Hide Forgot
This bug has been copied from bug #1378277 and has been proposed to be backported to 7.3 z-stream (EUS).
Steps to verify: 1) Install with externally-signed CA. The CA subject DN MUST use an ASN.1 string encoding other than UTF8String, e.g. PrintableString. 2) Restart the server multiple times. Ensure that no new authority entries get added upon server restart. i.e. ``GET /ca/rest/authorities`` must return a single authority object.
Hello Fraser, Could you please elaborate how this fix effect the functionality and how it effects end users so that we can test it better. Also, what are the test areas that we need to cover as part of sanity and regression. Thanks Geetika
Hi Geetika, The impact of this bug is that a new lightweight CA entry for the main CA (a.k.a. "host authority") gets added every time Dogtag starts. The bug occurs when the Subject DN of the main CA's certificate does not use UTF8String encoding, e.g. PrintableString. Therefore, to test/verify the fix it is necessary to have an externally signed CA that creates a certificate with, e.g. PrintableString encoding of Subject DN attribute values. To confirm the fix, the only area you need to test is the lightweight CA API, namely ``GET /ca/rest/authorities''. There should be one entry for the "host authority", even after restart. Hope that helps. Fraser
Hello Fraser, Do you think this much testing is fine or do i need to cover some more test cases? UI :: <collection><authority isHostAuthority="true" id="b9156055-1cc1-4a08-8926-c4d2297b90f0" issuerDN="CN=External CA,O=EXTERNAL" serial="13112" dn="CN=CA Signing Certificate,OU=Test_ExternalCA1,O=EXAMPLE" enabled="true" description="Host authority" ready="true"/></collection> Test Case 1: Without restart ============================= curl --silent -v -k --header "Accept: application/x-pem-file" https://hostname:28142/ca/rest/authorities/b9156055-1cc1-4a08-8926-c4d2297b90f0/chain | openssl pkcs7 -text * About to connect() to hostname port 28142 (#0) * Trying 10.8.60.26... * Connected to hostname (10.8.60.26) port 28142 (#0) * Initializing NSS with certpath: sql:/tmp/test * skipping SSL peer certificate verification * NSS: client certificate not found (nickname not specified) * SSL connection using TLS_RSA_WITH_AES_256_CBC_SHA * Server certificate: * subject: CN=hostname,OU=Test_ExternalCA1,O=EXAMPLE * start date: Nov 14 16:21:01 2016 GMT * expire date: Feb 14 16:19:05 2017 GMT * common name: hostname * issuer: CN=CA Signing Certificate,OU=Test_ExternalCA1,O=EXAMPLE > GET /ca/rest/authorities/b9156055-1cc1-4a08-8926-c4d2297b90f0/chain HTTP/1.1 > User-Agent: curl/7.29.0 > Host: hostname:28142 > Accept: application/x-pem-file > < HTTP/1.1 200 OK < Server: Apache-Coyote/1.1 < Cache-Control: private < Expires: Wed, 31 Dec 1969 19:00:00 EST < Content-Type: application/x-pem-file < Content-Length: 2270 < Date: Mon, 14 Nov 2016 16:50:08 GMT < { [data not shown] * Connection #0 to host hostname left intact -----BEGIN PKCS7----- MIIGTgYJKoZIhvcNAQcCoIIGPzCCBjsCAQExADAPBgkqhkiG9w0BBwGgAgQAoIIG HzCCAwEwggHpoAMCAQICAgKYMA0GCSqGSIb3DQEBCwUAMCkxETAPBgNVBAoTCEVY VEVSTkFMMRQwEgYDVQQDEwtFeHRlcm5hbCBDQTAeFw0xNjExMTQxNjE5MDVaFw0x NzAyMTQxNjE5MDVaMCkxETAPBgNVBAoTCEVYVEVSTkFMMRQwEgYDVQQDEwtFeHRl cm5hbCBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAJ3Njoaa7giF fVT881pTOmHfvrexfI5EoR6xUz2G74wAWnXGjIbw2QHFzF6uS3aR2DZjlyQt+3Dn 05eg0wXPnAOz3Lf6mP04k2pfzdVkDCOym/VHm+WGztzkjo00+giYhJtKZK3Wp1nJ 96uP9gmR0xOPUMtOwXCxb8AO7h4qea+gZ0zvOgJAsn2+kFF2GW+xAY5DaAgMnwdX bxpg15oSQ5pC2f5GIHILFkijMyK31s1k4KwiD90jq0eP2QNoKsvds0sYiIkl2WJr nIyMnlxVv0STcpiCmSkAsJaWb+vjXZDF/Z+0UU5v1xhhFfkccAeJgw223rwkaAQM VbyXbzTU8+ECAwEAAaMzMDEwEQYJYIZIAYb4QgEBBAQDAgAHMA8GA1UdEwEB/wQF MAMBAf8wCwYDVR0PBAQDAgIEMA0GCSqGSIb3DQEBCwUAA4IBAQBhT21Byf3iQmsC E3CSwW6likYvEyN0OFMzdy8YTXcd0OhG9DpkwWme4LOygCFe6+OYS7r7/uXUGfB8 ZoTE/iQ79C3dblG8866hKM7izZ56/Z6Sxj+7zAs8wEDajUuVbAqJDSk2+BBx4f3A mk4Yk+EuRMFG52ZFMJJrB8ZXCdYklRQUA1Kc4++Mkn+8Dj0vLHfSTrZNwrlWT7Ku 4pWPIDLRIaLcKQJDfn8GMcQHe+Qfb8rGLxgha/hTnZkj/m6pRtRi1Ccz2W5f8Q8A 7ZnYQKHbPEzDdDaCpUkgzMjYx5ppArfcqFBZkZY5gQ32lyNcy+/w7plXMPZxqhps ooT/7HVbMIIDFjCCAf6gAwIBAgICMzgwDQYJKoZIhvcNAQELBQAwKTERMA8GA1UE ChMIRVhURVJOQUwxFDASBgNVBAMTC0V4dGVybmFsIENBMB4XDTE2MTExNDE2MTkw NVoXDTE3MDIxNDE2MTkwNVowTjEQMA4GA1UEChMHRVhBTVBMRTEZMBcGA1UECwwQ VGVzdF9FeHRlcm5hbENBMTEfMB0GA1UEAxMWQ0EgU2lnbmluZyBDZXJ0aWZpY2F0 ZTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAK1HTrHa6mILsNuJV3CB dW15PjmUWf80Ez2TAJaO/BcCwHK7YWEiUUrk+Ev2a0zhhw2B8Lp5LJGHEjTp37Iw Llfzkh3FEcIBoW1GV2ajIJQwSjaya8QTjoI2dMgW0szY6lLZrsrx7KVl0V9woe4Y O9AO5Uge7Ry+LlCQAS47l9lQB5ns4Nl8I/nPF3doHDreSidQ4rdVDFQ2bilt+ah1 puLJO/C1/vnTIZcq9nFAdelnA8bx8/kOLkFU3oLnh4KN4FdpCckzCpD+wreNhRxB lEFg/gWN/q0ioHk01ydqt9BCl9vuWA8uGO7qFqRZn3/Inxjdk92pfJ6PDBCcioSL OL8CAwEAAaMjMCEwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAcYwDQYJ KoZIhvcNAQELBQADggEBACA3HssAf1xo2LOXVBwiXiPDkwItqalV62Uv+LCDnLy2 XuWV5wP8Mg3lM2Rb49pq53+ODQRYgjvh8fq/nxz5l0ErkCy1pTpyUXlEr4GgV/zi QPzfqCTJhAn5V3NhXaV5rm2yoGkAFVOidKmIF3Ko6moleWWDSC2sYDv+bQ88GOqM 6sPuBFKKXS7Ohb7xPjR9qtYi8Y847S150ogD2DjIDFGg6V6gcF9JIDp+PfEF3PQq pHrgY7EUJ0qnBZ0jZc6aLb+nO68H4Ja3cgdXZfUkMk2HDr6nJme3KNBDUPgcOQMW UlU1Bhfyx/x/RvNjDlFZ16yQ1KRXAuDRTReIzXAK2mUxAA== -----END PKCS7----- Test Case 2: After ExternalCA installation, we restarted the instance ===================================================================== root@nocp30 externalCA # systemctl restart pki-tomcatd root@nocp30 externalCA # curl --silent -v -k --header "Accept: application/x-pem-file" https://hostname:28142/ca/rest/authorities/b9156055-1cc1-4a08-8926-c4d2297b90f0/chain | openssl pkcs7 -text * About to connect() to hostname port 28142 (#0) * Trying 10.8.60.26... * Connected to hostname (10.8.60.26) port 28142 (#0) * Initializing NSS with certpath: sql:/tmp/test * skipping SSL peer certificate verification * NSS: client certificate not found (nickname not specified) * SSL connection using TLS_RSA_WITH_AES_256_CBC_SHA * Server certificate: * subject: CN=hostname,OU=Test_ExternalCA1,O=EXAMPLE * start date: Nov 14 16:21:01 2016 GMT * expire date: Feb 14 16:19:05 2017 GMT * common name: hostname * issuer: CN=CA Signing Certificate,OU=Test_ExternalCA1,O=EXAMPLE > GET /ca/rest/authorities/b9156055-1cc1-4a08-8926-c4d2297b90f0/chain HTTP/1.1 > User-Agent: curl/7.29.0 > Host: hostname:28142 > Accept: application/x-pem-file > < HTTP/1.1 200 OK < Server: Apache-Coyote/1.1 < Cache-Control: private < Expires: Wed, 31 Dec 1969 19:00:00 EST < Content-Type: application/x-pem-file < Content-Length: 2270 < Date: Mon, 14 Nov 2016 16:52:36 GMT < { [data not shown] * Connection #0 to host hostname left intact -----BEGIN PKCS7----- MIIGTgYJKoZIhvcNAQcCoIIGPzCCBjsCAQExADAPBgkqhkiG9w0BBwGgAgQAoIIG HzCCAwEwggHpoAMCAQICAgKYMA0GCSqGSIb3DQEBCwUAMCkxETAPBgNVBAoTCEVY VEVSTkFMMRQwEgYDVQQDEwtFeHRlcm5hbCBDQTAeFw0xNjExMTQxNjE5MDVaFw0x NzAyMTQxNjE5MDVaMCkxETAPBgNVBAoTCEVYVEVSTkFMMRQwEgYDVQQDEwtFeHRl cm5hbCBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAJ3Njoaa7giF fVT881pTOmHfvrexfI5EoR6xUz2G74wAWnXGjIbw2QHFzF6uS3aR2DZjlyQt+3Dn 05eg0wXPnAOz3Lf6mP04k2pfzdVkDCOym/VHm+WGztzkjo00+giYhJtKZK3Wp1nJ 96uP9gmR0xOPUMtOwXCxb8AO7h4qea+gZ0zvOgJAsn2+kFF2GW+xAY5DaAgMnwdX bxpg15oSQ5pC2f5GIHILFkijMyK31s1k4KwiD90jq0eP2QNoKsvds0sYiIkl2WJr nIyMnlxVv0STcpiCmSkAsJaWb+vjXZDF/Z+0UU5v1xhhFfkccAeJgw223rwkaAQM VbyXbzTU8+ECAwEAAaMzMDEwEQYJYIZIAYb4QgEBBAQDAgAHMA8GA1UdEwEB/wQF MAMBAf8wCwYDVR0PBAQDAgIEMA0GCSqGSIb3DQEBCwUAA4IBAQBhT21Byf3iQmsC E3CSwW6likYvEyN0OFMzdy8YTXcd0OhG9DpkwWme4LOygCFe6+OYS7r7/uXUGfB8 ZoTE/iQ79C3dblG8866hKM7izZ56/Z6Sxj+7zAs8wEDajUuVbAqJDSk2+BBx4f3A mk4Yk+EuRMFG52ZFMJJrB8ZXCdYklRQUA1Kc4++Mkn+8Dj0vLHfSTrZNwrlWT7Ku 4pWPIDLRIaLcKQJDfn8GMcQHe+Qfb8rGLxgha/hTnZkj/m6pRtRi1Ccz2W5f8Q8A 7ZnYQKHbPEzDdDaCpUkgzMjYx5ppArfcqFBZkZY5gQ32lyNcy+/w7plXMPZxqhps ooT/7HVbMIIDFjCCAf6gAwIBAgICMzgwDQYJKoZIhvcNAQELBQAwKTERMA8GA1UE ChMIRVhURVJOQUwxFDASBgNVBAMTC0V4dGVybmFsIENBMB4XDTE2MTExNDE2MTkw NVoXDTE3MDIxNDE2MTkwNVowTjEQMA4GA1UEChMHRVhBTVBMRTEZMBcGA1UECwwQ VGVzdF9FeHRlcm5hbENBMTEfMB0GA1UEAxMWQ0EgU2lnbmluZyBDZXJ0aWZpY2F0 ZTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAK1HTrHa6mILsNuJV3CB dW15PjmUWf80Ez2TAJaO/BcCwHK7YWEiUUrk+Ev2a0zhhw2B8Lp5LJGHEjTp37Iw Llfzkh3FEcIBoW1GV2ajIJQwSjaya8QTjoI2dMgW0szY6lLZrsrx7KVl0V9woe4Y O9AO5Uge7Ry+LlCQAS47l9lQB5ns4Nl8I/nPF3doHDreSidQ4rdVDFQ2bilt+ah1 puLJO/C1/vnTIZcq9nFAdelnA8bx8/kOLkFU3oLnh4KN4FdpCckzCpD+wreNhRxB lEFg/gWN/q0ioHk01ydqt9BCl9vuWA8uGO7qFqRZn3/Inxjdk92pfJ6PDBCcioSL OL8CAwEAAaMjMCEwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAcYwDQYJ KoZIhvcNAQELBQADggEBACA3HssAf1xo2LOXVBwiXiPDkwItqalV62Uv+LCDnLy2 XuWV5wP8Mg3lM2Rb49pq53+ODQRYgjvh8fq/nxz5l0ErkCy1pTpyUXlEr4GgV/zi QPzfqCTJhAn5V3NhXaV5rm2yoGkAFVOidKmIF3Ko6moleWWDSC2sYDv+bQ88GOqM 6sPuBFKKXS7Ohb7xPjR9qtYi8Y847S150ogD2DjIDFGg6V6gcF9JIDp+PfEF3PQq pHrgY7EUJ0qnBZ0jZc6aLb+nO68H4Ja3cgdXZfUkMk2HDr6nJme3KNBDUPgcOQMW UlU1Bhfyx/x/RvNjDlFZ16yQ1KRXAuDRTReIzXAK2mUxAA== -----END PKCS7----- Test Case 3: Stop / start the instance. ====================================== curl --silent -v -k --header "Accept: application/x-pem-file" https://hostname:28142/ca/rest/authorities/b9156055-1cc1-4a08-8926-c4d2297b90f0/chain | openssl pkcs7 -text * About to connect() to hostname port 28142 (#0) * Trying 10.8.60.26... * Connected to hostname (10.8.60.26) port 28142 (#0) * Initializing NSS with certpath: sql:/tmp/test * skipping SSL peer certificate verification * NSS: client certificate not found (nickname not specified) * SSL connection using TLS_RSA_WITH_AES_256_CBC_SHA * Server certificate: * subject: CN=hostname,OU=Test_ExternalCA1,O=EXAMPLE * start date: Nov 14 16:21:01 2016 GMT * expire date: Feb 14 16:19:05 2017 GMT * common name: hostname * issuer: CN=CA Signing Certificate,OU=Test_ExternalCA1,O=EXAMPLE > GET /ca/rest/authorities/b9156055-1cc1-4a08-8926-c4d2297b90f0/chain HTTP/1.1 > User-Agent: curl/7.29.0 > Host: hostname:28142 > Accept: application/x-pem-file > < HTTP/1.1 200 OK < Server: Apache-Coyote/1.1 < Cache-Control: private < Expires: Wed, 31 Dec 1969 19:00:00 EST < Content-Type: application/x-pem-file < Content-Length: 2270 < Date: Mon, 14 Nov 2016 16:54:38 GMT < { [data not shown] * Connection #0 to host hostname left intact -----BEGIN PKCS7----- MIIGTgYJKoZIhvcNAQcCoIIGPzCCBjsCAQExADAPBgkqhkiG9w0BBwGgAgQAoIIG HzCCAwEwggHpoAMCAQICAgKYMA0GCSqGSIb3DQEBCwUAMCkxETAPBgNVBAoTCEVY VEVSTkFMMRQwEgYDVQQDEwtFeHRlcm5hbCBDQTAeFw0xNjExMTQxNjE5MDVaFw0x NzAyMTQxNjE5MDVaMCkxETAPBgNVBAoTCEVYVEVSTkFMMRQwEgYDVQQDEwtFeHRl cm5hbCBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAJ3Njoaa7giF fVT881pTOmHfvrexfI5EoR6xUz2G74wAWnXGjIbw2QHFzF6uS3aR2DZjlyQt+3Dn 05eg0wXPnAOz3Lf6mP04k2pfzdVkDCOym/VHm+WGztzkjo00+giYhJtKZK3Wp1nJ 96uP9gmR0xOPUMtOwXCxb8AO7h4qea+gZ0zvOgJAsn2+kFF2GW+xAY5DaAgMnwdX bxpg15oSQ5pC2f5GIHILFkijMyK31s1k4KwiD90jq0eP2QNoKsvds0sYiIkl2WJr nIyMnlxVv0STcpiCmSkAsJaWb+vjXZDF/Z+0UU5v1xhhFfkccAeJgw223rwkaAQM VbyXbzTU8+ECAwEAAaMzMDEwEQYJYIZIAYb4QgEBBAQDAgAHMA8GA1UdEwEB/wQF MAMBAf8wCwYDVR0PBAQDAgIEMA0GCSqGSIb3DQEBCwUAA4IBAQBhT21Byf3iQmsC