Hi William,
Thank you very much for your feedback. I find helping people like you
very rewarding.
I do not have time to read it through carefully at the moment, but
could you please file two bug? One for #1 and one for the LunaSA
unwrapping related issues. You can just copy and paste the relevant
portion of your email into each bug.
Here is the info:
btw, out of curiosity, can you search in your debug log for the string:
"handlePKIOperation: Encryption algorithm"
What algorithm does it say? Please put that in bug #2 as well.
Each HSM actually requires different flags and attributes to work. For
example, to unwrap, Lunasa would require sensitive to be false and
extractable to be true, while Thales nethsm would require sensitive to
be false and extractable to be false. key types make a difference too
for rsa and ecc keys need different attributes. I suspect the code in
the SCEP part of the woods might not have been tuned to handle such
differences.
thanks,
Christina
On 11/25/2014 04:23 AM, Elliott William C OSS sIT wrote:
We want to post the results of our solution to problem(s) we were
having.
In all, we had three different issues to overcome to get SCEP Enrollment working under
RHEL6/Dogtag 9 when using Safenet HSMs.
1. "Certificate not found: osstest:caSigningCert cert-pki-testca1"
This message is somewhat misleading because the correct combination of token and CA
nickname are displayed. However the debug messages from
method CryptoContext show that mNickname incorrectly has the token name prepended twice,
and is what throws the exception:
[05/Nov/2014:13:29:59][http-9180-1]: CRSEnrollment: CryptoContext: token name:
osstest'
[05/Nov/2014:13:29:59][http-9180-1]: CRSEnrollment: CryptoContext: mNickname:
'osstest:osstest:caSigningCert cert-pki-testca1'
As described in my first post, mNickname is modified with every call to CryptoContext -
an additional token name is then prepended with every call.
In fact, using a HSM, the CA nickname already contains the token name when mNickname is
set in init(), and needs never be prepended.
Commenting out the offending line in CrypoContext() resolves the issue, when a HSM is
used:
pki-core-9.0.3-38.el6_6.src.rpm and pki-core-9.0.3-32.el6.src.rpm - both are
identical in CRSEnrollment.java:
1973 if (mTokenName.equalsIgnoreCase(Constants.PR_INTERNAL_TOKEN) ||
1974 mTokenName.equalsIgnoreCase("Internal Key Storage
Token") ||
1975 mTokenName.length() == 0) {
1976 keyStorageToken = cm.getInternalKeyStorageToken();
1977 internalKeyStorageToken = keyStorageToken;
1978 CMS.debug("CRSEnrollment: CryptoContext: internal token
name: '"+mTokenName+"'");
1979 } else {
1980 keyStorageToken = cm.getTokenByName(mTokenName);
1981 internalKeyStorageToken = null;
1982 // mNickname = mTokenName + ":" + mNickname;
1983 CMS.debug("CRSEnrollment: CryptoContext: token name:
"+mTokenName+"'");
1984 }
For some reason, the following relatively careful conditional prepending of the token
name was removed from the init() methond and placed into CryptoContext() in version 9.0.3
that is packaged with RHEL6. In these versions we tested, mNickname is brutally prepended
with every call.
The following version 9 in the Dogtag git repository still had it right, and also in
version 10 it's also correct again:
DOGTAG_9_0_FEDORA_15_16_17_20111028
176 if (!(mTokenName.equalsIgnoreCase(Constants.PR_INTERNAL_TOKEN) ||
177 mTokenName.equalsIgnoreCase("Internal Key Storage
Token") ||
178 mTokenName.length() == 0)) {
179 int i = mNickname.indexOf(':');
180 if (!((i > -1) && (mTokenName.length() == i)
&& (mNickname.startsWith(mTokenName)))) {
181 mNickname = mTokenName + ":" + mNickname;
182 }
183 }
DOGTAG_10_1_1_1_FEDORA_20_20140321
248 if (!(mTokenName.equalsIgnoreCase(Constants.PR_INTERNAL_TOKEN)
||
249 mTokenName.equalsIgnoreCase("Internal Key Storage
Token") || mTokenName.length() == 0)) {
250 int i = mNickname.indexOf(':');
251 if (!((i > -1) && (mTokenName.length() == i)
&& (mNickname.startsWith(mTokenName)))) {
252 mNickname = mTokenName + ":" + mNickname;
253 }
254 }
*******************
Should we submit a bug report for this in the current RHEL6 packages?
