I dont now if this is helpfull, but here is the used tls.crt: ---------- C:\Users\rkrahl\test>openssl x509 -in tls.crt -noout -text Certificate: Data: Version: 3 (0x2) Serial Number: ff:ee:08:27:87:aa:60:ff:23 Signature Algorithm: sha256WithRSAEncryption Issuer: C = DE, O = OpenXPKI, OU = PKI, CN = OpenXPKI Demo Issuing CA 20210812 Validity Not Before: Aug 12 08:18:21 2021 GMT Not After : Aug 12 08:18:21 2022 GMT Subject: DC = org, DC = OpenXPKI, DC = Test Deployment, CN = tls-cert:pkiclient Subject Public Key Info: Public Key Algorithm: rsaEncryption RSA Public-Key: (2048 bit) Modulus: 00:b7:aa:5f:4e:6f:5a:40:dc:18:8b:26:3f:0e:a8: e9:1b:01:68:24:e3:07:97:c9:77:2a:ae:8a:7d:ca: 85:dc:5d:7a:6c:a1:4a:40:17:b5:19:74:f6:39:d3: 82:8d:0e:0c:a0:d6:10:16:94:b7:75:0c:51:91:1c: 53:ff:30:76:12:2d:f1:aa:88:5e:0d:30:65:cc:73: 8c:cb:46:86:ed:9e:30:6b:35:32:a7:b0:d1:ea:3c: 66:83:da:be:07:d2:c5:3d:37:1d:fe:41:69:9b:b1: 92:90:1b:75:32:30:d3:e3:a1:51:16:d0:1c:ce:8a: a5:5c:a9:19:e3:95:12:23:9c:d5:f2:6c:a1:08:1e: dd:b9:0f:0c:bd:5a:05:e9:6c:21:de:39:96:60:c5: c9:a3:03:58:98:60:f0:a7:35:2b:5d:a8:e7:4c:96: a5:95:f0:0c:f8:b4:e0:64:4c:f2:4d:f5:2c:8f:d9: 05:c1:07:c0:4d:b5:86:56:45:ef:3b:1d:61:a7:0e: 66:a7:31:56:eb:84:47:2e:59:82:2c:bb:10:84:24: d4:b8:26:f0:45:93:57:3a:9f:87:ca:af:b3:e7:12: 0a:8d:ab:1c:22:30:75:6e:aa:a8:7c:dc:6b:c6:e4: c8:a9:1b:13:fa:17:1c:25:71:1d:b8:2c:cb:72:dc: 64:63 Exponent: 65537 (0x10001) X509v3 extensions: Authority Information Access: CA Issuers - URI: http://pki.example.com/download/OpenXPKI_Demo_Issuing_CA_20210812.cer OCSP - URI:http://ocsp.example.com/
X509v3 Authority Key Identifier: keyid:26:65:DC:C8:DF:10:13:B1:15:8A:93:DA:03:46:25:BC:B4:F7:12:A7 X509v3 Basic Constraints: critical CA:FALSE X509v3 CRL Distribution Points: Full Name: URI: http://pki.example.com/download/OpenXPKI_Demo_Issuing_CA_20210812.crl X509v3 Extended Key Usage: TLS Web Client Authentication X509v3 Key Usage: critical Digital Signature X509v3 Certificate Policies: Policy: 1.2.3.4 CPS: http://pki.example.com/cps.html CPS: http://pki.example.com/cps.html User Notice: Explicit Text: This is a comment for policy oid 1.2.3.4 X509v3 Subject Key Identifier: 51:5B:0B:69:3F:23:40:F3:9B:22:DC:C1:0B:73:33:30:A7:AA:19:33 Signature Algorithm: sha256WithRSAEncryption 24:ec:ea:44:c5:21:b6:bc:2c:41:29:79:62:35:6f:ac:b6:c2: 18:bb:95:0f:f0:db:ac:2b:b6:6a:76:d8:a8:f5:92:ec:47:94: 46:0d:c8:f0:02:32:cc:66:0c:cd:c0:85:ac:c0:98:47:38:75: a6:ab:8f:79:1c:34:a2:de:22:80:fc:17:96:84:73:b1:a1:b3: ec:9d:96:3f:9e:1c:97:2f:6e:51:35:e8:00:c2:dd:03:c3:dc: 4c:29:d1:b3:38:ab:e7:5a:c5:ab:6b:ab:e6:a4:86:a0:5c:5d: 14:a5:da:86:0d:22:4b:05:08:c6:9c:55:0b:ef:a3:4f:cd:ea: fc:26:5c:f2:c2:0d:be:86:b3:36:7a:6e:4e:e7:45:10:09:f1: 83:f5:9e:e1:72:a1:ca:37:d0:c3:41:72:95:43:1a:ad:b2:14: c2:12:49:78:ee:0c:0b:1e:0c:12:73:3d:18:4d:c7:e0:b2:47: 73:c9:9d:3b:6b:46:49:65:d7:d5:54:c7:cc:2d:a1:49:47:95: 9a:68:1d:11:d8:c7:50:ce:6f:7f:4e:f7:5d:52:fc:e5:db:b6: f4:14:97:6b:af:de:f2:31:de:55:a8:3f:75:a9:ae:e7:1b:dc: 6c:c5:48:ef:f8:b8:4e:76:c4:8a:79:d2:57:53:88:df:29:c1: 0b:e8:85:2c:aa:3f:b5:2c:e1:60:7a:bc:10:a1:7a:69:48:c2: 48:0c:f9:53:be:46:01:39:87:50:0a:c3:43:e3:f1:d9:de:81: 8d:b4:e1:c5:c9:9a:20:2d:c0:ad:00:09:dc:c6:c0:62:bc:47: 3f:19:6d:20:43:4a:6a:65:06:8a:aa:1d:79:a8:3b:ad:75:f6: a2:f8:5d:84:e5:a6:37:58:0e:4e:2c:02:62:72:83:5d:f1:ae: 0b:26:7a:44:e3:15:82:c5:69:86:0f:9a:84:a4:48:20:cc:93: bd:37:10:1d:5e:f2:ce:3b:65:c4:11:15:89:a0:f8:f3:e3:3c: e3:98:07:c9:81:cf ---------- Am Do., 12. Aug. 2021 um 14:26 Uhr schrieb Robert Krahl < rkrahl.ot...