cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
4073
Views
10
Helpful
9
Replies

crypto key generate rsa - unable to change expiry date - always set to Jan 1 2020

jayage
Level 1
Level 1

Hello guys,

 

We're using selfsigned certs on our voice routers for encrypted IOS (audio) conference bridges. Please find below the command set. Unfortunately the exported pem is only valid until 01 January 2020. I didn't find out how to generate one with a longer lifetime / later expiry date.

 

Does somebody know how to accomplish?

 

Thank you!

 

 

crypto key generate rsa general-keys label routername modulus 2048
crypto pki trustpoint routername
 enrollment selfsigned

 hash sha256
 rsakeypair routername
 fqdn none
 revocation-check none
 subject-name CN=routername
 exit
crypto pki enroll routername
crypto pki export routername pem terminal

 

 

routername#show crypto pki certificates
Router Self-Signed Certificate
  Status: Available
  Certificate Serial Number (hex): 01
  Certificate Usage: General Purpose
  Issuer:
    cn=routername
  Subject:
    Name: routername
    cn=routername
  Validity Date:
    start date: 09:04:40 CET Feb 14 2019
    end   date: 01:00:00 CET Jan 1 2020
  Associated Trustpoints: routername
  Storage: nvram:routerna#1.cer

Last test was on an 4331 router with IOS XE 16.6.5 but problem seem to be the same on other hardware (like 2911) with older non-XE IOS.

 

 

1 Accepted Solution
9 Replies 9

jayage
Level 1
Level 1

Does anybody have an idea? Still didn't find a solution

Dear,

 

I think that the only way is to use an external CA with a dedicated template for your certificate.

If I'm not going wrong self-signed certificate that it's generated from router can be valid only for one year.

 

 

I have same issue.

how going on?

 

rkozakowski
Level 1
Level 1
Can someone help with this ? I have the same issue.
i cannot do command: auto-enroll regenerate because its enroll self-signed
%% Can not set 'auto-enroll' with 'enroll self-signed'

Then how i can renew certificat with proper date ??????

Expiry date is always set to Jan 1st 2020, don't know to change. This is still an issue to me and we're getting closer to the date. Does anybody have an idea? Do we really have to switch to CA-signed certificates? Is there no way to extend the self-signed router certificate?

Hi everybody,

 

Obviously disabling the http service and deleting the trustpoint isn't enough. Every self signed comes out with the same expiry. So i tried zerorizing and then regenerating the rsa key for ssh. That did it, but thats pretty involved. The version we are running does not have the option to set the snmp trap pki. Pretty involved to upgrade as well.

 

I'm also looking for the smarter way of turning this notice off :)

 

Any suggestions?

 

Cheers

Did you get it with longer life time?

Regarding workaround 4. how do we import the keys / certificate generated with openssl?

Thank you

jay