[root@f16-pki silent-configure]# ./ocsp-silent.bash 2>&1 | tee stdout/ocsp-configure-stdout.txt
tee: stdout/ocsp-configure-stdout.txt: No such file or directory
+ pki_silent_admin_user=admin
+ pki_silent_admin_password=testpwd
+ pki_silent_admin_email=pki-ocsp-admin@test.com
++ hostname
+ pki_host=f16-pki.test.com
+ ocsp_instance_name=pki-ocsp
+ pki_silent_security_database_repository=/var//tmp/testdb
+ pki_silent_security_database_password=testpwd
++ cat /var/lib/pki-ocsp/conf/CS.cfg
++ grep preop.pin
++ grep -v grep
++ awk -F= '{print $2}'
+ ocsp_preop_pin=tRDHkdcVVO3Eem8GFtQa
+ pki_security_domain_name=silentdom
++ hostname
+ pki_security_domain_host=f16-pki.test.com
+ pki_security_domain_admin_name=admin
+ pki_security_domain_admin_password=testpwd
+ pki_ldap_host=localhost
+ pki_ldap_port=389
+ pki_bind_dn='cn=Directory\ Manager'
+ pki_bind_password=redhat
+ ocsp_token_name=internal
+ ocsp_token_password=testpwd
+ ca_nonssl_port=9180
+ ca_agent_port=9443
+ ca_ee_port=9444
+ ca_admin_port=9445
+ ocsp_nonssl_port=11180
+ ocsp_agent_port=11443
+ ocsp_ee_port=11444
+ ocsp_admin_port=11445
+ ocsp_subsystem_name='OCSP\ Responder'
+ pki_silent_ocsp_log=/tmp/pki-silent-ocsp.log
+ ocsp_agent_name='OCSP\ Administrator\ of\ Instance\ pki-ocsp\'\''s\ silentdom\ ID'
+ ocsp_agent_key_size=2048
+ ocsp_agent_key_type=rsa
+ ocsp_agent_cert_subject='cn=OCSP\ Administrator\ of\ Instance\ pki-ocsp,uid=admin,e=pki-ocsp-admin@test.com,o=silentdom'
+ ocsp_base_dn=dc=f16-pki.test.com-pki-ocsp
+ ocsp_db_name=f16-pki.test.com-pki-ocsp
+ ocsp_key_size=2048
+ ocsp_key_type=rsa
+ ocsp_backup_password=testpwd
+ ocsp_sign_cert_subject_name='cn=OCSP\ Signing\ Certificate,o=silentdom'
+ ocsp_subsystem_cert_subject_name='cn=OCSP\ Subsystem\ Certificate,o=silentdom'
+ ocsp_server_cert_subject_name=cn=f16-pki.test.com,o=silentdom
+ ocsp_audit_signing_cert_subject_name='cn=OCSP\ Audit\ Signing\ Certificate,o=silentdom'
+ printf ''\'''\'': Configuring '\''pki-ocsp'\'' . . .\n'
'': Configuring 'pki-ocsp' . . .
+ tee /tmp/pki-silent-ocsp.log
+ pkisilent ConfigureOCSP -cs_hostname f16-pki.test.com -cs_port 11445 -sd_hostname f16-pki.test.com -sd_ssl_port 9444 -sd_agent_port 9443 -sd_admin_port 9445 -sd_admin_name admin -sd_admin_password testpwd -ca_hostname f16-pki.test.com -ca_port 9180 -ca_ssl_port 9444 -client_certdb_dir /var//tmp/testdb -client_certdb_pwd redhat -preop_pin tRDHkdcVVO3Eem8GFtQa -domain_name silentdom -admin_user admin -admin_password redhat -admin_email pki-ocsp-admin@test.com -agent_name 'OCSP\' 'Administrator\' 'of\' 'Instance\' 'pki-ocsp\'\''s\' 'silentdom\' ID -ldap_host localhost -ldap_port 389 -bind_dn 'cn=Directory\ Manager' -bind_password redhat -base_dn dc=f16-pki.test.com-pki-ocsp -db_name f16-pki.test.com-pki-ocsp -key_size 2048 -key_type rsa -token_name internal -token_pwd redhat -agent_key_size 2048 -agent_key_type rsa -agent_cert_subject 'cn=OCSP\ Administrator\ of\ Instance\ pki-ocsp,uid=admin,e=pki-ocsp-admin@test.com,o=silentdom' -subsystem_name 'OCSP\' Responder -backup_pwd redhat -ocsp_sign_cert_subject_name 'cn=OCSP\ Signing\ Certificate,o=silentdom' -ocsp_subsystem_cert_subject_name 'cn=OCSP\ Subsystem\ Certificate,o=silentdom' -ocsp_server_cert_subject_name cn=f16-pki.test.com,o=silentdom -ocsp_audit_signing_cert_subject_name 'cn=OCSP\ Audit\ Signing\ Certificate,o=silentdom'
libpath=/usr/lib64
#######################################################################
CRYPTO INIT WITH CERTDB:/var//tmp/testdb
tokenpwd:testpwd
#############################################
Attempting to connect to: f16-pki.test.com:11445
ERROR: unable to set ECC Cipher List
ERROR: Exception = org.mozilla.jss.ssl.SSLSocketException: Failed to enable cipher 0xc001
: (-12266) An unknown SSL cipher suite has been requested.
in TestCertApprovalCallback.approve()
Peer cert details:
subject: CN=f16-pki.test.com,O=2012-02-01 13:06:39
issuer: CN=f16-pki.test.com,O=2012-02-01 13:06:39
serial: 0
item 1 reason=-8156 depth=1
cert details:
subject: CN=f16-pki.test.com,O=2012-02-01 13:06:39
issuer: CN=f16-pki.test.com,O=2012-02-01 13:06:39
serial: 0
item 2 reason=-8172 depth=1
cert details:
subject: CN=f16-pki.test.com,O=2012-02-01 13:06:39
issuer: CN=f16-pki.test.com,O=2012-02-01 13:06:39
serial: 0
importing certificate.
Connected.
Posting Query = https://f16-pki.test.com:11445//ocsp/admin/console/config/login?pin=tRDHkdcVVO3Eem8GFtQa&xml=true
RESPONSE STATUS: HTTP/1.1 302 Moved Temporarily
RESPONSE HEADER: Server: Apache-Coyote/1.1
RESPONSE HEADER: Set-Cookie: JSESSIONID=031EAFF812FCDC348EB7D6A2AC8EF087; Path=/ocsp; Secure
RESPONSE HEADER: Location: https://f16-pki.test.com:11445/ocsp/admin/console/config/wizard
RESPONSE HEADER: Content-Type: text/html;charset=UTF-8
RESPONSE HEADER: Content-Length: 0
RESPONSE HEADER: Date: Wed, 01 Feb 2012 18:09:31 GMT
RESPONSE HEADER: Connection: keep-alive
xml returned:
cookie list: JSESSIONID=031EAFF812FCDC348EB7D6A2AC8EF087; Path=/ocsp; Secure
#############################################
Attempting to connect to: f16-pki.test.com:11445
ERROR: unable to set ECC Cipher List
ERROR: Exception = org.mozilla.jss.ssl.SSLSocketException: Failed to enable cipher 0xc001
: (-12266) An unknown SSL cipher suite has been requested.
Connected.
Posting Query = https://f16-pki.test.com:11445//ocsp/admin/console/config/wizard?p=0&op=next&xml=true
RESPONSE STATUS: HTTP/1.1 200 OK
RESPONSE HEADER: Server: Apache-Coyote/1.1
RESPONSE HEADER: Content-Type: application/xml;charset=UTF-8
RESPONSE HEADER: Date: Wed, 01 Feb 2012 18:09:35 GMT
RESPONSE HEADER: Connection: close
admin/console/config/modulepanel.vm
display
2
NSS Internal PKCS #11 Module
NSS Internal PKCS #11 Module
../img/clearpixel.gif
nfast
nCipher's nFast Token Hardware Module
../img/clearpixel.gif
lunasa
SafeNet's LunaSA Token Hardware Module
../img/clearpixel.gif
16
Key Store
welcome
Welcome
module
Key Store
confighsmlogin
ConfigHSMLogin
securitydomain
Security Domain
securitydomain
Display Certificate Chain
subsystem
Subsystem Type
restorekeys
Import Keys and Certificates
databasepanel
Internal Database
sizepanel
Key Pairs
namepanel
Subject Names
certrequestpanel
Requests and Certificates
backupkeys
Export Keys and Certificates
savepk12
Save Keys and Certificates
adminpanel
Administrator
importadmincertpanel
Import Administrator's Certificate
donepanel
Done
1
OCSP Setup Wizard
Internal Key Storage Token
module
Sleeping for 5 secs..
#############################################
Attempting to connect to: f16-pki.test.com:11445
ERROR: unable to set ECC Cipher List
ERROR: Exception = org.mozilla.jss.ssl.SSLSocketException: Failed to enable cipher 0xc001
: (-12266) An unknown SSL cipher suite has been requested.
Connected.
Posting Query = https://f16-pki.test.com:11445//ocsp/admin/console/config/wizard?p=1&op=next&xml=true&choice=Internal+Key+Storage+Token
RESPONSE STATUS: HTTP/1.1 200 OK
RESPONSE HEADER: Server: Apache-Coyote/1.1
RESPONSE HEADER: Content-Type: application/xml;charset=UTF-8
RESPONSE HEADER: Date: Wed, 01 Feb 2012 18:09:43 GMT
RESPONSE HEADER: Connection: close
f16-pki.test.com
admin/console/config/securitydomainpanel.vm
/usr/bin/pkicontrol
Test Domain
https://f16-pki.test.com:9445
11180
OCSP
Security Domain
welcome
Welcome
module
Key Store
confighsmlogin
ConfigHSMLogin
securitydomain
Security Domain
securitydomain
Display Certificate Chain
subsystem
Subsystem Type
restorekeys
Import Keys and Certificates
databasepanel
Internal Database
sizepanel
Key Pairs
namepanel
Subject Names
certrequestpanel
Requests and Certificates
backupkeys
Export Keys and Certificates
savepk12
Save Keys and Certificates
adminpanel
Administrator
importadmincertpanel
Import Administrator's Certificate
donepanel
Done
https://f16-pki.test.com:9445
OCSP Setup Wizard
11444
11445
securitydomain
11443
OCSP
ca pki-ocspd@pki-ocsp.service
success
16
3
checked
OCSP Setup Wizard
Sleeping for 5 secs..
