[root@f16-pki silent-configure]# ./ocsp-silent.bash 2>&1 | tee stdout/ocsp-configure-stdout.txt tee: stdout/ocsp-configure-stdout.txt: No such file or directory + pki_silent_admin_user=admin + pki_silent_admin_password=testpwd + pki_silent_admin_email=pki-ocsp-admin@test.com ++ hostname + pki_host=f16-pki.test.com + ocsp_instance_name=pki-ocsp + pki_silent_security_database_repository=/var//tmp/testdb + pki_silent_security_database_password=testpwd ++ cat /var/lib/pki-ocsp/conf/CS.cfg ++ grep preop.pin ++ grep -v grep ++ awk -F= '{print $2}' + ocsp_preop_pin=tRDHkdcVVO3Eem8GFtQa + pki_security_domain_name=silentdom ++ hostname + pki_security_domain_host=f16-pki.test.com + pki_security_domain_admin_name=admin + pki_security_domain_admin_password=testpwd + pki_ldap_host=localhost + pki_ldap_port=389 + pki_bind_dn='cn=Directory\ Manager' + pki_bind_password=redhat + ocsp_token_name=internal + ocsp_token_password=testpwd + ca_nonssl_port=9180 + ca_agent_port=9443 + ca_ee_port=9444 + ca_admin_port=9445 + ocsp_nonssl_port=11180 + ocsp_agent_port=11443 + ocsp_ee_port=11444 + ocsp_admin_port=11445 + ocsp_subsystem_name='OCSP\ Responder' + pki_silent_ocsp_log=/tmp/pki-silent-ocsp.log + ocsp_agent_name='OCSP\ Administrator\ of\ Instance\ pki-ocsp\'\''s\ silentdom\ ID' + ocsp_agent_key_size=2048 + ocsp_agent_key_type=rsa + ocsp_agent_cert_subject='cn=OCSP\ Administrator\ of\ Instance\ pki-ocsp,uid=admin,e=pki-ocsp-admin@test.com,o=silentdom' + ocsp_base_dn=dc=f16-pki.test.com-pki-ocsp + ocsp_db_name=f16-pki.test.com-pki-ocsp + ocsp_key_size=2048 + ocsp_key_type=rsa + ocsp_backup_password=testpwd + ocsp_sign_cert_subject_name='cn=OCSP\ Signing\ Certificate,o=silentdom' + ocsp_subsystem_cert_subject_name='cn=OCSP\ Subsystem\ Certificate,o=silentdom' + ocsp_server_cert_subject_name=cn=f16-pki.test.com,o=silentdom + ocsp_audit_signing_cert_subject_name='cn=OCSP\ Audit\ Signing\ Certificate,o=silentdom' + printf ''\'''\'': Configuring '\''pki-ocsp'\'' . . .\n' '': Configuring 'pki-ocsp' . . . + tee /tmp/pki-silent-ocsp.log + pkisilent ConfigureOCSP -cs_hostname f16-pki.test.com -cs_port 11445 -sd_hostname f16-pki.test.com -sd_ssl_port 9444 -sd_agent_port 9443 -sd_admin_port 9445 -sd_admin_name admin -sd_admin_password testpwd -ca_hostname f16-pki.test.com -ca_port 9180 -ca_ssl_port 9444 -client_certdb_dir /var//tmp/testdb -client_certdb_pwd redhat -preop_pin tRDHkdcVVO3Eem8GFtQa -domain_name silentdom -admin_user admin -admin_password redhat -admin_email pki-ocsp-admin@test.com -agent_name 'OCSP\' 'Administrator\' 'of\' 'Instance\' 'pki-ocsp\'\''s\' 'silentdom\' ID -ldap_host localhost -ldap_port 389 -bind_dn 'cn=Directory\ Manager' -bind_password redhat -base_dn dc=f16-pki.test.com-pki-ocsp -db_name f16-pki.test.com-pki-ocsp -key_size 2048 -key_type rsa -token_name internal -token_pwd redhat -agent_key_size 2048 -agent_key_type rsa -agent_cert_subject 'cn=OCSP\ Administrator\ of\ Instance\ pki-ocsp,uid=admin,e=pki-ocsp-admin@test.com,o=silentdom' -subsystem_name 'OCSP\' Responder -backup_pwd redhat -ocsp_sign_cert_subject_name 'cn=OCSP\ Signing\ Certificate,o=silentdom' -ocsp_subsystem_cert_subject_name 'cn=OCSP\ Subsystem\ Certificate,o=silentdom' -ocsp_server_cert_subject_name cn=f16-pki.test.com,o=silentdom -ocsp_audit_signing_cert_subject_name 'cn=OCSP\ Audit\ Signing\ Certificate,o=silentdom' libpath=/usr/lib64 ####################################################################### CRYPTO INIT WITH CERTDB:/var//tmp/testdb tokenpwd:testpwd ############################################# Attempting to connect to: f16-pki.test.com:11445 ERROR: unable to set ECC Cipher List ERROR: Exception = org.mozilla.jss.ssl.SSLSocketException: Failed to enable cipher 0xc001 : (-12266) An unknown SSL cipher suite has been requested. in TestCertApprovalCallback.approve() Peer cert details: subject: CN=f16-pki.test.com,O=2012-02-01 13:06:39 issuer: CN=f16-pki.test.com,O=2012-02-01 13:06:39 serial: 0 item 1 reason=-8156 depth=1 cert details: subject: CN=f16-pki.test.com,O=2012-02-01 13:06:39 issuer: CN=f16-pki.test.com,O=2012-02-01 13:06:39 serial: 0 item 2 reason=-8172 depth=1 cert details: subject: CN=f16-pki.test.com,O=2012-02-01 13:06:39 issuer: CN=f16-pki.test.com,O=2012-02-01 13:06:39 serial: 0 importing certificate. Connected. Posting Query = https://f16-pki.test.com:11445//ocsp/admin/console/config/login?pin=tRDHkdcVVO3Eem8GFtQa&xml=true RESPONSE STATUS: HTTP/1.1 302 Moved Temporarily RESPONSE HEADER: Server: Apache-Coyote/1.1 RESPONSE HEADER: Set-Cookie: JSESSIONID=031EAFF812FCDC348EB7D6A2AC8EF087; Path=/ocsp; Secure RESPONSE HEADER: Location: https://f16-pki.test.com:11445/ocsp/admin/console/config/wizard RESPONSE HEADER: Content-Type: text/html;charset=UTF-8 RESPONSE HEADER: Content-Length: 0 RESPONSE HEADER: Date: Wed, 01 Feb 2012 18:09:31 GMT RESPONSE HEADER: Connection: keep-alive xml returned: cookie list: JSESSIONID=031EAFF812FCDC348EB7D6A2AC8EF087; Path=/ocsp; Secure ############################################# Attempting to connect to: f16-pki.test.com:11445 ERROR: unable to set ECC Cipher List ERROR: Exception = org.mozilla.jss.ssl.SSLSocketException: Failed to enable cipher 0xc001 : (-12266) An unknown SSL cipher suite has been requested. Connected. Posting Query = https://f16-pki.test.com:11445//ocsp/admin/console/config/wizard?p=0&op=next&xml=true RESPONSE STATUS: HTTP/1.1 200 OK RESPONSE HEADER: Server: Apache-Coyote/1.1 RESPONSE HEADER: Content-Type: application/xml;charset=UTF-8 RESPONSE HEADER: Date: Wed, 01 Feb 2012 18:09:35 GMT RESPONSE HEADER: Connection: close admin/console/config/modulepanel.vm display 2 NSS Internal PKCS #11 Module NSS Internal PKCS #11 Module ../img/clearpixel.gif nfast nCipher's nFast Token Hardware Module ../img/clearpixel.gif lunasa SafeNet's LunaSA Token Hardware Module ../img/clearpixel.gif 16 Key Store welcome Welcome module Key Store confighsmlogin ConfigHSMLogin securitydomain Security Domain securitydomain Display Certificate Chain subsystem Subsystem Type restorekeys Import Keys and Certificates databasepanel Internal Database sizepanel Key Pairs namepanel Subject Names certrequestpanel Requests and Certificates backupkeys Export Keys and Certificates savepk12 Save Keys and Certificates adminpanel Administrator importadmincertpanel Import Administrator's Certificate donepanel Done

1

OCSP Setup Wizard Internal Key Storage Token module
Sleeping for 5 secs.. ############################################# Attempting to connect to: f16-pki.test.com:11445 ERROR: unable to set ECC Cipher List ERROR: Exception = org.mozilla.jss.ssl.SSLSocketException: Failed to enable cipher 0xc001 : (-12266) An unknown SSL cipher suite has been requested. Connected. Posting Query = https://f16-pki.test.com:11445//ocsp/admin/console/config/wizard?p=1&op=next&xml=true&choice=Internal+Key+Storage+Token RESPONSE STATUS: HTTP/1.1 200 OK RESPONSE HEADER: Server: Apache-Coyote/1.1 RESPONSE HEADER: Content-Type: application/xml;charset=UTF-8 RESPONSE HEADER: Date: Wed, 01 Feb 2012 18:09:43 GMT RESPONSE HEADER: Connection: close f16-pki.test.com admin/console/config/securitydomainpanel.vm /usr/bin/pkicontrol Test Domain https://f16-pki.test.com:9445 11180 OCSP Security Domain welcome Welcome module Key Store confighsmlogin ConfigHSMLogin securitydomain Security Domain securitydomain Display Certificate Chain subsystem Subsystem Type restorekeys Import Keys and Certificates databasepanel Internal Database sizepanel Key Pairs namepanel Subject Names certrequestpanel Requests and Certificates backupkeys Export Keys and Certificates savepk12 Save Keys and Certificates adminpanel Administrator importadmincertpanel Import Administrator's Certificate donepanel Done https://f16-pki.test.com:9445 OCSP Setup Wizard 11444 11445 securitydomain 11443 OCSP ca pki-ocspd@pki-ocsp.service success 16

3

checked OCSP Setup Wizard
Sleeping for 5 secs.. ############################################# Attempting to connect to: f16-pki.test.com:11445 ERROR: unable to set ECC Cipher List ERROR: Exception = org.mozilla.jss.ssl.SSLSocketException: Failed to enable cipher 0xc001 : (-12266) An unknown SSL cipher suite has been requested. Connected. Posting Query = https://f16-pki.test.com:11445//ocsp/admin/console/config/wizard?sdomainURL=https%3A%2F%2Ff16-pki.test.com%3A9445&choice=existingdomain&p=3&op=next&xml=true RESPONSE STATUS: HTTP/1.1 200 OK RESPONSE HEADER: Server: Apache-Coyote/1.1 RESPONSE HEADER: Content-Type: application/xml;charset=UTF-8 RESPONSE HEADER: Date: Wed, 01 Feb 2012 18:09:57 GMT RESPONSE HEADER: Connection: close admin/console/config/displaycertchainpanel.vm OCSP success https://f16-pki.test.com:9445 16 OCSP Certificate: Data: Version: v3 Serial Number: 0x1 Signature Algorithm: SHA512withRSA - 1.2.840.113549.1.1.13 Issuer: CN=Certificate Authority-ca,O=silentdom Validity: Not Before: Wednesday, February 1, 2012 9:22:12 AM EST US/Eastern Not After: Saturday, February 1, 2020 9:22:12 AM EST US/Eastern Subject: CN=Certificate Authority-ca,O=silentdom Subject Public Key Info: Algorithm: RSA - 1.2.840.113549.1.1.1 Public Key: Exponent: 65537 Public Key Modulus: (2048 bits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xtensions: Identifier: Authority Key Identifier - 2.5.29.35 Critical: no Key Identifier: 43:AC:F6:30:91:3A:B5:87:0C:A2:D4:AF:2A:61:6D:E5: E7:61:E2:1A Identifier: Basic Constraints - 2.5.29.19 Critical: yes Is CA: yes Path Length Constraint: UNLIMITED Identifier: Key Usage: - 2.5.29.15 Critical: yes Key Usage: Digital Signature Non Repudiation Key CertSign Crl Sign Identifier: Subject Key Identifier - 2.5.29.14 Critical: no Key Identifier: 43:AC:F6:30:91:3A:B5:87:0C:A2:D4:AF:2A:61:6D:E5: E7:61:E2:1A Identifier: Authority Info Access: - 1.3.6.1.5.5.7.1.1 Critical: no Access Description: Method #0: ocsp Location #0: URIName: http://f16-pki.test.com:9180/ca/ocsp Signature: Algorithm: SHA512withRSA - 1.2.840.113549.1.1.13 Signature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ingerPrint MD2: 58:2E:94:4E:7A:2B:E6:62:21:70:4A:96:7E:9B:1E:22 MD5: 2D:91:1B:F1:DD:BD:08:23:48:9A:13:94:64:75:DA:EF SHA1: CE:53:FE:24:02:E3:91:C4:DE:4E:BE:12:EF:51:D6:65: 85:B2:2A:CF SHA256: 7E:0D:EB:F8:63:27:E5:45:0D:E4:B5:80:0D:AC:30:35: E2:9A:3C:EB:06:4A:A4:5A:41:DA:37:61:C0:4C:E3:33 SHA512: DD:2C:12:A6:DD:E5:62:99:61:42:43:10:ED:F5:B9:3E: 3E:C3:2E:98:10:33:0B:29:A9:DF:67:CC:09:3A:60:67: F1:70:25:54:B8:A6:54:97:D9:41:91:AD:5C:FF:C5:A6: CC:FB:7F:7A:74:6A:B8:A7:69:1E:96:41:42:13:AB:FD Display Certificate Chain welcome Welcome module Key Store confighsmlogin ConfigHSMLogin securitydomain Security Domain securitydomain Display Certificate Chain subsystem Subsystem Type restorekeys Import Keys and Certificates databasepanel Internal Database sizepanel Key Pairs namepanel Subject Names certrequestpanel Requests and Certificates backupkeys Export Keys and Certificates savepk12 Save Keys and Certificates adminpanel Administrator importadmincertpanel Import Administrator's Certificate donepanel Done

4

securitydomain OCSP Setup Wizard OCSP Setup Wizard securitydomain
Sleeping for 5 secs.. ############################################# Attempting to connect to: f16-pki.test.com:11445 ERROR: unable to set ECC Cipher List ERROR: Exception = org.mozilla.jss.ssl.SSLSocketException: Failed to enable cipher 0xc001 : (-12266) An unknown SSL cipher suite has been requested. Connected. Posting Query = https://f16-pki.test.com:11445//ocsp/admin/console/config/wizard?p=4&op=next&xml=true RESPONSE STATUS: HTTP/1.1 302 Moved Temporarily RESPONSE HEADER: Server: Apache-Coyote/1.1 RESPONSE HEADER: Location: https://f16-pki.test.com:9445/ca/admin/ca/securityDomainLogin?url=https%3A%2F%2Ff16-pki.test.com%3A11445%2Focsp%2Fadmin%2Fconsole%2Fconfig%2Fwizard%3Fp%3D5%26subsystem%3DOCSP RESPONSE HEADER: Content-Type: text/html;charset=UTF-8 RESPONSE HEADER: Content-Length: 0 RESPONSE HEADER: Date: Wed, 01 Feb 2012 18:10:07 GMT RESPONSE HEADER: Connection: keep-alive Sleeping for 5 secs.. ############################################# Attempting to connect to: f16-pki.test.com:9445 ERROR: unable to set ECC Cipher List ERROR: Exception = org.mozilla.jss.ssl.SSLSocketException: Failed to enable cipher 0xc001 : (-12266) An unknown SSL cipher suite has been requested. in TestCertApprovalCallback.approve() Peer cert details: subject: CN=f16-pki.test.com,O=silentdom issuer: CN=Certificate Authority-ca,O=silentdom serial: 3 item 1 reason=-8172 depth=1 cert details: subject: CN=Certificate Authority-ca,O=silentdom issuer: CN=Certificate Authority-ca,O=silentdom serial: 1 importing certificate. Connected. Posting Query = https://f16-pki.test.com:9445//ca/admin/ca/securityDomainLogin?url=https%3A%2F%2Ff16-pki.test.com%3A11445%2Focsp%2Fadmin%2Fconsole%2Fconfig%2Fwizard%3Fp%3D5%26subsystem%3DOCSP RESPONSE STATUS: HTTP/1.1 200 OK RESPONSE HEADER: Server: Apache-Coyote/1.1 RESPONSE HEADER: Content-Type: text/html;charset=UTF-8 RESPONSE HEADER: Date: Wed, 01 Feb 2012 18:10:13 GMT RESPONSE HEADER: Connection: close ############################################# Attempting to connect to: f16-pki.test.com:9445 ERROR: unable to set ECC Cipher List ERROR: Exception = org.mozilla.jss.ssl.SSLSocketException: Failed to enable cipher 0xc001 : (-12266) An unknown SSL cipher suite has been requested. Connected. Posting Query = https://f16-pki.test.com:9445//ca/admin/ca/getCookie?uid=admin&pwd=testpwd&url=https%3A%2F%2Ff16-pki.test.com%3A11445%2Focsp%2Fadmin%2Fconsole%2Fconfig%2Fwizard%3Fp%3D5%26subsystem%3DOCSP RESPONSE STATUS: HTTP/1.1 200 OK RESPONSE HEADER: Server: Apache-Coyote/1.1 RESPONSE HEADER: Content-Type: text/html RESPONSE HEADER: Date: Wed, 01 Feb 2012 18:10:13 GMT RESPONSE HEADER: Connection: close OCSP_SESSION_ID=7515036650882535191 OCSP_URL=https://f16-pki.test.com:11445/ocsp/admin/console/config/wizard?p=5&subsystem=OCSP ############################################# Attempting to connect to: f16-pki.test.com:11445 ERROR: unable to set ECC Cipher List ERROR: Exception = org.mozilla.jss.ssl.SSLSocketException: Failed to enable cipher 0xc001 : (-12266) An unknown SSL cipher suite has been requested. Connected. Posting Query = https://f16-pki.test.com:11445//ocsp/admin/console/config/wizard?p=5&subsystem=OCSP&session_id=7515036650882535191&xml=true RESPONSE STATUS: HTTP/1.1 200 OK RESPONSE HEADER: Server: Apache-Coyote/1.1 RESPONSE HEADER: Content-Type: text/html;charset=UTF-8 RESPONSE HEADER: Date: Wed, 01 Feb 2012 18:10:15 GMT RESPONSE HEADER: Connection: close Sleeping for 5 secs.. ############################################# Attempting to connect to: f16-pki.test.com:11445 ERROR: unable to set ECC Cipher List ERROR: Exception = org.mozilla.jss.ssl.SSLSocketException: Failed to enable cipher 0xc001 : (-12266) An unknown SSL cipher suite has been requested. Connected. Posting Query = https://f16-pki.test.com:11445//ocsp/admin/console/config/wizard?p=5&op=next&xml=true&subsystemName=OCSP+Responder&choice=newsubsystem RESPONSE STATUS: HTTP/1.1 200 OK RESPONSE HEADER: Server: Apache-Coyote/1.1 RESPONSE HEADER: Content-Type: application/xml;charset=UTF-8 RESPONSE HEADER: Date: Wed, 01 Feb 2012 18:10:21 GMT RESPONSE HEADER: Connection: close admin/console/config/databasepanel.vm new (sensitive) 389 off success localhost f16-pki.test.com-pki-ocsp cn=Directory Manager 16 true Internal Database off welcome Welcome module Key Store confighsmlogin ConfigHSMLogin securitydomain Security Domain securitydomain Display Certificate Chain subsystem Subsystem Type restorekeys Import Keys and Certificates databasepanel Internal Database sizepanel Key Pairs namepanel Subject Names certrequestpanel Requests and Certificates backupkeys Export Keys and Certificates savepk12 Save Keys and Certificates adminpanel Administrator importadmincertpanel Import Administrator's Certificate donepanel Done

7

OCSP Setup Wizard dc=f16-pki.test.com-pki-ocsp databasepanel
Sleeping for 5 secs.. ############################################# Attempting to connect to: f16-pki.test.com:11445 ERROR: unable to set ECC Cipher List ERROR: Exception = org.mozilla.jss.ssl.SSLSocketException: Failed to enable cipher 0xc001 : (-12266) An unknown SSL cipher suite has been requested. Connected. Posting Query = https://f16-pki.test.com:11445//ocsp/admin/console/config/wizard?p=7&op=next&xml=true&host=localhost&port=389&binddn=cn%3DDirectory+Manager&__bindpwd=redhat&basedn=dc%3Df16-pki.test.com-pki-ocsp&database=f16-pki.test.com-pki-ocsp&display=%24displayStr RESPONSE STATUS: HTTP/1.1 200 OK RESPONSE HEADER: Server: Apache-Coyote/1.1 RESPONSE HEADER: Content-Type: application/xml;charset=UTF-8 RESPONSE HEADER: Date: Wed, 01 Feb 2012 18:10:39 GMT RESPONSE HEADER: Connection: close admin/console/config/sizepanel.vm SHA256withEC,SHA1withEC,SHA384withEC,SHA512withEC 389 off 2048 true Key Pairs welcome Welcome module Key Store confighsmlogin ConfigHSMLogin securitydomain Security Domain securitydomain Display Certificate Chain subsystem Subsystem Type restorekeys Import Keys and Certificates databasepanel Internal Database sizepanel Key Pairs namepanel Subject Names certrequestpanel Requests and Certificates backupkeys Export Keys and Certificates savepk12 Save Keys and Certificates adminpanel Administrator importadmincertpanel Import Administrator's Certificate donepanel Done OCSP Setup Wizard sizepanel SHA256withRSA,SHA1withRSA,SHA512withRSA,MD5withRSA,MD2withRSA ocsp (sensitive) nistp256 success root localhost nistp256 (secp256r1),nistp384 (secp384r1),nistp521 (secp521r1),nistk163 (sect163k1),sect163r1,nistb163 (sect163r2),sect193r1,sect193r2,nistk233 (sect233k1),nistb233 (sect233r1),sect239k1,nistk283 (sect283k1),nistb283 (sect283r1),nistk409 (sect409k1),nistb409 (sect409r1),nistk571 (sect571k1),nistb571 (sect571r1),secp160k1,secp160r1,secp160r2,secp192k1,nistp192 (secp192r1, prime192v1),secp224k1,nistp224 (secp224r1),secp256k1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 f16-pki.test.com-pki-ocsp cn=Directory Manager 16 true off ocspSigningCert cert-pki-ocsp Internal Key Storage Token default Server-Cert cert-pki-ocsp Internal Key Storage Token default subsystemCert cert-pki-ocsp Internal Key Storage Token default auditSigningCert cert-pki-ocsp Internal Key Storage Token default

8

dc=f16-pki.test.com-pki-ocsp
Sleeping for 5 secs.. Sleeping for 5 secs.. ############################################# Attempting to connect to: f16-pki.test.com:11445 ERROR: unable to set ECC Cipher List ERROR: Exception = org.mozilla.jss.ssl.SSLSocketException: Failed to enable cipher 0xc001 : (-12266) An unknown SSL cipher suite has been requested. Connected. Posting Query = https://f16-pki.test.com:11445//ocsp/admin/console/config/wizard?p=8&op=next&xml=true&signing_custom_size=2048&subsystem_custom_size=2048&sslserver_custom_size=2048&audit_signing_custom_size=2048&custom_size=2048&signing_custom_curvename=nistp256&subsystem_custom_curvename=nistp256&sslserver_custom_curvename=nistp256&audit_signing_custom_curvename=nistp256&custom_curvename=nistp256&signing_keytype=rsa&subsystem_keytype=rsa&sslserver_keytype=rsa&audit_signing_keytype=rsa&keytype=rsa&signing_choice=custom&subsystem_choice=custom&sslserver_choice=custom&audit_signing_choice=custom&signingalgorithm=SHA256withRSA&signing_signingalgorithm=SHA256withRSA&choice=custom RESPONSE STATUS: HTTP/1.1 200 OK RESPONSE HEADER: Server: Apache-Coyote/1.1 RESPONSE HEADER: Content-Type: application/xml;charset=UTF-8 RESPONSE HEADER: Date: Wed, 01 Feb 2012 18:11:08 GMT RESPONSE HEADER: Connection: close admin/console/config/namepanel.vm Certificate Authority-ca - https://f16-pki.test.com:9444External CA success false 16 true Subject Names ocspSigningCert cert-pki-ocsp Internal Key Storage Token remote CN=OCSP Signing Certificate,OU=pki-ocsp,O=silentdom Server-Cert cert-pki-ocsp Internal Key Storage Token remote CN=f16-pki.test.com,OU=pki-ocsp,O=silentdom subsystemCert cert-pki-ocsp Internal Key Storage Token remote CN=OCSP Subsystem Certificate,OU=pki-ocsp,O=silentdom auditSigningCert cert-pki-ocsp Internal Key Storage Token remote CN=OCSP Audit Signing Certificate,OU=pki-ocsp,O=silentdom welcome Welcome module Key Store confighsmlogin ConfigHSMLogin securitydomain Security Domain securitydomain Display Certificate Chain subsystem Subsystem Type restorekeys Import Keys and Certificates databasepanel Internal Database sizepanel Key Pairs namepanel Subject Names certrequestpanel Requests and Certificates backupkeys Export Keys and Certificates savepk12 Save Keys and Certificates adminpanel Administrator importadmincertpanel Import Administrator's Certificate donepanel Done