We'd love to see this fixed in the RH packages and not have to compile our own
packages with every update of RHEL6.
*******************
2. Could not to unwrap PKCS10 blob
[14/Nov/2014:08:30:08][http-9180-1]: failed to unwrap PKCS10
org.mozilla.jss.crypto.SymmetricKey$NotExtractableException
[14/Nov/2014:08:30:08][http-9180-1]: ServletException javax.servlet.ServletException:
Couldn't handle CEP request (PKCSReq) - Could not unwrap PKCS10 blob: null
Here, the CA is unable to process requests from the client (again sscep) encrypted with
3DES although this is the single allowed algorithm enabled by default.
I have no idea what is causing this error, but the workaround is to fall back to DES:
allow DES in CS.cfg and configure it on the client.
When using no HSM, just a local nss keystore, the error doesn't occur.
3. FIPS 140-2 mode
The same error message in 2. occurs when the HSM is _not_ in FIPS mode. Both
RHEL6/Dogtag 9 and RHEL5/Dogtag 1.3 LunaSA 4 and 5. Without FIPS mode activated, all
requests fail with Could not unwrap PKCS10 blob: null. (also when des is used for
request)
Workaround: activate FIPS mode on the HSM. -
Case 3. (and maybe case 2.) is very similar to, if not related to [the still open] Bug
825887 (
https://bugzilla.redhat.com/show_bug.cgi?id=825887). There, it was the activation
of FIPS mode for a local NSS database which triggered the issue. (I assume that FIPS mode
for NSS prevents the cloning/exporting of keys - which is of course always the behavior of
the HSM, regardless of FIPS mode. ) Our requests also failed at exactly the same call
getDESKeyGenerator().clone as described in the Bug 825887.
Best regards,
William
-----Original Message-----
From: Elliott William C OSS sIT
Sent: Dienstag, 21. Oktober 2014 14:55
To: pki-users(a)redhat.com
Subject: RE: [Pki-users] SCEP Enrollment fails with Certificate not found .
[heur][html-removed]
(sorry for the delay - I was out of the office for some time)
The package version we're trying is pki-ca-9.0.3-32.el6.noarch, on RHEL6 as I said.
But since the last email we've also tried 9.0.3-38, with the same result.
We always ran through the wizard panels using all default values, changing nothing, but
now we configure the ca with pkisilent with the same default values to make sure the
configuration doesn't change from one test to the next.
The only change we make is afterwords to enable scep in the config:
ca.scep.allowedEncryptionAlgorithms=DES3
ca.scep.allowedHashAlgorithms=SHA1,SHA256,SHA512
ca.scep.enable=true
ca.scep.encryptionAlgorithm=DES3
ca.scep.hashAlgorithm=SHA1
ca.scep.nonceSizeLimit=16
The whole thing always works fine when we use the internal token (and with RHEL5/Dogtag
1.3 on the hsm), but throws the exception when the hsm is used as token.
We use sscep to submit requests to the ca.
We had never set the two parameters (scep.nickname, scep.tokenname) you suggested
trying.
Here are the results of your suggestions below :
** 1. This is our current configuration which always produces the exception.
From debug log:
CRSEnrollment: init: SCEP support is enabled.
CRSEnrollment: init: SCEP nickname: osstest:caSigningCert cert-pki-testca1
CRSEnrollment: init: CA nickname: osstest:caSigningCert cert-pki-testca1
CRSEnrollment: init: Token name: osstest
CRSEnrollment: init: Is SCEP using CA keys: true
CRSEnrollment: init: mNonceSizeLimit: 16
CRSEnrollment: init: mHashAlgorithm: SHA1
CRSEnrollment: init: mHashAlgorithmList: SHA1,SHA256,SHA512
CRSEnrollment: init: mAllowedHashAlgorithm[0]=SHA1
CRSEnrollment: init: mAllowedHashAlgorithm[1]=SHA256
CRSEnrollment: init: mAllowedHashAlgorithm[2]=SHA512
CRSEnrollment: init: mEncryptionAlgorithm: DES3
CRSEnrollment: init: mEncryptionAlgorithmList: DES3
CRSEnrollment: init: mAllowedEncryptionAlgorithm[0]=DES3
CRSEnrollment: init: mProfileId=caRouterCert
...
CRSEnrollment: CryptoContext: token name: osstest'
CRSEnrollment: CryptoContext: mNickname: 'osstest:osstest:caSigningCert
cert-pki-testca1'
handlePKIMessage exception
com.netscape.cms.servlet.cert.scep.CRSEnrollment$CryptoContext$CryptoContextException:
Certificate not found: osstest:caSigningCert cert-pki-testca1
com.netscape.cms.servlet.cert.scep.CRSEnrollment$CryptoContext$CryptoContextException:
Certificate not found: osstest:caSigningCert cert-pki-testca1
at
com.netscape.cms.servlet.cert.scep.CRSEnrollment$CryptoContext.<init>(CRSEnrollment.java:2026)
...
** 2. Setting ca.scep.nickname at first produced no discernable change,
other than, requests for the ca cert. with "sscep getca" then fail
reliably.
Due to token name not being set:
From debug log:
CRSEnrollment: init: SCEP support is enabled.
CRSEnrollment: init: SCEP nickname: caSigningCert cert-pki-testca1
CRSEnrollment: init: CA nickname: osstest:caSigningCert cert-pki-testca1
CRSEnrollment: init: Token name:
CRSEnrollment: init: Is SCEP using CA keys: false
CRSEnrollment: init: mNonceSizeLimit: 16
CRSEnrollment: init: mHashAlgorithm: SHA1
CRSEnrollment: init: mHashAlgorithmList: SHA1,SHA256,SHA512
CRSEnrollment: init: mAllowedHashAlgorithm[0]=SHA1
CRSEnrollment: init: mAllowedHashAlgorithm[1]=SHA256
CRSEnrollment: init: mAllowedHashAlgorithm[2]=SHA512
CRSEnrollment: init: mEncryptionAlgorithm: DES3
CRSEnrollment: init: mEncryptionAlgorithmList: DES3
CRSEnrollment: init: mAllowedEncryptionAlgorithm[0]=DES3
CRSEnrollment: init: mProfileId=caRouterCert
...
CRSEnrollment: CryptoContext: internal token name: ''
CRSEnrollment: CryptoContext: mNickname: 'caSigningCert cert-pki-testca1'
handlePKIMessage exception
com.netscape.cms.servlet.cert.scep.CRSEnrollment$CryptoContext$CryptoContextException:
Certificate not found: osstest:caSigningCert cert-pki-testca1
com.netscape.cms.servlet.cert.scep.CRSEnrollment$CryptoContext$CryptoContextException:
Certificate not found: osstest:caSigningCert cert-pki-testca1
at
com.netscape.cms.servlet.cert.scep.CRSEnrollment$CryptoContext.<init>(CRSEnrollment.java:2026)
...
** 3. setting both ca.scep.nickname and ca.scep.tokenname also does not get around the
problem.
From debug log:
CRSEnrollment: init: SCEP support is enabled.
CRSEnrollment: init: SCEP nickname: caSigningCert cert-pki-testca1
CRSEnrollment: init: CA nickname: osstest:caSigningCert cert-pki-testca1
CRSEnrollment: init: Token name: osstest
CRSEnrollment: init: Is SCEP using CA keys: false
CRSEnrollment: init: mNonceSizeLimit: 16
CRSEnrollment: init: mHashAlgorithm: SHA1
CRSEnrollment: init: mHashAlgorithmList: SHA1,SHA256,SHA512
CRSEnrollment: init: mAllowedHashAlgorithm[0]=SHA1
CRSEnrollment: init: mAllowedHashAlgorithm[1]=SHA256
CRSEnrollment: init: mAllowedHashAlgorithm[2]=SHA512
CRSEnrollment: init: mEncryptionAlgorithm: DES3
CRSEnrollment: init: mEncryptionAlgorithmList: DES3
CRSEnrollment: init: mAllowedEncryptionAlgorithm[0]=DES3
CRSEnrollment: init: mProfileId=caRouterCert
...
