On Fri, Feb 11, 2000 at 04:43:48PM -0800, [EMAIL PROTECTED] wrote:
> 
> I'm configuring a few cisco routers to do IKE for our VPN's. Works great
> with pre-shared keys, but for scalability purposes I'd like to use
> certificates, which requires the use of a CA. But the ciscos store keys
> and certificates in a format I'm not familiar with and was wondering if
> anyone had any idea.

> Date: Mon, 31 Jan 2000 21:23:59 -0800
> From: John Muller <[EMAIL PROTECTED]>
> 
> Cisco Systems announces open Simple Certificate Enrollment Protocol
> to support the secure issuance of digital certificates to network
> devices and users
> http://www.cisco.com/warp/public/cc/cisco/mkt/security/tech/scep_wp.htm

In short, ciscos are required to store private keys and are supposed
to fetch certs and crls from ca with LDAP or SCEP query.

> Here's an example certificate grabbed from
> 
>http://www.cisco.com/univercd/cc/td/doc/product/software/ios120/12cgcr/secur_c/scprt4/scinter.htm
> certificate ca 3051DF7169BEE31B821DFE4B3A338E5F

I believe this is MD5 of the (whole) ca cert

>   30820182 3082012C A0030201 02021030 51DF7169 BEE31B82 1DFE4B3A 338E5F30 

Is asn1parse capable to BER-decode? It may be "PKI message" from 3.2 clause

>   ...
>   B1D2F817 3F7B
>   quit

What is this "quit"?

Hope that help a bit,
Vadim
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to