Thanks:
I will take a look in an effort to figure out what we have.
John Whitelock wrote:
Jack,
Thanks again for the help. Below I have pasted the log you asked for from
that same test.
[07/Jan/2009:11:20:42][http-13443-Processor25]: Authentication: client
certificate found
[07/Jan/2009:11:20:42][http-13443-Processor25]: getConn: mNumConns now 2
[07/Jan/2009:11:20:42][http-13443-Processor25]: returnConn: mNumConns now 3
[07/Jan/2009:11:20:42][http-13443-Processor25]: Authentication: mapped
certificate to user
[07/Jan/2009:11:20:42][http-13443-Processor25]: authenticated
uid=TPS-localhost.localdomain-7889,ou=People,dc=localhost.localdomain-pki-tk
s
[07/Jan/2009:11:20:42][http-13443-Processor25]: SignedAuditEventFactory:
create()
message=[AuditEvent=AUTH_SUCCESS][SubjectID=TPS-localhost.localdomain-7889][
Outcome=Success][AuthMgr=certUserDBAuthMgr] authentication success
[07/Jan/2009:11:20:42][http-13443-Processor25]: checkACLS(): ACLEntry
expressions= group="Token Key Service Manager Agents"
[07/Jan/2009:11:20:42][http-13443-Processor25]: evaluating expressions:
group="Token Key Service Manager Agents"
[07/Jan/2009:11:20:42][http-13443-Processor25]: getConn: mNumConns now 2
[07/Jan/2009:11:20:42][http-13443-Processor25]: returnConn: mNumConns now 3
[07/Jan/2009:11:20:42][http-13443-Processor25]: UGSubsystem.isMemberOf()
using new lookup code
[07/Jan/2009:11:20:42][http-13443-Processor25]: getConn: mNumConns now 2
[07/Jan/2009:11:20:42][http-13443-Processor25]: authorization search base:
cn=Token Key Service Manager
Agents,ou=groups,dc=localhost.localdomain-pki-tks
[07/Jan/2009:11:20:42][http-13443-Processor25]: authorization search filter:
(uniquemember=uid=TPS-localhost.localdomain-7889,ou=People,dc=localhost.loca
ldomain-pki-tks)
[07/Jan/2009:11:20:42][http-13443-Processor25]: authorization result: true
[07/Jan/2009:11:20:42][http-13443-Processor25]: returnConn: mNumConns now 3
[07/Jan/2009:11:20:42][http-13443-Processor25]: evaluated expression:
group="Token Key Service Manager Agents" to be true
[07/Jan/2009:11:20:42][http-13443-Processor25]: DirAclAuthz: authorization
passed
[07/Jan/2009:11:20:42][http-13443-Processor25]: SignedAuditEventFactory:
create()
message=[AuditEvent=AUTHZ_SUCCESS][SubjectID=TPS-localhost.localdomain-7889]
[Outcome=Success][aclResource=certServer.tks.sessionkey][Op=read]
authorization success
[07/Jan/2009:11:20:42][http-13443-Processor25]: getConn: mNumConns now 2
[07/Jan/2009:11:20:42][http-13443-Processor25]: returnConn: mNumConns now 3
[07/Jan/2009:11:20:42][http-13443-Processor25]: SignedAuditEventFactory:
create()
message=[AuditEvent=ROLE_ASSUME][SubjectID=TPS-localhost.localdomain-7889][O
utcome=Success][Role=Token Key Service Manager Agents] assume privileged
role
[07/Jan/2009:11:20:42][http-13443-Processor25]: keySet selected: defKeySet
[07/Jan/2009:11:20:42][http-13443-Processor25]: keySet selected: defKeySet
[07/Jan/2009:11:20:42][http-13443-Processor25]: processComputeSessionKey:
[07/Jan/2009:11:20:42][http-13443-Processor25]: TokenServlet:
serversideKeygen requested
[07/Jan/2009:11:20:42][http-13443-Processor25]: TokenServlet about to try
ComputeSessionKey selectedToken=Internal Key Storage Token
keyNickName=#FF#02
[07/Jan/2009:11:20:42][http-13443-Processor25]: TokenServlet:Tried
ComputeSessionKey, got NULL
java.lang.Exception: Can't compute session key!