E3CSwW6likYvEyN0OFMzdy8YTXcd0OhG9DpkwWme4LOygCFe6+OYS7r7/uXUGfB8 ZoTE/iQ79C3dblG8866hKM7izZ56/Z6Sxj+7zAs8wEDajUuVbAqJDSk2+BBx4f3A mk4Yk+EuRMFG52ZFMJJrB8ZXCdYklRQUA1Kc4++Mkn+8Dj0vLHfSTrZNwrlWT7Ku 4pWPIDLRIaLcKQJDfn8GMcQHe+Qfb8rGLxgha/hTnZkj/m6pRtRi1Ccz2W5f8Q8A 7ZnYQKHbPEzDdDaCpUkgzMjYx5ppArfcqFBZkZY5gQ32lyNcy+/w7plXMPZxqhps ooT/7HVbMIIDFjCCAf6gAwIBAgICMzgwDQYJKoZIhvcNAQELBQAwKTERMA8GA1UE ChMIRVhURVJOQUwxFDASBgNVBAMTC0V4dGVybmFsIENBMB4XDTE2MTExNDE2MTkw NVoXDTE3MDIxNDE2MTkwNVowTjEQMA4GA1UEChMHRVhBTVBMRTEZMBcGA1UECwwQ VGVzdF9FeHRlcm5hbENBMTEfMB0GA1UEAxMWQ0EgU2lnbmluZyBDZXJ0aWZpY2F0 ZTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAK1HTrHa6mILsNuJV3CB dW15PjmUWf80Ez2TAJaO/BcCwHK7YWEiUUrk+Ev2a0zhhw2B8Lp5LJGHEjTp37Iw Llfzkh3FEcIBoW1GV2ajIJQwSjaya8QTjoI2dMgW0szY6lLZrsrx7KVl0V9woe4Y O9AO5Uge7Ry+LlCQAS47l9lQB5ns4Nl8I/nPF3doHDreSidQ4rdVDFQ2bilt+ah1 puLJO/C1/vnTIZcq9nFAdelnA8bx8/kOLkFU3oLnh4KN4FdpCckzCpD+wreNhRxB lEFg/gWN/q0ioHk01ydqt9BCl9vuWA8uGO7qFqRZn3/Inxjdk92pfJ6PDBCcioSL OL8CAwEAAaMjMCEwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAcYwDQYJ KoZIhvcNAQELBQADggEBACA3HssAf1xo2LOXVBwiXiPDkwItqalV62Uv+LCDnLy2 XuWV5wP8Mg3lM2Rb49pq53+ODQRYgjvh8fq/nxz5l0ErkCy1pTpyUXlEr4GgV/zi QPzfqCTJhAn5V3NhXaV5rm2yoGkAFVOidKmIF3Ko6moleWWDSC2sYDv+bQ88GOqM 6sPuBFKKXS7Ohb7xPjR9qtYi8Y847S150ogD2DjIDFGg6V6gcF9JIDp+PfEF3PQq pHrgY7EUJ0qnBZ0jZc6aLb+nO68H4Ja3cgdXZfUkMk2HDr6nJme3KNBDUPgcOQMW UlU1Bhfyx/x/RvNjDlFZ16yQ1KRXAuDRTReIzXAK2mUxAA== -----END PKCS7-----
Hi Geetika, As Fraser mentioned in comment #5 and #7, could you verify that the subject DN of the externally-signed CA signing certificate is using PrintableString? For example: $ AtoB ca_signing.pem ca_signing.der $ dumpasn1 ca_signing.der ... 107 72: SEQUENCE { 109 16: SET { 111 14: SEQUENCE { 113 3: OBJECT IDENTIFIER organizationName (2 5 4 10) 118 7: PrintableString 'EXAMPLE' : } : } 127 19: SET { 129 17: SEQUENCE { 131 3: OBJECT IDENTIFIER organizationalUnitName (2 5 4 11) 136 10: PrintableString 'pki-tomcat' : } : } 148 31: SET { 150 29: SEQUENCE { 152 3: OBJECT IDENTIFIER commonName (2 5 4 3) 157 22: PrintableString 'CA Signing Certificate' : } : } : } ... Then run the following command: $ curl -k https://<hostname>:<port>/ca/rest/authorities and verify that it returns exactly one <authority> element, for example: <?xml version="1.0" encoding="UTF-8" standalone="yes"?> <collection xmlns:ns2="http://www.w3.org/2005/Atom"> <authority isHostAuthority="true" id="cce899e2-75e5-4a9b-9697-c97fc5d2e812" issuerDN="CN=External CA,O=EXTERNAL" serial="30955" dn="CN=CA Signing Certificate,OU=pki-tomcat,O=EXAMPLE" enabled="true" description="Host authority" ready="true"/> </collection> Then restart the server several times and verify that the above command always returns the same output. Thanks.