CRSEnrollment: CryptoContext: token name: osstest'
<-- from sscep getca request
CRSEnrollment: CryptoContext: mNickname: 'osstest:caSigningCert
cert-pki-testca1'
...
CRSEnrollment: CryptoContext: token name: osstest'
CRSEnrollment: CryptoContext: mNickname: 'osstest:osstest:caSigningCert
cert-pki-testca1' <-- from sscep enroll request
handlePKIMessage exception
com.netscape.cms.servlet.cert.scep.CRSEnrollment$CryptoContext$CryptoContextException:
Certificate not found: osstest:caSigningCert cert-pki-testca1
com.netscape.cms.servlet.cert.scep.CRSEnrollment$CryptoContext$CryptoContextException:
Certificate not found: osstest:caSigningCert cert-pki-testca1
at
com.netscape.cms.servlet.cert.scep.CRSEnrollment$CryptoContext.<init>(CRSEnrollment.java:2026)
at
com.netscape.cms.servlet.cert.scep.CRSEnrollment.handlePKIOperation(CRSEnrollment.java:803)
at
com.netscape.cms.servlet.cert.scep.CRSEnrollment.service(CRSEnrollment.java:297)
best regards,
William
-----Original Message-----
From: pki-users-bounces(a)redhat.com [mailto:pki-users-bounces@redhat.com] On Behalf Of
Christina Fu
Sent: Donnerstag, 02. Oktober 2014 02:15
To: pki-users(a)redhat.com
Subject: Re: [Pki-users] SCEP Enrollment fails with Certificate not found .
[heur][html-removed]
btw, I'm not suggesting that you need either or both config params.
three sets of config you can try:
1. don't specify either ca.scep.nickname or ca.scep.tokenname
(I think by default it takes the ca signing cert, if that's what you
intend to use anyway)
2. specify nickname only ca.scep.nickname (without the token)
ca.scep.nickname=caSigningCert cert-pki-testca1
(I think by default, if the nickname you specified matches that of the
ca, it will find the token for you)
3. specify both nickname and token:
ca.scep.nickname=caSigningCert cert-pki-testca1
ca.scep.tokenname=osstest
(last resort, because when you do this, it thinks it's not using the ca
signing cert.. )
Let us know.
Christina
On 10/01/2014 05:00 PM, Christina Fu wrote:
> What's your scep config values, specifically:
> ca.scep.nickname
> ca.scep.tokenname
>
> Christina
>
> On 09/29/2014 04:55 AM, Elliott William C OSS sIT wrote:
>> Hello,
>>
>> We are currently trying to get a new RHEL6/Dogtag 9 with Safenet HSMs
>> setup for SCEP enrollment. But, no matter whether we try the older
>> HSMs( LunaSA 4) or the newer (LunaSA 5) we cannot complete a
>> successful SCEP request. The following exception occurs in the debug log:
>>
>> [29/Sep/2014:13:41:17][http-9180-1]: operation=PKIOperation
>>
>> [29/Sep/2014:13:41:17][http-9180-1]:
>> message=MIIHDQYJKoZIhvcNAQcCoIIG/jCCBvoCAQExDjAMBggqhkiG9w0CBQUAMIIDZQYJ