#############################################
Attempting to connect to: f16-pki.test.com:11445
ERROR: unable to set ECC Cipher List
ERROR: Exception = org.mozilla.jss.ssl.SSLSocketException: Failed to enable cipher 0xc001
: (-12266) An unknown SSL cipher suite has been requested.
Connected.
Posting Query = https://f16-pki.test.com:11445//ocsp/admin/console/config/wizard?sdomainURL=https%3A%2F%2Ff16-pki.test.com%3A9445&choice=existingdomain&p=3&op=next&xml=true
RESPONSE STATUS: HTTP/1.1 200 OK
RESPONSE HEADER: Server: Apache-Coyote/1.1
RESPONSE HEADER: Content-Type: application/xml;charset=UTF-8
RESPONSE HEADER: Date: Wed, 01 Feb 2012 18:09:57 GMT
RESPONSE HEADER: Connection: close
admin/console/config/displaycertchainpanel.vm
OCSP
success
https://f16-pki.test.com:9445
16
OCSP
Certificate:
Data:
Version: v3
Serial Number: 0x1
Signature Algorithm: SHA512withRSA - 1.2.840.113549.1.1.13
Issuer: CN=Certificate Authority-ca,O=silentdom
Validity:
Not Before: Wednesday, February 1, 2012 9:22:12 AM EST US/Eastern
Not After: Saturday, February 1, 2020 9:22:12 AM EST US/Eastern
Subject: CN=Certificate Authority-ca,O=silentdom
Subject Public Key Info:
Algorithm: RSA - 1.2.840.113549.1.1.1
Public Key:
Exponent: 65537
Public Key Modulus: (2048 bits) :
E1:D5:C9:ED:28:56:5B:BF:46:0C:F8:93:6F:09:5F:B2:
74:82:61:E7:E5:70:91:24:56:09:85:8B:9D:B6:8F:12:
E0:85:83:EB:E5:63:E6:65:C3:DD:E0:8B:FB:53:08:76:
BF:9B:83:86:6D:DD:86:35:7A:14:A1:4F:B9:1B:74:E9:
E1:77:5E:1D:73:94:FC:A2:EA:2B:9F:EE:88:62:65:22:
13:DA:57:5A:A5:4C:68:5F:FA:B0:D2:5E:66:68:20:94:
AC:12:F8:8C:94:E3:F4:09:6B:60:A2:C2:D5:47:1B:27:
74:D0:8B:1F:FA:67:75:D7:5C:96:68:E6:F9:FB:BC:B1:
49:00:AD:CA:ED:65:22:CB:95:D5:EB:DB:68:A8:65:D6:
D7:C6:58:D4:BD:6F:34:A0:F1:F1:2E:DB:BC:92:49:0D:
BF:31:03:AB:38:6F:C6:02:65:1A:66:3F:DB:31:E3:CD:
AC:A1:27:DD:36:83:1A:D3:F1:B7:8E:93:9C:96:49:3D:
DC:54:FA:F1:83:CF:88:C7:FC:7E:62:8D:4D:6B:1A:43:
29:1A:0B:5A:92:62:AD:B9:57:B7:03:75:48:68:D0:91:
A6:58:86:64:D2:FF:B3:F3:FD:58:55:11:09:5A:E8:46:
62:91:FC:78:DB:16:B0:E3:03:4C:3A:60:E4:61:00:33
Extensions:
Identifier: Authority Key Identifier - 2.5.29.35
Critical: no
Key Identifier:
43:AC:F6:30:91:3A:B5:87:0C:A2:D4:AF:2A:61:6D:E5:
E7:61:E2:1A
Identifier: Basic Constraints - 2.5.29.19
Critical: yes
Is CA: yes
Path Length Constraint: UNLIMITED
Identifier: Key Usage: - 2.5.29.15
Critical: yes
Key Usage:
Digital Signature
Non Repudiation
Key CertSign
Crl Sign
Identifier: Subject Key Identifier - 2.5.29.14
Critical: no
Key Identifier:
43:AC:F6:30:91:3A:B5:87:0C:A2:D4:AF:2A:61:6D:E5:
E7:61:E2:1A
Identifier: Authority Info Access: - 1.3.6.1.5.5.7.1.1
Critical: no
Access Description:
Method #0: ocsp
Location #0: URIName: http://f16-pki.test.com:9180/ca/ocsp
Signature:
Algorithm: SHA512withRSA - 1.2.840.113549.1.1.13
Signature:
C4:31:28:94:EC:1C:00:35:B6:98:F0:85:67:59:D0:A2:
FC:19:F9:67:BF:54:49:B0:0C:67:40:0F:74:4B:07:AC:
62:36:31:7E:6A:FB:FF:C2:C9:84:63:4B:41:7D:A0:1F:
C5:5D:E9:7B:C7:52:10:C5:EF:6E:A7:39:03:43:E5:8D:
87:05:17:D2:84:AB:8A:1E:98:74:F8:D5:5D:81:AA:34:
29:DC:DD:CA:C3:99:B1:5E:B5:A6:03:8C:52:A1:C2:27:
18:F5:59:0D:96:BE:4E:C5:F2:D2:84:54:61:35:80:BB:
BF:3C:9B:25:15:9F:D5:4E:0C:D8:F6:F4:75:6A:44:80:
77:5C:6E:8E:BC:FF:1E:26:36:84:59:64:31:64:49:BD:
B7:5A:53:2C:A5:B8:16:D3:23:A1:8C:AB:EE:C3:AD:32:
C4:29:EE:8A:08:23:DA:B2:12:A1:78:0A:FF:E6:56:40:
9F:82:52:70:CF:F6:70:CB:9D:08:F0:72:D3:66:2E:B6:
87:D3:C9:D6:5C:7A:66:8B:2E:96:F7:C4:DC:D3:88:45:
60:62:94:90:84:76:52:7E:61:7B:B1:65:47:E5:1D:2F:
87:67:A1:81:8A:41:A4:AA:A5:28:17:52:27:82:0A:28:
40:D5:33:3A:25:3E:96:62:6E:6A:34:82:15:6D:68:E0
FingerPrint
MD2:
58:2E:94:4E:7A:2B:E6:62:21:70:4A:96:7E:9B:1E:22
MD5:
2D:91:1B:F1:DD:BD:08:23:48:9A:13:94:64:75:DA:EF
SHA1:
CE:53:FE:24:02:E3:91:C4:DE:4E:BE:12:EF:51:D6:65:
85:B2:2A:CF
SHA256:
7E:0D:EB:F8:63:27:E5:45:0D:E4:B5:80:0D:AC:30:35:
E2:9A:3C:EB:06:4A:A4:5A:41:DA:37:61:C0:4C:E3:33
SHA512:
DD:2C:12:A6:DD:E5:62:99:61:42:43:10:ED:F5:B9:3E:
3E:C3:2E:98:10:33:0B:29:A9:DF:67:CC:09:3A:60:67:
F1:70:25:54:B8:A6:54:97:D9:41:91:AD:5C:FF:C5:A6:
CC:FB:7F:7A:74:6A:B8:A7:69:1E:96:41:42:13:AB:FD
Display Certificate Chain
welcome
Welcome
module
Key Store
confighsmlogin
ConfigHSMLogin
securitydomain
Security Domain
securitydomain
Display Certificate Chain
subsystem
Subsystem Type
restorekeys
Import Keys and Certificates
databasepanel
Internal Database
sizepanel
Key Pairs
namepanel
Subject Names
certrequestpanel
Requests and Certificates
backupkeys
Export Keys and Certificates
savepk12
Save Keys and Certificates
adminpanel
Administrator
importadmincertpanel
Import Administrator's Certificate
donepanel
Done
4
securitydomain
OCSP Setup Wizard
OCSP Setup Wizard
securitydomain
Sleeping for 5 secs..
#############################################
Attempting to connect to: f16-pki.test.com:11445
ERROR: unable to set ECC Cipher List
ERROR: Exception = org.mozilla.jss.ssl.SSLSocketException: Failed to enable cipher 0xc001
: (-12266) An unknown SSL cipher suite has been requested.
Connected.
Posting Query = https://f16-pki.test.com:11445//ocsp/admin/console/config/wizard?p=4&op=next&xml=true
RESPONSE STATUS: HTTP/1.1 302 Moved Temporarily
RESPONSE HEADER: Server: Apache-Coyote/1.1
RESPONSE HEADER: Location: https://f16-pki.test.com:9445/ca/admin/ca/securityDomainLogin?url=https%3A%2F%2Ff16-pki.test.com%3A11445%2Focsp%2Fadmin%2Fconsole%2Fconfig%2Fwizard%3Fp%3D5%26subsystem%3DOCSP
RESPONSE HEADER: Content-Type: text/html;charset=UTF-8
RESPONSE HEADER: Content-Length: 0
RESPONSE HEADER: Date: Wed, 01 Feb 2012 18:10:07 GMT
RESPONSE HEADER: Connection: keep-alive
Sleeping for 5 secs..
#############################################
Attempting to connect to: f16-pki.test.com:9445
ERROR: unable to set ECC Cipher List
ERROR: Exception = org.mozilla.jss.ssl.SSLSocketException: Failed to enable cipher 0xc001
: (-12266) An unknown SSL cipher suite has been requested.
in TestCertApprovalCallback.approve()
Peer cert details:
subject: CN=f16-pki.test.com,O=silentdom
issuer: CN=Certificate Authority-ca,O=silentdom
serial: 3
item 1 reason=-8172 depth=1
cert details:
subject: CN=Certificate Authority-ca,O=silentdom
issuer: CN=Certificate Authority-ca,O=silentdom
serial: 1
importing certificate.
Connected.
Posting Query = https://f16-pki.test.com:9445//ca/admin/ca/securityDomainLogin?url=https%3A%2F%2Ff16-pki.test.com%3A11445%2Focsp%2Fadmin%2Fconsole%2Fconfig%2Fwizard%3Fp%3D5%26subsystem%3DOCSP
RESPONSE STATUS: HTTP/1.1 200 OK
RESPONSE HEADER: Server: Apache-Coyote/1.1
RESPONSE HEADER: Content-Type: text/html;charset=UTF-8
RESPONSE HEADER: Date: Wed, 01 Feb 2012 18:10:13 GMT
RESPONSE HEADER: Connection: close
#############################################
Attempting to connect to: f16-pki.test.com:9445
ERROR: unable to set ECC Cipher List
ERROR: Exception = org.mozilla.jss.ssl.SSLSocketException: Failed to enable cipher 0xc001
: (-12266) An unknown SSL cipher suite has been requested.
Connected.
