On Mon, 2015-06-08 at 16:18 +0200, Petr Spacek wrote:
> Update PKCS#11 mechanism constants for AES key wrapping to PKCS#11 v2.40.
> SoftHSM 2.0.0rc1 was updates to these new constants to avoid collision with
> Blowfish mechanisms.
> Older code *cannot* work SoftHSM 2.0.0rc1 and newer.
> Symptoms include errors like this:
> On DNSSEC key master:
> ipa-ods-exporter: _ipap11helper.Error: Error at key wrapping: get buffer
> length: 0x70
> On DNSSEC replicas:
> ipa-dnskeysyncd: subprocess.CalledProcessError: Command
> ''/usr/libexec/ipa/ipa-dnskeysync-replica'' returned non-zero exit status 1
Does this affect domains where some replicas use older versions and some
replicas newer versions ? Or is this a purely local issues confined to a
specific replica ?
Simo Sorce * Red Hat, Inc * New York
Manage your subscription for the Freeipa-devel mailing list:
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code