Hi again, I have found the stuck workflow in the db and removed it.
sscep enroll -u http://internal-ca/scep -k local.key -r local.csr -c ca.crt-0 -l local.crt -t 10 -n 1 -v I am back of an error I have seen many times before, which is a workflow error. ==> scep.log <== 2021/02/02 07:37:23 INF Incoming request from 192.168.96.1 with GetCACaps [pid=137] 2021/02/02 07:37:23 DEB Response send [pid=137] 2021/02/02 07:37:23 INF Incoming request from 192.168.96.1 with GetCACert [pid=137] 2021/02/02 07:37:23 DEB Response send [pid=137] 2021/02/02 07:37:35 INF Incoming request from 192.168.96.1 with GetCACaps [pid=137] 2021/02/02 07:37:35 DEB Response send [pid=137] 2021/02/02 07:38:02 INF Incoming request from 192.168.96.1 with GetCACaps [pid=137] 2021/02/02 07:38:02 DEB Response send [pid=137] 2021/02/02 07:38:02 DEB Got PKIOperation via POST [pid=137] 2021/02/02 07:38:02 DEB Decoded SCEP message MIIK2gYJKoZIhvcNAQcCoIIKyzCCCscCAQExDjAMBggqhkiG9w0CBQUAMIIFtQYJKoZIhvcNAQcB oIIFpgSCBaIwggWeBgkqhkiG9w0BBwOgggWPMIIFiwIBADGCAm4wggJqAgEAMFIwOjELMAkGA1UE BhMCREsxDjAMBgNVBAoMBU5ldGljMRswGQYDVQQDDBJOZXRpYyBJc3N1aW5nIENBIDECFCCSBv0t VmOdGR3VEJIlZf9RO6DKMA0GCSqGSIb3DQEBAQUABIICAF6Uc86LQrDB3sSRxGfXKDYIRayNQ9HE 9mFiN9Pg2kPUwpiK+Prin9Gkhm5KpqZ0/sJDEjkKUfRrSc4bUwJLvyWWFvF5j4NynffFyaDi9MuW C1NL3/iL1ubZr7LN3DztbKBRkLkBefqlyrKVF9dUy2gzlumf7loj+LjHexo1n75sTeHalbjUVbJy 4q79XyH9GQrD1fX2+AU3c2j51oerps/lXizptVFFvPvHFWpr3C8hN2wq2Uo4l9ZCW+csrz6LGB+Z 56EvXm45hWV9OltJxnd90hioMvxJUWevBPb+KOf1F+XeFz91M0stNWG6efbQdheZmbKwnK1kkOCm Xs5Dd4w+P3Xv2vc10it1cRakFFlTSJ8xQJzF/s88uY2Ly1G608QGJsSmY2blOS7yDD6mSVzWOapV LHV6OiaYYeC6kU6HVbOkEKZQD8vFL5rGpo9W/cv1DelW8iu9yXyOj4NaJp1hhp7RUpYWC+OtCREh DEeqY864uKnQeI6mLAjJ8kCVu0LWDTW1ECqnChluHiJHQ445QPc3ssw+4kMv4UsIy3ueQxwYI4gg xUSZH1xlgki0Qci8fBqGj2ns45RUdY54YuO+fqyu5b5prtFrIM7HRQwv4G/Cn/s3YZ4RoCkTIiJP KehRiGi6vmKyZ02fFXdAk3CxQC/H/4J8qCkySRGgQcxbMIIDEgYJKoZIhvcNAQcBMBEGBSsOAwIH BAjEFcTsAQyamICCAvAKcSSrcCCecmNATQUiiP4SuDG3hVdlLq7nv5WqPDSynpCbG0zqz3f7Sm4y fE5lEuATpKRqachqO/j3W6qao22wVAzN89UALxm4/qeNOfLZ8JmdXdSAtXWoJiEe+JTiKW8On95U Qa37MGpCnoKaXfDx72QvOYqsC57rBtKbYsN87qrBBfMY2lp4/5XsjtnbTT8pmwjTQ5mzz1VqYAUS hU2Ajn0ErOb5g/JNzdwBNfA9z+vkGmBOWXQ/uUJd0G+m2k0Bwx4q2uVFRsJuu2R6Sf8klIrh9q+I GiemXgfZZyPHhybcSrWkd9uv1TSVTUQ9f4oX3hyk2lMGgPEmiGQujVg0bN5Ce4Q2WEKEOSNs6j8Y QM+FD62WG5zOc5RD8LcHaWMr5mMw6wLbDPNFgexlNeC5NIeEEO76mHkw6RGCFuvg77TM1Bnr1E6b yCMElP04hjNO+eKPkKrIqKSCsDDNt6YgyUX8TcfLLft9VTD7m6zd0kkc6fbvm90LugFTeKMQDa5b Df4py1n52KonZlu2Shb4m50NxJSertglI6xV8xJadlKlAqm3h22o9q2M+qQTemdRE8o/xY9gkbhB 88UYHROj3QH5Ho7PiSeU7jnlFUdFaXxpqif3QllCUqJKyj3XdwFdWgCa8P2eHogURlDXetIUp0Iw D6ik8o6fAEFFif1qUgPIsr9PemM3aQB7C0GTY6aIKzP0tPhiK2oczCURZ3/nKG6dNdDJbUUw7dlH xHHVqejVh3XYLJjp5cS3C+vVTeLPxAxPH1cQ9TsXwIRn3Xx+iKkskkAJC9VXCiCuVUU+xHuJGADG i30Cz3PvQZP32tSW25LNDy7JalJTHJdZrZ0yOHNTeqn/ofgJnSRd+sCwogCkqAqrZdZ9/WswhYv9 Zuz9BCUojEixbDlFnNFz8eaFSPrpuvZl4X6nAQwTFAuwZw4iZePo9ZXsl3C31lMlTlZSN2K/e8+/ E6LGBMMflkh+1gsww7PUI5DbOW5mzfFGRqCCAsowggLGMIIBrqADAgECAiAyQzQzQUJDMjE4MjBC QjQ3MzVGMTVGMDA3NkNEMUI5ADANBgkqhkiG9w0BAQQFADAXMRUwEwYKCZImiZPyLGQBGRYFTmV0 aWMwHhcNMjEwMjAyMDczODAyWhcNMjEwMjA4MDkzODAyWjAXMRUwEwYKCZImiZPyLGQBGRYFTmV0 aWMwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQD5AIGwxG9kG2Dzgi/+P0C8lYe6ic7K l0QcA3hONi/OPGPyAnFJViLVtMaHrEBTCDVpAKzYEKoBo+WDtXxjZfhBPRPucaB5dxpBII6YAcTx pi1K1D5hS1v0mToVdPQ8tmXRlQ6eScJ455TOScVrSsi62GyZclOpyn7Wmgp80ZDbstvZrkuKkQAS 5GZLjkjwbfBUrHlIdjg3tNniancyVjl18oPjsvYR4dqj1zRQnb6G3EFGvVKtf66oH54a9TUkRKhj PRkyV8v56soUtAI7XdFOL/TTXQ10/Xc9AiGER55leQEPExgcxAn8xcTbMDsi46zFXUaOCaFl5Idf bn8zyIbhAgMBAAEwDQYJKoZIhvcNAQEEBQADggEBAFkCMqs1uBcCTTyZJ2vpL9vagA7ztVq6hMGy 1LgdZO7i0DbCh+ae/NLUbGKKALtifFOtZee4JXrsD9wfm/EHY0mSOGYyQn6TWXXjesufXZktn1ae reNKnzCWnaCyREF+JZdUkvMzeT6h/RGkUv4vxLv5Somnu9g06mCSG8FU6wWA9Deulj7pjI27chhx ms9RoODew7/lM1KLPZ6YA9joGOjCDtkBqZDoKlDf2VgHOn8zVkuH9usgpxtgTfqGcml1sMC2WTYb u3lub4j/yS+hI5Q2yhfMJ3RLnCfRwoXUJZsVPGAmvfR8YFh0+FhgAdeYe2tdT7fUqW++qTTctO9N 0cQxggIpMIICJQIBATA7MBcxFTATBgoJkiaJk/IsZAEZFgVOZXRpYwIgMkM0M0FCQzIxODIwQkI0 NzM1RjE1RjAwNzZDRDFCOQAwDAYIKoZIhvcNAgUFAKCBwTASBgpghkgBhvhFAQkCMQQTAjE5MBgG CSqGSIb3DQEJAzELBgkqhkiG9w0BBwEwHAYJKoZIhvcNAQkFMQ8XDTIxMDIwMjA3MzgwMlowHwYJ KoZIhvcNAQkEMRIEECzAlKpDVeOQpFjZYlKsIUIwIAYKYIZIAYb4RQEJBTESBBC3jX3Ol+UA+LM9 ellaQDGhMDAGCmCGSAGG+EUBCQcxIhMgMkM0M0FCQzIxODIwQkI0NzM1RjE1RjAwNzZDRDFCOTcw DQYJKoZIhvcNAQEBBQAEggEAAwNSAdp56Cuuh/NznJOSfgsOPj6s1MW9Q2FQxIYtFAdcdAQy5Cfq 4RjzJMeG1y9zui8vrqlFghlWZ7keFI+oMq0pB881lq+hgKPKQXUt52xDWnMp02NP5JRHSmUwxjsF PuI7zWW8j76vJt1sFXbkKNYEaxi0gMH2CuvB2pyH+BXMd3G0fP8xolRwJoMd2hMKZZUkNpgUUo3B 1WQ7wDT3jgaHL8GcIYNmc/rATMrnbjEzn1RhNshUPwiPYWIBQObt1Qs4R+QMhJqjxxSv7BgVBzW0 gfJGO7HVmPA3+C0VU6ateLOZ/1kr/dm+CdmBk+1MKlkey/H6S21F4am86GL7gA== [pid=137] 2021/02/02 07:38:02 INF Incoming request from 192.168.96.1 with PKIOperation [pid=137] ==> catchall.log <== 2021/02/02 08:38:03 openxpki.application.INFO LibSCEP PKIOperation; message type: PKCSReq [pid=38|sid=raGB] 2021/02/02 08:38:03 openxpki.application.INFO SCEP incoming request, id 2C43ABC21820BB4735F15F0076CD1B97 [pid=38|sid=raGB|sceptid=2C43ABC21820BB4735F15F0076CD1B97] 2021/02/02 08:38:03 openxpki.application.INFO SCEP try to start new workflow for 2C43ABC21820BB4735F15F0076CD1B97 [pid=38|sid=raGB|sceptid=2C43ABC21820BB4735F15F0076CD1B97] ==> openxpki.log <== 2021/02/02 08:38:03 ERROR I18N_OPENXPKI_SERVER_WORKFLOW_VALIDATION_FAILED_ON_EXECUTE; __ACTION__ => enroll_initialize, __ERROR__ => I18N_OPENXPKI_UI_VALIDATOR_FIELD_TYPE_INVALID, __FIELDS__ => Array(HASH(0x556c41083b50)) [pid=38|sid=raGB|wftype=certificate_enroll|wfid=7935|sceptid=2C43ABC21820BB4735F15F0076CD1B97] ==> catchall.log <== 2021/02/02 08:38:03 openxpki.system.ERROR I18N_OPENXPKI_SERVER_WORKFLOW_VALIDATION_FAILED_ON_EXECUTE; __ACTION__ => enroll_initialize, __ERROR__ => I18N_OPENXPKI_UI_VALIDATOR_FIELD_TYPE_INVALID, __FIELDS__ => Array(HASH(0x556c41083b50)) [pid=38|sid=raGB|wftype=certificate_enroll|wfid=7935|sceptid=2C43ABC21820BB4735F15F0076CD1B97] ==> openxpki.log <== 2021/02/02 08:38:03 ERROR Error executing workflow activity 'enroll_initialize' on workflow id 7935 (type certificate_enroll): I18N_OPENXPKI_SERVER_WORKFLOW_VALIDATION_FAILED_ON_EXECUTE; __ACTION__ => enroll_initialize, __ERROR__ => I18N_OPENXPKI_UI_VALIDATOR_FIELD_TYPE_INVALID, __FIELDS__ => Array(HASH(0x556c41083b50)) [pid=38|sid=raGB|wftype=certificate_enroll|wfid=7935|sceptid=2C43ABC21820BB4735F15F0076CD1B97] ==> catchall.log <== 2021/02/02 08:38:03 openxpki.workflow.ERROR Error executing workflow activity 'enroll_initialize' on workflow id 7935 (type certificate_enroll): I18N_OPENXPKI_SERVER_WORKFLOW_VALIDATION_FAILED_ON_EXECUTE; __ACTION__ => enroll_initialize, __ERROR__ => I18N_OPENXPKI_UI_VALIDATOR_FIELD_TYPE_INVALID, __FIELDS__ => Array(HASH(0x556c41083b50)) [pid=38|sid=raGB|wftype=certificate_enroll|wfid=7935|sceptid=2C43ABC21820BB4735F15F0076CD1B97] ==> openxpki.log <== 2021/02/02 08:38:03 ERROR Error executing SCEP command 'PKIOperation': I18N_OPENXPKI_SERVER_WORKFLOW_VALIDATION_FAILED_ON_EXECUTE; __ACTION__ => enroll_initialize, __ERROR__ => I18N_OPENXPKI_UI_VALIDATOR_FIELD_TYPE_INVALID, __FIELDS__ => Array(HASH(0x556c41083b50)) [pid=38|sid=raGB|sceptid=2C43ABC21820BB4735F15F0076CD1B97] ==> catchall.log <== 2021/02/02 08:38:03 openxpki.system.ERROR Error executing SCEP command 'PKIOperation': I18N_OPENXPKI_SERVER_WORKFLOW_VALIDATION_FAILED_ON_EXECUTE; __ACTION__ => enroll_initialize, __ERROR__ => I18N_OPENXPKI_UI_VALIDATOR_FIELD_TYPE_INVALID, __FIELDS__ => Array(HASH(0x556c41083b50)) [pid=38|sid=raGB|sceptid=2C43ABC21820BB4735F15F0076CD1B97] ==> scep.log <== 2021/02/02 07:38:03 ERR SCEP response is empty [pid=137] To my understanding, its an error spawning the workflow. Error executing workflow activity 'enroll_initialize' on workflow id 7935 (type certificate_enroll): I can't find the workflow in the GUI or in the db. The scep config is default and the config points at default tls_server profile Is it possible to enable debugging so I can get an idea of why the workflow fails? Med venlig hilsen / Best regards *Netic A/S* Per Abildgaard Toft Senior Consultant Mail p...@netic.dk Telefon +45 7777 0861 Web http://netic.dk On Mon, Feb 1, 2021 at 7:19 PM Oliver Welter <m...@oliwel.de> wrote: > Hi, > > this means that a second request with the same CSR hits the server before > the first one has written the needed artefacts for a "pickup" to the > database - or - that the first workflow crashed while writing to the > database. Check your workflow logs for problems with the workflow. > > Oliver > > Am 29.01.21 um 13:39 schrieb Per Abildgaard Toft: > > Hi, > > After digging for days, i have found out that SCEP does not support EC > keys, and changing the cert to a RSA based helped allot. However, not I am > stuck at a workflow problem and I dont > have a clue where to start. > > Could someone point me in the right direction? > > > root@internal-ca02:/etc/openxpki/scep# cat default.conf > [global] > log_config = /etc/openxpki/scep/log.conf > log_facility = client.scep > > service=LibSCEP > socket=/var/openxpki/openxpki.socket > realm=netic > iprange=0.0.0.0/0 > servername=generic > encryption_algorithm=3DES > hash_algorithm=SHA256 > > root@internal-ca02:/etc/openxpki/config.d/realm/netic/scep# cat > generic.yaml > # By default, all scep endpoints wll use the default token defined > # by the scep token group, if you pass a name here, it is considered > # a group name from the alias table > #token: scep-altra > > # A renewal request is only