#2682 Approving a certificate request for profile caSigningUserCert throws Internal Server error
Closed: wontfix 8 years ago Opened 8 years ago by mharmsen.

Approving a certificate request for profile caSigningUserCert that tries to
archive key in KRA throws error.

Steps to Reproduce:

1. CA and KRA instances are configured with HSM and RHEL 7.4 in FIPS mode.
2. I followed the procedure to archive the key using the profile
    aSigningUserCert as described in
    http://pki.fedoraproject.org/wiki/Certificate_Key_Archival

# pki -d /opt/rhqa_pki/certs_db  -c SECret.123 -p 8080 client-cert-request
cn=FooUser345 --profile caSigningUserCert --type crmf --transport
/opt/rhqa_pki/kra_transport.txt
-----------------------------
Submitted certificate request
-----------------------------
  Request ID: 20
  Type: enrollment
  Request Status: pending
  Operation Result: success

# pki -d /opt/rhqa_pki/admin_cert_db  -c SECret.123 -n "PKI CA Administrator
   for Non-TMS-CA" -p 8080 ca-cert-request-review --action approve 20
   PKIException: Internal Server Error

Actual results:

CA debug log has this:
[05/May/2017:18:09:30][http-bio-8443-exec-22]: SignedAuditEventFactory:
create() message created for eventType=PRIVATE_KEY_ARCHIVE_REQUEST

[05/May/2017:18:09:30][http-bio-8443-exec-22]: SignedAuditEventFactory:
create() message created for eventType=CERT_REQUEST_PROCESSED

[05/May/2017:18:09:30][http-bio-8443-exec-22]: CertRequestExecutor: about to
throw EProfileException because of bad profile execute.

KRA debug log has this:
[05/May/2017:18:09:30][http-bio-31042-exec-5]: SignedAuditEventFactory:
create() message created for eventType=PRIVATE_KEY_ARCHIVE_REQUEST

[05/May/2017:18:09:30][http-bio-31042-exec-5]: KRAService serviceRequest
EBaseException:Invalid Private Key

Expected results:

Certificate request should be approved and the key should be archived in KRA.

Metadata Update from @mharmsen:
- Custom field component adjusted to General
- Custom field feature adjusted to ''
- Custom field origin adjusted to Community
- Custom field proposedmilestone adjusted to ''
- Custom field proposedpriority adjusted to ''
- Custom field reviewer adjusted to ''
- Custom field rhbz adjusted to https://bugzilla.redhat.com/show_bug.cgi?id=1448603
- Custom field type adjusted to defect
- Custom field version adjusted to ''
- Issue assigned to jmagne
- Issue priority set to: critical

8 years ago

Closing, as the associated bug has been turned into a DOC bug.

Metadata Update from @mharmsen:
- Issue close_status updated to: wontfix
- Issue set to the milestone: 10.4.7 (was: 10.4)
- Issue status updated to: Closed (was: Open)

8 years ago

Dogtag PKI is moving from Pagure issues to GitHub issues. This means that existing or new
issues will be reported and tracked through Dogtag PKI's GitHub Issue tracker.

This issue has been cloned to GitHub and is available here:
https://github.com/dogtagpki/pki/issues/2802

If you want to receive further updates on the issue, please navigate to the
GitHub issue and click on Subscribe button.

Thank you for understanding, and we apologize for any inconvenience.

Log in to comment on this ticket.

Metadata