at
com.netscape.cms.servlet.tks.TokenServlet.processComputeSessionKey(TokenServ
let.java:336)
at
com.netscape.cms.servlet.tks.TokenServlet.process(TokenServlet.java:945)
at
com.netscape.cms.servlet.base.CMSServlet.service(CMSServlet.java:482)
at
com.netscape.cms.servlet.tks.TokenServlet.service(TokenServlet.java:964)
at javax.servlet.http.HttpServlet.service(HttpServlet.java:729)
at
org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(Application
FilterChain.java:269)
at
org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterCh
ain.java:188)
at
org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.ja
va:213)
at
org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.ja
va:172)
at
org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:127
)
at
org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:117
)
at
org.apache.catalina.valves.AccessLogValve.invoke(AccessLogValve.java:548)
at
org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java
:108)
at
org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:174)
at
org.apache.coyote.http11.Http11Processor.process(Http11Processor.java:875)
at
org.apache.coyote.http11.Http11BaseProtocol$Http11ConnectionHandler.processC
onnection(Http11BaseProtocol.java:665)
at
org.apache.tomcat.util.net.PoolTcpEndpoint.processSocket(PoolTcpEndpoint.jav
a:528)
at
org.apache.tomcat.util.net.LeaderFollowerWorkerThread.runIt(LeaderFollowerWo
rkerThread.java:81)
at
org.apache.tomcat.util.threads.ThreadPool$ControlRunnable.run(ThreadPool.jav
a:689)
at java.lang.Thread.run(Thread.java:636)
[07/Jan/2009:11:20:42][http-13443-Processor25]: TokenServlet Computing
Session Key: java.lang.Exception: Can't compute session key!
[07/Jan/2009:11:20:42][http-13443-Processor25]:
TokenServlet:outputString.encode status=3
[07/Jan/2009:11:20:42][http-13443-Processor25]:
TokenServlet:outputString.length 8
[07/Jan/2009:11:20:42][http-13443-Processor25]: CMSServlet: curDate=Wed Jan
07 11:20:42 GMT-05:00 2009 id=tksSessionKey time=430
-----Original Message-----
From: Jack Magne [mailto:jmagne@redhat.com]
Sent: Wednesday, January 07, 2009 4:24 PM
To: Zach Casper
Cc: pki-users(a)redhat.com; 'John Whitelock'
Subject: Re: [Pki-users] ESC Format / Enroll Error
Zach:
It looks like with your second test, you have managed to get by the
hurdle of the failed "InitializeUpdate" command. This is due to using 0
and 0 for the defKeyVersion and defKeyIndex.
Now it looks like the TKS system is not acting as expected.
It would be great to have a look at the TKS debug log found in
/var/lib/pki-tks/logs
I suspect we are having an issue with computing the session key in the TKS.
thanks,
jack
Zach Casper wrote:
> Thanks Jack.
>
> It appears we are using the same keys so on to troubleshooting our
> error logs. Below are our current logs file contents.
