certutil should better support multiple certs with the same subject
Categories
(NSS :: Tools, enhancement, P5)
Tracking
(Not tracked)
People
(Reporter: julien.pierre, Unassigned)
Details
| Reporter | ||
Comment 1•18 years ago
|
||
| Reporter | ||
Updated•18 years ago
|
| Reporter | ||
Comment 2•18 years ago
|
||
Comment 3•18 years ago
|
||
| Reporter | ||
Comment 4•18 years ago
|
||
Comment 5•18 years ago
|
||
| Reporter | ||
Comment 6•18 years ago
|
||
Comment 7•16 years ago
|
||
Updated•16 years ago
|
Comment 8•9 years ago
|
||
| Reporter | ||
Comment 9•9 years ago
|
||
Comment 10•5 years ago
|
||
I believe pkcs #11 url support fixes this issue. You can ask for any pkcs #11 object (including certs) by their attributes Issuer and serial-number are supported attributes.
Comment 11•5 years ago
|
||
Perhaps updating the documentation would help to include some pkcs #11 examples including referencing the serial number.
One common use case not covered in the certutil documentation is when you want to delete an expired or soon to expire certificate and associated key from the database, where a more recently issued certificate + key exists with the same nickname.
In my experience the following command will blatantly disregard the key-id and remove the more recent certificate + key.
certutil -F -n <common-nickname-shared by old-and-new-certificate> -k <key-id-of-soon-to-expire-certificate> -d <cert-dir>
When this happens as a clean-up activity during the a certificate renewal process the user must then start from scratch - i.e. generate yet another certificate signing request and go back to the CA to request another new certificate.
Updated•3 years ago
|
Updated•2 years ago
|
Description
•