-
Notifications
You must be signed in to change notification settings - Fork 138
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Nightly test failure with @pki/master copr repo #4518
Comments
I tried creating a CA with Which cert profile does IPA use to create the LDAP Server-Cert? |
The LDAP server cert is created with the profile caIPAserviceCert. |
So far I cannot reproduce the problem in a plain PKI environment. I've created some tests to issue certs using In all cases the certs were issued with the correct algorithms:
To my understanding there's no significant differences between the profiles in terms of algorithms:
So the problem seems to be specific to IPA. Were there any recent changes in IPA that might have affected this? What changes does IPA make to the |
There wasn't any change in IPA related to the signing algorithm. I'm testing with the same IPA version and do one test with pki 11.3.1-1.fc38, the other with pki from the copr repo @pki/master. With pki 11.3.1-1: the file /etc/pki/pki-tomcat/ca/CS.cfg is created with the following parameters:
With the copr repo: the file /etc/pki/pki-tomcat/ca/CS.cfg is created with the following parameters:
To me it looks like the same call to pkispawn produces 2 different CS.cfg and that is the root cause of my issue. |
I still can't reproduce this in plain PKI environment. I've updated the tests to check those params (see PR #4524) and in all cases they are set to the correct values:
|
Could you confirm that the algorithm params for It would help if we could take a look at the CA debug logs to see what algorithm is actually used and where it came from. |
IPA installer calls
|
The PKIDeployer.update_system_cert() was incorrectly setting the default signing algorithm param in CS.cfg for all certs using the key algorithm param in pkispawn which could cause a problem if the key algorithm and signing algorithm are not the same. The code has been modified to set the param properly using the signing algorithm param in pkispawn for CA/OCSP/audit signing certs only. This param is not used by other certs so it does not need to be set for those certs. The pki-server ca-config-show CLI has been updated to return a non-zero code if the param being requested doesn't exist. The tests have been updated to use different key and signing algorithms. dogtagpki#4518
Thanks for the info. Apparently there's a long-standing bug that was never discovered since we probably always tested with the same key & signing algorithms, and it's now affecting IPA due to recent a cleanup that merged some of the code. I've created a PR to fix the bug: #4531 |
The PKIDeployer.update_system_cert() was incorrectly setting the default signing algorithm param in CS.cfg for all certs using the key algorithm param in pkispawn which could cause a problem if the key algorithm and signing algorithm are not the same. The code has been modified to set the param properly using the signing algorithm param in pkispawn for CA/OCSP/audit signing certs only. This param is not used by other certs so it does not need to be set for those certs. The pki-server ca-config-show CLI has been updated to return a non-zero code if the param being requested doesn't exist. The tests have been updated to use different key and signing algorithms. dogtagpki#4518
The PKIDeployer.update_system_cert() was incorrectly setting the default signing algorithm param in CS.cfg for all certs using the key algorithm param in pkispawn which could cause a problem if the key algorithm and signing algorithm are not the same. The code has been modified to set the param properly using the signing algorithm param in pkispawn for CA/OCSP/audit signing certs only. This param is not used by other certs so it does not need to be set for those certs. The pki-server ca-config-show CLI has been updated to return a non-zero code if the param being requested doesn't exist. The tests have been updated to use different key and signing algorithms. dogtagpki#4518
The PKIDeployer.update_system_cert() was incorrectly setting the default signing algorithm param in CS.cfg for all certs using the key algorithm param in pkispawn which could cause a problem if the key algorithm and signing algorithm are not the same. The code has been modified to set the param properly using the signing algorithm param in pkispawn for CA/OCSP/audit signing certs only. This param is not used by other certs so it does not need to be set for those certs. The pki-server ca-config-show CLI has been updated to return a non-zero code if the param being requested doesn't exist. The tests have been updated to use different key and signing algorithms. #4518
The PKIDeployer.update_system_cert() was incorrectly setting the default signing algorithm param in CS.cfg for all certs using the key algorithm param in pkispawn which could cause a problem if the key algorithm and signing algorithm are not the same. The code has been modified to set the param properly using the signing algorithm param in pkispawn for CA/OCSP/audit signing certs only. This param is not used by other certs so it does not need to be set for those certs. The pki-server ca-config-show CLI has been updated to return a non-zero code if the param being requested doesn't exist. The tests have been updated to use different key and signing algorithms. dogtagpki#4518
The tests have been updated to use different key and signing algorithms. dogtagpki#4518
The tests have been updated to use different key and signing algorithms. dogtagpki#4518
The tests have been updated to use different key and signing algorithms. dogtagpki#4518
The PKIDeployer.update_system_cert() was incorrectly setting the default signing algorithm param in CS.cfg for all certs using the key algorithm param in pkispawn which could cause a problem if the key algorithm and signing algorithm are not the same. The code has been modified to set the param properly using the signing algorithm param in pkispawn for CA/OCSP/audit signing certs only. This param is not used by other certs so it does not need to be set for those certs. dogtagpki#4518
One of the FreeIPA nightly tests is failing with the copr repo @pki/master. The test is installing IPA server with the option
--ca-signing-algorithm=SHA384withRSA
but the resulting LDAP Server-Cert is created with SHA-256 With RSA Encryption.See PR #2870, with the following report and logs:
Test scenario:
ipa-server-install -n ipa.test -r IPA.TEST -p Secret.123 -a Secret.123 --ca-signing-algorithm=SHA384withRSA
certutil -L -d /etc/dirsrv/slapd-IPA-TEST/ -n Server-Cert
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
but we expect SHA-384IPA installer calls pkispawn with a configuration file containing
pki_ca_signing_signing_algorithm = SHA384withRSA
.The test is failing with dogtag-pki-ca-11.5.0-0.1.alpha1.20230728134901UTC.cb798fce.fc38.noarch (full list of packages available here) but was succeeding last week with dogtag-pki-ca-11.5.0-0.1.alpha1.20230721223657UTC.3e987bc0.fc38.noarch
Companion issue on ipa side: https://pagure.io/freeipa/issue/9423
The text was updated successfully, but these errors were encountered: