Hi, After digging for days, i have found out that SCEP does not support EC keys, and changing the cert to a RSA based helped allot. However, not I am stuck at a workflow problem and I dont have a clue where to start.
Could someone point me in the right direction? root@internal-ca02:/etc/openxpki/scep# cat default.conf [global] log_config = /etc/openxpki/scep/log.conf log_facility = client.scep service=LibSCEP socket=/var/openxpki/openxpki.socket realm=netic iprange=0.0.0.0/0 servername=generic encryption_algorithm=3DES hash_algorithm=SHA256 root@internal-ca02:/etc/openxpki/config.d/realm/netic/scep# cat generic.yaml # By default, all scep endpoints wll use the default token defined # by the scep token group, if you pass a name here, it is considered # a group name from the alias table #token: scep-altra # A renewal request is only accpeted if the used certificate will # expire within this period of time. renewal_period: 000060 # If the request was a replacement, optionally revoke the replaced # certificate after a grace period revoke_on_replace: reason_code: keyCompromise delay_revocation_time: +000014 workflow: type: certificate_enroll param: # key: name in workflow context, value: parameter from scep wrapper # server and interface are always set, the mapping below is # the default set that is used when no map is given transaction_id: transaction_id signer_cert: signer_cert pkcs10: pkcs10 _url_params: url_params #_pkcs7: pkcs7 authorized_signer: rule1: # Full DN subject: CN=.+:pkiclient,.* # rule2: # Full DN # profile: netic_server # realm: netic # subject: CN=my.scep.enroller.com:generic,.* policy: # Authentication Options # Initial requests need ONE authentication. # Activate Challenge Password and/or HMAC by setting the appropriate # options below. # if set requests can be authenticated by an operator allow_man_authen: 1 # if set, no authentication is required at all and hmac/challenge is # not evaluated even if it is set/present in the request! allow_anon_enroll: 1 # Approval # If not autoapproved, allow opeerator to add approval by hand allow_man_approv: 1 # if the eligibiliyt check failed the first time # show a button to run a recheck (Workflow goes to PENDING) allow_eligibility_recheck: 1 # Approval points requirede (eligibity and operator count as one point each) # if you set this to "0", all authenticated requests are auto-approved! approval_points: 1 # The number of active certs with the same subject that are allowed # to exist at the same time, deducted by one if a renewal is seen # set to 0 if you dont want to check for duplicates at all max_active_certs: 1 # option will be removed # allow_expired_signer: 0 # If an initial enrollment is seen # all existing certificates with the same subject are revoked auto_revoke_existing_certs: 1 # allows a "renewal" outside the renewal window, the notafter date # is aligned to the old certificate. Set revoke_on_replace option # to revoke the replaced certificate. # This substitutes the "replace_window" from the OpenXPKI v1 config allow_replace: 1 response: # The scep standard is a bit unclear if the root should be in the chain # or not. We consider it a security risk (trust should be always set # by hand) but as most clients seem to expect it, we include the root # by default. # The getca response contains the certificate of the SCEP server itself # and of the current active issuer (which can but need not to be the same!) # You can define weather to have only the certificate itself (endentity), # the chain without the root (chain) or the chain including the root # (fullchain). # Note: The response is cached internally in the datapool so changes # will not show up immediately - to list the cached items use # openxpkicli list_data_pool_entries --arg namespace=scep.cache.getca # You can delete by setting the empty string as value with # set_data_pool_entry (value="" force=1) getca: ra: fullchain issuer: fullchain profile: cert_profile: netic_server cert_subject_style: enroll # Mapping of names to OpenXPKI profiles to be used with the # Microsoft Certificate Template Name Ext. (1.3.6.1.4.1.311.20.2) profile_map: pc-client: netic_user # HMAC based authentication hmac: Netic! challenge: value: Netic! eligible: initial: value@: connector:scep.generic.connector.initial args: '[% context.cert_subject_parts.CN.0 %]' expect: - Build - New renewal: value: 1 onbehalf: value: 1 connector: initial: class: Connector::Proxy::YAML # this file must have a key/value list with the key being # the subject and the value being a true value # e.g. "pc1234.example.org: 1" LOCATION: /etc/openxpki/cmdb.yaml scep.log: 2021/01/29 12:34:50 INF Incoming request from 192.168.96.1 with GetCACaps [pid=81] 2021/01/29 12:34:50 DEB Response send [pid=81] 2021/01/29 12:34:50 INF Incoming request from 192.168.96.1 with PKIOperation [pid=81] 2021/01/29 12:34:50 ERR SCEP response is empty [pid=81] catch-all.log: 2021/01/29 13:35:17 openxpki.application.INFO LibSCEP PKIOperation; message type: PKCSReq [pid=57|sid=PYVL] 2021/01/29 13:35:17 openxpki.application.INFO SCEP incoming request, id 60107490989072451039833240777151525638461989712167481202488830552887682520023 [pid=57|sid=PYVL|sceptid=60107490989072451039833240777151525638461989712167481202488830552887682520023] 2021/01/29 13:35:17 openxpki.system.ERROR I18N_OPENXPKI_SERVICE_LIBSCEP_COMMAND_PKIOPERATION_PARALLEL_REQUESTS_DETECTED; __DPSTATE__ => creating, __SERVER__ => generic, __TRANSACTION_ID__ => 60107490989072451039833240777151525638461989712167481202488830552887682520023 [pid=57|sid=PYVL|sceptid=60107490989072451039833240777151525638461989712167481202488830552887682520023] 2021/01/29 13:35:17 openxpki.system.ERROR Error executing SCEP command 'PKIOperation': I18N_OPENXPKI_SERVICE_LIBSCEP_COMMAND_PKIOPERATION_PARALLEL_REQUESTS_DETECTED; __DPSTATE__ => creating, __SERVER__ => generic, __TRANSACTION_ID__ => 60107490989072451039833240777151525638461989712167481202488830552887682520023 [pid=57|sid=PYVL|sceptid=60107490989072451039833240777151525638461989712167481202488830552887682520023] Med venlig hilsen / Best regards *Netic A/S* Per Abildgaard Toft Senior Consultant Mail p...@netic.dk Telefon +45 7777 0861 Web http://netic.dk
_______________________________________________ OpenXPKI-users mailing list OpenXPKI-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openxpki-users