Hi Endi, Here is the ASN format.For OU i still see UTF8String for others it is PrintableString.That means any field in Subject DN should be either PRINTABLESTRING or UTF8STRING. For nssdb it's all PRINTABLESTRING. For our Dogtag CA it is all PRINTABLESTRING except "OU" Test case 1: ------------ For any third party CA like nssdb i could see ASN format as: ============================================================= openssl x509 -in external_chk.crt -subject -nameopt multiline,show_type -noout -subject_hash subject= organizationName = PRINTABLESTRING:EXTERNAL organizationalUnitName = PRINTABLESTRING:Test commonName = PRINTABLESTRING:External CA 8461cfb9 After signing ExternalCA if i verify the ca_signing.crt i could see: ==================================================================== openssl x509 -in cert_ex -subject -nameopt multiline,show_type -noout -subject_hash subject= organizationName = PRINTABLESTRING:EXAMPLE organizationalUnitName = UTF8STRING:Test_ExternalCA1 commonName = PRINTABLESTRING:CA Signing Certificate Test Case 2: ------------- Add other optional subject dn fields in dogtag CA default.cfg and check the encoding pattern. openssl x509 -in ca_signing.crt -subject -nameopt multiline,show_type -noout -subject_hash subject= localityName = PRINTABLESTRING:Pasadena stateOrProvinceName = PRINTABLESTRING:Maryland countryName = PRINTABLESTRING:US organizationName = PRINTABLESTRING:EXAMPLE organizationalUnitName = UTF8STRING:Test_ExternalCA2 commonName = PRINTABLESTRING:CA Signing Certificate Test Case 3: Restart the pki instance and verify the output of curl. ------------ Before Restart --------------- curl -k https://nocp30.idm.lab.eng.rdu2.redhat.com:31142/ca/rest/authorities <?xml version="1.0" encoding="UTF-8" standalone="yes"?><collection xmlns:ns2="http://www.w3.org/2005/Atom"><authority isHostAuthority="true" id="527feaf6-4ff4-496a-b469-4c99e5d4bc24" issuerDN="CN=External CA,O=EXTERNAL" serial="15938" dn="CN=CA Signing Certificate,OU=Test_ExternalCA3,O=EXAMPLE,C=US,ST=Maryland,L=Pasadena" enabled="true" description="Host authority" ready="true"/></collection> After Restart -------------- curl -k https://nocp30.idm.lab.eng.rdu2.redhat.com:31142/ca/rest/authorities <?xml version="1.0" encoding="UTF-8" standalone="yes"?><collection xmlns:ns2="http://www.w3.org/2005/Atom"><authority isHostAuthority="true" id="527feaf6-4ff4-496a-b469-4c99e5d4bc24" issuerDN="CN=External CA,O=EXTERNAL" serial="15938" dn="CN=CA Signing Certificate,OU=Test_ExternalCA3,O=EXAMPLE,C=US,ST=Maryland,L=Pasadena" enabled="true" description="Host authority" ready="true"/></collection>
Geetika, LGTM. It suffices for any Subject DN component of the Dogtag CA to use an encoding other than UTF8String, and your test meets that criteria.
Marking this bug verified
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://rhn.redhat.com/errata/RHBA-2016-2881.html