Bug 1466486

Summary: CMC plugin default change
Product: Red Hat Enterprise Linux 7 Reporter: Christina Fu <cfu>
Component: pki-coreAssignee: Christina Fu <cfu>
Status: CLOSED ERRATA QA Contact: Asha Akkiangady <aakkiang>
Severity: urgent Docs Contact: Marc Muehlfeld <mmuehlfe>
Priority: urgent    
Version: 7.4CC: arubin, cfu, gkapoor, jmagne, mharmsen, msauton, salmy
Target Milestone: rcKeywords: ZStream
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: No Doc Update
Doc Text:
undefined
Story Points: ---
Clone Of:
: 1469432 (view as bug list) Environment:
Last Closed: 2018-04-10 17:00:07 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1469432    

Comment 11 Geetika Kapoor 2018-01-31 11:24:38 UTC
Earlier we test it using:
https://bugzilla.redhat.com/show_bug.cgi?id=1466486#c3

I think this is no more valid because we don't have fixed passphrase .
Please suggest if I need to look into something else in this bugzilla.

Comment 12 Geetika Kapoor 2018-01-31 19:01:37 UTC
A quick test is :

1. Enable identityproofv2.
2. set witness.sharedsecret=testing
This is the old one which doesn't resembles to the original passphrase value set during CMCSharedToken cli.
3. Run CMCRequest and the httpclient.
4. Check the debug logs:

[31/Jan/2018:13:49:26][http-bio-20443-exec-16]: SharedSecret.getSharedToken(String identification):  got entryShrTok
[31/Jan/2018:13:49:26][http-bio-20443-exec-16]: SharedSecret.decryptShrTokData: wrapped session key retrieved
[31/Jan/2018:13:49:26][http-bio-20443-exec-16]: SharedSecret.decryptShrTokData: wrapped passphrase retrieved
[31/Jan/2018:13:49:26][http-bio-20443-exec-16]: SharedSecret.getSharedToken(String identification): returning
[31/Jan/2018:13:49:26][http-bio-20443-exec-16]: returnConn: mNumConns now 5
[31/Jan/2018:13:49:26][http-bio-20443-exec-16]: EnrollProfile:verifyDigest: in verifyDigest: hashAlg=SHA-512 Message Digest from Mozilla-JSS, <initialized>
; macAlg=SHA-512 Message Digest from Mozilla-JSS, <initialized>

[31/Jan/2018:13:49:26][http-bio-20443-exec-16]: EnrollProfile:verifyDigest:  The content of two HMAC digest are not the same.
[31/Jan/2018:13:49:26][http-bio-20443-exec-16]: EnrollProfile:verifyIdentityProofV2: IdentityProofV2 failed to verify
[31/Jan/2018:13:49:26][http-bio-20443-exec-16]: EnrollProfile:verifyIdentityProofV2:  Failed with Exception: IdentityProofV2 failed to verify
[31/Jan/2018:13:49:26][http-bio-20443-exec-16]: SignedAuditLogger: event CMC_PROOF_OF_IDENTIFICATION
[31/Jan/2018:13:49:26][http-bio-20443-exec-16]: EnrollProfile: parseCMC:  after verifyIdentityProofV2
[31/Jan/2018:13:49:26][http-bio-20443-exec-16]: ProfileSubmitCMCServlet: after createRequests - Proof-of-Identification Verification Failed after verifyIdentityProofV2

5. Result :

During Identity proof verification it failed.

6. For a correct value of witness, output looks like:

[31/Jan/2018:13:50:45][http-bio-20443-exec-22]: EnrollProfile:verifyIdentityProofV2: identity verified. Updating auditSubjectID
[31/Jan/2018:13:50:45][http-bio-20443-exec-22]: EnrollProfile:verifyIdentityProofV2: updated auditSubjectID is:user2@#$%
[31/Jan/2018:13:50:45][http-bio-20443-exec-22]: SignedAuditLogger: event CMC_PROOF_OF_IDENTIFICATION
[31/Jan/2018:13:50:45][http-bio-20443-exec-22]: EnrollProfile: parseCMC: passed verifyIdentityProofV2; Proof of Identity successful;
[31/Jan/2018:13:50:45][http-bio-20443-exec-22]: EnrollProfile: parseCMC: found numOfOtherMsgs: 0

Comment 15 errata-xmlrpc 2018-04-10 17:00:07 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2018:0925