Posting Query = https://f16-pki.test.com:9445//ca/admin/ca/getCookie?uid=admin&pwd=testpwd&url=https%3A%2F%2Ff16-pki.test.com%3A11445%2Focsp%2Fadmin%2Fconsole%2Fconfig%2Fwizard%3Fp%3D5%26subsystem%3DOCSP
RESPONSE STATUS: HTTP/1.1 200 OK
RESPONSE HEADER: Server: Apache-Coyote/1.1
RESPONSE HEADER: Content-Type: text/html
RESPONSE HEADER: Date: Wed, 01 Feb 2012 18:10:13 GMT
RESPONSE HEADER: Connection: close
OCSP_SESSION_ID=7515036650882535191
OCSP_URL=https://f16-pki.test.com:11445/ocsp/admin/console/config/wizard?p=5&subsystem=OCSP
#############################################
Attempting to connect to: f16-pki.test.com:11445
ERROR: unable to set ECC Cipher List
ERROR: Exception = org.mozilla.jss.ssl.SSLSocketException: Failed to enable cipher 0xc001
: (-12266) An unknown SSL cipher suite has been requested.
Connected.
Posting Query = https://f16-pki.test.com:11445//ocsp/admin/console/config/wizard?p=5&subsystem=OCSP&session_id=7515036650882535191&xml=true
RESPONSE STATUS: HTTP/1.1 200 OK
RESPONSE HEADER: Server: Apache-Coyote/1.1
RESPONSE HEADER: Content-Type: text/html;charset=UTF-8
RESPONSE HEADER: Date: Wed, 01 Feb 2012 18:10:15 GMT
RESPONSE HEADER: Connection: close
Sleeping for 5 secs..
#############################################
Attempting to connect to: f16-pki.test.com:11445
ERROR: unable to set ECC Cipher List
ERROR: Exception = org.mozilla.jss.ssl.SSLSocketException: Failed to enable cipher 0xc001
: (-12266) An unknown SSL cipher suite has been requested.
Connected.
Posting Query = https://f16-pki.test.com:11445//ocsp/admin/console/config/wizard?p=5&op=next&xml=true&subsystemName=OCSP+Responder&choice=newsubsystem
RESPONSE STATUS: HTTP/1.1 200 OK
RESPONSE HEADER: Server: Apache-Coyote/1.1
RESPONSE HEADER: Content-Type: application/xml;charset=UTF-8
RESPONSE HEADER: Date: Wed, 01 Feb 2012 18:10:21 GMT
RESPONSE HEADER: Connection: close
admin/console/config/databasepanel.vm
new
(sensitive)
389
off
success
localhost
f16-pki.test.com-pki-ocsp
cn=Directory Manager
16
true
Internal Database
off
welcome
Welcome
module
Key Store
confighsmlogin
ConfigHSMLogin
securitydomain
Security Domain
securitydomain
Display Certificate Chain
subsystem
Subsystem Type
restorekeys
Import Keys and Certificates
databasepanel
Internal Database
sizepanel
Key Pairs
namepanel
Subject Names
certrequestpanel
Requests and Certificates
backupkeys
Export Keys and Certificates
savepk12
Save Keys and Certificates
adminpanel
Administrator
importadmincertpanel
Import Administrator's Certificate
donepanel
Done
7
OCSP Setup Wizard
dc=f16-pki.test.com-pki-ocsp
databasepanel
Sleeping for 5 secs..
#############################################
Attempting to connect to: f16-pki.test.com:11445
ERROR: unable to set ECC Cipher List
ERROR: Exception = org.mozilla.jss.ssl.SSLSocketException: Failed to enable cipher 0xc001
: (-12266) An unknown SSL cipher suite has been requested.
Connected.
Posting Query = https://f16-pki.test.com:11445//ocsp/admin/console/config/wizard?p=7&op=next&xml=true&host=localhost&port=389&binddn=cn%3DDirectory+Manager&__bindpwd=redhat&basedn=dc%3Df16-pki.test.com-pki-ocsp&database=f16-pki.test.com-pki-ocsp&display=%24displayStr
RESPONSE STATUS: HTTP/1.1 200 OK
RESPONSE HEADER: Server: Apache-Coyote/1.1
RESPONSE HEADER: Content-Type: application/xml;charset=UTF-8
RESPONSE HEADER: Date: Wed, 01 Feb 2012 18:10:39 GMT
RESPONSE HEADER: Connection: close
admin/console/config/sizepanel.vm
SHA256withEC,SHA1withEC,SHA384withEC,SHA512withEC
389
off
2048
true
Key Pairs
welcome
Welcome
module
Key Store
confighsmlogin
ConfigHSMLogin
securitydomain
Security Domain
securitydomain
Display Certificate Chain
subsystem
Subsystem Type
restorekeys
Import Keys and Certificates
databasepanel
Internal Database
sizepanel
Key Pairs
namepanel
Subject Names
certrequestpanel
Requests and Certificates
backupkeys
Export Keys and Certificates
savepk12
Save Keys and Certificates
adminpanel
Administrator
importadmincertpanel
Import Administrator's Certificate
donepanel
Done
OCSP Setup Wizard
sizepanel
SHA256withRSA,SHA1withRSA,SHA512withRSA,MD5withRSA,MD2withRSA
ocsp
(sensitive)
nistp256
success
root
localhost
nistp256 (secp256r1),nistp384 (secp384r1),nistp521 (secp521r1),nistk163 (sect163k1),sect163r1,nistb163 (sect163r2),sect193r1,sect193r2,nistk233 (sect233k1),nistb233 (sect233r1),sect239k1,nistk283 (sect283k1),nistb283 (sect283r1),nistk409 (sect409k1),nistb409 (sect409r1),nistk571 (sect571k1),nistb571 (sect571r1),secp160k1,secp160r1,secp160r2,secp192k1,nistp192 (secp192r1, prime192v1),secp224k1,nistp224 (secp224r1),secp256k1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2
nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2
f16-pki.test.com-pki-ocsp
cn=Directory Manager
16
true
off
ocspSigningCert cert-pki-ocsp
Internal Key Storage Token
default
Server-Cert cert-pki-ocsp
Internal Key Storage Token
default
subsystemCert cert-pki-ocsp
Internal Key Storage Token
default
auditSigningCert cert-pki-ocsp
Internal Key Storage Token
default
8
dc=f16-pki.test.com-pki-ocsp
Sleeping for 5 secs..
Sleeping for 5 secs..
#############################################
Attempting to connect to: f16-pki.test.com:11445
ERROR: unable to set ECC Cipher List
ERROR: Exception = org.mozilla.jss.ssl.SSLSocketException: Failed to enable cipher 0xc001
: (-12266) An unknown SSL cipher suite has been requested.
Connected.
Posting Query = https://f16-pki.test.com:11445//ocsp/admin/console/config/wizard?p=8&op=next&xml=true&signing_custom_size=2048&subsystem_custom_size=2048&sslserver_custom_size=2048&audit_signing_custom_size=2048&custom_size=2048&signing_custom_curvename=nistp256&subsystem_custom_curvename=nistp256&sslserver_custom_curvename=nistp256&audit_signing_custom_curvename=nistp256&custom_curvename=nistp256&signing_keytype=rsa&subsystem_keytype=rsa&sslserver_keytype=rsa&audit_signing_keytype=rsa&keytype=rsa&signing_choice=custom&subsystem_choice=custom&sslserver_choice=custom&audit_signing_choice=custom&signingalgorithm=SHA256withRSA&signing_signingalgorithm=SHA256withRSA&choice=custom
RESPONSE STATUS: HTTP/1.1 200 OK
RESPONSE HEADER: Server: Apache-Coyote/1.1
RESPONSE HEADER: Content-Type: application/xml;charset=UTF-8
RESPONSE HEADER: Date: Wed, 01 Feb 2012 18:11:08 GMT
RESPONSE HEADER: Connection: close
admin/console/config/namepanel.vm
Certificate Authority-ca - https://f16-pki.test.com:9444External CA
success
false
16
true
Subject Names
ocspSigningCert cert-pki-ocsp
Internal Key Storage Token
remote
CN=OCSP Signing Certificate,OU=pki-ocsp,O=silentdom
Server-Cert cert-pki-ocsp
Internal Key Storage Token
remote
CN=f16-pki.test.com,OU=pki-ocsp,O=silentdom
subsystemCert cert-pki-ocsp
Internal Key Storage Token
remote
CN=OCSP Subsystem Certificate,OU=pki-ocsp,O=silentdom
auditSigningCert cert-pki-ocsp
Internal Key Storage Token
remote
CN=OCSP Audit Signing Certificate,OU=pki-ocsp,O=silentdom
welcome
Welcome
module
Key Store
confighsmlogin
ConfigHSMLogin
securitydomain
Security Domain
securitydomain
Display Certificate Chain
subsystem
Subsystem Type
restorekeys
Import Keys and Certificates
databasepanel
Internal Database
sizepanel
Key Pairs
namepanel
Subject Names
certrequestpanel
Requests and Certificates
backupkeys
Export Keys and Certificates
savepk12
Save Keys and Certificates
adminpanel
Administrator
importadmincertpanel
Import Administrator's Certificate
donepanel
Done
9
OCSP Setup Wizard
namepanel
tag=DN value=CN=OCSP Signing Certificate,OU=pki-ocsp,O=silentdom
tag=DN value=CN=f16-pki.test.com,OU=pki-ocsp,O=silentdom
tag=DN value=CN=OCSP Subsystem Certificate,OU=pki-ocsp,O=silentdom
tag=DN value=CN=OCSP Audit Signing Certificate,OU=pki-ocsp,O=silentdom
default: ocsp_signing_cert_name=CN=OCSP Signing Certificate,OU=pki-ocsp,O=silentdom
default: ocsp_subsystem_cert_name=CN=OCSP Subsystem Certificate,OU=pki-ocsp,O=silentdom
default: server_cert_name=CN=f16-pki.test.com,OU=pki-ocsp,O=silentdom
default: oscp_audit_signing_cert_name=CN=OCSP Audit Signing Certificate,OU=pki-ocsp,O=silentdom
Sleeping for 5 secs..
#############################################
Attempting to connect to: f16-pki.test.com:11445
ERROR: unable to set ECC Cipher List
ERROR: Exception = org.mozilla.jss.ssl.SSLSocketException: Failed to enable cipher 0xc001
: (-12266) An unknown SSL cipher suite has been requested.
Connected.