>
> When we use the default values:
>
> channel.defKeyVersion=1
>
> channel. defKeyIndex=1
>
> Ther error we get is:
>
> [2009-01-07 11:05:07] ba6ec600 LDAP_Authentication::Authenticate -
> User bind required 'uid=testuser1,ou=People,dc=localdomain'
'envieta123'
>
> [2009-01-07 11:05:07] ba6ec600 LDAP_Authentication::Authenticate -
> Attributes mail,cn,uid
>
> [2009-01-07 11:05:07] ba6ec600 LDAP_Authentication::Authenticate -
> Exposed cn=Test User1
>
> [2009-01-07 11:05:07] ba6ec600 LDAP_Authentication::Authenticate - Size 3
>
> [2009-01-07 11:05:07] ba6ec600 LDAP_Authentication::Authenticate -
> Exposed uid=testuser1
>
> [2009-01-07 11:05:07] ba6ec600 LDAP_Authentication::Authenticate - Size 4
>
> [2009-01-07 11:05:07] ba6ec600 RA_Format_Processor::Process -
> Authenticate returns: 0
>
> [2009-01-07 11:05:07] ba6ec600 AP_Session::WriteMsg - Sent
>
's=67&msg_type=14¤t_state=10&next_task_name=PROGRESS_APPLET_UPGRADE'
>
> [2009-01-07 11:05:07] ba6ec600 RA_Processor::UpgradeApplet - path =
> /usr/share/pki/tps/applets/1.3.44724DDE.ijc
>
> [2009-01-07 11:05:07] ba6ec600 AP_Session::WriteMsg - pdu_len='12'
>
> [2009-01-07 11:05:07] ba6ec600 AP_Session::WriteMsg - Sent
>
>
's=68&msg_type=9&pdu_size=12&pdu_data=%00%A4%04%00%07%A0%00%00%00%03%00%00'
> [2009-01-07 11:05:07] ba6ec600 AP_Session::ReadMsg - decoded pdu =
> (length='20')
>
> [2009-01-07 11:05:07] ba6ec600 AP_Session::ReadMsg - 6f 10 84 08 a0 00
> 00 00 03 00
>
> [2009-01-07 11:05:07] ba6ec600 AP_Session::ReadMsg - 00 00 a5 04 9f 65
> 01 ff 90 00
>
> [2009-01-07 11:05:07] ba6ec600 AP_Session::ReadMsg -
>
> [2009-01-07 11:05:07] ba6ec600 AP_Session::WriteMsg - pdu_len='13'
>
> [2009-01-07 11:05:07] ba6ec600 AP_Session::WriteMsg - Sent
>
>
's=71&msg_type=9&pdu_size=13&pdu_data=%80%50%01%01%08%09%CD%60%A7%11%EC%23%A
5'
> [2009-01-07 11:05:08] ba6ec600 AP_Session::ReadMsg - decoded pdu =
> (length='2')
>
> [2009-01-07 11:05:08] ba6ec600 AP_Session::ReadMsg - 6a 86
>
> [2009-01-07 11:05:08] ba6ec600 RA_Format_Processor::Process - applet
> upgrade failed
>
> [2009-01-07 11:05:08] ba6ec600 AP_Session::WriteMsg - pdu_len='12'
>
> [2009-01-07 11:05:08] ba6ec600 AP_Session::WriteMsg - Sent
>
>
's=68&msg_type=9&pdu_size=12&pdu_data=%00%A4%04%00%07%62%76%01%FF%00%00%00'
> [2009-01-07 11:05:08] ba6ec600 AP_Session::ReadMsg - decoded pdu =
> (length='2')
>
> [2009-01-07 11:05:08] ba6ec600 AP_Session::ReadMsg - 90 00
>
> [2009-01-07 11:05:08] ba6ec600 AP_Session::WriteMsg - Sent
> 's=43&msg_type=13&operation=5&result=1&message=19'
>
> When we switch the values to be:
>
> channel.defKeyVersion=0
>
> channel. defKeyIndex=0
>
> The error now looks like this:
>
> [2009-01-07 11:20:41] bacd2d28 LDAP_Authentication::Authenticate -
> User bind required 'uid=testuser1,ou=People,dc=localdomain'
'envieta123'
>
> [2009-01-07 11:20:41] bacd2d28 LDAP_Authentication::Authenticate -
> Attributes mail,cn,uid
>
> [2009-01-07 11:20:41] bacd2d28 LDAP_Authentication::Authenticate -
> Exposed cn=Test User1
>
