Project

General

Profile

Download (76.7 KB) Statistics
| Branch: | Tag: | Revision:

# Date Author Comment
8f2f85c3 01/02/2022 01:05 AM Luiz Souza

Update the Copyright year of the files owned by Rubicon/Netgate.

46bd32bb 12/07/2021 02:17 PM Steve Beaver

Revert "Certmanager mvc"

This reverts commit 033c3ae82d20ca5760ed483cf8d0c947764b2371

033c3ae8 12/07/2021 01:49 PM Steve Beaver

Certmanager mvc

fe72327b 08/26/2021 01:03 PM Jim Pingle

Revert "Clean up some messy HTML in the cert/ca display code. Prep for future MVC changes."

This reverts commit 8d4fcd7ac1167894136e337fc619e63fa7200fa0.

8d4fcd7a 08/10/2021 06:37 PM Steve Beaver

Clean up some messy HTML in the cert/ca display code. Prep for future MVC changes.

a86ab279 07/31/2021 01:19 PM ilmarranen alex

Small fixes for expiredays comparing

4ed695f2 07/31/2021 01:17 PM ilmarranen alex

Add setting for ignore revoked certificates. Fix Bug #12109

005ac9d7 07/30/2021 02:56 PM ilmarranen alex

Merge branch 'pfsense:master' into master

72f21342 07/15/2021 10:31 AM ilmarranen alex

Merge branch 'pfsense:master' into master

cfec2190 07/15/2021 10:05 AM Mark Silinio

certs.inc closing parenthesis fix. Issue #11831

1b1723da 07/14/2021 03:30 PM Mark Silinio

Certificate Revocation page improvements. Issue #11831

226cb195 07/06/2021 10:12 AM ilmarranen alex

Exclude revoked certs from expiration notification. Fix Bug #12109

d74bd052 07/01/2021 01:12 PM Viktor Gurov

Do not show CA as In Use if LDAP Server transport is not TLS/SSL. Fixes #11922

8abff49b 06/18/2021 06:37 PM Viktor Gurov

Certmanager UTF8 DN support. Fixes #12041

55dc0070 04/27/2021 07:41 PM Jim Pingle

Do not read cert key details if parsing key failed. Fixes #11859

39d83c73 04/07/2021 12:49 PM Viktor Gurov

Show Unbound used certificate on the Certificate Manager page. Fixes #11678

009a3d4e 03/19/2021 03:32 PM Jim Pingle

Fix cert type handling during renewal. Fixes #11706

09d3fe62 03/10/2021 05:05 PM Jim Pingle

Fix handling of renewing cert w/o SAN. Fixes #11652

4aa7c7ae 02/23/2021 10:04 PM Jim Pingle

Improve CA/Self-Signed serial handling. Fixes #11514

bdaa35dc 02/23/2021 09:24 PM Jim Pingle

Try parsing four digit years in cert timestamps. Fixes #11504

29804b9e 02/23/2021 07:21 PM Jim Pingle

Improve handling of broken/invalid certs. Fixes #11489

8f585441 01/03/2021 12:28 PM Luiz Souza

Update the Copyright year.

A subsequent commit will deal with .po's.

96d78012 03/21/2020 07:10 AM Viktor Gurov

Allow import of PKCS12 (pfx) certificates. Issue #8645

3fdd559e 03/20/2020 09:43 AM Viktor Gurov

Renew cert with IP Address SAN. Issue #10362

81423583 03/19/2020 01:29 PM Jim Pingle

Require service-utils.inc before using a function from it. Fixes #10360

f944f4a7 02/21/2020 02:24 PM Jim Pingle

Server cert lifetime reduced to 398. Fixes #9825

New requirements coming this fall will require new certs to be valid for at most
398 days. Setup this new requirement now, rather than waiting.

While here, reduce usage of hardcoded value where possible.

