As am trying to enable the CA rollover on the openxpki.
1)a)Mainly openxpki has the SCEP feature and am trying to generate the 
certificates like
Ca-one –scep-1.crt ,ca-one-vault-1.crt ,ca-root-1.crt ,ca-one-signer-1.crt
Generally in these ca-root-1.crt is the root CA certificate and
Ca-one-signer-1.crt is the intermediate certificate
While am attempting to invoke getca command I will get three certificates like
Ca-one –scep-1.crt 0 cert
ca-root-1.crt , 1 cert
ca-one-signer-1.crt 2 cert
b)After that I have been generating the certificates like
Ca-one –scep-2.crt ,ca-one-vault-2.crt ,ca-root-2.crt ,ca-one-signer-2.crt
Generally in these ca-root-2.crt is the root CA certificate and
Ca-one-signer-2.crt is the intermediate certificate
And am updating the certs not before and not after the valid time like
Openxpkiadm alias –update –realm ca-one –alias ca-one-scep-2 –notbefore “ 
2018-01-01:00:00:00”
While we are attempting to invoke GETNEXTCA command we will get only Root CA 
certificate (means am getting only one certificate,am not getting full trusted 
chain certificates).
Note:
Any idea what I could have done wrong? And what further steps I need to follow 
up?
Thanks & Regards,
Pratik


________________________________
From: Oliver Welter <[email protected]>
Sent: Thursday, December 14, 2017 2:31:40 AM
To: [email protected]
Subject: Re: [OpenXPKI-users] Openxpki server scep support

Hello Pratik,

getnextca currently just delivers the upcoming root and does not handle
upcoming RA certificates. We are working on a SCEP refactoring and will
implement such a functionality likely with this rework, for the moment
there is no configurable way to send the RA certs along.

