Bug 1325798
Summary: | pki-tools in RHEL7 repo doesn't allow RHCS cert signing | ||||||
---|---|---|---|---|---|---|---|
Product: | Red Hat Enterprise Linux 7 | Reporter: | Jakub Samuel Paulovic <jpaulovi> | ||||
Component: | pki-core | Assignee: | Matthew Harmsen <mharmsen> | ||||
Status: | CLOSED ERRATA | QA Contact: | Asha Akkiangady <aakkiang> | ||||
Severity: | high | Docs Contact: | |||||
Priority: | unspecified | ||||||
Version: | 7.2 | CC: | alee, cfu, edewata, gkapoor, jmagne, nkinder | ||||
Target Milestone: | rc | ||||||
Target Release: | 7.3 | ||||||
Hardware: | x86_64 | ||||||
OS: | Linux | ||||||
Whiteboard: | |||||||
Fixed In Version: | pki-core-10.3.1-1.el7 | Doc Type: | Bug Fix | ||||
Doc Text: | Story Points: | --- | |||||
Clone Of: | Environment: | ||||||
Last Closed: | 2016-11-04 05:23:53 UTC | Type: | Bug | ||||
Regression: | --- | Mount Type: | --- | ||||
Documentation: | --- | CRM: | |||||
Verified Versions: | Category: | --- | |||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
Cloudforms Team: | --- | Target Upstream Version: | |||||
Embargoed: | |||||||
Attachments: |
|
Description
Jakub Samuel Paulovic
2016-04-11 08:45:42 UTC
Changed back to POST per CS Bug Triage of 04/19/2016. Setup: ------ 1. Create template of existing profile. pki -v -d /opt/rhqa_pki/certdb -c Secret123 -h pki1.example.com -p 20080 cert-request-profile-show caDirUserCert --output user1.xml pki -d /opt/rhqa_pki/certdb -c Secret123 -h pki1.example.com -p 20080 cert-request-profile-show caUserCert --output user.xml 2. Create key/csr request. openssl genrsa 4096 > test.key openssl req -new -key test.key -out test.csr 3. Include below mentioned fiels in the templates of profile i.e user.xml and user1.xml (Attached copy of both xml for future use) user.xml: cert_request_type = pkcs10 cert_request = your copied CSR output subject = User1.xml: cert_request_type = pkcs10 cert_request = your copied CSR output sn_cert_name = the custom name that got you into this mess to begin with 4. Create ldap users so that it can be verified using username/password. dn: uid=ldapuser2,ou=people,dc=example,dc=org objectClass: top objectClass: person objectClass: organizationalPerson objectClass: inetOrgPerson uid:ldapuser2 cn: Test User sn: User givenName: Test userPassword: Secret123%_test 5. Edit ca CS.cfg. Stop the CA seive first using systemctl stop pki-tomcatd -- Edit below entries in CS.cfg auths.instance.UserDirEnrollment.ldap.basedn=dc=example,dc=org auths.instance.UserDirEnrollment.ldap.ldapauth.authtype=BasicAuth auths.instance.UserDirEnrollment.ldap.ldapauth.bindDN=cn=Directory Manager auths.instance.UserDirEnrollment.ldap.ldapauth.bindPWPrompt=internaldb auths.instance.UserDirEnrollment.ldap.ldapconn.host=pki1.example.com auths.instance.UserDirEnrollment.ldap.ldapconn.port=3389 auths.instance.UserDirEnrollment.ldap.ldapconn.secureConn=false auths.instance.UserDirEnrollment.pluginName=UidPwdDirAuth -- start CA service .systemctl start pki-tomcatd 6. output should say : Valid Ldap entry: ----------------- pki -d /opt/rhqa_pki/certdb -c Secret123 -h pki1.example.com -p 20080 cert-request-submit user1.xml --username ldapuser2 --password Secret123_test Password: ----------------------------- Submitted certificate request ----------------------------- Request ID: 79 Type: enrollment Request Status: complete Operation Result: success Certificate ID: 0x43 Test Case 1: For valid ldapuser entry ------------- [root@pki1 test_dir]# pki -d /opt/rhqa_pki/certdb -c Secret123 -h pki1.example.com -p 20080 cert-request-submit user1.xml --username ldapuser2 --password Secret123_test Password: ----------------------------- Submitted certificate request ----------------------------- Request ID: 79 Type: enrollment Request Status: complete Operation Result: success Certificate ID: 0x43 Test Case 2: Invalid ldap user entry ------------ [root@pki1 test_dir]# pki -d /opt/rhqa_pki/certdb -c Secret123 -h pki1.example.com -p 20080 cert-request-submit user1.xml --username ldapuser2 --password Secret123_testt Password: UnauthorizedException: Invalid Credential Test Case 3: Remove LDAP setting added in step 5. Make sure no more authentication happens now. ----------- pki -d /opt/rhqa_pki/certdb -c Secret123 -h pki1.example.com -p 20080 cert-request-submit user1.xml --username ldapuser2 --password Secret123_testt Password: PKIException: Property auths.instance.UserDirEnrollment.ldap.ldapconn.host missing value Test Case 4: Lif LDAP instance is not reachable/down ------------ pki -d /opt/rhqa_pki/certdb -c Secret123 -h pki1.example.com -p 20080 cert-request-submit user1.xml --username ldapuser2 --password Secret123_testt Password: PKIException: Could not connect to LDAP server host pki1.example.com port 389 Error netscape.ldap.LDAPException: failed to connect to server ldap://pki1.example.com:389 (91) Reference: https://mojo.redhat.com/docs/DOC-959077 http://pki.fedoraproject.org/wiki/Directory-Authenticated_Profiles Created attachment 1182446 [details]
Xml_files
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://rhn.redhat.com/errata/RHBA-2016-2396.html |