0284d79e 01/03/2020 04:37 PM Jim Pingle

This is 2020. Issue #9245

1cd960a8 12/31/2019 02:11 PM Renato Botelho

Merge pull request #4132 from vktg/hidenoprvcerts

4e8cb2fc 12/31/2019 05:25 AM Viktor Gurov

parenthesis fix

d250c48b 12/18/2019 07:32 AM Viktor Gurov

fix

79fc17f9 12/17/2019 01:00 PM Renato Botelho

Merge pull request #4122 from vktg/ecdsarenew

e43c71ce 12/17/2019 10:42 AM Viktor Gurov

do not show certs without prv by default

7ee29634 11/29/2019 07:05 PM Viktor Gurov

curve_compatible_list - array of all compat curves

00d9ce91 11/28/2019 01:46 PM Viktor Gurov

typo

941470ef 11/28/2019 01:37 PM Viktor Gurov

prime256v1 ec curve for renew

475d712b 11/26/2019 04:05 PM Jim Pingle

When refreshing CRLs, increment suffix, do not clean up. Fixes #9915

While here, fix a bug with refresh path.

84041dcf 11/26/2019 03:15 PM Jim Pingle

Correctly populate CRL issuer in crl_contains_cert. Fixes #9924

3c1249b3 11/26/2019 02:14 PM Jim Pingle

Add 'none' option to cert_build_list. Issue #9923

348c2af1 11/25/2019 09:50 PM Jim Pingle

Restructure OpenVPN settings directory layout

  • Changed from /var/etc/openvpn[-csc]/<mode><id>.<file> to
    /var/etc/openvpn/<mode><id>/<x>
  • This keeps all settings for each client and server in a clean
    structure
  • Move to CApath style CA structure for OpenVPN, which implements #9915...
59fac81f 11/25/2019 04:42 PM Jim Pingle

Add select_source compatible output to cert_build_list(). Implements #9923

ca3cddbe 11/22/2019 01:44 PM Jim Pingle

Update OpenVPN EC list based on testing. Issue #9744

bc3e78ab 11/21/2019 07:41 PM Jim Pingle

OpenVPN ECDH/ECDSA filtering. Fixes #9744

Can be revisited in the future if the corresponding OpenVPN bug is
resolved.

94ce250e 11/20/2019 04:29 PM Jim Pingle

Move CA random serial option to upper section. Issue #9883

This allows it to be set when creating a new CA, so it doesn't have to
be edited in later.

Also show the next serial/random status in the CA info block
Hide trust store line from non-CA entries since it's not relevant to...

d1f5587d 11/19/2019 04:43 PM Jim Pingle

Rename IPsec "RSA" options to "Certificate". Implements #9903

9dfd57c0 11/15/2019 04:02 PM Jim Pingle

Attempt to fetch EC curve OID if name is blank. Issue #9745

1120b85c 11/15/2019 03:51 PM Jim Pingle

Certificate date calculation changes. Fixes #9899

Make the certificate date calculation more general and also try multiple ways
to determine the date (both timestamp and unix timestamp).

Catch cases where one or the other date fails to calculate to avoid errors....

cffcf9bf 11/14/2019 08:59 PM Jim Pingle

GUI improvements for ECDSA certificate handling

  • Make central functions to check and test ECDSA compatibility. Issue #9843
  • Filter incompatible certificates from being offered for the GUI or Captive Portal. Implements #9897
  • Do the same for IPsec, which implements #4991...
c3cda38e 11/14/2019 01:43 PM Jim Pingle

Change default ECSDA curve to prime256v1. Issue #9843

Previous default was brainpool, but brainpool curves are not (widely?)
supported by browsers and were deprecated by IETF for TLS v1.3

b8b33a3e 11/07/2019 04:50 PM Jim Pingle

Use more accurate date calculations for CA/Cert operations.