9

OCSP Setup Wizard namepanel
tag=DN value=CN=OCSP Signing Certificate,OU=pki-ocsp,O=silentdom tag=DN value=CN=f16-pki.test.com,OU=pki-ocsp,O=silentdom tag=DN value=CN=OCSP Subsystem Certificate,OU=pki-ocsp,O=silentdom tag=DN value=CN=OCSP Audit Signing Certificate,OU=pki-ocsp,O=silentdom default: ocsp_signing_cert_name=CN=OCSP Signing Certificate,OU=pki-ocsp,O=silentdom default: ocsp_subsystem_cert_name=CN=OCSP Subsystem Certificate,OU=pki-ocsp,O=silentdom default: server_cert_name=CN=f16-pki.test.com,OU=pki-ocsp,O=silentdom default: oscp_audit_signing_cert_name=CN=OCSP Audit Signing Certificate,OU=pki-ocsp,O=silentdom Sleeping for 5 secs.. ############################################# Attempting to connect to: f16-pki.test.com:11445 ERROR: unable to set ECC Cipher List ERROR: Exception = org.mozilla.jss.ssl.SSLSocketException: Failed to enable cipher 0xc001 : (-12266) An unknown SSL cipher suite has been requested. Connected. Posting Query = https://f16-pki.test.com:11445//ocsp/admin/console/config/wizard?p=9&op=next&xml=true&subsystem=cn%3DOCSP+Subsystem+Certificate%2Co%3Dsilentdom&signing=cn%3DOCSP+Signing+Certificate%2Co%3Dsilentdom&sslserver=cn%3Df16-pki.test.com%2Co%3Dsilentdom&audit_signing=cn%3DOCSP+Audit+Signing+Certificate%2Co%3Dsilentdom&urls=https%3A%2F%2Ff16-pki.test.com%3A9444 RESPONSE STATUS: HTTP/1.1 200 OK RESPONSE HEADER: Server: Apache-Coyote/1.1 RESPONSE HEADER: Content-Type: application/xml;charset=UTF-8 RESPONSE HEADER: Date: Wed, 01 Feb 2012 18:12:00 GMT RESPONSE HEADER: Connection: close admin/console/config/certrequestpanel.vm ocspSigningCert cert-pki-ocsp Internal Key Storage Token -----BEGIN CERTIFICATE REQUEST----- MIICfDCCAWQCAQAwNzESMBAGA1UEChMJc2lsZW50ZG9tMSEwHwYDVQQDExhPQ1NQIFNpZ25pbmcg Q2VydGlmaWNhdGUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDrpK9hVNsJHKYdNhsP brkrBFAY0uJAlLT3VJv7l3TXPgHRfWYZrfiRMrwZ+U7Lx6tC9zbiE88Hj9Q8nHHcHT8Eke2Tyokl cQR+PheGBkaoFRhsI6VEd/0jo+HzWS8xeS/hUsTQrsE7ZahyPHBqXB+yqzgIF2FCu0/dUAIDwqSh w38PQXSKM8sRPfk167VRit+u/AXGDc/sHM3y28uNVXWN2G6oU60d3zHjPtGMc+9ldUu0rI5xsBPw b8kiUEUbDyYuaI8kKV3CyPYLSD4FPITTTwuaj/zbuQur1HuwZWGblaJ1kcieocRofl40jEPnnyoG UENMcqiNmif2MFdlqN4zAgMBAAGgADANBgkqhkiG9w0BAQsFAAOCAQEA39lKSrdqc6KncfxJ8RQW u4zuo6YJSH4R+Vy3k91cgVfYevIXFNkyUYlrPUUOr1WA3/MBsf+I82i+1OtUCcNbCRLJyeE/LuQ3 upyP7L64BnZXnfU/LYbXcasvSKrB2E6tJRMki5Io1CO6KGeGBR48eAy2ydY10SYej+Y6LIi8bRjg L9/LIwzlnz9chokaVyNycdCRZN3FcV99XuP6FXu46fFhh3gFd2/S34AURb4CaxOxVSCmJqJbRmH3 JAWngm0MYemeSNJW9qyjBNXZOTI+xwhBmqJlddKduHOtSe7vBKLESFYuD96znfJ9ClgRLCu9j9YN x26WVv/OReRKMhzYkQ== -----END CERTIFICATE REQUEST----- -----BEGIN CERTIFICATE----- MIIDdjCCAl6gAwIBAgIBDzANBgkqhkiG9w0BAQ0FADA3MRIwEAYDVQQKEwlzaWxlbnRkb20xITAf BgNVBAMTGENlcnRpZmljYXRlIEF1dGhvcml0eS1jYTAeFw0xMjAyMDExODExMjRaFw0xNDAxMjEx ODExMjRaMDcxEjAQBgNVBAoTCXNpbGVudGRvbTEhMB8GA1UEAxMYT0NTUCBTaWduaW5nIENlcnRp ZmljYXRlMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA66SvYVTbCRymHTYbD265KwRQ GNLiQJS091Sb+5d01z4B0X1mGa34kTK8GflOy8erQvc24hPPB4/UPJxx3B0/BJHtk8qJJXEEfj4X hgZGqBUYbCOlRHf9I6Ph81kvMXkv4VLE0K7BO2Wocjxwalwfsqs4CBdhQrtP3VACA8KkocN/D0F0 ijPLET35Neu1UYrfrvwFxg3P7BzN8tvLjVV1jdhuqFOtHd8x4z7RjHPvZXVLtKyOcbAT8G/JIlBF Gw8mLmiPJCldwsj2C0g+BTyE008Lmo/827kLq9R7sGVhm5WidZHInqHEaH5eNIxD558qBlBDTHKo jZon9jBXZajeMwIDAQABo4GMMIGJMB8GA1UdIwQYMBaAFEOs9jCROrWHDKLUryphbeXnYeIaMEAG CCsGAQUFBwEBBDQwMjAwBggrBgEFBQcwAYYkaHR0cDovL2YxNi1wa2kudGVzdC5jb206OTE4MC9j YS9vY3NwMBMGA1UdJQQMMAoGCCsGAQUFBwMJMA8GCSsGAQUFBzABBQQCBQAwDQYJKoZIhvcNAQEN BQADggEBAE/7Tn9BxzAOS1Nb1q6VhmNM8FSGMaPe6CRaKN+mW34L6LWFhWG4Aklq3Mx9W8jrGXVG tBlt2dT4AIVtxevOMyv6ZWWAfwmaAjZqDOYhFipUDBe2Do/ieEcud8bAKvPHALso0n2Hd7t4q1kT p9UzVan38G2vAq82p4EUijRZ18qaNAb3kd4qXQrNbFnT30J5HSqulRNE6g3I3Oj3r8Vf3RUnOJa9 XNCSN2enGvBPq8/zcyD3nUXMSmyYQ4fcNxCCXo35wSEqvPpcPPIrp9FoVr9y28Jct0LZfDbLEUGU UZur7Kei5qx0KfjMXv5u2WmvQCSnS3m8rw+6DzujSgtcjzU= -----END CERTIFICATE----- remote cn=OCSP Signing Certificate,o=silentdom Certificate: Data: Version: v3 Serial Number: 0xF Signature Algorithm: SHA512withRSA - 1.2.840.113549.1.1.13 Issuer: CN=Certificate Authority-ca,O=silentdom Validity: Not Before: Wednesday, February 1, 2012 1:11:24 PM EST US/Eastern Not After: Tuesday, January 21, 2014 1:11:24 PM EST US/Eastern Subject: CN=OCSP Signing Certificate,O=silentdom Subject Public Key Info: Algorithm: RSA - 1.2.840.113549.1.1.1 Public Key: Exponent: 65537 Public Key Modulus: (2048 bits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xtensions: Identifier: Authority Key Identifier - 2.5.29.35 Critical: no Key Identifier: 43:AC:F6:30:91:3A:B5:87:0C:A2:D4:AF:2A:61:6D:E5: E7:61:E2:1A Identifier: Authority Info Access: - 1.3.6.1.5.5.7.1.1 Critical: no Access Description: Method #0: ocsp Location #0: URIName: http://f16-pki.test.com:9180/ca/ocsp Identifier: Extended Key Usage: - 2.5.29.37 Critical: no Extended Key Usage: OCSPSigning Identifier: OCSP NoCheck: - 1.3.6.1.5.5.7.48.1.5 Critical: no Signature: Algorithm: SHA512withRSA - 1.2.840.113549.1.1.13 Signature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ingerPrint MD2: A5:DB:1F:02:BD:4C:22:35:1C:56:AB:27:99:01:7F:6E MD5: 5F:05:ED:0B:06:78:D0:1D:29:EC:A0:C0:F9:58:F4:85 SHA1: 6B:37:17:DF:90:9B:0C:E3:74:9E:34:0A:D5:59:16:1C: 0F:BC:35:12 SHA256: B8:5C:90:FD:6F:FB:3A:3D:B1:85:4B:14:54:3A:E6:4A: A2:C8:4B:72:3C:D4:6D:B8:F6:13:DB:BE:0C:C5:8F:82 SHA512: BC:B4:8E:33:05:18:F2:64:82:13:22:38:79:B6:0B:58: F9:4F:99:54:79:7B:D2:D7:25:44:F7:F1:74:5F:27:5D: 8D:DF:F5:D4:CC:7F:37:59:D2:11:E1:F0:EF:28:47:31: 0C:39:00:6D:5C:1A:A9:2A:B9:DA:85:D0:05:C0:65:EB Server-Cert cert-pki-ocsp Internal Key Storage Token -----BEGIN CERTIFICATE REQUEST----- MIICdDCCAVwCAQAwLzESMBAGA1UEChMJc2lsZW50ZG9tMRkwFwYDVQQDExBmMTYtcGtpLnRlc3Qu Y29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA03Bvq6Ay6kobydB5Qfr/LHBpwOWw l6KqBf/eFAJbDPuXdJPmCvlJnFIbmZSIlKz2e2fwEE3dMFNLf2XweBL7WKui5mZqqECU4sVDOpWd 3D8TZrMAJuvtW33x3iKZDffgD1wcnjv0PPbWZ4E4f6jw5pfy0eov1tqJkCE3S10WG8nbEkGn3dqC 7eVaRYEGFpbBaqWabra+UjtF3fcsyfWC7sRF/o+zG/JHQKRD1XKLt0fdWrAo3oBBNY33o8iSZ8Xr 4Lz2m7mAjOtDhoCf0Y+3Mpvqf4W/8dqLoPfu0I8emiitYO8/q51yNwQD+OE8p7k1kTOzVws4iXGA jMGElFQyAwIDAQABoAAwDQYJKoZIhvcNAQELBQADggEBAFX3ia8l3SZBIfz0Onxq86hiQQu1CFoC Nvo6WuC/+vSdEvYDmV7ffNZlCa/fWB8382wlFt3qMKQIDHNr+Q3lWdYzYOF6Kvw9fkGFiOD8cGDV aLbTzHihtmW8fnmkRNef8nidv1XoD/G8ofmcW3NjfnjeYwJ607McmRoCOILfowsecS+WyRLFFQ5b xAlRAmHsp7dQkqXESiR6XVxaqhavJJH3chfu+oHQ6wZYoGcAU7t52pT7OMZOpwFztk/uiCwsjfsy ADfqgJSeyXXqP2cO5R7Yf6B+bRl4Up8efTMpixtE8CXAo/qBzPl6qLanElO9307ZHgdR7dp3gII/ HlBAYW8= -----END CERTIFICATE REQUEST----- -----BEGIN CERTIFICATE----- MIIDgTCCAmmgAwIBAgIBEDANBgkqhkiG9w0BAQ0FADA3MRIwEAYDVQQKEwlzaWxlbnRkb20xITAf BgNVBAMTGENlcnRpZmljYXRlIEF1dGhvcml0eS1jYTAeFw0xMjAyMDExODExMzJaFw0xNDAxMjEx ODExMzJaMC8xEjAQBgNVBAoTCXNpbGVudGRvbTEZMBcGA1UEAxMQZjE2LXBraS50ZXN0LmNvbTCC ASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANNwb6ugMupKG8nQeUH6/yxwacDlsJeiqgX/ 3hQCWwz7l3ST5gr5SZxSG5mUiJSs9ntn8BBN3TBTS39l8HgS+1irouZmaqhAlOLFQzqVndw/E2az ACbr7Vt98d4imQ334A9cHJ479Dz21meBOH+o8OaX8tHqL9baiZAhN0tdFhvJ2xJBp93agu3lWkWB BhaWwWqlmm62vlI7Rd33LMn1gu7ERf6PsxvyR0CkQ9Vyi7dH3VqwKN6AQTWN96PIkmfF6+C89pu5 gIzrQ4aAn9GPtzKb6n+Fv/Hai6D37tCPHpoorWDvP6udcjcEA/jhPKe5NZEzs1cLOIlxgIzBhJRU MgMCAwEAAaOBnzCBnDAfBgNVHSMEGDAWgBRDrPYwkTq1hwyi1K8qYW3l52HiGjBABggrBgEFBQcB AQQ0MDIwMAYIKwYBBQUHMAGGJGh0dHA6Ly9mMTYtcGtpLnRlc3QuY29tOjkxODAvY2Evb2NzcDAO BgNVHQ8BAf8EBAMCBPAwJwYDVR0lBCAwHgYIKwYBBQUHAwEGCCsGAQUFBwMCBggrBgEFBQcDBDAN BgkqhkiG9w0BAQ0FAAOCAQEAF7ayv70ADuKb0A4jV8oa+1vr/qD7BZEAnxHYdYRwTuSHlQObtHMD VgQz1oC8jM+xF+CuxvKupE7lX5XL/HrDVLUyuU6roJIbkX6QAfBmEEPQ0YMEBqjR5NasT9YHiTrA RO+DVvEXKT3O0kDk77kok5tjzVvbVwA53X8bdMjmty0vZF+L3H9rODXxGGd0JIXfM2dP0Yps5JAq I5RhJDcjSmaCYQ1u1vScSPg5zSzLYk9W1edf6iwadzbu/Cm9STglM8vYA/NRvOStw2QyA1rv5WyV lC842kdCZosbuxgldBFjxt5WDi9FxZTsgYNwFIVd/0NjBaJB+t057Q6C2adgLg== -----END CERTIFICATE----- remote cn=f16-pki.test.com,o=silentdom Certificate: Data: Version: v3 Serial Number: 0x10 Signature Algorithm: SHA512withRSA - 1.2.840.113549.1.1.13 Issuer: CN=Certificate Authority-ca,O=silentdom Validity: Not Before: Wednesday, February 1, 2012 1:11:32 PM EST US/Eastern Not After: Tuesday, January 21, 2014 1:11:32 PM EST US/Eastern Subject: CN=f16-pki.test.com,O=silentdom Subject Public Key Info: Algorithm: RSA - 1.2.840.113549.1.1.1 Public Key: Exponent: 65537 Public Key Modulus: (2048 bits) : D3:70:6F:AB:A0:32:EA:4A:1B:C9:D0:79:41:FA:FF:2C: 70:69:C0:E5:B0:97:A2:AA:05:FF:DE:14:02:5B:0C:FB: 97:74:93:E6:0A:F9:49:9C:52:1B:99:94:88:94:AC:F6: 7B:67:F0:10:4D:DD:30:53:4B:7F:65:F0:78:12:FB:58: AB:A2:E6:66:6A:A8:40:94:E2:C5:43:3A:95:9D:DC:3F: 13:66:B3:00:26:EB:ED:5B:7D:F1:DE:22:99:0D:F7:E0: 0F:5C:1C:9E:3B:F4:3C:F6:D6:67:81:38:7F:A8:F0:E6: 97:F2:D1:EA:2F:D6:DA:89:90:21:37:4B:5D:16:1B:C9: DB:12:41:A7:DD:DA:82:ED:E5:5A:45:81:06:16:96:C1: 6A:A5:9A:6E:B6:BE:52:3B:45:DD:F7:2C:C9:F5:82:EE: C4:45:FE:8F:B3:1B:F2:47:40:A4:43:D5:72:8B:B7:47: DD:5A:B0:28:DE:80:41:35:8D:F7:A3:C8:92:67:C5:EB: E0:BC:F6:9B:B9:80:8C:EB:43:86:80:9F:D1:8F:B7:32: 9B:EA:7F:85:BF:F1:DA:8B:A0:F7:EE:D0:8F:1E:9A:28: AD:60:EF:3F:AB:9D:72:37:04:03:F8:E1:3C:A7:B9:35: 91:33:B3:57:0B:38:89:71:80:8C:C1:84:94:54:32:03 Extensions: Identifier: Authority Key Identifier - 2.5.29.35 Critical: no Key Identifier: 43:AC:F6:30:91:3A:B5:87:0C:A2:D4:AF:2A:61:6D:E5: E7:61:E2:1A Identifier: Authority Info Access: - 1.3.6.1.5.5.7.1.1 Critical: no Access Description: Method #0: ocsp Location #0: URIName: http://f16-pki.test.com:9180/ca/ocsp Identifier: Key Usage: - 2.5.29.15 Critical: yes Key Usage: Digital Signature Non Repudiation Key Encipherment Data Encipherment Identifier: Extended Key Usage: - 2.5.29.37 Critical: no Extended Key Usage: 1.3.6.1.5.5.7.3.1 1.3.6.1.5.5.7.3.2 1.3.6.1.5.5.7.3.4 Signature: Algorithm: SHA512withRSA - 1.2.840.113549.1.1.13 Signature: 