Hi there,

I have the following problem:

I use OpenCA-9.2RC3 with openssl9.7d(patched)/9.8 (see below). I am able to issue 
certificates for Webservers as well as fro Users...

But when I try to get it running with a cisco pix 501 I encounter the following:

I am able to configure and authenticate the CA and can get the CRL. When I try to 
enroll a certificate, this works as well, I can see, edit and issue it. Whilst this, 
the request is shown as "pending" on the pix, but after issueing the certificate, the 
pix seems to download it, and afterwards the pending request is gone, but the pix 
debug information says "certificate is granted"...

Please find any additional information in the text below, there you will find the ca 
debug log of the pix, as well as the CSR before and after editing it and the issued 
certificate.

This Problem is the same issue as Bernd Probst mentioned in March (see this post: 
http://www.mail-archive.com/[EMAIL PROTECTED]/msg04684.html) - but somehow I lost 
track or a solution to his problem has never been posted (or found). 

Regarding to Michaels suggestion in the posting above I installed the latest snap of 
openssl 9.8 and compiled & installed it in a different directory than the systems 
openssl 9.7d (with patch for pcks7) and changed the paths in token.xml to fit the 
localtion of openssl 9.8 - but the problem persists.

Has anyone this config up and running and/or ist there a solution / or hint to the 
Problem? Micheal Portz pointed me towards that it could have something to do with the 
VPN-Server profile but I didn't find any further information on this!

Thanks in advance!

Jörg Bartz


Some information that might help:


==============
PIX "show ca certificate" after enrollment:

RA General purpose Certificate
  Status: Available
  Certificate Serial Number: 03
  Key Usage: General Purpose
    Serial Number = 3
    CN = ComNet RA
    OU = Trustcenter
    O = ComNet GmbH
    C = DE
  Validity Date: 
    start date: 12:28:52 CEDT Apr 30 2004
    end   date: 12:28:52 CEDT Apr 30 2005

CA Certificate
  Status: Available
  Certificate Serial Number: No serial number avaliable
  Key Usage: Signature
    EA =<16> [EMAIL PROTECTED]
    CN = ComNet Certification Authority
    OU = Trustcenter
    O = ComNet GmbH
    C = DE
  Validity Date: 
    start date: 11:58:56 CEDT Apr 30 2004
    end   date: 11:58:56 CEDT Apr 30 2006

Certificate
  Subject Name
    Name: pix.*mydomain*.de
  Status: Pending
  Key Usage: General Purpose
    Fingerprint:  a519b3d2 3307d005 80ff0e08 ddc14015


==============
PIX debug Logfile for enrollment / retransmission:

CI thread sleeps!
Crypto CA thread wakes up!
CI thread wakes up!
CRYPTO_PKI: Name: Serial Number = 3, CN = ComNet RA, OU = Trustcenter, O =
ComNet GmbH, C = DE
CRYPTO_PKI: Name: EA =<16> [EMAIL PROTECTED], CN = ComNet Certification
Authority, OU = Trustcenter, O = ComNet GmbH, C = DE
CRYPTO_PKI: transaction PKCSReq completed
CRYPTO_PKI: status:
Crypto CA thread sleeps!
CRYPTO_PKI: http connection opened
CRYPTO_PKI:  received msg of 2462 bytes
CRYPTO_PKI: signed attr: pki-message-type:
13 01 33
CRYPTO_PKI: signed attr: pki-status:
13 01 33
CRYPTO_PKI: signed attr: pki-recipient-nonce:
04 10 a7 70 09 5a 6a e9 90 20 7e 81 f8 31 e3 38 7c 95
CRYPTO_PKI: signed attr: pki-transaction-id:
13 20 33 37 39 32 31 63 30 39 64 35 65 38 33 34 34 36 62 30
39 66 35 32 38 62 34 61 65 62 64 32 30 38
CRYPTO_PKI: status = 102: certificate request pending
CRYPTO_PKI: http connection opened
CRYPTO_PKI:  received msg of 4115 bytes
CRYPTO_PKI: signed attr: pki-message-type:
13 01 33
CRYPTO_PKI: signed attr: pki-status:
13 01 30
CRYPTO_PKI: signed attr: pki-recipient-nonce:
04 10 f4 36 78 30 25 92 11 7f 0a 95 60 fc 2b 3c f4 5c
CRYPTO_PKI: signed attr: pki-transaction-id:
13 20 33 37 39 32 31 63 30 39 64 35 65 38 33 34 34 36 62 30
39 66 35 32 38 62 34 61 65 62 64 32 30 38
CRYPTO_PKI: status = 100: certificate is granted
CRYPTO_PKI: All enrollment requests completed.
CRYPTO_PKI: All enrollment requests completed.