@gmail.com>: > Hi Oliver, > > thanks for the quick reply!! > > When entering the curl command, no new entry is shown in the workflow UI > (test account: raop). > > Regarding the TLS certificates: > > ---------- > root@3fac13af39a4:/etc/openxpki/tls/chain# ls -la > total 5 > drwxrwxrwx 1 root root 0 Aug 12 08:08 . > drwxrwxrwx 1 root root 0 Aug 12 08:08 .. > lrwxr-xr-x 1 root root 1067 Aug 12 08:08 ba0583c9.0 -> dummy.crt > -rwxr-xr-x 1 root root 1172 Aug 12 08:08 dummy.crt > lrwxr-xr-x 1 root root 1067 Aug 12 08:08 ecb921c1.0 -> dummy.crt > root@3fac13af39a4:/etc/openxpki/tls/chain# openssl x509 -in dummy.crt > -noout -text > Certificate: > Data: > Version: 3 (0x2) > Serial Number: > 57:ef:16:f1:68:ea:88:0b:ed:6f:a1:ef:21:ea:b0:7c:b2:7f:ac:f2 > Signature Algorithm: sha256WithRSAEncryption > Issuer: CN = Placeholder for TLS Client Auth > Validity > Not Before: Aug 12 08:08:57 2021 GMT > Not After : Sep 11 08:08:57 2021 GMT > Subject: CN = Placeholder for TLS Client Auth > Subject Public Key Info: > Public Key Algorithm: rsaEncryption > RSA Public-Key: (2048 bit) > Modulus: > 00:c0:5b:0b:b6:55:78:ef:34:b3:42:ed:91:20:8b: > 20:a3:fd:67:1b:66:a2:27:84:56:d6:f0:46:3d:a6: > 9a:fa:7f:67:71:b2:5d:40:2a:b7:08:7f:85:3a:db: > 7a:ee:33:16:b7:28:d9:c8:c7:02:ae:d5:3c:00:75: > 11:b6:9b:3c:24:44:18:0c:bf:02:b4:23:d8:d3:b5: > 7b:87:c6:d9:96:88:47:cf:1a:a6:4f:15:53:4a:96: > 89:8f:39:df:7d:c1:8e:c9:89:2f:38:43:88:0a:7b: > fc:04:7f:f0:c2:95:96:fd:a4:58:3e:5f:d8:7d:97: > 1d:a2:cf:85:4c:60:c9:ed:a2:09:b6:ca:84:bd:6f: > 58:9b:76:95:fd:1e:14:f3:62:7f:58:bf:8e:d0:c8: > 4f:f3:32:5e:e1:5e:7a:04:b5:53:ae:cb:98:26:19: > cd:24:50:f0:5c:3b:0e:af:51:4e:6c:36:5b:67:f5: > 5e:0f:20:1e:b2:20:7a:e7:c6:2b:24:9d:a2:94:60: > d9:e0:6b:4e:7f:c7:7d:f7:0d:f0:ac:eb:cc:2d:42: > 8e:55:e1:21:e7:59:3a:26:e6:d7:f0:60:dc:80:3e: > 55:cd:de:5f:0f:01:00:ba:ce:df:4d:5f:b0:5b:9d: > cd:09:d9:6f:dc:70:69:8e:8a:2c:04:95:7b:10:85: > 1a:81 > Exponent: 65537 (0x10001) > X509v3 extensions: > X509v3 Subject Key Identifier: > 11:8F:14:D6:03:71:0F:1D:E6:BC:4E:91:39:B3:63:61:BB:75:DA:BA > X509v3 Authority Key Identifier: > > keyid:11:8F:14:D6:03:71:0F:1D:E6:BC:4E:91:39:B3:63:61:BB:75:DA:BA > > X509v3 Basic Constraints: critical > CA:TRUE > Signature Algorithm: sha256WithRSAEncryption > ac:a7:66:81:75:1e:32:f4:13:c8:e4:0b:90:98:aa:7b:c6:84: > d3:89:33:0f:a1:e3:48:2b:78:83:bf:52:af:7e:29:3e:0f:b5: > a5:cd:66:42:6d:ac:78:84:2d:51:43:7f:a5:22:05:3a:ab:16: > 00:4a:fb:ee:19:26:33:08:9e:81:a4:ce:4f:72:b8:cf:3c:0a: > 1e:84:12:b2:25:e1:6e:0c:05:c2:39:80:67:ac:06:d1:22:ac: > 09:31:32:50:25:f7:69:61:f0:03:36:5a:3d:e6:98:13:07:77: > 