Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1484359 - Lightweight CA key replication fails (regressions)
Lightweight CA key replication fails (regressions)
Status: CLOSED ERRATA
Product: Red Hat Enterprise Linux 7
Classification: Red Hat
Component: pki-core (Show other bugs)
7.4
Unspecified Unspecified
urgent Severity urgent
: rc
: ---
Assigned To: Fraser Tweedale
Michal Reznik
Marc Muehlfeld
: Regression, ZStream
Depends On:
Blocks: 1486870
  Show dependency treegraph
 
Reported: 2017-08-23 06:48 EDT by Fraser Tweedale
Modified: 2018-04-10 13:01 EDT (History)
4 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
The Certificate System CA key replication now works correctly A previous update to one of the key unwrapping functions introduced a requirement for a key usage parameter which was not being supplied at the call site, which caused lightweight Certiciate Authority (CA) key replication to fail. This bug has been fixed by modifying the call site so that it supplies the key usage parameter, and lightweight CA key replication now works as expected.
Story Points: ---
Clone Of:
: 1486870 (view as bug list)
Environment:
Last Closed: 2018-04-10 13:00:07 EDT
Type: Bug
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)
verification_steps (3.04 KB, text/plain)
2018-01-22 08:23 EST, Michal Reznik
no flags Details


External Trackers
Tracker ID Priority Status Summary Last Updated
Fedora Pagure 7387 None None None 2018-02-06 10:42 EST
Fedora Pagure freeipa/issue/7387 None None None 2018-02-06 10:44 EST
Red Hat Product Errata RHBA-2018:0925 None None None 2018-04-10 13:01 EDT

  None (edit)
Description Fraser Tweedale 2017-08-23 06:48:06 EDT
Description of problem: lightweight CA replication fails with a
NullPointerException:




Version-Release number of selected component (if applicable):


How reproducible: always


Steps to Reproduce:
1. Install FreeIPA and replica with CA.
2. Create a new lightweigth ca (`ipa ca-add`)
3.

Actual results: Key replication to the replica fails with the following log output


[23/Aug/2017:20:39:19][KeyRetrieverRunner-bbb070b9-becc-4a1c-a55b-7ce96b31ed92]: Running ExternalProcessKeyRetriever
[23/Aug/2017:20:39:19][KeyRetrieverRunner-bbb070b9-becc-4a1c-a55b-7ce96b31ed92]: About to execute command: [/usr/libexec/ipa/ipa-pki-retrieve-key, caSigningCert cert-pki-ca bbb070b9-becc-4a1c-a55b-7ce96b31ed92, f25-1.ipa.local]
[23/Aug/2017:20:39:20][KeyRetrieverRunner-bbb070b9-becc-4a1c-a55b-7ce96b31ed92]: Importing key and cert
[23/Aug/2017:20:39:20][KeyRetrieverRunner-bbb070b9-becc-4a1c-a55b-7ce96b31ed92]: Caught exception during cert/key import
java.lang.NullPointerException
        at org.mozilla.jss.pkcs11.PK11KeyWrapper.unwrapSymmetric(PK11KeyWrapper.java:458)
        at com.netscape.cmsutil.crypto.CryptoUtil.unwrap(CryptoUtil.java:2536)
        at com.netscape.cmsutil.crypto.CryptoUtil.importPKIArchiveOptions(CryptoUtil.java:2317)
        at com.netscape.ca.CertificateAuthority$KeyRetrieverRunner._run(CertificateAuthority.java:3597)
        at com.netscape.ca.CertificateAuthority$KeyRetrieverRunner.run(CertificateAuthority.java:3502)
        at java.lang.Thread.run(Thread.java:748)
[23/Aug/2017:20:39:20][KeyRetrieverRunner-bbb070b9-becc-4a1c-a55b-7ce96b31ed92]: Retrying in 576 seconds


Expected results: key replication to the replica succeeds; log output will be like:

[23/Aug/2017:20:36:19][KeyRetrieverRunner-bbb070b9-becc-4a1c-a55b-7ce96b31ed92]: Running ExternalProcessKeyRetriever
[23/Aug/2017:20:36:19][KeyRetrieverRunner-bbb070b9-becc-4a1c-a55b-7ce96b31ed92]: About to execute command: [/usr/libexec/ipa/ipa-pki-retrieve-key, caSigningCert cert-pki-ca bbb070b9-becc-4a1c-a55b-7ce96b31ed92, f25-1.ipa.local]
[23/Aug/2017:20:36:26][KeyRetrieverRunner-bbb070b9-becc-4a1c-a55b-7ce96b31ed92]: Importing key and cert
[23/Aug/2017:20:36:26][KeyRetrieverRunner-bbb070b9-becc-4a1c-a55b-7ce96b31ed92]: Reinitialising SigningUnit
[23/Aug/2017:20:36:26][KeyRetrieverRunner-bbb070b9-becc-4a1c-a55b-7ce96b31ed92]: CertificateAuthority:initSigUnit: ca cert found
[23/Aug/2017:20:36:26][KeyRetrieverRunner-bbb070b9-becc-4a1c-a55b-7ce96b31ed92]: CertificateAuthority: initSigUnit 1- setting mIssuerObj and mSubjectObj
[23/Aug/2017:20:36:26][KeyRetrieverRunner-bbb070b9-becc-4a1c-a55b-7ce96b31ed92]: ca.signing Signing Unit nickname caSigningCert cert-pki-ca bbb070b9-becc-4a1c-a55b-7ce96b31ed92
[23/Aug/2017:20:36:26][KeyRetrieverRunner-bbb070b9-becc-4a1c-a55b-7ce96b31ed92]: Got token Internal Key Storage Token by name
[23/Aug/2017:20:36:26][KeyRetrieverRunner-bbb070b9-becc-4a1c-a55b-7ce96b31ed92]: Found cert by nickname: 'caSigningCert cert-pki-ca bbb070b9-becc-4a1c-a55b-7ce96b31ed92' with serial number: 15
[23/Aug/2017:20:36:26][KeyRetrieverRunner-bbb070b9-becc-4a1c-a55b-7ce96b31ed92]: converted to x509CertImpl
[23/Aug/2017:20:36:26][KeyRetrieverRunner-bbb070b9-becc-4a1c-a55b-7ce96b31ed92]: Got private key from cert
[23/Aug/2017:20:36:26][KeyRetrieverRunner-bbb070b9-becc-4a1c-a55b-7ce96b31ed92]: Got public key from cert
[23/Aug/2017:20:36:26][KeyRetrieverRunner-bbb070b9-becc-4a1c-a55b-7ce96b31ed92]: got signing algorithm RSASignatureWithSHA256Digest
[23/Aug/2017:20:36:26][KeyRetrieverRunner-bbb070b9-becc-4a1c-a55b-7ce96b31ed92]: CA signing unit inited
[23/Aug/2017:20:36:26][KeyRetrieverRunner-bbb070b9-becc-4a1c-a55b-7ce96b31ed92]: cachainNum= 0
[23/Aug/2017:20:36:26][KeyRetrieverRunner-bbb070b9-becc-4a1c-a55b-7ce96b31ed92]: in init - got CA chain from JSS.
[23/Aug/2017:20:36:26][KeyRetrieverRunner-bbb070b9-becc-4a1c-a55b-7ce96b31ed92]: Shared OCSP signing unit inited
[23/Aug/2017:20:36:26][KeyRetrieverRunner-bbb070b9-becc-4a1c-a55b-7ce96b31ed92]: in init - got OCSP chain from JSS.
[23/Aug/2017:20:36:26][KeyRetrieverRunner-bbb070b9-becc-4a1c-a55b-7ce96b31ed92]: CA First signing algorithm is SHA1withRSA
[23/Aug/2017:20:36:26][KeyRetrieverRunner-bbb070b9-becc-4a1c-a55b-7ce96b31ed92]: CertificateAuthority: initSigUnit - setting mIssuerObj and mSubjectObj
[23/Aug/2017:20:36:26][KeyRetrieverRunner-bbb070b9-becc-4a1c-a55b-7ce96b31ed92]: in init - got CA name CN=test1
[23/Aug/2017:20:36:26][KeyRetrieverRunner-bbb070b9-becc-4a1c-a55b-7ce96b31ed92]: Adding self to authorityKeyHosts attribute
[23/Aug/2017:20:36:26][KeyRetrieverRunner-bbb070b9-becc-4a1c-a55b-7ce96b31ed92]: In LdapBoundConnFactory::getConn()
[23/Aug/2017:20:36:26][KeyRetrieverRunner-bbb070b9-becc-4a1c-a55b-7ce96b31ed92]: masterConn is connected: true
[23/Aug/2017:20:36:26][KeyRetrieverRunner-bbb070b9-becc-4a1c-a55b-7ce96b31ed92]: getConn: conn is connected true
[23/Aug/2017:20:36:26][KeyRetrieverRunner-bbb070b9-becc-4a1c-a55b-7ce96b31ed92]: getConn: mNumConns now 1


Additional info:
Comment 2 Fraser Tweedale 2017-08-23 06:55:57 EDT
Upstream ticket: https://pagure.io/dogtagpki/issue/2796
Gerrit review: https://review.gerrithub.io/375318
Comment 3 Matthew Harmsen 2017-08-29 19:37:12 EDT
ftweedal pushed the changes:

    Pushed to master: 33ff29c893b2e0ad13a80f59acb197a7375b7ed9
    Pushed to ORIGIN_10_4_BRANCH: 606027b188fee6d20c17323d7c464d6630024a20
Comment 8 Michal Reznik 2018-01-22 08:22:28 EST
Verified on:

ipa-server-4.5.4-8.el7.x86_64
pki-base-10.5.1-5.el7.noarch
Comment 9 Michal Reznik 2018-01-22 08:23 EST
Created attachment 1384441 [details]
verification_steps
Comment 11 errata-xmlrpc 2018-04-10 13:00:07 EDT
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2018:0925

Note You need to log in before you can comment on or make changes to this bug.