Thanks it mostly did the trick – but still some issues. It seems token rollover didn’t work.
The crl issuance is trying to use casigner-1, but alias with current cert is for casigner-2. I also verified with openssl that crl issuance does work manually. Maybe this is a novice error, but I gathered from the docs that token rollover is automatic? Br, //HS -- % openxpkicmd --realm democa crl_issuance In catchall.log: 2024/01/17 16:58:30 openxpki.auth.INFO Login successful (user: Anonymous, role: System) [pid=45218|sid=wQyR|pki_realm=democa] 2024/01/17 16:58:30 openxpki.application.INFO start crl issue for ca casigner-1, workflow 5119 [pid=45218|user=Anonymous|role=System|sid=wQyR|wftype=crl_issuance|wfid=5119|pki_realm=democa] 2024/01/17 16:58:31 openxpki.system.ERROR OpenSSL error: engine "cloudhsm" set. Using configuration from /var/tmp/openxpki45218q4_fnUUO/openssl.cnf CA certificate and CA private key do not match However the aliases show: % openxpkiadm alias --realm democa === functional token === vault (datasafe): Alias : vault-2 Identifier: VkhM86XJuv84LuRmtw4eHHkL25M NotBefore : 2024-01-17 12:56:38 NotAfter : 2024-02-16 12:56:38 ratoken (scep): not set casigner (certsign): Alias : casigner-2 Identifier: iLC-b4Fn9EeZehIJqZ51gE3TGkU NotBefore : 2024-01-17 13:21:48 NotAfter : 2034-01-17 13:21:48 ratoken (cmcra): not set === root ca === current root ca: Alias : root-1 Identifier: 5zenJ7c7uwUc1cOr09_-eFIaLKw NotBefore : 2023-12-20 09:02:08 NotAfter : 2053-12-12 09:02:08 upcoming root ca: not set From: Oliver Welter <m...@oliwel.de> Sent: Wednesday, January 17, 2024 4:52 PM To: openxpki-users@lists.sourceforge.net Subject: Re: [OpenXPKI-users] AWS CloudHSM? Hi Henri, from the docs of the module ;) =head1 Configuration Set I<engine: AWSCloudHSM> and set the I<key> attribute to point to the fake-key file (supports local file or datapool as with plain OpenSSL software keys). best regards Oliver On 17.01.24 14:38, henri.sunde...@iki.fi <mailto:henri.sunde...@iki.fi> wrote: Is it possible to configure OpenXPKI with AWS CloudHSM Dynamic Engine? I tried something like this in crypto.yaml: casigner: backend: OpenXPKI::Crypto::Backend::OpenSSL key: /etc/openxpki/ca/subca_private_ref.pem engine: cloudhsm engine_section: | engine_id = cloudhsm MODULE_PATH = /opt/cloudhsm/lib/libcloudhsm_openssl_engine.so #PIN = __PIN__ init = 0 engine_usage: 'ALWAYS' key_store: OPENXPKI shell: /opt/openssl/bin/openssl randfile: /var/openxpki/rand wrapper: '' secret: signer ..but that fails to the fact it tries to download a perl module called cloudhsm.pm. The main difference to PKCS11 is that the private key reference is a fake private key pem file. There are no options to be passed, the HSM pin is expected to be in env variable. In practice I believe you need to just pass "-engine cloudhsm" to openssl for thus engine to work. Br, //HS _______________________________________________ OpenXPKI-users mailing list OpenXPKI-users@lists.sourceforge.net <mailto:OpenXPKI-users@lists.sourceforge.net> https://lists.sourceforge.net/lists/listinfo/openxpki-users -- Protect your environment - close windows and adopt a penguin!
_______________________________________________ OpenXPKI-users mailing list OpenXPKI-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openxpki-users