Bug 1883639
| Summary: | Add KRA Transport and Storage Certificates profiles, audit for IPA | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux 7 | Reporter: | Dinesh Prasanth <dmoluguw> |
| Component: | pki-core | Assignee: | RHCS Maintainers <rhcs-maint> |
| Status: | CLOSED ERRATA | QA Contact: | PKI QE <bugzilla-pkiqe> |
| Severity: | unspecified | Docs Contact: | |
| Priority: | unspecified | ||
| Version: | 7.9 | CC: | aakkiang, abokovoy, alee, bugzilla-pkiqe, cfu, contribs, cpinjani, edewata, extras-qa, frenaud, ipa-maint, jhrozek, mharmsen, mhjacks, mkosek, pvoborni, rcritten, rhcs-maint, skhandel, ssorce, twoerner, wdh |
| Target Milestone: | rc | Keywords: | TestCaseProvided, Triaged |
| Target Release: | 7.9 | ||
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | |||
| Fixed In Version: | pki-core-10.5.18-11.el7_9 | Doc Type: | If docs needed, set a value |
| Doc Text: | Story Points: | --- | |
| Clone Of: | 1875563 | Environment: | |
| Last Closed: | 2021-03-16 13:48:22 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 1869605, 1875563 | ||
| Bug Blocks: | 1872603, 1872604 | ||
|
Description
Dinesh Prasanth
2020-09-29 18:37:00 UTC
commit 73efcea0c74eb4882c003a7fe6cef21fa7627363 (HEAD -> DOGTAG_10_5_BRANCH, origin/DOGTAG_10_5_BRANCH)
Author: Christina Fu <cfu>
Date: Tue Oct 13 16:19:06 2020 -0700
Bug1883639-add profile caAuditSigningCert
Existing profiiles caStorageCert.cfg and caTransportCert.cfg
should be used for KRA.
a caAuditSigningCert profile is added, although I find
a misleading profile named caSignedLogCert.cfg that was intended for
the use. I disabled caSignedLogCert.cfg instead.
I also removed the SHA1 algorithms from all the *storage* and *audit*
profiles while I'm at it.
The upgrade scripts only adds the new profile caAuditSigningCert. It
does not modify existing profiles or remove those two IPA specific
ones.
fixes https://bugzilla.redhat.com/show_bug.cgi?id=1883639
Test procedure for RHCS QE: There are two things to test. One being that the upgrade scripts work - this could be achieved by upgrading the rpms, and restart a previously installed instance, then observe that the new caAuditSigningCert.cfg profiles show up under /var/lib/pki/<instance>/ca/profiles/ca/ The other being that the profile actually work; Here is the minimum test I did on the RHCS side (feel free to improve upon or automate it): I generated a PKCS#10 request. e.g. PKCS10Client -d . -p netscape -n "CN=Audit Signing Certificate,OU=testUpgrade,O=ladycfu-caRSA072820" -l 2048 -o sys_auditSigning_pkcs10_upgrade.req On browser, I went to EE portal select the Manual Audit Signing cert profile and pasted the request into each profile and submit. The request should be created successfully. As a CA agent, approve the request, andthe cert should be issued successfully. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Important: pki-core security and bug fix update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2021:0851 |