1) ./configure options make make install-online make install-ca
2) setting dataexchange to 6 (the node acts as RA and CA) ./configure_etc.sh ./openca_start
3) Initialization: a) Initialize Database b) Generate new CA secret key c) Generate new CA certificate request d) Self signed CA certificate e) Rebuild CA Chain f) Export Configuration --> to floppy
Could someone clarify what the steps should be from here, to initialize a CA and an RA operator when both CA and RA are running on the same machine.
When I attempt to retrieve the CA certificate, I only get one. In most examples that I read in this list, there are two certificates that are delivered to the sscep client.
Thanks NB
From: dalini <[EMAIL PROTECTED]> Reply-To: [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: Re: [Openca-Users] SSCEP segmentation fault upon enroll Date: Sat, 28 Feb 2004 04:02:16 +0100
Nilgiris BlueMountain wrote:I did a cvs update today and the segmentation fault persists. Here is how I invoked sscep:
./sscep enroll -c ca.crt -k local.key -r local.csr -l local.crt -u http://caserver/cgi-bin/scep/scep
./sscep: sending certificate request
./sscep: valid response from server
Segmentation fault
yeah, looks like u send a wrong request - and sscep can't decode the wrong answer... if u use the scep interface - this is usally like an ra/ca case in scep language... since at least i use extra certificates for the scep interface
so ur call above implies a direct connection to the ca - this isn't the case with common openca-scep installation
i also recommend to use a conf file - like the example sscep.conf u just have to adopt to match ur setup...
and than call like: ./sscep getca -f my.conf ./sscep enroll -f my.conf
this is mutch easier to handle and to reproduce ;o) i have added an example configuration of mine
u shouldt adoppt the paths at least - everything else should be fine... maybe the name of the files generated by mkrequest ;o)
the -0 and -1 are correct - since sscep creates two ca-files when it gets more than one... should just work like setup otherwise you have to change the 0 and the 1...
i just tested this - with not the newest sscep client but actual cvs code - just works fine
this lookes fine ;o)For sscep operations, my order of operation was: 1. getca 2. enroll
greetings dalini
# # sscep.conf -- configuration file for SSCEP # # All configuration options are key-value pairs separated with one # or more space characters: # # "Key" [spaces] "Value" # # Quotation marks are optional - they are needed only if the value contains # space characters (space or tab). Quotation marks inside the value string # must be escaped using a backslash: # # "Key" [spaces] "Value \"containing quotation marks\"" # # Comment lines (lines starting with '#') and empty lines are discarded. #
# # Common options for all operations # # URL of the SCEP server. URL http://10.128.2.5/pki/ra-001/cgi-bin/scep/scep
# Use HTTP proxy server #Proxy localhost:8080
# This is one is needed with all operations. CACertFile /usr/local/pki/tools/sscep/cacert.crt-1
# Possible values: yes or no. Verbose yes Debug yes
# # Options for getca # # Some CAs require you to define this #CAIdentifier "CA Identifier"
# Display fingerprint algorithm (md5/sha1) FingerPrint md5
# # Common options for enroll, getcert and getcrl # # Private key created with mkrequest PrivateKeyFile /usr/local/pki/tools/sscep/local.key
# Where to write successfully enrolled certificate LocalCertFile /usr/local/pki/tools/sscep/local.crt
# If your CA/RA uses a different certificates for encyption # and signing, define this EncCertFile /usr/local/pki/tools/sscep/cacert.crt-0
# PKCS#7 encryption/signing # Note: this could be very misleading, current SCEP draft provides no # mechanism to "negotiate" the algorithm - even if you send 3des, reply # might be des.
# Encryption algorithm: des, 3des or blowfish. Default: des #EncAlgorithm 3des # Signature algorithm: md5 or sha1. Default: md5 #SigAlgorithm sha1
# # Options for enroll #
# Certificate request file created with mkrequest CertReqFile /usr/local/pki/tools/sscep/local.csr
# Write optionally the selfsigned certificate in file #SelfSignedFile ./selfsigned.crt
# Poll periodically for pending certificate (seconds) PollInterval 5
# Maximum polling time MaxPollTime 28800
# Maximum polling count MaxPollCount 256
# # Options for getcert # # Certificate serial number (decimal) GetCertSerial 1
# Write certificate as GetCertFile /usr/local/pki/tools/sscep/cert.crt
# # Options for getcrl # # Write CRL as GetCrlFile /usr/local/pki/tools/sscep/crl.crl
_________________________________________________________________
Find and compare great deals on Broadband access at the MSN High-Speed Marketplace. http://click.atdmt.com/AVE/go/onm00200360ave/direct/01/
------------------------------------------------------- SF.Net is sponsored by: Speed Start Your Linux Apps Now. Build and deploy apps & Web services for Linux with a free DVD software kit from IBM. Click Now! http://ads.osdn.com/?ad_id=1356&alloc_id=3438&op=click _______________________________________________ Openca-Users mailing list [EMAIL PROTECTED] https://lists.sourceforge.net/lists/listinfo/openca-users