> [2009-01-07 11:20:41] bacd2d28 LDAP_Authentication::Authenticate - Size 3
>
> [2009-01-07 11:20:41] bacd2d28 LDAP_Authentication::Authenticate -
> Exposed uid=testuser1
>
> [2009-01-07 11:20:41] bacd2d28 LDAP_Authentication::Authenticate - Size 4
>
> [2009-01-07 11:20:41] bacd2d28 RA_Format_Processor::Process -
> Authenticate returns: 0
>
> [2009-01-07 11:20:41] bacd2d28 AP_Session::WriteMsg - Sent
>
's=67&msg_type=14¤t_state=10&next_task_name=PROGRESS_APPLET_UPGRADE'
>
> [2009-01-07 11:20:41] bacd2d28 RA_Processor::UpgradeApplet - path =
> /usr/share/pki/tps/applets/1.3.44724DDE.ijc
>
> [2009-01-07 11:20:41] bacd2d28 AP_Session::WriteMsg - pdu_len='12'
>
> [2009-01-07 11:20:41] bacd2d28 AP_Session::WriteMsg - Sent
>
>
's=68&msg_type=9&pdu_size=12&pdu_data=%00%A4%04%00%07%A0%00%00%00%03%00%00'
> [2009-01-07 11:20:41] bacd2d28 AP_Session::ReadMsg - decoded pdu =
> (length='20')
>
> [2009-01-07 11:20:41] bacd2d28 AP_Session::ReadMsg - 6f 10 84 08 a0 00
> 00 00 03 00
>
> [2009-01-07 11:20:41] bacd2d28 AP_Session::ReadMsg - 00 00 a5 04 9f 65
> 01 ff 90 00
>
> [2009-01-07 11:20:41] bacd2d28 AP_Session::ReadMsg -
>
> [2009-01-07 11:20:41] bacd2d28 AP_Session::WriteMsg - pdu_len='13'
>
> [2009-01-07 11:20:41] bacd2d28 AP_Session::WriteMsg - Sent
>
>
's=71&msg_type=9&pdu_size=13&pdu_data=%80%50%00%00%08%95%74%0B%AC%37%C9%DE%8
0'
> [2009-01-07 11:20:41] bacd2d28 AP_Session::ReadMsg - decoded pdu =
> (length='30')
>
> [2009-01-07 11:20:41] bacd2d28 AP_Session::ReadMsg - 00 00 71 61 57 01
> 0e 0d 90 bd
>
> [2009-01-07 11:20:41] bacd2d28 AP_Session::ReadMsg - ff 02 00 21 2e 6b
> ec 9e 33 2b
>
> [2009-01-07 11:20:41] bacd2d28 AP_Session::ReadMsg - a5 26 d0 02 e6 64
> c9 3c 90 00
>
> [2009-01-07 11:20:41] bacd2d28 AP_Session::ReadMsg -
>
> [2009-01-07 11:20:41] bacd2d28 HttpConnection::getResponse - Send
> request to host localhost.localdomain:13443 servlet
> /tks/agent/tks/computeSessionKey
>
> [2009-01-07 11:20:42] bacd2d28 RA::Engine - Pre-processing content
> 'HTTP/1.1 200 OK
>
> Server: Apache-Coyote/1.1
>
> Content-Type: text/html
>
> Content-Length: 8
>
> Date: Wed, 07 Jan 2009 16:20:42 GMT
>
> status=3
>
> [2009-01-07 11:20:42] bacd2d28 RA::Engine - Post-processing content
> 'status=3
>
> [2009-01-07 11:20:42] bacd2d28 RA_Format_Processor::Process - applet
> upgrade failed
>
> [2009-01-07 11:20:42] bacd2d28 AP_Session::WriteMsg - pdu_len='12'
>
> [2009-01-07 11:20:42] bacd2d28 AP_Session::WriteMsg - Sent
>
>
's=68&msg_type=9&pdu_size=12&pdu_data=%00%A4%04%00%07%62%76%01%FF%00%00%00'
> [2009-01-07 11:20:42] bacd2d28 AP_Session::ReadMsg - decoded pdu =
> (length='2')
>
> [2009-01-07 11:20:42] bacd2d28 AP_Session::ReadMsg - 90 00
>
> [2009-01-07 11:20:42] bacd2d28 AP_Session::WriteMsg - Sent
> 's=43&msg_type=13&operation=5&result=1&message=19'
>
> In addition - the following is the pki-tps.tps-error.log snippet
>
> [2008-12-23 12:09:39] ba5de4e0 RA_Processor::SetupSecureChannel -
> Failed to create a secure channel - potentially due to an RA/TKS key
> mismatch or differing RA/TKS key versions.