49:64:1d:98:b8:bf:38:19:2f:9e:1c:83:57:84:8f:f0:f4:40: > 35:6a:6d:8d:4c:d6:11:fa:21:b0:89:3b:55:b6:0d:fa:15:1c: > e7:0f:6b:2e:d5:1d:6a:67:bf:ed:c1:0e:f8:57:ad:86:d3:9c: > cc:b2:8d:6f:2b:15:e1:80:87:80:a5:5a:cf:28:35:73:59:de: > ce:f4:18:33:0e:6b:ae:88:f0:b7:62:5b:e1:4d:d1:f4:2e:19: > 59:1e:11:92:cb:3d:b0:e4:00:ff:bf:54:22:a8:5f:ac:fd:cb: > 6e:eb:6d:95:0f:45:eb:42:08:f3:7e:85:69:51:6a:a7:4b:c7: > 58:23:be:34:6b:d3:ef:f1:4f:55:80:fe:3f:ec:64:79:5b:e1: > 88:e6:ca:f4 > ---------- > > Regarding the Apache server: > > ---------- > C:\Users\rkrahl\test>openssl s_client -connect localhost:8443 > (...) > Acceptable client certificate CA names > CN = Placeholder for TLS Client Auth > Requested Signature Algorithms: > ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224 > Shared Requested Signature Algorithms: > ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512 > Peer signing digest: SHA256 > Peer signature type: RSA-PSS > Server Temp Key: X25519, 253 bits > ---------- > > That should fit so far (, am I right?) > > If I now set the EST log level to debug as described, the following > entries are generated after entering the mentioned curl command: > > ---------- > root@3fac13af39a4:/var/log/openxpki# tail -f est.log > 2021/08/12 08:46:15 INFO:73 EST handler initialized > 2021/08/12 08:46:16 INFO:73 Disconnect client > 2021/08/12 12:13:51 DEBUG:71 Config for service est loaded > 2021/08/12 12:13:51 INFO:71 EST handler initialized > 2021/08/12 12:13:51 DEBUG:71 Incoming request /.well-known/est/simpleenroll > 2021/08/12 12:13:51 DEBUG:71 Autodetect config file for service est: > default.conf > 2021/08/12 12:13:51 DEBUG:71 calling context is https > 2021/08/12 12:13:51 DEBUG:71 EST unauthenticated (no cert) > 2021/08/12 12:13:51 DEBUG:71 Autodetect config file for service est: > default.conf > 2021/08/12 12:13:51 DEBUG:71 $VAR1 = { > 'workflow' => 'certificate_enroll', > 'pickup_attribute' => 'transaction_id', > 'pickup' => 'pkcs10' > }; > 2021/08/12 12:13:51 DEBUG:71 Pickup via attribute with transaction_id => > e0fff73e7ddf65f94c239e7f1b8c0ecd707fdc38 > 2021/08/12 12:13:51 DEBUG:71 Initialize client > 2021/08/12 12:13:51 DEBUG:71 Started volatile session with id: > LOtvQJ2OTdS0oRYR6pBaiA== > 2021/08/12 12:13:51 DEBUG:71 Selecting auth stack _System > 2021/08/12 12:13:51 DEBUG:71 Pickup 767 for > e0fff73e7ddf65f94c239e7f1b8c0ecd707fdc38 > 2021/08/12 12:13:51 DEBUG:71 request for workflow info on 767 > 2021/08/12 12:13:51 INFO:71 Disconnect client > ---------- > > I'm a little lost with the problem... > I thank you in advance for any given help! :) > > Best regards/ Liebe Grüße > rkrahl > > Am Di., 10. Aug. 2021 um 06:40 Uhr schrieb Oliver Welter <m...