accpeted if the used certificate will > # expire within this period of time. > renewal_period: 000060 > > # If the request was a replacement, optionally revoke the replaced > # certificate after a grace period > revoke_on_replace: > reason_code: keyCompromise > delay_revocation_time: +000014 > > > workflow: > type: certificate_enroll > param: > # key: name in workflow context, value: parameter from scep wrapper > # server and interface are always set, the mapping below is > # the default set that is used when no map is given > transaction_id: transaction_id > signer_cert: signer_cert > pkcs10: pkcs10 > _url_params: url_params > #_pkcs7: pkcs7 > > authorized_signer: > rule1: > # Full DN > subject: CN=.+:pkiclient,.* > # rule2: > # Full DN > # profile: netic_server > # realm: netic > # subject: CN=my.scep.enroller.com:generic,.* > > policy: > # Authentication Options > # Initial requests need ONE authentication. > # Activate Challenge Password and/or HMAC by setting the appropriate > # options below. > > # if set requests can be authenticated by an operator > allow_man_authen: 1 > > # if set, no authentication is required at all and hmac/challenge is > # not evaluated even if it is set/present in the request! > allow_anon_enroll: 1 > > # Approval > # If not autoapproved, allow opeerator to add approval by hand > allow_man_approv: 1 > > # if the eligibiliyt check failed the first time > # show a button to run a recheck (Workflow goes to PENDING) > allow_eligibility_recheck: 1 > > # Approval points requirede (eligibity and operator count as one point > each) > # if you set this to "0", all authenticated requests are auto-approved! > approval_points: 1 > > # The number of active certs with the same subject that are allowed > # to exist at the same time, deducted by one if a renewal is seen > # set to 0 if you dont want to check for duplicates at all > max_active_certs: 1 > > # option will be removed > # allow_expired_signer: 0 > > # If an initial enrollment is seen > # all existing certificates with the same subject are revoked > auto_revoke_existing_certs: 1 > > # allows a "renewal" outside the renewal window, the notafter date > # is aligned to the old certificate. Set revoke_on_replace option > # to revoke the replaced certificate. > # This substitutes the "replace_window" from the OpenXPKI v1 config > allow_replace: 1 > > response: > # The scep standard is a bit unclear if the root should be in the chain > # or not. We consider it a security risk (trust should be always set > # by hand) but as most clients seem to expect it, we include the root > # by default. > # The getca response contains the certificate of the SCEP server itself > # and of the current active issuer (which can but need not to be the > same!) > # You can define weather to have only the certificate itself > (endentity), > # the chain without the root (chain) or the chain including the root > # (fullchain). > # Note: The response is cached internally in the datapool so changes > # will not show up immediately - to list the cached items use > # openxpkicli list_data_pool_entries --arg namespace=scep.cache.getca > # You can delete