Posting Query = https://f16-pki.test.com:11445//ocsp/admin/console/config/wizard?p=9&op=next&xml=true&subsystem=cn%3DOCSP+Subsystem+Certificate%2Co%3Dsilentdom&signing=cn%3DOCSP+Signing+Certificate%2Co%3Dsilentdom&sslserver=cn%3Df16-pki.test.com%2Co%3Dsilentdom&audit_signing=cn%3DOCSP+Audit+Signing+Certificate%2Co%3Dsilentdom&urls=https%3A%2F%2Ff16-pki.test.com%3A9444
RESPONSE STATUS: HTTP/1.1 200 OK
RESPONSE HEADER: Server: Apache-Coyote/1.1
RESPONSE HEADER: Content-Type: application/xml;charset=UTF-8
RESPONSE HEADER: Date: Wed, 01 Feb 2012 18:12:00 GMT
RESPONSE HEADER: Connection: close
admin/console/config/certrequestpanel.vm
ocspSigningCert cert-pki-ocsp
Internal Key Storage Token
-----BEGIN CERTIFICATE REQUEST-----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-----END CERTIFICATE REQUEST-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
remote
cn=OCSP Signing Certificate,o=silentdom
Certificate:
Data:
Version: v3
Serial Number: 0xF
Signature Algorithm: SHA512withRSA - 1.2.840.113549.1.1.13
Issuer: CN=Certificate Authority-ca,O=silentdom
Validity:
Not Before: Wednesday, February 1, 2012 1:11:24 PM EST US/Eastern
Not After: Tuesday, January 21, 2014 1:11:24 PM EST US/Eastern
Subject: CN=OCSP Signing Certificate,O=silentdom
Subject Public Key Info:
Algorithm: RSA - 1.2.840.113549.1.1.1
Public Key:
Exponent: 65537
Public Key Modulus: (2048 bits) :
EB:A4:AF:61:54:DB:09:1C:A6:1D:36:1B:0F:6E:B9:2B:
04:50:18:D2:E2:40:94:B4:F7:54:9B:FB:97:74:D7:3E:
01:D1:7D:66:19:AD:F8:91:32:BC:19:F9:4E:CB:C7:AB:
42:F7:36:E2:13:CF:07:8F:D4:3C:9C:71:DC:1D:3F:04:
91:ED:93:CA:89:25:71:04:7E:3E:17:86:06:46:A8:15:
18:6C:23:A5:44:77:FD:23:A3:E1:F3:59:2F:31:79:2F:
E1:52:C4:D0:AE:C1:3B:65:A8:72:3C:70:6A:5C:1F:B2:
AB:38:08:17:61:42:BB:4F:DD:50:02:03:C2:A4:A1:C3:
7F:0F:41:74:8A:33:CB:11:3D:F9:35:EB:B5:51:8A:DF:
AE:FC:05:C6:0D:CF:EC:1C:CD:F2:DB:CB:8D:55:75:8D:
D8:6E:A8:53:AD:1D:DF:31:E3:3E:D1:8C:73:EF:65:75:
4B:B4:AC:8E:71:B0:13:F0:6F:C9:22:50:45:1B:0F:26:
2E:68:8F:24:29:5D:C2:C8:F6:0B:48:3E:05:3C:84:D3:
4F:0B:9A:8F:FC:DB:B9:0B:AB:D4:7B:B0:65:61:9B:95:
A2:75:91:C8:9E:A1:C4:68:7E:5E:34:8C:43:E7:9F:2A:
06:50:43:4C:72:A8:8D:9A:27:F6:30:57:65:A8:DE:33
Extensions:
Identifier: Authority Key Identifier - 2.5.29.35
Critical: no
Key Identifier:
43:AC:F6:30:91:3A:B5:87:0C:A2:D4:AF:2A:61:6D:E5:
E7:61:E2:1A
Identifier: Authority Info Access: - 1.3.6.1.5.5.7.1.1
Critical: no
Access Description:
Method #0: ocsp
Location #0: URIName: http://f16-pki.test.com:9180/ca/ocsp
Identifier: Extended Key Usage: - 2.5.29.37
Critical: no
Extended Key Usage:
OCSPSigning
Identifier: OCSP NoCheck: - 1.3.6.1.5.5.7.48.1.5
Critical: no
Signature:
Algorithm: SHA512withRSA - 1.2.840.113549.1.1.13
Signature:
4F:FB:4E:7F:41:C7:30:0E:4B:53:5B:D6:AE:95:86:63:
4C:F0:54:86:31:A3:DE:E8:24:5A:28:DF:A6:5B:7E:0B:
E8:B5:85:85:61:B8:02:49:6A:DC:CC:7D:5B:C8:EB:19:
75:46:B4:19:6D:D9:D4:F8:00:85:6D:C5:EB:CE:33:2B:
FA:65:65:80:7F:09:9A:02:36:6A:0C:E6:21:16:2A:54:
0C:17:B6:0E:8F:E2:78:47:2E:77:C6:C0:2A:F3:C7:00:
BB:28:D2:7D:87:77:BB:78:AB:59:13:A7:D5:33:55:A9:
F7:F0:6D:AF:02:AF:36:A7:81:14:8A:34:59:D7:CA:9A:
34:06:F7:91:DE:2A:5D:0A:CD:6C:59:D3:DF:42:79:1D:
2A:AE:95:13:44:EA:0D:C8:DC:E8:F7:AF:C5:5F:DD:15:
27:38:96:BD:5C:D0:92:37:67:A7:1A:F0:4F:AB:CF:F3:
73:20:F7:9D:45:CC:4A:6C:98:43:87:DC:37:10:82:5E:
8D:F9:C1:21:2A:BC:FA:5C:3C:F2:2B:A7:D1:68:56:BF:
72:DB:C2:5C:B7:42:D9:7C:36:CB:11:41:94:51:9B:AB:
EC:A7:A2:E6:AC:74:29:F8:CC:5E:FE:6E:D9:69:AF:40:
24:A7:4B:79:BC:AF:0F:BA:0F:3B:A3:4A:0B:5C:8F:35
FingerPrint
MD2:
A5:DB:1F:02:BD:4C:22:35:1C:56:AB:27:99:01:7F:6E
MD5:
5F:05:ED:0B:06:78:D0:1D:29:EC:A0:C0:F9:58:F4:85
SHA1:
6B:37:17:DF:90:9B:0C:E3:74:9E:34:0A:D5:59:16:1C:
0F:BC:35:12
SHA256:
B8:5C:90:FD:6F:FB:3A:3D:B1:85:4B:14:54:3A:E6:4A:
A2:C8:4B:72:3C:D4:6D:B8:F6:13:DB:BE:0C:C5:8F:82
SHA512:
BC:B4:8E:33:05:18:F2:64:82:13:22:38:79:B6:0B:58:
F9:4F:99:54:79:7B:D2:D7:25:44:F7:F1:74:5F:27:5D:
8D:DF:F5:D4:CC:7F:37:59:D2:11:E1:F0:EF:28:47:31:
0C:39:00:6D:5C:1A:A9:2A:B9:DA:85:D0:05:C0:65:EB
Server-Cert cert-pki-ocsp
Internal Key Storage Token
-----BEGIN CERTIFICATE REQUEST-----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-----END CERTIFICATE REQUEST-----
-----BEGIN CERTIFICATE-----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==
-----END CERTIFICATE-----
remote
cn=f16-pki.test.com,o=silentdom
Certificate:
Data:
Version: v3
Serial Number: 0x10
Signature Algorithm: SHA512withRSA - 1.2.840.113549.1.1.13
Issuer: CN=Certificate Authority-ca,O=silentdom
Validity:
Not Before: Wednesday, February 1, 2012 1:11:32 PM EST US/Eastern
Not After: Tuesday, January 21, 2014 1:11:32 PM EST US/Eastern
Subject: CN=f16-pki.test.com,O=silentdom
Subject Public Key Info:
Algorithm: RSA - 1.2.840.113549.1.1.1
Public Key:
Exponent: 65537
Public Key Modulus: (2048 bits) :
D3:70:6F:AB:A0:32:EA:4A:1B:C9:D0:79:41:FA:FF:2C:
70:69:C0:E5:B0:97:A2:AA:05:FF:DE:14:02:5B:0C:FB:
97:74:93:E6:0A:F9:49:9C:52:1B:99:94:88:94:AC:F6:
7B:67:F0:10:4D:DD:30:53:4B:7F:65:F0:78:12:FB:58:
AB:A2:E6:66:6A:A8:40:94:E2:C5:43:3A:95:9D:DC:3F:
13:66:B3:00:26:EB:ED:5B:7D:F1:DE:22:99:0D:F7:E0:
0F:5C:1C:9E:3B:F4:3C:F6:D6:67:81:38:7F:A8:F0:E6:
97:F2:D1:EA:2F:D6:DA:89:90:21:37:4B:5D:16:1B:C9:
DB:12:41:A7:DD:DA:82:ED:E5:5A:45:81:06:16:96:C1:
6A:A5:9A:6E:B6:BE:52:3B:45:DD:F7:2C:C9:F5:82:EE:
C4:45:FE:8F:B3:1B:F2:47:40:A4:43:D5:72:8B:B7:47:
DD:5A:B0:28:DE:80:41:35:8D:F7:A3:C8:92:67:C5:EB:
E0:BC:F6:9B:B9:80:8C:EB:43:86:80:9F:D1:8F:B7:32:
9B:EA:7F:85:BF:F1:DA:8B:A0:F7:EE:D0:8F:1E:9A:28:
AD:60:EF:3F:AB:9D:72:37:04:03:F8:E1:3C:A7:B9:35:
91:33:B3:57:0B:38:89:71:80:8C:C1:84:94:54:32:03
Extensions:
Identifier: Authority Key Identifier - 2.5.29.35
Critical: no
Key Identifier:
43:AC:F6:30:91:3A:B5:87:0C:A2:D4:AF:2A:61:6D:E5:
E7:61:E2:1A
Identifier: Authority Info Access: - 1.3.6.1.5.5.7.1.1
Critical: no
Access Description:
Method #0: ocsp
Location #0: URIName: http://f16-pki.test.com:9180/ca/ocsp
Identifier: Key Usage: - 2.5.29.15
Critical: yes
Key Usage:
Digital Signature
Non Repudiation
Key Encipherment
Data Encipherment
Identifier: Extended Key Usage: - 2.5.29.37
Critical: no
Extended Key Usage:
1.3.6.1.5.5.7.3.1
1.3.6.1.5.5.7.3.2
1.3.6.1.5.5.7.3.4
Signature:
Algorithm: SHA512withRSA - 1.2.840.113549.1.1.13
Signature:
17:B6:B2:BF:BD:00:0E:E2:9B:D0:0E:23:57:CA:1A:FB:
5B:EB:FE:A0:FB:05:91:00:9F:11:D8:75:84:70:4E:E4:
87:95:03:9B:B4:73:03:56:04:33:D6:80:BC:8C:CF:B1:
17:E0:AE:C6:F2:AE:A4:4E:E5:5F:95:CB:FC:7A:C3:54:
B5:32:B9:4E:AB:A0:92:1B:91:7E:90:01:F0:66:10:43:
D0:D1:83:04:06:A8:D1:E4:D6:AC:4F:D6:07:89:3A:C0:
44:EF:83:56:F1:17:29:3D:CE:D2:40:E4:EF:B9:28:93:
9B:63:CD:5B:DB:57:00:39:DD:7F:1B:74:C8:E6:B7:2D:
2F:64:5F:8B:DC:7F:6B:38:35:F1:18:67:74:24:85:DF:
33:67:4F:D1:8A:6C:E4:90:2A:23:94:61:24:37:23:4A:
66:82:61:0D:6E:D6:F4:9C:48:F8:39:CD:2C:CB:62:4F:
56:D5:E7:5F:EA:2C:1A:77:36:EE:FC:29:BD:49:38:25:
33:CB:D8:03:F3:51:BC:E4:AD:C3:64:32:03:5A:EF:E5:
6C:95:94:2F:38:DA:47:42:66:8B:1B:BB:18:25:74:11:
63:C6:DE:56:0E:2F:45:C5:94:EC:81:83:70:14:85:5D:
FF:43:63:05:A2:41:FA:DD:39:ED:0E:82:D9:A7:60:2E
FingerPrint
MD2:
81:8F:B0:61:F1:44:07:32:21:36:A8:67:C2:10:76:4C
MD5:
0A:78:6E:01:FC:C9:1B:6B:C3:39:FA:9B:CC:D0:44:0A
SHA1:
8C:EC:DE:8A:41:96:2B:32:9E:3C:43:7D:F6:79:0C:83:
54:81:22:0A
SHA256:
F7:EA:C3:2D:65:64:06:C1:04:84:EB:53:22:32:5A:0E:
5D:CA:8D:B3:DE:20:6A:FE:D7:7C:F3:97:00:62:29:14
SHA512:
27:B4:4C:40:EF:58:3B:DA:38:F4:4B:83:3F:1F:DC:01:
55:D3:58:ED:5D:B5:A3:5D:88:FE:BC:9A:11:B0:24:14:
76:83:8C:6F:12:D2:E0:64:D1:5C:24:B3:EC:DF:F7:81:
B7:A1:B0:F6:06:17:51:EE:3A:0C:0B:FC:3A:F9:81:F0
subsystemCert cert-pki-ocsp
Internal Key Storage Token
-----BEGIN CERTIFICATE REQUEST-----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-----END CERTIFICATE REQUEST-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
remote
cn=OCSP Subsystem Certificate,o=silentdom
Certificate:
Data:
Version: v3
Serial Number: 0x11
Signature Algorithm: SHA512withRSA - 1.2.840.113549.1.1.13
Issuer: CN=Certificate Authority-ca,O=silentdom
Validity:
Not Before: Wednesday, February 1, 2012 1:11:38 PM EST US/Eastern
Not After: Tuesday, January 21, 2014 1:11:38 PM EST US/Eastern
Subject: CN=OCSP Subsystem Certificate,O=silentdom
Subject Public Key Info:
Algorithm: RSA - 1.2.840.113549.1.1.1
Public Key:
Exponent: 65537
Public Key Modulus: (2048 bits) :
CC:98:F3:93:98:85:C2:5A:1A:15:06:D5:4B:AA:0E:97:
71:89:D5:DE:76:49:2F:C8:24:20:40:B8:8B:48:75:79:
62:72:26:AE:41:1A:B7:F3:94:B3:8C:92:F3:8B:64:32:
AA:2E:20:41:B3:F4:80:41:F6:B3:7D:0C:A6:25:DD:32:
36:33:F8:38:87:D8:E1:31:F6:B2:30:1A:F4:BC:EE:9C:
BD:18:E4:85:64:F1:F6:17:07:38:14:62:BA:5A:6D:6D:
BB:02:F1:C5:DD:7C:89:98:E7:23:07:88:C4:B8:9F:F9:
5D:E3:6D:DF:58:7E:98:1A:5D:B7:9D:F4:A0:FD:99:E3:
FF:26:9F:6A:E6:F9:4F:FF:BC:8C:7C:67:B1:26:53:89:
C9:EC:41:F0:B0:26:DA:D6:D1:01:D5:F7:C5:45:62:B7:
9D:FA:DB:D5:EE:D3:6B:74:86:80:4D:1E:61:CE:22:AF:
72:41:38:CC:19:AE:FE:C2:7A:7C:95:BF:81:CE:1E:D5:
6A:65:E7:77:1B:C9:15:64:1B:B7:30:5D:CD:41:D7:E3:
D1:00:F2:7C:02:C7:AE:30:4C:CD:18:D8:8A:1B:ED:54:
AF:21:29:EE:41:EF:E3:33:BB:2E:05:93:58:46:02:03:
C7:01:7E:5B:89:D1:1E:40:C7:A8:88:A2:8F:CA:17:99
Extensions:
Identifier: Authority Key Identifier - 2.5.29.35
Critical: no
Key Identifier:
43:AC:F6:30:91:3A:B5:87:0C:A2:D4:AF:2A:61:6D:E5:
E7:61:E2:1A
Identifier: Authority Info Access: - 1.3.6.1.5.5.7.1.1
Critical: no
Access Description:
Method #0: ocsp
Location #0: URIName: http://f16-pki.test.com:9180/ca/ocsp
Identifier: Key Usage: - 2.5.29.15
Critical: yes
Key Usage:
Digital Signature
Non Repudiation
Key Encipherment
Data Encipherment
Identifier: Extended Key Usage: - 2.5.29.37
Critical: no
Extended Key Usage:
1.3.6.1.5.5.7.3.2
Signature:
Algorithm: SHA512withRSA - 1.2.840.113549.1.1.13
Signature:
0F:E7:EF:88:B9:A3:F0:28:91:D7:D8:32:41:A7:F0:C4:
E3:EA:26:9B:05:7F:39:B8:D5:69:70:34:A6:F9:FF:D9:
CB:93:F4:24:CA:5A:36:2C:44:35:6F:E5:C4:C8:35:7B:
33:07:4D:48:21:58:E0:AD:9A:39:F3:37:C0:61:8D:9E:
DB:DA:8C:DD:FD:75:84:7D:87:74:65:1E:DE:22:A1:84:
78:23:A6:28:C9:64:52:26:BA:78:8C:3F:A7:4E:29:4B:
CE:92:B6:DF:FC:79:59:DC:6C:82:1C:20:96:CD:BC:21:
99:67:87:51:6D:56:27:66:2F:8C:FB:55:7B:3D:9B:62:
95:A5:39:53:A7:C0:F6:B4:AB:60:75:0C:A0:E3:BC:4A:
75:1D:FE:B0:C0:93:87:93:6B:6F:79:DD:F7:99:C6:5D:
C5:E0:99:00:48:47:97:CB:20:2C:CA:7B:F8:2F:26:43:
B3:B1:58:E5:53:E5:D5:4F:B0:85:58:FE:5B:C5:79:26:
87:CA:B1:80:E1:A3:EB:85:BD:57:AA:8F:A4:24:18:D4:
4D:38:E6:4B:A6:E8:5D:7E:4D:CE:91:0E:47:2C:D3:9C:
99:59:2F:30:E4:7C:BA:45:55:9B:58:98:5C:54:64:13:
9F:F3:39:92:CC:23:20:90:8F:8A:54:D4:9D:6E:E2:8C
FingerPrint
MD2:
48:20:10:54:C6:91:21:3C:7D:62:63:24:21:5F:6E:C2
MD5:
BB:AA:60:8C:D4:C3:39:C1:57:CC:3E:E1:14:86:5C:49
SHA1:
ED:FB:0C:1B:8E:81:EC:08:6A:86:0B:59:9D:EC:9D:7D:
1F:BB:15:F2
SHA256:
97:9B:40:22:91:05:0F:CD:55:10:DA:09:95:A1:85:E3:
CD:66:B6:DF:E6:3E:3C:BB:A5:B7:BB:D0:6E:0A:06:3D
SHA512:
B3:35:D6:79:86:55:AC:0C:A2:61:72:2F:17:FC:C2:09:
39:60:26:C0:82:95:D3:B7:BA:63:79:93:15:DF:95:B0:
8F:87:B9:46:8F:3A:4A:01:5A:C9:98:86:BF:93:0A:1B:
75:66:83:6B:5E:34:01:87:54:5D:E4:94:32:72:4D:B1
auditSigningCert cert-pki-ocsp
Internal Key Storage Token
-----BEGIN CERTIFICATE REQUEST-----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-----END CERTIFICATE REQUEST-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
remote
cn=OCSP Audit Signing Certificate,o=silentdom
Certificate:
Data:
Version: v3
Serial Number: 0x12
Signature Algorithm: SHA512withRSA - 1.2.840.113549.1.1.13
Issuer: CN=Certificate Authority-ca,O=silentdom
Validity:
Not Before: Wednesday, February 1, 2012 1:11:44 PM EST US/Eastern
Not After: Tuesday, January 21, 2014 1:11:44 PM EST US/Eastern
Subject: CN=OCSP Audit Signing Certificate,O=silentdom
Subject Public Key Info:
Algorithm: RSA - 1.2.840.113549.1.1.1
Public Key:
Exponent: 65537
Public Key Modulus: (2048 bits) :
A5:EB:43:37:72:3A:EC:54:8F:63:58:BB:C2:83:75:3F:
25:5C:87:91:13:54:D0:8A:F5:58:46:0B:0C:04:F6:80:
32:E0:C7:22:38:31:14:D3:6B:3A:94:A0:7F:CD:63:DF:
03:54:83:1B:F4:CA:34:17:2C:76:B0:8B:09:D1:62:32:
10:CE:B6:8C:BF:3A:4B:B6:07:8D:3A:8E:8A:F0:7C:0A:
5B:8D:11:41:53:88:A0:9D:01:21:CA:F8:8C:53:91:CF:
B2:E8:4F:ED:4D:E9:A3:3E:30:E3:1B:BC:06:E7:78:81:
2C:9B:F5:C1:54:E4:4D:A3:9C:0B:14:45:C6:E1:BC:6B:
8B:5B:01:4C:1A:17:CB:5C:98:0C:9F:EE:0E:A0:FA:2B:
0B:2F:E0:36:01:A7:FC:9E:32:F9:FC:6A:F1:B1:DF:44:
0A:00:C5:8C:AF:AF:45:29:CF:47:4E:F0:0A:E7:CA:9B:
B9:83:13:D1:56:47:37:A9:A0:7B:DA:A5:BD:30:CC:68:
B5:1A:35:C1:A6:59:A8:8A:95:22:79:4D:EA:3D:92:80:
25:96:87:20:4B:F3:E9:1A:E0:CA:8C:DE:04:FB:F6:1B:
97:A4:07:5D:55:B9:9B:19:96:5C:83:B5:B5:C6:1D:F7:
D6:26:2B:7D:83:BF:BB:41:8E:8A:78:51:04:65:FA:83
Extensions:
Identifier: Authority Key Identifier - 2.5.29.35
Critical: no
Key Identifier:
43:AC:F6:30:91:3A:B5:87:0C:A2:D4:AF:2A:61:6D:E5:
E7:61:E2:1A
Identifier: Authority Info Access: - 1.3.6.1.5.5.7.1.1
Critical: no
Access Description:
Method #0: ocsp
Location #0: URIName: http://f16-pki.test.com:9180/ca/ocsp
Identifier: Key Usage: - 2.5.29.15
Critical: yes
Key Usage:
Digital Signature
Non Repudiation
Signature:
Algorithm: SHA512withRSA - 1.2.840.113549.1.1.13
Signature:
81:E1:C2:67:F9:0F:8A:A2:C3:3C:40:F8:79:6C:CF:51:
10:2A:D0:6C:07:92:07:17:F0:A8:0B:E8:16:F6:BF:12:
6D:74:EA:E9:D1:0F:90:86:AE:80:3A:2B:0E:14:68:A2:
DE:36:59:53:9F:AD:6A:8B:31:89:FB:33:D0:57:15:CD:
6B:16:6B:64:38:42:65:51:A0:BD:66:6C:96:80:C2:D2:
DC:D3:FC:91:98:EE:6E:00:CE:55:87:AD:40:17:03:4E:
F1:3C:C9:9B:C3:C0:30:C8:DD:EF:C7:2E:4D:EC:76:13:
8B:3B:C2:23:D8:BF:BC:21:ED:BF:14:4E:28:17:7B:A9:
12:05:04:47:70:CE:92:7C:DF:9F:25:5E:A1:66:17:8D:
BD:91:D6:09:A9:11:0E:1B:E1:C1:8D:C7:9D:A2:6B:51:
A6:11:DD:FF:CC:B0:59:A4:B0:21:1A:92:66:7C:73:48:
F6:5B:74:7D:3C:57:58:A6:5D:E1:76:1D:0C:B4:02:8F:
7D:49:75:43:8E:09:AD:E7:8C:D7:8D:EC:46:D9:3B:2C:
63:36:6D:B4:83:52:5A:C6:E4:E5:FF:B0:45:17:30:3B:
5A:A5:8D:3C:34:C5:15:E8:C1:5F:18:C7:8A:CB:E7:03:
02:75:C6:00:6A:CF:A9:90:F2:A9:FA:CA:7B:82:84:21
FingerPrint
MD2:
0B:E4:65:2F:47:2A:17:25:FC:36:89:3F:F7:4E:1F:F3
MD5:
66:C1:77:8B:6E:BC:DE:4D:BE:86:16:57:93:E8:85:37
SHA1:
37:96:FD:68:9E:E4:75:0E:40:59:AF:0B:61:B9:B8:18:
6E:31:57:57
SHA256:
88:15:80:B3:25:FE:FE:E1:30:6C:EA:AD:E5:55:B0:52:
1A:2C:82:DE:6E:4A:1C:06:E0:8C:8C:BA:7E:03:13:AB
SHA512:
05:4A:9A:BD:6D:6E:E1:B1:AA:A2:EF:88:B0:57:FE:E1:
1B:19:78:B0:4A:1E:09:AC:F8:32:FB:6C:C6:44:46:4B:
D6:7F:CD:A3:5B:2A:B1:AB:D7:D6:1D:8C:73:89:90:E5:
89:0D:C2:43:86:36:72:63:26:F0:DB:B1:4A:27:B2:F9
display
success
checked
16
Requests and Certificates
welcome
Welcome
module
Key Store
confighsmlogin
ConfigHSMLogin
securitydomain
Security Domain
securitydomain
Display Certificate Chain
subsystem
Subsystem Type
restorekeys
Import Keys and Certificates
databasepanel
Internal Database
sizepanel
Key Pairs
namepanel
Subject Names
certrequestpanel
Requests and Certificates
backupkeys
Export Keys and Certificates
savepk12
Save Keys and Certificates
adminpanel
Administrator
importadmincertpanel
Import Administrator's Certificate
donepanel
Done
10
OCSP Setup Wizard
f16-pki.test.com
certrequestpanel
9444
tag=Request value=-----BEGIN CERTIFICATE REQUEST-----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-----END CERTIFICATE REQUEST-----
tag=Request value=-----BEGIN CERTIFICATE REQUEST-----
MIICdDCCAVwCAQAwLzESMBAGA1UEChMJc2lsZW50ZG9tMRkwFwYDVQQDExBmMTYtcGtpLnRlc3Qu
Y29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA03Bvq6Ay6kobydB5Qfr/LHBpwOWw
l6KqBf/eFAJbDPuXdJPmCvlJnFIbmZSIlKz2e2fwEE3dMFNLf2XweBL7WKui5mZqqECU4sVDOpWd
3D8TZrMAJuvtW33x3iKZDffgD1wcnjv0PPbWZ4E4f6jw5pfy0eov1tqJkCE3S10WG8nbEkGn3dqC
7eVaRYEGFpbBaqWabra+UjtF3fcsyfWC7sRF/o+zG/JHQKRD1XKLt0fdWrAo3oBBNY33o8iSZ8Xr
4Lz2m7mAjOtDhoCf0Y+3Mpvqf4W/8dqLoPfu0I8emiitYO8/q51yNwQD+OE8p7k1kTOzVws4iXGA
jMGElFQyAwIDAQABoAAwDQYJKoZIhvcNAQELBQADggEBAFX3ia8l3SZBIfz0Onxq86hiQQu1CFoC
Nvo6WuC/+vSdEvYDmV7ffNZlCa/fWB8382wlFt3qMKQIDHNr+Q3lWdYzYOF6Kvw9fkGFiOD8cGDV
aLbTzHihtmW8fnmkRNef8nidv1XoD/G8ofmcW3NjfnjeYwJ607McmRoCOILfowsecS+WyRLFFQ5b
xAlRAmHsp7dQkqXESiR6XVxaqhavJJH3chfu+oHQ6wZYoGcAU7t52pT7OMZOpwFztk/uiCwsjfsy
ADfqgJSeyXXqP2cO5R7Yf6B+bRl4Up8efTMpixtE8CXAo/qBzPl6qLanElO9307ZHgdR7dp3gII/
HlBAYW8=
-----END CERTIFICATE REQUEST-----
tag=Request value=-----BEGIN CERTIFICATE REQUEST-----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-----END CERTIFICATE REQUEST-----
tag=Request value=-----BEGIN CERTIFICATE REQUEST-----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-----END CERTIFICATE REQUEST-----
tag=Certificate value=-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
tag=Certificate value=-----BEGIN CERTIFICATE-----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==
-----END CERTIFICATE-----
tag=Certificate value=-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
tag=Certificate value=-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
tag=Nickname value=ocspSigningCert cert-pki-ocsp
tag=Nickname value=Server-Cert cert-pki-ocsp
tag=Nickname value=subsystemCert cert-pki-ocsp
tag=Nickname value=auditSigningCert cert-pki-ocsp
Sleeping for 5 secs..
#############################################
Attempting to connect to: f16-pki.test.com:11445
ERROR: unable to set ECC Cipher List
ERROR: Exception = org.mozilla.jss.ssl.SSLSocketException: Failed to enable cipher 0xc001
: (-12266) An unknown SSL cipher suite has been requested.
Connected.
