Approving a certificate request for profile caSigningUserCert that tries to archive key in KRA throws error.
Steps to Reproduce:
1. CA and KRA instances are configured with HSM and RHEL 7.4 in FIPS mode. 2. I followed the procedure to archive the key using the profile aSigningUserCert as described in http://pki.fedoraproject.org/wiki/Certificate_Key_Archival # pki -d /opt/rhqa_pki/certs_db -c SECret.123 -p 8080 client-cert-request cn=FooUser345 --profile caSigningUserCert --type crmf --transport /opt/rhqa_pki/kra_transport.txt ----------------------------- Submitted certificate request ----------------------------- Request ID: 20 Type: enrollment Request Status: pending Operation Result: success # pki -d /opt/rhqa_pki/admin_cert_db -c SECret.123 -n "PKI CA Administrator for Non-TMS-CA" -p 8080 ca-cert-request-review --action approve 20 PKIException: Internal Server Error
Actual results:
CA debug log has this: [05/May/2017:18:09:30][http-bio-8443-exec-22]: SignedAuditEventFactory: create() message created for eventType=PRIVATE_KEY_ARCHIVE_REQUEST [05/May/2017:18:09:30][http-bio-8443-exec-22]: SignedAuditEventFactory: create() message created for eventType=CERT_REQUEST_PROCESSED [05/May/2017:18:09:30][http-bio-8443-exec-22]: CertRequestExecutor: about to throw EProfileException because of bad profile execute. KRA debug log has this: [05/May/2017:18:09:30][http-bio-31042-exec-5]: SignedAuditEventFactory: create() message created for eventType=PRIVATE_KEY_ARCHIVE_REQUEST [05/May/2017:18:09:30][http-bio-31042-exec-5]: KRAService serviceRequest EBaseException:Invalid Private Key
Expected results:
Certificate request should be approved and the key should be archived in KRA.
Metadata Update from @mharmsen: - Custom field component adjusted to General - Custom field feature adjusted to '' - Custom field origin adjusted to Community - Custom field proposedmilestone adjusted to '' - Custom field proposedpriority adjusted to '' - Custom field reviewer adjusted to '' - Custom field rhbz adjusted to https://bugzilla.redhat.com/show_bug.cgi?id=1448603 - Custom field type adjusted to defect - Custom field version adjusted to '' - Issue assigned to jmagne - Issue priority set to: critical
Closing, as the associated bug has been turned into a DOC bug.
Metadata Update from @mharmsen: - Issue close_status updated to: wontfix - Issue set to the milestone: 10.4.7 (was: 10.4) - Issue status updated to: Closed (was: Open)
Dogtag PKI is moving from Pagure issues to GitHub issues. This means that existing or new issues will be reported and tracked through Dogtag PKI's GitHub Issue tracker.
This issue has been cloned to GitHub and is available here: https://github.com/dogtagpki/pki/issues/2802
If you want to receive further updates on the issue, please navigate to the GitHub issue and click on Subscribe button.
Subscribe
Thank you for understanding, and we apologize for any inconvenience.
Log in to comment on this ticket.