Hi Christina
Thanks for the response. PFA the typescript for pkispawn step1 and pkispawn
step2.
Thanks,
Kritee
On Thu, Nov 6, 2014 at 8:01 AM, Christina Fu <cfu(a)redhat.com> wrote:
  Hi Kritee,
 I think we could use a bit more info.
 Could you try running pkispawn with script... something like the following:
 script -c 'pkispawn -s CA -f config-step2.txt -vvv'
 the resulting typescript file might give us some more clue.
 Christina
 On 10/31/2014 09:24 PM, kritee jhawar wrote:
     Thanks Christina
  I checked out the master branch and built it. Now i can see the added
 extensions in the CSR generated, however i am getting the same error as
 earlier.
  This time again, I tried the supply the certificate chain with and
 without the headers. The chain is in a  valid pkcs7 format.
  Following is how the extensions look in the certificate signed by openssl
 for dogtag:
       X509v3 extensions:
             X509v3 Basic Constraints: critical
                 CA:TRUE
             X509v3 Key Usage: critical
                 Digital Signature, Non Repudiation, Certificate Sign, CRL
 Sign
             1.3.6.1.4.1.311.20.2:
                 .
 .S.u.b.C.A
  The error i get in step 2 of pkispawn is as follows:
 pkispawn    : INFO     ....... BtoA
 /root/.dogtag/pki-tomcat/ca/alias/admin_pkcs10.bin
 /root/.dogtag/pki-tomcat/ca/alias/admin_pkcs10.bin.asc
 pkispawn    : INFO     ....... loading external CA signing certificate
 from file: '/home/kjhawar/dogtag/dg_ca.cert'
 pkispawn    : INFO     ....... loading external CA signing certificate
 chain from file: '/home/kjhawar/dogtag/dg_chain.cert'
 pkispawn    : INFO     ....... configuring PKI configuration data.
 pkispawn    : INFO     ....... AtoB /root/.dogtag/pki-tomcat/ca_admin.cert
 /root/.dogtag/pki-tomcat/ca_admin.cert.der
 pkispawn    : INFO     ....... certutil -A -d
 /root/.dogtag/pki-tomcat/ca/alias -n PKI Administrator -t u,u,u -i
 /root/.dogtag/pki-tomcat/ca_admin.cert.der -f
 /root/.dogtag/pki-tomcat/ca/password.conf
 Notice: Trust flag u is set automatically if the private key is present.
 pkispawn    : INFO     ....... pk12util -d
 /root/.dogtag/pki-tomcat/ca/alias -o
 /root/.dogtag/pki-tomcat/ca_admin_cert.p12 -n PKI Administrator -w
 /root/.dogtag/pki-tomcat/ca/pkcs12_password.conf -k
 /root/.dogtag/pki-tomcat/ca/password.conf
 pkispawn    : INFO     ... finalizing
 'pki.server.deployment.scriptlets.finalization'
 pkispawn    : INFO     ....... cp -p
 /etc/sysconfig/pki/tomcat/pki-tomcat/ca/deployment.cfg
 /var/log/pki/pki-tomcat/ca/archive/spawn_deployment.cfg.20141101020655
 pkispawn    : INFO     ....... generating manifest file called
 '/etc/sysconfig/pki/tomcat/pki-tomcat/ca/manifest'
 pkispawn    : INFO     ....... cp -p
 /etc/sysconfig/pki/tomcat/pki-tomcat/ca/manifest
 /var/log/pki/pki-tomcat/ca/archive/spawn_manifest.20141101020655
 pkispawn    : INFO     ....... executing 'systemctl daemon-reload'
 pkispawn    : INFO     ....... executing 'systemctl restart
 pki-tomcatd(a)pki-tomcat.service'
 Job for pki-tomcatd(a)pki-tomcat.service canceled.
 pkispawn    : ERROR    ....... subprocess.CalledProcessError:  Command
 '['systemctl', 'restart',
'pki-tomcatd(a)pki-tomcat.service']' returned
 non-zero exit status 1!
 Installation failed.
  Kindly let me know if any specific configuration has to be done in my
 openssl CA. Attaching the config file i am using currently
  Thanks
  Kritee
 On Fri, Oct 31, 2014 at 10:36 PM, Christina Fu <cfu(a)redhat.com> wrote:
>  Kritee,
>
> At the minimum, you need the fixes I talked about. They were checked into
> the master but has not been built officially so yum is not going to get you
> the right rpm.  However, you can check it out and build it yourself.