==============
PIX "show ca certificate" after retransmission:

RA General purpose Certificate
  Status: Available
  Certificate Serial Number: 03
  Key Usage: General Purpose
    Serial Number = 3
    CN = ComNet RA
    OU = Trustcenter
    O = ComNet GmbH
    C = DE
  Validity Date: 
    start date: 12:28:52 CEDT Apr 30 2004
    end   date: 12:28:52 CEDT Apr 30 2005

CA Certificate
  Status: Available
  Certificate Serial Number: No serial number avaliable
  Key Usage: Signature
    EA =<16> [EMAIL PROTECTED]
    CN = ComNet Certification Authority
    OU = Trustcenter
    O = ComNet GmbH
    C = DE
  Validity Date: 
    start date: 11:58:56 CEDT Apr 30 2004
    end   date: 11:58:56 CEDT Apr 30 2006

==============
OpenCA ca_token debug:

OpenCA::Token::OpenSSL->new: class instantiated<br>
OpenCA::Token::OpenSSL->new: crypto and name present<br>
OpenCA::Token::OpenSSL->new: NAME CA<br>
OpenCA::Token::OpenSSL->new: PASSWD_PARTS 1<br>
OpenCA::Token::OpenSSL->OpenCA::Token::OpenSSL: AUTOLOAD => 
OpenCA::Token::OpenSSL::getReqAttribute<br>
OpenCA::Token::OpenSSL->OpenCA::Token::OpenSSL: AUTOLOAD => 
OpenCA::Token::OpenSSL::getCertAttribute<br>
OpenCA::Token::OpenSSL->OpenCA::Token::OpenSSL: AUTOLOAD => 
OpenCA::Token::OpenSSL::getNumericDate<br>
OpenCA::Token::OpenSSL->OpenCA::Token::OpenSSL: AUTOLOAD => 
OpenCA::Token::OpenSSL::setParams<br>
OpenCA::Token::OpenSSL->OpenCA::Token::OpenSSL: AUTOLOAD => 
OpenCA::Token::OpenSSL::issueCert<br>
Using configuration from /usr/local/OpenCA/OpenCA/etc/openssl/openssl/VPN_Server.conf
Check that the request matches the signature
Signature ok
The Subject's Distinguished Name is as follows
serialNumber          :PRINTABLE:'12'
Certificate is to be certified until May  4 09:27:43 2005 GMT (365 days)

Write out database with 1 new entries
Data Base Updated
OpenCA::Token::OpenSSL->OpenCA::Token::OpenSSL: AUTOLOAD => 
OpenCA::Token::OpenSSL::getCertAttribute<br>
OpenCA::Token::OpenSSL->OpenCA::Token::OpenSSL: AUTOLOAD => 
OpenCA::Token::OpenSSL::getCertAttribute<br>
OpenCA::Token::OpenSSL->OpenCA::Token::OpenSSL: AUTOLOAD => 
OpenCA::Token::OpenSSL::sign<br>
OpenCA::Token::OpenSSL->OpenCA::Token::OpenSSL: AUTOLOAD => 
OpenCA::Token::OpenSSL::getCertAttribute<br>
OpenCA::Token::OpenSSL->OpenCA::Token::OpenSSL: AUTOLOAD => 
OpenCA::Token::OpenSSL::getCertAttribute<br>
OpenCA::Token::OpenSSL->OpenCA::Token::OpenSSL: AUTOLOAD => 
OpenCA::Token::OpenSSL::getPIN<br>
OpenCA::Token::OpenSSL->OpenCA::Token::OpenSSL: AUTOLOAD => 
OpenCA::Token::OpenSSL::getDigest<br>
OpenCA::Token::OpenSSL->OpenCA::Token::OpenSSL: AUTOLOAD => 
OpenCA::Token::OpenSSL::getSMIME<br>
OpenCA::Token::OpenSSL->OpenCA::Token::OpenSSL: AUTOLOAD => 
OpenCA::Token::OpenSSL::sign<br>
OpenCA::Token::OpenSSL->OpenCA::Token::OpenSSL: AUTOLOAD => 
OpenCA::Token::OpenSSL::getCertAttribute<br>
OpenCA::Token::OpenSSL->OpenCA::Token::OpenSSL: AUTOLOAD => 
OpenCA::Token::OpenSSL::getCertAttribute<br>
OpenCA::Token::OpenSSL->OpenCA::Token::OpenSSL: AUTOLOAD => 
OpenCA::Token::OpenSSL::getReqAttribute<br>
OpenCA::Token::OpenSSL->OpenCA::Token::OpenSSL: AUTOLOAD => 
OpenCA::Token::OpenSSL::getReqAttribute<br>
OpenCA::Token::OpenSSL->OpenCA::Token::OpenSSL: AUTOLOAD => 
OpenCA::Token::OpenSSL::dataConvert<br>
OpenCA::Token::OpenSSL->OpenCA::Token::OpenSSL: AUTOLOAD => 
OpenCA::Token::OpenSSL::DESTROY<br>

==============
CSR received by OpenCA:

Request Version 0 (0x0) 
Serial Number 7713 
Common Name n/a 
E-Mail n/a 
Subject Alternative Name n/a 
Role VPN Server 
LOA  
Distinguished Name serialNumber=cert's serial,unstructuredName=pix.*mydomain*.de+ 
Submitted on Tue May 4 09:22:15 2004 GMT 
Approved on n/a 
Used Identification PIN n/a 
Modulus (key size) 1024 
Public Key Algorithm rsaEncryption 
Public Key Modulus (1024 bit):
    00:dc:96:3b:c0:2b:d7:8b:fc:a3:ef:b6:23:d8:74:
    2c:47:49:fa:b1:bb:22:30:23:44:aa:fe:48:37:83:
    7b:8e:3e:d4:8a:c4:5c:9f:a7:cf:0f:34:1b:8e:f4:
    b9:e0:62:f2:5e:8f:3a:f6:bf:5e:49:da:11:b1:5d:
    6c:11:93:89:90:4b:39:27:a2:5b:a6:60:b7:8d:76:
    b5:51:aa:5b:30:b4:87:fa:84:58:b2:29:43:53:b4:
    f1:20:06:6c:bc:3e:c9:ee:37:e0:be:f2:c8:07:a6:
    ac:1e:93:52:8e:78:d3:9a:03:d0:98:fa:b6:6d:8c:
    09:df:06:22:dc:17:30:79:2d
Exponent: 65537 (0x10001)

Signature Algorithm md5WithRSAEncryption 
Name (first and Last name) n/a 
Email n/a 
Department n/a 
Telephone n/a 


Note: The full subject was: [EMAIL PROTECTED] 
GmbH+unstructuredName=pix.*mydomain*.de+C=DE+CN=pix.*mydomain*.de+OU=TestCenter

==============
CSR after editing:

Request Version 0 (0x0) 
Serial Number 7713 
Common Name n/a 
E-Mail [EMAIL PROTECTED] 
Subject Alternative Name DNS:pix.*mydomain*.de, email:[EMAIL PROTECTED] 
Role VPN Server 
LOA Test 
Distinguished Name serialNumber=cert's serial 
Submitted on Tue May 4 09:22:15 2004 GMT 
Approved on n/a 
Used Identification PIN n/a 
Modulus (key size) 1024 
Public Key Algorithm rsaEncryption 
Public Key Modulus (1024 bit):
    00:dc:96:3b:c0:2b:d7:8b:fc:a3:ef:b6:23:d8:74:
    2c:47:49:fa:b1:bb:22:30:23:44:aa:fe:48:37:83:
    7b:8e:3e:d4:8a:c4:5c:9f:a7:cf:0f:34:1b:8e:f4:
    b9:e0:62:f2:5e:8f:3a:f6:bf:5e:49:da:11:b1:5d:
    6c:11:93:89:90:4b:39:27:a2:5b:a6:60:b7:8d:76:
    b5:51:aa:5b:30:b4:87:fa:84:58:b2:29:43:53:b4:
    f1:20:06:6c:bc:3e:c9:ee:37:e0:be:f2:c8:07:a6:
    ac:1e:93:52:8e:78:d3:9a:03:d0:98:fa:b6:6d:8c:
    09:df:06:22:dc:17:30:79:2d
Exponent: 65537 (0x10001)

 
Signature Algorithm md5WithRSAEncryption 
Name (first and Last name) n/a 
Email [EMAIL PROTECTED] 
Department n/a 
Telephone n/a
Variable Value 
Request Version 0 (0x0) 
Serial Number 7713 
Common Name n/a 
E-Mail [EMAIL PROTECTED] 
Subject Alternative Name DNS:pix.*mydomain*.de, email:[EMAIL PROTECTED] 
Role VPN Server 
LOA Test 
Distinguished Name serialNumber=cert's serial 
Submitted on Tue May 4 09:22:15 2004 GMT 
Approved on n/a 
Used Identification PIN n/a 
Modulus (key size) 1024 
Public Key Algorithm rsaEncryption 
Public Key Modulus (1024 bit):
    00:dc:96:3b:c0:2b:d7:8b:fc:a3:ef:b6:23:d8:74:
    2c:47:49:fa:b1:bb:22:30:23:44:aa:fe:48:37:83:
    7b:8e:3e:d4:8a:c4:5c:9f:a7:cf:0f:34:1b:8e:f4:
    b9:e0:62:f2:5e:8f:3a:f6:bf:5e:49:da:11:b1:5d:
    6c:11:93:89:90:4b:39:27:a2:5b:a6:60:b7:8d:76:
    b5:51:aa:5b:30:b4:87:fa:84:58:b2:29:43:53:b4:
    f1:20:06:6c:bc:3e:c9:ee:37:e0:be:f2:c8:07:a6:
    ac:1e:93:52:8e:78:d3:9a:03:d0:98:fa:b6:6d:8c:
    09:df:06:22:dc:17:30:79:2d
Exponent: 65537 (0x10001)

 
Signature Algorithm md5WithRSAEncryption 
Name (first and Last name) n/a 
Email [EMAIL PROTECTED] 
Department n/a 
Telephone n/a 

==============
Isuued Certificate:

Description Certificate issued and Certificate Request archived.  
Logging Message Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 12 (0xc)
        Signature Algorithm: sha1WithRSAEncryption
        Issuer: [EMAIL PROTECTED],CN=ComNet Certification 
Authority,OU=Trustcenter,O=ComNet GmbH,C=DE
        Validity
            Not Before: May  4 09:27:43 2004 GMT
            Not After : May  4 09:27:43 2005 GMT
        Subject: serialNumber=12
        Subject Public Key Info:
            Public Key Algorithm: rsaEncryption
            RSA Public Key: (1024 bit)
                Modulus (1024 bit):
                    00:dc:96:3b:c0:2b:d7:8b:fc:a3:ef:b6:23:d8:74:
                    2c:47:49:fa:b1:bb:22:30:23:44:aa:fe:48:37:83:
                    7b:8e:3e:d4:8a:c4:5c:9f:a7:cf:0f:34:1b:8e:f4:
                    b9:e0:62:f2:5e:8f:3a:f6:bf:5e:49:da:11:b1:5d:
                    6c:11:93:89:90:4b:39:27:a2:5b:a6:60:b7:8d:76:
                    b5:51:aa:5b:30:b4:87:fa:84:58:b2:29:43:53:b4:
                    f1:20:06:6c:bc:3e:c9:ee:37:e0:be:f2:c8:07:a6:
                    ac:1e:93:52:8e:78:d3:9a:03:d0:98:fa:b6:6d:8c:
                    09:df:06:22:dc:17:30:79:2d
                Exponent: 65537 (0x10001)
        X509v3 extensions:
            X509v3 Basic Constraints: 
                CA:FALSE
            X509v3 Certificate Policies: 
                Policy: 1.2.3.3.4
                  CPS: http://some.url.org/cps