> [2008-12-23 12:09:39] ba5de4e0 RA_Processor::UpgradeApplet - channel
> creation failure
> [2008-12-23 12:10:20] ba5cb398 RA_Processor::SetupSecureChannel -
> Failed to create a secure channel - potentially due to an RA/TKS key
> mismatch or differing RA/TKS key versions.
> [2008-12-23 12:10:20] ba5cb398 RA_Processor::UpgradeApplet - channel
> creation failure
> [2008-12-23 12:11:14] b8e04520 RA_Processor::SetupSecureChannel -
> Failed to create a secure channel - potentially due to an RA/TKS key
> mismatch or differing RA/TKS key versions.
> [2008-12-23 12:11:14] b8e04520 RA_Processor::UpgradeApplet - channel
> creation failure
> [2008-12-23 12:39:38] ba5c00e0 RA_Processor::SetupSecureChannel -
> Failed to create a secure channel - potentially due to an RA/TKS key
> mismatch or differing RA/TKS key versions.
> [2008-12-23 12:39:38] ba5c00e0 RA_Processor::UpgradeApplet - channel
> creation failure
> [2008-12-23 12:44:27] ba5b14c8 RA_Processor::SetupSecureChannel -
> Failed to create a secure channel - potentially due to an RA/TKS key
> mismatch or differing RA/TKS key versions.
> [2008-12-23 12:44:27] ba5b14c8 RA_Processor::UpgradeApplet - channel
> creation failure
> [2008-12-23 12:45:54] ba5f2590 RA_Processor::SetupSecureChannel -
> Failed to create a secure channel - potentially due to an RA/TKS key
> mismatch or differing RA/TKS key versions.
> [2008-12-23 12:45:54] ba5f2590 RA_Processor::UpgradeApplet - channel
> creation failure
>
> I'm also bringing John Whitelock, another one of our engineers in on
> discussions. He just joined the pki-users list.
>
> Zach Casper
>
> _____________________________________________
> *From:* Jack Magne [mailto:jmagne@redhat.com]
> *Sent:* Wednesday, January 07, 2009 1:09 PM
> *To:* Zach Casper
> *Cc:* pki-users(a)redhat.com
> *Subject:* Re: [Pki-users] ESC Format / Enroll Error
>
> Zach:
>
> Sorry for the delay....
>
> The default developer keyset we use for our keys with TPS is the
>
> standard like follows:
>
> tks.defKeySet.auth_key=#40#41...#4f
>
> tks.defKeySet.kek_key=#40#41...#4f
>
> tks.defKeySet.mac_key=#40#41.. #4f
>
> If you look in the CS.cfg file under
>
> /var/lib/pki-tks/conf
>
> We have an entire procedure documented in the CS 7.3 documentation to
>
> perform a key changeover if required.
>
> Feel free to post any further logs you might obtain after further testing.
>
> thanks,
>
> jack
>
> Zach Casper wrote:
>
>
>> Could there be an issue with the default key our card is loaded with
>>
>> (VISA Key) not being able to create the secure connection? What are
>>
>> the default key(s) used/needed by Dogtag?