Otherwise calculations could fail on ARM

a6bd9e78 11/05/2019 04:31 PM Jim Pingle

Validate CA/CRL serial input. Issue #9883 Issue #9869

3a877e4a 11/04/2019 07:30 PM Jim Pingle

Enforce a max lifetime for CA/Cert/CRL. Issue #3956

2c9601c9 11/04/2019 07:02 PM Jim Pingle

Add support for randomized cert serial numbers. Implements #9883

63fb68d7 11/01/2019 08:14 PM Jim Pingle

CRL management overhaul

  • Allow revoking by serial number or cert. Implements #9869
  • Allow revoking multiple entries at a time. Implements #3258
  • Declutter the main CRL list screen
  • Move the create control to the bottom under the list
  • Various other efficiency/style improvements
7daab3d8 10/31/2019 08:28 PM Jim Pingle

Add option to trust local CA entries. Implements #4068

Similar to closed PR #3558 from overhacked, but with a number of
changes.

e78fe74d 10/31/2019 08:04 PM Jim Pingle

Make value of cert notify setting consistent with others. Issue #7332

3f0b7bc3 10/31/2019 05:10 PM Jim Pingle

Certificate strength improvements. Fixes #9825

  • Change default GUI cert lifetime to 825 days
  • Add notes on CA/Cert pages about using potentially insecure parameter
    chocies
  • Add visible warnings on CA/Cert pages if paramers are insecure/not
    recommended.
b5d2d8d8 10/30/2019 06:11 PM Jim Pingle

Add daily certificate expiration notice. Issue #7332

b0790fc0 10/30/2019 12:39 PM Jim Pingle

Add missing newline after Must Staple cert info.

38e7b336 10/29/2019 08:56 PM Jim Pingle

Add settings to control certificate expiration notifications. Issue #7332

Note that the notices themselves do not yet exist. Those are still a
work in progress.

93f1121f 10/29/2019 06:45 PM Jim Pingle

Add certificate lifetime to infoblock. Issue #7332

  • Adds the total lifetime and lifetime remaining before expiration to
    the info block
  • Adds a visual indication to the infoblock and end date when the
    certificate will be expiring soon, or if it has already expired.
b6196922 10/28/2019 08:46 PM Jim Pingle

Show detailed infoblock on CA and Cert pages. Implements #9856

  • Moved info block to common function
  • Used that function on CA and Cert pages
  • Added more information to the info block
03a84081 10/25/2019 08:38 PM Jim Pingle

Add GUI code and more backend for CA/Cert Renewal. Issue #9842

dc56eafa 10/25/2019 01:27 PM Jim Pingle

Merge pull request #4104 from vktg/geneckey

9e80dd44 10/23/2019 08:23 PM Jim Pingle

Add ca/certificate renew function backend (no GUI code yet). Issue #9842

ff5bc49c 10/23/2019 04:33 PM Viktor Gurov

spaces to tabs

e0f8d364 10/23/2019 02:57 PM Viktor Gurov

fixes

68690e0d 10/23/2019 08:46 AM Viktor Gurov

initial version

38809d47 07/29/2019 05:50 PM Renato Botelho

Fix copyright message years to reflect BSDP -> ESF -> Netgate

0d82f93b 03/18/2019 04:47 PM Jim Pingle

Correct OSCP Must-Staple cert check for OpenSSL 1.1.1. Fixes #9408

0b4c14a4 01/02/2019 02:50 PM Steve Beaver

Update copyright notices to 2019. Happy New Year

3fec2470 11/06/2018 06:19 PM Jim Pingle

If the cert date is negative, use DateTime instead of date. Fixes #9100

9aa8f6a8 11/06/2018 05:47 PM Jim Pingle

Prevent CRL from using too large a lifetime on ARM. Fixes #9098

981d6364 05/08/2018 03:26 PM Jim Pingle

Change CRL generation to a pure PHP implementation which works with PHP 7.2 (and 5.6)

The old OpenSSL CRL patch we had been using does not work with 7.2, and this way also
opens up some new possibilities for enhancing the CRL settings we can offer in the...

2aafa69c 04/27/2018 01:02 PM Jim Pingle

Remove constants that were defined by an OpenSSL patch that has been removed.

