Bug 854540 - (keys_in_pkcs12) PRD32 - pki: use PKCS#12 format to store keys
PRD32 - pki: use PKCS#12 format to store keys
Product: Red Hat Enterprise Virtualization Manager
Classification: Red Hat
Component: ovirt-engine (Show other bugs)
Unspecified Unspecified
unspecified Severity unspecified
: ---
: 3.2.0
Assigned To: Alon Bar-Lev
Pavel Stehlik
: Improvement
Depends On:
Blocks: 809095 Simon-RFE-Tracker 915537
  Show dependency treegraph
Reported: 2012-09-05 05:56 EDT by Alon Bar-Lev
Modified: 2016-02-10 14:24 EST (History)
11 users (show)

See Also:
Fixed In Version:
Doc Type: Enhancement
Doc Text:
oVirt Engine now uses the PKCS#12 format to store keys, replacing the previous Java Key Store format. The PKCS#12 format separates the engine as client key usage and engine as server key usage to support third party certificates for the web administration and user portals.
Story Points: ---
Clone Of:
Last Closed: 2013-06-10 17:09:46 EDT
Type: Bug
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: Infra
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---
dyasny: Triaged+

Attachments (Terms of Use)

External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2013:0888 normal SHIPPED_LIVE Moderate: Red Hat Enterprise Virtualization Manager 3.2 update 2013-06-10 20:55:41 EDT

  None (edit)
Description Alon Bar-Lev 2012-09-05 05:56:24 EDT
commit de7c6e35dbec447bcddb3cae1d58cf6596dfdcb3
Author: Alon Bar-Lev <alonbl@redhat.com>
Date:   Sat Aug 4 21:27:00 2012 +0300

    pki: use PKCS#12 format to store keys
    Java supports standard cryptographic format PKCS#12, this format
    bundles private key and certificate chain into one file with integrity
    of passphrase.
    Using Java proprietary key store format force additional work if using
    non-Java solutions.
    This change is a migration from JKS and duplicates into single PKCS#12
    keystore for private key store. It does not handle the trust store which
    is left as JKS for now.
    Remove unnecessary scripts from CA implementations that do not support
    this effort.
    Change-Id: I2abda5778477faff09798a43cf3dc96435efb272
    Signed-off-by: Alon Bar-Lev <alonbl@redhat.com>

Comment 1 Alon Bar-Lev 2012-09-30 05:33:06 EDT
Comment 2 Alon Bar-Lev 2012-10-03 11:21:50 EDT
Comment 7 Cheryn Tan 2013-04-03 02:53:00 EDT
This bug is currently attached to errata RHEA-2013:14491. If this change is not to be documented in the text for this errata please either remove it from the errata, set the requires_doc_text flag to minus (-), or leave a "Doc Text" value of "--no tech note required" if you do not have permission to alter the flag.

Otherwise to aid in the development of relevant and accurate release documentation, please fill out the "Doc Text" field above with these four (4) pieces of information:

* Cause: What actions or circumstances cause this bug to present.

* Consequence: What happens when the bug presents.

* Fix: What was done to fix the bug.

* Result: What now happens when the actions or circumstances above occur. (NB: this is not the same as 'the bug doesn't present anymore')

Once filled out, please set the "Doc Type" field to the appropriate value for the type of change made and submit your edits to the bug.

For further details on the Cause, Consequence, Fix, Result format please refer to:


Thanks in advance.
Comment 8 Alon Bar-Lev 2013-04-03 03:20:57 EDT
Doc is provided at dependencies.
Comment 9 errata-xmlrpc 2013-06-10 17:09:46 EDT
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.


Note You need to log in before you can comment on or make changes to this bug.