Hi Martin,

we have changed the default path to the key files from ssl/ to ca/ - as this wont affect existing installs as long as you keep the old configuration we did not mention that explicitly in the release notes.

You can find the path spec for the keys in the realms crypto.yaml, so please review whats in there now and put your key files (or symlinks) accordingly.

Our policy is to keep unmodified config working within the same major version but there might be changes to improve things in between that will break existing installs when you just upgrade your config, so its advised to use e.g. git and review the changes. You might have a look at the openxpki-config repo, we try to make the changed in the config transparent here to easy this process.

best regards

Oliver

Am 17.08.19 um 09:49 schrieb Martin Krämer:
Hello all,

think I have found the issue.
Checking logfiles I got the following errors:
ERROR I18N_OPENXPKI_CRYPTO_OPENSSL_COMMAND_ISSUE_CRL_KEYFILE_DOES_NOT_EXIST; __KEYFILE__ => /etc/openxpki/ca/example-corp/ca-signer-1.pem system.crypto.ERROR OpenSSL error: Error opening signing key file /etc/openxpki/ca/example-corp/vault-1.pem

After creating corresponding symlinks the errors were gone.
Never the less in my other test environment there do no symlinks like these exist, too.
(And everythings working fine with same release version...)
Only previous symlinks named:
     /etc/openxpki/ssl/<realm>/<realm>-signer-1.pem
     /etc/openxpki/ssl/<realm>/<realm>-vault-1.pem
     /etc/openxpki/ssl/<realm>/<realm>-scep-1.pem
So maybe that is something I have missed within release notes and that were "fixed" automagic when upgrade took place from older version/ no new install.

Never the less you can see that there was a third symlink for "scep".
I have not found an error message accordingly, but expecting my scep will not work, too. Is that correct? If yes where do I have to create the symlink for scep/how is it named?

Thanks for support.

Am Fr., 16. Aug. 2019 um 18:10 Uhr schrieb Martin Krämer <[email protected] <mailto:[email protected]>>:

    Hello all,

    I have just setup a new openxpki test environment using certificates
    already existing on another (not connected / reachable) openxpki
    test environment.
    Unfortunately the web interface system status shows me that
    ca-signer-1 (certsign) and vault-1 (datasafe) are both offline.
    Additionally I see the message "CRL expired - update required!!
    (What I think is a following error of previous two tokens being
    offline.)

    I have checked the forum and found that this is mostly caused by:
    1. invalid key password within crypto.yaml
    2. invalid permissions to .crt / .key files.
    So I checked both and found that 1. is correct.
    With 2. I am not exactly sure what are the correct permissions.
    Maybe someone can help me on this? (see my current permissions below).

    My system is:
    OS: Debian Jessie 8.11
    openxpki system version: 2.5.5
    openxpki package: debian-2.4
    openxpki config: 2.4
    openxpki commit: 0abcde

    Currently permissions are set as follows:

    /root@openxpki-000001:~# ls -la /etc/openxpki/ssl/example-corp/
    total 116
    drwxr-x--- 3 openxpki root 4096 Aug 16 10:18 .
    drwxr-x--- 3 openxpki root 4096 Aug 16 10:13 ..
    -rwxr-x--- 1 openxpki root 2037 Aug 16 10:13
    example-corp_2019-04_DataVault.crt
    -rwxr-x--- 1 openxpki root 3394 Aug 16 10:13
    example-corp_2019-04_DataVault.key
    -rwxr-x--- 1 openxpki root 8731 Aug 16 10:13
    example-corp_2019-04_Issuing-CA.crt
    -rwxr-x--- 1 openxpki root 1773 Aug 16 10:13
    example-corp_2019-04_Issuing-CA.csr
    -rwxr-x--- 1 openxpki root 3406 Aug 16 10:13
    example-corp_2019-04_Issuing-CA.key
    -rwxr-x--- 1 openxpki root 2013 Aug 16 10:13
    example-corp_2019-04_Root-CA.crt
    -rwxr-x--- 1 openxpki root 3394 Aug 16 10:13
    example-corp_2019-04_Root-CA.key
    -rwxr-x--- 1 openxpki root 6847 Aug 16 10:13
    example-corp_2019-04_Scep-RA.crt
    -rwxr-x--- 1 openxpki root 1752 Aug 16 10:13
    example-corp_2019-04_Scep-RA.csr
    -rwxr-x--- 1 openxpki root 3394 Aug 16 10:13
    example-corp_2019-04_Scep-RA.key
    -rwxr-x--- 1 openxpki root 8578 Aug 16 10:13
    example-corp_2019-04_Web.crt
    -rwxr-x--- 1 openxpki root 1744 Aug 16 10:13
    example-corp_2019-04_Web.csr
    -rwxr-x--- 1 openxpki root 3394 Aug 16 10:13
    example-corp_2019-04_Web.key
    lrwxrwxrwx 1 root     root   63 Aug 16 10:18 example-corp-scep-1.pem
    -> /etc/openxpki/ssl/example-corp/example-corp_2019-04_Scep-RA.key
    lrwxrwxrwx 1 root     root   66 Aug 16 10:18
    example-corp-signer-1.pem ->
    /etc/openxpki/ssl/example-corp/example-corp_2019-04_Issuing-CA.key
    lrwxrwxrwx 1 root     root   65 Aug 16 10:18
    example-corp-vault-1.pem ->
    /etc/openxpki/ssl/example-corp/example-corp_2019-04_DataVault.key
    drwxr-x--- 2 openxpki root 4096 Aug 16 10:13 .openssl/
    /root@openxpki-000001:~# ls -la
    /etc/openxpki/config.d/realm/example-corp/crypto.yaml
    -r-------- 1 openxpki root 1553 Aug 16 15:52
    /etc/openxpki/config.d/realm/example-corp/crypto.yaml/

    Thanks for any help.

    Kind Regards
    Martin






_______________________________________________
OpenXPKI-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/openxpki-users



--
Protect your environment -  close windows and adopt a penguin!


_______________________________________________
OpenXPKI-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/openxpki-users

Reply via email to