>>
>> _____________________________________________
>>
>> *From:* Jack Magne [mailto:jmagne@redhat.com]
>>
>> *Sent:* Tuesday, December 23, 2008 5:35 PM
>>
>> *To:* Zach Casper
>>
>> *Cc:* pki-users(a)redhat.com
>>
>> *Subject:* Re: [Pki-users] ESC Format / Enroll Error
>>
>> I'll have to take a closer look later but there is a quick thing you can
>>
>> try.
>>
>> Also, remember depending upon your card, if you make too many failed
>>
>> attempts at a secure channel, the card can lock itself up.
>>
>> In /var/lib/pki-tps/conf/CS.cfg you will have a block like this:
>>
>> channel.defKeyVersion=1
>>
>> channel. defKeyIndex=1
>>
>> We have experimented with some other cards where the following works:
>>
>> channel.defKeyVersion=0
>>
>> channel.defKeyIndex=0
>>
>> Zach Casper wrote:
>>
>>> tps-error.log
>>>
>>> ...
>>>
>>> [2008-12-23 12:09:39] ba5de4e0 RA_Processor::SetupSecureChannel -
>>>
>>> Failed to create a secure channel - potentially due to an RA/TKS key
>>>
>>> mismatch or differing RA/TKS key versions.
>>>
>>> [2008-12-23 12:09:39] ba5de4e0 RA_Processor::UpgradeApplet - channel
>>>
>>> creation failure
>>>
>>> [2008-12-23 12:10:20] ba5cb398 RA_Processor::SetupSecureChannel -
>>>
>>> Failed to create a secure channel - potentially due to an RA/TKS key
>>>
>>> mismatch or differing RA/TKS key versions.
>>>
>>> [2008-12-23 12:10:20] ba5cb398 RA_Processor::UpgradeApplet - channel
>>>
>>> creation failure
>>>
>>> [2008-12-23 12:11:14] b8e04520 RA_Processor::SetupSecureChannel -
>>>
>>> Failed to create a secure channel - potentially due to an RA/TKS key
>>>
>>> mismatch or differing RA/TKS key versions.
>>>
>>> [2008-12-23 12:11:14] b8e04520 RA_Processor::UpgradeApplet - channel
>>>
>>> creation failure
>>>
>>> [2008-12-23 12:39:38] ba5c00e0 RA_Processor::SetupSecureChannel -
>>>
>>> Failed to create a secure channel - potentially due to an RA/TKS key
>>>
>>> mismatch or differing RA/TKS key versions.
>>>
>>> [2008-12-23 12:39:38] ba5c00e0 RA_Processor::UpgradeApplet - channel
>>>
>>> creation failure
>>>
>>> [2008-12-23 12:44:27] ba5b14c8 RA_Processor::SetupSecureChannel -
>>>
>>> Failed to create a secure channel - potentially due to an RA/TKS key
>>>
>>> mismatch or differing RA/TKS key versions.
>>>
>>> [2008-12-23 12:44:27] ba5b14c8 RA_Processor::UpgradeApplet - channel
>>>
>>> creation failure
>>>
>>> [2008-12-23 12:45:54] ba5f2590 RA_Processor::SetupSecureChannel -
>>>
>>> Failed to create a secure channel - potentially due to an RA/TKS key
>>>
>>> mismatch or differing RA/TKS key versions.
>>>
>>> [2008-12-23 12:45:54] ba5f2590 RA_Processor::UpgradeApplet - channel
>>>
>>> creation failure
>>>
>>> tps-debug.log
>>>
>>> ...