17:B6:B2:BF:BD:00:0E:E2:9B:D0:0E:23:57:CA:1A:FB: 5B:EB:FE:A0:FB:05:91:00:9F:11:D8:75:84:70:4E:E4: 87:95:03:9B:B4:73:03:56:04:33:D6:80:BC:8C:CF:B1: 17:E0:AE:C6:F2:AE:A4:4E:E5:5F:95:CB:FC:7A:C3:54: B5:32:B9:4E:AB:A0:92:1B:91:7E:90:01:F0:66:10:43: D0:D1:83:04:06:A8:D1:E4:D6:AC:4F:D6:07:89:3A:C0: 44:EF:83:56:F1:17:29:3D:CE:D2:40:E4:EF:B9:28:93: 9B:63:CD:5B:DB:57:00:39:DD:7F:1B:74:C8:E6:B7:2D: 2F:64:5F:8B:DC:7F:6B:38:35:F1:18:67:74:24:85:DF: 33:67:4F:D1:8A:6C:E4:90:2A:23:94:61:24:37:23:4A: 66:82:61:0D:6E:D6:F4:9C:48:F8:39:CD:2C:CB:62:4F: 56:D5:E7:5F:EA:2C:1A:77:36:EE:FC:29:BD:49:38:25: 33:CB:D8:03:F3:51:BC:E4:AD:C3:64:32:03:5A:EF:E5: 6C:95:94:2F:38:DA:47:42:66:8B:1B:BB:18:25:74:11: 63:C6:DE:56:0E:2F:45:C5:94:EC:81:83:70:14:85:5D: FF:43:63:05:A2:41:FA:DD:39:ED:0E:82:D9:A7:60:2E FingerPrint MD2: 81:8F:B0:61:F1:44:07:32:21:36:A8:67:C2:10:76:4C MD5: 0A:78:6E:01:FC:C9:1B:6B:C3:39:FA:9B:CC:D0:44:0A SHA1: 8C:EC:DE:8A:41:96:2B:32:9E:3C:43:7D:F6:79:0C:83: 54:81:22:0A SHA256: F7:EA:C3:2D:65:64:06:C1:04:84:EB:53:22:32:5A:0E: 5D:CA:8D:B3:DE:20:6A:FE:D7:7C:F3:97:00:62:29:14 SHA512: 27:B4:4C:40:EF:58:3B:DA:38:F4:4B:83:3F:1F:DC:01: 55:D3:58:ED:5D:B5:A3:5D:88:FE:BC:9A:11:B0:24:14: 76:83:8C:6F:12:D2:E0:64:D1:5C:24:B3:EC:DF:F7:81: B7:A1:B0:F6:06:17:51:EE:3A:0C:0B:FC:3A:F9:81:F0 subsystemCert cert-pki-ocsp Internal Key Storage Token -----BEGIN CERTIFICATE REQUEST----- MIICfjCCAWYCAQAwOTESMBAGA1UEChMJc2lsZW50ZG9tMSMwIQYDVQQDExpPQ1NQIFN1YnN5c3Rl bSBDZXJ0aWZpY2F0ZTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMyY85OYhcJaGhUG 1UuqDpdxidXedkkvyCQgQLiLSHV5YnImrkEat/OUs4yS84tkMqouIEGz9IBB9rN9DKYl3TI2M/g4 h9jhMfayMBr0vO6cvRjkhWTx9hcHOBRiulptbbsC8cXdfImY5yMHiMS4n/ld423fWH6YGl23nfSg /Znj/yafaub5T/+8jHxnsSZTicnsQfCwJtrW0QHV98VFYred+tvV7tNrdIaATR5hziKvckE4zBmu /sJ6fJW/gc4e1Wpl53cbyRVkG7cwXc1B1+PRAPJ8AseuMEzNGNiKG+1UryEp7kHv4zO7LgWTWEYC A8cBfluJ0R5Ax6iIoo/KF5kCAwEAAaAAMA0GCSqGSIb3DQEBCwUAA4IBAQABP6pDOB0Jwm/q/Q4y wz/kER94UTiY3IBzfWBaCjf/LxHYG736VqyU8c3ETOW+LosVJOIpDA2+DlKHbz3wVw+Ob/7edN3a 2a9yr/jDpu6ffc0qpS57BcsrivxbyKr6ra+qsXI+z1TYTa1JOVsWtLoD5CCPHckAe7I0bv/NG7H1 B/ztGl2jf/xWf0wZ06OuObW/0VGLlPnvqNwDsG/f4UG7U0bw85/6/UxEn32DODCSWK+pacXjZIzv Frb+y+TOSwqYS4WqUgzsxLnLsK7qH4c6yx+lPXxalKXx8AexIhDQtq+mZCKkd2jnLY8RZPfcpGw1 jT10smpGms+iRpjXFTnZ -----END CERTIFICATE REQUEST----- -----BEGIN CERTIFICATE----- MIIDdzCCAl+gAwIBAgIBETANBgkqhkiG9w0BAQ0FADA3MRIwEAYDVQQKEwlzaWxlbnRkb20xITAf BgNVBAMTGENlcnRpZmljYXRlIEF1dGhvcml0eS1jYTAeFw0xMjAyMDExODExMzhaFw0xNDAxMjEx ODExMzhaMDkxEjAQBgNVBAoTCXNpbGVudGRvbTEjMCEGA1UEAxMaT0NTUCBTdWJzeXN0ZW0gQ2Vy dGlmaWNhdGUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDMmPOTmIXCWhoVBtVLqg6X cYnV3nZJL8gkIEC4i0h1eWJyJq5BGrfzlLOMkvOLZDKqLiBBs/SAQfazfQymJd0yNjP4OIfY4TH2 sjAa9LzunL0Y5IVk8fYXBzgUYrpabW27AvHF3XyJmOcjB4jEuJ/5XeNt31h+mBpdt530oP2Z4/8m n2rm+U//vIx8Z7EmU4nJ7EHwsCba1tEB1ffFRWK3nfrb1e7Ta3SGgE0eYc4ir3JBOMwZrv7CenyV v4HOHtVqZed3G8kVZBu3MF3NQdfj0QDyfALHrjBMzRjYihvtVK8hKe5B7+Mzuy4Fk1hGAgPHAX5b idEeQMeoiKKPyheZAgMBAAGjgYswgYgwHwYDVR0jBBgwFoAUQ6z2MJE6tYcMotSvKmFt5edh4how QAYIKwYBBQUHAQEENDAyMDAGCCsGAQUFBzABhiRodHRwOi8vZjE2LXBraS50ZXN0LmNvbTo5MTgw L2NhL29jc3AwDgYDVR0PAQH/BAQDAgTwMBMGA1UdJQQMMAoGCCsGAQUFBwMCMA0GCSqGSIb3DQEB DQUAA4IBAQAP5++IuaPwKJHX2DJBp/DE4+ommwV/ObjVaXA0pvn/2cuT9CTKWjYsRDVv5cTINXsz B01IIVjgrZo58zfAYY2e29qM3f11hH2HdGUe3iKhhHgjpijJZFImuniMP6dOKUvOkrbf/HlZ3GyC HCCWzbwhmWeHUW1WJ2YvjPtVez2bYpWlOVOnwPa0q2B1DKDjvEp1Hf6wwJOHk2tved33mcZdxeCZ AEhHl8sgLMp7+C8mQ7OxWOVT5dVPsIVY/lvFeSaHyrGA4aPrhb1Xqo+kJBjUTTjmS6boXX5NzpEO RyzTnJlZLzDkfLpFVZtYmFxUZBOf8zmSzCMgkI+KVNSdbuKM -----END CERTIFICATE----- remote cn=OCSP Subsystem Certificate,o=silentdom Certificate: Data: Version: v3 Serial Number: 0x11 Signature Algorithm: SHA512withRSA - 1.2.840.113549.1.1.13 Issuer: CN=Certificate Authority-ca,O=silentdom Validity: Not Before: Wednesday, February 1, 2012 1:11:38 PM EST US/Eastern Not After: Tuesday, January 21, 2014 1:11:38 PM EST US/Eastern Subject: CN=OCSP Subsystem Certificate,O=silentdom Subject Public Key Info: Algorithm: RSA - 1.2.840.113549.1.1.1 Public Key: Exponent: 65537 Public Key Modulus: (2048 bits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xtensions: Identifier: Authority Key Identifier - 2.5.29.35 Critical: no Key Identifier: 43:AC:F6:30:91:3A:B5:87:0C:A2:D4:AF:2A:61:6D:E5: E7:61:E2:1A Identifier: Authority Info Access: - 1.3.6.1.5.5.7.1.1 Critical: no Access Description: Method #0: ocsp Location #0: URIName: http://f16-pki.test.com:9180/ca/ocsp Identifier: Key Usage: - 2.5.29.15 Critical: yes Key Usage: Digital Signature Non Repudiation Key Encipherment Data Encipherment Identifier: Extended Key Usage: - 2.5.29.37 Critical: no Extended Key Usage: 1.3.6.1.5.5.7.3.2 Signature: Algorithm: SHA512withRSA - 1.2.840.113549.1.1.13 Signature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ingerPrint MD2: 48:20:10:54:C6:91:21:3C:7D:62:63:24:21:5F:6E:C2 MD5: BB:AA:60:8C:D4:C3:39:C1:57:CC:3E:E1:14:86:5C:49 SHA1: ED:FB:0C:1B:8E:81:EC:08:6A:86:0B:59:9D:EC:9D:7D: 1F:BB:15:F2 SHA256: 97:9B:40:22:91:05:0F:CD:55:10:DA:09:95:A1:85:E3: CD:66:B6:DF:E6:3E:3C:BB:A5:B7:BB:D0:6E:0A:06:3D SHA512: B3:35:D6:79:86:55:AC:0C:A2:61:72:2F:17:FC:C2:09: 39:60:26:C0:82:95:D3:B7:BA:63:79:93:15:DF:95:B0: 8F:87:B9:46:8F:3A:4A:01:5A:C9:98:86:BF:93:0A:1B: 75:66:83:6B:5E:34:01:87:54:5D:E4:94:32:72:4D:B1 auditSigningCert cert-pki-ocsp Internal Key Storage Token -----BEGIN CERTIFICATE REQUEST----- MIICgjCCAWoCAQAwPTESMBAGA1UEChMJc2lsZW50ZG9tMScwJQYDVQQDEx5PQ1NQIEF1ZGl0IFNp Z25pbmcgQ2VydGlmaWNhdGUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCl60M3cjrs VI9jWLvCg3U/JVyHkRNU0Ir1WEYLDAT2gDLgxyI4MRTTazqUoH/NY98DVIMb9Mo0Fyx2sIsJ0WIy EM62jL86S7YHjTqOivB8CluNEUFTiKCdASHK+IxTkc+y6E/tTemjPjDjG7wG53iBLJv1wVTkTaOc CxRFxuG8a4tbAUwaF8tcmAyf7g6g+isLL+A2Aaf8njL5/Grxsd9ECgDFjK+vRSnPR07wCufKm7mD E9FWRzepoHvapb0wzGi1GjXBplmoipUieU3qPZKAJZaHIEvz6RrgyozeBPv2G5ekB11VuZsZllyD tbXGHffWJit9g7+7QY6KeFEEZfqDAgMBAAGgADANBgkqhkiG9w0BAQsFAAOCAQEAAaq8v1sC42Ef y5eDk8f0lgmnO4q6t6IFxzvo0WMMYarDAqbSarEb7lPxsL/DG67xzuq1hnzCD8mjLF9QlGBT9KoJ jmXjsaI2yjdN55JHgKAmvCW3v82RYlAWN6veirv4BWXk9LjB05nXZeTPqpKA/qjE08kyJfpjTcIw ofiSU/PgzN/1+84Wv5+E+EFxJseaozqKIbQfZ/BsrTXGnEQJjrZ9yLi5wtcUo62qHJnqHZgQLYaV PihjcfzhhFfkZsCFdkVctKLHXO0lNoUXF0L8tgZoA6kaaNNp1hmAhuZoyUaMqFTX0qpz49qEpCwj itiXSZvcWmnJATnaDTtPHD32lg== -----END CERTIFICATE REQUEST----- -----BEGIN CERTIFICATE----- MIIDZDCCAkygAwIBAgIBEjANBgkqhkiG9w0BAQ0FADA3MRIwEAYDVQQKEwlzaWxlbnRkb20xITAf BgNVBAMTGENlcnRpZmljYXRlIEF1dGhvcml0eS1jYTAeFw0xMjAyMDExODExNDRaFw0xNDAxMjEx ODExNDRaMD0xEjAQBgNVBAoTCXNpbGVudGRvbTEnMCUGA1UEAxMeT0NTUCBBdWRpdCBTaWduaW5n IENlcnRpZmljYXRlMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEApetDN3I67FSPY1i7 woN1PyVch5ETVNCK9VhGCwwE9oAy4MciODEU02s6lKB/zWPfA1SDG/TKNBcsdrCLCdFiMhDOtoy/ Oku2B406jorwfApbjRFBU4ignQEhyviMU5HPsuhP7U3poz4w4xu8Bud4gSyb9cFU5E2jnAsURcbh vGuLWwFMGhfLXJgMn+4OoPorCy/gNgGn/J4y+fxq8bHfRAoAxYyvr0Upz0dO8Arnypu5gxPRVkc3 qaB72qW9MMxotRo1waZZqIqVInlN6j2SgCWWhyBL8+ka4MqM3gT79huXpAddVbmbGZZcg7W1xh33 1iYrfYO/u0GOinhRBGX6gwIDAQABo3UwczAfBgNVHSMEGDAWgBRDrPYwkTq1hwyi1K8qYW3l52Hi GjBABggrBgEFBQcBAQQ0MDIwMAYIKwYBBQUHMAGGJGh0dHA6Ly9mMTYtcGtpLnRlc3QuY29tOjkx ODAvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBsAwDQYJKoZIhvcNAQENBQADggEBAIHhwmf5D4qiwzxA +Hlsz1EQKtBsB5IHF/CoC+gW9r8SbXTq6dEPkIaugDorDhRoot42WVOfrWqLMYn7M9BXFc1rFmtk OEJlUaC9ZmyWgMLS3NP8kZjubgDOVYetQBcDTvE8yZvDwDDI3e/HLk3sdhOLO8Ij2L+8Ie2/FE4o F3upEgUER3DOknzfnyVeoWYXjb2R1gmpEQ4b4cGNx52ia1GmEd3/zLBZpLAhGpJmfHNI9lt0fTxX WKZd4XYdDLQCj31JdUOOCa3njNeN7EbZOyxjNm20g1JaxuTl/7BFFzA7WqWNPDTFFejBXxjHisvn AwJ1xgBqz6mQ8qn6ynuChCE= -----END CERTIFICATE----- remote cn=OCSP Audit Signing Certificate,o=silentdom Certificate: Data: Version: v3 Serial Number: 0x12 Signature Algorithm: SHA512withRSA - 1.2.840.113549.1.1.13 Issuer: CN=Certificate Authority-ca,O=silentdom Validity: Not Before: Wednesday, February 1, 2012 1:11:44 PM EST US/Eastern Not After: Tuesday, January 21, 2014 1:11:44 PM EST US/Eastern Subject: CN=OCSP Audit Signing Certificate,O=silentdom Subject Public Key Info: Algorithm: RSA - 1.2.840.113549.1.1.1 Public Key: Exponent: 65537 Public Key Modulus: (2048 bits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xtensions: Identifier: Authority Key Identifier - 2.5.29.35 Critical: no Key Identifier: 43:AC:F6:30:91:3A:B5:87:0C:A2:D4:AF:2A:61:6D:E5: E7:61:E2:1A Identifier: Authority Info Access: - 1.3.6.1.5.5.7.1.1 Critical: no Access Description: Method #0: ocsp Location #0: URIName: http://f16-pki.test.com:9180/ca/ocsp Identifier: Key Usage: - 2.5.29.15 Critical: yes Key Usage: Digital Signature Non Repudiation Signature: Algorithm: SHA512withRSA - 1.2.840.113549.1.1.13 Signature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ingerPrint MD2: 0B:E4:65:2F:47:2A:17:25:FC:36:89:3F:F7:4E:1F:F3 MD5: 66:C1:77:8B:6E:BC:DE:4D:BE:86:16:57:93:E8:85:37 SHA1: 37:96:FD:68:9E:E4:75:0E:40:59:AF:0B:61:B9:B8:18: 6E:31:57:57 SHA256: 88:15:80:B3:25:FE:FE:E1:30:6C:EA:AD:E5:55:B0:52: 1A:2C:82:DE:6E:4A:1C:06:E0:8C:8C:BA:7E:03:13:AB SHA512: 05:4A:9A:BD:6D:6E:E1:B1:AA:A2:EF:88:B0:57:FE:E1: 1B:19:78:B0:4A:1E:09:AC:F8:32:FB:6C:C6:44:46:4B: D6:7F:CD:A3:5B:2A:B1:AB:D7:D6:1D:8C:73:89:90:E5: 89:0D:C2:43:86:36:72:63:26:F0:DB:B1:4A:27:B2:F9 display success checked 16 Requests and Certificates welcome Welcome module Key Store confighsmlogin ConfigHSMLogin securitydomain Security Domain securitydomain Display Certificate Chain subsystem Subsystem Type restorekeys Import Keys and Certificates databasepanel Internal Database sizepanel Key Pairs namepanel Subject Names certrequestpanel Requests and Certificates backupkeys Export Keys and Certificates savepk12 Save Keys and Certificates adminpanel Administrator importadmincertpanel Import Administrator's Certificate donepanel Done

