Hi Perryn,
First of all, in the default config the name is not „tls_client“, but
„pc-client“. Have a look into /etc/openxpki/.../scep/generic.yaml,
„profile_map“, which converts the 1.3.6.1.4.1.311.20.2 names to OpenXPKI
profile names. The default looks like this:
# Mapping of names to OpenXPKI profiles to be used with the
# Microsoft Certificate Template Name Ext. (1.3.6.1.4.1.311.20.2)
profile_map:
pc-client: tls_client
I use openssl with a config. The following works for me (some parts I skipped
with „...“):
oid_section = new_oids
[ req ]
...
distinguished_name = req_dn
attributes = req_attributes
req_extensions = req_ext
[ new_oids ]
certTemplateName = 1.3.6.1.4.1.311.20.2
[ req_dn ]
[ req_attributes ]
[ req_ext ]
...
certTemplateName = ASN1:UTF8String:pc-client
and then
openssl req -new -config my.cnf -subj "..." -out my.csr
The oid_section must be on the top-level, above [ req ].
Regards
Petr
From: Perryn Gordon [mailto:[email protected]]
Sent: Tuesday, August 4, 2020 4:30 AM
To: mail <[email protected]>
Cc: openxpki-users <[email protected]>
Subject: Re: [OpenXPKI-users] Workflow selection and SCEP
CAUTION: This email originated from outside of the Advantech organization. Do
not click any link or open any attachment unless you recognize the sender and
know the content is 100% safe! If you are not sure this email is legitimate,
please contact IT.Helpdesk immediately.
Here is one of the methods I have tried:
[root@bf1c2596355e ~]# openssl req -new -keyout tmp/scep-test.key -out
tmp/scep-test.csr -newkey rsa:2048 -nodes -subj "/CN=Perryn Gordon:tls_client"
-addext "1.3.6.1.4.1.311.20.2=tls_client"
Error Loading command line extensions
139633151907648:error:22097082:X509 V3 routines:do_ext_nconf:unknown extension
name:crypto/x509v3/v3_conf.c:78:
139633151907648:error:22098080:X509 V3 routines:X509V3_EXT_nconf:error in
extension:crypto/x509v3/v3_conf.c:47:name=1.3.6.1.4.1.311.20.2, value=tls_client
________________________________
From: "mail" <[email protected]<mailto:[email protected]>>
To: "mail" <[email protected]<mailto:[email protected]>>,
"openxpki-users"
<[email protected]<mailto:[email protected]>>
Sent: Monday, August 3, 2020 7:54:36 PM
Subject: Re: [OpenXPKI-users] Workflow selection and SCEP
In regards to SCEP,
I see references to different ways to set the profile for the request, but I am
not able to implement any of them successfully.
What is the correct way, or ways, to indicate a non-default profile. I am
trying to get a tls_client in particular at the moment.
Thank-you!!!
Perryn
________________________________
From: "mail" <[email protected]<mailto:[email protected]>>
To: "openxpki-users"
<[email protected]<mailto:[email protected]>>
Sent: Monday, August 3, 2020 2:24:41 PM
Subject: Re: [OpenXPKI-users] Workflow selection and SCEP
Yes, thank-you Oliver!!
This fixed my issue as well.
Perryn
________________________________
From: "Petr Gotthard"
<[email protected]<mailto:[email protected]>>
To: "openxpki-users"
<[email protected]<mailto:[email protected]>>
Sent: Monday, August 3, 2020 4:09:21 AM
Subject: Re: [OpenXPKI-users] Workflow selection and SCEP
Solved! That was the issue.
Thanks, Oliver!
Regards,
Petr
-----Original Message-----
From: Oliver Welter [mailto:[email protected]]
Sent: Thursday, July 30, 2020 5:00 PM
To:
[email protected]<mailto:[email protected]>
Subject: Re: [OpenXPKI-users] Workflow selection and SCEP
CAUTION: This email originated from outside of the Advantech organization. Do
not click any link or open any attachment unless you recognize the sender and
know the content is 100% safe! If you are not sure this email is legitimate,
please contact IT.Helpdesk immediately.