Posting Query = https://f16-pki.test.com:11445//ocsp/admin/console/config/wizard?p=10&op=next&xml=true&subsystem=-----BEGIN+CERTIFICATE-----%0AMIIDdzCCAl%2BgAwIBAgIBETANBgkqhkiG9w0BAQ0FADA3MRIwEAYDVQQKEwlzaWxlbnRkb20xITAf%0ABgNVBAMTGENlcnRpZmljYXRlIEF1dGhvcml0eS1jYTAeFw0xMjAyMDExODExMzhaFw0xNDAxMjEx%0AODExMzhaMDkxEjAQBgNVBAoTCXNpbGVudGRvbTEjMCEGA1UEAxMaT0NTUCBTdWJzeXN0ZW0gQ2Vy%0AdGlmaWNhdGUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDMmPOTmIXCWhoVBtVLqg6X%0AcYnV3nZJL8gkIEC4i0h1eWJyJq5BGrfzlLOMkvOLZDKqLiBBs%2FSAQfazfQymJd0yNjP4OIfY4TH2%0AsjAa9LzunL0Y5IVk8fYXBzgUYrpabW27AvHF3XyJmOcjB4jEuJ%2F5XeNt31h%2BmBpdt530oP2Z4%2F8m%0An2rm%2BU%2F%2FvIx8Z7EmU4nJ7EHwsCba1tEB1ffFRWK3nfrb1e7Ta3SGgE0eYc4ir3JBOMwZrv7CenyV%0Av4HOHtVqZed3G8kVZBu3MF3NQdfj0QDyfALHrjBMzRjYihvtVK8hKe5B7%2BMzuy4Fk1hGAgPHAX5b%0AidEeQMeoiKKPyheZAgMBAAGjgYswgYgwHwYDVR0jBBgwFoAUQ6z2MJE6tYcMotSvKmFt5edh4how%0AQAYIKwYBBQUHAQEENDAyMDAGCCsGAQUFBzABhiRodHRwOi8vZjE2LXBraS50ZXN0LmNvbTo5MTgw%0AL2NhL29jc3AwDgYDVR0PAQH%2FBAQDAgTwMBMGA1UdJQQMMAoGCCsGAQUFBwMCMA0GCSqGSIb3DQEB%0ADQUAA4IBAQAP5%2B%2BIuaPwKJHX2DJBp%2FDE4%2BommwV%2FObjVaXA0pvn%2F2cuT9CTKWjYsRDVv5cTINXsz%0AB01IIVjgrZo58zfAYY2e29qM3f11hH2HdGUe3iKhhHgjpijJZFImuniMP6dOKUvOkrbf%2FHlZ3GyC%0AHCCWzbwhmWeHUW1WJ2YvjPtVez2bYpWlOVOnwPa0q2B1DKDjvEp1Hf6wwJOHk2tved33mcZdxeCZ%0AAEhHl8sgLMp7%2BC8mQ7OxWOVT5dVPsIVY%2FlvFeSaHyrGA4aPrhb1Xqo%2BkJBjUTTjmS6boXX5NzpEO%0ARyzTnJlZLzDkfLpFVZtYmFxUZBOf8zmSzCMgkI%2BKVNSdbuKM%0A-----END+CERTIFICATE-----&subsystem_cc=&signing=-----BEGIN+CERTIFICATE-----%0AMIIDdjCCAl6gAwIBAgIBDzANBgkqhkiG9w0BAQ0FADA3MRIwEAYDVQQKEwlzaWxlbnRkb20xITAf%0ABgNVBAMTGENlcnRpZmljYXRlIEF1dGhvcml0eS1jYTAeFw0xMjAyMDExODExMjRaFw0xNDAxMjEx%0AODExMjRaMDcxEjAQBgNVBAoTCXNpbGVudGRvbTEhMB8GA1UEAxMYT0NTUCBTaWduaW5nIENlcnRp%0AZmljYXRlMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA66SvYVTbCRymHTYbD265KwRQ%0AGNLiQJS091Sb%2B5d01z4B0X1mGa34kTK8GflOy8erQvc24hPPB4%2FUPJxx3B0%2FBJHtk8qJJXEEfj4X%0AhgZGqBUYbCOlRHf9I6Ph81kvMXkv4VLE0K7BO2Wocjxwalwfsqs4CBdhQrtP3VACA8KkocN%2FD0F0%0AijPLET35Neu1UYrfrvwFxg3P7BzN8tvLjVV1jdhuqFOtHd8x4z7RjHPvZXVLtKyOcbAT8G%2FJIlBF%0AGw8mLmiPJCldwsj2C0g%2BBTyE008Lmo%2F827kLq9R7sGVhm5WidZHInqHEaH5eNIxD558qBlBDTHKo%0AjZon9jBXZajeMwIDAQABo4GMMIGJMB8GA1UdIwQYMBaAFEOs9jCROrWHDKLUryphbeXnYeIaMEAG%0ACCsGAQUFBwEBBDQwMjAwBggrBgEFBQcwAYYkaHR0cDovL2YxNi1wa2kudGVzdC5jb206OTE4MC9j%0AYS9vY3NwMBMGA1UdJQQMMAoGCCsGAQUFBwMJMA8GCSsGAQUFBzABBQQCBQAwDQYJKoZIhvcNAQEN%0ABQADggEBAE%2F7Tn9BxzAOS1Nb1q6VhmNM8FSGMaPe6CRaKN%2BmW34L6LWFhWG4Aklq3Mx9W8jrGXVG%0AtBlt2dT4AIVtxevOMyv6ZWWAfwmaAjZqDOYhFipUDBe2Do%2FieEcud8bAKvPHALso0n2Hd7t4q1kT%0Ap9UzVan38G2vAq82p4EUijRZ18qaNAb3kd4qXQrNbFnT30J5HSqulRNE6g3I3Oj3r8Vf3RUnOJa9%0AXNCSN2enGvBPq8%2FzcyD3nUXMSmyYQ4fcNxCCXo35wSEqvPpcPPIrp9FoVr9y28Jct0LZfDbLEUGU%0AUZur7Kei5qx0KfjMXv5u2WmvQCSnS3m8rw%2B6DzujSgtcjzU%3D%0A-----END+CERTIFICATE-----&signing_cc=&sslserver=-----BEGIN+CERTIFICATE-----%0AMIIDgTCCAmmgAwIBAgIBEDANBgkqhkiG9w0BAQ0FADA3MRIwEAYDVQQKEwlzaWxlbnRkb20xITAf%0ABgNVBAMTGENlcnRpZmljYXRlIEF1dGhvcml0eS1jYTAeFw0xMjAyMDExODExMzJaFw0xNDAxMjEx%0AODExMzJaMC8xEjAQBgNVBAoTCXNpbGVudGRvbTEZMBcGA1UEAxMQZjE2LXBraS50ZXN0LmNvbTCC%0AASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANNwb6ugMupKG8nQeUH6%2FyxwacDlsJeiqgX%2F%0A3hQCWwz7l3ST5gr5SZxSG5mUiJSs9ntn8BBN3TBTS39l8HgS%2B1irouZmaqhAlOLFQzqVndw%2FE2az%0AACbr7Vt98d4imQ334A9cHJ479Dz21meBOH%2Bo8OaX8tHqL9baiZAhN0tdFhvJ2xJBp93agu3lWkWB%0ABhaWwWqlmm62vlI7Rd33LMn1gu7ERf6PsxvyR0CkQ9Vyi7dH3VqwKN6AQTWN96PIkmfF6%2BC89pu5%0AgIzrQ4aAn9GPtzKb6n%2BFv%2FHai6D37tCPHpoorWDvP6udcjcEA%2FjhPKe5NZEzs1cLOIlxgIzBhJRU%0AMgMCAwEAAaOBnzCBnDAfBgNVHSMEGDAWgBRDrPYwkTq1hwyi1K8qYW3l52HiGjBABggrBgEFBQcB%0AAQQ0MDIwMAYIKwYBBQUHMAGGJGh0dHA6Ly9mMTYtcGtpLnRlc3QuY29tOjkxODAvY2Evb2NzcDAO%0ABgNVHQ8BAf8EBAMCBPAwJwYDVR0lBCAwHgYIKwYBBQUHAwEGCCsGAQUFBwMCBggrBgEFBQcDBDAN%0ABgkqhkiG9w0BAQ0FAAOCAQEAF7ayv70ADuKb0A4jV8oa%2B1vr%2FqD7BZEAnxHYdYRwTuSHlQObtHMD%0AVgQz1oC8jM%2BxF%2BCuxvKupE7lX5XL%2FHrDVLUyuU6roJIbkX6QAfBmEEPQ0YMEBqjR5NasT9YHiTrA%0ARO%2BDVvEXKT3O0kDk77kok5tjzVvbVwA53X8bdMjmty0vZF%2BL3H9rODXxGGd0JIXfM2dP0Yps5JAq%0AI5RhJDcjSmaCYQ1u1vScSPg5zSzLYk9W1edf6iwadzbu%2FCm9STglM8vYA%2FNRvOStw2QyA1rv5WyV%0AlC842kdCZosbuxgldBFjxt5WDi9FxZTsgYNwFIVd%2F0NjBaJB%2Bt057Q6C2adgLg%3D%3D%0A-----END+CERTIFICATE-----&sslserver_cc=&audit_signing=-----BEGIN+CERTIFICATE-----%0AMIIDZDCCAkygAwIBAgIBEjANBgkqhkiG9w0BAQ0FADA3MRIwEAYDVQQKEwlzaWxlbnRkb20xITAf%0ABgNVBAMTGENlcnRpZmljYXRlIEF1dGhvcml0eS1jYTAeFw0xMjAyMDExODExNDRaFw0xNDAxMjEx%0AODExNDRaMD0xEjAQBgNVBAoTCXNpbGVudGRvbTEnMCUGA1UEAxMeT0NTUCBBdWRpdCBTaWduaW5n%0AIENlcnRpZmljYXRlMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEApetDN3I67FSPY1i7%0AwoN1PyVch5ETVNCK9VhGCwwE9oAy4MciODEU02s6lKB%2FzWPfA1SDG%2FTKNBcsdrCLCdFiMhDOtoy%2F%0AOku2B406jorwfApbjRFBU4ignQEhyviMU5HPsuhP7U3poz4w4xu8Bud4gSyb9cFU5E2jnAsURcbh%0AvGuLWwFMGhfLXJgMn%2B4OoPorCy%2FgNgGn%2FJ4y%2Bfxq8bHfRAoAxYyvr0Upz0dO8Arnypu5gxPRVkc3%0AqaB72qW9MMxotRo1waZZqIqVInlN6j2SgCWWhyBL8%2Bka4MqM3gT79huXpAddVbmbGZZcg7W1xh33%0A1iYrfYO%2Fu0GOinhRBGX6gwIDAQABo3UwczAfBgNVHSMEGDAWgBRDrPYwkTq1hwyi1K8qYW3l52Hi%0AGjBABggrBgEFBQcBAQQ0MDIwMAYIKwYBBQUHMAGGJGh0dHA6Ly9mMTYtcGtpLnRlc3QuY29tOjkx%0AODAvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBsAwDQYJKoZIhvcNAQENBQADggEBAIHhwmf5D4qiwzxA%0A%2BHlsz1EQKtBsB5IHF%2FCoC%2BgW9r8SbXTq6dEPkIaugDorDhRoot42WVOfrWqLMYn7M9BXFc1rFmtk%0AOEJlUaC9ZmyWgMLS3NP8kZjubgDOVYetQBcDTvE8yZvDwDDI3e%2FHLk3sdhOLO8Ij2L%2B8Ie2%2FFE4o%0AF3upEgUER3DOknzfnyVeoWYXjb2R1gmpEQ4b4cGNx52ia1GmEd3%2FzLBZpLAhGpJmfHNI9lt0fTxX%0AWKZd4XYdDLQCj31JdUOOCa3njNeN7EbZOyxjNm20g1JaxuTl%2F7BFFzA7WqWNPDTFFejBXxjHisvn%0AAwJ1xgBqz6mQ8qn6ynuChCE%3D%0A-----END+CERTIFICATE-----&audit_signing_cc=
RESPONSE STATUS: HTTP/1.1 200 OK
RESPONSE HEADER: Server: Apache-Coyote/1.1
RESPONSE HEADER: Content-Type: application/xml;charset=UTF-8
RESPONSE HEADER: Date: Wed, 01 Feb 2012 18:12:07 GMT
RESPONSE HEADER: Connection: close
html returned=
admin/console/config/backupkeycertpanel.vmsuccess16Export Keys and CertificateswelcomeWelcomemoduleKey StoreconfighsmloginConfigHSMLoginsecuritydomainSecurity DomainsecuritydomainDisplay Certificate ChainsubsystemSubsystem TyperestorekeysImport Keys and CertificatesdatabasepanelInternal DatabasesizepanelKey PairsnamepanelSubject NamescertrequestpanelRequests and CertificatesbackupkeysExport Keys and Certificatessavepk12Save Keys and CertificatesadminpanelAdministratorimportadmincertpanelImport Administrator's CertificatedonepanelDonechecked11
OCSP Setup Wizardbackupkeys
admin/console/config/backupkeycertpanel.vm
success
16
Export Keys and Certificates
welcome
Welcome
module
Key Store
confighsmlogin
ConfigHSMLogin
securitydomain
Security Domain
securitydomain
Display Certificate Chain
subsystem
Subsystem Type
restorekeys
Import Keys and Certificates
databasepanel
Internal Database
sizepanel
Key Pairs
namepanel
Subject Names
certrequestpanel
Requests and Certificates
backupkeys
Export Keys and Certificates
savepk12
Save Keys and Certificates
adminpanel
Administrator
importadmincertpanel
Import Administrator's Certificate
donepanel
Done
checked
11
OCSP Setup Wizard
backupkeys
Sleeping for 5 secs..
