From kriteejhawar at gmail.com Sat Nov 1 04:24:05 2014 From: kriteejhawar at gmail.com (kritee jhawar) Date: Sat, 1 Nov 2014 09:54:05 +0530 Subject: [Pki-users] Can OpensSSL be used as external CA ? In-Reply-To: <5453C1A5.5090206@redhat.com> References: <544E6FAB.1020003@redhat.com> <544FF41B.3010705@redhat.com> <5453C1A5.5090206@redhat.com> Message-ID: Thanks Christina I checked out the master branch and built it. Now i can see the added extensions in the CSR generated, however i am getting the same error as earlier. This time again, I tried the supply the certificate chain with and without the headers. The chain is in a valid pkcs7 format. Following is how the extensions look in the certificate signed by openssl for dogtag: X509v3 extensions: X509v3 Basic Constraints: critical CA:TRUE X509v3 Key Usage: critical Digital Signature, Non Repudiation, Certificate Sign, CRL Sign 1.3.6.1.4.1.311.20.2: . .S.u.b.C.A The error i get in step 2 of pkispawn is as follows: pkispawn : INFO ....... BtoA /root/.dogtag/pki-tomcat/ca/alias/admin_pkcs10.bin /root/.dogtag/pki-tomcat/ca/alias/admin_pkcs10.bin.asc pkispawn : INFO ....... loading external CA signing certificate from file: '/home/kjhawar/dogtag/dg_ca.cert' pkispawn : INFO ....... loading external CA signing certificate chain from file: '/home/kjhawar/dogtag/dg_chain.cert' pkispawn : INFO ....... configuring PKI configuration data. pkispawn : INFO ....... AtoB /root/.dogtag/pki-tomcat/ca_admin.cert /root/.dogtag/pki-tomcat/ca_admin.cert.der pkispawn : INFO ....... certutil -A -d /root/.dogtag/pki-tomcat/ca/alias -n PKI Administrator -t u,u,u -i /root/.dogtag/pki-tomcat/ca_admin.cert.der -f /root/.dogtag/pki-tomcat/ca/password.conf Notice: Trust flag u is set automatically if the private key is present. pkispawn : INFO ....... pk12util -d /root/.dogtag/pki-tomcat/ca/alias -o /root/.dogtag/pki-tomcat/ca_admin_cert.p12 -n PKI Administrator -w /root/.dogtag/pki-tomcat/ca/pkcs12_password.conf -k /root/.dogtag/pki-tomcat/ca/password.conf pkispawn : INFO ... finalizing 'pki.server.deployment.scriptlets.finalization' pkispawn : INFO ....... cp -p /etc/sysconfig/pki/tomcat/pki-tomcat/ca/deployment.cfg /var/log/pki/pki-tomcat/ca/archive/spawn_deployment.cfg.20141101020655 pkispawn : INFO ....... generating manifest file called '/etc/sysconfig/pki/tomcat/pki-tomcat/ca/manifest' pkispawn : INFO ....... cp -p /etc/sysconfig/pki/tomcat/pki-tomcat/ca/manifest /var/log/pki/pki-tomcat/ca/archive/spawn_manifest.20141101020655 pkispawn : INFO ....... executing 'systemctl daemon-reload' pkispawn : INFO ....... executing 'systemctl restart pki-tomcatd at pki-tomcat.service' Job for pki-tomcatd at pki-tomcat.service canceled. pkispawn : ERROR ....... subprocess.CalledProcessError: Command '['systemctl', 'restart', 'pki-tomcatd at pki-tomcat.service']' returned non-zero exit status 1! Installation failed. Kindly let me know if any specific configuration has to be done in my openssl CA. Attaching the config file i am using currently Thanks Kritee On Fri, Oct 31, 2014 at 10:36 PM, Christina Fu wrote: > Kritee, > > At the minimum, you need the fixes I talked about. They were checked into > the master but has not been built officially so yum is not going to get you > the right rpm. However, you can check it out and build it yourself. > Here is how you check out the master: > > git clone git://git.fedorahosted.org/git/pki.git > > You can then use the build scripts to build. > > Finally, I apologize that we are not supposed to respond to private > emails. Dogtag is a community where we share our knowledge. In the future > please send requests to the mailing list. > I took the exception this time to look at your CSR and certs and I could > see that you need the fixes I talked about. I don't know if you have other > issues though, but AFAIK you need those two fixes. > > Hope this helps. > Christina > > > On 10/29/2014 01:16 AM, kritee jhawar wrote: > > Hi Christina > > I have done the default configuration for 389ds and haven't specifically > turned on ssl for it. > > Initially I tried using Microsoft and OpenSSL CA as external CAs. This > is about a month back and I pull the Rpms using yum (so I assume they are > the latest ones with the fix you mentioned). > With this, my pki spawn went fine. Infect the admin cert got generated > using the externally provided root cert as well. But dogtag couldn't > connect to the ds. As mentioned earlier it gave me a PKIException error > listing the certs with error code 500. > Looking at the ds logs I found that the error was 'bad search filter'. > However when I tried the same steps with dogtag as external CA the setup > went through without a glitch. The chain I imported was directly from the > GUI of dogtag. In fact I included the header and footer as well. > > When I tried to reverse engineer the chain, I took the root cert of > external dogtag ca and used OpenSSL to convert it into pkcs7. This chain > was not the same as provided from the GUI. Hence I thought that there is > some particular format for the chain because of which the other CAs aren't > working. > > Also, I updated the Rpms using yum and tried to generate the CSR with > the extra attributes. My csr still doesn't reflect those added attributes. > > Is yum not the correct way to get the latest code ? > > I am very new to this, really appreciate your assistance and time. > > Regards > Kritee > > On Wednesday, 29 October 2014, Christina Fu wrote: > >> the cert chain you provide in the file specified under >> pki_external_ca_cert_chain_path >> should be just pkcs7 without header/footer. >> >> I don't know why it would not talk to the DS (did you turn on ssl for the >> ds?). >> Not sure if you build your Dogtag from the master, if you do, I'd suggest >> you get the most updated so you get fixes from the tickets I provided >> previously which would address at least two issues relating to external CA. >> >> Christina >> >> On 10/27/2014 07:55 PM, kritee jhawar wrote: >> >> Hi Christina >> >> I was undertaking this activity last month where Microsoft CA didn't >> work out but Dogtag as external CA did. >> >> While using Microsoft CA or OpenSSL CA, pki spawn goes through >> without any error but dogtag stops communications to 389ds. Upon calling >> the rest Api /ca/rest/certs I get a "PKIException error listing the certs". >> >> Is there a particular format for the ca cert chain that we need to >> provide ? I was trying to reverse engineer the chain provided by dogtag. >> >> Thanks >> Kritee >> >> >> >> On Monday, 27 October 2014, Christina Fu wrote: >> >>> If you meant the following two: >>> https://fedorahosted.org/pki/ticket/1190 CA: issuer DN encoding not >>> preserved at issuance with signing cert signed by an external CA >>> https://fedorahosted.org/pki/ticket/1110 - pkispawn (configuration) >>> does not provide CA extensions in subordinate certificate signing requests >>> (CSR) >>> >>> They have just recently been fixed upstream so I imagine you could use >>> Microsoft CA now. Theoretically any other CA can be used as an external >>> CA, but if you run into issues, please feel free to report. >>> >>> Christina >>> >>> >>> On 10/27/2014 12:15 AM, kritee jhawar wrote: >>> >>> Hi >>> >>> In my recent thread i read that there is a bug due to which Microsoft >>> CA can't work as external CA for dogtag. >>> Can OpenSSL be used ? >>> >>> Thanks >>> Kritee >>> >>> >>> _______________________________________________ >>> Pki-users mailing listPki-users at redhat.comhttps://www.redhat.com/mailman/listinfo/pki-users >>> >>> >>> >> > > _______________________________________________ > Pki-users mailing list > Pki-users at redhat.com > https://www.redhat.com/mailman/listinfo/pki-users > -------------- next part -------------- An HTML attachment was scrubbed... URL: -------------- next part -------------- # My sample caconfig.cnf file. ## Default configuration to use when one is not provided on the command line. # [ ca ] default_ca = local_ca # Default location of directories and files needed to generate certificates. # [ local_ca ] dir = /root/myCA certificate = $dir/root-ca.crt database = $dir/index.txt new_certs_dir = $dir/signedcerts private_key = $dir/private/cakey.pem serial = $dir/serial # Default expiration and encryption policies for certificates. # default_crl_days = 365 default_days = 1825 default_md = sha1 # policy = local_ca_policy x509_extensions = local_ca_extensions # # # Copy extensions specified in the certificate request # copy_extensions = copy # # # Default policy to use when generating server certificates. The following # fields must be defined in the server certificate. # [ local_ca_policy ] commonName = optional stateOrProvinceName = optional countryName = optional emailAddress = optional organizationName = optional organizationalUnitName = optional # # # x509 extensions to use when generating server certificates. # [ local_ca_extensions ] #authorityKeyIdentifier = keyid,issuer #basicConstraints = critical,CA:true #keyUsage = critical, Digital Signature, Non Repudiation, Certificate Sign, CRL Sign #subjectKeyIdentifier = hash # # # The default root certificate generation policy. # [ req ] default_bits = 2048 default_keyfile = /root/myCA/private/cakey.pem default_md = sha1 # prompt = no distinguished_name = root_ca_distinguished_name x509_extensions = root_ca_extensions # # # Root Certificate Authority distinguished name. Change these fields to match # your local environment! # [ root_ca_distinguished_name ] commonName = Kritee Root Certificate Authority stateOrProvinceName = KA countryName = IN emailAddress = kjhawar at example.com organizationName = abc organizationalUnitName = zyx # [ root_ca_extensions ] authorityKeyIdentifier = keyid,issuer basicConstraints = critical, CA:true keyUsage = critical, Digital Signature, Non Repudiation, Certificate Sign, CRL Sign subjectKeyIdentifier = hash # From dgnatowski at yahoo.com Sun Nov 2 17:09:33 2014 From: dgnatowski at yahoo.com (Dennis Gnatowski) Date: Sun, 2 Nov 2014 09:09:33 -0800 Subject: [Pki-users] CA integration and installation with HSM Message-ID: <1414948173.14074.YahooMailNeo@web161505.mail.bf1.yahoo.com> What are the steps to integrate DogTag (Root) CA with an HSM? Does this have to occur during installation? I've successfully performed a general installation with CA keys in software. I was then able to modify secmod.db to add the HSM library and restart the system. I can both use command line utilities (certutil) and GUI (pkiconsole) to create keys on the HSM. Re-keying the caSigning certificate works but the CA certificate is issued (issuer) by the original software-based issuer (therefore NOT a self-signed CA cert!). So I assume this has to be done during initial installation (custom install). But, how do I get the HSM PKCS#11 library added/included with the custom install? ----------------------------------------------------------- Dennis Gnatowski dgnatowski at yahoo.com -------------- next part -------------- An HTML attachment was scrubbed... URL: From msauton at redhat.com Mon Nov 3 20:10:25 2014 From: msauton at redhat.com (Marc Sauton) Date: Mon, 03 Nov 2014 12:10:25 -0800 Subject: [Pki-users] CA integration and installation with HSM In-Reply-To: <1414948173.14074.YahooMailNeo@web161505.mail.bf1.yahoo.com> References: <1414948173.14074.YahooMailNeo@web161505.mail.bf1.yahoo.com> Message-ID: <5457E131.2060407@redhat.com> On 11/02/2014 09:09 AM, Dennis Gnatowski wrote: > What are the steps to integrate DogTag (Root) CA with an HSM? Does > this have to occur during installation? > > I've successfully performed a general installation with CA keys in > software. I was then able to modify secmod.db to add the HSM library > and restart the system. I can both use command line utilities > (certutil) and GUI (pkiconsole) to create keys on the HSM. Re-keying > the caSigning certificate works but the CA certificate is issued > (issuer) by the original software-based issuer (therefore NOT a > self-signed CA cert!). So I assume this has to be done during initial > installation (custom install). But, how do I get the HSM PKCS#11 > library added/included with the custom install? > ----------------------------------------------------------- > Dennis Gnatowski > dgnatowski at yahoo.com > > > _______________________________________________ > Pki-users mailing list > Pki-users at redhat.com > https://www.redhat.com/mailman/listinfo/pki-users Adding the PKCS #11 module to secmod.db should happen after the pkicreate and just before running the silent install or the web based configuration wizard. In Dogtag 10, when using pkispawn, you can split the install and config steps in two using the flags pki_skip_configuration and pki_skip_installation. M. -------------- next part -------------- An HTML attachment was scrubbed... URL: From dgnatowski at yahoo.com Wed Nov 5 22:28:59 2014 From: dgnatowski at yahoo.com (Dennis Gnatowski) Date: Wed, 5 Nov 2014 14:28:59 -0800 Subject: [Pki-users] CA integration and installation with HSM In-Reply-To: <5457E131.2060407@redhat.com> References: <1414948173.14074.YahooMailNeo@web161505.mail.bf1.yahoo.com> <5457E131.2060407@redhat.com> Message-ID: <1415226539.99472.YahooMailNeo@web161505.mail.bf1.yahoo.com> I'm using Dogtag 10.1.1 with SafeNet Luna SA HSM. I changed the flags in the default.cfg file, performed the install, then added the PKCS#11 library to secmod. However, either using the Wizard to do the configuration or modifying the default.cfg file again and using pkispawn failed to get CA keys generated on the HSM. Wizard doesn't see the SafeNet library (does it have to be in a specific directory?) and pkispawn throws an error "pkispawn : ERROR ....... KeyError: 'pki_uid'!" I noticed this was reported in ticket #905. ----------------------------------------------------------- Dennis Gnatowski dgnatowski at yahoo.com ________________________________ From: Marc Sauton To: Dennis Gnatowski ; "pki-users at redhat.com" Sent: Monday, November 3, 2014 3:10 PM Subject: Re: [Pki-users] CA integration and installation with HSM On 11/02/2014 09:09 AM, Dennis Gnatowski wrote: What are the steps to integrate DogTag (Root) CA with an HSM? Does this have to occur during installation? > > >I've successfully performed a general installation with CA keys in software. I was then able to modify secmod.db to add the HSM library and restart the system. I can both use command line utilities (certutil) and GUI (pkiconsole) to create keys on the HSM. Re-keying the caSigning certificate works but the CA certificate is issued (issuer) by the original software-based issuer (therefore NOT a self-signed CA cert!). So I assume this has to be done during initial installation (custom install). But, how do I get the HSM PKCS#11 library added/included with the custom install? > >----------------------------------------------------------- >Dennis Gnatowski >dgnatowski at yahoo.com > > >_______________________________________________ Pki-users mailing list Pki-users at redhat.com https://www.redhat.com/mailman/listinfo/pki-users Adding the PKCS #11 module to secmod.db should happen after the pkicreate and just before running the silent install or the web based configuration wizard. In Dogtag 10, when using pkispawn, you can split the install and config steps in two using the flags pki_skip_configuration and pki_skip_installation. M. -------------- next part -------------- An HTML attachment was scrubbed... URL: From cfu at redhat.com Thu Nov 6 02:10:39 2014 From: cfu at redhat.com (Christina Fu) Date: Wed, 05 Nov 2014 18:10:39 -0800 Subject: [Pki-users] CA integration and installation with HSM In-Reply-To: <1415226539.99472.YahooMailNeo@web161505.mail.bf1.yahoo.com> References: <1414948173.14074.YahooMailNeo@web161505.mail.bf1.yahoo.com> <5457E131.2060407@redhat.com> <1415226539.99472.YahooMailNeo@web161505.mail.bf1.yahoo.com> Message-ID: <545AD89F.2060708@redhat.com> You might want to check the basics first. If you cd into your /alias and perform modutil -dbdir . -list What do you see? If you don't see the module, that means your HSM has not been loaded correctly. If loaded correctly you should see info on the library name, slots and status: loaded. The library doesn't have to be in a specific location, but when you use modutil to add you need to specify the libfile so it knows where to go. Normally it is at /usr/lunasa/lib/ though. I'll let someone who has knowledge about the pkispawn issue to answer the rest of the question. Until then, you can try the above just to see if your hsm has been loaded correctly. Christina On 11/05/2014 02:28 PM, Dennis Gnatowski wrote: > I'm using Dogtag 10.1.1 with SafeNet Luna SA HSM. I changed the flags > in the default.cfg file, performed the install, then added the PKCS#11 > library to secmod. However, either using the Wizard to do the > configuration or modifying the default.cfg file again and using > pkispawn failed to get CA keys generated on the HSM. Wizard doesn't > see the SafeNet library (does it have to be in a specific directory?) > and pkispawn throws an error "pkispawn : ERROR ....... KeyError: > 'pki_uid'!" I noticed this was reported in ticket #905. > ----------------------------------------------------------- > Dennis Gnatowski > dgnatowski at yahoo.com > > ------------------------------------------------------------------------ > *From:* Marc Sauton > *To:* Dennis Gnatowski ; "pki-users at redhat.com" > > *Sent:* Monday, November 3, 2014 3:10 PM > *Subject:* Re: [Pki-users] CA integration and installation with HSM > > On 11/02/2014 09:09 AM, Dennis Gnatowski wrote: >> What are the steps to integrate DogTag (Root) CA with an HSM? Does >> this have to occur during installation? >> >> I've successfully performed a general installation with CA keys in >> software. I was then able to modify secmod.db to add the HSM library >> and restart the system. I can both use command line utilities >> (certutil) and GUI (pkiconsole) to create keys on the HSM. Re-keying >> the caSigning certificate works but the CA certificate is issued >> (issuer) by the original software-based issuer (therefore NOT a >> self-signed CA cert!). So I assume this has to be done during >> initial installation (custom install). But, how do I get the HSM >> PKCS#11 library added/included with the custom install? >> ----------------------------------------------------------- >> Dennis Gnatowski >> dgnatowski at yahoo.com >> >> >> _______________________________________________ >> Pki-users mailing list >> Pki-users at redhat.com >> https://www.redhat.com/mailman/listinfo/pki-users > Adding the PKCS #11 module to secmod.db should happen after the > pkicreate and just before running the silent install or the web based > configuration wizard. > In Dogtag 10, when using pkispawn, you can split the install and > config steps in two using the flags pki_skip_configuration and > pki_skip_installation. > M. > > > > > _______________________________________________ > Pki-users mailing list > Pki-users at redhat.com > https://www.redhat.com/mailman/listinfo/pki-users -------------- next part -------------- An HTML attachment was scrubbed... URL: From cfu at redhat.com Thu Nov 6 02:31:17 2014 From: cfu at redhat.com (Christina Fu) Date: Wed, 05 Nov 2014 18:31:17 -0800 Subject: [Pki-users] Can OpensSSL be used as external CA ? In-Reply-To: References: <544E6FAB.1020003@redhat.com> <544FF41B.3010705@redhat.com> <5453C1A5.5090206@redhat.com> Message-ID: <545ADD75.2000508@redhat.com> Hi Kritee, I think we could use a bit more info. Could you try running pkispawn with script... something like the following: script -c 'pkispawn -s CA -f config-step2.txt -vvv' the resulting typescript file might give us some more clue. Christina On 10/31/2014 09:24 PM, kritee jhawar wrote: > Thanks Christina > > I checked out the master branch and built it. Now i can see the added > extensions in the CSR generated, however i am getting the same error > as earlier. > This time again, I tried the supply the certificate chain with and > without the headers. The chain is in a valid pkcs7 format. > Following is how the extensions look in the certificate signed by > openssl for dogtag: > > X509v3 extensions: > X509v3 Basic Constraints: critical > CA:TRUE > X509v3 Key Usage: critical > Digital Signature, Non Repudiation, Certificate Sign, > CRL Sign > 1.3.6.1.4.1.311.20.2: > . > .S.u.b.C.A > > The error i get in step 2 of pkispawn is as follows: > > pkispawn : INFO ....... BtoA > /root/.dogtag/pki-tomcat/ca/alias/admin_pkcs10.bin > /root/.dogtag/pki-tomcat/ca/alias/admin_pkcs10.bin.asc > pkispawn : INFO ....... loading external CA signing certificate > from file: '/home/kjhawar/dogtag/dg_ca.cert' > pkispawn : INFO ....... loading external CA signing certificate > chain from file: '/home/kjhawar/dogtag/dg_chain.cert' > pkispawn : INFO ....... configuring PKI configuration data. > pkispawn : INFO ....... AtoB > /root/.dogtag/pki-tomcat/ca_admin.cert > /root/.dogtag/pki-tomcat/ca_admin.cert.der > pkispawn : INFO ....... certutil -A -d > /root/.dogtag/pki-tomcat/ca/alias -n PKI Administrator -t u,u,u -i > /root/.dogtag/pki-tomcat/ca_admin.cert.der -f > /root/.dogtag/pki-tomcat/ca/password.conf > Notice: Trust flag u is set automatically if the private key is present. > pkispawn : INFO ....... pk12util -d > /root/.dogtag/pki-tomcat/ca/alias -o > /root/.dogtag/pki-tomcat/ca_admin_cert.p12 -n PKI Administrator -w > /root/.dogtag/pki-tomcat/ca/pkcs12_password.conf -k > /root/.dogtag/pki-tomcat/ca/password.conf > pkispawn : INFO ... finalizing > 'pki.server.deployment.scriptlets.finalization' > pkispawn : INFO ....... cp -p > /etc/sysconfig/pki/tomcat/pki-tomcat/ca/deployment.cfg > /var/log/pki/pki-tomcat/ca/archive/spawn_deployment.cfg.20141101020655 > pkispawn : INFO ....... generating manifest file called > '/etc/sysconfig/pki/tomcat/pki-tomcat/ca/manifest' > pkispawn : INFO ....... cp -p > /etc/sysconfig/pki/tomcat/pki-tomcat/ca/manifest > /var/log/pki/pki-tomcat/ca/archive/spawn_manifest.20141101020655 > pkispawn : INFO ....... executing 'systemctl daemon-reload' > pkispawn : INFO ....... executing 'systemctl restart > pki-tomcatd at pki-tomcat.service' > Job for pki-tomcatd at pki-tomcat.service canceled. > pkispawn : ERROR ....... subprocess.CalledProcessError: Command > '['systemctl', 'restart', 'pki-tomcatd at pki-tomcat.service']' returned > non-zero exit status 1! > > Installation failed. > > Kindly let me know if any specific configuration has to be done in my > openssl CA. Attaching the config file i am using currently > > Thanks > Kritee > > On Fri, Oct 31, 2014 at 10:36 PM, Christina Fu > wrote: > > Kritee, > > At the minimum, you need the fixes I talked about. They were > checked into the master but has not been built officially so yum > is not going to get you the right rpm. However, you can check it > out and build it yourself. > Here is how you check out the master: > > git clone git://git.fedorahosted.org/git/pki.git > > You can then use the build scripts to build. > > Finally, I apologize that we are not supposed to respond to > private emails. Dogtag is a community where we share our > knowledge. In the future please send requests to the mailing list. > I took the exception this time to look at your CSR and certs and I > could see that you need the fixes I talked about. I don't know if > you have other issues though, but AFAIK you need those two fixes. > > Hope this helps. > Christina > > > On 10/29/2014 01:16 AM, kritee jhawar wrote: >> Hi Christina >> >> I have done the default configuration for 389ds and haven't >> specifically turned on ssl for it. >> >> Initially I tried using Microsoft and OpenSSL CA as external CAs. >> This is about a month back and I pull the Rpms using yum (so I >> assume they are the latest ones with the fix you mentioned). >> With this, my pki spawn went fine. Infect the admin cert got >> generated using the externally provided root cert as well. But >> dogtag couldn't connect to the ds. As mentioned earlier it gave >> me a PKIException error listing the certs with error code 500. >> Looking at the ds logs I found that the error was 'bad search >> filter'. >> However when I tried the same steps with dogtag as external CA >> the setup went through without a glitch. The chain I imported was >> directly from the GUI of dogtag. In fact I included the header >> and footer as well. >> >> When I tried to reverse engineer the chain, I took the root cert >> of external dogtag ca and used OpenSSL to convert it into pkcs7. >> This chain was not the same as provided from the GUI. Hence I >> thought that there is some particular format for the chain >> because of which the other CAs aren't working. >> >> Also, I updated the Rpms using yum and tried to generate the CSR >> with the extra attributes. My csr still doesn't reflect those >> added attributes. >> >> Is yum not the correct way to get the latest code ? >> >> I am very new to this, really appreciate your assistance and time. >> >> Regards >> Kritee >> >> On Wednesday, 29 October 2014, Christina Fu > > wrote: >> >> the cert chain you provide in the file specified under >> pki_external_ca_cert_chain_path >> should be just pkcs7 without header/footer. >> >> I don't know why it would not talk to the DS (did you turn on >> ssl for the ds?). >> Not sure if you build your Dogtag from the master, if you do, >> I'd suggest you get the most updated so you get fixes from >> the tickets I provided previously which would address at >> least two issues relating to external CA. >> >> Christina >> >> On 10/27/2014 07:55 PM, kritee jhawar wrote: >>> Hi Christina >>> >>> I was undertaking this activity last month where Microsoft >>> CA didn't work out but Dogtag as external CA did. >>> >>> While using Microsoft CA or OpenSSL CA, pki spawn goes >>> through without any error but dogtag stops communications to >>> 389ds. Upon calling the rest Api /ca/rest/certs I get a >>> "PKIException error listing the certs". >>> >>> Is there a particular format for the ca cert chain that we >>> need to provide ? I was trying to reverse engineer the chain >>> provided by dogtag. >>> >>> Thanks >>> Kritee >>> >>> >>> >>> On Monday, 27 October 2014, Christina Fu wrote: >>> >>> If you meant the following two: >>> https://fedorahosted.org/pki/ticket/1190 CA: issuer DN >>> encoding not preserved at issuance with signing cert >>> signed by an external CA >>> https://fedorahosted.org/pki/ticket/1110 - pkispawn >>> (configuration) does not provide CA extensions in >>> subordinate certificate signing requests (CSR) >>> >>> They have just recently been fixed upstream so I imagine >>> you could use Microsoft CA now. Theoretically any other >>> CA can be used as an external CA, but if you run into >>> issues, please feel free to report. >>> >>> Christina >>> >>> >>> On 10/27/2014 12:15 AM, kritee jhawar wrote: >>>> Hi >>>> >>>> In my recent thread i read that there is a bug due to >>>> which Microsoft CA can't work as external CA for dogtag. >>>> Can OpenSSL be used ? >>>> >>>> Thanks >>>> Kritee >>>> >>>> >>>> _______________________________________________ >>>> Pki-users mailing list >>>> Pki-users at redhat.com >>>> https://www.redhat.com/mailman/listinfo/pki-users >>> >> > > > _______________________________________________ > Pki-users mailing list > Pki-users at redhat.com > https://www.redhat.com/mailman/listinfo/pki-users > > -------------- next part -------------- An HTML attachment was scrubbed... URL: From kriteejhawar at gmail.com Thu Nov 6 09:25:54 2014 From: kriteejhawar at gmail.com (kritee jhawar) Date: Thu, 6 Nov 2014 14:55:54 +0530 Subject: [Pki-users] Can OpensSSL be used as external CA ? In-Reply-To: <545ADD75.2000508@redhat.com> References: <544E6FAB.1020003@redhat.com> <544FF41B.3010705@redhat.com> <5453C1A5.5090206@redhat.com> <545ADD75.2000508@redhat.com> Message-ID: Hi Christina Thanks for the response. PFA the typescript for pkispawn step1 and pkispawn step2. Thanks, Kritee On Thu, Nov 6, 2014 at 8:01 AM, Christina Fu wrote: > Hi Kritee, > I think we could use a bit more info. > Could you try running pkispawn with script... something like the following: > script -c 'pkispawn -s CA -f config-step2.txt -vvv' > > the resulting typescript file might give us some more clue. > Christina > > > On 10/31/2014 09:24 PM, kritee jhawar wrote: > > Thanks Christina > > I checked out the master branch and built it. Now i can see the added > extensions in the CSR generated, however i am getting the same error as > earlier. > This time again, I tried the supply the certificate chain with and > without the headers. The chain is in a valid pkcs7 format. > Following is how the extensions look in the certificate signed by openssl > for dogtag: > > X509v3 extensions: > X509v3 Basic Constraints: critical > CA:TRUE > X509v3 Key Usage: critical > Digital Signature, Non Repudiation, Certificate Sign, CRL > Sign > 1.3.6.1.4.1.311.20.2: > . > .S.u.b.C.A > > The error i get in step 2 of pkispawn is as follows: > > pkispawn : INFO ....... BtoA > /root/.dogtag/pki-tomcat/ca/alias/admin_pkcs10.bin > /root/.dogtag/pki-tomcat/ca/alias/admin_pkcs10.bin.asc > pkispawn : INFO ....... loading external CA signing certificate > from file: '/home/kjhawar/dogtag/dg_ca.cert' > pkispawn : INFO ....... loading external CA signing certificate > chain from file: '/home/kjhawar/dogtag/dg_chain.cert' > pkispawn : INFO ....... configuring PKI configuration data. > pkispawn : INFO ....... AtoB /root/.dogtag/pki-tomcat/ca_admin.cert > /root/.dogtag/pki-tomcat/ca_admin.cert.der > pkispawn : INFO ....... certutil -A -d > /root/.dogtag/pki-tomcat/ca/alias -n PKI Administrator -t u,u,u -i > /root/.dogtag/pki-tomcat/ca_admin.cert.der -f > /root/.dogtag/pki-tomcat/ca/password.conf > Notice: Trust flag u is set automatically if the private key is present. > pkispawn : INFO ....... pk12util -d > /root/.dogtag/pki-tomcat/ca/alias -o > /root/.dogtag/pki-tomcat/ca_admin_cert.p12 -n PKI Administrator -w > /root/.dogtag/pki-tomcat/ca/pkcs12_password.conf -k > /root/.dogtag/pki-tomcat/ca/password.conf > pkispawn : INFO ... finalizing > 'pki.server.deployment.scriptlets.finalization' > pkispawn : INFO ....... cp -p > /etc/sysconfig/pki/tomcat/pki-tomcat/ca/deployment.cfg > /var/log/pki/pki-tomcat/ca/archive/spawn_deployment.cfg.20141101020655 > pkispawn : INFO ....... generating manifest file called > '/etc/sysconfig/pki/tomcat/pki-tomcat/ca/manifest' > pkispawn : INFO ....... cp -p > /etc/sysconfig/pki/tomcat/pki-tomcat/ca/manifest > /var/log/pki/pki-tomcat/ca/archive/spawn_manifest.20141101020655 > pkispawn : INFO ....... executing 'systemctl daemon-reload' > pkispawn : INFO ....... executing 'systemctl restart > pki-tomcatd at pki-tomcat.service' > Job for pki-tomcatd at pki-tomcat.service canceled. > pkispawn : ERROR ....... subprocess.CalledProcessError: Command > '['systemctl', 'restart', 'pki-tomcatd at pki-tomcat.service']' returned > non-zero exit status 1! > > Installation failed. > > Kindly let me know if any specific configuration has to be done in my > openssl CA. Attaching the config file i am using currently > > Thanks > Kritee > > On Fri, Oct 31, 2014 at 10:36 PM, Christina Fu wrote: > >> Kritee, >> >> At the minimum, you need the fixes I talked about. They were checked into >> the master but has not been built officially so yum is not going to get you >> the right rpm. However, you can check it out and build it yourself. >> Here is how you check out the master: >> >> git clone git://git.fedorahosted.org/git/pki.git >> >> You can then use the build scripts to build. >> >> Finally, I apologize that we are not supposed to respond to private >> emails. Dogtag is a community where we share our knowledge. In the future >> please send requests to the mailing list. >> I took the exception this time to look at your CSR and certs and I could >> see that you need the fixes I talked about. I don't know if you have other >> issues though, but AFAIK you need those two fixes. >> >> Hope this helps. >> Christina >> >> >> On 10/29/2014 01:16 AM, kritee jhawar wrote: >> >> Hi Christina >> >> I have done the default configuration for 389ds and haven't >> specifically turned on ssl for it. >> >> Initially I tried using Microsoft and OpenSSL CA as external CAs. This >> is about a month back and I pull the Rpms using yum (so I assume they are >> the latest ones with the fix you mentioned). >> With this, my pki spawn went fine. Infect the admin cert got generated >> using the externally provided root cert as well. But dogtag couldn't >> connect to the ds. As mentioned earlier it gave me a PKIException error >> listing the certs with error code 500. >> Looking at the ds logs I found that the error was 'bad search filter'. >> However when I tried the same steps with dogtag as external CA the setup >> went through without a glitch. The chain I imported was directly from the >> GUI of dogtag. In fact I included the header and footer as well. >> >> When I tried to reverse engineer the chain, I took the root cert of >> external dogtag ca and used OpenSSL to convert it into pkcs7. This chain >> was not the same as provided from the GUI. Hence I thought that there is >> some particular format for the chain because of which the other CAs aren't >> working. >> >> Also, I updated the Rpms using yum and tried to generate the CSR with >> the extra attributes. My csr still doesn't reflect those added attributes. >> >> Is yum not the correct way to get the latest code ? >> >> I am very new to this, really appreciate your assistance and time. >> >> Regards >> Kritee >> >> On Wednesday, 29 October 2014, Christina Fu wrote: >> >>> the cert chain you provide in the file specified under >>> pki_external_ca_cert_chain_path >>> should be just pkcs7 without header/footer. >>> >>> I don't know why it would not talk to the DS (did you turn on ssl for >>> the ds?). >>> Not sure if you build your Dogtag from the master, if you do, I'd >>> suggest you get the most updated so you get fixes from the tickets I >>> provided previously which would address at least two issues relating to >>> external CA. >>> >>> Christina >>> >>> On 10/27/2014 07:55 PM, kritee jhawar wrote: >>> >>> Hi Christina >>> >>> I was undertaking this activity last month where Microsoft CA didn't >>> work out but Dogtag as external CA did. >>> >>> While using Microsoft CA or OpenSSL CA, pki spawn goes through >>> without any error but dogtag stops communications to 389ds. Upon calling >>> the rest Api /ca/rest/certs I get a "PKIException error listing the certs". >>> >>> Is there a particular format for the ca cert chain that we need to >>> provide ? I was trying to reverse engineer the chain provided by dogtag. >>> >>> Thanks >>> Kritee >>> >>> >>> >>> On Monday, 27 October 2014, Christina Fu wrote: >>> >>>> If you meant the following two: >>>> https://fedorahosted.org/pki/ticket/1190 CA: issuer DN encoding not >>>> preserved at issuance with signing cert signed by an external CA >>>> https://fedorahosted.org/pki/ticket/1110 - pkispawn (configuration) >>>> does not provide CA extensions in subordinate certificate signing requests >>>> (CSR) >>>> >>>> They have just recently been fixed upstream so I imagine you could use >>>> Microsoft CA now. Theoretically any other CA can be used as an external >>>> CA, but if you run into issues, please feel free to report. >>>> >>>> Christina >>>> >>>> >>>> On 10/27/2014 12:15 AM, kritee jhawar wrote: >>>> >>>> Hi >>>> >>>> In my recent thread i read that there is a bug due to which Microsoft >>>> CA can't work as external CA for dogtag. >>>> Can OpenSSL be used ? >>>> >>>> Thanks >>>> Kritee >>>> >>>> >>>> _______________________________________________ >>>> Pki-users mailing listPki-users at redhat.comhttps://www.redhat.com/mailman/listinfo/pki-users >>>> >>>> >>>> >>> >> >> _______________________________________________ >> Pki-users mailing list >> Pki-users at redhat.com >> https://www.redhat.com/mailman/listinfo/pki-users >> > > > -------------- next part -------------- An HTML attachment was scrubbed... URL: -------------- next part -------------- Script started on Thursday 06 November 2014 06:57:59 AM IST Loading deployment configuration from d1.cfg. pkispawn : DEBUG ===================================================== DISPLAY CONTENTS OF PKI SLOTS DICTIONARY ===================================================== pkispawn : DEBUG { 'INSTALL_TIME_SLOT': '[INSTALL_TIME]', 'PKI_ADMIN_SECURE_PORT_CONNECTOR_NAME_SLOT': '[PKI_ADMIN_SECURE_PORT_CONNECTOR_NAME]', 'PKI_ADMIN_SECURE_PORT_SERVER_COMMENT_SLOT': '[PKI_ADMIN_SECURE_PORT_SERVER_COMMENT]', 'PKI_ADMIN_SECURE_PORT_SLOT': '[PKI_ADMIN_SECURE_PORT]', 'PKI_AGENT_CLIENTAUTH_SLOT': '[PKI_AGENT_CLIENTAUTH]', 'PKI_AGENT_SECURE_PORT_SLOT': '[PKI_AGENT_SECURE_PORT]', 'PKI_AJP_PORT_SLOT': '[PKI_AJP_PORT]', 'PKI_AJP_REDIRECT_PORT_SLOT': '[PKI_AJP_REDIRECT_PORT]', 'PKI_CA_HOSTNAME_SLOT': '[PKI_CA_HOSTNAME]', 'PKI_CA_PORT_SLOT': '[PKI_CA_PORT]', 'PKI_CERT_DB_PASSWORD_SLOT': '[PKI_CERT_DB_PASSWORD]', 'PKI_CFG_PATH_NAME_SLOT': '[PKI_CFG_PATH_NAME]', 'PKI_CLOSE_AJP_PORT_COMMENT_SLOT': '[PKI_CLOSE_AJP_PORT_COMMENT]', 'PKI_CLOSE_ENABLE_PROXY_COMMENT_SLOT': '[PKI_CLOSE_ENABLE_PROXY_COMMENT]', 'PKI_CLOSE_SEPARATE_PORTS_SERVER_COMMENT_SLOT': '[PKI_CLOSE_SEPARATE_PORTS_SERVER_COMMENT]', 'PKI_CLOSE_SEPARATE_PORTS_WEB_COMMENT_SLOT': '[PKI_CLOSE_SEPARATE_PORTS_WEB_COMMENT]', 'PKI_CLOSE_STANDALONE_COMMENT_SLOT': '[PKI_CLOSE_STANDALONE_COMMENT]', 'PKI_CLOSE_TOMCAT_ACCESS_LOG_COMMENT_SLOT': '[PKI_CLOSE_TOMCAT_ACCESS_LOG_COMMENT]', 'PKI_EE_SECURE_CLIENT_AUTH_PORT_CONNECTOR_NAME_SLOT': '[PKI_EE_SECURE_CLIENT_AUTH_PORT_CONNECTOR_NAME]', 'PKI_EE_SECURE_CLIENT_AUTH_PORT_SERVER_COMMENT_SLOT': '[PKI_EE_SECURE_CLIENT_AUTH_PORT_SERVER_COMMENT]', 'PKI_EE_SECURE_CLIENT_AUTH_PORT_SLOT': '[PKI_EE_SECURE_CLIENT_AUTH_PORT]', 'PKI_EE_SECURE_CLIENT_AUTH_PORT_UI_SLOT': '[PKI_EE_SECURE_CLIENT_AUTH_PORT_UI]', 'PKI_EE_SECURE_PORT_CONNECTOR_NAME_SLOT': '[PKI_EE_SECURE_PORT_CONNECTOR_NAME]', 'PKI_EE_SECURE_PORT_SERVER_COMMENT_SLOT': '[PKI_EE_SECURE_PORT_SERVER_COMMENT]', 'PKI_EE_SECURE_PORT_SLOT': '[PKI_EE_SECURE_PORT]', 'PKI_ENABLE_RANDOM_SERIAL_NUMBERS': '[PKI_ENABLE_RANDOM_SERIAL_NUMBERS]', 'PKI_GROUP_SLOT': '[PKI_GROUP]', 'PKI_HOSTNAME_SLOT': '[PKI_HOSTNAME]', 'PKI_INSTANCE_INITSCRIPT_SLOT': '[PKI_INSTANCE_INITSCRIPT]', 'PKI_INSTANCE_NAME_SLOT': '[PKI_INSTANCE_NAME]', 'PKI_INSTANCE_PATH_SLOT': '[PKI_INSTANCE_PATH]', 'PKI_INSTANCE_ROOT_SLOT': '[PKI_INSTANCE_ROOT]', 'PKI_LOCKDIR_SLOT': '[PKI_LOCKDIR]', 'PKI_OPEN_AJP_PORT_COMMENT_SLOT': '[PKI_OPEN_AJP_PORT_COMMENT]', 'PKI_OPEN_ENABLE_PROXY_COMMENT_SLOT': '[PKI_OPEN_ENABLE_PROXY_COMMENT]', 'PKI_OPEN_SEPARATE_PORTS_SERVER_COMMENT_SLOT': '[PKI_OPEN_SEPARATE_PORTS_SERVER_COMMENT]', 'PKI_OPEN_SEPARATE_PORTS_WEB_COMMENT_SLOT': '[PKI_OPEN_SEPARATE_PORTS_WEB_COMMENT]', 'PKI_OPEN_STANDALONE_COMMENT_SLOT': '[PKI_OPEN_STANDALONE_COMMENT]', 'PKI_OPEN_TOMCAT_ACCESS_LOG_COMMENT_SLOT': '[PKI_OPEN_TOMCAT_ACCESS_LOG_COMMENT]', 'PKI_PIDDIR_SLOT': '[PKI_PIDDIR]', 'PKI_PROXY_SECURE_PORT_SLOT': '[PKI_PROXY_SECURE_PORT]', 'PKI_PROXY_UNSECURE_PORT_SLOT': '[PKI_PROXY_UNSECURE_PORT]', 'PKI_RANDOM_NUMBER_SLOT': '[PKI_RANDOM_NUMBER]', 'PKI_REGISTRY_FILE_SLOT': '[PKI_REGISTRY_FILE]', 'PKI_RESTEASY_LIB_SLOT': '[PKI_RESTEASY_LIB]', 'PKI_SECURE_PORT_CONNECTOR_NAME_SLOT': '[PKI_SECURE_PORT_CONNECTOR_NAME]', 'PKI_SECURE_PORT_SERVER_COMMENT_SLOT': '[PKI_SECURE_PORT_SERVER_COMMENT]', 'PKI_SECURE_PORT_SLOT': '[PKI_SECURE_PORT]', 'PKI_SECURITY_MANAGER_SLOT': '[PKI_SECURITY_MANAGER]', 'PKI_SERVER_XML_CONF_SLOT': '[PKI_SERVER_XML_CONF]', 'PKI_SSL_SERVER_NICKNAME_SLOT': '[PKI_SSL_SERVER_NICKNAME]', 'PKI_STANDALONE_SLOT': '[PKI_STANDALONE]', 'PKI_SUBSYSTEM_TYPE_SLOT': '[PKI_SUBSYSTEM_TYPE]', 'PKI_SYSTEMD_SERVICENAME_SLOT': '[PKI_SYSTEMD_SERVICENAME]', 'PKI_TMPDIR_SLOT': '[PKI_TMPDIR]', 'PKI_UNSECURE_PORT_CONNECTOR_NAME_SLOT': '[PKI_UNSECURE_PORT_CONNECTOR_NAME]', 'PKI_UNSECURE_PORT_SERVER_COMMENT_SLOT': '[PKI_UNSECURE_PORT_SERVER_COMMENT]', 'PKI_UNSECURE_PORT_SLOT': '[PKI_UNSECURE_PORT]', 'PKI_USER_SLOT': '[PKI_USER]', 'PKI_WEBAPPS_NAME_SLOT': '[PKI_WEBAPPS_NAME]', 'PKI_WEB_SERVER_TYPE_SLOT': '[PKI_WEB_SERVER_TYPE]', 'TOKENDB_HOST_SLOT': '[TOKENDB_HOST]', 'TOKENDB_PORT_SLOT': '{TOKENDB_PORT]', 'TOKENDB_ROOT_SLOT': '[TOKENDB_ROOT]', 'TOMCAT_CFG_SLOT': '[TOMCAT_CFG]', 'TOMCAT_INSTANCE_COMMON_LIB_SLOT': '[TOMCAT_INSTANCE_COMMON_LIB]', 'TOMCAT_LOG_DIR_SLOT': '[TOMCAT_LOG_DIR]', 'TOMCAT_PIDFILE_SLOT': '[TOMCAT_PIDFILE]', 'TOMCAT_SERVER_PORT_SLOT': '[TOMCAT_SERVER_PORT]', 'TOMCAT_SSL2_CIPHERS_SLOT': '[TOMCAT_SSL2_CIPHERS]', 'TOMCAT_SSL3_CIPHERS_SLOT': '[TOMCAT_SSL3_CIPHERS]', 'TOMCAT_SSL_OPTIONS_SLOT': '[TOMCAT_SSL_OPTIONS]', 'TOMCAT_TLS_CIPHERS_SLOT': '[TOMCAT_TLS_CIPHERS]', 'TPS_DIR_SLOT': '[TPS_DIR]', 'application_version': '[APPLICATION_VERSION]'} pkispawn : DEBUG ===================================================== DISPLAY CONTENTS OF PKI MASTER DICTIONARY ===================================================== pkispawn : DEBUG { 0: None, 'INSTALL_TIME_SLOT': 'Thu Nov 6 06:57:59 2014', 'PKI_ADMIN_SECURE_PORT_CONNECTOR_NAME_SLOT': 'Unused', 'PKI_ADMIN_SECURE_PORT_SERVER_COMMENT_SLOT': '', 'PKI_ADMIN_SECURE_PORT_SLOT': '9443', 'PKI_AGENT_CLIENTAUTH_SLOT': 'want', 'PKI_AGENT_SECURE_PORT_SLOT': '9443', 'PKI_AJP_PORT_SLOT': '9009', 'PKI_AJP_REDIRECT_PORT_SLOT': '9443', 'PKI_CA_HOSTNAME_SLOT': 'cibu-sec88.cisco.com', 'PKI_CA_PORT_SLOT': '8443', 'PKI_CERT_DB_PASSWORD_SLOT': 'ipcbu123', 'PKI_CFG_PATH_NAME_SLOT': '/etc/pki/pki-tomcat/ca/CS.cfg', 'PKI_CLOSE_AJP_PORT_COMMENT_SLOT': '-->', 'PKI_CLOSE_ENABLE_PROXY_COMMENT_SLOT': '-->', 'PKI_CLOSE_SEPARATE_PORTS_SERVER_COMMENT_SLOT': '-->', 'PKI_CLOSE_SEPARATE_PORTS_WEB_COMMENT_SLOT': '-->', 'PKI_CLOSE_STANDALONE_COMMENT_SLOT': '-->', 'PKI_CLOSE_TOMCAT_ACCESS_LOG_COMMENT_SLOT': '', 'PKI_EE_SECURE_CLIENT_AUTH_PORT_CONNECTOR_NAME_SLOT': 'Unused', 'PKI_EE_SECURE_CLIENT_AUTH_PORT_SERVER_COMMENT_SLOT': '', 'PKI_EE_SECURE_CLIENT_AUTH_PORT_SLOT': '9443', 'PKI_EE_SECURE_CLIENT_AUTH_PORT_UI_SLOT': '9443', 'PKI_EE_SECURE_PORT_CONNECTOR_NAME_SLOT': 'Unused', 'PKI_EE_SECURE_PORT_SERVER_COMMENT_SLOT': '', 'PKI_EE_SECURE_PORT_SLOT': '9443', 'PKI_ENABLE_RANDOM_SERIAL_NUMBERS': 'false', 'PKI_GROUP_SLOT': 'pkiuser', 'PKI_HOSTNAME_SLOT': 'cibu-sec88.cisco.com', 'PKI_INSTANCE_INITSCRIPT_SLOT': '/var/lib/pki/pki-tomcat/pki-tomcat', 'PKI_INSTANCE_NAME_SLOT': 'pki-tomcat', 'PKI_INSTANCE_PATH_SLOT': '/var/lib/pki/pki-tomcat', 'PKI_INSTANCE_ROOT_SLOT': '/var/lib/pki', 'PKI_LOCKDIR_SLOT': '/var/lock/pki/tomcat', 'PKI_OPEN_AJP_PORT_COMMENT_SLOT': '', 'PKI_SECURE_PORT_SLOT': '9443', 'PKI_SECURITY_MANAGER_SLOT': 'true', 'PKI_SERVER_XML_CONF_SLOT': '/etc/pki/pki-tomcat/server.xml', 'PKI_SSL_SERVER_NICKNAME_SLOT': 'Server-Cert cert-pki-tomcat', 'PKI_STANDALONE_SLOT': 'false', 'PKI_SUBSYSTEM_TYPE_SLOT': 'ca', 'PKI_SYSTEMD_SERVICENAME_SLOT': 'pki-tomcatd at pki-tomcat.service', 'PKI_TMPDIR_SLOT': '/var/lib/pki/pki-tomcat/temp', 'PKI_UNSECURE_PORT_CONNECTOR_NAME_SLOT': 'Unsecure', 'PKI_UNSECURE_PORT_SERVER_COMMENT_SLOT': '', 'PKI_UNSECURE_PORT_SLOT': '9080', 'PKI_USER_SLOT': 'pkiuser', 'PKI_WEBAPPS_NAME_SLOT': 'webapps', 'PKI_WEB_SERVER_TYPE_SLOT': 'tomcat', 'TOKENDB_HOST_SLOT': 'localhost.localdomain', 'TOKENDB_PORT_SLOT': '389', 'TOKENDB_ROOT_SLOT': 'o=pki-tomcat-CA', 'TOMCAT_CFG_SLOT': '/etc/pki/pki-tomcat/tomcat.conf', 'TOMCAT_INSTANCE_COMMON_LIB_SLOT': '/var/lib/pki/pki-tomcat/common/lib/*.jar', 'TOMCAT_LOG_DIR_SLOT': '/var/log/pki/pki-tomcat', 'TOMCAT_PIDFILE_SLOT': '/var/run/pki/tomcat/pki-tomcat.pid', 'TOMCAT_SERVER_PORT_SLOT': '9005', 'TOMCAT_SSL2_CIPHERS_SLOT': '-SSL2_RC4_128_WITH_MD5,-SSL2_RC4_128_EXPORT40_WITH_MD5,-SSL2_RC2_128_CBC_WITH_MD5,-SSL2_RC2_128_CBC_EXPORT40_WITH_MD5,-SSL2_DES_64_CBC_WITH_MD5,-SSL2_DES_192_EDE3_CBC_WITH_MD5', 'TOMCAT_SSL3_CIPHERS_SLOT': '-SSL3_FORTEZZA_DMS_WITH_NULL_SHA,-SSL3_FORTEZZA_DMS_WITH_RC4_128_SHA,+SSL3_RSA_WITH_RC4_128_SHA,-SSL3_RSA_EXPORT_WITH_RC4_40_MD5,+SSL3_RSA_WITH_3DES_EDE_CBC_SHA,-SSL3_RSA_WITH_DES_CBC_SHA,-SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5,-SSL3_FORTEZZA_DMS_WITH_FORTEZZA_CBC_SHA,-SSL_RSA_FIPS_WITH_DES_CBC_SHA,+SSL_RSA_FIPS_WITH_3DES_EDE_CBC_SHA,-SSL3_RSA_WITH_NULL_MD5,-TLS_RSA_EXPORT1024_WITH_RC4_56_SHA,-TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA,+TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA', 'TOMCAT_SSL_OPTIONS_SLOT': 'ssl2=true,ssl3=true,tls=true', 'TOMCAT_TLS_CIPHERS_SLOT': '-TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA,-TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA,+TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA,+TLS_ECDH_RSA_WITH_AES_128_CBC_SHA,+TLS_ECDH_RSA_WITH_AES_256_CBC_SHA,-TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA,+TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,+TLS_RSA_WITH_3DES_EDE_CBC_SHA,+TLS_RSA_WITH_AES_128_CBC_SHA,+TLS_RSA_WITH_AES_256_CBC_SHA,+TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA,+TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,-TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA,-TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,-TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,+TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA,+TLS_DHE_DSS_WITH_AES_128_CBC_SHA,+TLS_DHE_DSS_WITH_AES_256_CBC_SHA,+TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA,+TLS_DHE_RSA_WITH_AES_128_CBC_SHA,+TLS_DHE_RSA_WITH_AES_256_CBC_SHA', 'TPS_DIR_SLOT': '/usr/share/pki/ca', '__name__': 'PKI Master Dictionary', 'application_version': '10.2.1', 'destroy_scriplets': '\ninitialization\nconfiguration\nwebapp_deployment\nsubsystem_layout\nsecurity_databases\ninstance_layout\nselinux_setup\ninfrastructure_layout\nfinalization', 'home_dir': '/root', 'jni_jar_dir': '/usr/lib/java', 'pki_admin_cert_file': '/root/.dogtag/pki-tomcat/ca_admin.cert', 'pki_admin_cert_request_type': 'pkcs10', 'pki_admin_dualkey': 'False', 'pki_admin_email': 'caadmin at cisco.com', 'pki_admin_keysize': '2048', 'pki_admin_name': 'caadmin', 'pki_admin_nickname': 'PKI Administrator', 'pki_admin_password': 'XXXXXXXX', 'pki_admin_profile_id': 'caAdminCert', 'pki_admin_subject_dn': 'cn=PKI Administrator,o=cisco.com Security Domain', 'pki_admin_uid': 'caadmin', 'pki_ajp_port': '9009', 'pki_apache_commons_collections_jar': '/usr/share/java/apache-commons-collections.jar', 'pki_apache_commons_collections_jar_link': '/var/lib/pki/pki-tomcat/common/lib/apache-commons-collections.jar', 'pki_apache_commons_io_jar': '/usr/share/java/apache-commons-io.jar', 'pki_apache_commons_io_jar_link': '/var/lib/pki/pki-tomcat/common/lib/apache-commons-io.jar', 'pki_apache_commons_lang_jar': '/usr/share/java/apache-commons-lang.jar', 'pki_apache_commons_lang_jar_link': '/var/lib/pki/pki-tomcat/common/lib/apache-commons-lang.jar', 'pki_apache_commons_logging_jar': '/usr/share/java/apache-commons-logging.jar', 'pki_apache_commons_logging_jar_link': '/var/lib/pki/pki-tomcat/common/lib/apache-commons-logging.jar', 'pki_architecture': 64, 'pki_audit_group': 'pkiaudit', 'pki_audit_signing_key_algorithm': 'SHA256withRSA', 'pki_audit_signing_key_size': '2048', 'pki_audit_signing_key_type': 'rsa', 'pki_audit_signing_nickname': 'auditSigningCert cert-pki-tomcat CA', 'pki_audit_signing_signing_algorithm': 'SHA256withRSA', 'pki_audit_signing_subject_dn': 'cn=CA Audit Signing Certificate,o=cisco.com Security Domain', 'pki_audit_signing_tag': 'audit_signing', 'pki_audit_signing_token': 'Internal Key Storage Token', 'pki_backup_keys': 'False', 'pki_backup_password': 'XXXXXXXX', 'pki_ca_hostname': 'cibu-sec88.cisco.com', 'pki_ca_jar': '/usr/share/java/pki/pki-ca.jar', 'pki_ca_jar_link': '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib/pki-ca.jar', 'pki_ca_port': '8443', 'pki_ca_signing_key_algorithm': 'SHA256withRSA', 'pki_ca_signing_key_size': '2048', 'pki_ca_signing_key_type': 'rsa', 'pki_ca_signing_nickname': 'caSigningCert cert-pki-tomcat CA', 'pki_ca_signing_signing_algorithm': 'SHA256withRSA', 'pki_ca_signing_subject_dn': 'cn=rootDG.cisco.com,o=Cisco Systems,ou=CIBU,L=Bangalore', 'pki_ca_signing_tag': 'signing', 'pki_ca_signing_token': 'Internal Key Storage Token', 'pki_cert_database': '/etc/pki/pki-tomcat/alias/cert8.db', 'pki_certificate_timestamp': '2014-11-06 06:57:59', 'pki_certsrv_jar': '/usr/share/java/pki/pki-certsrv.jar', 'pki_certsrv_jar_link': '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib/pki-certsrv.jar', 'pki_cgroup_cpu_systemd_service': '/sys/fs/cgroup/cpu\\,cpuacct/system//lib/systemd/system/pki-tomcatd at .service//lib/systemd/system/pki-tomcatd at .service', 'pki_cgroup_cpu_systemd_service_path': '/sys/fs/cgroup/cpu\\,cpuacct/system//lib/systemd/system/pki-tomcatd at .service', 'pki_cgroup_systemd_service': '/sys/fs/cgroup/systemd/system//lib/systemd/system/pki-tomcatd at .service/pki-tomcat', 'pki_cgroup_systemd_service_path': '/sys/fs/cgroup/systemd/system//lib/systemd/system/pki-tomcatd at .service', 'pki_client_admin_cert': '/root/.dogtag/pki-tomcat/ca_admin.cert', 'pki_client_admin_cert_p12': '/root/.dogtag/pki-tomcat/ca_admin_cert.p12', 'pki_client_cert_database': '/root/.dogtag/pki-tomcat/ca/alias/cert8.db', 'pki_client_database_dir': '/root/.dogtag/pki-tomcat/ca/alias', 'pki_client_database_password': 'XXXXXXXX', 'pki_client_database_purge': 'True', 'pki_client_dir': '/root/.dogtag/pki-tomcat', 'pki_client_key_database': '/root/.dogtag/pki-tomcat/ca/alias/key3.db', 'pki_client_password_conf': '/root/.dogtag/pki-tomcat/ca/password.conf', 'pki_client_pin': 'XXXXXXXX', 'pki_client_pkcs12_password': 'XXXXXXXX', 'pki_client_pkcs12_password_conf': '/root/.dogtag/pki-tomcat/ca/pkcs12_password.conf', 'pki_client_secmod_database': '/root/.dogtag/pki-tomcat/ca/alias/secmod.db', 'pki_client_subsystem_dir': '/root/.dogtag/pki-tomcat/ca', 'pki_clone': 'False', 'pki_clone_pkcs12_password': 'XXXXXXXX', 'pki_clone_pkcs12_path': '', 'pki_clone_replicate_schema': 'True', 'pki_clone_replication_clone_port': '', 'pki_clone_replication_master_port': '', 'pki_clone_replication_security': 'None', 'pki_clone_setup_replication': 'True', 'pki_clone_uri': '', 'pki_cms': '/usr/share/java/pki/pki-cms.jar', 'pki_cms_jar_link': '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib/pki-cms.jar', 'pki_cmsbundle': '/usr/share/java/pki/pki-cmsbundle.jar', 'pki_cmsbundle_jar_link': '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib/pki-cmsbundle.jar', 'pki_cmscore': '/usr/share/java/pki/pki-cmscore.jar', 'pki_cmscore_jar_link': '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib/pki-cmscore.jar', 'pki_cmsutil': '/usr/share/java/pki/pki-cmsutil.jar', 'pki_cmsutil_jar_link': '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib/pki-cmsutil.jar', 'pki_commons_codec_jar': '/usr/share/java/commons-codec.jar', 'pki_commons_codec_jar_link': '/var/lib/pki/pki-tomcat/common/lib/apache-commons-codec.jar', 'pki_configuration_path': '/etc/pki', 'pki_database_path': '/etc/pki/pki-tomcat/alias', 'pki_default_deployment_cfg': '/etc/pki/default.cfg', 'pki_default_deployment_cfg_replica': '/etc/sysconfig/pki/tomcat/pki-tomcat/ca/default.cfg', 'pki_deployed_instance_name': None, 'pki_deployment_executable': 'pkispawn', 'pki_dns_domainname': 'cisco.com', 'pki_ds_base_dn': 'o=pki-tomcat-CA', 'pki_ds_bind_dn': 'cn=Directory Manager', 'pki_ds_create_new_db': 'True', 'pki_ds_database': 'pki-tomcat-CA', 'pki_ds_hostname': 'localhost.localdomain', 'pki_ds_ldap_port': '389', 'pki_ds_ldaps_port': '636', 'pki_ds_password': 'XXXXXXXX', 'pki_ds_remove_data': 'True', 'pki_ds_secure_connection': 'False', 'pki_enable_access_log': 'True', 'pki_enable_java_debugger': 'False', 'pki_enable_proxy': 'False', 'pki_external': 'True', 'pki_external_ca_cert_chain_path': '/etc/pki/pki-tomcat/external_ca_chain.cert', 'pki_external_ca_cert_path': '/etc/pki/pki-tomcat/external_ca.cert', 'pki_external_csr_path': '/home/kjhawar/dogtag/ca_signing.csr', 'pki_external_step_two': 'False', 'pki_group': 'pkiuser', 'pki_hostname': 'cibu-sec88.cisco.com', 'pki_http_port': '9080', 'pki_httpclient_jar': '/usr/share/java/httpcomponents/httpclient.jar', 'pki_httpclient_jar_link': '/var/lib/pki/pki-tomcat/common/lib/httpclient.jar', 'pki_httpcore_jar': '/usr/share/java/httpcomponents/httpcore.jar', 'pki_httpcore_jar_link': '/var/lib/pki/pki-tomcat/common/lib/httpcore.jar', 'pki_https_port': '9443', 'pki_import_admin_cert': 'False', 'pki_install_time': 'Thu Nov 6 06:57:59 2014', 'pki_instance_conf_link': '/var/lib/pki/pki-tomcat/conf', 'pki_instance_conf_log4j_properties': '/etc/pki/pki-tomcat/log4j.properties', 'pki_instance_configuration_path': '/etc/pki/pki-tomcat', 'pki_instance_database_link': '/var/lib/pki/pki-tomcat/alias', 'pki_instance_lib': '/var/lib/pki/pki-tomcat/lib', 'pki_instance_lib_log4j_properties': '/var/lib/pki/pki-tomcat/lib/log4j.properties', 'pki_instance_log_path': '/var/log/pki/pki-tomcat', 'pki_instance_logs_link': '/var/lib/pki/pki-tomcat/logs', 'pki_instance_name': 'pki-tomcat', 'pki_instance_path': '/var/lib/pki/pki-tomcat', 'pki_instance_registry_path': '/etc/sysconfig/pki/tomcat/pki-tomcat', 'pki_instance_systemd_link': '/var/lib/pki/pki-tomcat/pki-tomcat', 'pki_instance_type': 'Tomcat', 'pki_instance_type_registry_path': '/etc/sysconfig/pki/tomcat', 'pki_issuing_ca': 'External CA', 'pki_issuing_ca_hostname': 'cibu-sec88.cisco.com', 'pki_issuing_ca_https_port': '8443', 'pki_issuing_ca_uri': 'https://cibu-sec88.cisco.com:8443', 'pki_jackson_annotations_jar': '/usr/share/java/jackson-annotations.jar', 'pki_jackson_core_asl_jar': '/usr/share/java/jackson/jackson-core-asl.jar', 'pki_jackson_core_jar': '/usr/share/java/jackson-core.jar', 'pki_jackson_databind_jar': '/usr/share/java/jackson-databind.jar', 'pki_jackson_jaxrs_base_jar': '/usr/share/java/jackson-jaxrs-providers/jackson-jaxrs-base.jar', 'pki_jackson_jaxrs_jar': '/usr/share/java/jackson/jackson-jaxrs.jar', 'pki_jackson_jaxrs_json_provider_jar': '/usr/share/java/jackson-jaxrs-providers/jackson-jaxrs-json-provider.jar', 'pki_jackson_mapper_asl_jar': '/usr/share/java/jackson/jackson-mapper-asl.jar', 'pki_jackson_module_jaxb_annotations_jar': '/usr/share/java/jackson-module-jaxb-annotations.jar', 'pki_jackson_mrbean_jar': '/usr/share/java/jackson/jackson-mrbean.jar', 'pki_jackson_smile_jar': '/usr/share/java/jackson/jackson-smile.jar', 'pki_jackson_xc_jar': '/usr/share/java/jackson/jackson-xc.jar', 'pki_javassist_jar': '/usr/share/java/javassist.jar', 'pki_javassist_jar_link': '/var/lib/pki/pki-tomcat/common/lib/javassist.jar', 'pki_jss_jar': '/usr/lib/java/jss4.jar', 'pki_jss_jar_link': '/var/lib/pki/pki-tomcat/common/lib/jss4.jar', 'pki_key_database': '/etc/pki/pki-tomcat/alias/key3.db', 'pki_kra_jar': '/usr/share/java/pki/pki-kra.jar', 'pki_kra_jar_link': '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib/pki-kra.jar', 'pki_ldapjdk_jar': '/usr/share/java/ldapjdk.jar', 'pki_ldapjdk_jar_link': '/var/lib/pki/pki-tomcat/common/lib/ldapjdk.jar', 'pki_log_path': '/var/log/pki', 'pki_manifest': '/etc/sysconfig/pki/tomcat/pki-tomcat/ca/manifest', 'pki_manifest_spawn_archive': '/var/log/pki/pki-tomcat/ca/archive/spawn_manifest.20141106065759', 'pki_nsutil': '/usr/share/java/pki/pki-nsutil.jar', 'pki_nsutil_jar_link': '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib/pki-nsutil.jar', 'pki_ocsp_jar': '/usr/share/java/pki/pki-ocsp.jar', 'pki_ocsp_jar_link': '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib/pki-ocsp.jar', 'pki_ocsp_signing_key_algorithm': 'SHA256withRSA', 'pki_ocsp_signing_key_size': '2048', 'pki_ocsp_signing_key_type': 'rsa', 'pki_ocsp_signing_nickname': 'ocspSigningCert cert-pki-tomcat CA', 'pki_ocsp_signing_signing_algorithm': 'SHA256withRSA', 'pki_ocsp_signing_subject_dn': 'cn=CA OCSP Signing Certificate,o=cisco.com Security Domain', 'pki_ocsp_signing_tag': 'ocsp_signing', 'pki_ocsp_signing_token': 'Internal Key Storage Token', 'pki_one_time_pin': 'XXXXXXXX', 'pki_path': '/var/lib/pki', 'pki_pin': 'XXXXXXXX', 'pki_proxy_http_port': '80', 'pki_proxy_https_port': '443', 'pki_random_serial_numbers_enable': 'False', 'pki_registry_initscript_command': 'systemctl restart pki-tomcatd at pki-tomcat.service', 'pki_registry_path': '/etc/sysconfig/pki', 'pki_req_ext_add': 'True', 'pki_req_ext_critical': 'True', 'pki_req_ext_data': '1E0A00530075006200430041', 'pki_req_ext_oid': '1.3.6.1.4.1.311.20.2', 'pki_restart_configured_instance': 'True', 'pki_resteasy_atom_provider_jar': '/usr/share/java/resteasy/resteasy-atom-provider.jar', 'pki_resteasy_client_jar': '/usr/share/java/resteasy/resteasy-client.jar', 'pki_resteasy_jackson_provider_jar': '/usr/share/java/resteasy/resteasy-jackson-provider.jar', 'pki_resteasy_jaxb_provider_jar': '/usr/share/java/resteasy/resteasy-jaxb-provider.jar', 'pki_resteasy_jaxrs_api_jar': '/usr/share/java/resteasy/jaxrs-api.jar', 'pki_resteasy_jaxrs_jar': '/usr/share/java/resteasy/resteasy-jaxrs.jar', 'pki_root_prefix': '', 'pki_scannotation_jar': '/usr/share/java/scannotation.jar', 'pki_scannotation_jar_link': '/var/lib/pki/pki-tomcat/common/lib/scannotation.jar', 'pki_secmod_database': '/etc/pki/pki-tomcat/alias/secmod.db', 'pki_security_domain_hostname': 'cibu-sec88.cisco.com', 'pki_security_domain_https_port': '8443', 'pki_security_domain_name': 'cisco.com Security Domain', 'pki_security_domain_password': 'XXXXXXXX', 'pki_security_domain_type': 'new', 'pki_security_domain_user': 'caadmin', 'pki_security_manager': 'true', 'pki_self_signed_issuer_name': 'cn=cibu-sec88.cisco.com,o=2014-11-06 06:57:59', 'pki_self_signed_nickname': 'Server-Cert cert-pki-tomcat', 'pki_self_signed_noise_bytes': 1024, 'pki_self_signed_noise_file': '/etc/pki/pki-tomcat/ca/noise', 'pki_self_signed_serial_number': 0, 'pki_self_signed_subject': 'cn=cibu-sec88.cisco.com,o=2014-11-06 06:57:59', 'pki_self_signed_token': 'internal', 'pki_self_signed_trustargs': 'CTu,CTu,CTu', 'pki_self_signed_validity_period': 12, 'pki_share_db': 'False', 'pki_shared_password_conf': '/etc/pki/pki-tomcat/password.conf', 'pki_shared_pfile': '/etc/pki/pki-tomcat/pfile', 'pki_skip_configuration': 'False', 'pki_skip_installation': 'False', 'pki_source_admincert_profile': '/usr/share/pki/ca/conf/adminCert.profile', 'pki_source_caauditsigningcert_profile': '/usr/share/pki/ca/conf/caAuditSigningCert.profile', 'pki_source_cacert_profile': '/usr/share/pki/ca/conf/caCert.profile', 'pki_source_caocspcert_profile': '/usr/share/pki/ca/conf/caOCSPCert.profile', 'pki_source_catalina_properties': '/usr/share/pki/server/conf/catalina.properties', 'pki_source_conf_path': '/usr/share/pki/ca/conf', 'pki_source_context_xml': '/usr/share/pki/server/conf/context.xml', 'pki_source_cs_cfg': '/usr/share/pki/ca/conf/CS.cfg', 'pki_source_emails': '/usr/share/pki/ca/emails', 'pki_source_flatfile_txt': '/usr/share/pki/ca/conf/flatfile.txt', 'pki_source_profiles': '/usr/share/pki/ca/profiles', 'pki_source_proxy_conf': '/usr/share/pki/ca/conf/proxy.conf', 'pki_source_registry': '/usr/share/pki/setup/pkidaemon_registry', 'pki_source_registry_cfg': '/usr/share/pki/ca/conf/registry.cfg', 'pki_source_server_path': '/usr/share/pki/server/conf', 'pki_source_server_xml': '/usr/share/pki/server/conf/server.xml', 'pki_source_servercert_profile': '/usr/share/pki/ca/conf/serverCert.profile', 'pki_source_servercertnick_conf': '/usr/share/pki/server/conf/serverCertNick.conf', 'pki_source_setup_path': '/usr/share/pki/setup', 'pki_source_subsystem_path': '/usr/share/pki/ca', 'pki_source_subsystemcert_profile': '/usr/share/pki/ca/conf/subsystemCert.profile', 'pki_source_tomcat_conf': '/usr/share/pki/server/conf/tomcat.conf', 'pki_spawn_log': '/var/log/pki/pki-ca-spawn.20141106065759.log', 'pki_ssl_server_key_algorithm': 'SHA256withRSA', 'pki_ssl_server_key_size': '2048', 'pki_ssl_server_key_type': 'rsa', 'pki_ssl_server_nickname': 'Server-Cert cert-pki-tomcat', 'pki_ssl_server_subject_dn': 'cn=cibu-sec88.cisco.com,o=cisco.com Security Domain', 'pki_ssl_server_tag': 'sslserver', 'pki_ssl_server_token': 'Internal Key Storage Token', 'pki_standalone': 'false', 'pki_storage_tag': 'storage', 'pki_subordinate': 'False', 'pki_subordinate_create_new_security_domain': 'False', 'pki_subordinate_security_domain_name': 'cisco.com Subordinate Security Domain', 'pki_subsystem': 'CA', 'pki_subsystem_archive_log_path': '/var/log/pki/pki-tomcat/ca/archive', 'pki_subsystem_conf_link': '/var/lib/pki/pki-tomcat/ca/conf', 'pki_subsystem_configuration_password_conf_link': '/etc/pki/pki-tomcat/ca/password.conf', 'pki_subsystem_configuration_path': '/etc/pki/pki-tomcat/ca', 'pki_subsystem_database_link': '/var/lib/pki/pki-tomcat/ca/alias', 'pki_subsystem_emails_path': '/var/lib/pki/pki-tomcat/ca/emails', 'pki_subsystem_key_algorithm': 'SHA256withRSA', 'pki_subsystem_key_size': '2048', 'pki_subsystem_key_type': 'rsa', 'pki_subsystem_log_path': '/var/log/pki/pki-tomcat/ca', 'pki_subsystem_logs_link': '/var/lib/pki/pki-tomcat/ca/logs', 'pki_subsystem_name': 'CA cibu-sec88.cisco.com 9443', 'pki_subsystem_nickname': 'subsystemCert cert-pki-tomcat', 'pki_subsystem_path': '/var/lib/pki/pki-tomcat/ca', 'pki_subsystem_profiles_path': '/var/lib/pki/pki-tomcat/ca/profiles', 'pki_subsystem_registry_link': '/var/lib/pki/pki-tomcat/ca/registry', 'pki_subsystem_registry_path': '/etc/sysconfig/pki/tomcat/pki-tomcat/ca', 'pki_subsystem_signed_audit_log_path': '/var/log/pki/pki-tomcat/ca/signedAudit', 'pki_subsystem_subject_dn': 'cn=Subsystem Certificate,o=cisco.com Security Domain', 'pki_subsystem_tag': 'subsystem', 'pki_subsystem_token': 'Internal Key Storage Token', 'pki_subsystem_tomcat_webapps_link': '/var/lib/pki/pki-tomcat/ca/webapps', 'pki_subsystem_type': 'ca', 'pki_symkey_jar': '/usr/lib/java/symkey.jar', 'pki_symkey_jar_link': '/var/lib/pki/pki-tomcat/common/lib/symkey.jar', 'pki_systemd_service': '/lib/systemd/system/pki-tomcatd at .service', 'pki_systemd_service_link': '/etc/systemd/system/pki-tomcatd.target.wants/pki-tomcatd at pki-tomcat.service', 'pki_systemd_target': '/lib/systemd/system/pki-tomcatd.target', 'pki_systemd_target_wants': '/etc/systemd/system/pki-tomcatd.target.wants', 'pki_target_admincert_profile': '/etc/pki/pki-tomcat/ca/adminCert.profile', 'pki_target_caauditsigningcert_profile': '/etc/pki/pki-tomcat/ca/caAuditSigningCert.profile', 'pki_target_cacert_profile': '/etc/pki/pki-tomcat/ca/caCert.profile', 'pki_target_caocspcert_profile': '/etc/pki/pki-tomcat/ca/caOCSPCert.profile', 'pki_target_catalina_properties': '/etc/pki/pki-tomcat/catalina.properties', 'pki_target_context_xml': '/etc/pki/pki-tomcat/context.xml', 'pki_target_cs_cfg': '/etc/pki/pki-tomcat/ca/CS.cfg', 'pki_target_flatfile_txt': '/etc/pki/pki-tomcat/ca/flatfile.txt', 'pki_target_profileselect_template': '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ProfileSelect.template', 'pki_target_proxy_conf': '/etc/pki/pki-tomcat/ca/proxy.conf', 'pki_target_registry': '/etc/sysconfig/pki/tomcat/pki-tomcat/pki-tomcat', 'pki_target_registry_cfg': '/etc/pki/pki-tomcat/ca/registry.cfg', 'pki_target_server_xml': '/etc/pki/pki-tomcat/server.xml', 'pki_target_servercert_profile': '/etc/pki/pki-tomcat/ca/serverCert.profile', 'pki_target_servercertnick_conf': '/etc/pki/pki-tomcat/serverCertNick.conf', 'pki_target_subsystem_web_xml': '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/web.xml', 'pki_target_subsystem_web_xml_orig': '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/web.xml.orig', 'pki_target_subsystemcert_profile': '/etc/pki/pki-tomcat/ca/subsystemCert.profile', 'pki_target_tomcat_conf': '/etc/pki/pki-tomcat/tomcat.conf', 'pki_target_tomcat_conf_instance_id': '/etc/sysconfig/pki-tomcat', 'pki_target_velocity_properties': '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/velocity.properties', 'pki_theme_enable': 'True', 'pki_theme_server_dir': '/usr/share/pki/common-ui', 'pki_timestamp': '20141106065759', 'pki_tks_jar': '/usr/share/java/pki/pki-tks.jar', 'pki_tks_jar_link': '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib/pki-tks.jar', 'pki_token_name': 'internal', 'pki_token_password': 'XXXXXXXX', 'pki_tomcat_bin_link': '/var/lib/pki/pki-tomcat/bin', 'pki_tomcat_bin_path': '/usr/share/tomcat/bin', 'pki_tomcat_common_lib_path': '/var/lib/pki/pki-tomcat/common/lib', 'pki_tomcat_common_path': '/var/lib/pki/pki-tomcat/common', 'pki_tomcat_jar': '/usr/share/java/pki/pki-tomcat.jar', 'pki_tomcat_jar_link': '/var/lib/pki/pki-tomcat/common/lib/pki-tomcat.jar', 'pki_tomcat_lib_path': '/usr/share/tomcat/lib', 'pki_tomcat_server_port': '9005', 'pki_tomcat_systemd': '/usr/sbin/tomcat', 'pki_tomcat_tmpdir_path': '/var/lib/pki/pki-tomcat/temp', 'pki_tomcat_webapps_path': '/var/lib/pki/pki-tomcat/webapps', 'pki_tomcat_webapps_subsystem_path': '/var/lib/pki/pki-tomcat/webapps/ca', 'pki_tomcat_webapps_subsystem_webinf_classes_path': '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/classes', 'pki_tomcat_webapps_subsystem_webinf_lib_path': '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib', 'pki_tomcat_work_catalina_host_path': '/var/lib/pki/pki-tomcat/work/Catalina/localhost', 'pki_tomcat_work_catalina_host_run_path': '/var/lib/pki/pki-tomcat/work/Catalina/localhost/_', 'pki_tomcat_work_catalina_host_subsystem_path': '/var/lib/pki/pki-tomcat/work/Catalina/localhost/ca', 'pki_tomcat_work_catalina_path': '/var/lib/pki/pki-tomcat/work/Catalina', 'pki_tomcat_work_path': '/var/lib/pki/pki-tomcat/work', 'pki_tomcatjss_jar': '/usr/share/java/tomcatjss.jar', 'pki_tomcatjss_jar_link': '/var/lib/pki/pki-tomcat/common/lib/tomcatjss.jar', 'pki_tps_jar': '/usr/share/java/pki/pki-tps.jar', 'pki_tps_jar_link': '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib/pki-tps.jar', 'pki_transport_tag': 'transport', 'pki_user': 'pkiuser', 'pki_user_deployment_cfg': 'd1.cfg', 'pki_user_deployment_cfg_replica': '/etc/sysconfig/pki/tomcat/pki-tomcat/ca/deployment.cfg', 'pki_user_deployment_cfg_spawn_archive': '/var/log/pki/pki-tomcat/ca/archive/spawn_deployment.cfg.20141106065759', 'pki_velocity_jar': '/usr/share/java/velocity.jar', 'pki_velocity_jar_link': '/var/lib/pki/pki-tomcat/common/lib/velocity.jar', 'pki_xerces_j2_jar': '/usr/share/java/xerces-j2.jar', 'pki_xerces_j2_jar_link': '/var/lib/pki/pki-tomcat/common/lib/xerces-j2.jar', 'pki_xml_commons_apis_jar': '/usr/share/java/xml-commons-apis.jar', 'pki_xml_commons_apis_jar_link': '/var/lib/pki/pki-tomcat/common/lib/xml-commons-apis.jar', 'pki_xml_commons_resolver_jar': '/usr/share/java/xml-commons-resolver.jar', 'pki_xml_commons_resolver_jar_link': '/var/lib/pki/pki-tomcat/common/lib/xml-commons-resolver.jar', 'resteasy_lib': '/usr/share/java/resteasy', 'sensitive_parameters': '\npki_admin_password\npki_backup_password\npki_client_database_password\npki_client_pin\npki_client_pkcs12_password\npki_clone_pkcs12_password\npki_ds_password\npki_one_time_pin\npki_pin\npki_security_domain_password\npki_token_password', 'spawn_scriplets': '\ninitialization\ninfrastructure_layout\ninstance_layout\nsubsystem_layout\nselinux_setup\nwebapp_deployment\nslot_substitution\nsecurity_databases\nconfiguration\nfinalization'} Installing CA into /var/lib/pki/pki-tomcat. pkispawn : INFO BEGIN spawning subsystem 'CA' of instance 'pki-tomcat' . . . pkispawn : INFO ....... adding GID 'pkiuser' for group '17' . . . pkispawn : INFO ....... adding UID 'pkiuser' for user '17' . . . pkispawn : DEBUG ....... retrieving UID for 'pkiuser' . . . pkispawn : DEBUG ........... UID of 'pkiuser' is 17 pkispawn : DEBUG ....... retrieving GID for 'pkiuser' . . . pkispawn : DEBUG ........... GID of 'pkiuser' is 17 pkispawn : INFO ... initializing 'pki.server.deployment.scriptlets.initialization' pkispawn : ERROR ....... Selinux is disabled. Not checking port contexts pkispawn : INFO ... populating 'pki.server.deployment.scriptlets.infrastructure_layout' pkispawn : INFO ....... mkdir -p /etc/sysconfig/pki pkispawn : DEBUG ........... chmod 770 /etc/sysconfig/pki pkispawn : DEBUG ........... chown 17:17 /etc/sysconfig/pki pkispawn : INFO ....... mkdir -p /etc/sysconfig/pki/tomcat pkispawn : DEBUG ........... chmod 770 /etc/sysconfig/pki/tomcat pkispawn : DEBUG ........... chown 17:17 /etc/sysconfig/pki/tomcat pkispawn : INFO ....... mkdir -p /etc/sysconfig/pki/tomcat/pki-tomcat pkispawn : DEBUG ........... chmod 770 /etc/sysconfig/pki/tomcat/pki-tomcat pkispawn : DEBUG ........... chown 17:17 /etc/sysconfig/pki/tomcat/pki-tomcat pkispawn : INFO ....... mkdir -p /etc/sysconfig/pki/tomcat/pki-tomcat/ca pkispawn : DEBUG ........... chmod 770 /etc/sysconfig/pki/tomcat/pki-tomcat/ca pkispawn : DEBUG ........... chown 17:17 /etc/sysconfig/pki/tomcat/pki-tomcat/ca pkispawn : INFO ....... cp -p /etc/pki/default.cfg /etc/sysconfig/pki/tomcat/pki-tomcat/ca/default.cfg pkispawn : DEBUG ........... chmod 660 /etc/sysconfig/pki/tomcat/pki-tomcat/ca/default.cfg pkispawn : DEBUG ........... chown 17:17 /etc/sysconfig/pki/tomcat/pki-tomcat/ca/default.cfg Storing deployment configuration into /etc/sysconfig/pki/tomcat/pki-tomcat/ca/deployment.cfg. pkispawn : INFO ....... mkdir -p /var/lib/pki pkispawn : DEBUG ........... chmod 770 /var/lib/pki pkispawn : DEBUG ........... chown 17:17 /var/lib/pki pkispawn : INFO ....... mkdir -p /var/lib/pki/pki-tomcat pkispawn : DEBUG ........... chmod 770 /var/lib/pki/pki-tomcat pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat pkispawn : INFO ....... mkdir -p /var/lib/pki/pki-tomcat/ca pkispawn : DEBUG ........... chmod 770 /var/lib/pki/pki-tomcat/ca pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca pkispawn : INFO ....... ln -s /etc/sysconfig/pki/tomcat/pki-tomcat /var/lib/pki/pki-tomcat/ca/registry pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/ca/registry pkispawn : INFO ... populating 'pki.server.deployment.scriptlets.instance_layout' pkispawn : INFO ....... mkdir -p /var/log/pki/pki-tomcat pkispawn : DEBUG ........... chmod 770 /var/log/pki/pki-tomcat pkispawn : DEBUG ........... chown 17:17 /var/log/pki/pki-tomcat pkispawn : INFO ....... cp -rp /usr/share/pki/server/conf /etc/pki/pki-tomcat pkispawn : INFO ....... setting ownerships, permissions, and acls on '/etc/pki/pki-tomcat' pkispawn : DEBUG ........... '/etc/pki/pki-tomcat/tomcat.conf' is a file pkispawn : DEBUG ........... chmod 660 /etc/pki/pki-tomcat/tomcat.conf pkispawn : DEBUG ........... chown 17:17 /etc/pki/pki-tomcat/tomcat.conf pkispawn : DEBUG ........... '/etc/pki/pki-tomcat/custom.policy' is a file pkispawn : DEBUG ........... chmod 660 /etc/pki/pki-tomcat/custom.policy pkispawn : DEBUG ........... chown 17:17 /etc/pki/pki-tomcat/custom.policy pkispawn : DEBUG ........... '/etc/pki/pki-tomcat/web.xml' is a file pkispawn : DEBUG ........... chmod 660 /etc/pki/pki-tomcat/web.xml pkispawn : DEBUG ........... chown 17:17 /etc/pki/pki-tomcat/web.xml pkispawn : DEBUG ........... '/etc/pki/pki-tomcat/context.xml' is a file pkispawn : DEBUG ........... chmod 660 /etc/pki/pki-tomcat/context.xml pkispawn : DEBUG ........... chown 17:17 /etc/pki/pki-tomcat/context.xml pkispawn : DEBUG ........... '/etc/pki/pki-tomcat/serverCertNick.conf' is a file pkispawn : DEBUG ........... chmod 660 /etc/pki/pki-tomcat/serverCertNick.conf pkispawn : DEBUG ........... chown 17:17 /etc/pki/pki-tomcat/serverCertNick.conf pkispawn : DEBUG ........... '/etc/pki/pki-tomcat/catalina.properties' is a file pkispawn : DEBUG ........... chmod 660 /etc/pki/pki-tomcat/catalina.properties pkispawn : DEBUG ........... chown 17:17 /etc/pki/pki-tomcat/catalina.properties pkispawn : DEBUG ........... '/etc/pki/pki-tomcat/server.xml' is a file pkispawn : DEBUG ........... chmod 660 /etc/pki/pki-tomcat/server.xml pkispawn : DEBUG ........... chown 17:17 /etc/pki/pki-tomcat/server.xml pkispawn : DEBUG ........... '/etc/pki/pki-tomcat/logging.properties' is a file pkispawn : DEBUG ........... chmod 660 /etc/pki/pki-tomcat/logging.properties pkispawn : DEBUG ........... chown 17:17 /etc/pki/pki-tomcat/logging.properties pkispawn : DEBUG ........... '/etc/pki/pki-tomcat/catalina.policy' is a file pkispawn : DEBUG ........... chmod 660 /etc/pki/pki-tomcat/catalina.policy pkispawn : DEBUG ........... chown 17:17 /etc/pki/pki-tomcat/catalina.policy pkispawn : DEBUG ........... '/etc/pki/pki-tomcat/log4j.properties' is a file pkispawn : DEBUG ........... chmod 660 /etc/pki/pki-tomcat/log4j.properties pkispawn : DEBUG ........... chown 17:17 /etc/pki/pki-tomcat/log4j.properties pkispawn : DEBUG ........... '/etc/pki/pki-tomcat/pki.policy' is a file pkispawn : DEBUG ........... chmod 660 /etc/pki/pki-tomcat/pki.policy pkispawn : DEBUG ........... chown 17:17 /etc/pki/pki-tomcat/pki.policy pkispawn : DEBUG ........... '/etc/pki/pki-tomcat/tomcat-users.xml' is a file pkispawn : DEBUG ........... chmod 660 /etc/pki/pki-tomcat/tomcat-users.xml pkispawn : DEBUG ........... chown 17:17 /etc/pki/pki-tomcat/tomcat-users.xml pkispawn : DEBUG ........... '/etc/pki/pki-tomcat/Catalina' is a directory pkispawn : DEBUG ........... chmod 770 /etc/pki/pki-tomcat/Catalina pkispawn : DEBUG ........... chown 17:17 /etc/pki/pki-tomcat/Catalina pkispawn : DEBUG ........... '/etc/pki/pki-tomcat/Catalina/localhost' is a directory pkispawn : DEBUG ........... chmod 770 /etc/pki/pki-tomcat/Catalina/localhost pkispawn : DEBUG ........... chown 17:17 /etc/pki/pki-tomcat/Catalina/localhost pkispawn : DEBUG ........... '/etc/pki/pki-tomcat/Catalina/localhost/pki.xml' is a file pkispawn : DEBUG ........... chmod 660 /etc/pki/pki-tomcat/Catalina/localhost/pki.xml pkispawn : DEBUG ........... chown 17:17 /etc/pki/pki-tomcat/Catalina/localhost/pki.xml pkispawn : DEBUG ........... '/etc/pki/pki-tomcat/Catalina/localhost/ROOT.xml' is a file pkispawn : DEBUG ........... chmod 660 /etc/pki/pki-tomcat/Catalina/localhost/ROOT.xml pkispawn : DEBUG ........... chown 17:17 /etc/pki/pki-tomcat/Catalina/localhost/ROOT.xml pkispawn : INFO ....... mkdir -p /var/lib/pki/pki-tomcat/common pkispawn : DEBUG ........... chmod 770 /var/lib/pki/pki-tomcat/common pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/common pkispawn : INFO ....... mkdir -p /var/lib/pki/pki-tomcat/common/lib pkispawn : DEBUG ........... chmod 770 /var/lib/pki/pki-tomcat/common/lib pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/common/lib pkispawn : INFO ....... mkdir -p /var/lib/pki/pki-tomcat/lib pkispawn : DEBUG ........... chmod 770 /var/lib/pki/pki-tomcat/lib pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/lib pkispawn : INFO ....... ln -s /usr/share/tomcat/lib/tomcat-util.jar /var/lib/pki/pki-tomcat/lib/tomcat-util.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/lib/tomcat-util.jar pkispawn : INFO ....... ln -s /usr/share/tomcat/lib/jasper.jar /var/lib/pki/pki-tomcat/lib/jasper.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/lib/jasper.jar pkispawn : INFO ....... ln -s /usr/share/tomcat/lib/tomcat-servlet-3.0-api.jar /var/lib/pki/pki-tomcat/lib/tomcat-servlet-3.0-api.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/lib/tomcat-servlet-3.0-api.jar pkispawn : INFO ....... ln -s /usr/share/tomcat/lib/commons-pool.jar /var/lib/pki/pki-tomcat/lib/commons-pool.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/lib/commons-pool.jar pkispawn : INFO ....... ln -s /usr/share/tomcat/lib/commons-collections.jar /var/lib/pki/pki-tomcat/lib/commons-collections.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/lib/commons-collections.jar pkispawn : INFO ....... ln -s /usr/share/tomcat/lib/tomcat7-websocket.jar /var/lib/pki/pki-tomcat/lib/tomcat7-websocket.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/lib/tomcat7-websocket.jar pkispawn : INFO ....... ln -s /usr/share/tomcat/lib/catalina.jar /var/lib/pki/pki-tomcat/lib/catalina.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/lib/catalina.jar pkispawn : INFO ....... ln -s /usr/share/tomcat/lib/annotations-api.jar /var/lib/pki/pki-tomcat/lib/annotations-api.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/lib/annotations-api.jar pkispawn : INFO ....... ln -s /usr/share/tomcat/lib/tomcat-el-2.2-api.jar /var/lib/pki/pki-tomcat/lib/tomcat-el-2.2-api.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/lib/tomcat-el-2.2-api.jar pkispawn : INFO ....... ln -s /usr/share/tomcat/lib/tomcat-i18n-es.jar /var/lib/pki/pki-tomcat/lib/tomcat-i18n-es.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/lib/tomcat-i18n-es.jar pkispawn : INFO ....... ln -s /usr/share/tomcat/lib/commons-dbcp.jar /var/lib/pki/pki-tomcat/lib/commons-dbcp.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/lib/commons-dbcp.jar pkispawn : INFO ....... ln -s /usr/share/tomcat/lib/catalina-ant.jar /var/lib/pki/pki-tomcat/lib/catalina-ant.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/lib/catalina-ant.jar pkispawn : INFO ....... ln -s /usr/share/tomcat/lib/websocket-api.jar /var/lib/pki/pki-tomcat/lib/websocket-api.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/lib/websocket-api.jar pkispawn : INFO ....... ln -s /usr/share/tomcat/lib/catalina-tribes.jar /var/lib/pki/pki-tomcat/lib/catalina-tribes.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/lib/catalina-tribes.jar pkispawn : INFO ....... ln -s /usr/share/tomcat/lib/log4j.jar /var/lib/pki/pki-tomcat/lib/log4j.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/lib/log4j.jar pkispawn : INFO ....... ln -s /usr/share/tomcat/lib/tomcat-coyote.jar /var/lib/pki/pki-tomcat/lib/tomcat-coyote.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/lib/tomcat-coyote.jar pkispawn : INFO ....... ln -s /usr/share/tomcat/lib/jasper-jdt.jar /var/lib/pki/pki-tomcat/lib/jasper-jdt.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/lib/jasper-jdt.jar pkispawn : INFO ....... ln -s /usr/share/tomcat/lib/catalina-ha.jar /var/lib/pki/pki-tomcat/lib/catalina-ha.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/lib/catalina-ha.jar pkispawn : INFO ....... ln -s /usr/share/tomcat/lib/tomcat-jdbc.jar /var/lib/pki/pki-tomcat/lib/tomcat-jdbc.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/lib/tomcat-jdbc.jar pkispawn : INFO ....... ln -s /usr/share/tomcat/lib/tomcat-jsp-2.2-api.jar /var/lib/pki/pki-tomcat/lib/tomcat-jsp-2.2-api.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/lib/tomcat-jsp-2.2-api.jar pkispawn : INFO ....... ln -s /usr/share/tomcat/lib/tomcat-i18n-ja.jar /var/lib/pki/pki-tomcat/lib/tomcat-i18n-ja.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/lib/tomcat-i18n-ja.jar pkispawn : INFO ....... ln -s /usr/share/tomcat/lib/tomcat-i18n-fr.jar /var/lib/pki/pki-tomcat/lib/tomcat-i18n-fr.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/lib/tomcat-i18n-fr.jar pkispawn : INFO ....... ln -s /usr/share/tomcat/lib/tomcat-api.jar /var/lib/pki/pki-tomcat/lib/tomcat-api.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/lib/tomcat-api.jar pkispawn : INFO ....... ln -s /usr/share/tomcat/lib/jasper-el.jar /var/lib/pki/pki-tomcat/lib/jasper-el.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/lib/jasper-el.jar pkispawn : INFO ....... ln -s /usr/share/tomcat/lib/tomcat-juli.jar /var/lib/pki/pki-tomcat/lib/tomcat-juli.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/lib/tomcat-juli.jar pkispawn : INFO ....... ln -s /etc/pki/pki-tomcat/log4j.properties /var/lib/pki/pki-tomcat/lib/log4j.properties pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/lib/log4j.properties pkispawn : INFO ....... mkdir -p /var/lib/pki/pki-tomcat/temp pkispawn : DEBUG ........... chmod 770 /var/lib/pki/pki-tomcat/temp pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/temp pkispawn : INFO ....... cp -rp /usr/share/pki/server/webapps /var/lib/pki/pki-tomcat/webapps pkispawn : INFO ....... setting ownerships, permissions, and acls on '/var/lib/pki/pki-tomcat/webapps' pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki' is a directory pkispawn : DEBUG ........... chmod 770 /var/lib/pki/pki-tomcat/webapps/pki pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ROOT' is a directory pkispawn : DEBUG ........... chmod 770 /var/lib/pki/pki-tomcat/webapps/ROOT pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ROOT pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/images' is a directory pkispawn : DEBUG ........... chmod 770 /var/lib/pki/pki-tomcat/webapps/pki/images pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/images pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/admin' is a directory pkispawn : DEBUG ........... chmod 770 /var/lib/pki/pki-tomcat/webapps/pki/admin pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/admin pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/fonts' is a directory pkispawn : DEBUG ........... chmod 770 /var/lib/pki/pki-tomcat/webapps/pki/fonts pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/fonts pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/js' is a directory pkispawn : DEBUG ........... chmod 770 /var/lib/pki/pki-tomcat/webapps/pki/js pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/js pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/css' is a directory pkispawn : DEBUG ........... chmod 770 /var/lib/pki/pki-tomcat/webapps/pki/css pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/css pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/images/radiobutton-background-selected.png' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/images/radiobutton-background-selected.png pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/images/radiobutton-background-selected.png pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/images/checkbutton-background-disabled.png' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/images/checkbutton-background-disabled.png pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/images/checkbutton-background-disabled.png pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/images/radiobutton-background-selected-disabled.png' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/images/radiobutton-background-selected-disabled.png pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/images/radiobutton-background-selected-disabled.png pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/images/radiobutton-background-hover.png' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/images/radiobutton-background-hover.png pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/images/radiobutton-background-hover.png pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/images/checkbutton-background-selected.png' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/images/checkbutton-background-selected.png pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/images/checkbutton-background-selected.png pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/images/input-background.png' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/images/input-background.png pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/images/input-background.png pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/images/radiobutton-background-disabled.png' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/images/radiobutton-background-disabled.png pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/images/radiobutton-background-disabled.png pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/images/checkbutton-background.png' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/images/checkbutton-background.png pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/images/checkbutton-background.png pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/images/radiobutton-background.png' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/images/radiobutton-background.png pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/images/radiobutton-background.png pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/images/checkbutton-background-hover.png' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/images/checkbutton-background-hover.png pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/images/checkbutton-background-hover.png pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/images/dialog-button-close.png' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/images/dialog-button-close.png pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/images/dialog-button-close.png pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/images/checkbutton-background-selected-disabled.png' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/images/checkbutton-background-selected-disabled.png pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/images/checkbutton-background-selected-disabled.png pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/admin/console' is a directory pkispawn : DEBUG ........... chmod 770 /var/lib/pki/pki-tomcat/webapps/pki/admin/console pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/admin/console pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/admin/console/js' is a directory pkispawn : DEBUG ........... chmod 770 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/js pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/js pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/admin/console/config' is a directory pkispawn : DEBUG ........... chmod 770 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/admin/console/js/misc.js' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/js/misc.js pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/js/misc.js pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/config_addhsm.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/config_addhsm.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/config_addhsm.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/adminpanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/adminpanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/adminpanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/drminfopanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/drminfopanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/drminfopanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/topmenu.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/topmenu.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/topmenu.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/certrequestpanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/certrequestpanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/certrequestpanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/config_hsmloginpanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/config_hsmloginpanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/config_hsmloginpanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/certchainpanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/certchainpanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/certchainpanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/backupkeycertpanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/backupkeycertpanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/backupkeycertpanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/sidemenu.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/sidemenu.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/sidemenu.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/certprettyprintpanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/certprettyprintpanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/certprettyprintpanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/createsubsystempanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/createsubsystempanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/createsubsystempanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/footer.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/footer.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/footer.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/cainfopanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/cainfopanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/cainfopanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/securitydomainpanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/securitydomainpanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/securitydomainpanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/header.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/header.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/header.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/hierarchypanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/hierarchypanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/hierarchypanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/authdbpanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/authdbpanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/authdbpanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/securitydomainloginpanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/securitydomainloginpanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/securitydomainloginpanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/savepkcs12panel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/savepkcs12panel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/savepkcs12panel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/welcomepanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/welcomepanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/welcomepanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/importcachainpanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/importcachainpanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/importcachainpanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/modulepanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/modulepanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/modulepanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/login.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/login.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/login.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/donepanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/donepanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/donepanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/tksinfopanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/tksinfopanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/tksinfopanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/xml.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/xml.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/xml.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/adminauthenticatepanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/adminauthenticatepanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/adminauthenticatepanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/agentauthenticatepanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/agentauthenticatepanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/agentauthenticatepanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/sizepanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/sizepanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/sizepanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/namepanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/namepanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/namepanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/importadmincertpanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/importadmincertpanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/importadmincertpanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/wizard.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/wizard.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/wizard.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/databasepanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/databasepanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/databasepanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/displaycertchainpanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/displaycertchainpanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/displaycertchainpanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/restorekeycertpanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/restorekeycertpanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/admin/console/config/restorekeycertpanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/fonts/OpenSans-Regular-webfont.woff' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/fonts/OpenSans-Regular-webfont.woff pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/fonts/OpenSans-Regular-webfont.woff pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/fonts/PatternFlyIcons-webfont.ttf' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/fonts/PatternFlyIcons-webfont.ttf pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/fonts/PatternFlyIcons-webfont.ttf pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/fonts/OpenSans-BoldItalic-webfont.woff' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/fonts/OpenSans-BoldItalic-webfont.woff pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/fonts/OpenSans-BoldItalic-webfont.woff pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/fonts/OpenSans-Italic-webfont.woff' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/fonts/OpenSans-Italic-webfont.woff pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/fonts/OpenSans-Italic-webfont.woff pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/fonts/glyphicons-halflings-regular.woff' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/fonts/glyphicons-halflings-regular.woff pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/fonts/glyphicons-halflings-regular.woff pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/fonts/fontawesome-webfont.woff' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/fonts/fontawesome-webfont.woff pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/fonts/fontawesome-webfont.woff pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/fonts/OpenSans-Bold-webfont.woff' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/fonts/OpenSans-Bold-webfont.woff pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/fonts/OpenSans-Bold-webfont.woff pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/fonts/OpenSans-Semibold-webfont.woff' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/fonts/OpenSans-Semibold-webfont.woff pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/fonts/OpenSans-Semibold-webfont.woff pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/fonts/OpenSans-Light-webfont.woff' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/fonts/OpenSans-Light-webfont.woff pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/fonts/OpenSans-Light-webfont.woff pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/js/backbone.js' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/js/backbone.js pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/js/backbone.js pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/js/bootstrap.js' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/js/bootstrap.js pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/js/bootstrap.js pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/js/jquery.i18n.properties.js' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/js/jquery.i18n.properties.js pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/js/jquery.i18n.properties.js pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/js/pki-ui.js' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/js/pki-ui.js pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/js/pki-ui.js pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/js/underscore.js' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/js/underscore.js pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/js/underscore.js pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/js/jquery.js' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/js/jquery.js pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/js/jquery.js pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/js/patternfly.js' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/js/patternfly.js pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/js/patternfly.js pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/css/pki-ui.css' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/css/pki-ui.css pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/css/pki-ui.css pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/css/patternfly.css' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/css/patternfly.css pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/css/patternfly.css pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/css/pki-forms.css' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/css/pki-forms.css pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/css/pki-forms.css pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/pki/css/pki-tables.css' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/pki/css/pki-tables.css pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/pki/css/pki-tables.css pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ROOT/index.jsp' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ROOT/index.jsp pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ROOT/index.jsp pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ROOT/WEB-INF' is a directory pkispawn : DEBUG ........... chmod 770 /var/lib/pki/pki-tomcat/webapps/ROOT/WEB-INF pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ROOT/WEB-INF pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ROOT/WEB-INF/web.xml' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ROOT/WEB-INF/web.xml pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ROOT/WEB-INF/web.xml pkispawn : INFO ....... mkdir -p /var/lib/pki/pki-tomcat/work pkispawn : DEBUG ........... chmod 770 /var/lib/pki/pki-tomcat/work pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/work pkispawn : INFO ....... mkdir -p /var/lib/pki/pki-tomcat/work/Catalina pkispawn : DEBUG ........... chmod 770 /var/lib/pki/pki-tomcat/work/Catalina pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/work/Catalina pkispawn : INFO ....... mkdir -p /var/lib/pki/pki-tomcat/work/Catalina/localhost pkispawn : DEBUG ........... chmod 770 /var/lib/pki/pki-tomcat/work/Catalina/localhost pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/work/Catalina/localhost pkispawn : INFO ....... mkdir -p /var/lib/pki/pki-tomcat/work/Catalina/localhost/_ pkispawn : DEBUG ........... chmod 770 /var/lib/pki/pki-tomcat/work/Catalina/localhost/_ pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/work/Catalina/localhost/_ pkispawn : INFO ....... mkdir -p /var/lib/pki/pki-tomcat/work/Catalina/localhost/ca pkispawn : DEBUG ........... chmod 770 /var/lib/pki/pki-tomcat/work/Catalina/localhost/ca pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/work/Catalina/localhost/ca pkispawn : INFO ....... ln -s /usr/share/tomcat/bin /var/lib/pki/pki-tomcat/bin pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/bin pkispawn : INFO ....... ln -s /usr/sbin/tomcat /var/lib/pki/pki-tomcat/pki-tomcat pkispawn : DEBUG ........... chown -h 0:0 /var/lib/pki/pki-tomcat/pki-tomcat pkispawn : INFO ....... ln -s /usr/share/java/apache-commons-collections.jar /var/lib/pki/pki-tomcat/common/lib/apache-commons-collections.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/common/lib/apache-commons-collections.jar pkispawn : INFO ....... ln -s /usr/share/java/apache-commons-io.jar /var/lib/pki/pki-tomcat/common/lib/apache-commons-io.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/common/lib/apache-commons-io.jar pkispawn : INFO ....... ln -s /usr/share/java/apache-commons-lang.jar /var/lib/pki/pki-tomcat/common/lib/apache-commons-lang.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/common/lib/apache-commons-lang.jar pkispawn : INFO ....... ln -s /usr/share/java/apache-commons-logging.jar /var/lib/pki/pki-tomcat/common/lib/apache-commons-logging.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/common/lib/apache-commons-logging.jar pkispawn : INFO ....... ln -s /usr/share/java/commons-codec.jar /var/lib/pki/pki-tomcat/common/lib/apache-commons-codec.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/common/lib/apache-commons-codec.jar pkispawn : INFO ....... ln -s /usr/share/java/httpcomponents/httpclient.jar /var/lib/pki/pki-tomcat/common/lib/httpclient.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/common/lib/httpclient.jar pkispawn : INFO ....... ln -s /usr/share/java/httpcomponents/httpcore.jar /var/lib/pki/pki-tomcat/common/lib/httpcore.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/common/lib/httpcore.jar pkispawn : INFO ....... ln -s /usr/share/java/javassist.jar /var/lib/pki/pki-tomcat/common/lib/javassist.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/common/lib/javassist.jar pkispawn : INFO ....... ln -s /usr/lib/java/jss4.jar /var/lib/pki/pki-tomcat/common/lib/jss4.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/common/lib/jss4.jar pkispawn : INFO ....... ln -s /usr/share/java/ldapjdk.jar /var/lib/pki/pki-tomcat/common/lib/ldapjdk.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/common/lib/ldapjdk.jar pkispawn : INFO ....... ln -s /usr/share/java/pki/pki-tomcat.jar /var/lib/pki/pki-tomcat/common/lib/pki-tomcat.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/common/lib/pki-tomcat.jar pkispawn : INFO ....... ln -s /usr/share/java/scannotation.jar /var/lib/pki/pki-tomcat/common/lib/scannotation.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/common/lib/scannotation.jar pkispawn : INFO ....... ln -s /usr/share/java/tomcatjss.jar /var/lib/pki/pki-tomcat/common/lib/tomcatjss.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/common/lib/tomcatjss.jar pkispawn : INFO ....... ln -s /usr/share/java/velocity.jar /var/lib/pki/pki-tomcat/common/lib/velocity.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/common/lib/velocity.jar pkispawn : INFO ....... ln -s /usr/share/java/xerces-j2.jar /var/lib/pki/pki-tomcat/common/lib/xerces-j2.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/common/lib/xerces-j2.jar pkispawn : INFO ....... ln -s /usr/share/java/xml-commons-apis.jar /var/lib/pki/pki-tomcat/common/lib/xml-commons-apis.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/common/lib/xml-commons-apis.jar pkispawn : INFO ....... ln -s /usr/share/java/xml-commons-resolver.jar /var/lib/pki/pki-tomcat/common/lib/xml-commons-resolver.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/common/lib/xml-commons-resolver.jar pkispawn : INFO ....... ln -s /usr/share/java/jackson-annotations.jar /var/lib/pki/pki-tomcat/common/lib/jackson-annotations.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/common/lib/jackson-annotations.jar pkispawn : INFO ....... ln -s /usr/share/java/jackson/jackson-core-asl.jar /var/lib/pki/pki-tomcat/common/lib/jackson-core-asl.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/common/lib/jackson-core-asl.jar pkispawn : INFO ....... ln -s /usr/share/java/jackson-core.jar /var/lib/pki/pki-tomcat/common/lib/jackson-core.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/common/lib/jackson-core.jar pkispawn : INFO ....... ln -s /usr/share/java/jackson-databind.jar /var/lib/pki/pki-tomcat/common/lib/jackson-databind.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/common/lib/jackson-databind.jar pkispawn : INFO ....... ln -s /usr/share/java/jackson-jaxrs-providers/jackson-jaxrs-base.jar /var/lib/pki/pki-tomcat/common/lib/jackson-jaxrs-base.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/common/lib/jackson-jaxrs-base.jar pkispawn : INFO ....... ln -s /usr/share/java/jackson/jackson-jaxrs.jar /var/lib/pki/pki-tomcat/common/lib/jackson-jaxrs.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/common/lib/jackson-jaxrs.jar pkispawn : INFO ....... ln -s /usr/share/java/jackson-jaxrs-providers/jackson-jaxrs-json-provider.jar /var/lib/pki/pki-tomcat/common/lib/jackson-jaxrs-json-provider.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/common/lib/jackson-jaxrs-json-provider.jar pkispawn : INFO ....... ln -s /usr/share/java/jackson/jackson-mapper-asl.jar /var/lib/pki/pki-tomcat/common/lib/jackson-mapper-asl.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/common/lib/jackson-mapper-asl.jar pkispawn : INFO ....... ln -s /usr/share/java/jackson-module-jaxb-annotations.jar /var/lib/pki/pki-tomcat/common/lib/jackson-module-jaxb-annotations.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/common/lib/jackson-module-jaxb-annotations.jar pkispawn : INFO ....... ln -s /usr/share/java/jackson/jackson-mrbean.jar /var/lib/pki/pki-tomcat/common/lib/jackson-mrbean.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/common/lib/jackson-mrbean.jar pkispawn : INFO ....... ln -s /usr/share/java/jackson/jackson-smile.jar /var/lib/pki/pki-tomcat/common/lib/jackson-smile.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/common/lib/jackson-smile.jar pkispawn : INFO ....... ln -s /usr/share/java/jackson/jackson-xc.jar /var/lib/pki/pki-tomcat/common/lib/jackson-xc.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/common/lib/jackson-xc.jar pkispawn : INFO ....... ln -s /usr/share/java/resteasy/resteasy-atom-provider.jar /var/lib/pki/pki-tomcat/common/lib/resteasy-atom-provider.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/common/lib/resteasy-atom-provider.jar pkispawn : INFO ....... ln -s /usr/share/java/resteasy/resteasy-client.jar /var/lib/pki/pki-tomcat/common/lib/resteasy-client.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/common/lib/resteasy-client.jar pkispawn : INFO ....... ln -s /usr/share/java/resteasy/resteasy-jaxb-provider.jar /var/lib/pki/pki-tomcat/common/lib/resteasy-jaxb-provider.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/common/lib/resteasy-jaxb-provider.jar pkispawn : INFO ....... ln -s /usr/share/java/resteasy/jaxrs-api.jar /var/lib/pki/pki-tomcat/common/lib/jaxrs-api.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/common/lib/jaxrs-api.jar pkispawn : INFO ....... ln -s /usr/share/java/resteasy/resteasy-jaxrs.jar /var/lib/pki/pki-tomcat/common/lib/resteasy-jaxrs.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/common/lib/resteasy-jaxrs.jar pkispawn : INFO ....... ln -s /usr/share/java/resteasy/resteasy-jackson-provider.jar /var/lib/pki/pki-tomcat/common/lib/resteasy-jackson-provider.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/common/lib/resteasy-jackson-provider.jar pkispawn : INFO ....... mkdir -p /etc/pki/pki-tomcat/alias pkispawn : DEBUG ........... chmod 770 /etc/pki/pki-tomcat/alias pkispawn : DEBUG ........... chown 17:17 /etc/pki/pki-tomcat/alias pkispawn : INFO ....... ln -s /etc/pki/pki-tomcat/alias /var/lib/pki/pki-tomcat/alias pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/alias pkispawn : INFO ....... ln -s /etc/pki/pki-tomcat /var/lib/pki/pki-tomcat/conf pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/conf pkispawn : INFO ....... ln -s /var/log/pki/pki-tomcat /var/lib/pki/pki-tomcat/logs pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/logs pkispawn : INFO ... populating 'pki.server.deployment.scriptlets.subsystem_layout' pkispawn : INFO ....... mkdir -p /var/log/pki/pki-tomcat/ca pkispawn : DEBUG ........... chmod 770 /var/log/pki/pki-tomcat/ca pkispawn : DEBUG ........... chown 17:17 /var/log/pki/pki-tomcat/ca pkispawn : INFO ....... mkdir -p /var/log/pki/pki-tomcat/ca/archive pkispawn : DEBUG ........... chmod 770 /var/log/pki/pki-tomcat/ca/archive pkispawn : DEBUG ........... chown 17:17 /var/log/pki/pki-tomcat/ca/archive pkispawn : INFO ....... mkdir -p /var/log/pki/pki-tomcat/ca/signedAudit pkispawn : DEBUG ........... chmod 770 /var/log/pki/pki-tomcat/ca/signedAudit pkispawn : DEBUG ........... chown 17:17 /var/log/pki/pki-tomcat/ca/signedAudit pkispawn : INFO ....... mkdir -p /etc/pki/pki-tomcat/ca pkispawn : DEBUG ........... chmod 770 /etc/pki/pki-tomcat/ca pkispawn : DEBUG ........... chown 17:17 /etc/pki/pki-tomcat/ca pkispawn : INFO ....... cp -rp /usr/share/pki/ca/emails /var/lib/pki/pki-tomcat/ca/emails pkispawn : INFO ....... setting ownerships, permissions, and acls on '/var/lib/pki/pki-tomcat/ca/emails' pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/emails/rnJob1.txt' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/emails/rnJob1.txt pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/emails/rnJob1.txt pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/emails/riq1Item.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/emails/riq1Item.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/emails/riq1Item.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/emails/certRevoked_RA.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/emails/certRevoked_RA.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/emails/certRevoked_RA.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/emails/euJob1.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/emails/euJob1.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/emails/euJob1.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/emails/certIssued_RA' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/emails/certIssued_RA pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/emails/certIssued_RA pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/emails/reqInQueue_RA' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/emails/reqInQueue_RA pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/emails/reqInQueue_RA pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/emails/certRevoked_CA' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/emails/certRevoked_CA pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/emails/certRevoked_CA pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/emails/euJob1Item.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/emails/euJob1Item.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/emails/euJob1Item.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/emails/certIssued_CA.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/emails/certIssued_CA.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/emails/certIssued_CA.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/emails/reqInQueue_RA.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/emails/reqInQueue_RA.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/emails/reqInQueue_RA.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/emails/reqInQueue_CA.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/emails/reqInQueue_CA.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/emails/reqInQueue_CA.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/emails/certRequestRejected.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/emails/certRequestRejected.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/emails/certRequestRejected.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/emails/rnJob1Summary.txt' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/emails/rnJob1Summary.txt pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/emails/rnJob1Summary.txt pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/emails/certIssued_RA.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/emails/certIssued_RA.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/emails/certIssued_RA.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/emails/certRevoked_RA' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/emails/certRevoked_RA pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/emails/certRevoked_RA pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/emails/publishCerts.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/emails/publishCerts.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/emails/publishCerts.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/emails/rnJob1Item.txt' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/emails/rnJob1Item.txt pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/emails/rnJob1Item.txt pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/emails/reqInQueue_CA' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/emails/reqInQueue_CA pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/emails/reqInQueue_CA pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/emails/certIssued_CA' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/emails/certIssued_CA pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/emails/certIssued_CA pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/emails/ExpiredUnpublishJob' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/emails/ExpiredUnpublishJob pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/emails/ExpiredUnpublishJob pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/emails/riq1Summary.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/emails/riq1Summary.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/emails/riq1Summary.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/emails/certRevoked_CA.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/emails/certRevoked_CA.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/emails/certRevoked_CA.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/emails/publishCertsItem.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/emails/publishCertsItem.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/emails/publishCertsItem.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/emails/ExpiredUnpublishJobItem' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/emails/ExpiredUnpublishJobItem pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/emails/ExpiredUnpublishJobItem pkispawn : INFO ....... cp -rp /usr/share/pki/ca/profiles /var/lib/pki/pki-tomcat/ca/profiles pkispawn : INFO ....... setting ownerships, permissions, and acls on '/var/lib/pki/pki-tomcat/ca/profiles' pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/profiles/ca' is a directory pkispawn : DEBUG ........... chmod 770 /var/lib/pki/pki-tomcat/ca/profiles/ca pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/profiles/ca pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/profiles/ca/caRouterCert.cfg' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/profiles/ca/caRouterCert.cfg pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/profiles/ca/caRouterCert.cfg pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/profiles/ca/caDualCert.cfg' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/profiles/ca/caDualCert.cfg pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/profiles/ca/caDualCert.cfg pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/profiles/ca/caDirUserCert.cfg' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/profiles/ca/caDirUserCert.cfg pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/profiles/ca/caDirUserCert.cfg pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/profiles/ca/caRAserverCert.cfg' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/profiles/ca/caRAserverCert.cfg pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/profiles/ca/caRAserverCert.cfg pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/profiles/ca/caTempTokenDeviceKeyEnrollment.cfg' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/profiles/ca/caTempTokenDeviceKeyEnrollment.cfg pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/profiles/ca/caTempTokenDeviceKeyEnrollment.cfg pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/profiles/ca/caInternalAuthAuditSigningCert.cfg' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/profiles/ca/caInternalAuthAuditSigningCert.cfg pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/profiles/ca/caInternalAuthAuditSigningCert.cfg pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/profiles/ca/caTPSCert.cfg' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/profiles/ca/caTPSCert.cfg pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/profiles/ca/caTPSCert.cfg pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/profiles/ca/caUserCert.cfg' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/profiles/ca/caUserCert.cfg pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/profiles/ca/caUserCert.cfg pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/profiles/ca/caCrossSignedCACert.cfg' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/profiles/ca/caCrossSignedCACert.cfg pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/profiles/ca/caCrossSignedCACert.cfg pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/profiles/ca/caInternalAuthDRMstorageCert.cfg' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/profiles/ca/caInternalAuthDRMstorageCert.cfg pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/profiles/ca/caInternalAuthDRMstorageCert.cfg pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/profiles/ca/caECUserCert.cfg' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/profiles/ca/caECUserCert.cfg pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/profiles/ca/caECUserCert.cfg pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/profiles/ca/caTokenDeviceKeyEnrollment.cfg' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/profiles/ca/caTokenDeviceKeyEnrollment.cfg pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/profiles/ca/caTokenDeviceKeyEnrollment.cfg pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/profiles/ca/caRACert.cfg' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/profiles/ca/caRACert.cfg pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/profiles/ca/caRACert.cfg pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/profiles/ca/caTempTokenUserEncryptionKeyEnrollment.cfg' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/profiles/ca/caTempTokenUserEncryptionKeyEnrollment.cfg pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/profiles/ca/caTempTokenUserEncryptionKeyEnrollment.cfg pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/profiles/ca/caServerCert.cfg' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/profiles/ca/caServerCert.cfg pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/profiles/ca/caServerCert.cfg pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/profiles/ca/caJarSigningCert.cfg' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/profiles/ca/caJarSigningCert.cfg pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/profiles/ca/caJarSigningCert.cfg pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/profiles/ca/caUUIDdeviceCert.cfg' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/profiles/ca/caUUIDdeviceCert.cfg pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/profiles/ca/caUUIDdeviceCert.cfg pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/profiles/ca/caRAagentCert.cfg' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/profiles/ca/caRAagentCert.cfg pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/profiles/ca/caRAagentCert.cfg pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/profiles/ca/caDualRAuserCert.cfg' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/profiles/ca/caDualRAuserCert.cfg pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/profiles/ca/caDualRAuserCert.cfg pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/profiles/ca/caAdminCert.cfg' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/profiles/ca/caAdminCert.cfg pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/profiles/ca/caAdminCert.cfg pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/profiles/ca/caECDirUserCert.cfg' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/profiles/ca/caECDirUserCert.cfg pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/profiles/ca/caECDirUserCert.cfg pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/profiles/ca/caStorageCert.cfg' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/profiles/ca/caStorageCert.cfg pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/profiles/ca/caStorageCert.cfg pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/profiles/ca/caDirPinUserCert.cfg' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/profiles/ca/caDirPinUserCert.cfg pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/profiles/ca/caDirPinUserCert.cfg pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/profiles/ca/caAgentServerCert.cfg' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/profiles/ca/caAgentServerCert.cfg pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/profiles/ca/caAgentServerCert.cfg pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/profiles/ca/DomainController.cfg' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/profiles/ca/DomainController.cfg pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/profiles/ca/DomainController.cfg pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/profiles/ca/caTokenUserAuthKeyRenewal.cfg' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/profiles/ca/caTokenUserAuthKeyRenewal.cfg pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/profiles/ca/caTokenUserAuthKeyRenewal.cfg pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/profiles/ca/caEncECUserCert.cfg' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/profiles/ca/caEncECUserCert.cfg pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/profiles/ca/caEncECUserCert.cfg pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/profiles/ca/caInstallCACert.cfg' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/profiles/ca/caInstallCACert.cfg pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/profiles/ca/caInstallCACert.cfg pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/profiles/ca/caCACert.cfg' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/profiles/ca/caCACert.cfg pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/profiles/ca/caCACert.cfg pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/profiles/ca/caTempTokenUserSigningKeyEnrollment.cfg' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/profiles/ca/caTempTokenUserSigningKeyEnrollment.cfg pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/profiles/ca/caTempTokenUserSigningKeyEnrollment.cfg pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/profiles/ca/caTokenUserSigningKeyEnrollment.cfg' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/profiles/ca/caTokenUserSigningKeyEnrollment.cfg pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/profiles/ca/caTokenUserSigningKeyEnrollment.cfg pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/profiles/ca/caAgentFileSigning.cfg' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/profiles/ca/caAgentFileSigning.cfg pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/profiles/ca/caAgentFileSigning.cfg pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/profiles/ca/caSSLClientSelfRenewal.cfg' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/profiles/ca/caSSLClientSelfRenewal.cfg pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/profiles/ca/caSSLClientSelfRenewal.cfg pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/profiles/ca/AdminCert.cfg' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/profiles/ca/AdminCert.cfg pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/profiles/ca/AdminCert.cfg pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/profiles/ca/caTokenUserEncryptionKeyEnrollment.cfg' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/profiles/ca/caTokenUserEncryptionKeyEnrollment.cfg pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/profiles/ca/caTokenUserEncryptionKeyEnrollment.cfg pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/profiles/ca/caSimpleCMCUserCert.cfg' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/profiles/ca/caSimpleCMCUserCert.cfg pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/profiles/ca/caSimpleCMCUserCert.cfg pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/profiles/ca/caTokenUserDelegateAuthKeyEnrollment.cfg' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/profiles/ca/caTokenUserDelegateAuthKeyEnrollment.cfg pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/profiles/ca/caTokenUserDelegateAuthKeyEnrollment.cfg pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/profiles/ca/autoenroll.cfg' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/profiles/ca/autoenroll.cfg pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/profiles/ca/autoenroll.cfg pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/profiles/ca/caTokenUserEncryptionKeyRenewal.cfg' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/profiles/ca/caTokenUserEncryptionKeyRenewal.cfg pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/profiles/ca/caTokenUserEncryptionKeyRenewal.cfg pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/profiles/ca/caECDualCert.cfg' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/profiles/ca/caECDualCert.cfg pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/profiles/ca/caECDualCert.cfg pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/profiles/ca/caUserSMIMEcapCert.cfg' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/profiles/ca/caUserSMIMEcapCert.cfg pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/profiles/ca/caUserSMIMEcapCert.cfg pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/profiles/ca/caCMCUserCert.cfg' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/profiles/ca/caCMCUserCert.cfg pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/profiles/ca/caCMCUserCert.cfg pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/profiles/ca/caInternalAuthSubsystemCert.cfg' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/profiles/ca/caInternalAuthSubsystemCert.cfg pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/profiles/ca/caInternalAuthSubsystemCert.cfg pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/profiles/ca/caTokenUserSigningKeyRenewal.cfg' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/profiles/ca/caTokenUserSigningKeyRenewal.cfg pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/profiles/ca/caTokenUserSigningKeyRenewal.cfg pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/profiles/ca/caIPAserviceCert.cfg' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/profiles/ca/caIPAserviceCert.cfg pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/profiles/ca/caIPAserviceCert.cfg pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/profiles/ca/caInternalAuthOCSPCert.cfg' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/profiles/ca/caInternalAuthOCSPCert.cfg pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/profiles/ca/caInternalAuthOCSPCert.cfg pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/profiles/ca/caFullCMCUserCert.cfg' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/profiles/ca/caFullCMCUserCert.cfg pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/profiles/ca/caFullCMCUserCert.cfg pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/profiles/ca/caRARouterCert.cfg' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/profiles/ca/caRARouterCert.cfg pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/profiles/ca/caRARouterCert.cfg pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/profiles/ca/caSubsystemCert.cfg' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/profiles/ca/caSubsystemCert.cfg pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/profiles/ca/caSubsystemCert.cfg pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/profiles/ca/caSignedLogCert.cfg' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/profiles/ca/caSignedLogCert.cfg pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/profiles/ca/caSignedLogCert.cfg pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/profiles/ca/caEncUserCert.cfg' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/profiles/ca/caEncUserCert.cfg pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/profiles/ca/caEncUserCert.cfg pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/profiles/ca/caOtherCert.cfg' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/profiles/ca/caOtherCert.cfg pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/profiles/ca/caOtherCert.cfg pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/profiles/ca/caInternalAuthServerCert.cfg' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/profiles/ca/caInternalAuthServerCert.cfg pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/profiles/ca/caInternalAuthServerCert.cfg pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/profiles/ca/caManualRenewal.cfg' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/profiles/ca/caManualRenewal.cfg pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/profiles/ca/caManualRenewal.cfg pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/profiles/ca/caTokenUserDelegateSigningKeyEnrollment.cfg' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/profiles/ca/caTokenUserDelegateSigningKeyEnrollment.cfg pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/profiles/ca/caTokenUserDelegateSigningKeyEnrollment.cfg pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/profiles/ca/caTokenMSLoginEnrollment.cfg' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/profiles/ca/caTokenMSLoginEnrollment.cfg pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/profiles/ca/caTokenMSLoginEnrollment.cfg pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/profiles/ca/caOCSPCert.cfg' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/profiles/ca/caOCSPCert.cfg pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/profiles/ca/caOCSPCert.cfg pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/profiles/ca/caInternalAuthTransportCert.cfg' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/profiles/ca/caInternalAuthTransportCert.cfg pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/profiles/ca/caInternalAuthTransportCert.cfg pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/profiles/ca/caTransportCert.cfg' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/profiles/ca/caTransportCert.cfg pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/profiles/ca/caTransportCert.cfg pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/ca/profiles/ca/caDirUserRenewal.cfg' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/ca/profiles/ca/caDirUserRenewal.cfg pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/ca/profiles/ca/caDirUserRenewal.cfg pkispawn : INFO ....... cp -p /usr/share/pki/ca/conf/flatfile.txt /etc/pki/pki-tomcat/ca/flatfile.txt pkispawn : DEBUG ........... chmod 660 /etc/pki/pki-tomcat/ca/flatfile.txt pkispawn : DEBUG ........... chown 17:17 /etc/pki/pki-tomcat/ca/flatfile.txt pkispawn : INFO ....... cp -p /usr/share/pki/ca/conf/registry.cfg /etc/pki/pki-tomcat/ca/registry.cfg pkispawn : DEBUG ........... chmod 660 /etc/pki/pki-tomcat/ca/registry.cfg pkispawn : DEBUG ........... chown 17:17 /etc/pki/pki-tomcat/ca/registry.cfg pkispawn : INFO ....... cp -p /usr/share/pki/ca/conf/adminCert.profile /etc/pki/pki-tomcat/ca/adminCert.profile pkispawn : DEBUG ........... chmod 660 /etc/pki/pki-tomcat/ca/adminCert.profile pkispawn : DEBUG ........... chown 17:17 /etc/pki/pki-tomcat/ca/adminCert.profile pkispawn : INFO ....... cp -p /usr/share/pki/ca/conf/caAuditSigningCert.profile /etc/pki/pki-tomcat/ca/caAuditSigningCert.profile pkispawn : DEBUG ........... chmod 660 /etc/pki/pki-tomcat/ca/caAuditSigningCert.profile pkispawn : DEBUG ........... chown 17:17 /etc/pki/pki-tomcat/ca/caAuditSigningCert.profile pkispawn : INFO ....... cp -p /usr/share/pki/ca/conf/caCert.profile /etc/pki/pki-tomcat/ca/caCert.profile pkispawn : DEBUG ........... chmod 660 /etc/pki/pki-tomcat/ca/caCert.profile pkispawn : DEBUG ........... chown 17:17 /etc/pki/pki-tomcat/ca/caCert.profile pkispawn : INFO ....... cp -p /usr/share/pki/ca/conf/caOCSPCert.profile /etc/pki/pki-tomcat/ca/caOCSPCert.profile pkispawn : DEBUG ........... chmod 660 /etc/pki/pki-tomcat/ca/caOCSPCert.profile pkispawn : DEBUG ........... chown 17:17 /etc/pki/pki-tomcat/ca/caOCSPCert.profile pkispawn : INFO ....... cp -p /usr/share/pki/ca/conf/serverCert.profile /etc/pki/pki-tomcat/ca/serverCert.profile pkispawn : DEBUG ........... chmod 660 /etc/pki/pki-tomcat/ca/serverCert.profile pkispawn : DEBUG ........... chown 17:17 /etc/pki/pki-tomcat/ca/serverCert.profile pkispawn : INFO ....... cp -p /usr/share/pki/ca/conf/subsystemCert.profile /etc/pki/pki-tomcat/ca/subsystemCert.profile pkispawn : DEBUG ........... chmod 660 /etc/pki/pki-tomcat/ca/subsystemCert.profile pkispawn : DEBUG ........... chown 17:17 /etc/pki/pki-tomcat/ca/subsystemCert.profile pkispawn : INFO ....... ln -s /var/lib/pki/pki-tomcat/webapps /var/lib/pki/pki-tomcat/ca/webapps pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/ca/webapps pkispawn : INFO ....... ln -s /var/lib/pki/pki-tomcat/alias /var/lib/pki/pki-tomcat/ca/alias pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/ca/alias pkispawn : INFO ....... ln -s /etc/pki/pki-tomcat/ca /var/lib/pki/pki-tomcat/ca/conf pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/ca/conf pkispawn : INFO ....... ln -s /var/log/pki/pki-tomcat/ca /var/lib/pki/pki-tomcat/ca/logs pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/ca/logs pkispawn : INFO ... selinux disabled. skipping labelling 'pki.server.deployment.scriptlets.selinux_setup' pkispawn : INFO ... deploying 'pki.server.deployment.scriptlets.webapp_deployment' pkispawn : INFO ....... mkdir -p /var/lib/pki/pki-tomcat/webapps/ca pkispawn : DEBUG ........... chmod 770 /var/lib/pki/pki-tomcat/webapps/ca pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca pkispawn : INFO ....... cp -rp /usr/share/pki/ca/webapps/ca /var/lib/pki/pki-tomcat/webapps/ca pkispawn : INFO ....... setting ownerships, permissions, and acls on '/var/lib/pki/pki-tomcat/webapps/ca' pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/GenUnexpectedError.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/GenUnexpectedError.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/GenUnexpectedError.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/index.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/index.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/index.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/404.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/404.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/404.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/500.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/500.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/500.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/services.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/services.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/services.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin' is a directory pkispawn : DEBUG ........... chmod 770 /var/lib/pki/pki-tomcat/webapps/ca/admin pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee' is a directory pkispawn : DEBUG ........... chmod 770 /var/lib/pki/pki-tomcat/webapps/ca/ee pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF' is a directory pkispawn : DEBUG ........... chmod 770 /var/lib/pki/pki-tomcat/webapps/ca/WEB-INF pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/WEB-INF pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent' is a directory pkispawn : DEBUG ........... chmod 770 /var/lib/pki/pki-tomcat/webapps/ca/agent pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/GenUnexpectedError.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/GenUnexpectedError.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/GenUnexpectedError.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/helpfun.js' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/helpfun.js pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/helpfun.js pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/index.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/index.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/index.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/cms-funcs.js' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/cms-funcs.js pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/cms-funcs.js pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/ca' is a directory pkispawn : DEBUG ........... chmod 770 /var/lib/pki/pki-tomcat/webapps/ca/admin/ca pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/ca pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/ca/adminEnroll.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/ca/adminEnroll.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/ca/adminEnroll.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/ca/sendCookie.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/ca/sendCookie.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/ca/sendCookie.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/ca/ImportCert.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/ca/ImportCert.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/ca/ImportCert.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/ca/ImportAdminCert.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/ca/ImportAdminCert.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/ca/ImportAdminCert.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/ca/EnrollSuccess.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/ca/EnrollSuccess.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/ca/EnrollSuccess.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/ca/securitydomainlogin.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/ca/securitydomainlogin.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/ca/securitydomainlogin.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/GenUnexpectedError.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/GenUnexpectedError.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/GenUnexpectedError.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/GenUnauthorized.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/GenUnauthorized.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/GenUnauthorized.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/helpfun.js' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/helpfun.js pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/helpfun.js pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/index.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/index.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/index.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/GenError.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/GenError.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/GenError.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/GenSvcPending.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/GenSvcPending.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/GenSvcPending.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/GenSuccess.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/GenSuccess.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/GenSuccess.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/GenPending.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/GenPending.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/GenPending.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/GenRejected.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/GenRejected.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/GenRejected.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/cms-funcs.js' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/cms-funcs.js pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/cms-funcs.js pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca' is a directory pkispawn : DEBUG ........... chmod 770 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/bench2k.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/bench2k.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/bench2k.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ChallengeRevoke1.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ChallengeRevoke1.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ChallengeRevoke1.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/blank.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/blank.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/blank.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ProfileSubmit.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ProfileSubmit.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ProfileSubmit.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ProfileSelect.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ProfileSelect.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ProfileSelect.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/CertBasedEncryptionEnroll.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/CertBasedEncryptionEnroll.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/CertBasedEncryptionEnroll.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/PortalEnrollment.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/PortalEnrollment.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/PortalEnrollment.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/UserDnEnroll.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/UserDnEnroll.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/UserDnEnroll.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/revocationResult.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/revocationResult.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/revocationResult.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/index.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/index.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/index.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/queryCert.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/queryCert.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/queryCert.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/CertBasedDualEnroll.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/CertBasedDualEnroll.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/CertBasedDualEnroll.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/CertBasedSingleEnroll.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/CertBasedSingleEnroll.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/CertBasedSingleEnroll.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/requestStatus.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/requestStatus.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/requestStatus.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/queryCert.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/queryCert.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/queryCert.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/recoveryMenu.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/recoveryMenu.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/recoveryMenu.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/revocationMenu.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/revocationMenu.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/revocationMenu.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ManUserEnroll.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ManUserEnroll.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ManUserEnroll.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ProfileList.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ProfileList.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ProfileList.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/DisplayCRL.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/DisplayCRL.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/DisplayCRL.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/profileMenu.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/profileMenu.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/profileMenu.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ImportCert.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ImportCert.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ImportCert.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ManCAEnroll.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ManCAEnroll.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ManCAEnroll.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/UserRevocation.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/UserRevocation.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/UserRevocation.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/OCSPResponder.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/OCSPResponder.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/OCSPResponder.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/KeyRecovery.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/KeyRecovery.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/KeyRecovery.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/displayCaCert.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/displayCaCert.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/displayCaCert.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/remoteAuthConfig.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/remoteAuthConfig.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/remoteAuthConfig.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/unrevocationResult.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/unrevocationResult.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/unrevocationResult.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ImportAdminCert.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ImportAdminCert.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ImportAdminCert.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ManServerEnroll.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ManServerEnroll.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ManServerEnroll.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/EnrollSuccess.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/EnrollSuccess.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/EnrollSuccess.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/srchCert.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/srchCert.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/srchCert.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ProfileSubmit.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ProfileSubmit.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ProfileSubmit.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ObjSignPKCS10Enroll.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ObjSignPKCS10Enroll.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ObjSignPKCS10Enroll.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/reasonToRevoke.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/reasonToRevoke.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/reasonToRevoke.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/CMCRevReq.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/CMCRevReq.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/CMCRevReq.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ManRAEnroll.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ManRAEnroll.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ManRAEnroll.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/RevocationSuccess.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/RevocationSuccess.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/RevocationSuccess.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/queryBySerial.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/queryBySerial.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/queryBySerial.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/toDisplayCRL.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/toDisplayCRL.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/toDisplayCRL.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/srchCert.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/srchCert.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/srchCert.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/GetCAChain.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/GetCAChain.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/GetCAChain.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/NISUserEnroll.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/NISUserEnroll.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/NISUserEnroll.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/enrollMenu.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/enrollMenu.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/enrollMenu.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/checkRequest.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/checkRequest.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/checkRequest.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/CMCEnrollment.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/CMCEnrollment.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/CMCEnrollment.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/DirUserEnroll.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/DirUserEnroll.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/DirUserEnroll.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/displayCertFromRequest.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/displayCertFromRequest.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/displayCertFromRequest.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/renewalMenu.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/renewalMenu.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/renewalMenu.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ManObjSignEnroll.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ManObjSignEnroll.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ManObjSignEnroll.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/DirPinUserEnroll.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/DirPinUserEnroll.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/DirPinUserEnroll.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/displayBySerial.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/displayBySerial.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/displayBySerial.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/RenewalSuccess.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/RenewalSuccess.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/RenewalSuccess.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/displayBySerial2.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/displayBySerial2.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/displayBySerial2.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/tabs.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/tabs.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/tabs.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/retrievalMenu.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/retrievalMenu.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/retrievalMenu.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/UserRenewal.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/UserRenewal.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/UserRenewal.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/displayCRL.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/displayCRL.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/displayCRL.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/AIMEnroll.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/AIMEnroll.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/AIMEnroll.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/profileEnrollment' is a directory pkispawn : DEBUG ........... chmod 770 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/profileEnrollment pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/profileEnrollment pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/policyEnrollment' is a directory pkispawn : DEBUG ........... chmod 770 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/policyEnrollment pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/policyEnrollment pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/profileEnrollment/index.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/profileEnrollment/index.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/profileEnrollment/index.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/profileEnrollment/revocationMenu.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/profileEnrollment/revocationMenu.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/profileEnrollment/revocationMenu.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/profileEnrollment/profileMenu.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/profileEnrollment/profileMenu.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/profileEnrollment/profileMenu.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/profileEnrollment/retrievalMenu.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/profileEnrollment/retrievalMenu.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/profileEnrollment/retrievalMenu.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/policyEnrollment/index.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/policyEnrollment/index.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/policyEnrollment/index.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/policyEnrollment/revocationMenu.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/policyEnrollment/revocationMenu.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/policyEnrollment/revocationMenu.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/policyEnrollment/profileMenu.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/policyEnrollment/profileMenu.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/policyEnrollment/profileMenu.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/policyEnrollment/retrievalMenu.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/policyEnrollment/retrievalMenu.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/policyEnrollment/retrievalMenu.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/web.xml' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/web.xml pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/web.xml pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/velocity.properties' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/velocity.properties pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/velocity.properties pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/GenUnexpectedError.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/GenUnexpectedError.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/GenUnexpectedError.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/GenUnauthorized.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/GenUnauthorized.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/GenUnauthorized.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/helpfun.js' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/helpfun.js pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/helpfun.js pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/index.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/index.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/index.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/GenError.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/GenError.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/GenError.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/GenSvcPending.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/GenSvcPending.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/GenSvcPending.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/GenSuccess.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/GenSuccess.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/GenSuccess.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/funcs.js' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/funcs.js pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/funcs.js pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/GenPending.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/GenPending.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/GenPending.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ports.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ports.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ports.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/GenRejected.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/GenRejected.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/GenRejected.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/index.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/index.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/index.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/cms-funcs.js' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/cms-funcs.js pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/cms-funcs.js pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/header.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/header.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/header.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/xenroll.dll' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/xenroll.dll pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/xenroll.dll pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca' is a directory pkispawn : DEBUG ........... chmod 770 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/notImplemented.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/notImplemented.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/notImplemented.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/bulkissuance.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/bulkissuance.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/bulkissuance.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/ProfileSelect.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/ProfileSelect.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/ProfileSelect.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/ProfileReview.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/ProfileReview.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/ProfileReview.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuCRL.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuCRL.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuCRL.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/revocationResult.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/revocationResult.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/revocationResult.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/index.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/index.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/index.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuSrchRequests.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuSrchRequests.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuSrchRequests.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/queryCert.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/queryCert.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/queryCert.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/error.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/error.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/error.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/getStats.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/getStats.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/getStats.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/queryCert.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/queryCert.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/queryCert.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameSearch.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameSearch.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameSearch.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/cloneRedirect.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/cloneRedirect.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/cloneRedirect.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/ProfileList.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/ProfileList.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/ProfileList.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuProfile.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuProfile.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuProfile.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/ImportCert.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/ImportCert.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/ImportCert.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameProfile.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameProfile.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameProfile.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/updateDir.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/updateDir.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/updateDir.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuStats.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuStats.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuStats.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuDisplayCRL.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuDisplayCRL.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuDisplayCRL.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/queryReq.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/queryReq.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/queryReq.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameStats.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameStats.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameStats.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuList.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuList.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuList.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/processReq.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/processReq.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/processReq.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/SrchRevokeCert.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/SrchRevokeCert.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/SrchRevokeCert.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuDir.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuDir.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuDir.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/ListRequests.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/ListRequests.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/ListRequests.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/unrevocationResult.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/unrevocationResult.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/unrevocationResult.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/monitor.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/monitor.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/monitor.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/processCertReq.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/processCertReq.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/processCertReq.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/revokeCert.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/revokeCert.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/revokeCert.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/EnrollSuccess.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/EnrollSuccess.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/EnrollSuccess.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/srchCert.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/srchCert.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/srchCert.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuListReq.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuListReq.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuListReq.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/monitor.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/monitor.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/monitor.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/SrchCert.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/SrchCert.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/SrchCert.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameSrchRequests.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameSrchRequests.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameSrchRequests.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/reasonToRevoke.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/reasonToRevoke.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/reasonToRevoke.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/ProfileProcess.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/ProfileProcess.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/ProfileProcess.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameList.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameList.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameList.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/UpdateDir.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/UpdateDir.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/UpdateDir.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/toUpdateCRL.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/toUpdateCRL.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/toUpdateCRL.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/queryBySerial.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/queryBySerial.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/queryBySerial.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/toDisplayCRL.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/toDisplayCRL.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/toDisplayCRL.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/getOCSPInfo.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/getOCSPInfo.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/getOCSPInfo.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/confirmRevocation.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/confirmRevocation.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/confirmRevocation.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/displayCertFromRequest.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/displayCertFromRequest.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/displayCertFromRequest.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuRevoke.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuRevoke.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuRevoke.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/updateCRL.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/updateCRL.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/updateCRL.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuSearch.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuSearch.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuSearch.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameRevoke.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameRevoke.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameRevoke.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/ProfileApprove.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/ProfileApprove.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/ProfileApprove.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameDisplayCRL.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameDisplayCRL.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameDisplayCRL.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/SrchRequests.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/SrchRequests.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/SrchRequests.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/displayBySerial.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/displayBySerial.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/displayBySerial.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/revokeBySerial.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/revokeBySerial.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/revokeBySerial.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuOCSP.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuOCSP.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuOCSP.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/displayBySerial2.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/displayBySerial2.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/displayBySerial2.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameDir.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameDir.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameDir.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameOCSP.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameOCSP.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameOCSP.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameListReq.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameListReq.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameListReq.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameCRL.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameCRL.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameCRL.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/displayCRL.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/displayCRL.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/displayCRL.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/updateCRL.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/updateCRL.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/updateCRL.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/top.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/top.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/top.html pkispawn : INFO ....... cp -rp /usr/share/pki/server/webapps/pki/admin /var/lib/pki/pki-tomcat/webapps/ca/admin pkispawn : INFO ....... setting ownerships, permissions, and acls on '/var/lib/pki/pki-tomcat/webapps/ca/admin' pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/GenUnexpectedError.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/GenUnexpectedError.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/GenUnexpectedError.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/helpfun.js' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/helpfun.js pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/helpfun.js pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/index.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/index.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/index.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/cms-funcs.js' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/cms-funcs.js pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/cms-funcs.js pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console' is a directory pkispawn : DEBUG ........... chmod 770 /var/lib/pki/pki-tomcat/webapps/ca/admin/console pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/ca' is a directory pkispawn : DEBUG ........... chmod 770 /var/lib/pki/pki-tomcat/webapps/ca/admin/ca pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/ca pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/js' is a directory pkispawn : DEBUG ........... chmod 770 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/js pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/js pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config' is a directory pkispawn : DEBUG ........... chmod 770 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/js/misc.js' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/js/misc.js pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/js/misc.js pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/config_addhsm.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/config_addhsm.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/config_addhsm.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/adminpanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/adminpanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/adminpanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/drminfopanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/drminfopanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/drminfopanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/topmenu.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/topmenu.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/topmenu.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/certrequestpanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/certrequestpanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/certrequestpanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/config_hsmloginpanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/config_hsmloginpanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/config_hsmloginpanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/certchainpanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/certchainpanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/certchainpanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/backupkeycertpanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/backupkeycertpanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/backupkeycertpanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/sidemenu.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/sidemenu.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/sidemenu.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/certprettyprintpanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/certprettyprintpanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/certprettyprintpanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/createsubsystempanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/createsubsystempanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/createsubsystempanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/footer.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/footer.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/footer.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/cainfopanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/cainfopanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/cainfopanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/securitydomainpanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/securitydomainpanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/securitydomainpanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/header.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/header.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/header.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/hierarchypanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/hierarchypanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/hierarchypanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/authdbpanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/authdbpanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/authdbpanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/securitydomainloginpanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/securitydomainloginpanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/securitydomainloginpanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/savepkcs12panel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/savepkcs12panel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/savepkcs12panel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/welcomepanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/welcomepanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/welcomepanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/importcachainpanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/importcachainpanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/importcachainpanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/modulepanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/modulepanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/modulepanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/login.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/login.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/login.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/donepanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/donepanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/donepanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/tksinfopanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/tksinfopanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/tksinfopanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/xml.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/xml.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/xml.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/adminauthenticatepanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/adminauthenticatepanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/adminauthenticatepanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/agentauthenticatepanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/agentauthenticatepanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/agentauthenticatepanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/sizepanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/sizepanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/sizepanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/namepanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/namepanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/namepanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/importadmincertpanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/importadmincertpanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/importadmincertpanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/wizard.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/wizard.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/wizard.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/databasepanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/databasepanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/databasepanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/displaycertchainpanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/displaycertchainpanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/displaycertchainpanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/restorekeycertpanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/restorekeycertpanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/restorekeycertpanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/ca/adminEnroll.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/ca/adminEnroll.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/ca/adminEnroll.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/ca/sendCookie.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/ca/sendCookie.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/ca/sendCookie.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/ca/ImportCert.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/ca/ImportCert.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/ca/ImportCert.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/ca/ImportAdminCert.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/ca/ImportAdminCert.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/ca/ImportAdminCert.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/ca/EnrollSuccess.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/ca/EnrollSuccess.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/ca/EnrollSuccess.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/ca/securitydomainlogin.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/ca/securitydomainlogin.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/ca/securitydomainlogin.template pkispawn : INFO ....... mkdir -p /var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/classes pkispawn : DEBUG ........... chmod 770 /var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/classes pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/classes pkispawn : INFO ....... mkdir -p /var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib pkispawn : DEBUG ........... chmod 770 /var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib pkispawn : INFO ....... ln -s /usr/share/java/pki/pki-certsrv.jar /var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib/pki-certsrv.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib/pki-certsrv.jar pkispawn : INFO ....... ln -s /usr/share/java/pki/pki-cmsbundle.jar /var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib/pki-cmsbundle.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib/pki-cmsbundle.jar pkispawn : INFO ....... ln -s /usr/share/java/pki/pki-cmscore.jar /var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib/pki-cmscore.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib/pki-cmscore.jar pkispawn : INFO ....... ln -s /usr/share/java/pki/pki-cms.jar /var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib/pki-cms.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib/pki-cms.jar pkispawn : INFO ....... ln -s /usr/share/java/pki/pki-cmsutil.jar /var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib/pki-cmsutil.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib/pki-cmsutil.jar pkispawn : INFO ....... ln -s /usr/share/java/pki/pki-nsutil.jar /var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib/pki-nsutil.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib/pki-nsutil.jar pkispawn : INFO ....... ln -s /usr/share/java/pki/pki-ca.jar /var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib/pki-ca.jar pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib/pki-ca.jar pkispawn : INFO ....... setting ownerships, permissions, and acls on '/var/lib/pki/pki-tomcat/webapps/ca' pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/GenUnexpectedError.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/GenUnexpectedError.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/GenUnexpectedError.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/index.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/index.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/index.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/404.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/404.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/404.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/500.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/500.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/500.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/services.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/services.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/services.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin' is a directory pkispawn : DEBUG ........... chmod 770 /var/lib/pki/pki-tomcat/webapps/ca/admin pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee' is a directory pkispawn : DEBUG ........... chmod 770 /var/lib/pki/pki-tomcat/webapps/ca/ee pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF' is a directory pkispawn : DEBUG ........... chmod 770 /var/lib/pki/pki-tomcat/webapps/ca/WEB-INF pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/WEB-INF pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent' is a directory pkispawn : DEBUG ........... chmod 770 /var/lib/pki/pki-tomcat/webapps/ca/agent pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/GenUnexpectedError.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/GenUnexpectedError.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/GenUnexpectedError.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/helpfun.js' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/helpfun.js pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/helpfun.js pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/index.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/index.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/index.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/cms-funcs.js' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/cms-funcs.js pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/cms-funcs.js pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console' is a directory pkispawn : DEBUG ........... chmod 770 /var/lib/pki/pki-tomcat/webapps/ca/admin/console pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/ca' is a directory pkispawn : DEBUG ........... chmod 770 /var/lib/pki/pki-tomcat/webapps/ca/admin/ca pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/ca pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/js' is a directory pkispawn : DEBUG ........... chmod 770 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/js pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/js pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config' is a directory pkispawn : DEBUG ........... chmod 770 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/js/misc.js' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/js/misc.js pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/js/misc.js pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/config_addhsm.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/config_addhsm.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/config_addhsm.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/adminpanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/adminpanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/adminpanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/drminfopanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/drminfopanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/drminfopanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/topmenu.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/topmenu.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/topmenu.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/certrequestpanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/certrequestpanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/certrequestpanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/config_hsmloginpanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/config_hsmloginpanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/config_hsmloginpanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/certchainpanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/certchainpanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/certchainpanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/backupkeycertpanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/backupkeycertpanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/backupkeycertpanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/sidemenu.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/sidemenu.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/sidemenu.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/certprettyprintpanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/certprettyprintpanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/certprettyprintpanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/createsubsystempanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/createsubsystempanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/createsubsystempanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/footer.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/footer.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/footer.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/cainfopanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/cainfopanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/cainfopanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/securitydomainpanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/securitydomainpanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/securitydomainpanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/header.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/header.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/header.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/hierarchypanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/hierarchypanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/hierarchypanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/authdbpanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/authdbpanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/authdbpanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/securitydomainloginpanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/securitydomainloginpanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/securitydomainloginpanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/savepkcs12panel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/savepkcs12panel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/savepkcs12panel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/welcomepanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/welcomepanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/welcomepanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/importcachainpanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/importcachainpanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/importcachainpanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/modulepanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/modulepanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/modulepanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/login.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/login.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/login.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/donepanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/donepanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/donepanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/tksinfopanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/tksinfopanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/tksinfopanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/xml.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/xml.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/xml.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/adminauthenticatepanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/adminauthenticatepanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/adminauthenticatepanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/agentauthenticatepanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/agentauthenticatepanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/agentauthenticatepanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/sizepanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/sizepanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/sizepanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/namepanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/namepanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/namepanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/importadmincertpanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/importadmincertpanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/importadmincertpanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/wizard.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/wizard.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/wizard.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/databasepanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/databasepanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/databasepanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/displaycertchainpanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/displaycertchainpanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/displaycertchainpanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/restorekeycertpanel.vm' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/restorekeycertpanel.vm pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/console/config/restorekeycertpanel.vm pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/ca/adminEnroll.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/ca/adminEnroll.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/ca/adminEnroll.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/ca/sendCookie.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/ca/sendCookie.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/ca/sendCookie.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/ca/ImportCert.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/ca/ImportCert.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/ca/ImportCert.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/ca/ImportAdminCert.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/ca/ImportAdminCert.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/ca/ImportAdminCert.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/ca/EnrollSuccess.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/ca/EnrollSuccess.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/ca/EnrollSuccess.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/admin/ca/securitydomainlogin.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/admin/ca/securitydomainlogin.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/admin/ca/securitydomainlogin.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/GenUnexpectedError.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/GenUnexpectedError.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/GenUnexpectedError.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/GenUnauthorized.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/GenUnauthorized.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/GenUnauthorized.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/helpfun.js' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/helpfun.js pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/helpfun.js pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/index.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/index.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/index.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/GenError.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/GenError.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/GenError.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/GenSvcPending.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/GenSvcPending.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/GenSvcPending.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/GenSuccess.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/GenSuccess.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/GenSuccess.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/GenPending.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/GenPending.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/GenPending.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/GenRejected.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/GenRejected.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/GenRejected.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/cms-funcs.js' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/cms-funcs.js pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/cms-funcs.js pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca' is a directory pkispawn : DEBUG ........... chmod 770 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/bench2k.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/bench2k.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/bench2k.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ChallengeRevoke1.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ChallengeRevoke1.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ChallengeRevoke1.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/blank.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/blank.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/blank.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ProfileSubmit.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ProfileSubmit.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ProfileSubmit.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ProfileSelect.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ProfileSelect.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ProfileSelect.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/CertBasedEncryptionEnroll.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/CertBasedEncryptionEnroll.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/CertBasedEncryptionEnroll.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/PortalEnrollment.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/PortalEnrollment.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/PortalEnrollment.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/UserDnEnroll.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/UserDnEnroll.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/UserDnEnroll.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/revocationResult.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/revocationResult.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/revocationResult.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/index.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/index.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/index.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/queryCert.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/queryCert.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/queryCert.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/CertBasedDualEnroll.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/CertBasedDualEnroll.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/CertBasedDualEnroll.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/CertBasedSingleEnroll.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/CertBasedSingleEnroll.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/CertBasedSingleEnroll.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/requestStatus.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/requestStatus.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/requestStatus.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/queryCert.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/queryCert.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/queryCert.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/recoveryMenu.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/recoveryMenu.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/recoveryMenu.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/revocationMenu.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/revocationMenu.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/revocationMenu.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ManUserEnroll.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ManUserEnroll.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ManUserEnroll.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ProfileList.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ProfileList.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ProfileList.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/DisplayCRL.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/DisplayCRL.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/DisplayCRL.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/profileMenu.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/profileMenu.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/profileMenu.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ImportCert.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ImportCert.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ImportCert.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ManCAEnroll.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ManCAEnroll.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ManCAEnroll.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/UserRevocation.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/UserRevocation.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/UserRevocation.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/OCSPResponder.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/OCSPResponder.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/OCSPResponder.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/KeyRecovery.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/KeyRecovery.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/KeyRecovery.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/displayCaCert.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/displayCaCert.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/displayCaCert.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/remoteAuthConfig.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/remoteAuthConfig.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/remoteAuthConfig.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/unrevocationResult.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/unrevocationResult.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/unrevocationResult.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ImportAdminCert.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ImportAdminCert.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ImportAdminCert.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ManServerEnroll.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ManServerEnroll.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ManServerEnroll.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/EnrollSuccess.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/EnrollSuccess.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/EnrollSuccess.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/srchCert.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/srchCert.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/srchCert.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ProfileSubmit.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ProfileSubmit.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ProfileSubmit.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ObjSignPKCS10Enroll.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ObjSignPKCS10Enroll.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ObjSignPKCS10Enroll.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/reasonToRevoke.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/reasonToRevoke.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/reasonToRevoke.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/CMCRevReq.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/CMCRevReq.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/CMCRevReq.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ManRAEnroll.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ManRAEnroll.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ManRAEnroll.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/RevocationSuccess.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/RevocationSuccess.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/RevocationSuccess.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/queryBySerial.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/queryBySerial.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/queryBySerial.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/toDisplayCRL.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/toDisplayCRL.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/toDisplayCRL.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/srchCert.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/srchCert.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/srchCert.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/GetCAChain.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/GetCAChain.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/GetCAChain.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/NISUserEnroll.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/NISUserEnroll.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/NISUserEnroll.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/enrollMenu.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/enrollMenu.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/enrollMenu.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/checkRequest.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/checkRequest.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/checkRequest.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/CMCEnrollment.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/CMCEnrollment.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/CMCEnrollment.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/DirUserEnroll.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/DirUserEnroll.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/DirUserEnroll.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/displayCertFromRequest.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/displayCertFromRequest.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/displayCertFromRequest.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/renewalMenu.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/renewalMenu.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/renewalMenu.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ManObjSignEnroll.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ManObjSignEnroll.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ManObjSignEnroll.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/DirPinUserEnroll.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/DirPinUserEnroll.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/DirPinUserEnroll.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/displayBySerial.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/displayBySerial.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/displayBySerial.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/RenewalSuccess.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/RenewalSuccess.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/RenewalSuccess.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/displayBySerial2.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/displayBySerial2.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/displayBySerial2.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/tabs.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/tabs.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/tabs.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/retrievalMenu.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/retrievalMenu.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/retrievalMenu.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/UserRenewal.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/UserRenewal.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/UserRenewal.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/displayCRL.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/displayCRL.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/displayCRL.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/AIMEnroll.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/AIMEnroll.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/AIMEnroll.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/profileEnrollment' is a directory pkispawn : DEBUG ........... chmod 770 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/profileEnrollment pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/profileEnrollment pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/policyEnrollment' is a directory pkispawn : DEBUG ........... chmod 770 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/policyEnrollment pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/policyEnrollment pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/profileEnrollment/index.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/profileEnrollment/index.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/profileEnrollment/index.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/profileEnrollment/revocationMenu.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/profileEnrollment/revocationMenu.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/profileEnrollment/revocationMenu.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/profileEnrollment/profileMenu.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/profileEnrollment/profileMenu.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/profileEnrollment/profileMenu.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/profileEnrollment/retrievalMenu.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/profileEnrollment/retrievalMenu.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/profileEnrollment/retrievalMenu.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/policyEnrollment/index.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/policyEnrollment/index.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/policyEnrollment/index.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/policyEnrollment/revocationMenu.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/policyEnrollment/revocationMenu.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/policyEnrollment/revocationMenu.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/policyEnrollment/profileMenu.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/policyEnrollment/profileMenu.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/policyEnrollment/profileMenu.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/policyEnrollment/retrievalMenu.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/policyEnrollment/retrievalMenu.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/policyEnrollment/retrievalMenu.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/web.xml' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/web.xml pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/web.xml pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/velocity.properties' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/velocity.properties pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/velocity.properties pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/classes' is a directory pkispawn : DEBUG ........... chmod 770 /var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/classes pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/classes pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib' is a directory pkispawn : DEBUG ........... chmod 770 /var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib/pki-cms.jar' is a symlink pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib/pki-cms.jar pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib/pki-nsutil.jar' is a symlink pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib/pki-nsutil.jar pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib/pki-cmscore.jar' is a symlink pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib/pki-cmscore.jar pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib/pki-ca.jar' is a symlink pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib/pki-ca.jar pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib/pki-certsrv.jar' is a symlink pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib/pki-certsrv.jar pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib/pki-cmsbundle.jar' is a symlink pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib/pki-cmsbundle.jar pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib/pki-cmsutil.jar' is a symlink pkispawn : DEBUG ........... chown -h 17:17 /var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib/pki-cmsutil.jar pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/GenUnexpectedError.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/GenUnexpectedError.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/GenUnexpectedError.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/GenUnauthorized.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/GenUnauthorized.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/GenUnauthorized.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/helpfun.js' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/helpfun.js pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/helpfun.js pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/index.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/index.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/index.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/GenError.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/GenError.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/GenError.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/GenSvcPending.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/GenSvcPending.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/GenSvcPending.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/GenSuccess.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/GenSuccess.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/GenSuccess.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/funcs.js' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/funcs.js pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/funcs.js pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/GenPending.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/GenPending.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/GenPending.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ports.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ports.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ports.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/GenRejected.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/GenRejected.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/GenRejected.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/index.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/index.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/index.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/cms-funcs.js' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/cms-funcs.js pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/cms-funcs.js pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/header.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/header.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/header.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/xenroll.dll' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/xenroll.dll pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/xenroll.dll pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca' is a directory pkispawn : DEBUG ........... chmod 770 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/notImplemented.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/notImplemented.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/notImplemented.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/bulkissuance.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/bulkissuance.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/bulkissuance.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/ProfileSelect.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/ProfileSelect.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/ProfileSelect.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/ProfileReview.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/ProfileReview.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/ProfileReview.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuCRL.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuCRL.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuCRL.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/revocationResult.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/revocationResult.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/revocationResult.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/index.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/index.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/index.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuSrchRequests.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuSrchRequests.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuSrchRequests.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/queryCert.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/queryCert.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/queryCert.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/error.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/error.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/error.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/getStats.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/getStats.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/getStats.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/queryCert.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/queryCert.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/queryCert.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameSearch.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameSearch.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameSearch.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/cloneRedirect.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/cloneRedirect.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/cloneRedirect.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/ProfileList.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/ProfileList.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/ProfileList.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuProfile.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuProfile.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuProfile.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/ImportCert.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/ImportCert.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/ImportCert.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameProfile.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameProfile.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameProfile.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/updateDir.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/updateDir.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/updateDir.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuStats.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuStats.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuStats.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuDisplayCRL.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuDisplayCRL.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuDisplayCRL.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/queryReq.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/queryReq.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/queryReq.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameStats.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameStats.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameStats.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuList.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuList.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuList.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/processReq.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/processReq.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/processReq.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/SrchRevokeCert.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/SrchRevokeCert.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/SrchRevokeCert.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuDir.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuDir.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuDir.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/ListRequests.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/ListRequests.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/ListRequests.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/unrevocationResult.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/unrevocationResult.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/unrevocationResult.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/monitor.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/monitor.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/monitor.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/processCertReq.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/processCertReq.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/processCertReq.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/revokeCert.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/revokeCert.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/revokeCert.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/EnrollSuccess.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/EnrollSuccess.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/EnrollSuccess.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/srchCert.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/srchCert.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/srchCert.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuListReq.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuListReq.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuListReq.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/monitor.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/monitor.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/monitor.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/SrchCert.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/SrchCert.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/SrchCert.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameSrchRequests.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameSrchRequests.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameSrchRequests.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/reasonToRevoke.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/reasonToRevoke.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/reasonToRevoke.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/ProfileProcess.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/ProfileProcess.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/ProfileProcess.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameList.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameList.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameList.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/UpdateDir.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/UpdateDir.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/UpdateDir.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/toUpdateCRL.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/toUpdateCRL.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/toUpdateCRL.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/queryBySerial.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/queryBySerial.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/queryBySerial.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/toDisplayCRL.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/toDisplayCRL.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/toDisplayCRL.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/getOCSPInfo.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/getOCSPInfo.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/getOCSPInfo.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/confirmRevocation.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/confirmRevocation.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/confirmRevocation.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/displayCertFromRequest.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/displayCertFromRequest.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/displayCertFromRequest.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuRevoke.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuRevoke.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuRevoke.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/updateCRL.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/updateCRL.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/updateCRL.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuSearch.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuSearch.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuSearch.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameRevoke.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameRevoke.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameRevoke.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/ProfileApprove.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/ProfileApprove.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/ProfileApprove.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameDisplayCRL.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameDisplayCRL.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameDisplayCRL.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/SrchRequests.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/SrchRequests.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/SrchRequests.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/displayBySerial.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/displayBySerial.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/displayBySerial.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/revokeBySerial.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/revokeBySerial.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/revokeBySerial.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuOCSP.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuOCSP.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/menuOCSP.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/displayBySerial2.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/displayBySerial2.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/displayBySerial2.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameDir.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameDir.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameDir.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameOCSP.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameOCSP.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameOCSP.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameListReq.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameListReq.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameListReq.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameCRL.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameCRL.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/frameCRL.html pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/displayCRL.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/displayCRL.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/displayCRL.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/updateCRL.template' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/updateCRL.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/updateCRL.template pkispawn : DEBUG ........... '/var/lib/pki/pki-tomcat/webapps/ca/agent/ca/top.html' is a file pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/top.html pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/agent/ca/top.html pkispawn : INFO ....... cp -p /usr/share/pki/ca/conf/Catalina/localhost/ca.xml /etc/pki/pki-tomcat/Catalina/localhost/ca.xml pkispawn : DEBUG ........... chmod 660 /etc/pki/pki-tomcat/Catalina/localhost/ca.xml pkispawn : DEBUG ........... chown 17:17 /etc/pki/pki-tomcat/Catalina/localhost/ca.xml pkispawn : INFO ... assigning slots for 'pki.server.deployment.scriptlets.slot_substitution' pkispawn : INFO ....... copying '/usr/share/pki/ca/conf/CS.cfg' --> '/etc/pki/pki-tomcat/ca/CS.cfg' with slot substitution pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_ROOT]' ==> '/var/lib/pki' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_NAME]' ==> 'pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_AGENT_SECURE_PORT]' ==> '9443' pkispawn : DEBUG ........... slot substitution: '[PKI_EE_SECURE_PORT]' ==> '9443' pkispawn : DEBUG ........... slot substitution: '[PKI_EE_SECURE_CLIENT_AUTH_PORT]' ==> '9443' pkispawn : DEBUG ........... slot substitution: '[PKI_ADMIN_SECURE_PORT]' ==> '9443' pkispawn : DEBUG ........... slot substitution: '[PKI_SECURE_PORT]' ==> '9443' pkispawn : DEBUG ........... slot substitution: '[PKI_UNSECURE_PORT]' ==> '9080' pkispawn : DEBUG ........... slot substitution: '[TOMCAT_SERVER_PORT]' ==> '9005' pkispawn : DEBUG ........... slot substitution: '[PKI_USER]' ==> 'pkiuser' pkispawn : DEBUG ........... slot substitution: '[PKI_GROUP]' ==> 'pkiuser' pkispawn : DEBUG ........... slot substitution: '[PKI_SYSTEMD_SERVICENAME]' ==> 'pki-tomcatd at pki-tomcat.service' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_NAME]' ==> 'pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[INSTALL_TIME]' ==> 'Thu Nov 6 06:57:59 2014' pkispawn : DEBUG ........... slot substitution: '[PKI_PROXY_SECURE_PORT]' ==> '' pkispawn : DEBUG ........... slot substitution: '[PKI_PROXY_UNSECURE_PORT]' ==> '' pkispawn : DEBUG ........... slot substitution: '[PKI_HOSTNAME]' ==> 'cibu-sec88.cisco.com' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_HOSTNAME]' ==> 'cibu-sec88.cisco.com' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_NAME]' ==> 'pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_PIDDIR]' ==> '/var/run/pki/tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_HOSTNAME]' ==> 'cibu-sec88.cisco.com' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_ROOT]' ==> '/var/lib/pki' pkispawn : DEBUG ........... slot substitution: '[PKI_AGENT_SECURE_PORT]' ==> '9443' pkispawn : DEBUG ........... slot substitution: '[PKI_EE_SECURE_PORT]' ==> '9443' pkispawn : DEBUG ........... slot substitution: '[PKI_EE_SECURE_CLIENT_AUTH_PORT]' ==> '9443' pkispawn : DEBUG ........... slot substitution: '[PKI_UNSECURE_PORT]' ==> '9080' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_NAME]' ==> 'pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_RANDOM_NUMBER]' ==> 'Nv11jY3sNpmbKCkkRqYc' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_NAME]' ==> 'pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_NAME]' ==> 'pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_NAME]' ==> 'pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_HOSTNAME]' ==> 'cibu-sec88.cisco.com' pkispawn : DEBUG ........... slot substitution: '[PKI_SSL_SERVER_NICKNAME]' ==> 'Server-Cert cert-pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_NAME]' ==> 'pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_HOSTNAME]' ==> 'cibu-sec88.cisco.com' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_NAME]' ==> 'pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_NAME]' ==> 'pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_NAME]' ==> 'pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SSL_SERVER_NICKNAME]' ==> 'Server-Cert cert-pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_HOSTNAME]' ==> 'cibu-sec88.cisco.com' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_NAME]' ==> 'pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_NAME]' ==> 'pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_CFG_PATH_NAME]' ==> '/etc/pki/pki-tomcat/ca/CS.cfg' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_NAME]' ==> 'pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_ADMIN_SECURE_PORT]' ==> '9443' pkispawn : DEBUG ........... slot substitution: '[PKI_HOSTNAME]' ==> 'cibu-sec88.cisco.com' pkispawn : DEBUG ........... slot substitution: '[PKI_HOSTNAME]' ==> 'cibu-sec88.cisco.com' pkispawn : DEBUG ........... slot substitution: '[PKI_AGENT_SECURE_PORT]' ==> '9443' pkispawn : DEBUG ........... slot substitution: '[PKI_ENABLE_RANDOM_SERIAL_NUMBERS]' ==> 'false' pkispawn : DEBUG ........... slot substitution: '[PKI_ENABLE_RANDOM_SERIAL_NUMBERS]' ==> 'false' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_NAME]' ==> 'pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... chmod 660 /etc/pki/pki-tomcat/ca/CS.cfg pkispawn : DEBUG ........... chown 17:17 /etc/pki/pki-tomcat/ca/CS.cfg pkispawn : INFO ....... copying '/usr/share/pki/setup/pkidaemon_registry' --> '/etc/sysconfig/pki/tomcat/pki-tomcat/pki-tomcat' with slot substitution pkispawn : DEBUG ........... slot substitution: '[PKI_WEB_SERVER_TYPE]' ==> 'tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_USER]' ==> 'pkiuser' pkispawn : DEBUG ........... slot substitution: '[PKI_GROUP]' ==> 'pkiuser' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_NAME]' ==> 'pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_INITSCRIPT]' ==> '/var/lib/pki/pki-tomcat/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_LOCKDIR]' ==> '/var/lock/pki/tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_PIDDIR]' ==> '/var/run/pki/tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_UNSECURE_PORT]' ==> '9080' pkispawn : DEBUG ........... slot substitution: '[TOMCAT_PIDFILE]' ==> '/var/run/pki/tomcat/pki-tomcat.pid' pkispawn : DEBUG ........... chmod 660 /etc/sysconfig/pki/tomcat/pki-tomcat/pki-tomcat pkispawn : DEBUG ........... chown 17:17 /etc/sysconfig/pki/tomcat/pki-tomcat/pki-tomcat pkispawn : INFO ....... copying '/usr/share/pki/server/conf/catalina.properties' --> '/etc/pki/pki-tomcat/catalina.properties' with slot substitution pkispawn : DEBUG ........... slot substitution: '[TOMCAT_INSTANCE_COMMON_LIB]' ==> '/var/lib/pki/pki-tomcat/common/lib/*.jar' pkispawn : DEBUG ........... chmod 660 /etc/pki/pki-tomcat/catalina.properties pkispawn : DEBUG ........... chown 17:17 /etc/pki/pki-tomcat/catalina.properties pkispawn : INFO ....... copying '/usr/share/pki/server/conf/serverCertNick.conf' --> '/etc/pki/pki-tomcat/serverCertNick.conf' with slot substitution pkispawn : DEBUG ........... slot substitution: '[PKI_SSL_SERVER_NICKNAME]' ==> 'Server-Cert cert-pki-tomcat' pkispawn : DEBUG ........... chmod 660 /etc/pki/pki-tomcat/serverCertNick.conf pkispawn : DEBUG ........... chown 17:17 /etc/pki/pki-tomcat/serverCertNick.conf pkispawn : INFO ....... copying '/usr/share/pki/server/conf/server.xml' --> '/etc/pki/pki-tomcat/server.xml' with slot substitution pkispawn : DEBUG ........... slot substitution: '[PKI_HOSTNAME]' ==> 'cibu-sec88.cisco.com' pkispawn : DEBUG ........... slot substitution: '[PKI_UNSECURE_PORT]' ==> '9080' pkispawn : DEBUG ........... slot substitution: '[PKI_HOSTNAME]' ==> 'cibu-sec88.cisco.com' pkispawn : DEBUG ........... slot substitution: '[PKI_AGENT_SECURE_PORT]' ==> '9443' pkispawn : DEBUG ........... slot substitution: '[PKI_HOSTNAME]' ==> 'cibu-sec88.cisco.com' pkispawn : DEBUG ........... slot substitution: '[PKI_EE_SECURE_PORT]' ==> '9443' pkispawn : DEBUG ........... slot substitution: '[PKI_ADMIN_SECURE_PORT]' ==> '9443' pkispawn : DEBUG ........... slot substitution: '[PKI_HOSTNAME]' ==> 'cibu-sec88.cisco.com' pkispawn : DEBUG ........... slot substitution: '[PKI_HOSTNAME]' ==> 'cibu-sec88.cisco.com' pkispawn : DEBUG ........... slot substitution: '[PKI_EE_SECURE_CLIENT_AUTH_PORT]' ==> '9443' pkispawn : DEBUG ........... slot substitution: '[PKI_ADMIN_SECURE_PORT]' ==> '9443' pkispawn : DEBUG ........... slot substitution: '[PKI_HOSTNAME]' ==> 'cibu-sec88.cisco.com' pkispawn : DEBUG ........... slot substitution: '[TOMCAT_SERVER_PORT]' ==> '9005' pkispawn : DEBUG ........... slot substitution: '[PKI_HOSTNAME]' ==> 'cibu-sec88.cisco.com' pkispawn : DEBUG ........... slot substitution: '[PKI_UNSECURE_PORT]' ==> '9080' pkispawn : DEBUG ........... slot substitution: '[PKI_HOSTNAME]' ==> 'cibu-sec88.cisco.com' pkispawn : DEBUG ........... slot substitution: '[PKI_AGENT_SECURE_PORT]' ==> '9443' pkispawn : DEBUG ........... slot substitution: '[PKI_HOSTNAME]' ==> 'cibu-sec88.cisco.com' pkispawn : DEBUG ........... slot substitution: '[PKI_EE_SECURE_PORT]' ==> '9443' pkispawn : DEBUG ........... slot substitution: '[PKI_ADMIN_SECURE_PORT]' ==> '9443' pkispawn : DEBUG ........... slot substitution: '[PKI_HOSTNAME]' ==> 'cibu-sec88.cisco.com' pkispawn : DEBUG ........... slot substitution: '[PKI_ADMIN_SECURE_PORT]' ==> '9443' pkispawn : DEBUG ........... slot substitution: '[PKI_HOSTNAME]' ==> 'cibu-sec88.cisco.com' pkispawn : DEBUG ........... slot substitution: '[TOMCAT_SERVER_PORT]' ==> '9005' pkispawn : DEBUG ........... slot substitution: '[PKI_HOSTNAME]' ==> 'cibu-sec88.cisco.com' pkispawn : DEBUG ........... slot substitution: '[PKI_UNSECURE_PORT]' ==> '9080' pkispawn : DEBUG ........... slot substitution: '[PKI_HOSTNAME]' ==> 'cibu-sec88.cisco.com' pkispawn : DEBUG ........... slot substitution: '[PKI_AGENT_SECURE_PORT]' ==> '9443' pkispawn : DEBUG ........... slot substitution: '[PKI_HOSTNAME]' ==> 'cibu-sec88.cisco.com' pkispawn : DEBUG ........... slot substitution: '[PKI_EE_SECURE_PORT]' ==> '9443' pkispawn : DEBUG ........... slot substitution: '[PKI_ADMIN_SECURE_PORT]' ==> '9443' pkispawn : DEBUG ........... slot substitution: '[PKI_HOSTNAME]' ==> 'cibu-sec88.cisco.com' pkispawn : DEBUG ........... slot substitution: '[PKI_ADMIN_SECURE_PORT]' ==> '9443' pkispawn : DEBUG ........... slot substitution: '[PKI_HOSTNAME]' ==> 'cibu-sec88.cisco.com' pkispawn : DEBUG ........... slot substitution: '[TOMCAT_SERVER_PORT]' ==> '9005' pkispawn : DEBUG ........... slot substitution: '[PKI_HOSTNAME]' ==> 'cibu-sec88.cisco.com' pkispawn : DEBUG ........... slot substitution: '[PKI_UNSECURE_PORT]' ==> '9080' pkispawn : DEBUG ........... slot substitution: '[PKI_HOSTNAME]' ==> 'cibu-sec88.cisco.com' pkispawn : DEBUG ........... slot substitution: '[PKI_AGENT_SECURE_PORT]' ==> '9443' pkispawn : DEBUG ........... slot substitution: '[PKI_HOSTNAME]' ==> 'cibu-sec88.cisco.com' pkispawn : DEBUG ........... slot substitution: '[PKI_EE_SECURE_PORT]' ==> '9443' pkispawn : DEBUG ........... slot substitution: '[PKI_ADMIN_SECURE_PORT]' ==> '9443' pkispawn : DEBUG ........... slot substitution: '[PKI_HOSTNAME]' ==> 'cibu-sec88.cisco.com' pkispawn : DEBUG ........... slot substitution: '[PKI_ADMIN_SECURE_PORT]' ==> '9443' pkispawn : DEBUG ........... slot substitution: '[PKI_HOSTNAME]' ==> 'cibu-sec88.cisco.com' pkispawn : DEBUG ........... slot substitution: '[TOMCAT_SERVER_PORT]' ==> '9005' pkispawn : DEBUG ........... slot substitution: '[TOMCAT_SERVER_PORT]' ==> '9005' pkispawn : DEBUG ........... slot substitution: '[PKI_UNSECURE_PORT_SERVER_COMMENT]' ==> '' pkispawn : DEBUG ........... slot substitution: '[PKI_SECURE_PORT]' ==> '9443' pkispawn : DEBUG ........... slot substitution: '[PKI_UNSECURE_PORT_CONNECTOR_NAME]' ==> 'Unsecure' pkispawn : DEBUG ........... slot substitution: '[PKI_UNSECURE_PORT]' ==> '9080' pkispawn : DEBUG ........... slot substitution: '[PKI_SECURE_PORT_SERVER_COMMENT]' ==> '' pkispawn : DEBUG ........... slot substitution: '[PKI_SECURE_PORT]' ==> '9443' pkispawn : DEBUG ........... slot substitution: '[PKI_SECURE_PORT_CONNECTOR_NAME]' ==> 'Secure' pkispawn : DEBUG ........... slot substitution: '[PKI_HOSTNAME]' ==> 'cibu-sec88.cisco.com' pkispawn : DEBUG ........... slot substitution: '[PKI_AGENT_CLIENTAUTH]' ==> 'want' pkispawn : DEBUG ........... slot substitution: '[TOMCAT_SSL_OPTIONS]' ==> 'ssl2=true,ssl3=true,tls=true' pkispawn : DEBUG ........... slot substitution: '[TOMCAT_SSL2_CIPHERS]' ==> '-SSL2_RC4_128_WITH_MD5,-SSL2_RC4_128_EXPORT40_WITH_MD5,-SSL2_RC2_128_CBC_WITH_MD5,-SSL2_RC2_128_CBC_EXPORT40_WITH_MD5,-SSL2_DES_64_CBC_WITH_MD5,-SSL2_DES_192_EDE3_CBC_WITH_MD5' pkispawn : DEBUG ........... slot substitution: '[TOMCAT_SSL3_CIPHERS]' ==> '-SSL3_FORTEZZA_DMS_WITH_NULL_SHA,-SSL3_FORTEZZA_DMS_WITH_RC4_128_SHA,+SSL3_RSA_WITH_RC4_128_SHA,-SSL3_RSA_EXPORT_WITH_RC4_40_MD5,+SSL3_RSA_WITH_3DES_EDE_CBC_SHA,-SSL3_RSA_WITH_DES_CBC_SHA,-SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5,-SSL3_FORTEZZA_DMS_WITH_FORTEZZA_CBC_SHA,-SSL_RSA_FIPS_WITH_DES_CBC_SHA,+SSL_RSA_FIPS_WITH_3DES_EDE_CBC_SHA,-SSL3_RSA_WITH_NULL_MD5,-TLS_RSA_EXPORT1024_WITH_RC4_56_SHA,-TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA,+TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA' pkispawn : DEBUG ........... slot substitution: '[TOMCAT_TLS_CIPHERS]' ==> '-TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA,-TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA,+TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA,+TLS_ECDH_RSA_WITH_AES_128_CBC_SHA,+TLS_ECDH_RSA_WITH_AES_256_CBC_SHA,-TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA,+TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,+TLS_RSA_WITH_3DES_EDE_CBC_SHA,+TLS_RSA_WITH_AES_128_CBC_SHA,+TLS_RSA_WITH_AES_256_CBC_SHA,+TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA,+TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,-TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA,-TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,-TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,+TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA,+TLS_DHE_DSS_WITH_AES_128_CBC_SHA,+TLS_DHE_DSS_WITH_AES_256_CBC_SHA,+TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA,+TLS_DHE_RSA_WITH_AES_128_CBC_SHA,+TLS_DHE_RSA_WITH_AES_256_CBC_SHA' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_AJP_PORT]' ==> '9009' pkispawn : DEBUG ........... slot substitution: '[PKI_OPEN_AJP_PORT_COMMENT]' ==> '' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_OPEN_TOMCAT_ACCESS_LOG_COMMENT]' ==> '' pkispawn : DEBUG ........... slot substitution: '[PKI_CLOSE_TOMCAT_ACCESS_LOG_COMMENT]' ==> '' pkispawn : DEBUG ........... chmod 660 /etc/pki/pki-tomcat/server.xml pkispawn : DEBUG ........... chown 17:17 /etc/pki/pki-tomcat/server.xml pkispawn : INFO ....... copying '/usr/share/pki/server/conf/context.xml' --> '/etc/pki/pki-tomcat/context.xml' with slot substitution pkispawn : DEBUG ........... chmod 660 /etc/pki/pki-tomcat/context.xml pkispawn : DEBUG ........... chown 17:17 /etc/pki/pki-tomcat/context.xml pkispawn : INFO ....... copying '/usr/share/pki/server/conf/tomcat.conf' --> '/etc/sysconfig/pki-tomcat' with slot substitution pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_TMPDIR]' ==> '/var/lib/pki/pki-tomcat/temp' pkispawn : DEBUG ........... slot substitution: '[PKI_RESTEASY_LIB]' ==> '/usr/share/java/resteasy' pkispawn : DEBUG ........... slot substitution: '[PKI_USER]' ==> 'pkiuser' pkispawn : DEBUG ........... slot substitution: '[PKI_SECURITY_MANAGER]' ==> 'true' pkispawn : DEBUG ........... slot substitution: '[TOMCAT_PIDFILE]' ==> '/var/run/pki/tomcat/pki-tomcat.pid' pkispawn : DEBUG ........... slot substitution: '[TOMCAT_LOG_DIR]' ==> '/var/log/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[APPLICATION_VERSION]' ==> '10.2.1' pkispawn : DEBUG ........... slot substitution: '[PKI_USER]' ==> 'pkiuser' pkispawn : DEBUG ........... slot substitution: '[PKI_SECURITY_MANAGER]' ==> 'true' pkispawn : DEBUG ........... chmod 660 /etc/sysconfig/pki-tomcat pkispawn : DEBUG ........... chown 0:0 /etc/sysconfig/pki-tomcat pkispawn : INFO ....... copying '/usr/share/pki/server/conf/tomcat.conf' --> '/etc/pki/pki-tomcat/tomcat.conf' with slot substitution pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[PKI_TMPDIR]' ==> '/var/lib/pki/pki-tomcat/temp' pkispawn : DEBUG ........... slot substitution: '[PKI_RESTEASY_LIB]' ==> '/usr/share/java/resteasy' pkispawn : DEBUG ........... slot substitution: '[PKI_USER]' ==> 'pkiuser' pkispawn : DEBUG ........... slot substitution: '[PKI_SECURITY_MANAGER]' ==> 'true' pkispawn : DEBUG ........... slot substitution: '[TOMCAT_PIDFILE]' ==> '/var/run/pki/tomcat/pki-tomcat.pid' pkispawn : DEBUG ........... slot substitution: '[TOMCAT_LOG_DIR]' ==> '/var/log/pki/pki-tomcat' pkispawn : DEBUG ........... slot substitution: '[APPLICATION_VERSION]' ==> '10.2.1' pkispawn : DEBUG ........... slot substitution: '[PKI_USER]' ==> 'pkiuser' pkispawn : DEBUG ........... slot substitution: '[PKI_SECURITY_MANAGER]' ==> 'true' pkispawn : DEBUG ........... chmod 660 /etc/pki/pki-tomcat/tomcat.conf pkispawn : DEBUG ........... chown 17:17 /etc/pki/pki-tomcat/tomcat.conf pkispawn : INFO ....... applying in-place slot substitutions on '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/velocity.properties' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_WEBAPPS_NAME]' ==> 'webapps' pkispawn : DEBUG ........... slot substitution: '[PKI_INSTANCE_PATH]' ==> '/var/lib/pki/pki-tomcat' pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/velocity.properties pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/velocity.properties pkispawn : INFO ....... applying in-place slot substitutions on '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/web.xml' pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/web.xml pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/web.xml pkispawn : INFO ....... copying '/usr/share/pki/ca/conf/proxy.conf' --> '/etc/pki/pki-tomcat/ca/proxy.conf' with slot substitution pkispawn : DEBUG ........... slot substitution: '[PKI_AJP_PORT]' ==> '9009' pkispawn : DEBUG ........... slot substitution: '[PKI_HOSTNAME]' ==> 'cibu-sec88.cisco.com' pkispawn : DEBUG ........... slot substitution: '[PKI_AJP_PORT]' ==> '9009' pkispawn : DEBUG ........... slot substitution: '[PKI_HOSTNAME]' ==> 'cibu-sec88.cisco.com' pkispawn : DEBUG ........... slot substitution: '[PKI_AJP_PORT]' ==> '9009' pkispawn : DEBUG ........... slot substitution: '[PKI_HOSTNAME]' ==> 'cibu-sec88.cisco.com' pkispawn : DEBUG ........... slot substitution: '[PKI_AJP_PORT]' ==> '9009' pkispawn : DEBUG ........... slot substitution: '[PKI_HOSTNAME]' ==> 'cibu-sec88.cisco.com' pkispawn : DEBUG ........... slot substitution: '[PKI_AJP_PORT]' ==> '9009' pkispawn : DEBUG ........... slot substitution: '[PKI_HOSTNAME]' ==> 'cibu-sec88.cisco.com' pkispawn : DEBUG ........... slot substitution: '[PKI_AJP_PORT]' ==> '9009' pkispawn : DEBUG ........... slot substitution: '[PKI_HOSTNAME]' ==> 'cibu-sec88.cisco.com' pkispawn : DEBUG ........... slot substitution: '[PKI_AJP_PORT]' ==> '9009' pkispawn : DEBUG ........... slot substitution: '[PKI_HOSTNAME]' ==> 'cibu-sec88.cisco.com' pkispawn : DEBUG ........... slot substitution: '[PKI_AJP_PORT]' ==> '9009' pkispawn : DEBUG ........... slot substitution: '[PKI_HOSTNAME]' ==> 'cibu-sec88.cisco.com' pkispawn : DEBUG ........... chmod 660 /etc/pki/pki-tomcat/ca/proxy.conf pkispawn : DEBUG ........... chown 17:17 /etc/pki/pki-tomcat/ca/proxy.conf pkispawn : INFO ....... applying in-place slot substitutions on '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ProfileSelect.template' pkispawn : DEBUG ........... slot substitution: '[PKI_SUBSYSTEM_TYPE]' ==> 'ca' pkispawn : DEBUG ........... slot substitution: '[PKI_EE_SECURE_CLIENT_AUTH_PORT_UI]' ==> '9443' pkispawn : DEBUG ........... slot substitution: '[PKI_HOSTNAME]' ==> 'cibu-sec88.cisco.com' pkispawn : DEBUG ........... chmod 660 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ProfileSelect.template pkispawn : DEBUG ........... chown 17:17 /var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ProfileSelect.template pkispawn : INFO ... generating 'pki.server.deployment.scriptlets.security_databases' pkispawn : INFO ....... generating '/etc/pki/pki-tomcat/password.conf' pkispawn : INFO ....... generating '/etc/pki/pki-tomcat/pfile' pkispawn : INFO ....... modifying '/etc/pki/pki-tomcat/password.conf' pkispawn : DEBUG ........... chmod 660 /etc/pki/pki-tomcat/password.conf pkispawn : DEBUG ........... chown 17:17 /etc/pki/pki-tomcat/password.conf pkispawn : INFO ....... executing 'certutil -N -d /etc/pki/pki-tomcat/alias -f /etc/pki/pki-tomcat/pfile' pkispawn : INFO ....... modifying '/etc/pki/pki-tomcat/alias/cert8.db' pkispawn : DEBUG ........... chmod 600 /etc/pki/pki-tomcat/alias/cert8.db pkispawn : DEBUG ........... chown 17:17 /etc/pki/pki-tomcat/alias/cert8.db pkispawn : INFO ....... modifying '/etc/pki/pki-tomcat/alias/key3.db' pkispawn : DEBUG ........... chmod 600 /etc/pki/pki-tomcat/alias/key3.db pkispawn : DEBUG ........... chown 17:17 /etc/pki/pki-tomcat/alias/key3.db pkispawn : INFO ....... modifying '/etc/pki/pki-tomcat/alias/secmod.db' pkispawn : DEBUG ........... chmod 600 /etc/pki/pki-tomcat/alias/secmod.db pkispawn : DEBUG ........... chown 17:17 /etc/pki/pki-tomcat/alias/secmod.db pkispawn : INFO ....... executing 'certutil -L -d /etc/pki/pki-tomcat/alias -h internal -n Server-Cert cert-pki-tomcat -f /etc/pki/pki-tomcat/pfile' pkispawn : INFO ....... generating noise file called '/etc/pki/pki-tomcat/ca/noise' and filling it with '1024' random bytes pkispawn : DEBUG ........... chmod 660 /etc/pki/pki-tomcat/ca/noise pkispawn : DEBUG ........... chown 17:17 /etc/pki/pki-tomcat/ca/noise pkispawn : INFO ....... executing 'certutil -S -d /etc/pki/pki-tomcat/alias -h internal -n Server-Cert cert-pki-tomcat -s cn=cibu-sec88.cisco.com,o=2014-11-06 06:57:59 -m 0 -v 12 -c cn=cibu-sec88.cisco.com,o=2014-11-06 06:57:59 -t CTu,CTu,CTu -z /etc/pki/pki-tomcat/ca/noise -f /etc/pki/pki-tomcat/pfile -x' pkispawn : INFO ....... rm -f /etc/pki/pki-tomcat/ca/noise pkispawn : INFO ....... rm -f /etc/pki/pki-tomcat/pfile pkispawn : INFO ....... ln -s /lib/systemd/system/pki-tomcatd at .service /etc/systemd/system/pki-tomcatd.target.wants/pki-tomcatd at pki-tomcat.service pkispawn : DEBUG ........... chown -h 17:17 /etc/systemd/system/pki-tomcatd.target.wants/pki-tomcatd at pki-tomcat.service pkispawn : INFO ... configuring 'pki.server.deployment.scriptlets.configuration' pkispawn : INFO ....... mkdir -p /root/.dogtag/pki-tomcat/ca pkispawn : DEBUG ........... chmod 755 /root/.dogtag/pki-tomcat/ca pkispawn : DEBUG ........... chown 0:0 /root/.dogtag/pki-tomcat/ca pkispawn : INFO ....... generating '/root/.dogtag/pki-tomcat/ca/password.conf' pkispawn : INFO ....... modifying '/root/.dogtag/pki-tomcat/ca/password.conf' pkispawn : DEBUG ........... chmod 660 /root/.dogtag/pki-tomcat/ca/password.conf pkispawn : DEBUG ........... chown 0:0 /root/.dogtag/pki-tomcat/ca/password.conf pkispawn : INFO ....... generating '/root/.dogtag/pki-tomcat/ca/pkcs12_password.conf' pkispawn : INFO ....... modifying '/root/.dogtag/pki-tomcat/ca/pkcs12_password.conf' pkispawn : DEBUG ........... chmod 660 /root/.dogtag/pki-tomcat/ca/pkcs12_password.conf pkispawn : DEBUG ........... chown 17:17 /root/.dogtag/pki-tomcat/ca/pkcs12_password.conf pkispawn : INFO ....... mkdir -p /root/.dogtag/pki-tomcat/ca/alias pkispawn : DEBUG ........... chmod 770 /root/.dogtag/pki-tomcat/ca/alias pkispawn : DEBUG ........... chown 0:0 /root/.dogtag/pki-tomcat/ca/alias pkispawn : INFO ....... executing 'certutil -N -d /root/.dogtag/pki-tomcat/ca/alias -f /root/.dogtag/pki-tomcat/ca/password.conf' pkispawn : INFO ....... executing 'systemctl daemon-reload' pkispawn : INFO ....... executing 'systemctl start pki-tomcatd at pki-tomcat.service' pkispawn : DEBUG ........... No connection - server may still be down pkispawn : DEBUG ........... No connection - exception thrown: HTTPSConnectionPool(host='cibu-sec88.cisco.com', port=9443): Max retries exceeded with url: /ca/admin/ca/getStatus (Caused by : [Errno 111] Connection refused) pkispawn : DEBUG ........... No connection - server may still be down pkispawn : DEBUG ........... No connection - exception thrown: HTTPSConnectionPool(host='cibu-sec88.cisco.com', port=9443): Max retries exceeded with url: /ca/admin/ca/getStatus (Caused by : [Errno 111] Connection refused) pkispawn : DEBUG ........... No connection - server may still be down pkispawn : DEBUG ........... No connection - exception thrown: HTTPSConnectionPool(host='cibu-sec88.cisco.com', port=9443): Max retries exceeded with url: /ca/admin/ca/getStatus (Caused by : [Errno 111] Connection refused) pkispawn : DEBUG ........... 0CArunning10.2.1-0.1.fc20 pkispawn : INFO ....... constructing PKI configuration data. pkispawn : INFO ....... generating noise file called '/root/.dogtag/pki-tomcat/ca/alias/noise' and filling it with '2048' random bytes pkispawn : DEBUG ........... chmod 660 /root/.dogtag/pki-tomcat/ca/alias/noise pkispawn : DEBUG ........... chown 17:17 /root/.dogtag/pki-tomcat/ca/alias/noise pkispawn : INFO ....... executing 'certutil -R -d /root/.dogtag/pki-tomcat/ca/alias -s cn=PKI Administrator,o=cisco.com Security Domain -g 2048 -z /root/.dogtag/pki-tomcat/ca/alias/noise -f /root/.dogtag/pki-tomcat/ca/password.conf -o /root/.dogtag/pki-tomcat/ca/alias/admin_pkcs10.bin' pkispawn : INFO ....... BtoA /root/.dogtag/pki-tomcat/ca/alias/admin_pkcs10.bin /root/.dogtag/pki-tomcat/ca/alias/admin_pkcs10.bin.asc pkispawn : INFO ....... configuring PKI configuration data. pkispawn : DEBUG ....... status: 0 pkispawn : INFO ....... saving CA Signing CSR to file: '/home/kjhawar/dogtag/ca_signing.csr' pkispawn : INFO ....... request: -----BEGIN CERTIFICATE REQUEST----- MIIC6DCCAdACAQAwVjESMBAGA1UEBwwJQmFuZ2Fsb3JlMQ0wCwYDVQQLDARDSUJVMRYwFAYDVQQK DA1DaXNjbyBTeXN0ZW1zMRkwFwYDVQQDDBByb290REcuY2lzY28uY29tMIIBIjANBgkqhkiG9w0B AQEFAAOCAQ8AMIIBCgKCAQEAtF6WxLeX0Mxky8mIa83fygnYwhkR2N6JdZSw4LeQyonDZE0IqY6i x1cGgNrCwfGdpPZ/jUt20Ci0TmvRz7qo2ZL4eoP22plIciJ3AdNCu5CCbNmJZu7HMNMwhf5OIpUH UH69kuRyjAj0RoFbbcJzQ7bwU9Lgk1zdn7QSUNr3F8eVJK0pw7nVk2Q+oNVCk2FEbA9SIxqB3Hhh dgR3ObE9WNPfO6FzX5UEdEzAAg0C3fdFgVRCl/nuMrhh+3GPwAUQtmPQSS2UCKVoXDxblbav+p3o CHu2lB3+X0FqYTFJCahQQtSr/LkrJzH+WJylR4+vj+6lgfIRaI9ldCBSxcuK6QIDAQABoE0wSwYJ KoZIhvcNAQkOMT4wPDAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBxjAZBgkrBgEEAYI3 FAIEDB4KAFMAdQBiAEMAQTANBgkqhkiG9w0BAQsFAAOCAQEAVXKujUBtCMDjRHc2CKxCXiAP+fJY 5hcDwWuPwQHZCNTWtlTU4vRuJlRMoeOmUblkxhehH7D3fDtKRABEeYf0/zChBQmSavI3tYNbgXTJ 0jO2prQj+dJmbeK6jbB4J1N/dFPWKLKdoMpdU8esNM2RiIISRue9vRmLArXQj1WESvKDUpNIYLw9 4kMehN4XyaFdeOgK0xFrF6SY0ws8mw2QetgJEbMCenv3hJY1YmWFo8cgvPQDrdF4BFw5CGgGmJGh KSVG75LYH4Z0gtpTJi+E/tDopKle7W7YKzJGsyxl/FwxvRdQGW0lOmVoorRxeIIoUEg9gIwunXGi e8/fFKpn9A== -----END CERTIFICATE REQUEST----- pkispawn : INFO ... finalizing 'pki.server.deployment.scriptlets.finalization' pkispawn : INFO ....... cp -p /etc/sysconfig/pki/tomcat/pki-tomcat/ca/deployment.cfg /var/log/pki/pki-tomcat/ca/archive/spawn_deployment.cfg.20141106065759 pkispawn : DEBUG ........... chmod 660 /var/log/pki/pki-tomcat/ca/archive/spawn_deployment.cfg.20141106065759 pkispawn : DEBUG ........... chown 17:17 /var/log/pki/pki-tomcat/ca/archive/spawn_deployment.cfg.20141106065759 pkispawn : INFO ....... generating manifest file called '/etc/sysconfig/pki/tomcat/pki-tomcat/ca/manifest' pkispawn : INFO ....... cp -p /etc/sysconfig/pki/tomcat/pki-tomcat/ca/manifest /var/log/pki/pki-tomcat/ca/archive/spawn_manifest.20141106065759 pkispawn : DEBUG ........... chmod 660 /var/log/pki/pki-tomcat/ca/archive/spawn_manifest.20141106065759 pkispawn : DEBUG ........... chown 17:17 /var/log/pki/pki-tomcat/ca/archive/spawn_manifest.20141106065759 pkispawn : INFO ....... executing 'systemctl daemon-reload' pkispawn : INFO ....... executing 'systemctl restart pki-tomcatd at pki-tomcat.service' pkispawn : INFO ....... rm -rf /root/.dogtag/pki-tomcat/ca pkispawn : INFO END spawning subsystem 'CA' of instance 'pki-tomcat' pkispawn : DEBUG ===================================================== DISPLAY CONTENTS OF PKI MASTER DICTIONARY ===================================================== pkispawn : DEBUG { 0: None, 'INSTALL_TIME_SLOT': 'Thu Nov 6 06:57:59 2014', 'PKI_ADMIN_SECURE_PORT_CONNECTOR_NAME_SLOT': 'Unused', 'PKI_ADMIN_SECURE_PORT_SERVER_COMMENT_SLOT': '', 'PKI_ADMIN_SECURE_PORT_SLOT': '9443', 'PKI_AGENT_CLIENTAUTH_SLOT': 'want', 'PKI_AGENT_SECURE_PORT_SLOT': '9443', 'PKI_AJP_PORT_SLOT': '9009', 'PKI_AJP_REDIRECT_PORT_SLOT': '9443', 'PKI_CA_HOSTNAME_SLOT': 'cibu-sec88.cisco.com', 'PKI_CA_PORT_SLOT': '8443', 'PKI_CERT_DB_PASSWORD_SLOT': 'ipcbu123', 'PKI_CFG_PATH_NAME_SLOT': '/etc/pki/pki-tomcat/ca/CS.cfg', 'PKI_CLOSE_AJP_PORT_COMMENT_SLOT': '-->', 'PKI_CLOSE_ENABLE_PROXY_COMMENT_SLOT': '-->', 'PKI_CLOSE_SEPARATE_PORTS_SERVER_COMMENT_SLOT': '-->', 'PKI_CLOSE_SEPARATE_PORTS_WEB_COMMENT_SLOT': '-->', 'PKI_CLOSE_STANDALONE_COMMENT_SLOT': '-->', 'PKI_CLOSE_TOMCAT_ACCESS_LOG_COMMENT_SLOT': '', 'PKI_EE_SECURE_CLIENT_AUTH_PORT_CONNECTOR_NAME_SLOT': 'Unused', 'PKI_EE_SECURE_CLIENT_AUTH_PORT_SERVER_COMMENT_SLOT': '', 'PKI_EE_SECURE_CLIENT_AUTH_PORT_SLOT': '9443', 'PKI_EE_SECURE_CLIENT_AUTH_PORT_UI_SLOT': '9443', 'PKI_EE_SECURE_PORT_CONNECTOR_NAME_SLOT': 'Unused', 'PKI_EE_SECURE_PORT_SERVER_COMMENT_SLOT': '', 'PKI_EE_SECURE_PORT_SLOT': '9443', 'PKI_ENABLE_RANDOM_SERIAL_NUMBERS': 'false', 'PKI_GROUP_SLOT': 'pkiuser', 'PKI_HOSTNAME_SLOT': 'cibu-sec88.cisco.com', 'PKI_INSTANCE_INITSCRIPT_SLOT': '/var/lib/pki/pki-tomcat/pki-tomcat', 'PKI_INSTANCE_NAME_SLOT': 'pki-tomcat', 'PKI_INSTANCE_PATH_SLOT': '/var/lib/pki/pki-tomcat', 'PKI_INSTANCE_ROOT_SLOT': '/var/lib/pki', 'PKI_LOCKDIR_SLOT': '/var/lock/pki/tomcat', 'PKI_OPEN_AJP_PORT_COMMENT_SLOT': '', 'PKI_SECURE_PORT_SLOT': '9443', 'PKI_SECURITY_MANAGER_SLOT': 'true', 'PKI_SERVER_XML_CONF_SLOT': '/etc/pki/pki-tomcat/server.xml', 'PKI_SSL_SERVER_NICKNAME_SLOT': 'Server-Cert cert-pki-tomcat', 'PKI_STANDALONE_SLOT': 'false', 'PKI_SUBSYSTEM_TYPE_SLOT': 'ca', 'PKI_SYSTEMD_SERVICENAME_SLOT': 'pki-tomcatd at pki-tomcat.service', 'PKI_TMPDIR_SLOT': '/var/lib/pki/pki-tomcat/temp', 'PKI_UNSECURE_PORT_CONNECTOR_NAME_SLOT': 'Unsecure', 'PKI_UNSECURE_PORT_SERVER_COMMENT_SLOT': '', 'PKI_UNSECURE_PORT_SLOT': '9080', 'PKI_USER_SLOT': 'pkiuser', 'PKI_WEBAPPS_NAME_SLOT': 'webapps', 'PKI_WEB_SERVER_TYPE_SLOT': 'tomcat', 'TOKENDB_HOST_SLOT': 'localhost.localdomain', 'TOKENDB_PORT_SLOT': '389', 'TOKENDB_ROOT_SLOT': 'o=pki-tomcat-CA', 'TOMCAT_CFG_SLOT': '/etc/pki/pki-tomcat/tomcat.conf', 'TOMCAT_INSTANCE_COMMON_LIB_SLOT': '/var/lib/pki/pki-tomcat/common/lib/*.jar', 'TOMCAT_LOG_DIR_SLOT': '/var/log/pki/pki-tomcat', 'TOMCAT_PIDFILE_SLOT': '/var/run/pki/tomcat/pki-tomcat.pid', 'TOMCAT_SERVER_PORT_SLOT': '9005', 'TOMCAT_SSL2_CIPHERS_SLOT': '-SSL2_RC4_128_WITH_MD5,-SSL2_RC4_128_EXPORT40_WITH_MD5,-SSL2_RC2_128_CBC_WITH_MD5,-SSL2_RC2_128_CBC_EXPORT40_WITH_MD5,-SSL2_DES_64_CBC_WITH_MD5,-SSL2_DES_192_EDE3_CBC_WITH_MD5', 'TOMCAT_SSL3_CIPHERS_SLOT': '-SSL3_FORTEZZA_DMS_WITH_NULL_SHA,-SSL3_FORTEZZA_DMS_WITH_RC4_128_SHA,+SSL3_RSA_WITH_RC4_128_SHA,-SSL3_RSA_EXPORT_WITH_RC4_40_MD5,+SSL3_RSA_WITH_3DES_EDE_CBC_SHA,-SSL3_RSA_WITH_DES_CBC_SHA,-SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5,-SSL3_FORTEZZA_DMS_WITH_FORTEZZA_CBC_SHA,-SSL_RSA_FIPS_WITH_DES_CBC_SHA,+SSL_RSA_FIPS_WITH_3DES_EDE_CBC_SHA,-SSL3_RSA_WITH_NULL_MD5,-TLS_RSA_EXPORT1024_WITH_RC4_56_SHA,-TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA,+TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA', 'TOMCAT_SSL_OPTIONS_SLOT': 'ssl2=true,ssl3=true,tls=true', 'TOMCAT_TLS_CIPHERS_SLOT': '-TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA,-TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA,+TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA,+TLS_ECDH_RSA_WITH_AES_128_CBC_SHA,+TLS_ECDH_RSA_WITH_AES_256_CBC_SHA,-TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA,+TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,+TLS_RSA_WITH_3DES_EDE_CBC_SHA,+TLS_RSA_WITH_AES_128_CBC_SHA,+TLS_RSA_WITH_AES_256_CBC_SHA,+TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA,+TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,-TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA,-TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,-TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,+TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA,+TLS_DHE_DSS_WITH_AES_128_CBC_SHA,+TLS_DHE_DSS_WITH_AES_256_CBC_SHA,+TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA,+TLS_DHE_RSA_WITH_AES_128_CBC_SHA,+TLS_DHE_RSA_WITH_AES_256_CBC_SHA', 'TPS_DIR_SLOT': '/usr/share/pki/ca', '__name__': 'PKI Master Dictionary', 'application_version': '10.2.1', 'destroy_scriplets': '\ninitialization\nconfiguration\nwebapp_deployment\nsubsystem_layout\nsecurity_databases\ninstance_layout\nselinux_setup\ninfrastructure_layout\nfinalization', 'home_dir': '/root', 'jni_jar_dir': '/usr/lib/java', 'pki_admin_cert_file': '/root/.dogtag/pki-tomcat/ca_admin.cert', 'pki_admin_cert_request_type': 'pkcs10', 'pki_admin_dualkey': 'False', 'pki_admin_email': 'caadmin at cisco.com', 'pki_admin_keysize': '2048', 'pki_admin_name': 'caadmin', 'pki_admin_nickname': 'PKI Administrator', 'pki_admin_password': 'XXXXXXXX', 'pki_admin_profile_id': 'caAdminCert', 'pki_admin_subject_dn': 'cn=PKI Administrator,o=cisco.com Security Domain', 'pki_admin_uid': 'caadmin', 'pki_ajp_port': '9009', 'pki_apache_commons_collections_jar': '/usr/share/java/apache-commons-collections.jar', 'pki_apache_commons_collections_jar_link': '/var/lib/pki/pki-tomcat/common/lib/apache-commons-collections.jar', 'pki_apache_commons_io_jar': '/usr/share/java/apache-commons-io.jar', 'pki_apache_commons_io_jar_link': '/var/lib/pki/pki-tomcat/common/lib/apache-commons-io.jar', 'pki_apache_commons_lang_jar': '/usr/share/java/apache-commons-lang.jar', 'pki_apache_commons_lang_jar_link': '/var/lib/pki/pki-tomcat/common/lib/apache-commons-lang.jar', 'pki_apache_commons_logging_jar': '/usr/share/java/apache-commons-logging.jar', 'pki_apache_commons_logging_jar_link': '/var/lib/pki/pki-tomcat/common/lib/apache-commons-logging.jar', 'pki_architecture': 64, 'pki_audit_group': 'pkiaudit', 'pki_audit_signing_key_algorithm': 'SHA256withRSA', 'pki_audit_signing_key_size': '2048', 'pki_audit_signing_key_type': 'rsa', 'pki_audit_signing_nickname': 'auditSigningCert cert-pki-tomcat CA', 'pki_audit_signing_signing_algorithm': 'SHA256withRSA', 'pki_audit_signing_subject_dn': 'cn=CA Audit Signing Certificate,o=cisco.com Security Domain', 'pki_audit_signing_tag': 'audit_signing', 'pki_audit_signing_token': 'Internal Key Storage Token', 'pki_backup_keys': 'False', 'pki_backup_password': 'XXXXXXXX', 'pki_ca_hostname': 'cibu-sec88.cisco.com', 'pki_ca_jar': '/usr/share/java/pki/pki-ca.jar', 'pki_ca_jar_link': '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib/pki-ca.jar', 'pki_ca_port': '8443', 'pki_ca_signing_key_algorithm': 'SHA256withRSA', 'pki_ca_signing_key_size': '2048', 'pki_ca_signing_key_type': 'rsa', 'pki_ca_signing_nickname': 'caSigningCert cert-pki-tomcat CA', 'pki_ca_signing_signing_algorithm': 'SHA256withRSA', 'pki_ca_signing_subject_dn': 'cn=rootDG.cisco.com,o=Cisco Systems,ou=CIBU,L=Bangalore', 'pki_ca_signing_tag': 'signing', 'pki_ca_signing_token': 'Internal Key Storage Token', 'pki_cert_database': '/etc/pki/pki-tomcat/alias/cert8.db', 'pki_certificate_timestamp': '2014-11-06 06:57:59', 'pki_certsrv_jar': '/usr/share/java/pki/pki-certsrv.jar', 'pki_certsrv_jar_link': '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib/pki-certsrv.jar', 'pki_cgroup_cpu_systemd_service': '/sys/fs/cgroup/cpu\\,cpuacct/system//lib/systemd/system/pki-tomcatd at .service//lib/systemd/system/pki-tomcatd at .service', 'pki_cgroup_cpu_systemd_service_path': '/sys/fs/cgroup/cpu\\,cpuacct/system//lib/systemd/system/pki-tomcatd at .service', 'pki_cgroup_systemd_service': '/sys/fs/cgroup/systemd/system//lib/systemd/system/pki-tomcatd at .service/pki-tomcat', 'pki_cgroup_systemd_service_path': '/sys/fs/cgroup/systemd/system//lib/systemd/system/pki-tomcatd at .service', 'pki_client_admin_cert': '/root/.dogtag/pki-tomcat/ca_admin.cert', 'pki_client_admin_cert_p12': '/root/.dogtag/pki-tomcat/ca_admin_cert.p12', 'pki_client_cert_database': '/root/.dogtag/pki-tomcat/ca/alias/cert8.db', 'pki_client_database_dir': '/root/.dogtag/pki-tomcat/ca/alias', 'pki_client_database_password': 'XXXXXXXX', 'pki_client_database_purge': 'True', 'pki_client_dir': '/root/.dogtag/pki-tomcat', 'pki_client_key_database': '/root/.dogtag/pki-tomcat/ca/alias/key3.db', 'pki_client_password_conf': '/root/.dogtag/pki-tomcat/ca/password.conf', 'pki_client_pin': 'XXXXXXXX', 'pki_client_pkcs12_password': 'XXXXXXXX', 'pki_client_pkcs12_password_conf': '/root/.dogtag/pki-tomcat/ca/pkcs12_password.conf', 'pki_client_secmod_database': '/root/.dogtag/pki-tomcat/ca/alias/secmod.db', 'pki_client_subsystem_dir': '/root/.dogtag/pki-tomcat/ca', 'pki_clone': 'False', 'pki_clone_pkcs12_password': 'XXXXXXXX', 'pki_clone_pkcs12_path': '', 'pki_clone_replicate_schema': 'True', 'pki_clone_replication_clone_port': '', 'pki_clone_replication_master_port': '', 'pki_clone_replication_security': 'None', 'pki_clone_setup_replication': 'True', 'pki_clone_uri': '', 'pki_cms': '/usr/share/java/pki/pki-cms.jar', 'pki_cms_jar_link': '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib/pki-cms.jar', 'pki_cmsbundle': '/usr/share/java/pki/pki-cmsbundle.jar', 'pki_cmsbundle_jar_link': '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib/pki-cmsbundle.jar', 'pki_cmscore': '/usr/share/java/pki/pki-cmscore.jar', 'pki_cmscore_jar_link': '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib/pki-cmscore.jar', 'pki_cmsutil': '/usr/share/java/pki/pki-cmsutil.jar', 'pki_cmsutil_jar_link': '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib/pki-cmsutil.jar', 'pki_commons_codec_jar': '/usr/share/java/commons-codec.jar', 'pki_commons_codec_jar_link': '/var/lib/pki/pki-tomcat/common/lib/apache-commons-codec.jar', 'pki_configuration_path': '/etc/pki', 'pki_database_path': '/etc/pki/pki-tomcat/alias', 'pki_default_deployment_cfg': '/etc/pki/default.cfg', 'pki_default_deployment_cfg_replica': '/etc/sysconfig/pki/tomcat/pki-tomcat/ca/default.cfg', 'pki_deployed_instance_name': None, 'pki_deployment_executable': 'pkispawn', 'pki_dns_domainname': 'cisco.com', 'pki_ds_base_dn': 'o=pki-tomcat-CA', 'pki_ds_bind_dn': 'cn=Directory Manager', 'pki_ds_create_new_db': 'True', 'pki_ds_database': 'pki-tomcat-CA', 'pki_ds_hostname': 'localhost.localdomain', 'pki_ds_ldap_port': '389', 'pki_ds_ldaps_port': '636', 'pki_ds_password': 'XXXXXXXX', 'pki_ds_remove_data': 'True', 'pki_ds_secure_connection': 'False', 'pki_enable_access_log': 'True', 'pki_enable_java_debugger': 'False', 'pki_enable_proxy': 'False', 'pki_external': 'True', 'pki_external_ca_cert_chain_path': '/etc/pki/pki-tomcat/external_ca_chain.cert', 'pki_external_ca_cert_path': '/etc/pki/pki-tomcat/external_ca.cert', 'pki_external_csr_path': '/home/kjhawar/dogtag/ca_signing.csr', 'pki_external_step_two': 'False', 'pki_gid': 17, 'pki_group': 'pkiuser', 'pki_hostname': 'cibu-sec88.cisco.com', 'pki_http_port': '9080', 'pki_httpclient_jar': '/usr/share/java/httpcomponents/httpclient.jar', 'pki_httpclient_jar_link': '/var/lib/pki/pki-tomcat/common/lib/httpclient.jar', 'pki_httpcore_jar': '/usr/share/java/httpcomponents/httpcore.jar', 'pki_httpcore_jar_link': '/var/lib/pki/pki-tomcat/common/lib/httpcore.jar', 'pki_https_port': '9443', 'pki_import_admin_cert': 'False', 'pki_install_time': 'Thu Nov 6 06:57:59 2014', 'pki_instance_conf_link': '/var/lib/pki/pki-tomcat/conf', 'pki_instance_conf_log4j_properties': '/etc/pki/pki-tomcat/log4j.properties', 'pki_instance_configuration_path': '/etc/pki/pki-tomcat', 'pki_instance_database_link': '/var/lib/pki/pki-tomcat/alias', 'pki_instance_lib': '/var/lib/pki/pki-tomcat/lib', 'pki_instance_lib_log4j_properties': '/var/lib/pki/pki-tomcat/lib/log4j.properties', 'pki_instance_log_path': '/var/log/pki/pki-tomcat', 'pki_instance_logs_link': '/var/lib/pki/pki-tomcat/logs', 'pki_instance_name': 'pki-tomcat', 'pki_instance_path': '/var/lib/pki/pki-tomcat', 'pki_instance_registry_path': '/etc/sysconfig/pki/tomcat/pki-tomcat', 'pki_instance_systemd_link': '/var/lib/pki/pki-tomcat/pki-tomcat', 'pki_instance_type': 'Tomcat', 'pki_instance_type_registry_path': '/etc/sysconfig/pki/tomcat', 'pki_issuing_ca': 'External CA', 'pki_issuing_ca_hostname': 'cibu-sec88.cisco.com', 'pki_issuing_ca_https_port': '8443', 'pki_issuing_ca_uri': 'https://cibu-sec88.cisco.com:8443', 'pki_jackson_annotations_jar': '/usr/share/java/jackson-annotations.jar', 'pki_jackson_core_asl_jar': '/usr/share/java/jackson/jackson-core-asl.jar', 'pki_jackson_core_jar': '/usr/share/java/jackson-core.jar', 'pki_jackson_databind_jar': '/usr/share/java/jackson-databind.jar', 'pki_jackson_jaxrs_base_jar': '/usr/share/java/jackson-jaxrs-providers/jackson-jaxrs-base.jar', 'pki_jackson_jaxrs_jar': '/usr/share/java/jackson/jackson-jaxrs.jar', 'pki_jackson_jaxrs_json_provider_jar': '/usr/share/java/jackson-jaxrs-providers/jackson-jaxrs-json-provider.jar', 'pki_jackson_mapper_asl_jar': '/usr/share/java/jackson/jackson-mapper-asl.jar', 'pki_jackson_module_jaxb_annotations_jar': '/usr/share/java/jackson-module-jaxb-annotations.jar', 'pki_jackson_mrbean_jar': '/usr/share/java/jackson/jackson-mrbean.jar', 'pki_jackson_smile_jar': '/usr/share/java/jackson/jackson-smile.jar', 'pki_jackson_xc_jar': '/usr/share/java/jackson/jackson-xc.jar', 'pki_javassist_jar': '/usr/share/java/javassist.jar', 'pki_javassist_jar_link': '/var/lib/pki/pki-tomcat/common/lib/javassist.jar', 'pki_jss_jar': '/usr/lib/java/jss4.jar', 'pki_jss_jar_link': '/var/lib/pki/pki-tomcat/common/lib/jss4.jar', 'pki_key_database': '/etc/pki/pki-tomcat/alias/key3.db', 'pki_kra_jar': '/usr/share/java/pki/pki-kra.jar', 'pki_kra_jar_link': '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib/pki-kra.jar', 'pki_ldapjdk_jar': '/usr/share/java/ldapjdk.jar', 'pki_ldapjdk_jar_link': '/var/lib/pki/pki-tomcat/common/lib/ldapjdk.jar', 'pki_log_path': '/var/log/pki', 'pki_manifest': '/etc/sysconfig/pki/tomcat/pki-tomcat/ca/manifest', 'pki_manifest_spawn_archive': '/var/log/pki/pki-tomcat/ca/archive/spawn_manifest.20141106065759', 'pki_nsutil': '/usr/share/java/pki/pki-nsutil.jar', 'pki_nsutil_jar_link': '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib/pki-nsutil.jar', 'pki_ocsp_jar': '/usr/share/java/pki/pki-ocsp.jar', 'pki_ocsp_jar_link': '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib/pki-ocsp.jar', 'pki_ocsp_signing_key_algorithm': 'SHA256withRSA', 'pki_ocsp_signing_key_size': '2048', 'pki_ocsp_signing_key_type': 'rsa', 'pki_ocsp_signing_nickname': 'ocspSigningCert cert-pki-tomcat CA', 'pki_ocsp_signing_signing_algorithm': 'SHA256withRSA', 'pki_ocsp_signing_subject_dn': 'cn=CA OCSP Signing Certificate,o=cisco.com Security Domain', 'pki_ocsp_signing_tag': 'ocsp_signing', 'pki_ocsp_signing_token': 'Internal Key Storage Token', 'pki_one_time_pin': 'XXXXXXXX', 'pki_path': '/var/lib/pki', 'pki_pin': 'XXXXXXXX', 'pki_proxy_http_port': '80', 'pki_proxy_https_port': '443', 'pki_random_serial_numbers_enable': 'False', 'pki_registry_initscript_command': 'systemctl restart pki-tomcatd at pki-tomcat.service', 'pki_registry_path': '/etc/sysconfig/pki', 'pki_req_ext_add': 'True', 'pki_req_ext_critical': 'True', 'pki_req_ext_data': '1E0A00530075006200430041', 'pki_req_ext_oid': '1.3.6.1.4.1.311.20.2', 'pki_restart_configured_instance': 'True', 'pki_resteasy_atom_provider_jar': '/usr/share/java/resteasy/resteasy-atom-provider.jar', 'pki_resteasy_client_jar': '/usr/share/java/resteasy/resteasy-client.jar', 'pki_resteasy_jackson_provider_jar': '/usr/share/java/resteasy/resteasy-jackson-provider.jar', 'pki_resteasy_jaxb_provider_jar': '/usr/share/java/resteasy/resteasy-jaxb-provider.jar', 'pki_resteasy_jaxrs_api_jar': '/usr/share/java/resteasy/jaxrs-api.jar', 'pki_resteasy_jaxrs_jar': '/usr/share/java/resteasy/resteasy-jaxrs.jar', 'pki_root_prefix': '', 'pki_scannotation_jar': '/usr/share/java/scannotation.jar', 'pki_scannotation_jar_link': '/var/lib/pki/pki-tomcat/common/lib/scannotation.jar', 'pki_secmod_database': '/etc/pki/pki-tomcat/alias/secmod.db', 'pki_security_domain_hostname': 'cibu-sec88.cisco.com', 'pki_security_domain_https_port': '8443', 'pki_security_domain_name': 'cisco.com Security Domain', 'pki_security_domain_password': 'XXXXXXXX', 'pki_security_domain_type': 'new', 'pki_security_domain_user': 'caadmin', 'pki_security_manager': 'true', 'pki_self_signed_issuer_name': 'cn=cibu-sec88.cisco.com,o=2014-11-06 06:57:59', 'pki_self_signed_nickname': 'Server-Cert cert-pki-tomcat', 'pki_self_signed_noise_bytes': 1024, 'pki_self_signed_noise_file': '/etc/pki/pki-tomcat/ca/noise', 'pki_self_signed_serial_number': 0, 'pki_self_signed_subject': 'cn=cibu-sec88.cisco.com,o=2014-11-06 06:57:59', 'pki_self_signed_token': 'internal', 'pki_self_signed_trustargs': 'CTu,CTu,CTu', 'pki_self_signed_validity_period': 12, 'pki_share_db': 'False', 'pki_shared_password_conf': '/etc/pki/pki-tomcat/password.conf', 'pki_shared_pfile': '/etc/pki/pki-tomcat/pfile', 'pki_skip_configuration': 'False', 'pki_skip_installation': 'False', 'pki_source_admincert_profile': '/usr/share/pki/ca/conf/adminCert.profile', 'pki_source_caauditsigningcert_profile': '/usr/share/pki/ca/conf/caAuditSigningCert.profile', 'pki_source_cacert_profile': '/usr/share/pki/ca/conf/caCert.profile', 'pki_source_caocspcert_profile': '/usr/share/pki/ca/conf/caOCSPCert.profile', 'pki_source_catalina_properties': '/usr/share/pki/server/conf/catalina.properties', 'pki_source_conf_path': '/usr/share/pki/ca/conf', 'pki_source_context_xml': '/usr/share/pki/server/conf/context.xml', 'pki_source_cs_cfg': '/usr/share/pki/ca/conf/CS.cfg', 'pki_source_emails': '/usr/share/pki/ca/emails', 'pki_source_flatfile_txt': '/usr/share/pki/ca/conf/flatfile.txt', 'pki_source_profiles': '/usr/share/pki/ca/profiles', 'pki_source_proxy_conf': '/usr/share/pki/ca/conf/proxy.conf', 'pki_source_registry': '/usr/share/pki/setup/pkidaemon_registry', 'pki_source_registry_cfg': '/usr/share/pki/ca/conf/registry.cfg', 'pki_source_server_path': '/usr/share/pki/server/conf', 'pki_source_server_xml': '/usr/share/pki/server/conf/server.xml', 'pki_source_servercert_profile': '/usr/share/pki/ca/conf/serverCert.profile', 'pki_source_servercertnick_conf': '/usr/share/pki/server/conf/serverCertNick.conf', 'pki_source_setup_path': '/usr/share/pki/setup', 'pki_source_subsystem_path': '/usr/share/pki/ca', 'pki_source_subsystemcert_profile': '/usr/share/pki/ca/conf/subsystemCert.profile', 'pki_source_tomcat_conf': '/usr/share/pki/server/conf/tomcat.conf', 'pki_spawn_log': '/var/log/pki/pki-ca-spawn.20141106065759.log', 'pki_ssl_server_key_algorithm': 'SHA256withRSA', 'pki_ssl_server_key_size': '2048', 'pki_ssl_server_key_type': 'rsa', 'pki_ssl_server_nickname': 'Server-Cert cert-pki-tomcat', 'pki_ssl_server_subject_dn': 'cn=cibu-sec88.cisco.com,o=cisco.com Security Domain', 'pki_ssl_server_tag': 'sslserver', 'pki_ssl_server_token': 'Internal Key Storage Token', 'pki_standalone': 'false', 'pki_storage_tag': 'storage', 'pki_subordinate': 'False', 'pki_subordinate_create_new_security_domain': 'False', 'pki_subordinate_security_domain_name': 'cisco.com Subordinate Security Domain', 'pki_subsystem': 'CA', 'pki_subsystem_archive_log_path': '/var/log/pki/pki-tomcat/ca/archive', 'pki_subsystem_conf_link': '/var/lib/pki/pki-tomcat/ca/conf', 'pki_subsystem_configuration_password_conf_link': '/etc/pki/pki-tomcat/ca/password.conf', 'pki_subsystem_configuration_path': '/etc/pki/pki-tomcat/ca', 'pki_subsystem_database_link': '/var/lib/pki/pki-tomcat/ca/alias', 'pki_subsystem_emails_path': '/var/lib/pki/pki-tomcat/ca/emails', 'pki_subsystem_key_algorithm': 'SHA256withRSA', 'pki_subsystem_key_size': '2048', 'pki_subsystem_key_type': 'rsa', 'pki_subsystem_log_path': '/var/log/pki/pki-tomcat/ca', 'pki_subsystem_logs_link': '/var/lib/pki/pki-tomcat/ca/logs', 'pki_subsystem_name': 'CA cibu-sec88.cisco.com 9443', 'pki_subsystem_nickname': 'subsystemCert cert-pki-tomcat', 'pki_subsystem_path': '/var/lib/pki/pki-tomcat/ca', 'pki_subsystem_profiles_path': '/var/lib/pki/pki-tomcat/ca/profiles', 'pki_subsystem_registry_link': '/var/lib/pki/pki-tomcat/ca/registry', 'pki_subsystem_registry_path': '/etc/sysconfig/pki/tomcat/pki-tomcat/ca', 'pki_subsystem_signed_audit_log_path': '/var/log/pki/pki-tomcat/ca/signedAudit', 'pki_subsystem_subject_dn': 'cn=Subsystem Certificate,o=cisco.com Security Domain', 'pki_subsystem_tag': 'subsystem', 'pki_subsystem_token': 'Internal Key Storage Token', 'pki_subsystem_tomcat_webapps_link': '/var/lib/pki/pki-tomcat/ca/webapps', 'pki_subsystem_type': 'ca', 'pki_symkey_jar': '/usr/lib/java/symkey.jar', 'pki_symkey_jar_link': '/var/lib/pki/pki-tomcat/common/lib/symkey.jar', 'pki_systemd_service': '/lib/systemd/system/pki-tomcatd at .service', 'pki_systemd_service_link': '/etc/systemd/system/pki-tomcatd.target.wants/pki-tomcatd at pki-tomcat.service', 'pki_systemd_target': '/lib/systemd/system/pki-tomcatd.target', 'pki_systemd_target_wants': '/etc/systemd/system/pki-tomcatd.target.wants', 'pki_target_admincert_profile': '/etc/pki/pki-tomcat/ca/adminCert.profile', 'pki_target_caauditsigningcert_profile': '/etc/pki/pki-tomcat/ca/caAuditSigningCert.profile', 'pki_target_cacert_profile': '/etc/pki/pki-tomcat/ca/caCert.profile', 'pki_target_caocspcert_profile': '/etc/pki/pki-tomcat/ca/caOCSPCert.profile', 'pki_target_catalina_properties': '/etc/pki/pki-tomcat/catalina.properties', 'pki_target_context_xml': '/etc/pki/pki-tomcat/context.xml', 'pki_target_cs_cfg': '/etc/pki/pki-tomcat/ca/CS.cfg', 'pki_target_flatfile_txt': '/etc/pki/pki-tomcat/ca/flatfile.txt', 'pki_target_profileselect_template': '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ProfileSelect.template', 'pki_target_proxy_conf': '/etc/pki/pki-tomcat/ca/proxy.conf', 'pki_target_registry': '/etc/sysconfig/pki/tomcat/pki-tomcat/pki-tomcat', 'pki_target_registry_cfg': '/etc/pki/pki-tomcat/ca/registry.cfg', 'pki_target_server_xml': '/etc/pki/pki-tomcat/server.xml', 'pki_target_servercert_profile': '/etc/pki/pki-tomcat/ca/serverCert.profile', 'pki_target_servercertnick_conf': '/etc/pki/pki-tomcat/serverCertNick.conf', 'pki_target_subsystem_web_xml': '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/web.xml', 'pki_target_subsystem_web_xml_orig': '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/web.xml.orig', 'pki_target_subsystemcert_profile': '/etc/pki/pki-tomcat/ca/subsystemCert.profile', 'pki_target_tomcat_conf': '/etc/pki/pki-tomcat/tomcat.conf', 'pki_target_tomcat_conf_instance_id': '/etc/sysconfig/pki-tomcat', 'pki_target_velocity_properties': '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/velocity.properties', 'pki_theme_enable': 'True', 'pki_theme_server_dir': '/usr/share/pki/common-ui', 'pki_timestamp': '20141106065759', 'pki_tks_jar': '/usr/share/java/pki/pki-tks.jar', 'pki_tks_jar_link': '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib/pki-tks.jar', 'pki_token_name': 'internal', 'pki_token_password': 'XXXXXXXX', 'pki_tomcat_bin_link': '/var/lib/pki/pki-tomcat/bin', 'pki_tomcat_bin_path': '/usr/share/tomcat/bin', 'pki_tomcat_common_lib_path': '/var/lib/pki/pki-tomcat/common/lib', 'pki_tomcat_common_path': '/var/lib/pki/pki-tomcat/common', 'pki_tomcat_jar': '/usr/share/java/pki/pki-tomcat.jar', 'pki_tomcat_jar_link': '/var/lib/pki/pki-tomcat/common/lib/pki-tomcat.jar', 'pki_tomcat_lib_path': '/usr/share/tomcat/lib', 'pki_tomcat_server_port': '9005', 'pki_tomcat_systemd': '/usr/sbin/tomcat', 'pki_tomcat_tmpdir_path': '/var/lib/pki/pki-tomcat/temp', 'pki_tomcat_webapps_path': '/var/lib/pki/pki-tomcat/webapps', 'pki_tomcat_webapps_subsystem_path': '/var/lib/pki/pki-tomcat/webapps/ca', 'pki_tomcat_webapps_subsystem_webinf_classes_path': '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/classes', 'pki_tomcat_webapps_subsystem_webinf_lib_path': '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib', 'pki_tomcat_work_catalina_host_path': '/var/lib/pki/pki-tomcat/work/Catalina/localhost', 'pki_tomcat_work_catalina_host_run_path': '/var/lib/pki/pki-tomcat/work/Catalina/localhost/_', 'pki_tomcat_work_catalina_host_subsystem_path': '/var/lib/pki/pki-tomcat/work/Catalina/localhost/ca', 'pki_tomcat_work_catalina_path': '/var/lib/pki/pki-tomcat/work/Catalina', 'pki_tomcat_work_path': '/var/lib/pki/pki-tomcat/work', 'pki_tomcatjss_jar': '/usr/share/java/tomcatjss.jar', 'pki_tomcatjss_jar_link': '/var/lib/pki/pki-tomcat/common/lib/tomcatjss.jar', 'pki_tps_jar': '/usr/share/java/pki/pki-tps.jar', 'pki_tps_jar_link': '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib/pki-tps.jar', 'pki_transport_tag': 'transport', 'pki_uid': 17, 'pki_user': 'pkiuser', 'pki_user_deployment_cfg': 'd1.cfg', 'pki_user_deployment_cfg_replica': '/etc/sysconfig/pki/tomcat/pki-tomcat/ca/deployment.cfg', 'pki_user_deployment_cfg_spawn_archive': '/var/log/pki/pki-tomcat/ca/archive/spawn_deployment.cfg.20141106065759', 'pki_velocity_jar': '/usr/share/java/velocity.jar', 'pki_velocity_jar_link': '/var/lib/pki/pki-tomcat/common/lib/velocity.jar', 'pki_xerces_j2_jar': '/usr/share/java/xerces-j2.jar', 'pki_xerces_j2_jar_link': '/var/lib/pki/pki-tomcat/common/lib/xerces-j2.jar', 'pki_xml_commons_apis_jar': '/usr/share/java/xml-commons-apis.jar', 'pki_xml_commons_apis_jar_link': '/var/lib/pki/pki-tomcat/common/lib/xml-commons-apis.jar', 'pki_xml_commons_resolver_jar': '/usr/share/java/xml-commons-resolver.jar', 'pki_xml_commons_resolver_jar_link': '/var/lib/pki/pki-tomcat/common/lib/xml-commons-resolver.jar', 'resteasy_lib': '/usr/share/java/resteasy', 'sensitive_parameters': '\npki_admin_password\npki_backup_password\npki_client_database_password\npki_client_pin\npki_client_pkcs12_password\npki_clone_pkcs12_password\npki_ds_password\npki_one_time_pin\npki_pin\npki_security_domain_password\npki_token_password', 'spawn_scriplets': '\ninitialization\ninfrastructure_layout\ninstance_layout\nsubsystem_layout\nselinux_setup\nwebapp_deployment\nslot_substitution\nsecurity_databases\nconfiguration\nfinalization'} ========================================================================== INSTALLATION SUMMARY ========================================================================== Administrator's username: caadmin To check the status of the subsystem: systemctl status pki-tomcatd at pki-tomcat.service To restart the subsystem: systemctl restart pki-tomcatd at pki-tomcat.service The URL for the subsystem is: https://cibu-sec88.cisco.com:9443/ca ========================================================================== Script done on Thursday 06 November 2014 06:58:51 AM IST -------------- next part -------------- Script started on Thursday 06 November 2014 07:12:56 AM IST Loading deployment configuration from d2.cfg. pkispawn : DEBUG ===================================================== DISPLAY CONTENTS OF PKI SLOTS DICTIONARY ===================================================== pkispawn : DEBUG { 'INSTALL_TIME_SLOT': '[INSTALL_TIME]', 'PKI_ADMIN_SECURE_PORT_CONNECTOR_NAME_SLOT': '[PKI_ADMIN_SECURE_PORT_CONNECTOR_NAME]', 'PKI_ADMIN_SECURE_PORT_SERVER_COMMENT_SLOT': '[PKI_ADMIN_SECURE_PORT_SERVER_COMMENT]', 'PKI_ADMIN_SECURE_PORT_SLOT': '[PKI_ADMIN_SECURE_PORT]', 'PKI_AGENT_CLIENTAUTH_SLOT': '[PKI_AGENT_CLIENTAUTH]', 'PKI_AGENT_SECURE_PORT_SLOT': '[PKI_AGENT_SECURE_PORT]', 'PKI_AJP_PORT_SLOT': '[PKI_AJP_PORT]', 'PKI_AJP_REDIRECT_PORT_SLOT': '[PKI_AJP_REDIRECT_PORT]', 'PKI_CA_HOSTNAME_SLOT': '[PKI_CA_HOSTNAME]', 'PKI_CA_PORT_SLOT': '[PKI_CA_PORT]', 'PKI_CERT_DB_PASSWORD_SLOT': '[PKI_CERT_DB_PASSWORD]', 'PKI_CFG_PATH_NAME_SLOT': '[PKI_CFG_PATH_NAME]', 'PKI_CLOSE_AJP_PORT_COMMENT_SLOT': '[PKI_CLOSE_AJP_PORT_COMMENT]', 'PKI_CLOSE_ENABLE_PROXY_COMMENT_SLOT': '[PKI_CLOSE_ENABLE_PROXY_COMMENT]', 'PKI_CLOSE_SEPARATE_PORTS_SERVER_COMMENT_SLOT': '[PKI_CLOSE_SEPARATE_PORTS_SERVER_COMMENT]', 'PKI_CLOSE_SEPARATE_PORTS_WEB_COMMENT_SLOT': '[PKI_CLOSE_SEPARATE_PORTS_WEB_COMMENT]', 'PKI_CLOSE_STANDALONE_COMMENT_SLOT': '[PKI_CLOSE_STANDALONE_COMMENT]', 'PKI_CLOSE_TOMCAT_ACCESS_LOG_COMMENT_SLOT': '[PKI_CLOSE_TOMCAT_ACCESS_LOG_COMMENT]', 'PKI_EE_SECURE_CLIENT_AUTH_PORT_CONNECTOR_NAME_SLOT': '[PKI_EE_SECURE_CLIENT_AUTH_PORT_CONNECTOR_NAME]', 'PKI_EE_SECURE_CLIENT_AUTH_PORT_SERVER_COMMENT_SLOT': '[PKI_EE_SECURE_CLIENT_AUTH_PORT_SERVER_COMMENT]', 'PKI_EE_SECURE_CLIENT_AUTH_PORT_SLOT': '[PKI_EE_SECURE_CLIENT_AUTH_PORT]', 'PKI_EE_SECURE_CLIENT_AUTH_PORT_UI_SLOT': '[PKI_EE_SECURE_CLIENT_AUTH_PORT_UI]', 'PKI_EE_SECURE_PORT_CONNECTOR_NAME_SLOT': '[PKI_EE_SECURE_PORT_CONNECTOR_NAME]', 'PKI_EE_SECURE_PORT_SERVER_COMMENT_SLOT': '[PKI_EE_SECURE_PORT_SERVER_COMMENT]', 'PKI_EE_SECURE_PORT_SLOT': '[PKI_EE_SECURE_PORT]', 'PKI_ENABLE_RANDOM_SERIAL_NUMBERS': '[PKI_ENABLE_RANDOM_SERIAL_NUMBERS]', 'PKI_GROUP_SLOT': '[PKI_GROUP]', 'PKI_HOSTNAME_SLOT': '[PKI_HOSTNAME]', 'PKI_INSTANCE_INITSCRIPT_SLOT': '[PKI_INSTANCE_INITSCRIPT]', 'PKI_INSTANCE_NAME_SLOT': '[PKI_INSTANCE_NAME]', 'PKI_INSTANCE_PATH_SLOT': '[PKI_INSTANCE_PATH]', 'PKI_INSTANCE_ROOT_SLOT': '[PKI_INSTANCE_ROOT]', 'PKI_LOCKDIR_SLOT': '[PKI_LOCKDIR]', 'PKI_OPEN_AJP_PORT_COMMENT_SLOT': '[PKI_OPEN_AJP_PORT_COMMENT]', 'PKI_OPEN_ENABLE_PROXY_COMMENT_SLOT': '[PKI_OPEN_ENABLE_PROXY_COMMENT]', 'PKI_OPEN_SEPARATE_PORTS_SERVER_COMMENT_SLOT': '[PKI_OPEN_SEPARATE_PORTS_SERVER_COMMENT]', 'PKI_OPEN_SEPARATE_PORTS_WEB_COMMENT_SLOT': '[PKI_OPEN_SEPARATE_PORTS_WEB_COMMENT]', 'PKI_OPEN_STANDALONE_COMMENT_SLOT': '[PKI_OPEN_STANDALONE_COMMENT]', 'PKI_OPEN_TOMCAT_ACCESS_LOG_COMMENT_SLOT': '[PKI_OPEN_TOMCAT_ACCESS_LOG_COMMENT]', 'PKI_PIDDIR_SLOT': '[PKI_PIDDIR]', 'PKI_PROXY_SECURE_PORT_SLOT': '[PKI_PROXY_SECURE_PORT]', 'PKI_PROXY_UNSECURE_PORT_SLOT': '[PKI_PROXY_UNSECURE_PORT]', 'PKI_RANDOM_NUMBER_SLOT': '[PKI_RANDOM_NUMBER]', 'PKI_REGISTRY_FILE_SLOT': '[PKI_REGISTRY_FILE]', 'PKI_RESTEASY_LIB_SLOT': '[PKI_RESTEASY_LIB]', 'PKI_SECURE_PORT_CONNECTOR_NAME_SLOT': '[PKI_SECURE_PORT_CONNECTOR_NAME]', 'PKI_SECURE_PORT_SERVER_COMMENT_SLOT': '[PKI_SECURE_PORT_SERVER_COMMENT]', 'PKI_SECURE_PORT_SLOT': '[PKI_SECURE_PORT]', 'PKI_SECURITY_MANAGER_SLOT': '[PKI_SECURITY_MANAGER]', 'PKI_SERVER_XML_CONF_SLOT': '[PKI_SERVER_XML_CONF]', 'PKI_SSL_SERVER_NICKNAME_SLOT': '[PKI_SSL_SERVER_NICKNAME]', 'PKI_STANDALONE_SLOT': '[PKI_STANDALONE]', 'PKI_SUBSYSTEM_TYPE_SLOT': '[PKI_SUBSYSTEM_TYPE]', 'PKI_SYSTEMD_SERVICENAME_SLOT': '[PKI_SYSTEMD_SERVICENAME]', 'PKI_TMPDIR_SLOT': '[PKI_TMPDIR]', 'PKI_UNSECURE_PORT_CONNECTOR_NAME_SLOT': '[PKI_UNSECURE_PORT_CONNECTOR_NAME]', 'PKI_UNSECURE_PORT_SERVER_COMMENT_SLOT': '[PKI_UNSECURE_PORT_SERVER_COMMENT]', 'PKI_UNSECURE_PORT_SLOT': '[PKI_UNSECURE_PORT]', 'PKI_USER_SLOT': '[PKI_USER]', 'PKI_WEBAPPS_NAME_SLOT': '[PKI_WEBAPPS_NAME]', 'PKI_WEB_SERVER_TYPE_SLOT': '[PKI_WEB_SERVER_TYPE]', 'TOKENDB_HOST_SLOT': '[TOKENDB_HOST]', 'TOKENDB_PORT_SLOT': '{TOKENDB_PORT]', 'TOKENDB_ROOT_SLOT': '[TOKENDB_ROOT]', 'TOMCAT_CFG_SLOT': '[TOMCAT_CFG]', 'TOMCAT_INSTANCE_COMMON_LIB_SLOT': '[TOMCAT_INSTANCE_COMMON_LIB]', 'TOMCAT_LOG_DIR_SLOT': '[TOMCAT_LOG_DIR]', 'TOMCAT_PIDFILE_SLOT': '[TOMCAT_PIDFILE]', 'TOMCAT_SERVER_PORT_SLOT': '[TOMCAT_SERVER_PORT]', 'TOMCAT_SSL2_CIPHERS_SLOT': '[TOMCAT_SSL2_CIPHERS]', 'TOMCAT_SSL3_CIPHERS_SLOT': '[TOMCAT_SSL3_CIPHERS]', 'TOMCAT_SSL_OPTIONS_SLOT': '[TOMCAT_SSL_OPTIONS]', 'TOMCAT_TLS_CIPHERS_SLOT': '[TOMCAT_TLS_CIPHERS]', 'TPS_DIR_SLOT': '[TPS_DIR]', 'application_version': '[APPLICATION_VERSION]'} pkispawn : DEBUG ===================================================== DISPLAY CONTENTS OF PKI MASTER DICTIONARY ===================================================== pkispawn : DEBUG { 0: None, 'INSTALL_TIME_SLOT': 'Thu Nov 6 07:12:56 2014', 'PKI_ADMIN_SECURE_PORT_CONNECTOR_NAME_SLOT': 'Unused', 'PKI_ADMIN_SECURE_PORT_SERVER_COMMENT_SLOT': '', 'PKI_ADMIN_SECURE_PORT_SLOT': '9443', 'PKI_AGENT_CLIENTAUTH_SLOT': 'want', 'PKI_AGENT_SECURE_PORT_SLOT': '9443', 'PKI_AJP_PORT_SLOT': '9009', 'PKI_AJP_REDIRECT_PORT_SLOT': '9443', 'PKI_CA_HOSTNAME_SLOT': 'cibu-sec88.cisco.com', 'PKI_CA_PORT_SLOT': '8443', 'PKI_CERT_DB_PASSWORD_SLOT': 'ipcbu123', 'PKI_CFG_PATH_NAME_SLOT': '/etc/pki/pki-tomcat/ca/CS.cfg', 'PKI_CLOSE_AJP_PORT_COMMENT_SLOT': '-->', 'PKI_CLOSE_ENABLE_PROXY_COMMENT_SLOT': '-->', 'PKI_CLOSE_SEPARATE_PORTS_SERVER_COMMENT_SLOT': '-->', 'PKI_CLOSE_SEPARATE_PORTS_WEB_COMMENT_SLOT': '-->', 'PKI_CLOSE_STANDALONE_COMMENT_SLOT': '-->', 'PKI_CLOSE_TOMCAT_ACCESS_LOG_COMMENT_SLOT': '', 'PKI_EE_SECURE_CLIENT_AUTH_PORT_CONNECTOR_NAME_SLOT': 'Unused', 'PKI_EE_SECURE_CLIENT_AUTH_PORT_SERVER_COMMENT_SLOT': '', 'PKI_EE_SECURE_CLIENT_AUTH_PORT_SLOT': '9443', 'PKI_EE_SECURE_CLIENT_AUTH_PORT_UI_SLOT': '9443', 'PKI_EE_SECURE_PORT_CONNECTOR_NAME_SLOT': 'Unused', 'PKI_EE_SECURE_PORT_SERVER_COMMENT_SLOT': '', 'PKI_EE_SECURE_PORT_SLOT': '9443', 'PKI_ENABLE_RANDOM_SERIAL_NUMBERS': 'false', 'PKI_GROUP_SLOT': 'pkiuser', 'PKI_HOSTNAME_SLOT': 'cibu-sec88.cisco.com', 'PKI_INSTANCE_INITSCRIPT_SLOT': '/var/lib/pki/pki-tomcat/pki-tomcat', 'PKI_INSTANCE_NAME_SLOT': 'pki-tomcat', 'PKI_INSTANCE_PATH_SLOT': '/var/lib/pki/pki-tomcat', 'PKI_INSTANCE_ROOT_SLOT': '/var/lib/pki', 'PKI_LOCKDIR_SLOT': '/var/lock/pki/tomcat', 'PKI_OPEN_AJP_PORT_COMMENT_SLOT': '', 'PKI_SECURE_PORT_SLOT': '9443', 'PKI_SECURITY_MANAGER_SLOT': 'true', 'PKI_SERVER_XML_CONF_SLOT': '/etc/pki/pki-tomcat/server.xml', 'PKI_SSL_SERVER_NICKNAME_SLOT': 'Server-Cert cert-pki-tomcat', 'PKI_STANDALONE_SLOT': 'false', 'PKI_SUBSYSTEM_TYPE_SLOT': 'ca', 'PKI_SYSTEMD_SERVICENAME_SLOT': 'pki-tomcatd at pki-tomcat.service', 'PKI_TMPDIR_SLOT': '/var/lib/pki/pki-tomcat/temp', 'PKI_UNSECURE_PORT_CONNECTOR_NAME_SLOT': 'Unsecure', 'PKI_UNSECURE_PORT_SERVER_COMMENT_SLOT': '', 'PKI_UNSECURE_PORT_SLOT': '9080', 'PKI_USER_SLOT': 'pkiuser', 'PKI_WEBAPPS_NAME_SLOT': 'webapps', 'PKI_WEB_SERVER_TYPE_SLOT': 'tomcat', 'TOKENDB_HOST_SLOT': 'localhost.localdomain', 'TOKENDB_PORT_SLOT': '389', 'TOKENDB_ROOT_SLOT': 'o=pki-tomcat-CA', 'TOMCAT_CFG_SLOT': '/etc/pki/pki-tomcat/tomcat.conf', 'TOMCAT_INSTANCE_COMMON_LIB_SLOT': '/var/lib/pki/pki-tomcat/common/lib/*.jar', 'TOMCAT_LOG_DIR_SLOT': '/var/log/pki/pki-tomcat', 'TOMCAT_PIDFILE_SLOT': '/var/run/pki/tomcat/pki-tomcat.pid', 'TOMCAT_SERVER_PORT_SLOT': '9005', 'TOMCAT_SSL2_CIPHERS_SLOT': '-SSL2_RC4_128_WITH_MD5,-SSL2_RC4_128_EXPORT40_WITH_MD5,-SSL2_RC2_128_CBC_WITH_MD5,-SSL2_RC2_128_CBC_EXPORT40_WITH_MD5,-SSL2_DES_64_CBC_WITH_MD5,-SSL2_DES_192_EDE3_CBC_WITH_MD5', 'TOMCAT_SSL3_CIPHERS_SLOT': '-SSL3_FORTEZZA_DMS_WITH_NULL_SHA,-SSL3_FORTEZZA_DMS_WITH_RC4_128_SHA,+SSL3_RSA_WITH_RC4_128_SHA,-SSL3_RSA_EXPORT_WITH_RC4_40_MD5,+SSL3_RSA_WITH_3DES_EDE_CBC_SHA,-SSL3_RSA_WITH_DES_CBC_SHA,-SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5,-SSL3_FORTEZZA_DMS_WITH_FORTEZZA_CBC_SHA,-SSL_RSA_FIPS_WITH_DES_CBC_SHA,+SSL_RSA_FIPS_WITH_3DES_EDE_CBC_SHA,-SSL3_RSA_WITH_NULL_MD5,-TLS_RSA_EXPORT1024_WITH_RC4_56_SHA,-TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA,+TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA', 'TOMCAT_SSL_OPTIONS_SLOT': 'ssl2=true,ssl3=true,tls=true', 'TOMCAT_TLS_CIPHERS_SLOT': '-TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA,-TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA,+TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA,+TLS_ECDH_RSA_WITH_AES_128_CBC_SHA,+TLS_ECDH_RSA_WITH_AES_256_CBC_SHA,-TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA,+TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,+TLS_RSA_WITH_3DES_EDE_CBC_SHA,+TLS_RSA_WITH_AES_128_CBC_SHA,+TLS_RSA_WITH_AES_256_CBC_SHA,+TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA,+TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,-TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA,-TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,-TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,+TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA,+TLS_DHE_DSS_WITH_AES_128_CBC_SHA,+TLS_DHE_DSS_WITH_AES_256_CBC_SHA,+TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA,+TLS_DHE_RSA_WITH_AES_128_CBC_SHA,+TLS_DHE_RSA_WITH_AES_256_CBC_SHA', 'TPS_DIR_SLOT': '/usr/share/pki/ca', '__name__': 'PKI Master Dictionary', 'application_version': '10.2.1', 'destroy_scriplets': '\ninitialization\nconfiguration\nwebapp_deployment\nsubsystem_layout\nsecurity_databases\ninstance_layout\nselinux_setup\ninfrastructure_layout\nfinalization', 'home_dir': '/root', 'jni_jar_dir': '/usr/lib/java', 'pki_admin_cert_file': '/root/.dogtag/pki-tomcat/ca_admin.cert', 'pki_admin_cert_request_type': 'pkcs10', 'pki_admin_dualkey': 'False', 'pki_admin_email': 'caadmin at cisco.com', 'pki_admin_keysize': '2048', 'pki_admin_name': 'caadmin', 'pki_admin_nickname': 'PKI Administrator', 'pki_admin_password': 'XXXXXXXX', 'pki_admin_profile_id': 'caAdminCert', 'pki_admin_subject_dn': 'cn=PKI Administrator,o=cisco.com Security Domain', 'pki_admin_uid': 'caadmin', 'pki_ajp_port': '9009', 'pki_apache_commons_collections_jar': '/usr/share/java/apache-commons-collections.jar', 'pki_apache_commons_collections_jar_link': '/var/lib/pki/pki-tomcat/common/lib/apache-commons-collections.jar', 'pki_apache_commons_io_jar': '/usr/share/java/apache-commons-io.jar', 'pki_apache_commons_io_jar_link': '/var/lib/pki/pki-tomcat/common/lib/apache-commons-io.jar', 'pki_apache_commons_lang_jar': '/usr/share/java/apache-commons-lang.jar', 'pki_apache_commons_lang_jar_link': '/var/lib/pki/pki-tomcat/common/lib/apache-commons-lang.jar', 'pki_apache_commons_logging_jar': '/usr/share/java/apache-commons-logging.jar', 'pki_apache_commons_logging_jar_link': '/var/lib/pki/pki-tomcat/common/lib/apache-commons-logging.jar', 'pki_architecture': 64, 'pki_audit_group': 'pkiaudit', 'pki_audit_signing_key_algorithm': 'SHA256withRSA', 'pki_audit_signing_key_size': '2048', 'pki_audit_signing_key_type': 'rsa', 'pki_audit_signing_nickname': 'auditSigningCert cert-pki-tomcat CA', 'pki_audit_signing_signing_algorithm': 'SHA256withRSA', 'pki_audit_signing_subject_dn': 'cn=CA Audit Signing Certificate,o=cisco.com Security Domain', 'pki_audit_signing_tag': 'audit_signing', 'pki_audit_signing_token': 'Internal Key Storage Token', 'pki_backup_keys': 'False', 'pki_backup_password': 'XXXXXXXX', 'pki_ca_hostname': 'cibu-sec88.cisco.com', 'pki_ca_jar': '/usr/share/java/pki/pki-ca.jar', 'pki_ca_jar_link': '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib/pki-ca.jar', 'pki_ca_port': '8443', 'pki_ca_signing_key_algorithm': 'SHA256withRSA', 'pki_ca_signing_key_size': '2048', 'pki_ca_signing_key_type': 'rsa', 'pki_ca_signing_nickname': 'caSigningCert cert-pki-tomcat CA', 'pki_ca_signing_signing_algorithm': 'SHA256withRSA', 'pki_ca_signing_subject_dn': 'cn=rootDG.cisco.com,o=Cisco Systems,ou=CIBU,L=Bangalore', 'pki_ca_signing_tag': 'signing', 'pki_ca_signing_token': 'Internal Key Storage Token', 'pki_cert_database': '/etc/pki/pki-tomcat/alias/cert8.db', 'pki_certificate_timestamp': '2014-11-06 07:12:56', 'pki_certsrv_jar': '/usr/share/java/pki/pki-certsrv.jar', 'pki_certsrv_jar_link': '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib/pki-certsrv.jar', 'pki_cgroup_cpu_systemd_service': '/sys/fs/cgroup/cpu\\,cpuacct/system//lib/systemd/system/pki-tomcatd at .service//lib/systemd/system/pki-tomcatd at .service', 'pki_cgroup_cpu_systemd_service_path': '/sys/fs/cgroup/cpu\\,cpuacct/system//lib/systemd/system/pki-tomcatd at .service', 'pki_cgroup_systemd_service': '/sys/fs/cgroup/systemd/system//lib/systemd/system/pki-tomcatd at .service/pki-tomcat', 'pki_cgroup_systemd_service_path': '/sys/fs/cgroup/systemd/system//lib/systemd/system/pki-tomcatd at .service', 'pki_client_admin_cert': '/root/.dogtag/pki-tomcat/ca_admin.cert', 'pki_client_admin_cert_p12': '/root/.dogtag/pki-tomcat/ca_admin_cert.p12', 'pki_client_cert_database': '/root/.dogtag/pki-tomcat/ca/alias/cert8.db', 'pki_client_database_dir': '/root/.dogtag/pki-tomcat/ca/alias', 'pki_client_database_password': 'XXXXXXXX', 'pki_client_database_purge': 'True', 'pki_client_dir': '/root/.dogtag/pki-tomcat', 'pki_client_key_database': '/root/.dogtag/pki-tomcat/ca/alias/key3.db', 'pki_client_password_conf': '/root/.dogtag/pki-tomcat/ca/password.conf', 'pki_client_pin': 'XXXXXXXX', 'pki_client_pkcs12_password': 'XXXXXXXX', 'pki_client_pkcs12_password_conf': '/root/.dogtag/pki-tomcat/ca/pkcs12_password.conf', 'pki_client_secmod_database': '/root/.dogtag/pki-tomcat/ca/alias/secmod.db', 'pki_client_subsystem_dir': '/root/.dogtag/pki-tomcat/ca', 'pki_clone': 'False', 'pki_clone_pkcs12_password': 'XXXXXXXX', 'pki_clone_pkcs12_path': '', 'pki_clone_replicate_schema': 'True', 'pki_clone_replication_clone_port': '', 'pki_clone_replication_master_port': '', 'pki_clone_replication_security': 'None', 'pki_clone_setup_replication': 'True', 'pki_clone_uri': '', 'pki_cms': '/usr/share/java/pki/pki-cms.jar', 'pki_cms_jar_link': '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib/pki-cms.jar', 'pki_cmsbundle': '/usr/share/java/pki/pki-cmsbundle.jar', 'pki_cmsbundle_jar_link': '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib/pki-cmsbundle.jar', 'pki_cmscore': '/usr/share/java/pki/pki-cmscore.jar', 'pki_cmscore_jar_link': '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib/pki-cmscore.jar', 'pki_cmsutil': '/usr/share/java/pki/pki-cmsutil.jar', 'pki_cmsutil_jar_link': '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib/pki-cmsutil.jar', 'pki_commons_codec_jar': '/usr/share/java/commons-codec.jar', 'pki_commons_codec_jar_link': '/var/lib/pki/pki-tomcat/common/lib/apache-commons-codec.jar', 'pki_configuration_path': '/etc/pki', 'pki_database_path': '/etc/pki/pki-tomcat/alias', 'pki_default_deployment_cfg': '/etc/pki/default.cfg', 'pki_default_deployment_cfg_replica': '/etc/sysconfig/pki/tomcat/pki-tomcat/ca/default.cfg', 'pki_deployed_instance_name': None, 'pki_deployment_executable': 'pkispawn', 'pki_dns_domainname': 'cisco.com', 'pki_ds_base_dn': 'o=pki-tomcat-CA', 'pki_ds_bind_dn': 'cn=Directory Manager', 'pki_ds_create_new_db': 'True', 'pki_ds_database': 'pki-tomcat-CA', 'pki_ds_hostname': 'localhost.localdomain', 'pki_ds_ldap_port': '389', 'pki_ds_ldaps_port': '636', 'pki_ds_password': 'XXXXXXXX', 'pki_ds_remove_data': 'True', 'pki_ds_secure_connection': 'False', 'pki_enable_access_log': 'True', 'pki_enable_java_debugger': 'False', 'pki_enable_proxy': 'False', 'pki_external': 'True', 'pki_external_ca_cert_chain_path': '/home/kjhawar/dogtag/dg_chain.cert', 'pki_external_ca_cert_path': '/home/kjhawar/dogtag/dg_ca.cert', 'pki_external_csr_path': '/etc/pki/pki-tomcat/ca_signing.csr', 'pki_external_step_two': 'True', 'pki_group': 'pkiuser', 'pki_hostname': 'cibu-sec88.cisco.com', 'pki_http_port': '9080', 'pki_httpclient_jar': '/usr/share/java/httpcomponents/httpclient.jar', 'pki_httpclient_jar_link': '/var/lib/pki/pki-tomcat/common/lib/httpclient.jar', 'pki_httpcore_jar': '/usr/share/java/httpcomponents/httpcore.jar', 'pki_httpcore_jar_link': '/var/lib/pki/pki-tomcat/common/lib/httpcore.jar', 'pki_https_port': '9443', 'pki_import_admin_cert': 'False', 'pki_install_time': 'Thu Nov 6 07:12:56 2014', 'pki_instance_conf_link': '/var/lib/pki/pki-tomcat/conf', 'pki_instance_conf_log4j_properties': '/etc/pki/pki-tomcat/log4j.properties', 'pki_instance_configuration_path': '/etc/pki/pki-tomcat', 'pki_instance_database_link': '/var/lib/pki/pki-tomcat/alias', 'pki_instance_lib': '/var/lib/pki/pki-tomcat/lib', 'pki_instance_lib_log4j_properties': '/var/lib/pki/pki-tomcat/lib/log4j.properties', 'pki_instance_log_path': '/var/log/pki/pki-tomcat', 'pki_instance_logs_link': '/var/lib/pki/pki-tomcat/logs', 'pki_instance_name': 'pki-tomcat', 'pki_instance_path': '/var/lib/pki/pki-tomcat', 'pki_instance_registry_path': '/etc/sysconfig/pki/tomcat/pki-tomcat', 'pki_instance_systemd_link': '/var/lib/pki/pki-tomcat/pki-tomcat', 'pki_instance_type': 'Tomcat', 'pki_instance_type_registry_path': '/etc/sysconfig/pki/tomcat', 'pki_issuing_ca': 'External CA', 'pki_issuing_ca_hostname': 'cibu-sec88.cisco.com', 'pki_issuing_ca_https_port': '8443', 'pki_issuing_ca_uri': 'https://cibu-sec88.cisco.com:8443', 'pki_jackson_annotations_jar': '/usr/share/java/jackson-annotations.jar', 'pki_jackson_core_asl_jar': '/usr/share/java/jackson/jackson-core-asl.jar', 'pki_jackson_core_jar': '/usr/share/java/jackson-core.jar', 'pki_jackson_databind_jar': '/usr/share/java/jackson-databind.jar', 'pki_jackson_jaxrs_base_jar': '/usr/share/java/jackson-jaxrs-providers/jackson-jaxrs-base.jar', 'pki_jackson_jaxrs_jar': '/usr/share/java/jackson/jackson-jaxrs.jar', 'pki_jackson_jaxrs_json_provider_jar': '/usr/share/java/jackson-jaxrs-providers/jackson-jaxrs-json-provider.jar', 'pki_jackson_mapper_asl_jar': '/usr/share/java/jackson/jackson-mapper-asl.jar', 'pki_jackson_module_jaxb_annotations_jar': '/usr/share/java/jackson-module-jaxb-annotations.jar', 'pki_jackson_mrbean_jar': '/usr/share/java/jackson/jackson-mrbean.jar', 'pki_jackson_smile_jar': '/usr/share/java/jackson/jackson-smile.jar', 'pki_jackson_xc_jar': '/usr/share/java/jackson/jackson-xc.jar', 'pki_javassist_jar': '/usr/share/java/javassist.jar', 'pki_javassist_jar_link': '/var/lib/pki/pki-tomcat/common/lib/javassist.jar', 'pki_jss_jar': '/usr/lib/java/jss4.jar', 'pki_jss_jar_link': '/var/lib/pki/pki-tomcat/common/lib/jss4.jar', 'pki_key_database': '/etc/pki/pki-tomcat/alias/key3.db', 'pki_kra_jar': '/usr/share/java/pki/pki-kra.jar', 'pki_kra_jar_link': '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib/pki-kra.jar', 'pki_ldapjdk_jar': '/usr/share/java/ldapjdk.jar', 'pki_ldapjdk_jar_link': '/var/lib/pki/pki-tomcat/common/lib/ldapjdk.jar', 'pki_log_path': '/var/log/pki', 'pki_manifest': '/etc/sysconfig/pki/tomcat/pki-tomcat/ca/manifest', 'pki_manifest_spawn_archive': '/var/log/pki/pki-tomcat/ca/archive/spawn_manifest.20141106071256', 'pki_nsutil': '/usr/share/java/pki/pki-nsutil.jar', 'pki_nsutil_jar_link': '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib/pki-nsutil.jar', 'pki_ocsp_jar': '/usr/share/java/pki/pki-ocsp.jar', 'pki_ocsp_jar_link': '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib/pki-ocsp.jar', 'pki_ocsp_signing_key_algorithm': 'SHA256withRSA', 'pki_ocsp_signing_key_size': '2048', 'pki_ocsp_signing_key_type': 'rsa', 'pki_ocsp_signing_nickname': 'ocspSigningCert cert-pki-tomcat CA', 'pki_ocsp_signing_signing_algorithm': 'SHA256withRSA', 'pki_ocsp_signing_subject_dn': 'cn=CA OCSP Signing Certificate,o=cisco.com Security Domain', 'pki_ocsp_signing_tag': 'ocsp_signing', 'pki_ocsp_signing_token': 'Internal Key Storage Token', 'pki_one_time_pin': 'XXXXXXXX', 'pki_path': '/var/lib/pki', 'pki_pin': 'XXXXXXXX', 'pki_proxy_http_port': '80', 'pki_proxy_https_port': '443', 'pki_random_serial_numbers_enable': 'False', 'pki_registry_initscript_command': 'systemctl restart pki-tomcatd at pki-tomcat.service', 'pki_registry_path': '/etc/sysconfig/pki', 'pki_req_ext_add': 'True', 'pki_req_ext_critical': 'True', 'pki_req_ext_data': '1E0A00530075006200430041', 'pki_req_ext_oid': '1.3.6.1.4.1.311.20.2', 'pki_restart_configured_instance': 'True', 'pki_resteasy_atom_provider_jar': '/usr/share/java/resteasy/resteasy-atom-provider.jar', 'pki_resteasy_client_jar': '/usr/share/java/resteasy/resteasy-client.jar', 'pki_resteasy_jackson_provider_jar': '/usr/share/java/resteasy/resteasy-jackson-provider.jar', 'pki_resteasy_jaxb_provider_jar': '/usr/share/java/resteasy/resteasy-jaxb-provider.jar', 'pki_resteasy_jaxrs_api_jar': '/usr/share/java/resteasy/jaxrs-api.jar', 'pki_resteasy_jaxrs_jar': '/usr/share/java/resteasy/resteasy-jaxrs.jar', 'pki_root_prefix': '', 'pki_scannotation_jar': '/usr/share/java/scannotation.jar', 'pki_scannotation_jar_link': '/var/lib/pki/pki-tomcat/common/lib/scannotation.jar', 'pki_secmod_database': '/etc/pki/pki-tomcat/alias/secmod.db', 'pki_security_domain_hostname': 'cibu-sec88.cisco.com', 'pki_security_domain_https_port': '8443', 'pki_security_domain_name': 'cisco.com Security Domain', 'pki_security_domain_password': 'XXXXXXXX', 'pki_security_domain_type': 'new', 'pki_security_domain_user': 'caadmin', 'pki_security_manager': 'true', 'pki_self_signed_issuer_name': 'cn=cibu-sec88.cisco.com,o=2014-11-06 07:12:56', 'pki_self_signed_nickname': 'Server-Cert cert-pki-tomcat', 'pki_self_signed_noise_bytes': 1024, 'pki_self_signed_noise_file': '/etc/pki/pki-tomcat/ca/noise', 'pki_self_signed_serial_number': 0, 'pki_self_signed_subject': 'cn=cibu-sec88.cisco.com,o=2014-11-06 07:12:56', 'pki_self_signed_token': 'internal', 'pki_self_signed_trustargs': 'CTu,CTu,CTu', 'pki_self_signed_validity_period': 12, 'pki_share_db': 'False', 'pki_shared_password_conf': '/etc/pki/pki-tomcat/password.conf', 'pki_shared_pfile': '/etc/pki/pki-tomcat/pfile', 'pki_skip_configuration': 'False', 'pki_skip_installation': 'False', 'pki_source_admincert_profile': '/usr/share/pki/ca/conf/adminCert.profile', 'pki_source_caauditsigningcert_profile': '/usr/share/pki/ca/conf/caAuditSigningCert.profile', 'pki_source_cacert_profile': '/usr/share/pki/ca/conf/caCert.profile', 'pki_source_caocspcert_profile': '/usr/share/pki/ca/conf/caOCSPCert.profile', 'pki_source_catalina_properties': '/usr/share/pki/server/conf/catalina.properties', 'pki_source_conf_path': '/usr/share/pki/ca/conf', 'pki_source_context_xml': '/usr/share/pki/server/conf/context.xml', 'pki_source_cs_cfg': '/usr/share/pki/ca/conf/CS.cfg', 'pki_source_emails': '/usr/share/pki/ca/emails', 'pki_source_flatfile_txt': '/usr/share/pki/ca/conf/flatfile.txt', 'pki_source_profiles': '/usr/share/pki/ca/profiles', 'pki_source_proxy_conf': '/usr/share/pki/ca/conf/proxy.conf', 'pki_source_registry': '/usr/share/pki/setup/pkidaemon_registry', 'pki_source_registry_cfg': '/usr/share/pki/ca/conf/registry.cfg', 'pki_source_server_path': '/usr/share/pki/server/conf', 'pki_source_server_xml': '/usr/share/pki/server/conf/server.xml', 'pki_source_servercert_profile': '/usr/share/pki/ca/conf/serverCert.profile', 'pki_source_servercertnick_conf': '/usr/share/pki/server/conf/serverCertNick.conf', 'pki_source_setup_path': '/usr/share/pki/setup', 'pki_source_subsystem_path': '/usr/share/pki/ca', 'pki_source_subsystemcert_profile': '/usr/share/pki/ca/conf/subsystemCert.profile', 'pki_source_tomcat_conf': '/usr/share/pki/server/conf/tomcat.conf', 'pki_spawn_log': '/var/log/pki/pki-ca-spawn.20141106071256.log', 'pki_ssl_server_key_algorithm': 'SHA256withRSA', 'pki_ssl_server_key_size': '2048', 'pki_ssl_server_key_type': 'rsa', 'pki_ssl_server_nickname': 'Server-Cert cert-pki-tomcat', 'pki_ssl_server_subject_dn': 'cn=cibu-sec88.cisco.com,o=cisco.com Security Domain', 'pki_ssl_server_tag': 'sslserver', 'pki_ssl_server_token': 'Internal Key Storage Token', 'pki_standalone': 'false', 'pki_storage_tag': 'storage', 'pki_subordinate': 'False', 'pki_subordinate_create_new_security_domain': 'False', 'pki_subordinate_security_domain_name': 'cisco.com Subordinate Security Domain', 'pki_subsystem': 'CA', 'pki_subsystem_archive_log_path': '/var/log/pki/pki-tomcat/ca/archive', 'pki_subsystem_conf_link': '/var/lib/pki/pki-tomcat/ca/conf', 'pki_subsystem_configuration_password_conf_link': '/etc/pki/pki-tomcat/ca/password.conf', 'pki_subsystem_configuration_path': '/etc/pki/pki-tomcat/ca', 'pki_subsystem_database_link': '/var/lib/pki/pki-tomcat/ca/alias', 'pki_subsystem_emails_path': '/var/lib/pki/pki-tomcat/ca/emails', 'pki_subsystem_key_algorithm': 'SHA256withRSA', 'pki_subsystem_key_size': '2048', 'pki_subsystem_key_type': 'rsa', 'pki_subsystem_log_path': '/var/log/pki/pki-tomcat/ca', 'pki_subsystem_logs_link': '/var/lib/pki/pki-tomcat/ca/logs', 'pki_subsystem_name': 'CA cibu-sec88.cisco.com 9443', 'pki_subsystem_nickname': 'subsystemCert cert-pki-tomcat', 'pki_subsystem_path': '/var/lib/pki/pki-tomcat/ca', 'pki_subsystem_profiles_path': '/var/lib/pki/pki-tomcat/ca/profiles', 'pki_subsystem_registry_link': '/var/lib/pki/pki-tomcat/ca/registry', 'pki_subsystem_registry_path': '/etc/sysconfig/pki/tomcat/pki-tomcat/ca', 'pki_subsystem_signed_audit_log_path': '/var/log/pki/pki-tomcat/ca/signedAudit', 'pki_subsystem_subject_dn': 'cn=Subsystem Certificate,o=cisco.com Security Domain', 'pki_subsystem_tag': 'subsystem', 'pki_subsystem_token': 'Internal Key Storage Token', 'pki_subsystem_tomcat_webapps_link': '/var/lib/pki/pki-tomcat/ca/webapps', 'pki_subsystem_type': 'ca', 'pki_symkey_jar': '/usr/lib/java/symkey.jar', 'pki_symkey_jar_link': '/var/lib/pki/pki-tomcat/common/lib/symkey.jar', 'pki_systemd_service': '/lib/systemd/system/pki-tomcatd at .service', 'pki_systemd_service_link': '/etc/systemd/system/pki-tomcatd.target.wants/pki-tomcatd at pki-tomcat.service', 'pki_systemd_target': '/lib/systemd/system/pki-tomcatd.target', 'pki_systemd_target_wants': '/etc/systemd/system/pki-tomcatd.target.wants', 'pki_target_admincert_profile': '/etc/pki/pki-tomcat/ca/adminCert.profile', 'pki_target_caauditsigningcert_profile': '/etc/pki/pki-tomcat/ca/caAuditSigningCert.profile', 'pki_target_cacert_profile': '/etc/pki/pki-tomcat/ca/caCert.profile', 'pki_target_caocspcert_profile': '/etc/pki/pki-tomcat/ca/caOCSPCert.profile', 'pki_target_catalina_properties': '/etc/pki/pki-tomcat/catalina.properties', 'pki_target_context_xml': '/etc/pki/pki-tomcat/context.xml', 'pki_target_cs_cfg': '/etc/pki/pki-tomcat/ca/CS.cfg', 'pki_target_flatfile_txt': '/etc/pki/pki-tomcat/ca/flatfile.txt', 'pki_target_profileselect_template': '/var/lib/pki/pki-tomcat/webapps/ca/ee/ca/ProfileSelect.template', 'pki_target_proxy_conf': '/etc/pki/pki-tomcat/ca/proxy.conf', 'pki_target_registry': '/etc/sysconfig/pki/tomcat/pki-tomcat/pki-tomcat', 'pki_target_registry_cfg': '/etc/pki/pki-tomcat/ca/registry.cfg', 'pki_target_server_xml': '/etc/pki/pki-tomcat/server.xml', 'pki_target_servercert_profile': '/etc/pki/pki-tomcat/ca/serverCert.profile', 'pki_target_servercertnick_conf': '/etc/pki/pki-tomcat/serverCertNick.conf', 'pki_target_subsystem_web_xml': '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/web.xml', 'pki_target_subsystem_web_xml_orig': '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/web.xml.orig', 'pki_target_subsystemcert_profile': '/etc/pki/pki-tomcat/ca/subsystemCert.profile', 'pki_target_tomcat_conf': '/etc/pki/pki-tomcat/tomcat.conf', 'pki_target_tomcat_conf_instance_id': '/etc/sysconfig/pki-tomcat', 'pki_target_velocity_properties': '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/velocity.properties', 'pki_theme_enable': 'True', 'pki_theme_server_dir': '/usr/share/pki/common-ui', 'pki_timestamp': '20141106071256', 'pki_tks_jar': '/usr/share/java/pki/pki-tks.jar', 'pki_tks_jar_link': '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib/pki-tks.jar', 'pki_token_name': 'internal', 'pki_token_password': 'XXXXXXXX', 'pki_tomcat_bin_link': '/var/lib/pki/pki-tomcat/bin', 'pki_tomcat_bin_path': '/usr/share/tomcat/bin', 'pki_tomcat_common_lib_path': '/var/lib/pki/pki-tomcat/common/lib', 'pki_tomcat_common_path': '/var/lib/pki/pki-tomcat/common', 'pki_tomcat_jar': '/usr/share/java/pki/pki-tomcat.jar', 'pki_tomcat_jar_link': '/var/lib/pki/pki-tomcat/common/lib/pki-tomcat.jar', 'pki_tomcat_lib_path': '/usr/share/tomcat/lib', 'pki_tomcat_server_port': '9005', 'pki_tomcat_systemd': '/usr/sbin/tomcat', 'pki_tomcat_tmpdir_path': '/var/lib/pki/pki-tomcat/temp', 'pki_tomcat_webapps_path': '/var/lib/pki/pki-tomcat/webapps', 'pki_tomcat_webapps_subsystem_path': '/var/lib/pki/pki-tomcat/webapps/ca', 'pki_tomcat_webapps_subsystem_webinf_classes_path': '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/classes', 'pki_tomcat_webapps_subsystem_webinf_lib_path': '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib', 'pki_tomcat_work_catalina_host_path': '/var/lib/pki/pki-tomcat/work/Catalina/localhost', 'pki_tomcat_work_catalina_host_run_path': '/var/lib/pki/pki-tomcat/work/Catalina/localhost/_', 'pki_tomcat_work_catalina_host_subsystem_path': '/var/lib/pki/pki-tomcat/work/Catalina/localhost/ca', 'pki_tomcat_work_catalina_path': '/var/lib/pki/pki-tomcat/work/Catalina', 'pki_tomcat_work_path': '/var/lib/pki/pki-tomcat/work', 'pki_tomcatjss_jar': '/usr/share/java/tomcatjss.jar', 'pki_tomcatjss_jar_link': '/var/lib/pki/pki-tomcat/common/lib/tomcatjss.jar', 'pki_tps_jar': '/usr/share/java/pki/pki-tps.jar', 'pki_tps_jar_link': '/var/lib/pki/pki-tomcat/webapps/ca/WEB-INF/lib/pki-tps.jar', 'pki_transport_tag': 'transport', 'pki_user': 'pkiuser', 'pki_user_deployment_cfg': 'd2.cfg', 'pki_user_deployment_cfg_replica': '/etc/sysconfig/pki/tomcat/pki-tomcat/ca/deployment.cfg', 'pki_user_deployment_cfg_spawn_archive': '/var/log/pki/pki-tomcat/ca/archive/spawn_deployment.cfg.20141106071256', 'pki_velocity_jar': '/usr/share/java/velocity.jar', 'pki_velocity_jar_link': '/var/lib/pki/pki-tomcat/common/lib/velocity.jar', 'pki_xerces_j2_jar': '/usr/share/java/xerces-j2.jar', 'pki_xerces_j2_jar_link': '/var/lib/pki/pki-tomcat/common/lib/xerces-j2.jar', 'pki_xml_commons_apis_jar': '/usr/share/java/xml-commons-apis.jar', 'pki_xml_commons_apis_jar_link': '/var/lib/pki/pki-tomcat/common/lib/xml-commons-apis.jar', 'pki_xml_commons_resolver_jar': '/usr/share/java/xml-commons-resolver.jar', 'pki_xml_commons_resolver_jar_link': '/var/lib/pki/pki-tomcat/common/lib/xml-commons-resolver.jar', 'resteasy_lib': '/usr/share/java/resteasy', 'sensitive_parameters': '\npki_admin_password\npki_backup_password\npki_client_database_password\npki_client_pin\npki_client_pkcs12_password\npki_clone_pkcs12_password\npki_ds_password\npki_one_time_pin\npki_pin\npki_security_domain_password\npki_token_password', 'spawn_scriplets': '\ninitialization\ninfrastructure_layout\ninstance_layout\nsubsystem_layout\nselinux_setup\nwebapp_deployment\nslot_substitution\nsecurity_databases\nconfiguration\nfinalization'} Installing CA into /var/lib/pki/pki-tomcat. pkispawn : INFO BEGIN spawning subsystem 'CA' of instance 'pki-tomcat' . . . pkispawn : INFO ....... adding GID 'pkiuser' for group '17' . . . pkispawn : INFO ....... adding UID 'pkiuser' for user '17' . . . pkispawn : DEBUG ....... retrieving UID for 'pkiuser' . . . pkispawn : DEBUG ........... UID of 'pkiuser' is 17 pkispawn : DEBUG ....... retrieving GID for 'pkiuser' . . . pkispawn : DEBUG ........... GID of 'pkiuser' is 17 pkispawn : INFO ... initializing 'pki.server.deployment.scriptlets.initialization' pkispawn : ERROR ....... Selinux is disabled. Not checking port contexts pkispawn : INFO ... skip populating 'pki.server.deployment.scriptlets.infrastructure_layout' pkispawn : INFO ... skip populating 'pki.server.deployment.scriptlets.instance_layout' pkispawn : INFO ... skip populating 'pki.server.deployment.scriptlets.subsystem_layout' pkispawn : INFO ... skip populating 'pki.server.deployment.scriptlets.selinux_setup' pkispawn : INFO ... skip deploying 'pki.server.deployment.scriptlets.webapp_deployment' pkispawn : INFO ... skip assigning slots for 'pki.server.deployment.scriptlets.slot_substitution' pkispawn : INFO ... skip generating 'pki.server.deployment.scriptlets.security_databases' pkispawn : INFO ... configuring 'pki.server.deployment.scriptlets.configuration' pkispawn : INFO ....... mkdir -p /root/.dogtag/pki-tomcat/ca pkispawn : DEBUG ........... chmod 755 /root/.dogtag/pki-tomcat/ca pkispawn : DEBUG ........... chown 0:0 /root/.dogtag/pki-tomcat/ca pkispawn : INFO ....... generating '/root/.dogtag/pki-tomcat/ca/password.conf' pkispawn : INFO ....... modifying '/root/.dogtag/pki-tomcat/ca/password.conf' pkispawn : DEBUG ........... chmod 660 /root/.dogtag/pki-tomcat/ca/password.conf pkispawn : DEBUG ........... chown 0:0 /root/.dogtag/pki-tomcat/ca/password.conf pkispawn : INFO ....... generating '/root/.dogtag/pki-tomcat/ca/pkcs12_password.conf' pkispawn : INFO ....... modifying '/root/.dogtag/pki-tomcat/ca/pkcs12_password.conf' pkispawn : DEBUG ........... chmod 660 /root/.dogtag/pki-tomcat/ca/pkcs12_password.conf pkispawn : DEBUG ........... chown 17:17 /root/.dogtag/pki-tomcat/ca/pkcs12_password.conf pkispawn : INFO ....... mkdir -p /root/.dogtag/pki-tomcat/ca/alias pkispawn : DEBUG ........... chmod 770 /root/.dogtag/pki-tomcat/ca/alias pkispawn : DEBUG ........... chown 0:0 /root/.dogtag/pki-tomcat/ca/alias pkispawn : INFO ....... executing 'certutil -N -d /root/.dogtag/pki-tomcat/ca/alias -f /root/.dogtag/pki-tomcat/ca/password.conf' pkispawn : INFO ....... executing 'systemctl daemon-reload' pkispawn : INFO ....... executing 'systemctl start pki-tomcatd at pki-tomcat.service' pkispawn : DEBUG ........... 0CArunning10.2.1-0.1.fc20 pkispawn : INFO ....... constructing PKI configuration data. pkispawn : INFO ....... generating noise file called '/root/.dogtag/pki-tomcat/ca/alias/noise' and filling it with '2048' random bytes pkispawn : DEBUG ........... chmod 660 /root/.dogtag/pki-tomcat/ca/alias/noise pkispawn : DEBUG ........... chown 17:17 /root/.dogtag/pki-tomcat/ca/alias/noise pkispawn : INFO ....... executing 'certutil -R -d /root/.dogtag/pki-tomcat/ca/alias -s cn=PKI Administrator,o=cisco.com Security Domain -g 2048 -z /root/.dogtag/pki-tomcat/ca/alias/noise -f /root/.dogtag/pki-tomcat/ca/password.conf -o /root/.dogtag/pki-tomcat/ca/alias/admin_pkcs10.bin' pkispawn : INFO ....... BtoA /root/.dogtag/pki-tomcat/ca/alias/admin_pkcs10.bin /root/.dogtag/pki-tomcat/ca/alias/admin_pkcs10.bin.asc pkispawn : INFO ....... loading external CA signing certificate from file: '/home/kjhawar/dogtag/dg_ca.cert' pkispawn : INFO ....... loading external CA signing certificate chain from file: '/home/kjhawar/dogtag/dg_chain.cert' pkispawn : INFO ....... configuring PKI configuration data. pkispawn : DEBUG ....... status: 0 pkispawn : DEBUG ....... tag: signing pkispawn : DEBUG ....... cert: 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 pkispawn : DEBUG ....... request: -----BEGIN CERTIFICATE REQUEST----- MIIC6DCCAdACAQAwVjESMBAGA1UEBwwJQmFuZ2Fsb3JlMQ0wCwYDVQQLDARDSUJVMRYwFAYDVQQK DA1DaXNjbyBTeXN0ZW1zMRkwFwYDVQQDDBByb290REcuY2lzY28uY29tMIIBIjANBgkqhkiG9w0B AQEFAAOCAQ8AMIIBCgKCAQEAtF6WxLeX0Mxky8mIa83fygnYwhkR2N6JdZSw4LeQyonDZE0IqY6i x1cGgNrCwfGdpPZ/jUt20Ci0TmvRz7qo2ZL4eoP22plIciJ3AdNCu5CCbNmJZu7HMNMwhf5OIpUH UH69kuRyjAj0RoFbbcJzQ7bwU9Lgk1zdn7QSUNr3F8eVJK0pw7nVk2Q+oNVCk2FEbA9SIxqB3Hhh dgR3ObE9WNPfO6FzX5UEdEzAAg0C3fdFgVRCl/nuMrhh+3GPwAUQtmPQSS2UCKVoXDxblbav+p3o CHu2lB3+X0FqYTFJCahQQtSr/LkrJzH+WJylR4+vj+6lgfIRaI9ldCBSxcuK6QIDAQABoE0wSwYJ KoZIhvcNAQkOMT4wPDAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBxjAZBgkrBgEEAYI3 FAIEDB4KAFMAdQBiAEMAQTANBgkqhkiG9w0BAQsFAAOCAQEAVXKujUBtCMDjRHc2CKxCXiAP+fJY 5hcDwWuPwQHZCNTWtlTU4vRuJlRMoeOmUblkxhehH7D3fDtKRABEeYf0/zChBQmSavI3tYNbgXTJ 0jO2prQj+dJmbeK6jbB4J1N/dFPWKLKdoMpdU8esNM2RiIISRue9vRmLArXQj1WESvKDUpNIYLw9 4kMehN4XyaFdeOgK0xFrF6SY0ws8mw2QetgJEbMCenv3hJY1YmWFo8cgvPQDrdF4BFw5CGgGmJGh KSVG75LYH4Z0gtpTJi+E/tDopKle7W7YKzJGsyxl/FwxvRdQGW0lOmVoorRxeIIoUEg9gIwunXGi e8/fFKpn9A== -----END CERTIFICATE REQUEST----- pkispawn : DEBUG ....... tag: ocsp_signing pkispawn : DEBUG ....... cert: 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 pkispawn : DEBUG ....... request: -----BEGIN CERTIFICATE REQUEST----- MIICjzCCAXcCAQAwSjEiMCAGA1UECgwZY2lzY28uY29tIFNlY3VyaXR5IERvbWFpbjEkMCIGA1UE AwwbQ0EgT0NTUCBTaWduaW5nIENlcnRpZmljYXRlMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIB CgKCAQEA2XaI4OAFJt7+11pHq3h+kWJRds8di+nz8nyHIsU9q8KXd5aNtwrL1SFnfkqzqM5t1PSt toPnv7j+3C8KqTZmdRgT+CsOc5ze5x8M7qvCy1P9u+vsHp9QHqlZxd8U+6KplDzRhiLRanCefZm7 tDa1mNINlxkdFurvcc2C1x4Q+1IzbQde9nAsOI5nQ7gzopkBzXjIn68xpm/o+zAKk1D3hsjEiXvG 2L8nBJ/Idd44OpIjsc4M8M69U9DhfuLJ30a7g63lGvlfYu25HbQkDf3j3ItA8FcIJaWVGK4bNktq GKLUkPtRyk2gegb5axiv9piNK8IVSpndqh00DNW1tj9iyQIDAQABoAAwDQYJKoZIhvcNAQELBQAD ggEBALf+ChRC1p6Jfa78EgK0pkvF0tE+yOA+mw9vK3zCtekEJvjjjtxmjye+DD4/R5nfY4fCxa2M fuZhFLe9j0UH5TA2QThdxt07+d3Qxn5znpHPaTJGaKynn4cBiQs0q/NS8TYOKgjZ+R/vgXuwALjI S4uTGipHQHyG9CgJHpNd0DPdmTGMUG6qM6DZZYAr2ty0QEgvPnuLpDcAxCKWvzYzl8eDBfbzVpky phcioo1y/6sZllVBA7V2Q0iw/N9QvtC3HwK0oP1zrsBfDyij/NJwYjczLhc1ujJTxJVzLgNt9BaL v1K7340dUH0FTpoKAgIyH2NDA1NV79e3gnHDrqBELow= -----END CERTIFICATE REQUEST----- pkispawn : DEBUG ....... tag: sslserver pkispawn : DEBUG ....... cert: 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 pkispawn : DEBUG ....... request: -----BEGIN CERTIFICATE REQUEST----- MIICiDCCAXACAQAwQzEiMCAGA1UECgwZY2lzY28uY29tIFNlY3VyaXR5IERvbWFpbjEdMBsGA1UE AwwUY2lidS1zZWM4OC5jaXNjby5jb20wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDg ZiAhg47J4XfN3PkN1aP9FKr4qwnPCTVG5GRFH2osEPDTw13aPeq0YNQ/GMHZYEi56Ww3dXRBYFF0 +2pYC3Usu71IwrVaAJplPvGmoCOXJmU9vkFYBlcS4UgZvUhf7SibnkoYzC3KYUED87BPpMuwBKQa SR67ICdTpKXmygPF8a473NOWW3EQw0a18z2KI+M3FUEahnPomINcUWM63l7rz4o9CiRc7GLobazP MCyxWBzmxSEyx+nUOh9ZeRWx9tucfLGaqfwhOf+w8zlkskHlphhIc6ANXL6motp7gKfEwlGXPRCk EG9rmGxSgP+Fap5+moARHFhCf31grSqDg3QPAgMBAAGgADANBgkqhkiG9w0BAQsFAAOCAQEA2JFi 3VzYsBa45uG/8QCGVePwytpyQLjE2J2dxNDh2G4SI5mOsIXSK4bQ5CQ7WDH8gtl50/2RLLbCoZVg xmjscVtJlVXj6MigxR466oP9cvTcelYse7wNqGSThCjyChaUUPJoH7oliMdvrlcbb/jnSKaquWTc ND4k4B5qUeJwk553fnkq7Nue1jTtOwVi+AAYOVTGocH6VBwJ/5QBYOz8tkQAv5P3WvoKiWUYJNdC aaJKup1V/z2JL9giAAEfkoT1288JYiGUhEjv9dO07AIN9fpl2prcZ2aQCeCZ0JvsQmqeA64Zpr7W MRBISdu9D5eqc3px/9uYQm05d4FKVTb6BA== -----END CERTIFICATE REQUEST----- pkispawn : DEBUG ....... tag: subsystem pkispawn : DEBUG ....... cert: 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 pkispawn : DEBUG ....... request: -----BEGIN CERTIFICATE REQUEST----- MIICiTCCAXECAQAwRDEiMCAGA1UECgwZY2lzY28uY29tIFNlY3VyaXR5IERvbWFpbjEeMBwGA1UE AwwVU3Vic3lzdGVtIENlcnRpZmljYXRlMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA 0OBGrRZj/2X4h6ItAxNmNL4ykexDDkWI7XEfXMzah/6V/XCzL21JyLazYvzA4Vdyz7QjW02EKBSU 8+P3kkBLMLJK8z1zwRmioy5pggOrvgpfzVCL7HTLl0pyXm3cZ6QyLVvUchBMo3nqR6Z6k18qoTYz x6cEtig4HvcuS3FHOK97a8qVWnRijSGE0UcjJu1XHTLJLahIMH2k3yclYjLnz8Vxudvpzm6VmJh+ gs1qM/dOe7HKvu1MnsFGKJBqdabCOMUoVbdfMuewGc5LsmhcWxB/4vaT5sieBfAwVSSWQj9GskWE 2BXZIzf7py17W7+W28Zn7y01qzHFFJOZQFHkwwIDAQABoAAwDQYJKoZIhvcNAQELBQADggEBAInD fYQ2ErZhsSrgYGGeNxuw+266CDEnFCH1NSZeq96sxKSh3+7FTfyA7n6kqdNBvVeqirZNJzCLzjQ3 2yH9HQ6rh+28LYHaOqtak1Qa55sMcDCHy3ppBumosgA6O7HkOIYytQXvNNQjqf8ITVViWCH26faa vtYAMtmkWnONpcgHBW/lTMTTkeMpCL28Q65ioAJLLB7YLmfyszq2Ace5Z5VaIS3clr903Yc4W0FU Yunjs3M97uIS0ZrUM2DI1CqwhM85M7fwJIV8+/2LKKfqbLvi9Y9TBiBDr2rIL+qS5TsjpHt5YIpX ImCYuncQvRKAGZtOS0a+ctK0wP8aHbsZxm8= -----END CERTIFICATE REQUEST----- pkispawn : DEBUG ....... tag: audit_signing pkispawn : DEBUG ....... cert: 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 pkispawn : DEBUG ....... request: -----BEGIN CERTIFICATE REQUEST----- MIICkDCCAXgCAQAwSzEiMCAGA1UECgwZY2lzY28uY29tIFNlY3VyaXR5IERvbWFpbjElMCMGA1UE AwwcQ0EgQXVkaXQgU2lnbmluZyBDZXJ0aWZpY2F0ZTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCC AQoCggEBAL4VL5coWc5NNe27lO6o/u0PPTOeHwrdjqnacTy6rBCGH0pf5oZ47J1FnnTXSdjdgDW7 HxI2k+ScgFhjCavFmkjgyUJjY10eVLS++Gb2sHP8ZA3nTPq5gRbtKzZA8Ze9glU8lsM/FAGgi4g/ GIpEH1OujR7vKgVBrpMUHl+LVgCQ2/N5Lun2lLyhurSRu9XfTlHEwVzkgYQpYgFUE5c82mrbGx9t tKJnZOE8HgJcgUFN4rfkHiKWtphB5d2mUanv4q6mXwTiZZIcW7bHqV3Wlaxo2rhXMhuKDGf0y9W6 /UqIMlOvWtbKo0hyDtrSEANxRB9PpdNGLui+tzzBmEHqYbsCAwEAAaAAMA0GCSqGSIb3DQEBCwUA A4IBAQC2pXyytc9NlnxmitCqPvV9QL8E4N2Dh+SJkJ9U1oA1jMfkuT1XETL+lKLbpScmtVlikGPg oSG7fwaSrs6qKfGUY2Kifo4CZ1y4TBDWXv9duRZtzdimBbmpMhqIiXq8W7OfCyD5nAgIaKjIRyx0 pr7wskTMhW9VwRITljrKc3WUDZ9ByPmk5jpZuUgK4YeVU+w/3PZGfwRwKY7ZlDM2UM5jAVpzNii0 FxerdPspsKu0cVji2eO06tz9pI2ZtvSPo7GaE1KETE1eC1rLCeRRHk4Q2Ueuu+V/pNDGp154Wkin zG1Ilsk9TU1YAU95MpyU8FBjuz2v7fbdMNYPBOHuJDKw -----END CERTIFICATE REQUEST----- pkispawn : DEBUG ....... adminCert: MIIDlzCCAn+gAwIBAgIBBTANBgkqhkiG9w0BAQsFADBCMRkwFwYDVQQDDBByb290 REcuY2lzY28uY29tMRYwFAYDVQQKDA1DaXNjbyBTeXN0ZW1zMQ0wCwYDVQQLDARD SUJVMB4XDTE0MTEwNjAxNDMwM1oXDTE2MTAyNjAxNDMwM1owQDEiMCAGA1UECgwZ Y2lzY28uY29tIFNlY3VyaXR5IERvbWFpbjEaMBgGA1UEAwwRUEtJIEFkbWluaXN0 cmF0b3IwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDiLWCfsKosLi6Y 8uu6rTZM11sXznkXGAuY3jLiit0bkjQb4yQ2cruU8KmPMZbwDyLddfndzN6Xpv6C rOyKj8XjBmzJmeyxyu6fGL6pt4SI9+gRZQMdILVgqcF4PyA5K9nlKXUmrbP7lmb8 nDvt4ELgpCdXOk4JJgckFy4nqXSICymX91F8K7J3nnBTb5EnO7AdNAfLKJ87wIq0 qYUIsu5+Uj9lIoi/u9JpJxnhK6VfWAtW/EyRF8SXSeCBnw+AmKwWa29RYYLDCmix mO/PDZjJE/KhBhiUprCdjhMiYt2bEArf3IjaGAHdnEa0ciNm5smpon8n/0rX2xbI solUp86vAgMBAAGjgZkwgZYwHwYDVR0jBBgwFoAUWf9Rp1DU4VaBO7K/BntkG2/g ksIwRAYIKwYBBQUHAQEEODA2MDQGCCsGAQUFBzABhihodHRwOi8vY2lidS1zZWM4 OC5jaXNjby5jb206OTA4MC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUE FjAUBggrBgEFBQcDAgYIKwYBBQUHAwQwDQYJKoZIhvcNAQELBQADggEBAG1FbBaQ SHRPfb03OOJNdMtyBXIe5HfT3xsEf2TzZ51qHKFGmiQGGax81FFyDE+s5BtAlfSn 78na9o+Y9QYimcmSrUO+Qzr5XnrITCKMHbeWpzHzinJOs1CUoK4SCR2JEDzibiGV +wYuW2p3YyaOuV8bCmPLTdiD0OcEpggnk6jBsD7v05E0wR+kXgeedajW9wEBoe1Z qQYqBBqiclCqHgYyzrTXpSHRFCPfbM+1v38q9oqB9ogDtEuLSZS9rj2cOAh41D36 Eh/OYtJFsb3HPwMyov449HVn3OkSqSCTHS2vNR24Oh50TTL+fTDHn6Z7rvbW8YlU 1qqBmyj0JHonprs= pkispawn : DEBUG ....... saving CA cibu-sec88.cisco.com 9443 Admin Certificate to file: '/root/.dogtag/pki-tomcat/ca_admin.cert' pkispawn : INFO ....... AtoB /root/.dogtag/pki-tomcat/ca_admin.cert /root/.dogtag/pki-tomcat/ca_admin.cert.der pkispawn : INFO ....... certutil -A -d /root/.dogtag/pki-tomcat/ca/alias -n PKI Administrator -t u,u,u -i /root/.dogtag/pki-tomcat/ca_admin.cert.der -f /root/.dogtag/pki-tomcat/ca/password.conf Notice: Trust flag u is set automatically if the private key is present. pkispawn : INFO ....... pk12util -d /root/.dogtag/pki-tomcat/ca/alias -o /root/.dogtag/pki-tomcat/ca_admin_cert.p12 -n PKI Administrator -w /root/.dogtag/pki-tomcat/ca/pkcs12_password.conf -k /root/.dogtag/pki-tomcat/ca/password.conf pkispawn : INFO ... finalizing 'pki.server.deployment.scriptlets.finalization' pkispawn : INFO ....... cp -p /etc/sysconfig/pki/tomcat/pki-tomcat/ca/deployment.cfg /var/log/pki/pki-tomcat/ca/archive/spawn_deployment.cfg.20141106071256 pkispawn : DEBUG ........... chmod 660 /var/log/pki/pki-tomcat/ca/archive/spawn_deployment.cfg.20141106071256 pkispawn : DEBUG ........... chown 17:17 /var/log/pki/pki-tomcat/ca/archive/spawn_deployment.cfg.20141106071256 pkispawn : INFO ....... generating manifest file called '/etc/sysconfig/pki/tomcat/pki-tomcat/ca/manifest' pkispawn : INFO ....... cp -p /etc/sysconfig/pki/tomcat/pki-tomcat/ca/manifest /var/log/pki/pki-tomcat/ca/archive/spawn_manifest.20141106071256 pkispawn : DEBUG ........... chmod 660 /var/log/pki/pki-tomcat/ca/archive/spawn_manifest.20141106071256 pkispawn : DEBUG ........... chown 17:17 /var/log/pki/pki-tomcat/ca/archive/spawn_manifest.20141106071256 pkispawn : INFO ....... executing 'systemctl daemon-reload' pkispawn : INFO ....... executing 'systemctl restart pki-tomcatd at pki-tomcat.service' Job for pki-tomcatd at pki-tomcat.service canceled. pkispawn : ERROR ....... subprocess.CalledProcessError: Command '['systemctl', 'restart', 'pki-tomcatd at pki-tomcat.service']' returned non-zero exit status 1! pkispawn : DEBUG ....... Error Type: CalledProcessError pkispawn : DEBUG ....... Error Message: Command '['systemctl', 'restart', 'pki-tomcatd at pki-tomcat.service']' returned non-zero exit status 1 pkispawn : DEBUG ....... File "/usr/sbin/pkispawn", line 507, in main rv = instance.spawn(deployer) File "/usr/lib/python2.7/site-packages/pki/server/deployment/scriptlets/finalization.py", line 61, in spawn deployer.systemd.restart() File "/usr/lib/python2.7/site-packages/pki/server/deployment/pkihelper.py", line 3389, in restart subprocess.check_call(command) File "/usr/lib64/python2.7/subprocess.py", line 542, in check_call raise CalledProcessError(retcode, cmd) Installation failed. Script done on Thursday 06 November 2014 07:13:05 AM IST From dgnatowski at yahoo.com Thu Nov 6 13:20:59 2014 From: dgnatowski at yahoo.com (Dennis Gnatowski) Date: Thu, 6 Nov 2014 05:20:59 -0800 Subject: [Pki-users] CA integration and installation with HSM In-Reply-To: <545AD89F.2060708@redhat.com> References: <1414948173.14074.YahooMailNeo@web161505.mail.bf1.yahoo.com> <5457E131.2060407@redhat.com> <1415226539.99472.YahooMailNeo@web161505.mail.bf1.yahoo.com> <545AD89F.2060708@redhat.com> Message-ID: <1415280059.36592.YahooMailNeo@web161503.mail.bf1.yahoo.com> Thank you Christina. The module loaded fine as reported by output from modutil; however, I had to restart the service in order for the Wizard to pick it up. Keys are now on the HSM. ----------------------------------------------------------- Dennis Gnatowski dgnatowski at yahoo.com ________________________________ From: Christina Fu To: pki-users at redhat.com Sent: Wednesday, November 5, 2014 9:10 PM Subject: Re: [Pki-users] CA integration and installation with HSM You might want to check the basics first. If you cd into your /alias and perform modutil -dbdir . -list What do you see? If you don't see the module, that means your HSM has not been loaded correctly. If loaded correctly you should see info on the library name, slots and status: loaded. The library doesn't have to be in a specific location, but when you use modutil to add you need to specify the libfile so it knows where to go. Normally it is at /usr/lunasa/lib/ though. I'll let someone who has knowledge about the pkispawn issue to answer the rest of the question. Until then, you can try the above just to see if your hsm has been loaded correctly. Christina On 11/05/2014 02:28 PM, Dennis Gnatowski wrote: I'm using Dogtag 10.1.1 with SafeNet Luna SA HSM. I changed the flags in the default.cfg file, performed the install, then added the PKCS#11 library to secmod. However, either using the Wizard to do the configuration or modifying the default.cfg file again and using pkispawn failed to get CA keys generated on the HSM. Wizard doesn't see the SafeNet library (does it have to be in a specific directory?) and pkispawn throws an error "pkispawn : ERROR ....... KeyError: 'pki_uid'!" I noticed this was reported in ticket #905. > >----------------------------------------------------------- >Dennis Gnatowski >dgnatowski at yahoo.com > > > >________________________________ > From: Marc Sauton >To: Dennis Gnatowski ; "pki-users at redhat.com" >Sent: Monday, November 3, 2014 3:10 PM >Subject: Re: [Pki-users] CA integration and installation with HSM > > > >On 11/02/2014 09:09 AM, Dennis Gnatowski wrote: > >What are the steps to integrate DogTag (Root) CA with an HSM? Does this have to occur during installation? >> >> >>I've successfully performed a general installation with CA keys in software. I was then able to modify secmod.db to add the HSM library and restart the system. I can both use command line utilities (certutil) and GUI (pkiconsole) to create keys on the HSM. Re-keying the caSigning certificate works but the CA certificate is issued (issuer) by the original software-based issuer (therefore NOT a self-signed CA cert!). So I assume this has to be done during initial installation (custom install). But, how do I get the HSM PKCS#11 library added/included with the custom install? >> >>----------------------------------------------------------- >>Dennis Gnatowski >>dgnatowski at yahoo.com >> >> >>_______________________________________________ Pki-users mailing list Pki-users at redhat.com https://www.redhat.com/mailman/listinfo/pki-users Adding the PKCS #11 module to secmod.db should happen after the pkicreate and just before running the silent install or the web based configuration wizard. >In Dogtag 10, when using pkispawn, you can split the install and config steps in two using the flags pki_skip_configuration and pki_skip_installation. >M. > > > > > >_______________________________________________ Pki-users mailing list Pki-users at redhat.com https://www.redhat.com/mailman/listinfo/pki-users _______________________________________________ Pki-users mailing list Pki-users at redhat.com https://www.redhat.com/mailman/listinfo/pki-users -------------- next part -------------- An HTML attachment was scrubbed... URL: From cfu at redhat.com Fri Nov 7 17:08:36 2014 From: cfu at redhat.com (Christina Fu) Date: Fri, 07 Nov 2014 09:08:36 -0800 Subject: [Pki-users] Can OpensSSL be used as external CA ? In-Reply-To: References: <544E6FAB.1020003@redhat.com> <544FF41B.3010705@redhat.com> <5453C1A5.5090206@redhat.com> <545ADD75.2000508@redhat.com> Message-ID: <545CFC94.7050302@redhat.com> Hi Kritee, I just looked closely. Your ca cert chain contains only one single self-signed root cert. I think what you need is a chain down to the dogtag CA cert that links up from the root, so in your case, you should have both the root and the dogtag CA cert in the pkcs7. Hope that helps. Christina On 11/06/2014 01:25 AM, kritee jhawar wrote: > Hi Christina > > Thanks for the response. PFA the typescript for pkispawn step1 and > pkispawn step2. > > Thanks, > Kritee > > On Thu, Nov 6, 2014 at 8:01 AM, Christina Fu > wrote: > > Hi Kritee, > I think we could use a bit more info. > Could you try running pkispawn with script... something like the > following: > script -c 'pkispawn -s CA -f config-step2.txt -vvv' > > the resulting typescript file might give us some more clue. > Christina > > > On 10/31/2014 09:24 PM, kritee jhawar wrote: >> Thanks Christina >> >> I checked out the master branch and built it. Now i can see the >> added extensions in the CSR generated, however i am getting the >> same error as earlier. >> This time again, I tried the supply the certificate chain with >> and without the headers. The chain is in a valid pkcs7 format. >> Following is how the extensions look in the certificate signed by >> openssl for dogtag: >> >> X509v3 extensions: >> X509v3 Basic Constraints: critical >> CA:TRUE >> X509v3 Key Usage: critical >> Digital Signature, Non Repudiation, Certificate >> Sign, CRL Sign >> 1.3.6.1.4.1.311.20.2: >> . >> .S.u.b.C.A >> >> The error i get in step 2 of pkispawn is as follows: >> >> pkispawn : INFO ....... BtoA >> /root/.dogtag/pki-tomcat/ca/alias/admin_pkcs10.bin >> /root/.dogtag/pki-tomcat/ca/alias/admin_pkcs10.bin.asc >> pkispawn : INFO ....... loading external CA signing >> certificate from file: '/home/kjhawar/dogtag/dg_ca.cert' >> pkispawn : INFO ....... loading external CA signing >> certificate chain from file: '/home/kjhawar/dogtag/dg_chain.cert' >> pkispawn : INFO ....... configuring PKI configuration data. >> pkispawn : INFO ....... AtoB >> /root/.dogtag/pki-tomcat/ca_admin.cert >> /root/.dogtag/pki-tomcat/ca_admin.cert.der >> pkispawn : INFO ....... certutil -A -d >> /root/.dogtag/pki-tomcat/ca/alias -n PKI Administrator -t u,u,u >> -i /root/.dogtag/pki-tomcat/ca_admin.cert.der -f >> /root/.dogtag/pki-tomcat/ca/password.conf >> Notice: Trust flag u is set automatically if the private key is >> present. >> pkispawn : INFO ....... pk12util -d >> /root/.dogtag/pki-tomcat/ca/alias -o >> /root/.dogtag/pki-tomcat/ca_admin_cert.p12 -n PKI Administrator >> -w /root/.dogtag/pki-tomcat/ca/pkcs12_password.conf -k >> /root/.dogtag/pki-tomcat/ca/password.conf >> pkispawn : INFO ... finalizing >> 'pki.server.deployment.scriptlets.finalization' >> pkispawn : INFO ....... cp -p >> /etc/sysconfig/pki/tomcat/pki-tomcat/ca/deployment.cfg >> /var/log/pki/pki-tomcat/ca/archive/spawn_deployment.cfg.20141101020655 >> pkispawn : INFO ....... generating manifest file called >> '/etc/sysconfig/pki/tomcat/pki-tomcat/ca/manifest' >> pkispawn : INFO ....... cp -p >> /etc/sysconfig/pki/tomcat/pki-tomcat/ca/manifest >> /var/log/pki/pki-tomcat/ca/archive/spawn_manifest.20141101020655 >> pkispawn : INFO ....... executing 'systemctl daemon-reload' >> pkispawn : INFO ....... executing 'systemctl restart >> pki-tomcatd at pki-tomcat.service >> ' >> Job for pki-tomcatd at pki-tomcat.service >> canceled. >> pkispawn : ERROR ....... subprocess.CalledProcessError: >> Command '['systemctl', 'restart', 'pki-tomcatd at pki-tomcat.service >> ']' returned non-zero exit >> status 1! >> >> Installation failed. >> >> Kindly let me know if any specific configuration has to be done >> in my openssl CA. Attaching the config file i am using currently >> >> Thanks >> Kritee >> >> On Fri, Oct 31, 2014 at 10:36 PM, Christina Fu > > wrote: >> >> Kritee, >> >> At the minimum, you need the fixes I talked about. They were >> checked into the master but has not been built officially so >> yum is not going to get you the right rpm. However, you can >> check it out and build it yourself. >> Here is how you check out the master: >> >> git clone git://git.fedorahosted.org/git/pki.git >> >> You can then use the build scripts to build. >> >> Finally, I apologize that we are not supposed to respond to >> private emails. Dogtag is a community where we share our >> knowledge. In the future please send requests to the mailing >> list. >> I took the exception this time to look at your CSR and certs >> and I could see that you need the fixes I talked about. I >> don't know if you have other issues though, but AFAIK you >> need those two fixes. >> >> Hope this helps. >> Christina >> >> >> On 10/29/2014 01:16 AM, kritee jhawar wrote: >>> Hi Christina >>> >>> I have done the default configuration for 389ds and haven't >>> specifically turned on ssl for it. >>> >>> Initially I tried using Microsoft and OpenSSL CA as external >>> CAs. This is about a month back and I pull the Rpms using >>> yum (so I assume they are the latest ones with the fix you >>> mentioned). >>> With this, my pki spawn went fine. Infect the admin cert got >>> generated using the externally provided root cert as well. >>> But dogtag couldn't connect to the ds. As mentioned earlier >>> it gave me a PKIException error listing the certs with error >>> code 500. >>> Looking at the ds logs I found that the error was 'bad >>> search filter'. >>> However when I tried the same steps with dogtag as external >>> CA the setup went through without a glitch. The chain I >>> imported was directly from the GUI of dogtag. In fact I >>> included the header and footer as well. >>> >>> When I tried to reverse engineer the chain, I took the root >>> cert of external dogtag ca and used OpenSSL to convert it >>> into pkcs7. This chain was not the same as provided from the >>> GUI. Hence I thought that there is some particular format >>> for the chain because of which the other CAs aren't working. >>> >>> Also, I updated the Rpms using yum and tried to generate the >>> CSR with the extra attributes. My csr still doesn't reflect >>> those added attributes. >>> >>> Is yum not the correct way to get the latest code ? >>> >>> I am very new to this, really appreciate your assistance and >>> time. >>> >>> Regards >>> Kritee >>> >>> On Wednesday, 29 October 2014, Christina Fu >> > wrote: >>> >>> the cert chain you provide in the file specified under >>> pki_external_ca_cert_chain_path >>> should be just pkcs7 without header/footer. >>> >>> I don't know why it would not talk to the DS (did you >>> turn on ssl for the ds?). >>> Not sure if you build your Dogtag from the master, if >>> you do, I'd suggest you get the most updated so you get >>> fixes from the tickets I provided previously which would >>> address at least two issues relating to external CA. >>> >>> Christina >>> >>> On 10/27/2014 07:55 PM, kritee jhawar wrote: >>>> Hi Christina >>>> >>>> I was undertaking this activity last month where >>>> Microsoft CA didn't work out but Dogtag as external CA >>>> did. >>>> >>>> While using Microsoft CA or OpenSSL CA, pki spawn goes >>>> through without any error but dogtag stops >>>> communications to 389ds. Upon calling the rest Api >>>> /ca/rest/certs I get a "PKIException error listing the >>>> certs". >>>> >>>> Is there a particular format for the ca cert chain that >>>> we need to provide ? I was trying to reverse engineer >>>> the chain provided by dogtag. >>>> >>>> Thanks >>>> Kritee >>>> >>>> >>>> >>>> On Monday, 27 October 2014, Christina Fu >>>> wrote: >>>> >>>> If you meant the following two: >>>> https://fedorahosted.org/pki/ticket/1190 CA: issuer >>>> DN encoding not preserved at issuance with signing >>>> cert signed by an external CA >>>> https://fedorahosted.org/pki/ticket/1110 - pkispawn >>>> (configuration) does not provide CA extensions in >>>> subordinate certificate signing requests (CSR) >>>> >>>> They have just recently been fixed upstream so I >>>> imagine you could use Microsoft CA now. >>>> Theoretically any other CA can be used as an >>>> external CA, but if you run into issues, please >>>> feel free to report. >>>> >>>> Christina >>>> >>>> >>>> On 10/27/2014 12:15 AM, kritee jhawar wrote: >>>>> Hi >>>>> >>>>> In my recent thread i read that there is a bug due >>>>> to which Microsoft CA can't work as external CA >>>>> for dogtag. >>>>> Can OpenSSL be used ? >>>>> >>>>> Thanks >>>>> Kritee >>>>> >>>>> >>>>> _______________________________________________ >>>>> Pki-users mailing list >>>>> Pki-users at redhat.com >>>>> https://www.redhat.com/mailman/listinfo/pki-users >>>> >>> >> >> >> _______________________________________________ >> Pki-users mailing list >> Pki-users at redhat.com >> https://www.redhat.com/mailman/listinfo/pki-users >> >> > > -------------- next part -------------- An HTML attachment was scrubbed... URL: From kriteejhawar at gmail.com Sat Nov 8 06:48:45 2014 From: kriteejhawar at gmail.com (Kritee Jhawar) Date: Sat, 8 Nov 2014 12:18:45 +0530 Subject: [Pki-users] Can OpensSSL be used as external CA ? In-Reply-To: <545CFC94.7050302@redhat.com> References: <544E6FAB.1020003@redhat.com> <544FF41B.3010705@redhat.com> <5453C1A5.5090206@redhat.com> <545ADD75.2000508@redhat.com> <545CFC94.7050302@redhat.com> Message-ID: <6E1951E1-E8C7-4189-9A1F-DA9BD72CAB66@gmail.com> Hi Christina When using Dogtag as external CA I had provided only the self signed certificate as pkcs7 (the same way I did for OpenSSL) and it had worked. The idea behind this was we needed a constant trust anchor to be burnt into the devices(which will function as clients). Initially I tried to find a way to provide a static root certificate to dogtag so that even after the crash it will come up with the same certificate. Then I moved onto the l Sent from my iPhone > On 07-Nov-2014, at 22:38, Christina Fu wrote: > > Hi Kritee, > > I just looked closely. Your ca cert chain contains only one single self-signed root cert. I think what you need is a chain down to the dogtag CA cert that links up from the root, so in your case, you should have both the root and the dogtag CA cert in the pkcs7. > > Hope that helps. > Christina > > >> On 11/06/2014 01:25 AM, kritee jhawar wrote: >> Hi Christina >> >> Thanks for the response. PFA the typescript for pkispawn step1 and pkispawn step2. >> >> Thanks, >> Kritee >> >> On Thu, Nov 6, 2014 at 8:01 AM, Christina Fu wrote: >>> Hi Kritee, >>> I think we could use a bit more info. >>> Could you try running pkispawn with script... something like the following: >>> script -c 'pkispawn -s CA -f config-step2.txt -vvv' >>> >>> the resulting typescript file might give us some more clue. >>> Christina >>> >>> >>>> On 10/31/2014 09:24 PM, kritee jhawar wrote: >>>> Thanks Christina >>>> >>>> I checked out the master branch and built it. Now i can see the added extensions in the CSR generated, however i am getting the same error as earlier. >>>> This time again, I tried the supply the certificate chain with and without the headers. The chain is in a valid pkcs7 format. >>>> Following is how the extensions look in the certificate signed by openssl for dogtag: >>>> >>>> X509v3 extensions: >>>> X509v3 Basic Constraints: critical >>>> CA:TRUE >>>> X509v3 Key Usage: critical >>>> Digital Signature, Non Repudiation, Certificate Sign, CRL Sign >>>> 1.3.6.1.4.1.311.20.2: >>>> . >>>> .S.u.b.C.A >>>> >>>> The error i get in step 2 of pkispawn is as follows: >>>> >>>> pkispawn : INFO ....... BtoA /root/.dogtag/pki-tomcat/ca/alias/admin_pkcs10.bin /root/.dogtag/pki-tomcat/ca/alias/admin_pkcs10.bin.asc >>>> pkispawn : INFO ....... loading external CA signing certificate from file: '/home/kjhawar/dogtag/dg_ca.cert' >>>> pkispawn : INFO ....... loading external CA signing certificate chain from file: '/home/kjhawar/dogtag/dg_chain.cert' >>>> pkispawn : INFO ....... configuring PKI configuration data. >>>> pkispawn : INFO ....... AtoB /root/.dogtag/pki-tomcat/ca_admin.cert /root/.dogtag/pki-tomcat/ca_admin.cert.der >>>> pkispawn : INFO ....... certutil -A -d /root/.dogtag/pki-tomcat/ca/alias -n PKI Administrator -t u,u,u -i /root/.dogtag/pki-tomcat/ca_admin.cert.der -f /root/.dogtag/pki-tomcat/ca/password.conf >>>> Notice: Trust flag u is set automatically if the private key is present. >>>> pkispawn : INFO ....... pk12util -d /root/.dogtag/pki-tomcat/ca/alias -o /root/.dogtag/pki-tomcat/ca_admin_cert.p12 -n PKI Administrator -w /root/.dogtag/pki-tomcat/ca/pkcs12_password.conf -k /root/.dogtag/pki-tomcat/ca/password.conf >>>> pkispawn : INFO ... finalizing 'pki.server.deployment.scriptlets.finalization' >>>> pkispawn : INFO ....... cp -p /etc/sysconfig/pki/tomcat/pki-tomcat/ca/deployment.cfg /var/log/pki/pki-tomcat/ca/archive/spawn_deployment.cfg.20141101020655 >>>> pkispawn : INFO ....... generating manifest file called '/etc/sysconfig/pki/tomcat/pki-tomcat/ca/manifest' >>>> pkispawn : INFO ....... cp -p /etc/sysconfig/pki/tomcat/pki-tomcat/ca/manifest /var/log/pki/pki-tomcat/ca/archive/spawn_manifest.20141101020655 >>>> pkispawn : INFO ....... executing 'systemctl daemon-reload' >>>> pkispawn : INFO ....... executing 'systemctl restart pki-tomcatd at pki-tomcat.service' >>>> Job for pki-tomcatd at pki-tomcat.service canceled. >>>> pkispawn : ERROR ....... subprocess.CalledProcessError: Command '['systemctl', 'restart', 'pki-tomcatd at pki-tomcat.service']' returned non-zero exit status 1! >>>> >>>> Installation failed. >>>> >>>> Kindly let me know if any specific configuration has to be done in my openssl CA. Attaching the config file i am using currently >>>> >>>> Thanks >>>> Kritee >>>> >>>>> On Fri, Oct 31, 2014 at 10:36 PM, Christina Fu wrote: >>>>> Kritee, >>>>> >>>>> At the minimum, you need the fixes I talked about. They were checked into the master but has not been built officially so yum is not going to get you the right rpm. However, you can check it out and build it yourself. >>>>> Here is how you check out the master: >>>>> git clone git://git.fedorahosted.org/git/pki.git >>>>> You can then use the build scripts to build. >>>>> >>>>> Finally, I apologize that we are not supposed to respond to private emails. Dogtag is a community where we share our knowledge. In the future please send requests to the mailing list. >>>>> I took the exception this time to look at your CSR and certs and I could see that you need the fixes I talked about. I don't know if you have other issues though, but AFAIK you need those two fixes. >>>>> >>>>> Hope this helps. >>>>> Christina >>>>> >>>>> >>>>>> On 10/29/2014 01:16 AM, kritee jhawar wrote: >>>>>> Hi Christina >>>>>> >>>>>> I have done the default configuration for 389ds and haven't specifically turned on ssl for it. >>>>>> >>>>>> Initially I tried using Microsoft and OpenSSL CA as external CAs. This is about a month back and I pull the Rpms using yum (so I assume they are the latest ones with the fix you mentioned). >>>>>> With this, my pki spawn went fine. Infect the admin cert got generated using the externally provided root cert as well. But dogtag couldn't connect to the ds. As mentioned earlier it gave me a PKIException error listing the certs with error code 500. >>>>>> Looking at the ds logs I found that the error was 'bad search filter'. >>>>>> However when I tried the same steps with dogtag as external CA the setup went through without a glitch. The chain I imported was directly from the GUI of dogtag. In fact I included the header and footer as well. >>>>>> >>>>>> When I tried to reverse engineer the chain, I took the root cert of external dogtag ca and used OpenSSL to convert it into pkcs7. This chain was not the same as provided from the GUI. Hence I thought that there is some particular format for the chain because of which the other CAs aren't working. >>>>>> >>>>>> Also, I updated the Rpms using yum and tried to generate the CSR with the extra attributes. My csr still doesn't reflect those added attributes. >>>>>> >>>>>> Is yum not the correct way to get the latest code ? >>>>>> >>>>>> I am very new to this, really appreciate your assistance and time. >>>>>> >>>>>> Regards >>>>>> Kritee >>>>>> >>>>>>> On Wednesday, 29 October 2014, Christina Fu wrote: >>>>>>> the cert chain you provide in the file specified under >>>>>>> pki_external_ca_cert_chain_path >>>>>>> should be just pkcs7 without header/footer. >>>>>>> >>>>>>> I don't know why it would not talk to the DS (did you turn on ssl for the ds?). >>>>>>> Not sure if you build your Dogtag from the master, if you do, I'd suggest you get the most updated so you get fixes from the tickets I provided previously which would address at least two issues relating to external CA. >>>>>>> >>>>>>> Christina >>>>>>> >>>>>>>> On 10/27/2014 07:55 PM, kritee jhawar wrote: >>>>>>>> Hi Christina >>>>>>>> >>>>>>>> I was undertaking this activity last month where Microsoft CA didn't work out but Dogtag as external CA did. >>>>>>>> >>>>>>>> While using Microsoft CA or OpenSSL CA, pki spawn goes through without any error but dogtag stops communications to 389ds. Upon calling the rest Api /ca/rest/certs I get a "PKIException error listing the certs". >>>>>>>> >>>>>>>> Is there a particular format for the ca cert chain that we need to provide ? I was trying to reverse engineer the chain provided by dogtag. >>>>>>>> >>>>>>>> Thanks >>>>>>>> Kritee >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>>> On Monday, 27 October 2014, Christina Fu wrote: >>>>>>>>> If you meant the following two: >>>>>>>>> https://fedorahosted.org/pki/ticket/1190 CA: issuer DN encoding not preserved at issuance with signing cert signed by an external CA >>>>>>>>> https://fedorahosted.org/pki/ticket/1110 - pkispawn (configuration) does not provide CA extensions in subordinate certificate signing requests (CSR) >>>>>>>>> >>>>>>>>> They have just recently been fixed upstream so I imagine you could use Microsoft CA now. Theoretically any other CA can be used as an external CA, but if you run into issues, please feel free to report. >>>>>>>>> >>>>>>>>> Christina >>>>>>>>> >>>>>>>>> >>>>>>>>>> On 10/27/2014 12:15 AM, kritee jhawar wrote: >>>>>>>>>> Hi >>>>>>>>>> >>>>>>>>>> In my recent thread i read that there is a bug due to which Microsoft CA can't work as external CA for dogtag. >>>>>>>>>> Can OpenSSL be used ? >>>>>>>>>> >>>>>>>>>> Thanks >>>>>>>>>> Kritee >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> _______________________________________________ >>>>>>>>>> Pki-users mailing list >>>>>>>>>> Pki-users at redhat.com >>>>>>>>>> https://www.redhat.com/mailman/listinfo/pki-users >>>>> >>>>> >>>>> _______________________________________________ >>>>> Pki-users mailing list >>>>> Pki-users at redhat.com >>>>> https://www.redhat.com/mailman/listinfo/pki-users > -------------- next part -------------- An HTML attachment was scrubbed... URL: From kriteejhawar at gmail.com Sun Nov 9 10:23:00 2014 From: kriteejhawar at gmail.com (kritee jhawar) Date: Sun, 9 Nov 2014 15:53:00 +0530 Subject: [Pki-users] Can OpensSSL be used as external CA ? In-Reply-To: <6E1951E1-E8C7-4189-9A1F-DA9BD72CAB66@gmail.com> References: <544E6FAB.1020003@redhat.com> <544FF41B.3010705@redhat.com> <5453C1A5.5090206@redhat.com> <545ADD75.2000508@redhat.com> <545CFC94.7050302@redhat.com> <6E1951E1-E8C7-4189-9A1F-DA9BD72CAB66@gmail.com> Message-ID: Sorry for the incomplete reply, the mail got sent by mistake. Hi Christina When using Dogtag as external CA I had provided only the self signed certificate as pkcs7 (the same way I did for OpenSSL) and it had worked. The idea behind this was we needed a constant trust anchor to be burnt into the devices(which will function as clients). Initially I tried to find a way to provide a static root certificate to dogtag so that even after the crash it will come up with the same certificate. However i didnt find anything. Then I moved onto the external CA option. Now when i tried with a chain of 2 certificates (self signed cert for openssl + cert signed by openssl for dogtag) I get the same error as before. Thanks Kritee On Sat, Nov 8, 2014 at 12:18 PM, Kritee Jhawar wrote: > Hi Christina > > When using Dogtag as external CA I had provided only the self signed > certificate as pkcs7 (the same way I did for OpenSSL) and it had worked. > > The idea behind this was we needed a constant trust anchor to be burnt > into the devices(which will function as clients). Initially I tried to find > a way to provide a static root certificate to dogtag so that even after the > crash it will come up with the same certificate. > Then I moved onto the l > > Sent from my iPhone > > On 07-Nov-2014, at 22:38, Christina Fu wrote: > > Hi Kritee, > > I just looked closely. Your ca cert chain contains only one single > self-signed root cert. I think what you need is a chain down to the dogtag > CA cert that links up from the root, so in your case, you should have both > the root and the dogtag CA cert in the pkcs7. > > Hope that helps. > Christina > > > On 11/06/2014 01:25 AM, kritee jhawar wrote: > > Hi Christina > > Thanks for the response. PFA the typescript for pkispawn step1 and > pkispawn step2. > > Thanks, > Kritee > > On Thu, Nov 6, 2014 at 8:01 AM, Christina Fu wrote: > >> Hi Kritee, >> I think we could use a bit more info. >> Could you try running pkispawn with script... something like the >> following: >> script -c 'pkispawn -s CA -f config-step2.txt -vvv' >> >> the resulting typescript file might give us some more clue. >> Christina >> >> >> On 10/31/2014 09:24 PM, kritee jhawar wrote: >> >> Thanks Christina >> >> I checked out the master branch and built it. Now i can see the added >> extensions in the CSR generated, however i am getting the same error as >> earlier. >> This time again, I tried the supply the certificate chain with and >> without the headers. The chain is in a valid pkcs7 format. >> Following is how the extensions look in the certificate signed by >> openssl for dogtag: >> >> X509v3 extensions: >> X509v3 Basic Constraints: critical >> CA:TRUE >> X509v3 Key Usage: critical >> Digital Signature, Non Repudiation, Certificate Sign, CRL >> Sign >> 1.3.6.1.4.1.311.20.2: >> . >> .S.u.b.C.A >> >> The error i get in step 2 of pkispawn is as follows: >> >> pkispawn : INFO ....... BtoA >> /root/.dogtag/pki-tomcat/ca/alias/admin_pkcs10.bin >> /root/.dogtag/pki-tomcat/ca/alias/admin_pkcs10.bin.asc >> pkispawn : INFO ....... loading external CA signing certificate >> from file: '/home/kjhawar/dogtag/dg_ca.cert' >> pkispawn : INFO ....... loading external CA signing certificate >> chain from file: '/home/kjhawar/dogtag/dg_chain.cert' >> pkispawn : INFO ....... configuring PKI configuration data. >> pkispawn : INFO ....... AtoB >> /root/.dogtag/pki-tomcat/ca_admin.cert >> /root/.dogtag/pki-tomcat/ca_admin.cert.der >> pkispawn : INFO ....... certutil -A -d >> /root/.dogtag/pki-tomcat/ca/alias -n PKI Administrator -t u,u,u -i >> /root/.dogtag/pki-tomcat/ca_admin.cert.der -f >> /root/.dogtag/pki-tomcat/ca/password.conf >> Notice: Trust flag u is set automatically if the private key is present. >> pkispawn : INFO ....... pk12util -d >> /root/.dogtag/pki-tomcat/ca/alias -o >> /root/.dogtag/pki-tomcat/ca_admin_cert.p12 -n PKI Administrator -w >> /root/.dogtag/pki-tomcat/ca/pkcs12_password.conf -k >> /root/.dogtag/pki-tomcat/ca/password.conf >> pkispawn : INFO ... finalizing >> 'pki.server.deployment.scriptlets.finalization' >> pkispawn : INFO ....... cp -p >> /etc/sysconfig/pki/tomcat/pki-tomcat/ca/deployment.cfg >> /var/log/pki/pki-tomcat/ca/archive/spawn_deployment.cfg.20141101020655 >> pkispawn : INFO ....... generating manifest file called >> '/etc/sysconfig/pki/tomcat/pki-tomcat/ca/manifest' >> pkispawn : INFO ....... cp -p >> /etc/sysconfig/pki/tomcat/pki-tomcat/ca/manifest >> /var/log/pki/pki-tomcat/ca/archive/spawn_manifest.20141101020655 >> pkispawn : INFO ....... executing 'systemctl daemon-reload' >> pkispawn : INFO ....... executing 'systemctl restart >> pki-tomcatd at pki-tomcat.service' >> Job for pki-tomcatd at pki-tomcat.service canceled. >> pkispawn : ERROR ....... subprocess.CalledProcessError: Command >> '['systemctl', 'restart', 'pki-tomcatd at pki-tomcat.service']' returned >> non-zero exit status 1! >> >> Installation failed. >> >> Kindly let me know if any specific configuration has to be done in my >> openssl CA. Attaching the config file i am using currently >> >> Thanks >> Kritee >> >> On Fri, Oct 31, 2014 at 10:36 PM, Christina Fu wrote: >> >>> Kritee, >>> >>> At the minimum, you need the fixes I talked about. They were checked >>> into the master but has not been built officially so yum is not going to >>> get you the right rpm. However, you can check it out and build it yourself. >>> Here is how you check out the master: >>> >>> git clone git://git.fedorahosted.org/git/pki.git >>> >>> You can then use the build scripts to build. >>> >>> Finally, I apologize that we are not supposed to respond to private >>> emails. Dogtag is a community where we share our knowledge. In the future >>> please send requests to the mailing list. >>> I took the exception this time to look at your CSR and certs and I could >>> see that you need the fixes I talked about. I don't know if you have other >>> issues though, but AFAIK you need those two fixes. >>> >>> Hope this helps. >>> Christina >>> >>> >>> On 10/29/2014 01:16 AM, kritee jhawar wrote: >>> >>> Hi Christina >>> >>> I have done the default configuration for 389ds and haven't >>> specifically turned on ssl for it. >>> >>> Initially I tried using Microsoft and OpenSSL CA as external CAs. This >>> is about a month back and I pull the Rpms using yum (so I assume they are >>> the latest ones with the fix you mentioned). >>> With this, my pki spawn went fine. Infect the admin cert got generated >>> using the externally provided root cert as well. But dogtag couldn't >>> connect to the ds. As mentioned earlier it gave me a PKIException error >>> listing the certs with error code 500. >>> Looking at the ds logs I found that the error was 'bad search filter'. >>> However when I tried the same steps with dogtag as external CA the setup >>> went through without a glitch. The chain I imported was directly from the >>> GUI of dogtag. In fact I included the header and footer as well. >>> >>> When I tried to reverse engineer the chain, I took the root cert of >>> external dogtag ca and used OpenSSL to convert it into pkcs7. This chain >>> was not the same as provided from the GUI. Hence I thought that there is >>> some particular format for the chain because of which the other CAs aren't >>> working. >>> >>> Also, I updated the Rpms using yum and tried to generate the CSR with >>> the extra attributes. My csr still doesn't reflect those added attributes. >>> >>> Is yum not the correct way to get the latest code ? >>> >>> I am very new to this, really appreciate your assistance and time. >>> >>> Regards >>> Kritee >>> >>> On Wednesday, 29 October 2014, Christina Fu wrote: >>> >>>> the cert chain you provide in the file specified under >>>> pki_external_ca_cert_chain_path >>>> should be just pkcs7 without header/footer. >>>> >>>> I don't know why it would not talk to the DS (did you turn on ssl for >>>> the ds?). >>>> Not sure if you build your Dogtag from the master, if you do, I'd >>>> suggest you get the most updated so you get fixes from the tickets I >>>> provided previously which would address at least two issues relating to >>>> external CA. >>>> >>>> Christina >>>> >>>> On 10/27/2014 07:55 PM, kritee jhawar wrote: >>>> >>>> Hi Christina >>>> >>>> I was undertaking this activity last month where Microsoft CA didn't >>>> work out but Dogtag as external CA did. >>>> >>>> While using Microsoft CA or OpenSSL CA, pki spawn goes through >>>> without any error but dogtag stops communications to 389ds. Upon calling >>>> the rest Api /ca/rest/certs I get a "PKIException error listing the certs". >>>> >>>> Is there a particular format for the ca cert chain that we need to >>>> provide ? I was trying to reverse engineer the chain provided by dogtag. >>>> >>>> Thanks >>>> Kritee >>>> >>>> >>>> >>>> On Monday, 27 October 2014, Christina Fu wrote: >>>> >>>>> If you meant the following two: >>>>> https://fedorahosted.org/pki/ticket/1190 CA: issuer DN encoding not >>>>> preserved at issuance with signing cert signed by an external CA >>>>> https://fedorahosted.org/pki/ticket/1110 - pkispawn (configuration) >>>>> does not provide CA extensions in subordinate certificate signing requests >>>>> (CSR) >>>>> >>>>> They have just recently been fixed upstream so I imagine you could use >>>>> Microsoft CA now. Theoretically any other CA can be used as an external >>>>> CA, but if you run into issues, please feel free to report. >>>>> >>>>> Christina >>>>> >>>>> >>>>> On 10/27/2014 12:15 AM, kritee jhawar wrote: >>>>> >>>>> Hi >>>>> >>>>> In my recent thread i read that there is a bug due to which >>>>> Microsoft CA can't work as external CA for dogtag. >>>>> Can OpenSSL be used ? >>>>> >>>>> Thanks >>>>> Kritee >>>>> >>>>> >>>>> _______________________________________________ >>>>> Pki-users mailing listPki-users at redhat.comhttps://www.redhat.com/mailman/listinfo/pki-users >>>>> >>>>> >>>>> >>>> >>> >>> _______________________________________________ >>> Pki-users mailing list >>> Pki-users at redhat.com >>> https://www.redhat.com/mailman/listinfo/pki-users >>> >> >> >> > > -------------- next part -------------- An HTML attachment was scrubbed... URL: From cfu at redhat.com Tue Nov 11 02:44:18 2014 From: cfu at redhat.com (Christina Fu) Date: Mon, 10 Nov 2014 18:44:18 -0800 Subject: [Pki-users] Can OpensSSL be used as external CA ? In-Reply-To: <6E1951E1-E8C7-4189-9A1F-DA9BD72CAB66@gmail.com> References: <544E6FAB.1020003@redhat.com> <544FF41B.3010705@redhat.com> <5453C1A5.5090206@redhat.com> <545ADD75.2000508@redhat.com> <545CFC94.7050302@redhat.com> <6E1951E1-E8C7-4189-9A1F-DA9BD72CAB66@gmail.com> Message-ID: <54617802.4040500@redhat.com> hi Kritee, I'm sorry I can't find anything visually. Could you send the debug log? should be somewhere in /var/lib/pki/pki-tomcat/ca/logs. While you are at it, maybe send the system log and selftests.log as well. Christina On 11/07/2014 10:48 PM, Kritee Jhawar wrote: > Hi Christina > > When using Dogtag as external CA I had provided only the self signed > certificate as pkcs7 (the same way I did for OpenSSL) and it had worked. > > The idea behind this was we needed a constant trust anchor to be burnt > into the devices(which will function as clients). Initially I tried to > find a way to provide a static root certificate to dogtag so that even > after the crash it will come up with the same certificate. > Then I moved onto the l > > Sent from my iPhone > > On 07-Nov-2014, at 22:38, Christina Fu > wrote: > >> Hi Kritee, >> >> I just looked closely. Your ca cert chain contains only one single >> self-signed root cert. I think what you need is a chain down to the >> dogtag CA cert that links up from the root, so in your case, you >> should have both the root and the dogtag CA cert in the pkcs7. >> >> Hope that helps. >> Christina >> >> >> On 11/06/2014 01:25 AM, kritee jhawar wrote: >>> Hi Christina >>> >>> Thanks for the response. PFA the typescript for pkispawn step1 and >>> pkispawn step2. >>> >>> Thanks, >>> Kritee >>> >>> On Thu, Nov 6, 2014 at 8:01 AM, Christina Fu >> > wrote: >>> >>> Hi Kritee, >>> I think we could use a bit more info. >>> Could you try running pkispawn with script... something like the >>> following: >>> script -c 'pkispawn -s CA -f config-step2.txt -vvv' >>> >>> the resulting typescript file might give us some more clue. >>> Christina >>> >>> >>> On 10/31/2014 09:24 PM, kritee jhawar wrote: >>>> Thanks Christina >>>> >>>> I checked out the master branch and built it. Now i can see the >>>> added extensions in the CSR generated, however i am getting the >>>> same error as earlier. >>>> This time again, I tried the supply the certificate chain with >>>> and without the headers. The chain is in a valid pkcs7 format. >>>> Following is how the extensions look in the certificate signed >>>> by openssl for dogtag: >>>> >>>> X509v3 extensions: >>>> X509v3 Basic Constraints: critical >>>> CA:TRUE >>>> X509v3 Key Usage: critical >>>> Digital Signature, Non Repudiation, Certificate >>>> Sign, CRL Sign >>>> 1.3.6.1.4.1.311.20.2: >>>> . >>>> .S.u.b.C.A >>>> >>>> The error i get in step 2 of pkispawn is as follows: >>>> >>>> pkispawn : INFO ....... BtoA >>>> /root/.dogtag/pki-tomcat/ca/alias/admin_pkcs10.bin >>>> /root/.dogtag/pki-tomcat/ca/alias/admin_pkcs10.bin.asc >>>> pkispawn : INFO ....... loading external CA signing >>>> certificate from file: '/home/kjhawar/dogtag/dg_ca.cert' >>>> pkispawn : INFO ....... loading external CA signing >>>> certificate chain from file: '/home/kjhawar/dogtag/dg_chain.cert' >>>> pkispawn : INFO ....... configuring PKI configuration data. >>>> pkispawn : INFO ....... AtoB >>>> /root/.dogtag/pki-tomcat/ca_admin.cert >>>> /root/.dogtag/pki-tomcat/ca_admin.cert.der >>>> pkispawn : INFO ....... certutil -A -d >>>> /root/.dogtag/pki-tomcat/ca/alias -n PKI Administrator -t u,u,u >>>> -i /root/.dogtag/pki-tomcat/ca_admin.cert.der -f >>>> /root/.dogtag/pki-tomcat/ca/password.conf >>>> Notice: Trust flag u is set automatically if the private key is >>>> present. >>>> pkispawn : INFO ....... pk12util -d >>>> /root/.dogtag/pki-tomcat/ca/alias -o >>>> /root/.dogtag/pki-tomcat/ca_admin_cert.p12 -n PKI Administrator >>>> -w /root/.dogtag/pki-tomcat/ca/pkcs12_password.conf -k >>>> /root/.dogtag/pki-tomcat/ca/password.conf >>>> pkispawn : INFO ... finalizing >>>> 'pki.server.deployment.scriptlets.finalization' >>>> pkispawn : INFO ....... cp -p >>>> /etc/sysconfig/pki/tomcat/pki-tomcat/ca/deployment.cfg >>>> /var/log/pki/pki-tomcat/ca/archive/spawn_deployment.cfg.20141101020655 >>>> pkispawn : INFO ....... generating manifest file called >>>> '/etc/sysconfig/pki/tomcat/pki-tomcat/ca/manifest' >>>> pkispawn : INFO ....... cp -p >>>> /etc/sysconfig/pki/tomcat/pki-tomcat/ca/manifest >>>> /var/log/pki/pki-tomcat/ca/archive/spawn_manifest.20141101020655 >>>> pkispawn : INFO ....... executing 'systemctl daemon-reload' >>>> pkispawn : INFO ....... executing 'systemctl restart >>>> pki-tomcatd at pki-tomcat.service >>>> ' >>>> Job for pki-tomcatd at pki-tomcat.service >>>> canceled. >>>> pkispawn : ERROR ....... subprocess.CalledProcessError: >>>> Command '['systemctl', 'restart', >>>> 'pki-tomcatd at pki-tomcat.service >>>> ']' returned non-zero >>>> exit status 1! >>>> >>>> Installation failed. >>>> >>>> Kindly let me know if any specific configuration has to be done >>>> in my openssl CA. Attaching the config file i am using currently >>>> >>>> Thanks >>>> Kritee >>>> >>>> On Fri, Oct 31, 2014 at 10:36 PM, Christina Fu >>> > wrote: >>>> >>>> Kritee, >>>> >>>> At the minimum, you need the fixes I talked about. They >>>> were checked into the master but has not been built >>>> officially so yum is not going to get you the right rpm. >>>> However, you can check it out and build it yourself. >>>> Here is how you check out the master: >>>> >>>> git clone git://git.fedorahosted.org/git/pki.git >>>> >>>> You can then use the build scripts to build. >>>> >>>> Finally, I apologize that we are not supposed to respond to >>>> private emails. Dogtag is a community where we share our >>>> knowledge. In the future please send requests to the >>>> mailing list. >>>> I took the exception this time to look at your CSR and >>>> certs and I could see that you need the fixes I talked >>>> about. I don't know if you have other issues though, but >>>> AFAIK you need those two fixes. >>>> >>>> Hope this helps. >>>> Christina >>>> >>>> >>>> On 10/29/2014 01:16 AM, kritee jhawar wrote: >>>>> Hi Christina >>>>> >>>>> I have done the default configuration for 389ds and >>>>> haven't specifically turned on ssl for it. >>>>> >>>>> Initially I tried using Microsoft and OpenSSL CA as >>>>> external CAs. This is about a month back and I pull the >>>>> Rpms using yum (so I assume they are the latest ones with >>>>> the fix you mentioned). >>>>> With this, my pki spawn went fine. Infect the admin cert >>>>> got generated using the externally provided root cert as >>>>> well. But dogtag couldn't connect to the ds. As mentioned >>>>> earlier it gave me a PKIException error listing the certs >>>>> with error code 500. >>>>> Looking at the ds logs I found that the error was 'bad >>>>> search filter'. >>>>> However when I tried the same steps with dogtag as >>>>> external CA the setup went through without a glitch. The >>>>> chain I imported was directly from the GUI of dogtag. In >>>>> fact I included the header and footer as well. >>>>> >>>>> When I tried to reverse engineer the chain, I took the >>>>> root cert of external dogtag ca and used OpenSSL to >>>>> convert it into pkcs7. This chain was not the same as >>>>> provided from the GUI. Hence I thought that there is some >>>>> particular format for the chain because of which the other >>>>> CAs aren't working. >>>>> >>>>> Also, I updated the Rpms using yum and tried to generate >>>>> the CSR with the extra attributes. My csr still doesn't >>>>> reflect those added attributes. >>>>> >>>>> Is yum not the correct way to get the latest code ? >>>>> >>>>> I am very new to this, really appreciate your assistance >>>>> and time. >>>>> >>>>> Regards >>>>> Kritee >>>>> >>>>> On Wednesday, 29 October 2014, Christina Fu >>>>> > wrote: >>>>> >>>>> the cert chain you provide in the file specified under >>>>> pki_external_ca_cert_chain_path >>>>> should be just pkcs7 without header/footer. >>>>> >>>>> I don't know why it would not talk to the DS (did you >>>>> turn on ssl for the ds?). >>>>> Not sure if you build your Dogtag from the master, if >>>>> you do, I'd suggest you get the most updated so you >>>>> get fixes from the tickets I provided previously which >>>>> would address at least two issues relating to external CA. >>>>> >>>>> Christina >>>>> >>>>> On 10/27/2014 07:55 PM, kritee jhawar wrote: >>>>>> Hi Christina >>>>>> >>>>>> I was undertaking this activity last month where >>>>>> Microsoft CA didn't work out but Dogtag as external >>>>>> CA did. >>>>>> >>>>>> While using Microsoft CA or OpenSSL CA, pki spawn >>>>>> goes through without any error but dogtag stops >>>>>> communications to 389ds. Upon calling the rest Api >>>>>> /ca/rest/certs I get a "PKIException error listing >>>>>> the certs". >>>>>> >>>>>> Is there a particular format for the ca cert chain >>>>>> that we need to provide ? I was trying to reverse >>>>>> engineer the chain provided by dogtag. >>>>>> >>>>>> Thanks >>>>>> Kritee >>>>>> >>>>>> >>>>>> >>>>>> On Monday, 27 October 2014, Christina Fu >>>>>> wrote: >>>>>> >>>>>> If you meant the following two: >>>>>> https://fedorahosted.org/pki/ticket/1190 CA: >>>>>> issuer DN encoding not preserved at issuance with >>>>>> signing cert signed by an external CA >>>>>> https://fedorahosted.org/pki/ticket/1110 - >>>>>> pkispawn (configuration) does not provide CA >>>>>> extensions in subordinate certificate signing >>>>>> requests (CSR) >>>>>> >>>>>> They have just recently been fixed upstream so I >>>>>> imagine you could use Microsoft CA now. >>>>>> Theoretically any other CA can be used as an >>>>>> external CA, but if you run into issues, please >>>>>> feel free to report. >>>>>> >>>>>> Christina >>>>>> >>>>>> >>>>>> On 10/27/2014 12:15 AM, kritee jhawar wrote: >>>>>>> Hi >>>>>>> >>>>>>> In my recent thread i read that there is a bug >>>>>>> due to which Microsoft CA can't work as external >>>>>>> CA for dogtag. >>>>>>> Can OpenSSL be used ? >>>>>>> >>>>>>> Thanks >>>>>>> Kritee >>>>>>> >>>>>>> >>>>>>> _______________________________________________ >>>>>>> Pki-users mailing list >>>>>>> Pki-users at redhat.com >>>>>>> https://www.redhat.com/mailman/listinfo/pki-users >>>>>> >>>>> >>>> >>>> >>>> _______________________________________________ >>>> Pki-users mailing list >>>> Pki-users at redhat.com >>>> https://www.redhat.com/mailman/listinfo/pki-users >>>> >>>> >>> >>> >> -------------- next part -------------- An HTML attachment was scrubbed... URL: From kriteejhawar at gmail.com Tue Nov 11 02:55:18 2014 From: kriteejhawar at gmail.com (kritee jhawar) Date: Tue, 11 Nov 2014 08:25:18 +0530 Subject: [Pki-users] Can OpensSSL be used as external CA ? In-Reply-To: <54617802.4040500@redhat.com> References: <544E6FAB.1020003@redhat.com> <544FF41B.3010705@redhat.com> <5453C1A5.5090206@redhat.com> <545ADD75.2000508@redhat.com> <545CFC94.7050302@redhat.com> <6E1951E1-E8C7-4189-9A1F-DA9BD72CAB66@gmail.com> <54617802.4040500@redhat.com> Message-ID: Hi Christina PFA the logs. As for my other question, this is the only mechanism with which we can control the root certificate of dogtag?Is there no other way where we can bring up Dogtag with an externally provided certificate? Because if I have to pass the root cert of OpenSSL along with the cert signed for dogtag as chain, it defeats my whole purpose of the exercise. Thanks again for helping out so actively. Regards Kritee On Tue, Nov 11, 2014 at 8:14 AM, Christina Fu wrote: > hi Kritee, > I'm sorry I can't find anything visually. Could you send the debug log? > should be somewhere in /var/lib/pki/pki-tomcat/ca/logs. While you are at > it, maybe send the system log and selftests.log as well. > > Christina > > > On 11/07/2014 10:48 PM, Kritee Jhawar wrote: > > Hi Christina > > When using Dogtag as external CA I had provided only the self signed > certificate as pkcs7 (the same way I did for OpenSSL) and it had worked. > > The idea behind this was we needed a constant trust anchor to be burnt > into the devices(which will function as clients). Initially I tried to find > a way to provide a static root certificate to dogtag so that even after the > crash it will come up with the same certificate. > Then I moved onto the l > > Sent from my iPhone > > On 07-Nov-2014, at 22:38, Christina Fu wrote: > > Hi Kritee, > > I just looked closely. Your ca cert chain contains only one single > self-signed root cert. I think what you need is a chain down to the dogtag > CA cert that links up from the root, so in your case, you should have both > the root and the dogtag CA cert in the pkcs7. > > Hope that helps. > Christina > > > On 11/06/2014 01:25 AM, kritee jhawar wrote: > > Hi Christina > > Thanks for the response. PFA the typescript for pkispawn step1 and > pkispawn step2. > > Thanks, > Kritee > > On Thu, Nov 6, 2014 at 8:01 AM, Christina Fu wrote: > >> Hi Kritee, >> I think we could use a bit more info. >> Could you try running pkispawn with script... something like the >> following: >> script -c 'pkispawn -s CA -f config-step2.txt -vvv' >> >> the resulting typescript file might give us some more clue. >> Christina >> >> >> On 10/31/2014 09:24 PM, kritee jhawar wrote: >> >> Thanks Christina >> >> I checked out the master branch and built it. Now i can see the added >> extensions in the CSR generated, however i am getting the same error as >> earlier. >> This time again, I tried the supply the certificate chain with and >> without the headers. The chain is in a valid pkcs7 format. >> Following is how the extensions look in the certificate signed by >> openssl for dogtag: >> >> X509v3 extensions: >> X509v3 Basic Constraints: critical >> CA:TRUE >> X509v3 Key Usage: critical >> Digital Signature, Non Repudiation, Certificate Sign, CRL >> Sign >> 1.3.6.1.4.1.311.20.2: >> . >> .S.u.b.C.A >> >> The error i get in step 2 of pkispawn is as follows: >> >> pkispawn : INFO ....... BtoA >> /root/.dogtag/pki-tomcat/ca/alias/admin_pkcs10.bin >> /root/.dogtag/pki-tomcat/ca/alias/admin_pkcs10.bin.asc >> pkispawn : INFO ....... loading external CA signing certificate >> from file: '/home/kjhawar/dogtag/dg_ca.cert' >> pkispawn : INFO ....... loading external CA signing certificate >> chain from file: '/home/kjhawar/dogtag/dg_chain.cert' >> pkispawn : INFO ....... configuring PKI configuration data. >> pkispawn : INFO ....... AtoB >> /root/.dogtag/pki-tomcat/ca_admin.cert >> /root/.dogtag/pki-tomcat/ca_admin.cert.der >> pkispawn : INFO ....... certutil -A -d >> /root/.dogtag/pki-tomcat/ca/alias -n PKI Administrator -t u,u,u -i >> /root/.dogtag/pki-tomcat/ca_admin.cert.der -f >> /root/.dogtag/pki-tomcat/ca/password.conf >> Notice: Trust flag u is set automatically if the private key is present. >> pkispawn : INFO ....... pk12util -d >> /root/.dogtag/pki-tomcat/ca/alias -o >> /root/.dogtag/pki-tomcat/ca_admin_cert.p12 -n PKI Administrator -w >> /root/.dogtag/pki-tomcat/ca/pkcs12_password.conf -k >> /root/.dogtag/pki-tomcat/ca/password.conf >> pkispawn : INFO ... finalizing >> 'pki.server.deployment.scriptlets.finalization' >> pkispawn : INFO ....... cp -p >> /etc/sysconfig/pki/tomcat/pki-tomcat/ca/deployment.cfg >> /var/log/pki/pki-tomcat/ca/archive/spawn_deployment.cfg.20141101020655 >> pkispawn : INFO ....... generating manifest file called >> '/etc/sysconfig/pki/tomcat/pki-tomcat/ca/manifest' >> pkispawn : INFO ....... cp -p >> /etc/sysconfig/pki/tomcat/pki-tomcat/ca/manifest >> /var/log/pki/pki-tomcat/ca/archive/spawn_manifest.20141101020655 >> pkispawn : INFO ....... executing 'systemctl daemon-reload' >> pkispawn : INFO ....... executing 'systemctl restart >> pki-tomcatd at pki-tomcat.service' >> Job for pki-tomcatd at pki-tomcat.service canceled. >> pkispawn : ERROR ....... subprocess.CalledProcessError: Command >> '['systemctl', 'restart', 'pki-tomcatd at pki-tomcat.service']' returned >> non-zero exit status 1! >> >> Installation failed. >> >> Kindly let me know if any specific configuration has to be done in my >> openssl CA. Attaching the config file i am using currently >> >> Thanks >> Kritee >> >> On Fri, Oct 31, 2014 at 10:36 PM, Christina Fu wrote: >> >>> Kritee, >>> >>> At the minimum, you need the fixes I talked about. They were checked >>> into the master but has not been built officially so yum is not going to >>> get you the right rpm. However, you can check it out and build it yourself. >>> Here is how you check out the master: >>> >>> git clone git://git.fedorahosted.org/git/pki.git >>> >>> You can then use the build scripts to build. >>> >>> Finally, I apologize that we are not supposed to respond to private >>> emails. Dogtag is a community where we share our knowledge. In the future >>> please send requests to the mailing list. >>> I took the exception this time to look at your CSR and certs and I could >>> see that you need the fixes I talked about. I don't know if you have other >>> issues though, but AFAIK you need those two fixes. >>> >>> Hope this helps. >>> Christina >>> >>> >>> On 10/29/2014 01:16 AM, kritee jhawar wrote: >>> >>> Hi Christina >>> >>> I have done the default configuration for 389ds and haven't >>> specifically turned on ssl for it. >>> >>> Initially I tried using Microsoft and OpenSSL CA as external CAs. This >>> is about a month back and I pull the Rpms using yum (so I assume they are >>> the latest ones with the fix you mentioned). >>> With this, my pki spawn went fine. Infect the admin cert got generated >>> using the externally provided root cert as well. But dogtag couldn't >>> connect to the ds. As mentioned earlier it gave me a PKIException error >>> listing the certs with error code 500. >>> Looking at the ds logs I found that the error was 'bad search filter'. >>> However when I tried the same steps with dogtag as external CA the setup >>> went through without a glitch. The chain I imported was directly from the >>> GUI of dogtag. In fact I included the header and footer as well. >>> >>> When I tried to reverse engineer the chain, I took the root cert of >>> external dogtag ca and used OpenSSL to convert it into pkcs7. This chain >>> was not the same as provided from the GUI. Hence I thought that there is >>> some particular format for the chain because of which the other CAs aren't >>> working. >>> >>> Also, I updated the Rpms using yum and tried to generate the CSR with >>> the extra attributes. My csr still doesn't reflect those added attributes. >>> >>> Is yum not the correct way to get the latest code ? >>> >>> I am very new to this, really appreciate your assistance and time. >>> >>> Regards >>> Kritee >>> >>> On Wednesday, 29 October 2014, Christina Fu wrote: >>> >>>> the cert chain you provide in the file specified under >>>> pki_external_ca_cert_chain_path >>>> should be just pkcs7 without header/footer. >>>> >>>> I don't know why it would not talk to the DS (did you turn on ssl for >>>> the ds?). >>>> Not sure if you build your Dogtag from the master, if you do, I'd >>>> suggest you get the most updated so you get fixes from the tickets I >>>> provided previously which would address at least two issues relating to >>>> external CA. >>>> >>>> Christina >>>> >>>> On 10/27/2014 07:55 PM, kritee jhawar wrote: >>>> >>>> Hi Christina >>>> >>>> I was undertaking this activity last month where Microsoft CA didn't >>>> work out but Dogtag as external CA did. >>>> >>>> While using Microsoft CA or OpenSSL CA, pki spawn goes through >>>> without any error but dogtag stops communications to 389ds. Upon calling >>>> the rest Api /ca/rest/certs I get a "PKIException error listing the certs". >>>> >>>> Is there a particular format for the ca cert chain that we need to >>>> provide ? I was trying to reverse engineer the chain provided by dogtag. >>>> >>>> Thanks >>>> Kritee >>>> >>>> >>>> >>>> On Monday, 27 October 2014, Christina Fu wrote: >>>> >>>>> If you meant the following two: >>>>> https://fedorahosted.org/pki/ticket/1190 CA: issuer DN encoding not >>>>> preserved at issuance with signing cert signed by an external CA >>>>> https://fedorahosted.org/pki/ticket/1110 - pkispawn (configuration) >>>>> does not provide CA extensions in subordinate certificate signing requests >>>>> (CSR) >>>>> >>>>> They have just recently been fixed upstream so I imagine you could use >>>>> Microsoft CA now. Theoretically any other CA can be used as an external >>>>> CA, but if you run into issues, please feel free to report. >>>>> >>>>> Christina >>>>> >>>>> >>>>> On 10/27/2014 12:15 AM, kritee jhawar wrote: >>>>> >>>>> Hi >>>>> >>>>> In my recent thread i read that there is a bug due to which >>>>> Microsoft CA can't work as external CA for dogtag. >>>>> Can OpenSSL be used ? >>>>> >>>>> Thanks >>>>> Kritee >>>>> >>>>> >>>>> _______________________________________________ >>>>> Pki-users mailing listPki-users at redhat.comhttps://www.redhat.com/mailman/listinfo/pki-users >>>>> >>>>> >>>>> >>>> >>> >>> _______________________________________________ >>> Pki-users mailing list >>> Pki-users at redhat.com >>> https://www.redhat.com/mailman/listinfo/pki-users >>> >> >> >> > > > -------------- next part -------------- An HTML attachment was scrubbed... URL: -------------- next part -------------- 0.localhost-startStop-1 - [09/Nov/2014:05:59:27 IST] [3] [3] Cannot build CA chain. Error java.security.cert.CertificateException: Certificate is not a PKCS #11 certificate 0.localhost-startStop-1 - [09/Nov/2014:05:59:28 IST] [13] [3] authz instance DirAclAuthz initialization failed and skipped, error=Property internaldb.ldapconn.port missing value 0.http-bio-9443-exec-3 - [09/Nov/2014:05:59:56 IST] [3] [3] Cannot build CA chain. Error java.security.cert.CertificateException: Certificate is not a PKCS #11 certificate 0.localhost-startStop-1 - [09/Nov/2014:06:00:21 IST] [3] [3] Cannot build CA chain. Error java.security.cert.CertificateException: Unable to initialize, java.io.IOException: DerInput.getLength(): lengthTag=43, too big. 0.http-bio-9443-exec-3 - [09/Nov/2014:06:03:44 IST] [3] [3] CASigningUnit: Object certificate not found. Error org.mozilla.jss.crypto.ObjectNotFoundException -------------- next part -------------- 0.localhost-startStop-1 - [09/Nov/2014:05:59:28 IST] [20] [1] SelfTestSubsystem: Initializing self test plugins: 0.localhost-startStop-1 - [09/Nov/2014:05:59:28 IST] [20] [1] SelfTestSubsystem: loading all self test plugin logger parameters 0.localhost-startStop-1 - [09/Nov/2014:05:59:28 IST] [20] [1] SelfTestSubsystem: loading all self test plugin instances 0.localhost-startStop-1 - [09/Nov/2014:05:59:28 IST] [20] [1] SelfTestSubsystem: loading all self test plugin instance parameters 0.localhost-startStop-1 - [09/Nov/2014:05:59:28 IST] [20] [1] SelfTestSubsystem: loading self test plugins in on-demand order 0.localhost-startStop-1 - [09/Nov/2014:05:59:28 IST] [20] [1] SelfTestSubsystem: loading self test plugins in startup order 0.localhost-startStop-1 - [09/Nov/2014:05:59:28 IST] [20] [1] SelfTestSubsystem: Self test plugins have been successfully loaded! 