-
-
Notifications
You must be signed in to change notification settings - Fork 4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
caddy tls key_type ignores rsa2048 #6574
Comments
I'm not able to replicate your experience. Here's my config and the log of OpenSSL: {
local_certs
storage file_system ./data
}
localhost {
tls {
key_type rsa2048
}
respond "Ok"
}
Can you help out more with the replication? Let's try with the template, maybe it'll help zero down on the culprit. Ideally, we need to be able to reproduce the bug in the most minimal way possible. This allows us to write regression tests to verify the fix is working. If we can't reproduce it, then you'll have to test our changes for us until it's fixed -- and then we can't add test cases, either. I've attached a template below that will help make this easier and faster! This will require some effort on your part -- please understand that we will be dedicating time to fix the bug you are reporting if you can just help us understand it and reproduce it easily. This template will ask for some information you've already provided; that's OK, just fill it out the best you can. 👍 I've also included some helpful tips below the template. Feel free to let me know if you have any questions! Thank you again for your report, we look forward to resolving it! Template
Helpful tips
Example of a tutorial: Create a config file: |
I've replaced my FQDN with 1. Environment1a. Operating system and version
1b. Caddy version (run
|
I can't reproduce it. When I specify a fresh site in the Caddyfile with a specific One workaround for that is to delete the existing certificate and key and restart Caddy so it'll generate the new key for a fresh certificate. Any reason for changing the key type? |
Thanks for opening an issue and for the details! So it sounds to me like you expect that the certificate is replaced, with a new key, when the config specifies a different key type than what it is currently using. That is a reasonable expectation. But we don't do this for two reasons:
So you can imagine what this would do for servers that are handling hundreds of certificates or more (which is quite common). So we defer changes of settings for certificates until when they would normally be renewed. You can force this by deleting the certs from storage, as Mohammed suggested, but I don't recommend this at scale. (Key type changes are very uncommon.) |
I'll close this for now, but feel free to continue the discussion and we can reopen if needed. |
I have a caddy instance using Route53 ACME challenge to generate RSA2048 TLS cert for a legacy app, caddy seems to ignore
tls { key_type rsa2048 }
block.The caddy docker instance was built with Route53 module for Caddy.
Caddy version
Dockerfile
Caddy config
AWS creds were configured correctly in
/root/.aws/credentials
and cert forweb.example.dev
was obtained correctly, however cert forlegacy.example.dev
with blocktls { key_type rsa2048 }
was ignored, the cert generated uses the same key type asweb.example.dev
usinged25519
Caddy generates cert for domain with
tls { key_type rsa2048 }
using key typersa2048
console output
Log
The text was updated successfully, but these errors were encountered: