<html>
<head>
<meta content="text/html; charset=ISO-8859-1"
http-equiv="Content-Type">
</head>
<body bgcolor="#FFFFFF" text="#000000">
<div class="moz-cite-prefix">On 05/22/2013 05:07 PM, Matthew Harmsen
wrote:<br>
</div>
<blockquote cite="mid:519D5DAF.3070605@redhat.com" type="cite">
<meta http-equiv="content-type" content="text/html;
charset=ISO-8859-1">
<tt>Please review the attached patch which addresses </tt><tt>the
following two 'pki-silent' issues in RHCS 8.1:</tt><tt><br>
</tt>
<ul>
<li><tt><a moz-do-not-send="true"
href="https://bugzilla.redhat.com/show_bug.cgi?id=951891"><b>Bugzilla
Bug #951891</b></a></tt><tt> -</tt><tt><span
id="summary_alias_container"> <span
id="short_desc_nonedit_display">'silent_ra_to_ip_port.template'
fails to configure an RA successfully</span></span></tt></li>
<li><tt><a moz-do-not-send="true"
href="https://bugzilla.redhat.com/show_bug.cgi?id=952392"><b>Bugzilla
Bug #952392</b></a></tt><tt> -</tt><tt><span
id="summary_alias_container"> <span
id="short_desc_nonedit_display">Allow RA and TPS URLs to
be specified by pkisilent and utilized by the RA and TPS
servers</span></span></tt></li>
</ul>
<tt><span id="summary_alias_container"><span
id="short_desc_nonedit_display">This patch has been tested
extensively on an IP Port Separated x86_64 machine running
RHEL 5.9.</span></span></tt><tt><br>
</tt><tt><span id="summary_alias_container"><span
id="short_desc_nonedit_display"></span></span></tt><tt><br>
</tt><tt><span id="summary_alias_container"><span
id="short_desc_nonedit_display">Testing utilized the
following deployment scenario:</span></span></tt><tt><br>
</tt><tt><span id="summary_alias_container"><span
id="short_desc_nonedit_display"></span></span></tt>
<ul>
<li><tt>CA (security domain)</tt></li>
<ul>
<li><tt>Subordinate CA (no security domain)</tt></li>
<ul>
<li><tt>KRA</tt></li>
<li><tt>TKS</tt></li>
<li><tt>RA</tt></li>
<li><tt>TPS</tt></li>
</ul>
</ul>
</ul>
<tt>The KRA, RA, and TPS were tested both by signing the
subsystems certificates with the CA and again with the
Subordinate CA; this testing led to the filing of "TRAC Ticket
#620 - </tt><tt>Ability of a non-security domain CA to store an
"Administration" cert in the NSS client security database".</tt><br>
<br>
<tt> </tt> <br>
<fieldset class="mimeAttachmentHeader"></fieldset>
<br>
<pre wrap="">_______________________________________________
Pki-devel mailing list
<a class="moz-txt-link-abbreviated" href="mailto:Pki-devel@redhat.com">Pki-devel@redhat.com</a>
<a class="moz-txt-link-freetext" href="https://www.redhat.com/mailman/listinfo/pki-devel">https://www.redhat.com/mailman/listinfo/pki-devel</a></pre>
</blockquote>
<br>
<tt>ACK, I assisted Matt in extensive test procedure, which will be
provided in the bugs for QE bug verification.<br>
<br>
</tt>
</body>
</html>