Oliver


Am 11.12.2017 um 10:17 schrieb Pratheesh Lawrence (UST, MYS):
> Hi,
>
>
> As am trying to configure the certificate for getnextca,
>
> am running the script file and i have generated files like root 2,
> signer 2, vault 2,scep 2
>
> after that am adding all certificate to the future notbeforedate
> Next, importing my new root like
> openxpkiadmcertificate import --file root 2.pem
>
> Then am setting the new alias like
>
>
> openxpki alias --realm ca-one --identifier XXXX --token root 2 --notbefore
> "2020-01-01 00:00:00"
>
> while checking the result with
>
> openxpki alias --realm ca-one
>
> This should look like:
>
> === root ca ===
> current root ca:
>     Alias: root-1
>     Identifier: 9p_FxU-wdTaciZD5lcOIiP-CLxk
> NotBefore: 2015-10-02 09:26:28
> NotAfter  : 2020-10-01 09:26:28
>
> upcoming root ca:
>     Alias: root-2
>     Identifier: Als6THNt9jedxlF5AD0P5a4bhjY
> NotBefore: 2020-10-01 09:26:25 (2006-11-03 07:00:58)
> NotAfter  : 2020-10-01 09:26:28 (2036-11-03 07:00:58)
>
>
> But the problem is while am trying to invoke the command getnextCA am
> getting only root 2 CA certificate
>
> Am not able to get the Intermediate CA,May i need to change any other
> configurations to get full trust chain certificates for getnextCA.
>
>
> Thanks,
>
> pratik
>
> ------------------------------------------------------------------------
> *From:* Oliver Welter <[email protected]>
> *Sent:* Friday, December 8, 2017 2:27:23 AM
> *To:* [email protected]
> *Subject:* Re: [OpenXPKI-users] Openxpki server scep support
> Hello Roni,
>
> I think you are mixing up some terms - please consider to read up some
> PKI basics on what a root cert is, how certificate chains work and the
> functionality of SCEP. This is beyond the scope of this mailinglist.
>
> Oliver
>
> Am 08.12.2017 um 05:04 schrieb Roni Joseph:
>> Thanks Oliver. I will try this and let you know. Couple of clarifications.
>>
>>  >>
>> To configure the certificate for getnextca, you must add a
>> root-certificate with a future notbefore date. First, import your new root
>>
>> openxpkiadm certificate import --file rootca2.pem
>>
>>    [Roni] When you say import new rootca cert, who is the issuer of this
>> new rootca cert? The current rootca cert  I have  is the intermediate
>> subca cert generated  (openssl)while running sampleconfig.sh.
>>    Do we need to have the rollover RA cert, to get the future ID cert
>> GetNewCert)?
>>   For getcertintial to work over scep, the router cert should be created
>> via GUI, and in approved state?
>> Any design guide on what format  openxpki (scep)  expects/responds for
>> "GetNextCaCert" messages.
>>
>> Thanks,
>> Roni
>>
>> On Thu, Dec 7, 2017 at 10:42 PM, Oliver Welter <[email protected]
>> <mailto:[email protected]>> wrote:
>>
>>     Hi Roni,
>>
>>     if you can get the RA/CA cert then the SCEP subsystem is working. I
>>     assume you mean GetCertInitial - this will only fetch an EXISTING
>>     certificate, to enroll for a new certificate you need to create a
>>     CSR on your local machine and send it to the PKI. An example using
>>     the sscep tool is provided on the quickstart page
>>     
>> http://openxpki.readthedocs.io/en/latest/quickstart.html#enabling-the-scep-service
>>     
>> <http://openxpki.readthedocs.io/en/latest/quickstart.html#enabling-the-scep-service>
>>
>>     To configure the certificate for getnextca, you must add a
>>     root-certificate with a future notbefore date. First, import your
>>     new root
>>
>>     openxpkiadm certificate import --file rootca2.pem
>>
>>     Then set a new alias in the root group with an adminstratively
>>     overriden notbefore date (you can omit this if the certificate has a
>>     notbefore date in the future itself)
>>
>>     openxpki alias --realm ca-one --identifier XXXX --token root
>>     --notbefore "2020-01-01 00:00:00"
>>
>>     You can check the result with
>>
>>     openxpki alias --realm ca-one
>>
>>     This should look like:
>>
>>     === root ca ===
>>     current root ca:
>>        Alias      : root-1
>>        Identifier: 9p_FxU-wdTaciZD5lcOIiP-CLxk
>>        NotBefore: 2015-10-02 09:26:28
>>        NotAfter  : 2020-10-01 09:26:28
>>
>>     upcoming root ca:
>>        Alias      : root-2
>>        Identifier: Als6THNt9jedxlF5AD0P5a4bhjY
>>        NotBefore: 2020-10-01 09:26:25 (2006-11-03 07:00:58)
>>        NotAfter  : 2020-10-01 09:26:28 (2036-11-03 07:00:58)
>>
>>     Oliver
>>     --
>>     Protect your environment -  close windows and adopt a penguin!
>>
>>
>>     
>> ------------------------------------------------------------------------------
>>     Check out the vibrant tech community on one of the world's most
>>     engaging tech sites, Slashdot.org! http://sdm.link/slashdot
>>     _______________________________________________
>>     OpenXPKI-users mailing list
>>     [email protected]
>>     <mailto:[email protected]>
>>     https://lists.sourceforge.net/lists/listinfo/openxpki-users
>>     <https://lists.sourceforge.net/lists/listinfo/openxpki-users>
>>
>>
>>
>>
>> ------------------------------------------------------------------------------
>> Check out the vibrant tech community on one of the world's most
>> engaging tech sites, Slashdot.org! http://sdm.link/slashdot
>>
>>
>>
>> _______________________________________________
>> OpenXPKI-users mailing list
>> [email protected]
>> https://lists.sourceforge.net/lists/listinfo/openxpki-users
>>
>
>
> --
> Protect your environment -  close windows and adopt a penguin!
>
>
>
> ------------------------------------------------------------------------------
> Check out the vibrant tech community on one of the world's most
> engaging tech sites, Slashdot.org! http://sdm.link/slashdot
>
>
>
> _______________________________________________
> OpenXPKI-users mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/openxpki-users
>


--
Protect your environment -  close windows and adopt a penguin!

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
OpenXPKI-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/openxpki-users

Reply via email to