>>
>> KoZIhvcNAQcBoIIDVgSCA1IwggNOBgkqhkiG9w0BBwOgggM/MIIDOwIBADGCAW4w
>>
>> ggFqAgEAMFIwTTEVMBMGA1UEChMMRWJMYW4gRG9tYWluMRQwEgYDVQQLEwtwa2kt
>>
>> dGVzdGNhMTEeMBwGA1UEAxMVQ2VydGlmaWNhdGUgQXV0aG9yaXR5AgEBMA0GCSqG
>>
>> SIb3DQEBAQUABIIBADJhcbvaLYwGrTA6W1G+xB2BuHKJKnQ9DL+KsGWGuVh94CaH
>>
>> 7QAs2fbWcswpD6yhRDTirMS9gXBkdIdEZtGWvMKcZYpLbAxtoE/2V3oa9D5fdwjP
>>
>> RaLAt5rh6afS/pPbpdCkTYvHZZu7Y1//UDSP7Jkli/oBVE/vYEkteTgFlOgPhNJs
>>
>> HN/xVJAHJniIzJMc48YojxT8angpN045K+lAFldwsq5RpwS2szH7jaQeGsn5bx+r
>>
>> SQrEcPYz4noj9GnlzrOAnpvLK8XanJUj6KF4w8Am/adJhTRZrwAc6PVr88BO367g
>>
>> rjHcNApluo0m4+5DxvC8x7ri4N3wusfRN/oBpkMwggHCBgkqhkiG9w0BBwEwEQYF
>>
>> Kw4DAgcECGugmAolmOqhgIIBoIaPJ2m6nhY6DsUUBHGGqZRqVvlXimRX++u6UtWM
>>
>> X0r2jjmCfzpKuijFApiYAdrQzewMjk5AvLE0Pu6cH8mL7Sq973d8zG1vdqAQWZbW
>>
>> m8C6VRrpD9vw1Yd+q9Ma9UWSqIK0BicuqQk9jWRZVNWmVQT/q3Ht/+7s4rS7iiNu
>>
>> udSV9MAMAeZsR/AQh1f2DDMCtu2CKsRsQi+qL3gGO2YYQpmbTVBwIPj0O9X664qc
>>
>> AEqcFFUcGYlb5ES9RMmXtYWJb6rkrAQdWs8MPaaUuVON+t26mim9RazteY5dQ4rT
>>
>> l7UFujI+pIdc8JXflJ/SaJDb7USl1Y89OMS+j6Uxi1qimhzjedLmhpS27wKH1x61
>>
>> JfEPqypjsz/AdKYiYH1IOXT3wVq52cpxOMlMpLEOl2eK3QCmvQMef1e9cmnku3fz
>>
>> cglipc6hT90ca/ugJWlXI84zlppEvKAJ3zqOtmJAf2TYcU++Cyg4Ai/Bi0Szon5z
>>
>> gOsL1Qpo8YdrmzHL4KbfAHGE7T/QCGA/CszbANL7aTMh4SNC6/A6ZIwoPDmTePNB
>>
>> dB0IoIIByzCCAccwggEwoAMCAQICIDRDNENCNUVFOUZGRkVCRkQzMUY5M0QwREJG
>>
>> NTZGMUY3MA0GCSqGSIb3DQEBBAUAMBoxGDAWBgNVBAMTDzAxMC4wMDAuMDAwLjAy
>>
>> MTAeFw0xNDA5MjkxMTQxMTdaFw0xNDEwMDUxMzQxMTdaMBoxGDAWBgNVBAMTDzAx
>>
>> MC4wMDAuMDAwLjAyMTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEA4vzJ7zuF
>>
>> gzXYtHQEDehMN+WniECBX9q6cV7ixr/F/Qn7ItbIiUrRfwMk+2orzSVRANE0dpBM
>>
>> rqohSq6USOoXwLp/YkITA5RNiQn5LRyebfWgul0IIgioq6L6EI88PG+elBbN2dip
>>
>> 9sjbedJlgIB+zxJ506f0Qf23nYJScdaJ/x8CAwEAATANBgkqhkiG9w0BAQQFAAOB
>>
>> gQCWENzZzQD6Dj88f33Y8aVY8DQoZjl/sIRHtPjJOKgINJrIt1bU2mlwQ2IrYtrN
>>
>> L2lv4UOpD9JsprK6FZb0XMMxZotCpXDHZevstDIq745srkHvZK15USjNY2QDvhOp
>>
>> e8YRESZf64jH7dAkiiFgJU7k6NZRNrIb5l8BuVd1K6sh4jGCAaswggGnAgEBMD4w
>>
>> GjEYMBYGA1UEAxMPMDEwLjAwMC4wMDAuMDIxAiA0QzRDQjVFRTlGRkZFQkZEMzFG
>>
>> OTNEMERCRjU2RjFGNzAMBggqhkiG9w0CBQUAoIHBMBIGCmCGSAGG+EUBCQIxBBMC
>>
>> MTkwGAYJKoZIhvcNAQkDMQsGCSqGSIb3DQEHATAcBgkqhkiG9w0BCQUxDxcNMTQw
>>
>> OTI5MTE0MTE3WjAfBgkqhkiG9w0BCQQxEgQQRAdYc3/0mIu36+n+4HjzcTAgBgpg
>>
>> hkgBhvhFAQkFMRIEEFgpmRCbIFZei2tsCn8+fx8wMAYKYIZIAYb4RQEJBzEiEyA0
>>
>> QzRDQjVFRTlGRkZFQkZEMzFGOTNEMERCRjU2RjFGNzANBgkqhkiG9w0BAQEFAASB
>>
>> gDXExABpVsRfVAK8yB3C2N1v89zLSygNgejlh6UtB2Dq8gXW1Qmb+d03PZQzmFbH
>>
>> eaJKV9+5pIsKchOedlsaAks2ZSHw9Pj8is9mIRYM5pADo1BoEcsszshV2G5DKDwm
>>
>> /oBmEEz/Lwysh4v4GyZwcQad/xYjCODUt83k3s18LWS+
>>