Hi Petr,
there was a migration bug in the config in 3.4 which is fixed in v3.6 - I
assume this line starts with "ds_key" in your config, you need to change this
to "hash_key":
https://github.com/openxpki/openxpki-config/blob/community/config.d/realm.tpl/workflow/def/certificate_enroll.yaml#L629
Oliver
Am 30.07.20 um 13:46 schrieb Petr Gotthard:
> Hi Oliver,
> There is nothing else between PARSED and PROFILE_SET. The flow looks starts
> like this:
>
> INITIAL enroll_initialize EXECUTE
> INITIAL_ENROLL_INITIALIZE_0 global_map_url_params AUTORUN
> INITIAL_ENROLL_INITIALIZE_1 enroll_set_transaction_id AUTORUN
> INITIAL_ENROLL_INITIALIZE_2 enroll_set_workflow_attributes AUTORUN
> INITIAL_ENROLL_INITIALIZE_3 global_load_policy AUTORUN
> INITIAL_ENROLL_INITIALIZE_4 global_set_profile AUTORUN
> INITIAL_ENROLL_INITIALIZE_5 enroll_parse_pkcs10 AUTORUN PARSED
> global_noop AUTORUN PROFILE_SET enroll_render_subject AUTORUN
> PROFILE_SET_ENROLL_RENDER_SUBJECT_0 enroll_set_workflow_attributes
> AUTORUN READY_TO_PROCESS global_check_authorized_signer AUTORUN
> SIGNED_REQUEST enroll_set_mode_initial AUTORUN START_INITIAL
> enroll_calculate_hmac AUTORUN
>
>
> The CSR (for this request) is this:
>
> Certificate Request:
> Data:
> Version: 0 (0x0)
> Subject:
> commonName = mujrouter:test
> domainComponent = Test Deployment
> domainComponent = OpenXPKI
> domainComponent = org
> Subject Public Key Info:
> Public Key Algorithm: rsaEncryption
> Public-Key: (2048 bit)
> Modulus:
> 00:d3:9e:76:e7:cb:25:76:b6:77:3f:7a:5b:92:2e:
> <snip>
> 88:a1
> Exponent: 65537 (0x10001)
> Attributes:
> Requested Extensions:
> X509v3 Basic Constraints: critical
> CA:FALSE
> X509v3 Key Usage: critical
> Digital Signature, Key Encipherment
> X509v3 Extended Key Usage: critical
> TLS Web Server Authentication
> X509v3 Subject Alternative Name:
> DNS:zabbix.conel.cz
> 1.3.6.1.4.1.311.20.2:
> ..pc-client
> Signature Algorithm: sha256WithRSAEncryption
> 59:27:5f:64:86:3f:5e:95:68:1a:89:f6:9d:c5:05:8e:75:49:
> <snip>
> 75:1a:ca:9c
>
> I did notice two dots before the "pc-client" string above. That's the
> "ASN1:UTF8String" encoding-- 0x0C as the UTF8String type and then 0x09 as the
> length of the string:
>
> SEQUENCE {
> OBJECT IDENTIFIER
> enrollCerttypeExtension (1 3 6 1 4 1 311 20 2)
> OCTET STRING 0C 09 70 63 2D 63 6C 69 65 6E 74
> }
>
> Is that the expected encoding, or am I doing something wrong? The examples
> accross internet are not very consistent.
>
>
> Regards,
> Petr
>
> -----Original Message-----
> From: Oliver Welter [mailto:[email protected]]
> Sent: Thursday, July 30, 2020 10:00 AM
> To:
> [email protected]<mailto:[email protected]>
> Subject: Re: [OpenXPKI-users] Workflow selection and SCEP
>
>
> Hi Petr,
>
> yes it should work this way - can you please check if your workflow
> history contains the step
>
> PARSED > set_profile_from_extension > PROFILE_SET
>
> If not, whats the action used between those two states?
>
>
> Oliver
>
> Am 29.07.20 um 18:38 schrieb Petr Gotthard:
>> Hello,
>>
>> I am using OpenXPKI 3.4.0 and I want to issue both client and server
>> certificates via SCEP. I found in the docs that the
>> "1.3.6.1.4.1.311.20.2" extension can be used to select the
>> certificate template, so I tried.
>>
>>
>>
>> In /etc/openxpki/config.d/realm.tpl/scep/generic.yaml I have the
>> default configuration, which says:
>>
>>
>>
>> profile:
>>
>> cert_profile: tls_server
>>
>> cert_subject_style: enroll
>>
>>
>>
>> profile_map:
>>
>> pc-client: tls_client
>>
>>
>>
>>
>>
>> Now, when I issue an enrollment request via SCEP with this extension
>> I can see in the Workflow Context an entry "req_extensions" with
>> "certificateTemplateName, pc-client", so I guess the parameter was
>> encoded correctly. I thought that inclusion of "pc-client" will
>> select the "tls_client" from the profile map, but it seems to not work this
>> way.
>>
>>
>>
>> Am I doing something wrong, please?
>>
>>
>>
>>
>>
>> Petr Gotthard
>>
>>
>>
>>
>>
>> _______________________________________________
>> OpenXPKI-users mailing list
>> [email protected]<mailto:[email protected]>
>> https://lists.sourceforge.net/lists/listinfo/openxpki-users
>>
>
>
> --
> Protect your environment - close windows and adopt a penguin!
>
>
> _______________________________________________
> OpenXPKI-users mailing list
> [email protected]<mailto:[email protected]>
> https://lists.sourceforge.net/lists/listinfo/openxpki-users
>
>
> _______________________________________________
> OpenXPKI-users mailing list
> [email protected]<mailto:[email protected]>
> https://lists.sourceforge.net/lists/listinfo/openxpki-users
>
--
Protect your environment - close windows and adopt a penguin!
_______________________________________________
OpenXPKI-users mailing list
[email protected]<mailto:[email protected]>
https://lists.sourceforge.net/lists/listinfo/openxpki-users
_______________________________________________
OpenXPKI-users mailing list
[email protected]<mailto:[email protected]>
https://lists.sourceforge.net/lists/listinfo/openxpki-users
_______________________________________________
OpenXPKI-users mailing list
[email protected]<mailto:[email protected]>
https://lists.sourceforge.net/lists/listinfo/openxpki-users
_______________________________________________
OpenXPKI-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/openxpki-users