#############################################
Attempting to connect to: f16-pki.test.com:11445
ERROR: unable to set ECC Cipher List
ERROR: Exception = org.mozilla.jss.ssl.SSLSocketException: Failed to enable cipher 0xc001
: (-12266) An unknown SSL cipher suite has been requested.
Connected.
Posting Query = https://f16-pki.test.com:11445//ocsp/admin/console/config/wizard?p=11&op=next&xml=true&choice=backupkey&__pwd=testpwd&__pwdagain=redhat
RESPONSE STATUS: HTTP/1.1 200 OK
RESPONSE HEADER: Server: Apache-Coyote/1.1
RESPONSE HEADER: Content-Type: application/xml;charset=UTF-8
RESPONSE HEADER: Date: Wed, 01 Feb 2012 18:12:37 GMT
RESPONSE HEADER: Connection: close
admin/console/config/savepkcs12panel.vm
ocsp
success
16
Save Keys and Certificates
welcome
Welcome
module
Key Store
confighsmlogin
ConfigHSMLogin
securitydomain
Security Domain
securitydomain
Display Certificate Chain
subsystem
Subsystem Type
restorekeys
Import Keys and Certificates
databasepanel
Internal Database
sizepanel
Key Pairs
namepanel
Subject Names
certrequestpanel
Requests and Certificates
backupkeys
Export Keys and Certificates
savepk12
Save Keys and Certificates
adminpanel
Administrator
importadmincertpanel
Import Administrator's Certificate
donepanel
Done
OCSP Setup Wizard
12
savepk12
Sleeping for 5 secs..
#############################################
Attempting to connect to: f16-pki.test.com:11445
ERROR: unable to set ECC Cipher List
ERROR: Exception = org.mozilla.jss.ssl.SSLSocketException: Failed to enable cipher 0xc001
: (-12266) An unknown SSL cipher suite has been requested.
Connected.
Posting Query = https://f16-pki.test.com:11445//ocsp/admin/console/config/savepkcs12?
RESPONSE STATUS: HTTP/1.1 200 OK
RESPONSE HEADER: Server: Apache-Coyote/1.1
RESPONSE HEADER: Content-Type: application/x-pkcs12
RESPONSE HEADER: Date: Wed, 01 Feb 2012 18:12:42 GMT
RESPONSE HEADER: Connection: close
Decoded PFX
Version: 3
AuthSafes has 2 SafeContents
Sleeping for 5 secs..
CRYPTO INIT WITH CERTDB:/var//tmp/testdb
Crypto manager already initialized
Debug : initialize crypto Manager
INITIALIZATION ERROR: org.mozilla.jss.crypto.AlreadyInitializedException
cdir = /var//tmp/testdb
Debug : before getInstance
Debug : before get token
Debug : before login password
Debug : after login password
64-bit osutil library loaded
CRMF_REQUEST = MIIBzTCCAckwggG9AgEBMIIBtIABAqWBiDCBhTESMBAGA1UEChMJc2lsZW50ZG9t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#############################################
Attempting to connect to: f16-pki.test.com:11445
ERROR: unable to set ECC Cipher List
ERROR: Exception = org.mozilla.jss.ssl.SSLSocketException: Failed to enable cipher 0xc001
: (-12266) An unknown SSL cipher suite has been requested.
Connected.
Posting Query = https://f16-pki.test.com:11445//ocsp/admin/console/config/wizard?p=13&op=next&xml=true&cert_request_type=crmf&uid=admin&name=admin&__pwd=testpwd&__admin_password_again=redhat&profileId=caAdminCert&email=pki-ocsp-admin%40test.com&cert_request=MIIBzTCCAckwggG9AgEBMIIBtIABAqWBiDCBhTESMBAGA1UEChMJc2lsZW50ZG9t%0D%0AMSYwJAYJKoZIhvcNAQkBFhdwa2ktb2NzcC1hZG1pbkB0ZXN0LmNvbTEVMBMGCgmS%0D%0AJomT8ixkAQETBWFkbWluMTAwLgYDVQQDEydPQ1NQIEFkbWluaXN0cmF0b3Igb2Yg%0D%0ASW5zdGFuY2UgcGtpLW9jc3CmggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB%0D%0AAQDUxyxRX%2Fr7CQD%2Bk4PELSJTHpOsrltDOneZkKIGD1yyju3vFikHRa23BopDqjVr%0D%0AkS01GnCgjQkdQZ0MQvcLi1CXGs2Mfc80miKeVLhfE%2FQqTKdk%2FsRL5O8a21iY8HAj%0D%0AUyKkWth26qvnyyB7EKlKctop6mAJzCFuDNn8tW00USe%2ByVr6jnOi77iqJ7e7mR%2B5%0D%0A34IiHqH7j4Y7OBmgcZcWSYrI2ULI74g%2FgvH2lyoWQTktnmlC9UrVXhVdDwrczWNa%0D%0A2sclaPIGC4lsXtFbQuotH2zvn4JjQ45OG7z%2BXd7IjgBkvJvsuMUpp%2F4G5EtaCA6v%0D%0A0B6K%2Brum0HHO%2FTzEv7XdBa7zAgMBAAEwAKIGgAQDAAMA&subject=cn%3DOCSP+Administrator+of+Instance+pki-ocsp%2Cuid%3Dadmin%2Ce%3Dpki-ocsp-admin%40test.com%2Co%3Dsilentdom&clone=new&import=true&securitydomain=silentdom
RESPONSE STATUS: HTTP/1.1 200 OK
RESPONSE HEADER: Server: Apache-Coyote/1.1
RESPONSE HEADER: Content-Type: application/xml;charset=UTF-8
RESPONSE HEADER: Date: Wed, 01 Feb 2012 18:12:55 GMT
RESPONSE HEADER: Connection: close
admin/console/config/importadmincertpanel.vm
testpwd
false
9445
testpwd
sdca
success
13
pki-ocsp-admin@test.com
admin
16
f16-pki.test.com
Import Administrator's Certificate
welcome
Welcome
module
Key Store
confighsmlogin
ConfigHSMLogin
securitydomain
Security Domain
securitydomain
Display Certificate Chain
subsystem
Subsystem Type
restorekeys
Import Keys and Certificates
databasepanel
Internal Database
sizepanel
Key Pairs
namepanel
Subject Names
certrequestpanel
Requests and Certificates
backupkeys
Export Keys and Certificates
savepk12
Save Keys and Certificates
adminpanel
Administrator
importadmincertpanel
Import Administrator's Certificate
donepanel
Done
14
OCSP Setup Wizard
true
importadmincertpanel
Sleeping for 5 secs..
#############################################
Attempting to connect to: f16-pki.test.com:9445
ERROR: unable to set ECC Cipher List
ERROR: Exception = org.mozilla.jss.ssl.SSLSocketException: Failed to enable cipher 0xc001
: (-12266) An unknown SSL cipher suite has been requested.
Connected.
Posting Query = https://f16-pki.test.com:9445//ca/admin/ca/getBySerial?serialNumber=13&importCert=true
RESPONSE STATUS: HTTP/1.1 200 OK
RESPONSE HEADER: Server: Apache-Coyote/1.1
RESPONSE HEADER: Content-Type: application/x-x509-user-cert
RESPONSE HEADER: Content-Length: 1945
RESPONSE HEADER: Date: Wed, 01 Feb 2012 18:13:00 GMT
RESPONSE HEADER: Connection: keep-alive
Imported Cert=MIIHlQYJKoZIhvcNAQcCoIIHhjCCB4ICAQExADAPBgkqhkiG9w0BBwGgAgQAoIIH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CRYPTO INIT WITH CERTDB:/var//tmp/testdb
Crypto manager already initialized
importCert string: importing with nickname: OCSP Administrator of Instance pki-ocsp's silentdom ID
Already logged into to DB
SUCCESS: imported admin user cert
Sleeping for 5 secs..
#############################################
Attempting to connect to: f16-pki.test.com:11445
ERROR: unable to set ECC Cipher List
ERROR: Exception = org.mozilla.jss.ssl.SSLSocketException: Failed to enable cipher 0xc001
: (-12266) An unknown SSL cipher suite has been requested.
Connected.
Posting Query = https://f16-pki.test.com:11445//ocsp/admin/console/config/wizard?p=14&op=next&xml=true&caHost=f16-pki.test.com&caPort=9443
RESPONSE STATUS: HTTP/1.1 200 OK
RESPONSE HEADER: Server: Apache-Coyote/1.1
RESPONSE HEADER: Content-Type: application/xml;charset=UTF-8
RESPONSE HEADER: Date: Wed, 01 Feb 2012 18:13:13 GMT
RESPONSE HEADER: Connection: close
11445
admin/console/config/donepanel.vm
/bin/systemctl
f16-pki.test.com
false
ocsp
sdca
pki-ocspd@pki-ocsp.service
success
16
Done
welcome
Welcome
module
Key Store
confighsmlogin
ConfigHSMLogin
securitydomain
Security Domain
securitydomain
Display Certificate Chain
subsystem
Subsystem Type
restorekeys
Import Keys and Certificates
databasepanel
Internal Database
sizepanel
Key Pairs
namepanel
Subject Names
certrequestpanel
Requests and Certificates
backupkeys
Export Keys and Certificates
savepk12
Save Keys and Certificates
adminpanel
Administrator
importadmincertpanel
Import Administrator's Certificate
donepanel
Done
false
15
OCSP Setup Wizard
donepanel
1
Sleeping for 5 secs..
Certificate System - OCSP Instance Configured
#######################################################################