -days "$ssl_default_days"
ln -s /etc/univention/ssl/univention-directory-manager.$domainname/ /etc/univention/ssl/univention-directory-manager
service slapd restart
univention-directory-listener-ctrl resync gencertificate

ucs-sso requires a separate handling

To generate the new ucs-sso certificate you can use the 91univention-saml.inst join script.
First you need to delete the old file, which is set via ucr:
ucr get saml/idp/certificate/certificate
→ /etc/simplesamlphp/ucs-sso…
After that rerun the the joinscript with the force option
univention-run-join-scripts --force --run-scripts 91univention-saml.inst

Copy the new certificates

Now each new certificate has to be copied to the other systems of your domain.
Please use “Renewing the SSL certificates” for a detailed documentation.

3 Likes
Mastodon