>> [29/Sep/2014:13:41:17][http-9180-1]: CRSEnrollment: CryptoContext:
>> token name: osstest'
>>
>> [29/Sep/2014:13:41:17][http-9180-1]: CRSEnrollment: CryptoContext:
>> mNickname: '*osstest:osstest*:caSigningCert cert-pki-testca1'
>>
>> [29/Sep/2014:13:41:17][http-9180-1]: handlePKIMessage exception
>>
com.netscape.cms.servlet.cert.scep.CRSEnrollment$CryptoContext$CryptoContextException:
>> Certificate not found: osstest:caSigningCert cert-pki-testca1
>>
>>
com.netscape.cms.servlet.cert.scep.CRSEnrollment$CryptoContext$CryptoContextException:
>> Certificate not found: osstest:caSigningCert cert-pki-testca1
>>
>> at
>>
com.netscape.cms.servlet.cert.scep.CRSEnrollment$CryptoContext.<init>(CRSEnrollment.java:2026)
>>
>> at
>>
com.netscape.cms.servlet.cert.scep.CRSEnrollment.handlePKIOperation(CRSEnrollment.java:803)
>>
>> at
>> com.netscape.cms.servlet.cert.scep.CRSEnrollment.service(CRSEnrollment.java:297)
>>
>> at javax.servlet.http.HttpServlet.service(HttpServlet.java:717)
>>
>> at
>>
org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:290)
>>
>> at
>>
org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206)
>>
>> at
>>
com.netscape.cms.servlet.filter.EERequestFilter.doFilter(EERequestFilter.java:176)
>>
>> at
>>
org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:235)
>>
>> at
>>
org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206)
>>
>> at
>>
org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:233)
>>
>> at
>>
org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:191)
>>
>> at
>> org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:127)
>>
>> at
>> org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:102)
>>
>> at
>>
org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:109)
>>
>> at
>> org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:298)
>>
>> at
>> org.apache.coyote.http11.Http11Processor.process(Http11Processor.java:857)
>>
>> at
>>
org.apache.coyote.http11.Http11Protocol$Http11ConnectionHandler.process(Http11Protocol.java:588)
>>
>> at
>> org.apache.tomcat.util.net.JIoEndpoint$Worker.run(JIoEndpoint.java:489)
>>
>> at java.lang.Thread.run(Thread.java:701)
>>
>> [29/Sep/2014:13:41:17][http-9180-1]: ServletException
>> javax.servlet.ServletException: Failed to process message in CEP
>> servlet: Certificate not found: osstest:caSigningCert cert-pki-testca1
>>
>> What stands out is the line with mNickname. After restarting the
>> service, with the first request, the HSM token name appears to be
>> listed twice in the *mNickname* string. Interestingly, with each new
>> request, the number of token names increases by one in the string.
>> i.e. with the 2^nd attempt, the same exception occurs but the token
>> name appears three times:
>>
>> [29/Sep/2014:13:41:17][http-9180-1]: CRSEnrollment: CryptoContext:
>> token name: osstest'
>>
>> [29/Sep/2014:13:41:17][http-9180-1]: CRSEnrollment: CryptoContext:
>> mNickname: '*osstest:osstest:osstest*:caSigningCert cert-pki-testca1'
>>
>> [29/Sep/2014:13:41:17][http-9180-1]: handlePKIMessage exception
>>
com.netscape.cms.servlet.cert.scep.CRSEnrollment$CryptoContext$CryptoContextException:
>> Certificate not found: osstest:caSigningCert cert-pki-testca1
>>
>>
com.netscape.cms.servlet.cert.scep.CRSEnrollment$CryptoContext$CryptoContextException:
>> Certificate not found: osstest:caSigningCert cert-pki-testca1
>>
>> at
>>
com.netscape.cms.servlet.cert.scep.CRSEnrollment$CryptoContext.<init>(CRSEnrollment.java:2026)
>>
>> at
>>
com.netscape.cms.servlet.cert.scep.CRSEnrollment.handlePKIOperation(CRSEnrollment.java:803)
>>
>> at
>> com.netscape.cms.servlet.cert.scep.CRSEnrollment.service(CRSEnrollment.java:297)
>>
>> at javax.servlet.http.HttpServlet.service(HttpServlet.java:717)
>>
>> at
>>
org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:290)
>>
>> at
>>
org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206)
>>
>> at
>>
com.netscape.cms.servlet.filter.EERequestFilter.doFilter(EERequestFilter.java:176)
>>
>> at
>>
org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:235)
>>
>> at
>>
org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206)
>>
>> at
>>
org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:233)
>>
>> at
>>
org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:191)
>>
>> at
>> org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:127)
>>
>> at
>> org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:102)
>>
>> at
>>
org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:109)
>>
>> at
>> org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:298)
>>
>> at
>> org.apache.coyote.http11.Http11Processor.process(Http11Processor.java:857)
>>
>> at
>>
org.apache.coyote.http11.Http11Protocol$Http11ConnectionHandler.process(Http11Protocol.java:588)
>>
>> at
>> org.apache.tomcat.util.net.JIoEndpoint$Worker.run(JIoEndpoint.java:489)
>>
>> at java.lang.Thread.run(Thread.java:701)
>>
>> [29/Sep/2014:13:41:17][http-9180-1]: ServletException
>> javax.servlet.ServletException: Failed to process message in CEP
>> servlet: Certificate not found: osstest:caSigningCert cert-pki-testca1
>>
>> As mentioned, the exception occurs with both versions 4 and 5 of
>> LunaSA. (We currently have RHEL5 systems with Dogtag 1.3 operating
>> with SCEP enrollment.) With local tokens, (no HSMs) the error does
>> not occur.
>>
>> Any Ideas, how we can track this down? We definitely need to get this
>> running.
>>
>> Best regards!
>>
>> William Elliott
>>
>> s IT Solutions
>>
>> Open System Services
>>
>> s IT Solutions AT Spardat GmbH
>>
>> A-1110 Wien, Geiselbergstraße 21 - 25
>>
>> Phone: +43 (0)5 0100 - 39376
>>
>> Fax: +43 (0)5 0100 9 - 39376
>>
>> Mobile: +43 (0)5 0100 6 - 39376
>>
>> _mailto:william.elliott at s-itsolutions.at
>> <mailto:william.elliott%20at%20s-itsolutions.at>_
>>
>>
www.s-itsolutions.com <
http://www.s-itsolutions.com/>
>>
>> Head Office: Vienna Commercial Register No.: 152289f Commercial Court
>> of Vienna
>>
>> This message and any attached files are confidential and intended
>> solely for the addressee(s). Any publication, transmission or other
>> use of the information by a person or entity other than the intended
>> addressee is prohibited. If you receive this in error please contact
>> the sender and delete the material. The sender does not accept
>> liability for any errors or omissions as a result of the transmission.
>>
>>
>>
>> _______________________________________________
>> Pki-users mailing list
>> Pki-users(a)redhat.com
>>
https://www.redhat.com/mailman/listinfo/pki-users
>
>
> _______________________________________________
> Pki-users mailing list
> Pki-users(a)redhat.com
>
https://www.redhat.com/mailman/listinfo/pki-users
_______________________________________________
Pki-users mailing list
Pki-users(a)redhat.com
https://www.redhat.com/mailman/listinfo/pki-users
_______________________________________________
Pki-users mailing list
Pki-users(a)redhat.com
https://www.redhat.com/mailman/listinfo/pki-users