Bug 891985
Summary: | Increase FreeIPA root CA validity | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 6 | Reporter: | Nathan Kinder <nkinder> |
Component: | pki-core | Assignee: | Matthew Harmsen <mharmsen> |
Status: | CLOSED ERRATA | QA Contact: | Asha Akkiangady <aakkiang> |
Severity: | unspecified | Docs Contact: | |
Priority: | medium | ||
Version: | 6.4 | CC: | alee, jgalipea, nsoman, tlavigne |
Target Milestone: | rc | ||
Target Release: | --- | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | pki-core-9.0.3-29.el6 | Doc Type: | Enhancement |
Doc Text: |
* As requested by FreeIPA, increased the default root CA validity period from eight years to twenty years. (BZ#891985)
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2013-02-21 10:06:15 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | |||
Bug Blocks: | 895654 |
Description
Nathan Kinder
2013-01-04 17:50:43 UTC
pushed to IPA_v2_RHEL_6_ERRATA_BRANCH: To ssh://vakwetu.org/git/pki.git aca889d..1596bcd IPA_v2_RHEL_6_ERRATA_BRANCH -> IPA_v2_RHEL_6_ERRATA_BRANCH verified :: ]# openssl x509 -text -noout -in /etc/ipa/ca.crt Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: sha256WithRSAEncryption Issuer: O=TESTRELM.COM, CN=Certificate Authority Validity Not Before: Jan 28 03:16:52 2013 GMT Not After : Jan 28 03:16:52 2033 GMT Subject: O=TESTRELM.COM, CN=Certificate Authority Subject Public Key Info: Public Key Algorithm: rsaEncryption Public-Key: (2048 bit) Modulus: 00:e9:9b:35:26:c9:20:17:64:00:e5:ad:ee:cc:15: 51:ca:b4:b6:f4:50:66:b6:14:d8:36:fd:3d:cf:14: c3:cd:2b:d4:7d:de:30:bd:fe:54:21:29:37:55:3f: 77:c4:eb:d0:a3:5b:aa:34:c1:b5:06:a2:89:9b:d0: 50:4b:b7:fc:65:04:a8:6e:75:81:7c:90:f2:3e:5f: 0e:23:34:5d:41:63:fe:95:fa:7d:6c:86:14:eb:f8: 90:ab:2a:7d:97:0f:cb:2c:38:79:41:a7:e0:a6:02: f5:e5:8c:18:a1:ca:5c:c0:2a:a7:51:67:a2:1e:25: 22:88:79:4c:4d:ba:c8:4d:5a:07:50:f0:75:9d:4f: 08:ab:57:46:ad:e2:db:7f:0c:88:74:01:dd:91:d5: 92:eb:f6:26:94:fb:11:54:2f:12:77:36:da:28:23: 17:03:23:2d:16:a2:5a:c5:e9:4b:1b:04:1e:e0:1a: 6d:f7:95:24:4e:33:0a:84:56:c1:c1:0a:4c:b8:c8: b3:be:86:84:b5:5f:9b:82:18:92:d2:53:1c:15:94: 9f:0b:8e:38:60:c4:01:e2:cc:d5:39:26:7e:22:9d: 5d:f7:29:05:1e:04:c3:a9:c2:95:08:5a:ae:79:50: d9:9d:b4:33:21:f9:07:8c:c8:d8:31:cf:f6:2e:66: fa:63 Exponent: 65537 (0x10001) X509v3 extensions: X509v3 Authority Key Identifier: keyid:17:98:CA:67:60:2B:83:7A:1B:A9:AD:C2:EF:FE:A1:E6:2B:4C:8D:70 X509v3 Basic Constraints: critical CA:TRUE X509v3 Key Usage: critical Digital Signature, Non Repudiation, Certificate Sign, CRL Sign X509v3 Subject Key Identifier: 17:98:CA:67:60:2B:83:7A:1B:A9:AD:C2:EF:FE:A1:E6:2B:4C:8D:70 Authority Information Access: OCSP - URI:http://cloud-qe-12.testrelm.com:80/ca/ocsp Signature Algorithm: sha256WithRSAEncryption a8:3f:f3:93:49:80:80:fd:11:cc:13:59:23:4a:c0:cf:5c:5a: f2:03:0b:f4:37:c3:1e:88:e2:d6:ad:2d:96:6b:98:c5:17:bf: 85:19:89:6e:41:e1:6b:57:8b:19:e2:1d:d4:bf:72:47:27:5f: c7:d6:9e:3d:10:b8:f8:7e:1b:cb:5e:32:cf:48:f3:31:fc:9f: 12:e4:48:c2:27:09:c3:2a:27:b8:8e:7b:bb:b5:92:6c:aa:93: 01:6a:8a:86:05:ce:58:f5:f2:e6:c7:d4:c0:ad:5d:b3:97:b5: c7:75:4a:81:3b:88:ac:35:c4:c4:59:6b:d7:6f:38:51:66:34: 6c:c5:8b:79:e2:fd:68:ae:98:08:c3:9c:3a:c3:cc:3b:fb:bf: 5f:da:61:59:c0:bd:89:6f:e6:10:84:4d:76:27:20:d3:fe:db: e1:45:d9:fc:3e:bd:19:00:df:42:6a:3e:48:ee:2d:64:e4:d1: 17:eb:53:ee:e0:fb:1b:3b:aa:a6:70:f8:8c:59:8c:19:85:10: ae:15:fb:5e:c7:0e:3a:f7:c4:7d:4d:62:6d:50:0d:5b:f2:75: 2a:6d:40:2e:06:86:3b:55:16:3a:21:20:40:07:b8:62:d3:55: 9d:7a:1a:3b:e5:ae:ca:1c:5c:66:b5:76:fd:e8:d1:40:f8:c1: 85:e3:fb:c3 <snip> Validity Not Before: Jan 28 03:16:52 2013 GMT Not After : Jan 28 03:16:52 2033 GMT </snip> Now valid for 20 years version :: ipa-server-3.0.0-24.el6.x86_64 pki-ca-9.0.3-30.el6.noarch Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. http://rhn.redhat.com/errata/RHSA-2013-0511.html |