<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    <div class="moz-cite-prefix">On 05/22/2013 05:07 PM, Matthew Harmsen
      wrote:<br>
    </div>
    <blockquote cite="mid:519D5DAF.3070605@redhat.com" type="cite">
      <meta http-equiv="content-type" content="text/html;
        charset=ISO-8859-1">
      <tt>Please review the attached patch which addresses </tt><tt>the
        following two 'pki-silent' issues in RHCS 8.1:</tt><tt><br>
      </tt>
      <ul>
        <li><tt><a moz-do-not-send="true"
              href="https://bugzilla.redhat.com/show_bug.cgi?id=951891"><b>Bugzilla

                Bug #951891</b></a></tt><tt> -</tt><tt><span
              id="summary_alias_container"> <span
                id="short_desc_nonedit_display">'silent_ra_to_ip_port.template'

                fails to configure an RA successfully</span></span></tt></li>
        <li><tt><a moz-do-not-send="true"
              href="https://bugzilla.redhat.com/show_bug.cgi?id=952392"><b>Bugzilla

                Bug #952392</b></a></tt><tt> -</tt><tt><span
              id="summary_alias_container"> <span
                id="short_desc_nonedit_display">Allow RA and TPS URLs to
                be specified by pkisilent and utilized by the RA and TPS
                servers</span></span></tt></li>
      </ul>
      <tt><span id="summary_alias_container"><span
            id="short_desc_nonedit_display">This patch has been tested
            extensively on an IP Port Separated x86_64 machine running
            RHEL 5.9.</span></span></tt><tt><br>
      </tt><tt><span id="summary_alias_container"><span
            id="short_desc_nonedit_display"></span></span></tt><tt><br>
      </tt><tt><span id="summary_alias_container"><span
            id="short_desc_nonedit_display">Testing utilized the
            following deployment scenario:</span></span></tt><tt><br>
      </tt><tt><span id="summary_alias_container"><span
            id="short_desc_nonedit_display"></span></span></tt>
      <ul>
        <li><tt>CA (security domain)</tt></li>
        <ul>
          <li><tt>Subordinate CA (no security domain)</tt></li>
          <ul>
            <li><tt>KRA</tt></li>
            <li><tt>TKS</tt></li>
            <li><tt>RA</tt></li>
            <li><tt>TPS</tt></li>
          </ul>
        </ul>
      </ul>
      <tt>The KRA, RA, and TPS were tested both by signing the
        subsystems certificates with the CA and again with the
        Subordinate CA; this testing led to the filing of "TRAC Ticket
        #620 - </tt><tt>Ability of a non-security domain CA to store an
        "Administration" cert in the NSS client security database".</tt><br>
      <br>
      <tt> </tt> <br>
      <fieldset class="mimeAttachmentHeader"></fieldset>
      <br>
      <pre wrap="">_______________________________________________
Pki-devel mailing list
<a class="moz-txt-link-abbreviated" href="mailto:Pki-devel@redhat.com">Pki-devel@redhat.com</a>
<a class="moz-txt-link-freetext" href="https://www.redhat.com/mailman/listinfo/pki-devel">https://www.redhat.com/mailman/listinfo/pki-devel</a></pre>
    </blockquote>
    <br>
    <tt>ACK, I assisted Matt in extensive test procedure, which will be
      provided in the bugs for QE bug verification.<br>
      <br>
    </tt>
  </body>
</html>