>>>
>>> [2008-12-23 12:45:54] ba5f2590 RA_Format_Processor::Process -
>>>
>>> Authenticate returns: 0
>>>
>>> [2008-12-23 12:45:54] ba5f2590 AP_Session::WriteMsg - Sent
>>>
>
's=67&msg_type=14¤t_state=10&next_task_name=PROGRESS_APPLET_UPGRADE'
>
>
>>> [2008-12-23 12:45:54] ba5f2590 RA_Processor::UpgradeApplet - path =
>>>
>>> /usr/share/pki/tps/applets/1.3.44724DDE.ijc
>>>
>>> [2008-12-23 12:45:54] ba5f2590 AP_Session::WriteMsg - pdu_len='12'
>>>
>>> [2008-12-23 12:45:54] ba5f2590 AP_Session::WriteMsg - Sent
>>>
's=68&msg_type=9&pdu_size=12&pdu_data=%00%A4%04%00%07%A0%00%00%00%03%00%00'
>>> [2008-12-23 12:45:54] ba5f2590 AP_Session::ReadMsg - decoded pdu =
>>>
>>> (length='20')
>>>
>>> [2008-12-23 12:45:54] ba5f2590 AP_Session::ReadMsg - 6f 10 84 08 a0 00
>>>
>>> 00 00 03 00
>>>
>>> [2008-12-23 12:45:54] ba5f2590 AP_Session::ReadMsg - 00 00 a5 04 9f 65
>>>
>>> 01 ff 90 00
>>>
>>> [2008-12-23 12:45:54] ba5f2590 AP_Session::ReadMsg -
>>>
>>> [2008-12-23 12:45:54] ba5f2590 AP_Session::WriteMsg - pdu_len='13'
>>>
>>> [2008-12-23 12:45:54] ba5f2590 AP_Session::WriteMsg - Sent
>>>
's=71&msg_type=9&pdu_size=13&pdu_data=%80%50%01%01%08%56%F5%29%9D%7B%8F%6F%A
7'
>>> [2008-12-23 12:45:54] ba5f2590 AP_Session::ReadMsg - decoded pdu =
>>>
>>> (length='2')
>>>
>>> [2008-12-23 12:45:54] ba5f2590 AP_Session::ReadMsg - 6a 86
>>>
>>> [2008-12-23 12:45:54] ba5f2590 RA_Format_Processor::Process - applet
>>>
>>> upgrade failed
>>>
>>> [2008-12-23 12:45:54] ba5f2590 AP_Session::WriteMsg - pdu_len='12'
>>>
>>> [2008-12-23 12:45:54] ba5f2590 AP_Session::WriteMsg - Sent
>>>
's=68&msg_type=9&pdu_size=12&pdu_data=%00%A4%04%00%07%62%76%01%FF%00%00%00'
>>> [2008-12-23 12:45:54] ba5f2590 AP_Session::ReadMsg - decoded pdu =
>>>
>>> (length='2')
>>>
>>> [2008-12-23 12:45:54] ba5f2590 AP_Session::ReadMsg - 90 00
>>>
>>> [2008-12-23 12:45:54] ba5f2590 AP_Session::WriteMsg - Sent
>>>
>>> 's=43&msg_type=13&operation=5&result=1&message=19'
>>>
>>> zach
>>>
>>> _____________________________________________
>>>
>>> *From:* Jack Magne [mailto:jmagne@redhat.com]
>>>
>>> *Sent:* Tuesday, December 23, 2008 2:38 PM
>>>
>>> *To:* Adewumi, Julius-p99373
>>>
>>> *Cc:* Zach Casper; pki-users(a)redhat.com
>>>
>>> *Subject:* Re: [Pki-users] ESC Format / Enroll Error
>>>
>>> You are having a problem creating a secure channel. Perhaps posting a
>>>
>>> snippet of the log might help.
>>>
>>> Adewumi, Julius-p99373 wrote:
>>>
>>>> You might want to play with changing "false" to "true in
the
>>>>
> CS.cfg for
>
>
>>>> op.enroll.userKey.update.applet.emptyToken.enable=false or the
>>>>
>>>> op.format... equivalent , etc.
