SOLVED.
That did the trick, but there were other plain-text items in the file. Additionally there
are additional inputs involved when using certutil:
# certutil -R -k rsa -g 2048 -s "CN=cisco1.stargatecommand.mil" -o cisco1.cert
-v 12 -d . -1 -3 -6
Enter Password or Pin for "NSS Certificate DB":
A random seed must be generated that will be used in the
creation of your key. One of the easiest ways to create a
random seed is to use the timing of keystrokes on a keyboard.
To begin, type keys on the keyboard until this progress meter
is full. DO NOT USE THE AUTOREPEAT FUNCTION ON YOUR KEYBOARD!
Continue typing until the progress meter is full:
|************************************************************|
...
--
The bigger issue is that I wanted to create a Certificate Request using certutil.
-----Original Message-----
From: Chandrasekar Kannan <ckannan(a)redhat.com>
Sent: Apr 29, 2009 11:56 AM
To: Fortunato <fortunato.montresor(a)earthlink.net>
Cc: Marc Sauton <msauton(a)redhat.com>, pki-users(a)redhat.com
Subject: Re: [Pki-users] certutil: unable to generate key(s)
On Wed, 2009-04-29 at 11:52 -0700, Fortunato wrote:
> Thanks!
>
> Fixed the -d option.
>
> Now I'm getting:
>
> Enter Password or Pin for "NSS Certificate DB":
cat /var/lib/pki-sub-ca/conf/password.conf contains what you need.
Look for internal token password.
>
> I did not set this Password/PIN. All the docs reference tksTool. I don't want to
fubar more things but it looks like the following is needed:
>
> tksTool -N -d .
>
> I assume the tksTool is part of pki-tks.
>
> -----Original Message-----
> >From: Marc Sauton <msauton(a)redhat.com>
> >Sent: Apr 29, 2009 11:42 AM
> >To: Fortunato <fortunato.montresor(a)earthlink.net>
> >Cc: pki-users(a)redhat.com
> >Subject: Re: [Pki-users] certutil: unable to generate key(s)
> >
> >Marc Sauton wrote:
> >> Fortunato wrote:
> >>> Hello,
> >>>
> >>> I haven't found information on the topic but it looks like
there's a
> >>> problem with certutil - using IPv4.
> >>>
> >>> [root@localhost alias]# certutil -R -k rsa -g 2048 -s
> >>> "CN=cisco1.localdomain.com" -o cisco1.cert -v 12 -d
> >>> /var/lib/pki-sub-ca/ -1 -3 -6
> >>> certutil: unable to generate key(s)
> >>> : An I/O error occurred during security authorization.
> >>>
> >>> Any ideas would be welcome.
> >>>
> >>> _______________________________________________
> >>> Pki-users mailing list
> >>> Pki-users(a)redhat.com
> >>>
https://www.redhat.com/mailman/listinfo/pki-users
> >>>
> >> May want to tweak the -d option to point to the alias directory
> >> <path-to-alias-dir>, not just /var/lib/pki-sub-ca/
> >> M.
> >>
> >> _______________________________________________
> >> Pki-users mailing list
> >> Pki-users(a)redhat.com
> >>
https://www.redhat.com/mailman/listinfo/pki-users
> >Side note: the i/o error happens because of the missing NSS db files,
> >either wrong alias directory with -d, or need a certutil -N -d <path> to
> >create them.
> >M.
>
> _______________________________________________
> Pki-users mailing list
> Pki-users(a)redhat.com
>
https://www.redhat.com/mailman/listinfo/pki-users
--
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Chandrasekar Kannan -- ckannan(a)redhat.com
Quality Engineering --
http://www.redhat.com
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~