10

OCSP Setup Wizard f16-pki.test.com certrequestpanel 9444
tag=Request value=-----BEGIN CERTIFICATE REQUEST----- MIICfDCCAWQCAQAwNzESMBAGA1UEChMJc2lsZW50ZG9tMSEwHwYDVQQDExhPQ1NQIFNpZ25pbmcg Q2VydGlmaWNhdGUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDrpK9hVNsJHKYdNhsP brkrBFAY0uJAlLT3VJv7l3TXPgHRfWYZrfiRMrwZ+U7Lx6tC9zbiE88Hj9Q8nHHcHT8Eke2Tyokl cQR+PheGBkaoFRhsI6VEd/0jo+HzWS8xeS/hUsTQrsE7ZahyPHBqXB+yqzgIF2FCu0/dUAIDwqSh w38PQXSKM8sRPfk167VRit+u/AXGDc/sHM3y28uNVXWN2G6oU60d3zHjPtGMc+9ldUu0rI5xsBPw b8kiUEUbDyYuaI8kKV3CyPYLSD4FPITTTwuaj/zbuQur1HuwZWGblaJ1kcieocRofl40jEPnnyoG UENMcqiNmif2MFdlqN4zAgMBAAGgADANBgkqhkiG9w0BAQsFAAOCAQEA39lKSrdqc6KncfxJ8RQW u4zuo6YJSH4R+Vy3k91cgVfYevIXFNkyUYlrPUUOr1WA3/MBsf+I82i+1OtUCcNbCRLJyeE/LuQ3 upyP7L64BnZXnfU/LYbXcasvSKrB2E6tJRMki5Io1CO6KGeGBR48eAy2ydY10SYej+Y6LIi8bRjg L9/LIwzlnz9chokaVyNycdCRZN3FcV99XuP6FXu46fFhh3gFd2/S34AURb4CaxOxVSCmJqJbRmH3 JAWngm0MYemeSNJW9qyjBNXZOTI+xwhBmqJlddKduHOtSe7vBKLESFYuD96znfJ9ClgRLCu9j9YN x26WVv/OReRKMhzYkQ== -----END CERTIFICATE REQUEST----- tag=Request value=-----BEGIN CERTIFICATE REQUEST----- MIICdDCCAVwCAQAwLzESMBAGA1UEChMJc2lsZW50ZG9tMRkwFwYDVQQDExBmMTYtcGtpLnRlc3Qu Y29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA03Bvq6Ay6kobydB5Qfr/LHBpwOWw l6KqBf/eFAJbDPuXdJPmCvlJnFIbmZSIlKz2e2fwEE3dMFNLf2XweBL7WKui5mZqqECU4sVDOpWd 3D8TZrMAJuvtW33x3iKZDffgD1wcnjv0PPbWZ4E4f6jw5pfy0eov1tqJkCE3S10WG8nbEkGn3dqC 7eVaRYEGFpbBaqWabra+UjtF3fcsyfWC7sRF/o+zG/JHQKRD1XKLt0fdWrAo3oBBNY33o8iSZ8Xr 4Lz2m7mAjOtDhoCf0Y+3Mpvqf4W/8dqLoPfu0I8emiitYO8/q51yNwQD+OE8p7k1kTOzVws4iXGA jMGElFQyAwIDAQABoAAwDQYJKoZIhvcNAQELBQADggEBAFX3ia8l3SZBIfz0Onxq86hiQQu1CFoC Nvo6WuC/+vSdEvYDmV7ffNZlCa/fWB8382wlFt3qMKQIDHNr+Q3lWdYzYOF6Kvw9fkGFiOD8cGDV aLbTzHihtmW8fnmkRNef8nidv1XoD/G8ofmcW3NjfnjeYwJ607McmRoCOILfowsecS+WyRLFFQ5b xAlRAmHsp7dQkqXESiR6XVxaqhavJJH3chfu+oHQ6wZYoGcAU7t52pT7OMZOpwFztk/uiCwsjfsy ADfqgJSeyXXqP2cO5R7Yf6B+bRl4Up8efTMpixtE8CXAo/qBzPl6qLanElO9307ZHgdR7dp3gII/ HlBAYW8= -----END CERTIFICATE REQUEST----- tag=Request value=-----BEGIN CERTIFICATE REQUEST----- MIICfjCCAWYCAQAwOTESMBAGA1UEChMJc2lsZW50ZG9tMSMwIQYDVQQDExpPQ1NQIFN1YnN5c3Rl bSBDZXJ0aWZpY2F0ZTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMyY85OYhcJaGhUG 1UuqDpdxidXedkkvyCQgQLiLSHV5YnImrkEat/OUs4yS84tkMqouIEGz9IBB9rN9DKYl3TI2M/g4 h9jhMfayMBr0vO6cvRjkhWTx9hcHOBRiulptbbsC8cXdfImY5yMHiMS4n/ld423fWH6YGl23nfSg /Znj/yafaub5T/+8jHxnsSZTicnsQfCwJtrW0QHV98VFYred+tvV7tNrdIaATR5hziKvckE4zBmu /sJ6fJW/gc4e1Wpl53cbyRVkG7cwXc1B1+PRAPJ8AseuMEzNGNiKG+1UryEp7kHv4zO7LgWTWEYC A8cBfluJ0R5Ax6iIoo/KF5kCAwEAAaAAMA0GCSqGSIb3DQEBCwUAA4IBAQABP6pDOB0Jwm/q/Q4y wz/kER94UTiY3IBzfWBaCjf/LxHYG736VqyU8c3ETOW+LosVJOIpDA2+DlKHbz3wVw+Ob/7edN3a 2a9yr/jDpu6ffc0qpS57BcsrivxbyKr6ra+qsXI+z1TYTa1JOVsWtLoD5CCPHckAe7I0bv/NG7H1 B/ztGl2jf/xWf0wZ06OuObW/0VGLlPnvqNwDsG/f4UG7U0bw85/6/UxEn32DODCSWK+pacXjZIzv Frb+y+TOSwqYS4WqUgzsxLnLsK7qH4c6yx+lPXxalKXx8AexIhDQtq+mZCKkd2jnLY8RZPfcpGw1 jT10smpGms+iRpjXFTnZ -----END CERTIFICATE REQUEST----- tag=Request value=-----BEGIN CERTIFICATE REQUEST----- MIICgjCCAWoCAQAwPTESMBAGA1UEChMJc2lsZW50ZG9tMScwJQYDVQQDEx5PQ1NQIEF1ZGl0IFNp Z25pbmcgQ2VydGlmaWNhdGUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCl60M3cjrs VI9jWLvCg3U/JVyHkRNU0Ir1WEYLDAT2gDLgxyI4MRTTazqUoH/NY98DVIMb9Mo0Fyx2sIsJ0WIy EM62jL86S7YHjTqOivB8CluNEUFTiKCdASHK+IxTkc+y6E/tTemjPjDjG7wG53iBLJv1wVTkTaOc CxRFxuG8a4tbAUwaF8tcmAyf7g6g+isLL+A2Aaf8njL5/Grxsd9ECgDFjK+vRSnPR07wCufKm7mD E9FWRzepoHvapb0wzGi1GjXBplmoipUieU3qPZKAJZaHIEvz6RrgyozeBPv2G5ekB11VuZsZllyD tbXGHffWJit9g7+7QY6KeFEEZfqDAgMBAAGgADANBgkqhkiG9w0BAQsFAAOCAQEAAaq8v1sC42Ef y5eDk8f0lgmnO4q6t6IFxzvo0WMMYarDAqbSarEb7lPxsL/DG67xzuq1hnzCD8mjLF9QlGBT9KoJ jmXjsaI2yjdN55JHgKAmvCW3v82RYlAWN6veirv4BWXk9LjB05nXZeTPqpKA/qjE08kyJfpjTcIw ofiSU/PgzN/1+84Wv5+E+EFxJseaozqKIbQfZ/BsrTXGnEQJjrZ9yLi5wtcUo62qHJnqHZgQLYaV PihjcfzhhFfkZsCFdkVctKLHXO0lNoUXF0L8tgZoA6kaaNNp1hmAhuZoyUaMqFTX0qpz49qEpCwj itiXSZvcWmnJATnaDTtPHD32lg== -----END CERTIFICATE REQUEST----- tag=Certificate value=-----BEGIN CERTIFICATE----- MIIDdjCCAl6gAwIBAgIBDzANBgkqhkiG9w0BAQ0FADA3MRIwEAYDVQQKEwlzaWxlbnRkb20xITAf BgNVBAMTGENlcnRpZmljYXRlIEF1dGhvcml0eS1jYTAeFw0xMjAyMDExODExMjRaFw0xNDAxMjEx ODExMjRaMDcxEjAQBgNVBAoTCXNpbGVudGRvbTEhMB8GA1UEAxMYT0NTUCBTaWduaW5nIENlcnRp ZmljYXRlMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA66SvYVTbCRymHTYbD265KwRQ GNLiQJS091Sb+5d01z4B0X1mGa34kTK8GflOy8erQvc24hPPB4/UPJxx3B0/BJHtk8qJJXEEfj4X hgZGqBUYbCOlRHf9I6Ph81kvMXkv4VLE0K7BO2Wocjxwalwfsqs4CBdhQrtP3VACA8KkocN/D0F0 ijPLET35Neu1UYrfrvwFxg3P7BzN8tvLjVV1jdhuqFOtHd8x4z7RjHPvZXVLtKyOcbAT8G/JIlBF Gw8mLmiPJCldwsj2C0g+BTyE008Lmo/827kLq9R7sGVhm5WidZHInqHEaH5eNIxD558qBlBDTHKo jZon9jBXZajeMwIDAQABo4GMMIGJMB8GA1UdIwQYMBaAFEOs9jCROrWHDKLUryphbeXnYeIaMEAG CCsGAQUFBwEBBDQwMjAwBggrBgEFBQcwAYYkaHR0cDovL2YxNi1wa2kudGVzdC5jb206OTE4MC9j YS9vY3NwMBMGA1UdJQQMMAoGCCsGAQUFBwMJMA8GCSsGAQUFBzABBQQCBQAwDQYJKoZIhvcNAQEN BQADggEBAE/7Tn9BxzAOS1Nb1q6VhmNM8FSGMaPe6CRaKN+mW34L6LWFhWG4Aklq3Mx9W8jrGXVG tBlt2dT4AIVtxevOMyv6ZWWAfwmaAjZqDOYhFipUDBe2Do/ieEcud8bAKvPHALso0n2Hd7t4q1kT p9UzVan38G2vAq82p4EUijRZ18qaNAb3kd4qXQrNbFnT30J5HSqulRNE6g3I3Oj3r8Vf3RUnOJa9 XNCSN2enGvBPq8/zcyD3nUXMSmyYQ4fcNxCCXo35wSEqvPpcPPIrp9FoVr9y28Jct0LZfDbLEUGU UZur7Kei5qx0KfjMXv5u2WmvQCSnS3m8rw+6DzujSgtcjzU= -----END CERTIFICATE----- tag=Certificate value=-----BEGIN CERTIFICATE----- MIIDgTCCAmmgAwIBAgIBEDANBgkqhkiG9w0BAQ0FADA3MRIwEAYDVQQKEwlzaWxlbnRkb20xITAf BgNVBAMTGENlcnRpZmljYXRlIEF1dGhvcml0eS1jYTAeFw0xMjAyMDExODExMzJaFw0xNDAxMjEx ODExMzJaMC8xEjAQBgNVBAoTCXNpbGVudGRvbTEZMBcGA1UEAxMQZjE2LXBraS50ZXN0LmNvbTCC ASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANNwb6ugMupKG8nQeUH6/yxwacDlsJeiqgX/ 3hQCWwz7l3ST5gr5SZxSG5mUiJSs9ntn8BBN3TBTS39l8HgS+1irouZmaqhAlOLFQzqVndw/E2az ACbr7Vt98d4imQ334A9cHJ479Dz21meBOH+o8OaX8tHqL9baiZAhN0tdFhvJ2xJBp93agu3lWkWB BhaWwWqlmm62vlI7Rd33LMn1gu7ERf6PsxvyR0CkQ9Vyi7dH3VqwKN6AQTWN96PIkmfF6+C89pu5 gIzrQ4aAn9GPtzKb6n+Fv/Hai6D37tCPHpoorWDvP6udcjcEA/jhPKe5NZEzs1cLOIlxgIzBhJRU MgMCAwEAAaOBnzCBnDAfBgNVHSMEGDAWgBRDrPYwkTq1hwyi1K8qYW3l52HiGjBABggrBgEFBQcB AQQ0MDIwMAYIKwYBBQUHMAGGJGh0dHA6Ly9mMTYtcGtpLnRlc3QuY29tOjkxODAvY2Evb2NzcDAO BgNVHQ8BAf8EBAMCBPAwJwYDVR0lBCAwHgYIKwYBBQUHAwEGCCsGAQUFBwMCBggrBgEFBQcDBDAN BgkqhkiG9w0BAQ0FAAOCAQEAF7ayv70ADuKb0A4jV8oa+1vr/qD7BZEAnxHYdYRwTuSHlQObtHMD VgQz1oC8jM+xF+CuxvKupE7lX5XL/HrDVLUyuU6roJIbkX6QAfBmEEPQ0YMEBqjR5NasT9YHiTrA RO+DVvEXKT3O0kDk77kok5tjzVvbVwA53X8bdMjmty0vZF+L3H9rODXxGGd0JIXfM2dP0Yps5JAq I5RhJDcjSmaCYQ1u1vScSPg5zSzLYk9W1edf6iwadzbu/Cm9STglM8vYA/NRvOStw2QyA1rv5WyV lC842kdCZosbuxgldBFjxt5WDi9FxZTsgYNwFIVd/0NjBaJB+t057Q6C2adgLg== -----END CERTIFICATE----- tag=Certificate value=-----BEGIN CERTIFICATE----- MIIDdzCCAl+gAwIBAgIBETANBgkqhkiG9w0BAQ0FADA3MRIwEAYDVQQKEwlzaWxlbnRkb20xITAf BgNVBAMTGENlcnRpZmljYXRlIEF1dGhvcml0eS1jYTAeFw0xMjAyMDExODExMzhaFw0xNDAxMjEx ODExMzhaMDkxEjAQBgNVBAoTCXNpbGVudGRvbTEjMCEGA1UEAxMaT0NTUCBTdWJzeXN0ZW0gQ2Vy dGlmaWNhdGUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDMmPOTmIXCWhoVBtVLqg6X cYnV3nZJL8gkIEC4i0h1eWJyJq5BGrfzlLOMkvOLZDKqLiBBs/SAQfazfQymJd0yNjP4OIfY4TH2 sjAa9LzunL0Y5IVk8fYXBzgUYrpabW27AvHF3XyJmOcjB4jEuJ/5XeNt31h+mBpdt530oP2Z4/8m n2rm+U//vIx8Z7EmU4nJ7EHwsCba1tEB1ffFRWK3nfrb1e7Ta3SGgE0eYc4ir3JBOMwZrv7CenyV v4HOHtVqZed3G8kVZBu3MF3NQdfj0QDyfALHrjBMzRjYihvtVK8hKe5B7+Mzuy4Fk1hGAgPHAX5b idEeQMeoiKKPyheZAgMBAAGjgYswgYgwHwYDVR0jBBgwFoAUQ6z2MJE6tYcMotSvKmFt5edh4how QAYIKwYBBQUHAQEENDAyMDAGCCsGAQUFBzABhiRodHRwOi8vZjE2LXBraS50ZXN0LmNvbTo5MTgw L2NhL29jc3AwDgYDVR0PAQH/BAQDAgTwMBMGA1UdJQQMMAoGCCsGAQUFBwMCMA0GCSqGSIb3DQEB DQUAA4IBAQAP5++IuaPwKJHX2DJBp/DE4+ommwV/ObjVaXA0pvn/2cuT9CTKWjYsRDVv5cTINXsz B01IIVjgrZo58zfAYY2e29qM3f11hH2HdGUe3iKhhHgjpijJZFImuniMP6dOKUvOkrbf/HlZ3GyC HCCWzbwhmWeHUW1WJ2YvjPtVez2bYpWlOVOnwPa0q2B1DKDjvEp1Hf6wwJOHk2tved33mcZdxeCZ AEhHl8sgLMp7+C8mQ7OxWOVT5dVPsIVY/lvFeSaHyrGA4aPrhb1Xqo+kJBjUTTjmS6boXX5NzpEO RyzTnJlZLzDkfLpFVZtYmFxUZBOf8zmSzCMgkI+KVNSdbuKM -----END CERTIFICATE----- tag=Certificate value=-----BEGIN CERTIFICATE----- MIIDZDCCAkygAwIBAgIBEjANBgkqhkiG9w0BAQ0FADA3MRIwEAYDVQQKEwlzaWxlbnRkb20xITAf BgNVBAMTGENlcnRpZmljYXRlIEF1dGhvcml0eS1jYTAeFw0xMjAyMDExODExNDRaFw0xNDAxMjEx ODExNDRaMD0xEjAQBgNVBAoTCXNpbGVudGRvbTEnMCUGA1UEAxMeT0NTUCBBdWRpdCBTaWduaW5n IENlcnRpZmljYXRlMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEApetDN3I67FSPY1i7 woN1PyVch5ETVNCK9VhGCwwE9oAy4MciODEU02s6lKB/zWPfA1SDG/TKNBcsdrCLCdFiMhDOtoy/ Oku2B406jorwfApbjRFBU4ignQEhyviMU5HPsuhP7U3poz4w4xu8Bud4gSyb9cFU5E2jnAsURcbh vGuLWwFMGhfLXJgMn+4OoPorCy/gNgGn/J4y+fxq8bHfRAoAxYyvr0Upz0dO8Arnypu5gxPRVkc3 qaB72qW9MMxotRo1waZZqIqVInlN6j2SgCWWhyBL8+ka4MqM3gT79huXpAddVbmbGZZcg7W1xh33 1iYrfYO/u0GOinhRBGX6gwIDAQABo3UwczAfBgNVHSMEGDAWgBRDrPYwkTq1hwyi1K8qYW3l52Hi GjBABggrBgEFBQcBAQQ0MDIwMAYIKwYBBQUHMAGGJGh0dHA6Ly9mMTYtcGtpLnRlc3QuY29tOjkx ODAvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBsAwDQYJKoZIhvcNAQENBQADggEBAIHhwmf5D4qiwzxA +Hlsz1EQKtBsB5IHF/CoC+gW9r8SbXTq6dEPkIaugDorDhRoot42WVOfrWqLMYn7M9BXFc1rFmtk OEJlUaC9ZmyWgMLS3NP8kZjubgDOVYetQBcDTvE8yZvDwDDI3e/HLk3sdhOLO8Ij2L+8Ie2/FE4o F3upEgUER3DOknzfnyVeoWYXjb2R1gmpEQ4b4cGNx52ia1GmEd3/zLBZpLAhGpJmfHNI9lt0fTxX WKZd4XYdDLQCj31JdUOOCa3njNeN7EbZOyxjNm20g1JaxuTl/7BFFzA7WqWNPDTFFejBXxjHisvn AwJ1xgBqz6mQ8qn6ynuChCE= -----END CERTIFICATE----- tag=Nickname value=ocspSigningCert cert-pki-ocsp tag=Nickname value=Server-Cert cert-pki-ocsp tag=Nickname value=subsystemCert cert-pki-ocsp tag=Nickname value=auditSigningCert cert-pki-ocsp Sleeping for 5 secs.. ############################################# Attempting to connect to: f16-pki.test.com:11445 ERROR: unable to set ECC Cipher List ERROR: Exception = org.mozilla.jss.ssl.SSLSocketException: Failed to enable cipher 0xc001 : (-12266) An unknown SSL cipher suite has been requested. Connected. Posting Query = https://f16-pki.test.com:11445//ocsp/admin/console/config/wizard?p=10&op=next&xml=true&subsystem=-----BEGIN+CERTIFICATE-----%0AMIIDdzCCAl%2BgAwIBAgIBETANBgkqhkiG9w0BAQ0FADA3MRIwEAYDVQQKEwlzaWxlbnRkb20xITAf%0ABgNVBAMTGENlcnRpZmljYXRlIEF1dGhvcml0eS1jYTAeFw0xMjAyMDExODExMzhaFw0xNDAxMjEx%0AODExMzhaMDkxEjAQBgNVBAoTCXNpbGVudGRvbTEjMCEGA1UEAxMaT0NTUCBTdWJzeXN0ZW0gQ2Vy%0AdGlmaWNhdGUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDMmPOTmIXCWhoVBtVLqg6X%0AcYnV3nZJL8gkIEC4i0h1eWJyJq5BGrfzlLOMkvOLZDKqLiBBs%2FSAQfazfQymJd0yNjP4OIfY4TH2%0AsjAa9LzunL0Y5IVk8fYXBzgUYrpabW27AvHF3XyJmOcjB4jEuJ%2F5XeNt31h%2BmBpdt530oP2Z4%2F8m%0An2rm%2BU%2F%2FvIx8Z7EmU4nJ7EHwsCba1tEB1ffFRWK3nfrb1e7Ta3SGgE0eYc4ir3JBOMwZrv7CenyV%0Av4HOHtVqZed3G8kVZBu3MF3NQdfj0QDyfALHrjBMzRjYihvtVK8hKe5B7%2BMzuy4Fk1hGAgPHAX5b%0AidEeQMeoiKKPyheZAgMBAAGjgYswgYgwHwYDVR0jBBgwFoAUQ6z2MJE6tYcMotSvKmFt5edh4how%0AQAYIKwYBBQUHAQEENDAyMDAGCCsGAQUFBzABhiRodHRwOi8vZjE2LXBraS50ZXN0LmNvbTo5MTgw%0AL2NhL29jc3AwDgYDVR0PAQH%2FBAQDAgTwMBMGA1UdJQQMMAoGCCsGAQUFBwMCMA0GCSqGSIb3DQEB%0ADQUAA4IBAQAP5%2B%2BIuaPwKJHX2DJBp%2FDE4%2BommwV%2FObjVaXA0pvn%2F2cuT9CTKWjYsRDVv5cTINXsz%0AB01IIVjgrZo58zfAYY2e29qM3f11hH2HdGUe3iKhhHgjpijJZFImuniMP6dOKUvOkrbf%2FHlZ3GyC%0AHCCWzbwhmWeHUW1WJ2YvjPtVez2bYpWlOVOnwPa0q2B1DKDjvEp1Hf6wwJOHk2tved33mcZdxeCZ%0AAEhHl8sgLMp7%2BC8mQ7OxWOVT5dVPsIVY%2FlvFeSaHyrGA4aPrhb1Xqo%2BkJBjUTTjmS6boXX5NzpEO%0ARyzTnJlZLzDkfLpFVZtYmFxUZBOf8zmSzCMgkI%2BKVNSdbuKM%0A-----END+CERTIFICATE-----&subsystem_cc=&signing=-----BEGIN+CERTIFICATE-----%0AMIIDdjCCAl6gAwIBAgIBDzANBgkqhkiG9w0BAQ0FADA3MRIwEAYDVQQKEwlzaWxlbnRkb20xITAf%0ABgNVBAMTGENlcnRpZmljYXRlIEF1dGhvcml0eS1jYTAeFw0xMjAyMDExODExMjRaFw0xNDAxMjEx%0AODExMjRaMDcxEjAQBgNVBAoTCXNpbGVudGRvbTEhMB8GA1UEAxMYT0NTUCBTaWduaW5nIENlcnRp%0AZmljYXRlMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA66SvYVTbCRymHTYbD265KwRQ%0AGNLiQJS091Sb%2B5d01z4B0X1mGa34kTK8GflOy8erQvc24hPPB4%2FUPJxx3B0%2FBJHtk8qJJXEEfj4X%0AhgZGqBUYbCOlRHf9I6Ph81kvMXkv4VLE0K7BO2Wocjxwalwfsqs4CBdhQrtP3VACA8KkocN%2FD0F0%0AijPLET35Neu1UYrfrvwFxg3P7BzN8tvLjVV1jdhuqFOtHd8x4z7RjHPvZXVLtKyOcbAT8G%2FJIlBF%0AGw8mLmiPJCldwsj2C0g%2BBTyE008Lmo%2F827kLq9R7sGVhm5WidZHInqHEaH5eNIxD558qBlBDTHKo%0AjZon9jBXZajeMwIDAQABo4GMMIGJMB8GA1UdIwQYMBaAFEOs9jCROrWHDKLUryphbeXnYeIaMEAG%0ACCsGAQUFBwEBBDQwMjAwBggrBgEFBQcwAYYkaHR0cDovL2YxNi1wa2kudGVzdC5jb206OTE4MC9j%0AYS9vY3NwMBMGA1UdJQQMMAoGCCsGAQUFBwMJMA8GCSsGAQUFBzABBQQCBQAwDQYJKoZIhvcNAQEN%0ABQADggEBAE%2F7Tn9BxzAOS1Nb1q6VhmNM8FSGMaPe6CRaKN%2BmW34L6LWFhWG4Aklq3Mx9W8jrGXVG%0AtBlt2dT4AIVtxevOMyv6ZWWAfwmaAjZqDOYhFipUDBe2Do%2FieEcud8bAKvPHALso0n2Hd7t4q1kT%0Ap9UzVan38G2vAq82p4EUijRZ18qaNAb3kd4qXQrNbFnT30J5HSqulRNE6g3I3Oj3r8Vf3RUnOJa9%0AXNCSN2enGvBPq8%2FzcyD3nUXMSmyYQ4fcNxCCXo35wSEqvPpcPPIrp9FoVr9y28Jct0LZfDbLEUGU%0AUZur7Kei5qx0KfjMXv5u2WmvQCSnS3m8rw%2B6DzujSgtcjzU%3D%0A-----END+CERTIFICATE-----&signing_cc=&sslserver=-----BEGIN+CERTIFICATE-----%0AMIIDgTCCAmmgAwIBAgIBEDANBgkqhkiG9w0BAQ0FADA3MRIwEAYDVQQKEwlzaWxlbnRkb20xITAf%0ABgNVBAMTGENlcnRpZmljYXRlIEF1dGhvcml0eS1jYTAeFw0xMjAyMDExODExMzJaFw0xNDAxMjEx%0AODExMzJaMC8xEjAQBgNVBAoTCXNpbGVudGRvbTEZMBcGA1UEAxMQZjE2LXBraS50ZXN0LmNvbTCC%0AASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANNwb6ugMupKG8nQeUH6%2FyxwacDlsJeiqgX%2F%0A3hQCWwz7l3ST5gr5SZxSG5mUiJSs9ntn8BBN3TBTS39l8HgS%2B1irouZmaqhAlOLFQzqVndw%2FE2az%0AACbr7Vt98d4imQ334A9cHJ479Dz21meBOH%2Bo8OaX8tHqL9baiZAhN0tdFhvJ2xJBp93agu3lWkWB%0ABhaWwWqlmm62vlI7Rd33LMn1gu7ERf6PsxvyR0CkQ9Vyi7dH3VqwKN6AQTWN96PIkmfF6%2BC89pu5%0AgIzrQ4aAn9GPtzKb6n%2BFv%2FHai6D37tCPHpoorWDvP6udcjcEA%2FjhPKe5NZEzs1cLOIlxgIzBhJRU%0AMgMCAwEAAaOBnzCBnDAfBgNVHSMEGDAWgBRDrPYwkTq1hwyi1K8qYW3l52HiGjBABggrBgEFBQcB%0AAQQ0MDIwMAYIKwYBBQUHMAGGJGh0dHA6Ly9mMTYtcGtpLnRlc3QuY29tOjkxODAvY2Evb2NzcDAO%0ABgNVHQ8BAf8EBAMCBPAwJwYDVR0lBCAwHgYIKwYBBQUHAwEGCCsGAQUFBwMCBggrBgEFBQcDBDAN%0ABgkqhkiG9w0BAQ0FAAOCAQEAF7ayv70ADuKb0A4jV8oa%2B1vr%2FqD7BZEAnxHYdYRwTuSHlQObtHMD%0AVgQz1oC8jM%2BxF%2BCuxvKupE7lX5XL%2FHrDVLUyuU6roJIbkX6QAfBmEEPQ0YMEBqjR5NasT9YHiTrA%0ARO%2BDVvEXKT3O0kDk77kok5tjzVvbVwA53X8bdMjmty0vZF%2BL3H9rODXxGGd0JIXfM2dP0Yps5JAq%0AI5RhJDcjSmaCYQ1u1vScSPg5zSzLYk9W1edf6iwadzbu%2FCm9STglM8vYA%2FNRvOStw2QyA1rv5WyV%0AlC842kdCZosbuxgldBFjxt5WDi9FxZTsgYNwFIVd%2F0NjBaJB%2Bt057Q6C2adgLg%3D%3D%0A-----END+CERTIFICATE-----&sslserver_cc=&audit_signing=-----BEGIN+CERTIFICATE-----%0AMIIDZDCCAkygAwIBAgIBEjANBgkqhkiG9w0BAQ0FADA3MRIwEAYDVQQKEwlzaWxlbnRkb20xITAf%0ABgNVBAMTGENlcnRpZmljYXRlIEF1dGhvcml0eS1jYTAeFw0xMjAyMDExODExNDRaFw0xNDAxMjEx%0AODExNDRaMD0xEjAQBgNVBAoTCXNpbGVudGRvbTEnMCUGA1UEAxMeT0NTUCBBdWRpdCBTaWduaW5n%0AIENlcnRpZmljYXRlMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEApetDN3I67FSPY1i7%0AwoN1PyVch5ETVNCK9VhGCwwE9oAy4MciODEU02s6lKB%2FzWPfA1SDG%2FTKNBcsdrCLCdFiMhDOtoy%2F%0AOku2B406jorwfApbjRFBU4ignQEhyviMU5HPsuhP7U3poz4w4xu8Bud4gSyb9cFU5E2jnAsURcbh%0AvGuLWwFMGhfLXJgMn%2B4OoPorCy%2FgNgGn%2FJ4y%2Bfxq8bHfRAoAxYyvr0Upz0dO8Arnypu5gxPRVkc3%0AqaB72qW9MMxotRo1waZZqIqVInlN6j2SgCWWhyBL8%2Bka4MqM3gT79huXpAddVbmbGZZcg7W1xh33%0A1iYrfYO%2Fu0GOinhRBGX6gwIDAQABo3UwczAfBgNVHSMEGDAWgBRDrPYwkTq1hwyi1K8qYW3l52Hi%0AGjBABggrBgEFBQcBAQQ0MDIwMAYIKwYBBQUHMAGGJGh0dHA6Ly9mMTYtcGtpLnRlc3QuY29tOjkx%0AODAvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBsAwDQYJKoZIhvcNAQENBQADggEBAIHhwmf5D4qiwzxA%0A%2BHlsz1EQKtBsB5IHF%2FCoC%2BgW9r8SbXTq6dEPkIaugDorDhRoot42WVOfrWqLMYn7M9BXFc1rFmtk%0AOEJlUaC9ZmyWgMLS3NP8kZjubgDOVYetQBcDTvE8yZvDwDDI3e%2FHLk3sdhOLO8Ij2L%2B8Ie2%2FFE4o%0AF3upEgUER3DOknzfnyVeoWYXjb2R1gmpEQ4b4cGNx52ia1GmEd3%2FzLBZpLAhGpJmfHNI9lt0fTxX%0AWKZd4XYdDLQCj31JdUOOCa3njNeN7EbZOyxjNm20g1JaxuTl%2F7BFFzA7WqWNPDTFFejBXxjHisvn%0AAwJ1xgBqz6mQ8qn6ynuChCE%3D%0A-----END+CERTIFICATE-----&audit_signing_cc= RESPONSE STATUS: HTTP/1.1 200 OK RESPONSE HEADER: Server: Apache-Coyote/1.1 RESPONSE HEADER: Content-Type: application/xml;charset=UTF-8 RESPONSE HEADER: Date: Wed, 01 Feb 2012 18:12:07 GMT RESPONSE HEADER: Connection: close html returned= admin/console/config/backupkeycertpanel.vmsuccess16Export Keys and CertificateswelcomeWelcomemoduleKey StoreconfighsmloginConfigHSMLoginsecuritydomainSecurity DomainsecuritydomainDisplay Certificate ChainsubsystemSubsystem TyperestorekeysImport Keys and CertificatesdatabasepanelInternal DatabasesizepanelKey PairsnamepanelSubject NamescertrequestpanelRequests and CertificatesbackupkeysExport Keys and Certificatessavepk12Save Keys and CertificatesadminpanelAdministratorimportadmincertpanelImport Administrator's CertificatedonepanelDonechecked

11

OCSP Setup Wizardbackupkeys
admin/console/config/backupkeycertpanel.vm success 16 Export Keys and Certificates welcome Welcome module Key Store confighsmlogin ConfigHSMLogin securitydomain Security Domain securitydomain Display Certificate Chain subsystem Subsystem Type restorekeys Import Keys and Certificates databasepanel Internal Database sizepanel Key Pairs namepanel Subject Names certrequestpanel Requests and Certificates backupkeys Export Keys and Certificates savepk12 Save Keys and Certificates adminpanel Administrator importadmincertpanel Import Administrator's Certificate donepanel Done checked

11

OCSP Setup Wizard backupkeys
Sleeping for 5 secs.. ############################################# Attempting to connect to: f16-pki.test.com:11445 ERROR: unable to set ECC Cipher List ERROR: Exception = org.mozilla.jss.ssl.SSLSocketException: Failed to enable cipher 0xc001 : (-12266) An unknown SSL cipher suite has been requested. Connected. Posting Query = https://f16-pki.test.com:11445//ocsp/admin/console/config/wizard?p=11&op=next&xml=true&choice=backupkey&__pwd=testpwd&__pwdagain=redhat RESPONSE STATUS: HTTP/1.1 200 OK RESPONSE HEADER: Server: Apache-Coyote/1.1 RESPONSE HEADER: Content-Type: application/xml;charset=UTF-8 RESPONSE HEADER: Date: Wed, 01 Feb 2012 18:12:37 GMT RESPONSE HEADER: Connection: close admin/console/config/savepkcs12panel.vm ocsp success 16 Save Keys and Certificates welcome Welcome module Key Store confighsmlogin ConfigHSMLogin securitydomain Security Domain securitydomain Display Certificate Chain subsystem Subsystem Type restorekeys Import Keys and Certificates databasepanel Internal Database sizepanel Key Pairs namepanel Subject Names certrequestpanel Requests and Certificates backupkeys Export Keys and Certificates savepk12 Save Keys and Certificates adminpanel Administrator importadmincertpanel Import Administrator's Certificate donepanel Done OCSP Setup Wizard