>>>>
>>>> /From: Julius Adewumi/
>>>>
>>>> /(a)GDC4S.com/
>>>>
>>>> /Ph:480-441-6768/
>>>>
>>>> /Contract Corp:MTSI/
>>>>
>> ------------------------------------------------------------------------
>>
>>>> *From:* pki-users-bounces(a)redhat.com
>>>>
>>>> [mailto:pki-users-bounces@redhat.com] *On Behalf Of *Zach Casper
>>>>
>>>> *Sent:* Tuesday, December 23, 2008 12:00 PM
>>>>
>>>> *To:* pki-users(a)redhat.com
>>>>
>>>> *Subject:* RE: [Pki-users] ESC Format / Enroll Error
>>>>
>>>> Tps-debug log shows the following:
>>>>
>>>> RA_Format_Processor::Process - applet upgrade failed
>>>>
>>>> Tps-error log show the following:
>>>>
>>>> RA_Processor::SetupSecureChannel - Failed to create a secure channel
>>>>
>>>> 0- potentially due to an RA/TKS key mismatch or differing RA/TKS key
>>>>
>>>> versions.
>>>>
>>>> RA_Processor::UpgradeApplet -0 channel create failure
>>>>
>>>> And a series of Bad Response when trying to SelectApplet or
>>>>
GetStatus
>>>> zach
>>>>
>>>> _____________________________________________
>>>>
>>>> *From:* Jack Magne [mailto:jmagne@redhat.com]
>>>>
>>>> *Sent:* Tuesday, December 23, 2008 1:10 PM
>>>>
>>>> *To:* Zach Casper
>>>>
>>>> *Subject:* Re: [Pki-users] ESC Format / Enroll Error
>>>>
>>>> The first step would be to take a look at the tps log or smart card
>>>>
>>>> server.
>>>>
>>>> These can be found at:
>>>>
>>>> /var/lib/pki-tps/logs/tps-debug.log
>>>>
>>>> Search the bottom of the log for error 19 and it should give you an
>>>>
>> idea
>>
>>>> of what TPS was trying to do at the time.
>>>>
>>>> Zach Casper wrote:
>>>>
>>>>> We have an Infineon Smart Card and currently we are unable to
>>>>>
>>>>> Format/Enroll due to the following ESC Error
>>>>>
>>>>> "Formatting of smart card failed. Error: The Smart Card Server
>>>>>
> cannot
>
>
>>>>> upgrade the software on your smart card."
>>>>>
>>>>> And Diagnostics show this error:
>>>>>
>>>>> "Attempting to Format Key, ID: ####### - Key Format failure,
>>>>>
Error:
>>> 19."
>>>
>>>>> This card comes up as "Formatted" because we've
manually
>>>>>
> installed a
>
>
>>>>> version of the Dogtag applet prior to using ESC & Dogtag.
>>>>>
>>>>> Any advice on how we can troubleshoot?
>>>>>
>>>>> --
>>>>>
>>>>> Zach Casper
>>>>>
>>>>> Envieta LLC
>>>>>
>>>>> ----------------------------------------
>>>>>
> ------------------------------------------------------------------------
>
>
>>>>> _______________________________________________
>>>>>
>>>>> Pki-users mailing list
>>>>>
>>>>> Pki-users(a)redhat.com
>>>>>
>>>>>
https://www.redhat.com/mailman/listinfo/pki-users
>>>>>
>> ------------------------------------------------------------------------
>>
>>>> _______________________________________________
>>>>
>>>> Pki-users mailing list
>>>>
>>>> Pki-users(a)redhat.com
>>>>
>>>>
https://www.redhat.com/mailman/listinfo/pki-users
>>>>
> ------------------------------------------------------------------------
>
>
>>> _______________________________________________
>>>
>>> Pki-users mailing list
>>>
>>> Pki-users(a)redhat.com
>>>
>>>
https://www.redhat.com/mailman/listinfo/pki-users
>>>