Replies: 2 comments
-
|
Hey @smoeding, there's an issue discussing HP iLO, and it came down to iLO not liking a leaf being issued from an intermediate, but would only accept one from a root, apparently: #2181. It's an ... interesting implementation choice, if it turns out to be true. It might be the case they expect a root to sign the cert, but still support an Registration Authority to receive the request initially, which is basically what decrypter certificates are used for on a SCEP provisioner, but it would still be different from our general two-tier PKI. You could give it a try with a single tier PKI, meaning you'll need an RSA root configured as the root and intermediate. It's an unsupported configuration in |
Beta Was this translation helpful? Give feedback.
-
|
Thanks for your feedback, @hslatman I read the linked issue and also found an old discussion on a HP Forum that the iLO doesn't like an intermediate certificate. Someone from HP wrote that this restriction would be solved with an updated firmware but it's unclear if that has really happened. Anyway, I started to play with the decrypterKey/Cert options and at least a got the iLO to actually request a cert from the CA now. I will have to do more testing with that. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
I am trying to issue certificates for an HP iLO using the SCEP provisioner. iLO is the embedded management controller in an enterprise HP server. It provides a web interface to manage the server and I want to replace the untrusted default certificate with a certificate using our internal CA.
Unfortunately it doesn’t work and I am running out of ideas. I don’t think that my problem is really caused by step-ca, but I am wondering if anybody has seen anything like this and may have a suggestion on how to go forward.
My company uses an internal 4096 bit RSA root CA certificate. I have used that to create an intermediate certificate for step-ca which basically looks like this:
The OID 1.3.6.1.4.1.311.20.2.1 is mentioned in Microsoft documents describing their NDES implementation. I added that during debugging but it hasn’t changed anything.
The logs always look like this:
As you can see there is a
GetCACapsand aGetCACertcall. Then after a delay anotherGetCACapscall. After that the iLO saysCertificate Enrollment Status pendingon the web page. NoPKIOperationcall follows so it is clear that the iLO doesn’t even try to request a certificate. Unfortunately the iLO is an embedded system without any access to internal logs.To mee it looks like the iLO doesn't like the intermediate cert because that is all it has seen when going into the pending state. I also waited for a couple of hours but the pending state is never cleared.
Any ideas/suggestions what to change?
Beta Was this translation helpful? Give feedback.
All reactions