12

savepk12
Sleeping for 5 secs.. ############################################# Attempting to connect to: f16-pki.test.com:11445 ERROR: unable to set ECC Cipher List ERROR: Exception = org.mozilla.jss.ssl.SSLSocketException: Failed to enable cipher 0xc001 : (-12266) An unknown SSL cipher suite has been requested. Connected. Posting Query = https://f16-pki.test.com:11445//ocsp/admin/console/config/savepkcs12? RESPONSE STATUS: HTTP/1.1 200 OK RESPONSE HEADER: Server: Apache-Coyote/1.1 RESPONSE HEADER: Content-Type: application/x-pkcs12 RESPONSE HEADER: Date: Wed, 01 Feb 2012 18:12:42 GMT RESPONSE HEADER: Connection: close Decoded PFX Version: 3 AuthSafes has 2 SafeContents Sleeping for 5 secs.. CRYPTO INIT WITH CERTDB:/var//tmp/testdb Crypto manager already initialized Debug : initialize crypto Manager INITIALIZATION ERROR: org.mozilla.jss.crypto.AlreadyInitializedException cdir = /var//tmp/testdb Debug : before getInstance Debug : before get token Debug : before login password Debug : after login password 64-bit osutil library loaded CRMF_REQUEST = MIIBzTCCAckwggG9AgEBMIIBtIABAqWBiDCBhTESMBAGA1UEChMJc2lsZW50ZG9t MSYwJAYJKoZIhvcNAQkBFhdwa2ktb2NzcC1hZG1pbkB0ZXN0LmNvbTEVMBMGCgmS JomT8ixkAQETBWFkbWluMTAwLgYDVQQDEydPQ1NQIEFkbWluaXN0cmF0b3Igb2Yg SW5zdGFuY2UgcGtpLW9jc3CmggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB AQDUxyxRX/r7CQD+k4PELSJTHpOsrltDOneZkKIGD1yyju3vFikHRa23BopDqjVr kS01GnCgjQkdQZ0MQvcLi1CXGs2Mfc80miKeVLhfE/QqTKdk/sRL5O8a21iY8HAj UyKkWth26qvnyyB7EKlKctop6mAJzCFuDNn8tW00USe+yVr6jnOi77iqJ7e7mR+5 34IiHqH7j4Y7OBmgcZcWSYrI2ULI74g/gvH2lyoWQTktnmlC9UrVXhVdDwrczWNa 2sclaPIGC4lsXtFbQuotH2zvn4JjQ45OG7z+Xd7IjgBkvJvsuMUpp/4G5EtaCA6v 0B6K+rum0HHO/TzEv7XdBa7zAgMBAAEwAKIGgAQDAAMA ############################################# Attempting to connect to: f16-pki.test.com:11445 ERROR: unable to set ECC Cipher List ERROR: Exception = org.mozilla.jss.ssl.SSLSocketException: Failed to enable cipher 0xc001 : (-12266) An unknown SSL cipher suite has been requested. Connected. Posting Query = https://f16-pki.test.com:11445//ocsp/admin/console/config/wizard?p=13&op=next&xml=true&cert_request_type=crmf&uid=admin&name=admin&__pwd=testpwd&__admin_password_again=redhat&profileId=caAdminCert&email=pki-ocsp-admin%40test.com&cert_request=MIIBzTCCAckwggG9AgEBMIIBtIABAqWBiDCBhTESMBAGA1UEChMJc2lsZW50ZG9t%0D%0AMSYwJAYJKoZIhvcNAQkBFhdwa2ktb2NzcC1hZG1pbkB0ZXN0LmNvbTEVMBMGCgmS%0D%0AJomT8ixkAQETBWFkbWluMTAwLgYDVQQDEydPQ1NQIEFkbWluaXN0cmF0b3Igb2Yg%0D%0ASW5zdGFuY2UgcGtpLW9jc3CmggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB%0D%0AAQDUxyxRX%2Fr7CQD%2Bk4PELSJTHpOsrltDOneZkKIGD1yyju3vFikHRa23BopDqjVr%0D%0AkS01GnCgjQkdQZ0MQvcLi1CXGs2Mfc80miKeVLhfE%2FQqTKdk%2FsRL5O8a21iY8HAj%0D%0AUyKkWth26qvnyyB7EKlKctop6mAJzCFuDNn8tW00USe%2ByVr6jnOi77iqJ7e7mR%2B5%0D%0A34IiHqH7j4Y7OBmgcZcWSYrI2ULI74g%2FgvH2lyoWQTktnmlC9UrVXhVdDwrczWNa%0D%0A2sclaPIGC4lsXtFbQuotH2zvn4JjQ45OG7z%2BXd7IjgBkvJvsuMUpp%2F4G5EtaCA6v%0D%0A0B6K%2Brum0HHO%2FTzEv7XdBa7zAgMBAAEwAKIGgAQDAAMA&subject=cn%3DOCSP+Administrator+of+Instance+pki-ocsp%2Cuid%3Dadmin%2Ce%3Dpki-ocsp-admin%40test.com%2Co%3Dsilentdom&clone=new&import=true&securitydomain=silentdom RESPONSE STATUS: HTTP/1.1 200 OK RESPONSE HEADER: Server: Apache-Coyote/1.1 RESPONSE HEADER: Content-Type: application/xml;charset=UTF-8 RESPONSE HEADER: Date: Wed, 01 Feb 2012 18:12:55 GMT RESPONSE HEADER: Connection: close admin/console/config/importadmincertpanel.vm testpwd false 9445 testpwd sdca success 13 pki-ocsp-admin@test.com admin 16 f16-pki.test.com Import Administrator's Certificate welcome Welcome module Key Store confighsmlogin ConfigHSMLogin securitydomain Security Domain securitydomain Display Certificate Chain subsystem Subsystem Type restorekeys Import Keys and Certificates databasepanel Internal Database sizepanel Key Pairs namepanel Subject Names certrequestpanel Requests and Certificates backupkeys Export Keys and Certificates savepk12 Save Keys and Certificates adminpanel Administrator importadmincertpanel Import Administrator's Certificate donepanel Done

14

OCSP Setup Wizard true importadmincertpanel
Sleeping for 5 secs.. ############################################# Attempting to connect to: f16-pki.test.com:9445 ERROR: unable to set ECC Cipher List ERROR: Exception = org.mozilla.jss.ssl.SSLSocketException: Failed to enable cipher 0xc001 : (-12266) An unknown SSL cipher suite has been requested. Connected. Posting Query = https://f16-pki.test.com:9445//ca/admin/ca/getBySerial?serialNumber=13&importCert=true RESPONSE STATUS: HTTP/1.1 200 OK RESPONSE HEADER: Server: Apache-Coyote/1.1 RESPONSE HEADER: Content-Type: application/x-x509-user-cert RESPONSE HEADER: Content-Length: 1945 RESPONSE HEADER: Date: Wed, 01 Feb 2012 18:13:00 GMT RESPONSE HEADER: Connection: keep-alive Imported Cert=MIIHlQYJKoZIhvcNAQcCoIIHhjCCB4ICAQExADAPBgkqhkiG9w0BBwGgAgQAoIIH ZjCCA84wggK2oAMCAQICARMwDQYJKoZIhvcNAQENBQAwNzESMBAGA1UEChMJc2ls ZW50ZG9tMSEwHwYDVQQDExhDZXJ0aWZpY2F0ZSBBdXRob3JpdHktY2EwHhcNMTIw MjAxMTgxMjU1WhcNMTMwMTMxMTgxMjU1WjCBhTESMBAGA1UEChMJc2lsZW50ZG9t MSYwJAYJKoZIhvcNAQkBFhdwa2ktb2NzcC1hZG1pbkB0ZXN0LmNvbTEVMBMGCgmS JomT8ixkAQETBWFkbWluMTAwLgYDVQQDEydPQ1NQIEFkbWluaXN0cmF0b3Igb2Yg SW5zdGFuY2UgcGtpLW9jc3AwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB AQDUxyxRX/r7CQD+k4PELSJTHpOsrltDOneZkKIGD1yyju3vFikHRa23BopDqjVr kS01GnCgjQkdQZ0MQvcLi1CXGs2Mfc80miKeVLhfE/QqTKdk/sRL5O8a21iY8HAj UyKkWth26qvnyyB7EKlKctop6mAJzCFuDNn8tW00USe+yVr6jnOi77iqJ7e7mR+5 34IiHqH7j4Y7OBmgcZcWSYrI2ULI74g/gvH2lyoWQTktnmlC9UrVXhVdDwrczWNa 2sclaPIGC4lsXtFbQuotH2zvn4JjQ45OG7z+Xd7IjgBkvJvsuMUpp/4G5EtaCA6v 0B6K+rum0HHO/TzEv7XdBa7zAgMBAAGjgZUwgZIwHwYDVR0jBBgwFoAUQ6z2MJE6 tYcMotSvKmFt5edh4howQAYIKwYBBQUHAQEENDAyMDAGCCsGAQUFBzABhiRodHRw Oi8vZjE2LXBraS50ZXN0LmNvbTo5MTgwL2NhL29jc3AwDgYDVR0PAQH/BAQDAgTw MB0GA1UdJQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDBDANBgkqhkiG9w0BAQ0FAAOC AQEAwU4aNU6ljULFrgjR8iXEH9KGYb3MH3lgqhfd5jeXHhybjVu0Kpjytw+rLSIn 8xmxE+t13ty6nPawZu3qkee/5P+k6BFm8ZfdzwH61SLrL0r0xPrVI8D+GFE/BNw4 biP/H/HGJXwLRSfg8j1vt+MxaY92KzNgtdi64KDNb1+mUAmw6RGFFVPEi7etw6/k Gpvpm2mRhcR4FNTC5eamWeiF2zFgP3a0v7i9G+M+yDpNk58oFwfpqTH6v6NOL+bQ SbfgKdyysYEqYd+P0Vyt+7prvL78N0ulFprDaT7VJXjb4ys108rzbQKazMpsTleT 5FQo0hHkOeYAhdfMRmi/urk5mzCCA5AwggJ4oAMCAQICAQEwDQYJKoZIhvcNAQEN BQAwNzESMBAGA1UEChMJc2lsZW50ZG9tMSEwHwYDVQQDExhDZXJ0aWZpY2F0ZSBB dXRob3JpdHktY2EwHhcNMTIwMjAxMTQyMjEyWhcNMjAwMjAxMTQyMjEyWjA3MRIw EAYDVQQKEwlzaWxlbnRkb20xITAfBgNVBAMTGENlcnRpZmljYXRlIEF1dGhvcml0 eS1jYTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAOHVye0oVlu/Rgz4 k28JX7J0gmHn5XCRJFYJhYudto8S4IWD6+Vj5mXD3eCL+1MIdr+bg4Zt3YY1ehSh T7kbdOnhd14dc5T8ouorn+6IYmUiE9pXWqVMaF/6sNJeZmgglKwS+IyU4/QJa2Ci wtVHGyd00Isf+md111yWaOb5+7yxSQCtyu1lIsuV1evbaKhl1tfGWNS9bzSg8fEu 27ySSQ2/MQOrOG/GAmUaZj/bMePNrKEn3TaDGtPxt46TnJZJPdxU+vGDz4jH/H5i jU1rGkMpGgtakmKtuVe3A3VIaNCRpliGZNL/s/P9WFURCVroRmKR/HjbFrDjA0w6 YORhADMCAwEAAaOBpjCBozAfBgNVHSMEGDAWgBRDrPYwkTq1hwyi1K8qYW3l52Hi GjAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBxjAdBgNVHQ4EFgQUQ6z2 MJE6tYcMotSvKmFt5edh4howQAYIKwYBBQUHAQEENDAyMDAGCCsGAQUFBzABhiRo dHRwOi8vZjE2LXBraS50ZXN0LmNvbTo5MTgwL2NhL29jc3AwDQYJKoZIhvcNAQEN BQADggEBAMQxKJTsHAA1tpjwhWdZ0KL8Gflnv1RJsAxnQA90SwesYjYxfmr7/8LJ hGNLQX2gH8Vd6XvHUhDF726nOQND5Y2HBRfShKuKHph0+NVdgao0KdzdysOZsV61 pgOMUqHCJxj1WQ2Wvk7F8tKEVGE1gLu/PJslFZ/VTgzY9vR1akSAd1xujrz/HiY2 hFlkMWRJvbdaUyyluBbTI6GMq+7DrTLEKe6KCCPashKheAr/5lZAn4JScM/2cMud CPBy02YutofTydZcemaLLpb3xNzTiEVgYpSQhHZSfmF7sWVH5R0vh2ehgYpBpKql KBdSJ4IKKEDVMzolPpZibmo0ghVtaOAxAA== CRYPTO INIT WITH CERTDB:/var//tmp/testdb Crypto manager already initialized importCert string: importing with nickname: OCSP Administrator of Instance pki-ocsp's silentdom ID Already logged into to DB SUCCESS: imported admin user cert Sleeping for 5 secs.. ############################################# Attempting to connect to: f16-pki.test.com:11445 ERROR: unable to set ECC Cipher List ERROR: Exception = org.mozilla.jss.ssl.SSLSocketException: Failed to enable cipher 0xc001 : (-12266) An unknown SSL cipher suite has been requested. Connected. Posting Query = https://f16-pki.test.com:11445//ocsp/admin/console/config/wizard?p=14&op=next&xml=true&caHost=f16-pki.test.com&caPort=9443 RESPONSE STATUS: HTTP/1.1 200 OK RESPONSE HEADER: Server: Apache-Coyote/1.1 RESPONSE HEADER: Content-Type: application/xml;charset=UTF-8 RESPONSE HEADER: Date: Wed, 01 Feb 2012 18:13:13 GMT RESPONSE HEADER: Connection: close 11445 admin/console/config/donepanel.vm /bin/systemctl f16-pki.test.com false ocsp sdca pki-ocspd@pki-ocsp.service success 16 Done welcome Welcome module Key Store confighsmlogin ConfigHSMLogin securitydomain Security Domain securitydomain Display Certificate Chain subsystem Subsystem Type restorekeys Import Keys and Certificates databasepanel Internal Database sizepanel Key Pairs namepanel Subject Names certrequestpanel Requests and Certificates backupkeys Export Keys and Certificates savepk12 Save Keys and Certificates adminpanel Administrator importadmincertpanel Import Administrator's Certificate donepanel Done false

15

OCSP Setup Wizard donepanel 1
Sleeping for 5 secs.. Certificate System - OCSP Instance Configured #######################################################################