@oliwel.de>: > >> Hi Robert, >> >> can you please look into the workflow via the UI and check if you can see >> the "signer certificate" in the workflow? >> If not, check if the Issuing CA you used is in /etc/openxpki/tls/chain/ >> and the symlink with the hash value exists for ii, to check if apache is >> setup properly run >> >> openssl s_client -connect localhost:8443 >> >> and look for the line "Acceptable client certificate CA names", the >> issuing ca of your client certificate should be listed here. >> >> The logline with the Anonymous login is ok, the connection to the server >> from the EST process is done with the anonymous System stack, the >> authentication certificate is passed in as a parameter. If this all does >> not help, raise the log level to debug in "est/log.conf" (restart apache) >> and check the logfile for what is coming into the system. >> >> Oliver >> >> Am 09.08.21 um 15:28 schrieb Robert Krahl: >> >> Hello everyone, >> >> I am currently trying my best with Openxpki. >> More precisely, I want to use EST to automatically issue or renew >> certificates. >> Regarding the deployment, I have made use of the docker resource and the >> shell script "sampleconfig.sh". So far so good. >> I have made some adjustments to the file "est/default.yaml". >> I have modified the following: >> >> allow_anon_enroll: 0 >> approval_points: 0 >> >> This should allow only authenticated EST queries to get through and then >> be processed automatically. >> >> Now I have created a keypair using OpenSSL: >> >> > openssl req -new -newkey rsa:2048 -nodes -subj "/CN=tls cert" >> -keyout tls.key -out tls.csr >> >> I then used the generated "tls.csr" and the Web-GUI to create a >> certificate ("tls.crt") in PEM format (Certificate Profile: TLS Client; >> Application Name: pkiclient). >> Now I have created another keypair: >> >> > openssl req -new -newkey rsa:2048 -nodes -subj "/CN=test cert" >> -keyout test.key -outform der -out - | base64 > test.pem >> >> The next thing I'm trying to do is make an authenticated EST query using >> Curl and the artifacts I've created: >> >> > curl -v -k -H "Content-Type: application/pkcs10" --data @test.pem >> --key tls.key --cert tls.crt >> https://localhost:8443/.well-known/est/simpleenroll -o device.b64 >> >> My problem is that the file "device.b64" does not contain the >> certificate, but: >> >> Request was rejected: >> I18N_OPENXPKI_UI_ENROLLMENT_ERROR_NOT_AUTHENTICATED >> >> I don't know if it helps, but in "var/log/openxpki/openxpki.log" the >> following entry occurs after the Curl command: >> >> 2021/08/09 13:09:58 INFO Login successful (user: Anonymous, role: >> System) [pid=711|sid=IKeI] >> >> There is something I seem to be doing wrong or overlooking regarding the >> authentication.... I am very grateful for any help! >> >> Best regards/ Liebe Grüße >> rkrahl >> >> >> _______________________________________________ >> OpenXPKI-users mailing >> listOpenXPKI-users@lists.sourceforge.nethttps://lists.sourceforge.net/lists/listinfo/openxpki-users >> >> >> -- >> Protect your environment - close windows and adopt a penguin! >> >> _______________________________________________ >> OpenXPKI-users mailing list >> OpenXPKI-users@lists.sourceforge.net >> https://lists.sourceforge.net/lists/listinfo/openxpki-users >> >
_______________________________________________ OpenXPKI-users mailing list OpenXPKI-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openxpki-users