> Here is how you check out the master:
>
> git clone 
git://git.fedorahosted.org/git/pki.git
>
> You can then use the build scripts to build.
>
> Finally, I apologize that we are not supposed to respond to private
> emails.  Dogtag is a community where we share our knowledge.  In the future
> please send requests to the mailing list.
> I took the exception this time to look at your CSR and certs and I could
> see that you need the fixes I talked about.  I don't know if you have other
> issues though, but AFAIK you need those two fixes.
>
> Hope this helps.
> Christina
>
>
> On 10/29/2014 01:16 AM, kritee jhawar wrote:
>
> Hi Christina
>
>  I have done the default configuration for 389ds and haven't
> specifically turned on ssl for it.
>
>  Initially I tried using Microsoft and OpenSSL CA as external CAs. This
> is about a month back and I pull the Rpms using yum (so I assume they are
> the latest ones with the fix you mentioned).
> With this, my pki spawn went fine. Infect the admin cert got generated
> using the externally provided root cert as well. But dogtag couldn't
> connect to the ds. As mentioned earlier it gave me a PKIException error
> listing the certs with error code 500.
> Looking at the ds logs I found that the error was 'bad search filter'.
> However when I tried the same steps with dogtag as external CA the setup
> went through without a glitch. The chain I imported was directly from the
> GUI of dogtag. In fact I included the header and footer as well.
>
>  When I tried to reverse engineer the chain, I took the root cert of
> external dogtag ca and used OpenSSL to convert it into pkcs7. This chain
> was not the same as provided from the GUI. Hence I thought that there is
> some particular format for the chain because of which the other CAs aren't
> working.
>
>  Also, I updated the Rpms using yum and tried to generate the CSR with
> the extra attributes. My csr still doesn't reflect those added attributes.
>
>  Is yum not the correct way to get the latest code ?
>
>  I am very new to this, really appreciate your assistance and time.
>
>  Regards
> Kritee
>
> On Wednesday, 29 October 2014, Christina Fu <cfu(a)redhat.com> wrote:
>
>>  the cert chain you provide in the file specified under
>> pki_external_ca_cert_chain_path
>> should be just pkcs7 without header/footer.
>>
>> I don't know why it would not talk to the DS (did you turn on ssl for
>> the ds?).
>> Not sure if you build your Dogtag from the master, if you do, I'd
>> suggest you get the most updated so you get fixes from the tickets I
>> provided previously which would address at least two issues relating to
>> external CA.
>>
>> Christina
>>
>> On 10/27/2014 07:55 PM, kritee jhawar wrote:
>>
>> Hi Christina
>>
>>  I was undertaking this activity last month where Microsoft CA didn't
>> work out but Dogtag as external CA did.
>>
>>  While using Microsoft CA or OpenSSL CA, pki spawn goes through
>> without any error but dogtag stops communications to 389ds. Upon calling
>> the rest Api /ca/rest/certs I get a "PKIException error listing the
certs".
>>
>>  Is there a particular format for the ca cert chain that we need to
>> provide ? I was trying to reverse engineer the chain provided by dogtag.
>>
>>  Thanks
>> Kritee
>>
>>
>>
>> On Monday, 27 October 2014, Christina Fu <cfu(a)redhat.com> wrote:
>>
>>>  If you meant the following two:
>>> 
https://fedorahosted.org/pki/ticket/1190 CA: issuer DN encoding not
>>> preserved at issuance with signing cert signed by an external CA
>>> 
https://fedorahosted.org/pki/ticket/1110 - pkispawn (configuration)
>>> does not provide CA extensions in subordinate certificate signing requests
>>> (CSR)
>>>
>>> They have just recently been fixed upstream so I imagine you could use
>>> Microsoft CA now.  Theoretically any other CA can be used as an external
>>> CA, but if you run into issues, please feel free to report.
>>>
>>> Christina
>>>
>>>
>>> On 10/27/2014 12:15 AM, kritee jhawar wrote:
>>>
>>> Hi
>>>
>>>  In my recent thread i read that there is a bug due to which Microsoft
>>> CA can't work as external CA for dogtag.
>>> Can OpenSSL be used ?
>>>
>>>  Thanks
>>> Kritee
>>>
>>>
>>> _______________________________________________
>>> Pki-users mailing
listPki-users@redhat.comhttps://www.redhat.com/mailman/listinfo/pki-users
>>>
>>>
>>>
>>
>
> _______________________________________________
> Pki-users mailing list
> Pki-users(a)redhat.com
> 
https://www.redhat.com/mailman/listinfo/pki-users
>