37e1aecf 04/02/2018 07:42 PM Jim Pingle

Fix function name typo

00e54150 04/02/2018 07:18 PM Jim Pingle

Add function to detect OCSP Must Staple certs. Ticket #8418 and Ticket #8299

b8f91b7c 01/05/2018 01:44 PM Luiz Souza

Update the Copyright notice for pfSense.

e562fca2 01/02/2018 04:49 PM Jim Pingle

Change how SANs are generated from the CN, considering that not all CNs will produce a valid SAN. Fixes #8252

b6dcbd64 12/01/2017 05:41 PM Jim Pingle

When retrieving a public key for a certificate, private key, or signing request, write the certificate data out to a temp file instead of echoing it through a pipe. Fixes #8153

9038f44c 12/01/2017 02:48 PM Steve Beaver

Revert "Mitigate possible vuln in cert manager"

This reverts commit 1a68f4badd58de8694ac6a4208e11d7265c97df3.

1a68f4ba 12/01/2017 02:30 PM Steve Beaver

Mitigate possible vuln in cert manager

70b70f9d 10/31/2017 07:19 PM Jim Pingle

Fix handling of wildcard CN/SAN entries in certificates. Fixes #7994

aec3a259 09/11/2017 05:44 PM Jim Pingle

Add a field to pick a digest algo when signing a CSR, otherwise it ends up with SHA1. Fixes #7853
While here, add the cert serial number and sig digest type to the info block for each cert.

2504e3f1 07/07/2017 09:07 PM Jim Pingle

Fix CA reference so serial increases properly. Remove variable for feature that didn't work out. Ticket #7527

0c82b8c2 07/06/2017 05:30 PM Jim Pingle

Restructure how certificate types and SANs are handled in the cert manager when making a Cert/CSR/Signing, so each section can properly use the controls without duplicating. It is now possible to add SANs and EKUs to certificates when signing using the certificate manager. Fixes #7527 and also Fixes #7677...

282b6c66 07/05/2017 08:41 PM Jim Pingle

Add the ability to set certificate type and SAN attributes in a CSR. Ticket #7527
TODO: They are not carried over after signing in the GUI

2e1809dd 07/05/2017 05:30 PM Jim Pingle

Fix some additional cases for CN->SAN handling, and move some code to a function to avoid duplication for other pending uses. Ticket #7666

83d2b83a 05/11/2017 08:38 PM Jim Pingle

Allow a wider range of characters to be used in certificate fields, as laid out by RFC 4514. Fixes #7540

4906f4ee 05/02/2017 07:13 PM Jim Pingle

Show SAN, KU, and EKU info in the certificate list. Implements #7505
While here, also fix "server" cert detection to key off of the EKU For "TLS Web Server Authentication" since nsCertType has been deprecated.

bafd63b5 04/20/2017 07:24 PM Renato Botelho

Merge pull request #3699 from PiBa-NL/20170417-certificatemanager-ca-crl-inuse

6d6ba660 04/17/2017 06:40 PM Pi Ba

certificate manager, allow importing of ECC certificates, change multiple 'if' to 'switch'

3bde5cdd 04/17/2017 06:32 PM Pi Ba

certificate manager, show 'in use' also for CA and CRL where certificates are in use by packages.

1746c5ce 04/16/2017 05:32 PM Pi Ba

certificate manager, allow importing of ECC certificates

84141846 03/08/2017 03:03 PM Jim Pingle

Remove whirlpool from the list of CA/Cert digest algorithms as it does not work properly. OpenSSL claims it's not valid ("unknown signature algorithm"). Fixes #7370
While I'm here, stop needlessly repeating the algo list, it's a global in certs.inc, so use that single copy of the list.

7fd7fbcf 02/25/2017 04:38 PM Pi Ba

certificatemanager, link certificate to the proper CA after completing the CSR request

ab63443a 11/29/2016 06:48 PM Jim Pingle

Fix certificate generation for CAs without a serial set on import. Fixes #6952

e2c718c8 11/29/2016 06:32 PM Jim Pingle

Add some CA in-use test utility functions. Ticket #6947

2f7c76cf 11/17/2016 11:47 AM Doktor Notor

Put original match back

Did not mean to remove SSL substring from the check...

0db9846a 11/17/2016 11:36 AM Doktor Notor

Fix nsCertType matching for some certificates (Bug #6877)

See https://redmine.pfsense.org/issues/6877#note-4

81299b5c 09/06/2016 07:23 PM Renato Botelho

Move copyright from ESF to Netgate