by setting the empty string as value with > # set_data_pool_entry (value="" force=1) > getca: > ra: fullchain > issuer: fullchain > > > profile: > cert_profile: netic_server > cert_subject_style: enroll > > # Mapping of names to OpenXPKI profiles to be used with the > # Microsoft Certificate Template Name Ext. (1.3.6.1.4.1.311.20.2) > profile_map: > pc-client: netic_user > > # HMAC based authentication > hmac: Netic! > > challenge: > value: Netic! > > eligible: > initial: > value@: connector:scep.generic.connector.initial > args: '[% context.cert_subject_parts.CN.0 %]' > expect: > - Build > - New > > renewal: > value: 1 > > onbehalf: > value: 1 > > > connector: > initial: > class: Connector::Proxy::YAML > # this file must have a key/value list with the key being > # the subject and the value being a true value > # e.g. "pc1234.example.org: 1" > LOCATION: /etc/openxpki/cmdb.yaml > > scep.log: > 2021/01/29 12:34:50 INF Incoming request from 192.168.96.1 with GetCACaps > [pid=81] > 2021/01/29 12:34:50 DEB Response send [pid=81] > 2021/01/29 12:34:50 INF Incoming request from 192.168.96.1 with > PKIOperation [pid=81] > 2021/01/29 12:34:50 ERR SCEP response is empty [pid=81] > > catch-all.log: > 2021/01/29 13:35:17 openxpki.application.INFO LibSCEP PKIOperation; > message type: PKCSReq [pid=57|sid=PYVL] > 2021/01/29 13:35:17 openxpki.application.INFO SCEP incoming request, id > 60107490989072451039833240777151525638461989712167481202488830552887682520023 > [pid=57|sid=PYVL|sceptid=60107490989072451039833240777151525638461989712167481202488830552887682520023] > 2021/01/29 13:35:17 openxpki.system.ERROR > I18N_OPENXPKI_SERVICE_LIBSCEP_COMMAND_PKIOPERATION_PARALLEL_REQUESTS_DETECTED; > __DPSTATE__ => creating, __SERVER__ => generic, __TRANSACTION_ID__ => > 60107490989072451039833240777151525638461989712167481202488830552887682520023 > [pid=57|sid=PYVL|sceptid=60107490989072451039833240777151525638461989712167481202488830552887682520023] > 2021/01/29 13:35:17 openxpki.system.ERROR Error executing SCEP command > 'PKIOperation': > I18N_OPENXPKI_SERVICE_LIBSCEP_COMMAND_PKIOPERATION_PARALLEL_REQUESTS_DETECTED; > __DPSTATE__ => creating, __SERVER__ => generic, __TRANSACTION_ID__ => > 60107490989072451039833240777151525638461989712167481202488830552887682520023 > [pid=57|sid=PYVL|sceptid=60107490989072451039833240777151525638461989712167481202488830552887682520023] > > Med venlig hilsen / Best regards > > *Netic A/S* > Per Abildgaard Toft > Senior Consultant > > Mail p...@netic.dk > Telefon +45 7777 0861 > Web http://netic.dk > > > > _______________________________________________ > OpenXPKI-users mailing > listOpenXPKI-users@lists.sourceforge.nethttps://lists.sourceforge.net/lists/listinfo/openxpki-users > > > -- > Protect your environment - close windows and adopt a penguin! > > _______________________________________________ > OpenXPKI-users mailing list > OpenXPKI-users@lists.sourceforge.net > https://lists.sourceforge.net/lists/listinfo/openxpki-users >
_______________________________________________ OpenXPKI-users mailing list OpenXPKI-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openxpki-users