Hi Tyson

Even if I configure a different hash algorithm like "sha512", the sha1 and
md5 fingerprint are sent. The command reference seems to have a different
usage for "hash" command. Please refer to the snippet from
http://www.cisco.com/en/US/docs/ios/security/command/reference/sec_f1.html#wp1038298
.

In the case of normal router, it uses the "hash"  specified algorithm to
sign it's self-signed cert.

In the case of CS, it uses the "hash"  specified algorithm to sign the
issued certificate.

Hence, I feel the hash command can't control the fingerprint hash algorithm.
Please let me know, if I am missing something.


*hash (ca-trustpoint) *

The *hash *command in ca-trustpoint configuration mode sets the hash
function for the signature that the Cisco IOS client will use to sign its
self-signed certificates. This hash setting does not specify what kind of
signature the certificate authority (CA) will use when it issues a
certificate to this client.
*hash (cs-server) *

The *hash* command in cs-server configuration mode sets the hash function
for the signature that the Cisco IOS CA will use to sign all of the
certificates issued by the server. If the CA is a root CA, it will use the
hash function in its own, self-signed certificate.

I configured CA server for "hash sha512" and given below is O/P. sha512 is
used for signature

router3#sh crypto pki certificates verbose
CA Certificate
  Status: Available
  Version: 3
  Certificate Serial Number: 0x1
  Certificate Usage: Signature
  Issuer:
    cn=cisco
  Subject:
    cn=cisco
  Validity Date:
    start date: 14:45:34 UTC Sep 20 2010
    end   date: 14:45:34 UTC Sep 19 2013
  Subject Key Info:
    Public Key Algorithm: rsaEncryption
    RSA Public Key: (1024 bit)
  Signature Algorithm: SHA512 with RSA Encryption
  Fingerprint MD5: C35AB75A B7C11609 F5B619C5 DC214253
  Fingerprint SHA1: E4A333F9 1C50C9F9 1B1C6231 632612CA 03B86752
  X509v3 extensions:
    X509v3 Key Usage: 86000000
      Digital Signature
      Key Cert Sign
      CRL Signature
    X509v3 Subject Key ID: B3CC881A 0B4D5E03 14C1DC28 31943D3E A633BC7B
    X509v3 Basic Constraints:
        CA: TRUE
    X509v3 Authority Key ID: B3CC881A 0B4D5E03 14C1DC28 31943D3E A633BC7B
    Authority Info Access:
  Associated Trustpoints: cisco

With regards
Kings

On Mon, Sep 20, 2010 at 7:47 PM, Tyson Scott <[email protected]> wrote:

>  You can configure the hash using the following command:
>
>
>
> R1(ca-trustpoint)#hash ?
>
>   md5     use md5 hash algorithm
>
>   sha1    use sha1 hash algorithm
>
>   sha256  use sha256 hash algorithm
>
>   sha384  use sha384 hash algorithm
>
>   sha512  use sha512 hash algorithm
>
>
>
> R1(ca-trustpoint)#hash
>
>
>
> Thus dependent on the hash you choose the fingerprint from the server must
> match.  Thus to be safe the fingerprint is sent in both sha and md5 format.
>
>
>
> Regards,
>
>
>
> Tyson Scott - CCIE #13513 R&S, Security, and SP
>
> Managing Partner / Sr. Instructor - IPexpert, Inc.
>
> Mailto: [email protected]
>
> Telephone: +1.810.326.1444, ext. 208
>
> Live Assistance, Please visit: www.ipexpert.com/chat
>
> eFax: +1.810.454.0130
>
>
>
> IPexpert is a premier provider of Self-Study Workbooks, Video on Demand,
> Audio Tools, Online Hardware Rental and Classroom Training for the Cisco
> CCIE (R&S, Voice, Security & Service Provider) certification(s) with
> training locations throughout the United States, Europe, South Asia and
> Australia. Be sure to visit our online communities at
> www.ipexpert.com/communities and our public website at www.ipexpert.com
>
>
>
> *From:* Kingsley Charles [mailto:[email protected]]
> *Sent:* Monday, September 20, 2010 10:13 AM
> *To:* Tyson Scott
> *Cc:* [email protected]
> *Subject:* Re: [OSL | CCIE_Security] fingerprint command in a trustpoint
>
>
>
> I am not getting your point Tyson.
>
> With regards
> Kings
>
>  On Mon, Sep 20, 2010 at 7:33 PM, Tyson Scott <[email protected]> wrote:
>
> Doesn't matter.  Both are sent dependent on what you configure.
>
>
>
> Regards,
>
>
>
> Tyson Scott - CCIE #13513 R&S, Security, and SP
>
> Managing Partner / Sr. Instructor - IPexpert, Inc.
>
> Mailto: [email protected]
>
> Telephone: +1.810.326.1444, ext. 208
>
> Live Assistance, Please visit: www.ipexpert.com/chat
>
> eFax: +1.810.454.0130
>
>
>
> IPexpert is a premier provider of Self-Study Workbooks, Video on Demand,
> Audio Tools, Online Hardware Rental and Classroom Training for the Cisco
> CCIE (R&S, Voice, Security & Service Provider) certification(s) with
> training locations throughout the United States, Europe, South Asia and
> Australia. Be sure to visit our online communities at
> www.ipexpert.com/communities and our public website at www.ipexpert.com
>
>
>
> *From:* [email protected] [mailto:
> [email protected]] *On Behalf Of *Kingsley Charles
> *Sent:* Monday, September 20, 2010 9:30 AM
> *To:* [email protected]
> *Subject:* [OSL | CCIE_Security] fingerprint command in a trustpoint
>
>
>
> Hi all
>
> Using "fingerprint" under a trustpoint we can configure the CA server's
> fingerprint. By doing we need not verify the CA's fingerprint interactively
> during enrollment. The CA server gives a sha and md5
> fingerprint. But it seems either sha or md5 fingerprint can be entered
> under the trustpoint.
>
> router1(config)#crypto pki authenticate cisco
> Certificate has the following attributes:
>        Fingerprint MD5: 8D1A8193 2A9408AD B940AC90 74D75C66
>       Fingerprint SHA1: B59A1756 C4DFD302 8AB3A5A1 C5A1F58D 56BFF1BE
> Trustpoint Fingerprint: B59A1756 C4DFD302 8AB3A5A1 C5A1F58D 56BFF1BE
> Certificate validated - fingerprints matched.
> Trustpoint CA certificate accepted.
>
>
> Any thoughts?
>
> With regards
> Kings
>
>
>
_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com

Reply via email to