            Netscape Cert Type: 
                SSL Server
            X509v3 Key Usage: 
                Digital Signature, Non Repudiation, Key Encipherment
            Netscape Comment: 
                VPN Server of ComNet GmbH
            X509v3 Subject Key Identifier: 
                22:CD:8B:BF:AB:AA:7D:25:50:1F:C0:0A:A8:5C:B0:A3:43:A8:EB:A4
            X509v3 Authority Key Identifier: 
                keyid:D3:3E:5D:B1:F2:8B:C2:2B:CA:3E:42:7E:22:DE:8B:4A:57:C7:8E:B6
                DirName:/C=DE/O=ComNet GmbH/OU=Trustcenter/CN=ComNet Certification 
Authority/[EMAIL PROTECTED]
                serial:00

            X509v3 Subject Alternative Name: 
                DNS:pix.*mydomain*.de, email:[EMAIL PROTECTED]
            X509v3 Issuer Alternative Name: 
                email:[EMAIL PROTECTED]
            Netscape CA Revocation Url: 
                http://ra.*mydomain*.de/pub/crl/cacrl.crl
            Netscape Revocation Url: 
                http://ra.*mydomain*.de/pub/crl/cacrl.crl
            X509v3 CRL Distribution Points: 
                URI:http://ra.*mydomain*.de/pub/crl/cacrl.crl

    Signature Algorithm: sha1WithRSAEncryption
        4f:23:cf:f2:19:7c:7a:b4:0a:20:55:d8:53:12:80:99:19:b9:
        38:04:70:7c:a7:5e:9f:e3:d1:f1:8f:dd:e0:47:6a:ad:1c:3b:
        ce:54:95:14:53:85:b8:31:8e:b5:74:36:74:b9:5e:43:fd:d3:
        0e:a1:d8:7f:70:44:df:fc:a3:81:87:f1:55:d3:35:e6:0a:27:
        00:73:61:86:22:4f:28:1e:c9:4c:92:b6:5b:db:df:45:3e:d1:
        a1:cd:e1:5f:55:f2:18:c7:bf:05:17:b2:81:c4:f8:74:4e:dc:
        95:59:0b:0b:70:63:cc:bb:7a:da:c0:68:26:ee:3c:b3:bb:1b:
        d1:99:3a:e1:52:37:41:42:0f:bc:da:12:b6:c2:74:fd:52:e7:
        57:d9:98:02:2e:79:e5:31:11:fc:59:60:22:49:b2:3b:89:9a:
        79:2f:e8:ee:fa:ac:83:98:ae:fc:85:1f:8b:5d:29:2f:d9:bb:
        c3:48:12:80:e0:5a:ec:59:ec:30:d0:79:45:82:f3:36:a3:62:nt: 6
        0b:da:d5:6d:b5:d8:e7:24:a8:dc:cc:89:97:9e:12:38:13:95:
        28:30:8e:67:5d:58:41:54:1c:26:0f:08:f4:25:af:43:f5:88:
        9d:cf:aa:77:97:ff:e4:38:e2:ff:f9:97:79:62:4b:21:e3:71:
        77:01:56:6e




----
Jörg Bartz
ComNet GmbH, Würselen

"Was nicht fliegt, kann auch nicht abstürzen!"



-------------------------------------------------------
This SF.Net email is sponsored by: Oracle 10g
Get certified on the hottest thing ever to hit the market... Oracle 10g.
Take an Oracle 10g class now, and we'll give you the exam FREE.
http://ads.osdn.com/?ad_id149&alloc_id66&op=click
_______________________________________________
Openca-Users mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/openca-users

Reply via email to