0.localhost-startStop-1 - [09/Nov/2014:06:00:22 IST] [20] [1] SelfTestSubsystem: Initializing self test plugins: 0.localhost-startStop-1 - [09/Nov/2014:06:00:22 IST] [20] [1] SelfTestSubsystem: loading all self test plugin logger parameters 0.localhost-startStop-1 - [09/Nov/2014:06:00:22 IST] [20] [1] SelfTestSubsystem: loading all self test plugin instances 0.localhost-startStop-1 - [09/Nov/2014:06:00:22 IST] [20] [1] SelfTestSubsystem: loading all self test plugin instance parameters 0.localhost-startStop-1 - [09/Nov/2014:06:00:22 IST] [20] [1] SelfTestSubsystem: loading self test plugins in on-demand order 0.localhost-startStop-1 - [09/Nov/2014:06:00:22 IST] [20] [1] SelfTestSubsystem: loading self test plugins in startup order 0.localhost-startStop-1 - [09/Nov/2014:06:00:22 IST] [20] [1] SelfTestSubsystem: Self test plugins have been successfully loaded! -------------- next part -------------- [09/Nov/2014:05:59:27][localhost-startStop-1]: ============================================ [09/Nov/2014:05:59:27][localhost-startStop-1]: ===== DEBUG SUBSYSTEM INITIALIZED ======= [09/Nov/2014:05:59:27][localhost-startStop-1]: ============================================ [09/Nov/2014:05:59:27][localhost-startStop-1]: CMSEngine: done init id=debug [09/Nov/2014:05:59:27][localhost-startStop-1]: CMSEngine: initialized debug [09/Nov/2014:05:59:27][localhost-startStop-1]: CMSEngine: initSubsystem id=log [09/Nov/2014:05:59:27][localhost-startStop-1]: CMSEngine: ready to init id=log [09/Nov/2014:05:59:27][localhost-startStop-1]: CMSEngine: done init id=log [09/Nov/2014:05:59:27][localhost-startStop-1]: CMSEngine: initialized log [09/Nov/2014:05:59:27][localhost-startStop-1]: CMSEngine: initSubsystem id=jss [09/Nov/2014:05:59:27][localhost-startStop-1]: CMSEngine: ready to init id=jss [09/Nov/2014:05:59:27][localhost-startStop-1]: CMSEngine: done init id=jss [09/Nov/2014:05:59:27][localhost-startStop-1]: CMSEngine: initialized jss [09/Nov/2014:05:59:27][localhost-startStop-1]: CMSEngine: initSubsystem id=dbs [09/Nov/2014:05:59:27][localhost-startStop-1]: CMSEngine: ready to init id=dbs [09/Nov/2014:05:59:27][localhost-startStop-1]: DBSubsystem: init() mEnableSerialMgmt=false [09/Nov/2014:05:59:27][localhost-startStop-1]: LdapBoundConnFactory: init [09/Nov/2014:05:59:27][localhost-startStop-1]: CMSEngine: done init id=dbs [09/Nov/2014:05:59:27][localhost-startStop-1]: CMSEngine: initialized dbs [09/Nov/2014:05:59:27][localhost-startStop-1]: CMSEngine: initSubsystem id=usrgrp [09/Nov/2014:05:59:27][localhost-startStop-1]: CMSEngine: ready to init id=usrgrp [09/Nov/2014:05:59:27][localhost-startStop-1]: LdapBoundConnFactory: init [09/Nov/2014:05:59:27][localhost-startStop-1]: CMSEngine: done init id=usrgrp [09/Nov/2014:05:59:27][localhost-startStop-1]: CMSEngine: initialized usrgrp [09/Nov/2014:05:59:27][localhost-startStop-1]: CMSEngine: initSubsystem id=registry [09/Nov/2014:05:59:27][localhost-startStop-1]: CMSEngine: ready to init id=registry [09/Nov/2014:05:59:27][localhost-startStop-1]: RegistrySubsystem: start init [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin profile caEnrollImpl Generic Certificate Enrollment Profile Certificate Authority Generic Certificate Enrollment Profile com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin profile caCACertEnrollImpl CA Certificate Enrollment Profile Certificate Authority CA Certificate Enrollment Profile com.netscape.cms.profile.common.CACertCAEnrollProfile [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin profile caServerCertEnrollImpl Server Certificate Enrollment Profile Certificate Authority Server Certificate Enrollment Profile com.netscape.cms.profile.common.ServerCertCAEnrollProfile [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin profile caUserCertEnrollImpl User Certificate Enrollment Profile Certificate Authority User Certificate Enrollment Profile com.netscape.cms.profile.common.UserCertCAEnrollProfile [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin defaultPolicy noDefaultImpl No Default No Default com.netscape.cms.profile.def.NoDefault [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin defaultPolicy genericExtDefaultImpl Generic Extension Generic Extension com.netscape.cms.profile.def.GenericExtDefault [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin defaultPolicy autoAssignDefaultImpl Auto Request Assignment Default Auto Request Assignment Default com.netscape.cms.profile.def.AutoAssignDefault [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin defaultPolicy subjectNameDefaultImpl Subject Name Default Subject Name Default com.netscape.cms.profile.def.SubjectNameDefault [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin defaultPolicy validityDefaultImpl Validity Default Validty Default com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin defaultPolicy randomizedValidityDefaultImpl Randomized Validity Default Randomized Validity Default com.netscape.cms.profile.def.RandomizedValidityDefault [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin defaultPolicy caValidityDefaultImpl CA Certificate Validity Default CA Certificate Validty Default com.netscape.cms.profile.def.CAValidityDefault [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin defaultPolicy subjectKeyIdentifierExtDefaultImpl Subject Key Identifier Default Subject Key Identifier Default com.netscape.cms.profile.def.SubjectKeyIdentifierExtDefault [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin defaultPolicy authorityKeyIdentifierExtDefaultImpl Authority Key Identifier Extension Default Authority Key Identifier Extension Default com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin defaultPolicy basicConstraintsExtDefaultImpl Basic Constraints Extension Default Basic Constraints Extension Default com.netscape.cms.profile.def.BasicConstraintsExtDefault [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin defaultPolicy keyUsageExtDefaultImpl Key Usage Extension Default Key Usage Extension Default com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin defaultPolicy nsCertTypeExtDefaultImpl Netscape Certificate Type Extension Default Netscape Certificate Type Extension Default com.netscape.cms.profile.def.NSCertTypeExtDefault [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin defaultPolicy extendedKeyUsageExtDefaultImpl Extended Key Usage Extension Default Extended Key Usage Extension Default com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin defaultPolicy ocspNoCheckExtDefaultImpl OCSP No Check Extension Default OCSP No Check Extension Default com.netscape.cms.profile.def.OCSPNoCheckExtDefault [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin defaultPolicy issuerAltNameExtDefaultImpl Issuer Alternative Name Extension Default Issuer Alternative Name Extension Default com.netscape.cms.profile.def.IssuerAltNameExtDefault [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin defaultPolicy subjectAltNameExtDefaultImpl Subject Alternative Name Extension Default Subject Alternative Name Extension Default com.netscape.cms.profile.def.SubjectAltNameExtDefault [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin defaultPolicy userSubjectNameDefaultImpl User Supplied Subject Name Default User Supplied Subject Name Default com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin defaultPolicy signingAlgDefaultImpl Signing Algorithm Default Signing Algorithm Default com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin defaultPolicy userKeyDefaultImpl User Supplied Key Default User Supplied Key Default com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin defaultPolicy userValidityDefaultImpl User Supplied Validity Default User Supplied Validity Default com.netscape.cms.profile.def.UserValidityDefault [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin defaultPolicy userExtensionDefaultImpl User Supplied Extension Default User Supplied Extension Default com.netscape.cms.profile.def.UserExtensionDefault [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin defaultPolicy userSigningAlgDefaultImpl User Supplied Signing Alg Default User Supplied Signing Alg Default com.netscape.cms.profile.def.UserSigningAlgDefault [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin defaultPolicy authTokenSubjectNameDefaultImpl Token Supplied Subject Name Default Token Supplied Subject Name Default com.netscape.cms.profile.def.AuthTokenSubjectNameDefault [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin defaultPolicy subjectInfoAccessExtDefaultImpl Subject Info Access Extension Default Subject Info Access Extension Default com.netscape.cms.profile.def.SubjectInfoAccessExtDefault [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin defaultPolicy authInfoAccessExtDefaultImpl Authority Info Access Extension Default Authority Info Access Extension Default com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin defaultPolicy nscCommentExtDefaultImpl Netscape Comment Extension Default Netscape Comment Extension Default com.netscape.cms.profile.def.NSCCommentExtDefault [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin defaultPolicy freshestCRLExtDefaultImpl Freshest CRL Extension Default Freshest CRL Extension Default com.netscape.cms.profile.def.FreshestCRLExtDefault [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin defaultPolicy crlDistributionPointsExtDefaultImpl CRL Distribution Points Extension Default CRL Distribution Points Extension Default com.netscape.cms.profile.def.CRLDistributionPointsExtDefault [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin defaultPolicy policyConstraintsExtDefaultImpl Policy Constraints Extension Default Policy Constraints Extension Default com.netscape.cms.profile.def.PolicyConstraintsExtDefault [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin defaultPolicy policyMappingsExtDefaultImpl Policy Mappings Extension Default Policy Mappings Extension Default com.netscape.cms.profile.def.PolicyMappingsExtDefault [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin defaultPolicy nameConstraintsExtDefaultImpl Name Constraints Extension Default Name Constraints Extension Default com.netscape.cms.profile.def.NameConstraintsExtDefault [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin defaultPolicy certificateVersionDefaultImpl Certificate Version Default Certificate Version Default com.netscape.cms.profile.def.CertificateVersionDefault [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin defaultPolicy certificatePoliciesExtDefaultImpl Certificate Policies Extension Default Certificate Policies Extension Default com.netscape.cms.profile.def.CertificatePoliciesExtDefault [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin defaultPolicy subjectDirAttributesExtDefaultImpl Subject Directory Attributes Extension Default Subject Directory Attributes Extension Default com.netscape.cms.profile.def.SubjectDirAttributesExtDefault [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin defaultPolicy privateKeyPeriodExtDefaultImpl Private Key Period Ext Default Private Key Period Ext Default com.netscape.cms.profile.def.PrivateKeyUsagePeriodExtDefault [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin defaultPolicy inhibitAnyPolicyExtDefaultImpl Inhibit Any-Policy Extension Default Inhibit Any-Policy Extension Default com.netscape.cms.profile.def.InhibitAnyPolicyExtDefault [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin defaultPolicy imageDefaultImpl Image Default Image Default com.netscape.cms.profile.def.ImageDefault [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin defaultPolicy nsTokenDeviceKeySubjectNameDefaultImpl nsTokenDeviceKeySubjectNameDefault nsTokenDeviceKeySubjectNameDefaultImpl com.netscape.cms.profile.def.nsTokenDeviceKeySubjectNameDefault [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin defaultPolicy nsTokenUserKeySubjectNameDefaultImpl nsTokenUserKeySubjectNameDefault nsTokenUserKeySubjectNameDefaultImpl com.netscape.cms.profile.def.nsTokenUserKeySubjectNameDefault [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin constraintPolicy noConstraintImpl No Constraint No Constraint com.netscape.cms.profile.constraint.NoConstraint [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin constraintPolicy subjectNameConstraintImpl Subject Name Constraint Subject Name Constraint com.netscape.cms.profile.constraint.SubjectNameConstraint [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin constraintPolicy uniqueSubjectNameConstraintImpl Unique Subject Name Constraint Unique Subject Name Constraint com.netscape.cms.profile.constraint.UniqueSubjectNameConstraint [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin constraintPolicy userSubjectNameConstraintImpl User Subject Name Constraint User Subject Name Constraint com.netscape.cms.profile.constraint.UserSubjectNameConstraint [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin constraintPolicy validityConstraintImpl Validity Constraint Validity Constraint com.netscape.cms.profile.constraint.ValidityConstraint [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin constraintPolicy keyUsageExtConstraintImpl Key Usage Extension Constraint Key Usage Extension Constraint com.netscape.cms.profile.constraint.KeyUsageExtConstraint [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin constraintPolicy nsCertTypeExtConstraintImpl Netscape Certificate Type Extension Constraint Netscape Certificate Type Extension Constraint com.netscape.cms.profile.constraint.NSCertTypeExtConstraint [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin constraintPolicy extendedKeyUsageExtConstraintImpl Extended Key Usage Extension Constraint Extended Key Usage Extension Constraint com.netscape.cms.profile.constraint.ExtendedKeyUsageExtConstraint [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin constraintPolicy keyConstraintImpl Key Constraint Key Constraint com.netscape.cms.profile.constraint.KeyConstraint [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin constraintPolicy basicConstraintsExtConstraintImpl Basic Constraints Extension Constraint Basic Constraints Extension Constraint com.netscape.cms.profile.constraint.BasicConstraintsExtConstraint [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin constraintPolicy extensionConstraintImpl Extension Constraint Extension Constraint com.netscape.cms.profile.constraint.ExtensionConstraint [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin constraintPolicy signingAlgConstraintImpl Signing Algorithm Constraint Signing Algorithm Constraint com.netscape.cms.profile.constraint.SigningAlgConstraint [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin constraintPolicy uniqueKeyConstraintImpl Unique Public Key Constraint Unique Public Key Constraint com.netscape.cms.profile.constraint.UniqueKeyConstraint [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin constraintPolicy renewGracePeriodConstraintImpl Renewal Grace Period Constraint Renewal Grace Period Constraint com.netscape.cms.profile.constraint.RenewGracePeriodConstraint [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin profileInput cmcCertReqInputImpl CMC Certificate Request Input CMC Certificate Request Input com.netscape.cms.profile.input.CMCCertReqInput [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin profileInput certReqInputImpl Certificate Request Input Certificate Request Input com.netscape.cms.profile.input.CertReqInput [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin profileInput keyGenInputImpl Key Generation Input Key Generation Input com.netscape.cms.profile.input.KeyGenInput [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin profileInput encKeyGenInputImpl Encryption Key Generation Input Encryption Key Generation Input com.netscape.cms.profile.input.EncryptionKeyGenInput [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin profileInput signKeyGenInputImpl Encryption Key Generation Input Encryption Key Generation Input com.netscape.cms.profile.input.SigningKeyGenInput [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin profileInput dualKeyGenInputImpl Dual Key Generation Input Dual Key Generation Input com.netscape.cms.profile.input.DualKeyGenInput [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin profileInput subjectNameInputImpl Subject Name Input Subject Name Input com.netscape.cms.profile.input.SubjectNameInput [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin profileInput submitterInfoInputImpl Submitter Information Input Submitter Information Input com.netscape.cms.profile.input.SubmitterInfoInput [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin profileInput genericInputImpl Generic Input Generic Input com.netscape.cms.profile.input.GenericInput [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin profileInput fileSigningInputImpl File Signing Input File Signing Input com.netscape.cms.profile.input.FileSigningInput [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin profileInput imageInputImpl Image Input Image Input com.netscape.cms.profile.input.ImageInput [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin profileInput subjectDNInputImpl Subject DN Input Subject DN Input com.netscape.cms.profile.input.SubjectDNInput [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin profileInput nsNKeyCertReqInputImpl nsNKeyCertReqInputImpl nsNKeyCertReqInputImpl com.netscape.cms.profile.input.nsNKeyCertReqInput [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin profileInput nsHKeyCertReqInputImpl nsHKeyCertReqInputImpl nsHKeyCertReqInputImpl com.netscape.cms.profile.input.nsHKeyCertReqInput [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin profileInput serialNumRenewInputImpl Certificate Renewal Request Serial Number Input Certificate Renewal Request Serial Number Input com.netscape.cms.profile.input.SerialNumRenewInput [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin profileInput subjectAltNameExtInputImpl SAN Input SAN Input com.netscape.cms.profile.input.SubjectAltNameExtInput [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin profileOutput certOutputImpl Certificate Output Certificate Output com.netscape.cms.profile.output.CertOutput [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin profileOutput cmmfOutputImpl CMMF Response Output CMMF Response Output com.netscape.cms.profile.output.CMMFOutput [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin profileOutput pkcs7OutputImpl PKCS7 Output PKCS7 Output com.netscape.cms.profile.output.PKCS7Output [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin profileOutput nsNKeyOutputImpl nsNKeyOutputImpl nsNKeyOutputImpl com.netscape.cms.profile.output.nsNKeyOutput [09/Nov/2014:05:59:27][localhost-startStop-1]: added plugin profileUpdater subsystemGroupUpdaterImpl Updater for Subsystem Group Updater for Subsystem Group com.netscape.cms.profile.updater.SubsystemGroupUpdater [09/Nov/2014:05:59:27][localhost-startStop-1]: CMSEngine: done init id=registry [09/Nov/2014:05:59:27][localhost-startStop-1]: CMSEngine: initialized registry [09/Nov/2014:05:59:27][localhost-startStop-1]: CMSEngine: initSubsystem id=oidmap [09/Nov/2014:05:59:27][localhost-startStop-1]: CMSEngine: ready to init id=oidmap [09/Nov/2014:05:59:27][localhost-startStop-1]: CMSEngine: done init id=oidmap [09/Nov/2014:05:59:27][localhost-startStop-1]: CMSEngine: initialized oidmap [09/Nov/2014:05:59:27][localhost-startStop-1]: CMSEngine: initSubsystem id=X500Name [09/Nov/2014:05:59:27][localhost-startStop-1]: CMSEngine: ready to init id=X500Name [09/Nov/2014:05:59:27][localhost-startStop-1]: CMSEngine: done init id=X500Name [09/Nov/2014:05:59:27][localhost-startStop-1]: CMSEngine: initialized X500Name [09/Nov/2014:05:59:27][localhost-startStop-1]: CMSEngine: initSubsystem id=request [09/Nov/2014:05:59:27][localhost-startStop-1]: CMSEngine: ready to init id=request [09/Nov/2014:05:59:27][localhost-startStop-1]: CMSEngine: done init id=request [09/Nov/2014:05:59:27][localhost-startStop-1]: CMSEngine: initialized request [09/Nov/2014:05:59:27][localhost-startStop-1]: CMSEngine: initSubsystem id=ca [09/Nov/2014:05:59:27][localhost-startStop-1]: CMSEngine: ready to init id=ca [09/Nov/2014:05:59:27][localhost-startStop-1]: CertificateAuthority init [09/Nov/2014:05:59:27][localhost-startStop-1]: Cert Repot inited [09/Nov/2014:05:59:27][localhost-startStop-1]: CRL Repot inited [09/Nov/2014:05:59:27][localhost-startStop-1]: Replica Repot inited [09/Nov/2014:05:59:27][localhost-startStop-1]: CertificateAuthority:initSigUnit: ca.signing.cert not found [09/Nov/2014:05:59:27][localhost-startStop-1]: SigningUnit init: debug Property ca.signing.cacertnickname missing value [09/Nov/2014:05:59:27][localhost-startStop-1]: CA signing unit inited [09/Nov/2014:05:59:27][localhost-startStop-1]: cachainNum= 0 [09/Nov/2014:05:59:27][localhost-startStop-1]: CertificateAuthority init: initRequestQueue [09/Nov/2014:05:59:27][localhost-startStop-1]: selected policy processor = classic [09/Nov/2014:05:59:27][localhost-startStop-1]: GenericPolicyProcessor::init begins [09/Nov/2014:05:59:27][localhost-startStop-1]: GenericPolicyProcessor::init Certificate Policy Framework (deprecated) is DISABLED [09/Nov/2014:05:59:27][localhost-startStop-1]: CA policy inited [09/Nov/2014:05:59:27][localhost-startStop-1]: CA service inited [09/Nov/2014:05:59:27][localhost-startStop-1]: CA notifier inited [09/Nov/2014:05:59:27][localhost-startStop-1]: CA pending notifier inited [09/Nov/2014:05:59:27][localhost-startStop-1]: RequestRepository: constructor2. [09/Nov/2014:05:59:27][localhost-startStop-1]: CMSEngine: done init id=ca [09/Nov/2014:05:59:27][localhost-startStop-1]: CMSEngine: initialized ca [09/Nov/2014:05:59:27][localhost-startStop-1]: CMSEngine::initSubsystem ca Java subsytem about to calculate serverCertNickname. [09/Nov/2014:05:59:27][localhost-startStop-1]: CMSEngine: initSubsystem id=profile [09/Nov/2014:05:59:27][localhost-startStop-1]: CMSEngine: ready to init id=profile [09/Nov/2014:05:59:27][localhost-startStop-1]: ProfileSubsystem: start init [09/Nov/2014:05:59:27][localhost-startStop-1]: Start Profile Creation - caUserCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.NoDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectAltNameExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_type=null [09/Nov/2014:05:59:28][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_pattern=null [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:05:59:28][localhost-startStop-1]: Done Profile Creation - caUserCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Start Profile Creation - caECUserCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.NoDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectAltNameExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_type=null [09/Nov/2014:05:59:28][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_pattern=null [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:05:59:28][localhost-startStop-1]: Done Profile Creation - caECUserCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Start Profile Creation - caUserSMIMEcapCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.NoDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectAltNameExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_type=null [09/Nov/2014:05:59:28][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_pattern=null [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.GenericExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:05:59:28][localhost-startStop-1]: Done Profile Creation - caUserSMIMEcapCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Start Profile Creation - caDualCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectAltNameExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_type=null [09/Nov/2014:05:59:28][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_pattern=null [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectAltNameExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_type=null [09/Nov/2014:05:59:28][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_pattern=null [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:05:59:28][localhost-startStop-1]: Done Profile Creation - caDualCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Start Profile Creation - caECDualCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectAltNameExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_type=null [09/Nov/2014:05:59:28][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_pattern=null [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectAltNameExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_type=null [09/Nov/2014:05:59:28][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_pattern=null [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:05:59:28][localhost-startStop-1]: Done Profile Creation - caECDualCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Start Profile Creation - AdminCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:05:59:28][localhost-startStop-1]: Done Profile Creation - AdminCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Start Profile Creation - caSignedLogCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:05:59:28][localhost-startStop-1]: Done Profile Creation - caSignedLogCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Start Profile Creation - caTPSCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:05:59:28][localhost-startStop-1]: Done Profile Creation - caTPSCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Start Profile Creation - caRARouterCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:05:59:28][localhost-startStop-1]: Done Profile Creation - caRARouterCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Start Profile Creation - caRouterCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:05:59:28][localhost-startStop-1]: Done Profile Creation - caRouterCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Start Profile Creation - caServerCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:05:59:28][localhost-startStop-1]: Done Profile Creation - caServerCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Start Profile Creation - caSubsystemCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:05:59:28][localhost-startStop-1]: Done Profile Creation - caSubsystemCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Start Profile Creation - caOtherCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:05:59:28][localhost-startStop-1]: Done Profile Creation - caOtherCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Start Profile Creation - caCACert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.CAValidityDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.BasicConstraintsExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:05:59:28][localhost-startStop-1]: Done Profile Creation - caCACert [09/Nov/2014:05:59:28][localhost-startStop-1]: Start Profile Creation - caCrossSignedCACert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.CAValidityDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.BasicConstraintsExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:05:59:28][localhost-startStop-1]: Done Profile Creation - caCrossSignedCACert [09/Nov/2014:05:59:28][localhost-startStop-1]: Start Profile Creation - caInstallCACert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.BasicConstraintsExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:05:59:28][localhost-startStop-1]: Done Profile Creation - caInstallCACert [09/Nov/2014:05:59:28][localhost-startStop-1]: Start Profile Creation - caRACert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:05:59:28][localhost-startStop-1]: Done Profile Creation - caRACert [09/Nov/2014:05:59:28][localhost-startStop-1]: Start Profile Creation - caOCSPCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.OCSPNoCheckExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:05:59:28][localhost-startStop-1]: Done Profile Creation - caOCSPCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Start Profile Creation - caStorageCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:05:59:28][localhost-startStop-1]: Done Profile Creation - caStorageCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Start Profile Creation - caTransportCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:05:59:28][localhost-startStop-1]: Done Profile Creation - caTransportCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Start Profile Creation - caDirPinUserCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthTokenSubjectNameDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.NoDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectAltNameExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_type=null [09/Nov/2014:05:59:28][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_pattern=null [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:05:59:28][localhost-startStop-1]: Done Profile Creation - caDirPinUserCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Start Profile Creation - caDirUserCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthTokenSubjectNameDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.NoDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectAltNameExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_type=null [09/Nov/2014:05:59:28][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_pattern=null [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:05:59:28][localhost-startStop-1]: Done Profile Creation - caDirUserCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Start Profile Creation - caECDirUserCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthTokenSubjectNameDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.NoDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectAltNameExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_type=null [09/Nov/2014:05:59:28][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_pattern=null [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:05:59:28][localhost-startStop-1]: Done Profile Creation - caECDirUserCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Start Profile Creation - caAgentServerCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:05:59:28][localhost-startStop-1]: Done Profile Creation - caAgentServerCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Start Profile Creation - caAgentFileSigning caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectNameDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:05:59:28][localhost-startStop-1]: Done Profile Creation - caAgentFileSigning [09/Nov/2014:05:59:28][localhost-startStop-1]: Start Profile Creation - caCMCUserCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:05:59:28][localhost-startStop-1]: Done Profile Creation - caCMCUserCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Start Profile Creation - caFullCMCUserCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:05:59:28][localhost-startStop-1]: Done Profile Creation - caFullCMCUserCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Start Profile Creation - caSimpleCMCUserCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:05:59:28][localhost-startStop-1]: Done Profile Creation - caSimpleCMCUserCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Start Profile Creation - caTokenDeviceKeyEnrollment caUserCertEnrollImpl com.netscape.cms.profile.common.UserCertCAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.UserCertCAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.nsTokenDeviceKeySubjectNameDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.BasicConstraintsExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:05:59:28][localhost-startStop-1]: Done Profile Creation - caTokenDeviceKeyEnrollment [09/Nov/2014:05:59:28][localhost-startStop-1]: Start Profile Creation - caTokenUserEncryptionKeyEnrollment caUserCertEnrollImpl com.netscape.cms.profile.common.UserCertCAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.UserCertCAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.nsTokenUserKeySubjectNameDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectAltNameExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_type=null [09/Nov/2014:05:59:28][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_pattern=null [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.BasicConstraintsExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:05:59:28][localhost-startStop-1]: Done Profile Creation - caTokenUserEncryptionKeyEnrollment [09/Nov/2014:05:59:28][localhost-startStop-1]: Start Profile Creation - caTokenUserSigningKeyEnrollment caUserCertEnrollImpl com.netscape.cms.profile.common.UserCertCAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.UserCertCAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.nsTokenUserKeySubjectNameDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectAltNameExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_type=null [09/Nov/2014:05:59:28][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_pattern=null [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.BasicConstraintsExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:05:59:28][localhost-startStop-1]: Done Profile Creation - caTokenUserSigningKeyEnrollment [09/Nov/2014:05:59:28][localhost-startStop-1]: Start Profile Creation - caTempTokenDeviceKeyEnrollment caUserCertEnrollImpl com.netscape.cms.profile.common.UserCertCAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.UserCertCAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.nsTokenDeviceKeySubjectNameDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.BasicConstraintsExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:05:59:28][localhost-startStop-1]: Done Profile Creation - caTempTokenDeviceKeyEnrollment [09/Nov/2014:05:59:28][localhost-startStop-1]: Start Profile Creation - caTempTokenUserEncryptionKeyEnrollment caUserCertEnrollImpl com.netscape.cms.profile.common.UserCertCAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.UserCertCAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.nsTokenUserKeySubjectNameDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectAltNameExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_type=null [09/Nov/2014:05:59:28][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_pattern=null [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.BasicConstraintsExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:05:59:28][localhost-startStop-1]: Done Profile Creation - caTempTokenUserEncryptionKeyEnrollment [09/Nov/2014:05:59:28][localhost-startStop-1]: Start Profile Creation - caTempTokenUserSigningKeyEnrollment caUserCertEnrollImpl com.netscape.cms.profile.common.UserCertCAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.UserCertCAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.nsTokenUserKeySubjectNameDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectAltNameExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_type=null [09/Nov/2014:05:59:28][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_pattern=null [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.BasicConstraintsExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:05:59:28][localhost-startStop-1]: Done Profile Creation - caTempTokenUserSigningKeyEnrollment [09/Nov/2014:05:59:28][localhost-startStop-1]: Start Profile Creation - caAdminCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:05:59:28][localhost-startStop-1]: Done Profile Creation - caAdminCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Start Profile Creation - caInternalAuthServerCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:05:59:28][localhost-startStop-1]: Done Profile Creation - caInternalAuthServerCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Start Profile Creation - caInternalAuthTransportCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:05:59:28][localhost-startStop-1]: Done Profile Creation - caInternalAuthTransportCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Start Profile Creation - caInternalAuthDRMstorageCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:05:59:28][localhost-startStop-1]: Done Profile Creation - caInternalAuthDRMstorageCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Start Profile Creation - caInternalAuthSubsystemCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:05:59:28][localhost-startStop-1]: Done Profile Creation - caInternalAuthSubsystemCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Start Profile Creation - caInternalAuthOCSPCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.OCSPNoCheckExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:05:59:28][localhost-startStop-1]: Done Profile Creation - caInternalAuthOCSPCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Start Profile Creation - caInternalAuthAuditSigningCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:05:59:28][localhost-startStop-1]: Done Profile Creation - caInternalAuthAuditSigningCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Start Profile Creation - DomainController caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.nsTokenUserKeySubjectNameDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectAltNameExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_type=null [09/Nov/2014:05:59:28][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_pattern=null [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.BasicConstraintsExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.GenericExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.CRLDistributionPointsExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:05:59:28][localhost-startStop-1]: Done Profile Creation - DomainController [09/Nov/2014:05:59:28][localhost-startStop-1]: Start Profile Creation - caDualRAuserCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectAltNameExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_type=null [09/Nov/2014:05:59:28][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_pattern=null [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:05:59:28][localhost-startStop-1]: Done Profile Creation - caDualRAuserCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Start Profile Creation - caRAagentCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectAltNameExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_type=null [09/Nov/2014:05:59:28][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_pattern=null [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:05:59:28][localhost-startStop-1]: Done Profile Creation - caRAagentCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Start Profile Creation - caRAserverCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:05:59:28][localhost-startStop-1]: Done Profile Creation - caRAserverCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Start Profile Creation - caUUIDdeviceCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectAltNameExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_type=null [09/Nov/2014:05:59:28][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_pattern=null [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:05:59:28][localhost-startStop-1]: Done Profile Creation - caUUIDdeviceCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Start Profile Creation - caSSLClientSelfRenewal caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:05:59:28][localhost-startStop-1]: Done Profile Creation - caSSLClientSelfRenewal [09/Nov/2014:05:59:28][localhost-startStop-1]: Start Profile Creation - caDirUserRenewal caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:05:59:28][localhost-startStop-1]: Done Profile Creation - caDirUserRenewal [09/Nov/2014:05:59:28][localhost-startStop-1]: Start Profile Creation - caManualRenewal caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:05:59:28][localhost-startStop-1]: Done Profile Creation - caManualRenewal [09/Nov/2014:05:59:28][localhost-startStop-1]: Start Profile Creation - caTokenMSLoginEnrollment caUserCertEnrollImpl com.netscape.cms.profile.common.UserCertCAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.UserCertCAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.nsTokenUserKeySubjectNameDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectAltNameExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_type=null [09/Nov/2014:05:59:28][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_pattern=null [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.BasicConstraintsExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.CRLDistributionPointsExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:05:59:28][localhost-startStop-1]: Done Profile Creation - caTokenMSLoginEnrollment [09/Nov/2014:05:59:28][localhost-startStop-1]: Start Profile Creation - caTokenUserSigningKeyRenewal caUserCertEnrollImpl com.netscape.cms.profile.common.UserCertCAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.UserCertCAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:05:59:28][localhost-startStop-1]: Done Profile Creation - caTokenUserSigningKeyRenewal [09/Nov/2014:05:59:28][localhost-startStop-1]: Start Profile Creation - caTokenUserEncryptionKeyRenewal caUserCertEnrollImpl com.netscape.cms.profile.common.UserCertCAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.UserCertCAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:05:59:28][localhost-startStop-1]: Done Profile Creation - caTokenUserEncryptionKeyRenewal [09/Nov/2014:05:59:28][localhost-startStop-1]: Start Profile Creation - caTokenUserAuthKeyRenewal caUserCertEnrollImpl com.netscape.cms.profile.common.UserCertCAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.UserCertCAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:05:59:28][localhost-startStop-1]: Done Profile Creation - caTokenUserAuthKeyRenewal [09/Nov/2014:05:59:28][localhost-startStop-1]: Start Profile Creation - caJarSigningCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.NSCertTypeExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:05:59:28][localhost-startStop-1]: Done Profile Creation - caJarSigningCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Start Profile Creation - caIPAserviceCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectNameDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:05:59:28][localhost-startStop-1]: Done Profile Creation - caIPAserviceCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Start Profile Creation - caEncUserCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectAltNameExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_type=null [09/Nov/2014:05:59:28][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_pattern=null [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:05:59:28][localhost-startStop-1]: Done Profile Creation - caEncUserCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Start Profile Creation - caEncECUserCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectAltNameExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_type=null [09/Nov/2014:05:59:28][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_pattern=null [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:05:59:28][localhost-startStop-1]: Done Profile Creation - caEncECUserCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Start Profile Creation - caTokenUserDelegateAuthKeyEnrollment caUserCertEnrollImpl com.netscape.cms.profile.common.UserCertCAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.UserCertCAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectAltNameExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_type=null [09/Nov/2014:05:59:28][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_pattern=null [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.BasicConstraintsExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:05:59:28][localhost-startStop-1]: Done Profile Creation - caTokenUserDelegateAuthKeyEnrollment [09/Nov/2014:05:59:28][localhost-startStop-1]: Start Profile Creation - caTokenUserDelegateSigningKeyEnrollment caUserCertEnrollImpl com.netscape.cms.profile.common.UserCertCAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.UserCertCAEnrollProfile [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectAltNameExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_type=null [09/Nov/2014:05:59:28][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_pattern=null [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.BasicConstraintsExtDefault [09/Nov/2014:05:59:28][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:05:59:28][localhost-startStop-1]: Done Profile Creation - caTokenUserDelegateSigningKeyEnrollment [09/Nov/2014:05:59:28][localhost-startStop-1]: Registered Confirmation - caUserCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Registered Confirmation - caECUserCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Registered Confirmation - caUserSMIMEcapCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Registered Confirmation - caDualCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Registered Confirmation - caECDualCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Registered Confirmation - AdminCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Registered Confirmation - caSignedLogCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Registered Confirmation - caTPSCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Registered Confirmation - caRARouterCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Registered Confirmation - caRouterCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Registered Confirmation - caServerCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Registered Confirmation - caSubsystemCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Registered Confirmation - caOtherCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Registered Confirmation - caCACert [09/Nov/2014:05:59:28][localhost-startStop-1]: Registered Confirmation - caCrossSignedCACert [09/Nov/2014:05:59:28][localhost-startStop-1]: Registered Confirmation - caInstallCACert [09/Nov/2014:05:59:28][localhost-startStop-1]: Registered Confirmation - caRACert [09/Nov/2014:05:59:28][localhost-startStop-1]: Registered Confirmation - caOCSPCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Registered Confirmation - caStorageCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Registered Confirmation - caTransportCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Registered Confirmation - caDirPinUserCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Registered Confirmation - caDirUserCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Registered Confirmation - caECDirUserCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Registered Confirmation - caAgentServerCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Registered Confirmation - caAgentFileSigning [09/Nov/2014:05:59:28][localhost-startStop-1]: Registered Confirmation - caCMCUserCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Registered Confirmation - caFullCMCUserCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Registered Confirmation - caSimpleCMCUserCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Registered Confirmation - caTokenDeviceKeyEnrollment [09/Nov/2014:05:59:28][localhost-startStop-1]: Registered Confirmation - caTokenUserEncryptionKeyEnrollment [09/Nov/2014:05:59:28][localhost-startStop-1]: Registered Confirmation - caTokenUserSigningKeyEnrollment [09/Nov/2014:05:59:28][localhost-startStop-1]: Registered Confirmation - caTempTokenDeviceKeyEnrollment [09/Nov/2014:05:59:28][localhost-startStop-1]: Registered Confirmation - caTempTokenUserEncryptionKeyEnrollment [09/Nov/2014:05:59:28][localhost-startStop-1]: Registered Confirmation - caTempTokenUserSigningKeyEnrollment [09/Nov/2014:05:59:28][localhost-startStop-1]: Registered Confirmation - caAdminCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Registered Confirmation - caInternalAuthServerCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Registered Confirmation - caInternalAuthTransportCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Registered Confirmation - caInternalAuthDRMstorageCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Registered Confirmation - caInternalAuthSubsystemCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Registered Confirmation - caInternalAuthOCSPCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Registered Confirmation - caInternalAuthAuditSigningCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Registered Confirmation - DomainController [09/Nov/2014:05:59:28][localhost-startStop-1]: Registered Confirmation - caDualRAuserCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Registered Confirmation - caRAagentCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Registered Confirmation - caRAserverCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Registered Confirmation - caUUIDdeviceCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Registered Confirmation - caSSLClientSelfRenewal [09/Nov/2014:05:59:28][localhost-startStop-1]: Registered Confirmation - caDirUserRenewal [09/Nov/2014:05:59:28][localhost-startStop-1]: Registered Confirmation - caManualRenewal [09/Nov/2014:05:59:28][localhost-startStop-1]: Registered Confirmation - caTokenMSLoginEnrollment [09/Nov/2014:05:59:28][localhost-startStop-1]: Registered Confirmation - caTokenUserSigningKeyRenewal [09/Nov/2014:05:59:28][localhost-startStop-1]: Registered Confirmation - caTokenUserEncryptionKeyRenewal [09/Nov/2014:05:59:28][localhost-startStop-1]: Registered Confirmation - caTokenUserAuthKeyRenewal [09/Nov/2014:05:59:28][localhost-startStop-1]: Registered Confirmation - caJarSigningCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Registered Confirmation - caIPAserviceCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Registered Confirmation - caEncUserCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Registered Confirmation - caEncECUserCert [09/Nov/2014:05:59:28][localhost-startStop-1]: Registered Confirmation - caTokenUserDelegateAuthKeyEnrollment [09/Nov/2014:05:59:28][localhost-startStop-1]: Registered Confirmation - caTokenUserDelegateSigningKeyEnrollment [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: done init id=profile [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: initialized profile [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: initSubsystem id=selftests [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: ready to init id=selftests [09/Nov/2014:05:59:28][localhost-startStop-1]: SelfTestSubsystem::init(): ENTERING . . . [09/Nov/2014:05:59:28][localhost-startStop-1]: SelfTestSubsystem::init(): loading self test logger parameters [09/Nov/2014:05:59:28][localhost-startStop-1]: SelfTestSubsystem::init(): loading self test plugins [09/Nov/2014:05:59:28][localhost-startStop-1]: SelfTestSubsystem::init(): loading self test plugin parameters [09/Nov/2014:05:59:28][localhost-startStop-1]: SelfTestSubsystem::init(): loading on demand self tests [09/Nov/2014:05:59:28][localhost-startStop-1]: SelfTestSubsystem::init(): loading startup self tests [09/Nov/2014:05:59:28][localhost-startStop-1]: SelfTestSubsystem::init(): EXITING. [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: done init id=selftests [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: initialized selftests [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: initSubsystem id=CrossCertPair [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: ready to init id=CrossCertPair [09/Nov/2014:05:59:28][localhost-startStop-1]: LdapBoundConnFactory: init [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: done init id=CrossCertPair [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: initialized CrossCertPair [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: initSubsystem id=stats [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: ready to init id=stats [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: done init id=stats [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: initialized stats [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: initSubsystem id=auths [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: ready to init id=auths [09/Nov/2014:05:59:28][localhost-startStop-1]: FlatFileAuth: Splitting String: UID on commas [09/Nov/2014:05:59:28][localhost-startStop-1]: FlatFileAuth: countTokens:1 [09/Nov/2014:05:59:28][localhost-startStop-1]: FlatFileAuth: token 0 = UID [09/Nov/2014:05:59:28][localhost-startStop-1]: FlatFileAuth: Splitting String: PWD on commas [09/Nov/2014:05:59:28][localhost-startStop-1]: FlatFileAuth: countTokens:1 [09/Nov/2014:05:59:28][localhost-startStop-1]: FlatFileAuth: token 0 = PWD [09/Nov/2014:05:59:28][localhost-startStop-1]: FlatFileAuth: unionOfStrings: 0,0 = UID [09/Nov/2014:05:59:28][localhost-startStop-1]: FlatFileAuth: unionOfStrings: 1,0 = PWD [09/Nov/2014:05:59:28][localhost-startStop-1]: FlatFileAuth: mFilename = /var/lib/pki/pki-tomcat/conf/ca/flatfile.txt [09/Nov/2014:05:59:28][localhost-startStop-1]: FlatFileAuth: mKeyAttributes = UID [09/Nov/2014:05:59:28][localhost-startStop-1]: FlatFileAuth: mAuthAttrs = PWD [09/Nov/2014:05:59:28][localhost-startStop-1]: FlatFileAuth: stringArrays[0][0] = UID [09/Nov/2014:05:59:28][localhost-startStop-1]: FlatFileAuth: stringArrays[1][0] = PWD [09/Nov/2014:05:59:28][localhost-startStop-1]: FlatFileAuth: Read entries from password file - /var/lib/pki/pki-tomcat/conf/ca/flatfile.txt [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: done init id=auths [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: initialized auths [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: initSubsystem id=authz [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: ready to init id=authz [09/Nov/2014:05:59:28][localhost-startStop-1]: Found authz manager plugin BasicAclAuthz [09/Nov/2014:05:59:28][localhost-startStop-1]: AAclAuthz: init begins [09/Nov/2014:05:59:28][localhost-startStop-1]: GroupAccessEvaluator: init [09/Nov/2014:05:59:28][localhost-startStop-1]: UserAccessEvaluator: init [09/Nov/2014:05:59:28][localhost-startStop-1]: UserOrigReqAccessEvaluator: init [09/Nov/2014:05:59:28][localhost-startStop-1]: Found authz manager plugin DirAclAuthz [09/Nov/2014:05:59:28][localhost-startStop-1]: AAclAuthz: init begins [09/Nov/2014:05:59:28][localhost-startStop-1]: GroupAccessEvaluator: init [09/Nov/2014:05:59:28][localhost-startStop-1]: UserAccessEvaluator: init [09/Nov/2014:05:59:28][localhost-startStop-1]: UserOrigReqAccessEvaluator: init [09/Nov/2014:05:59:28][localhost-startStop-1]: LdapBoundConnFactory: init [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: done init id=authz [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: initialized authz [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: initSubsystem id=jobsScheduler [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: ready to init id=jobsScheduler [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: done init id=jobsScheduler [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: initialized jobsScheduler [09/Nov/2014:05:59:28][localhost-startStop-1]: Java version=1.7.0_71 [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: Java Security Provider 0 class=Mozilla-JSS version 4.2.6 [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: Java Security Provider 1 class=SUN version 1.7 [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: Java Security Provider 2 class=SunRsaSign version 1.7 [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: Java Security Provider 3 class=SunJSSE version 1.7 [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: Java Security Provider 4 class=SunJCE version 1.7 [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: Java Security Provider 5 class=SunJGSS version 1.7 [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: Java Security Provider 6 class=SunSASL version 1.7 [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: Java Security Provider 7 class=XMLDSig version 1.0 [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: Java Security Provider 8 class=SunPCSC version 1.7 [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: Java Security Provider 9 class=CMS version 1.0 [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: debug startup start [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: debug startup done [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: log startup start [09/Nov/2014:05:59:28][localhost-startStop-1]: entering LogSubsystem.startup() [09/Nov/2014:05:59:28][localhost-startStop-1]: about to call inst=Transactions in LogSubsystem.startup() [09/Nov/2014:05:59:28][localhost-startStop-1]: LogFile: entering LogFile.startup() [09/Nov/2014:05:59:28][localhost-startStop-1]: about to call inst=SignedAudit in LogSubsystem.startup() [09/Nov/2014:05:59:28][localhost-startStop-1]: LogFile: entering LogFile.startup() [09/Nov/2014:05:59:28][localhost-startStop-1]: about to call inst=System in LogSubsystem.startup() [09/Nov/2014:05:59:28][localhost-startStop-1]: LogFile: entering LogFile.startup() [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: log startup done [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: jss startup start [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: jss startup done [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: dbs startup start [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: dbs startup done [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: usrgrp startup start [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: usrgrp startup done [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: registry startup start [09/Nov/2014:05:59:28][localhost-startStop-1]: RegistrySubsystem: startup [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: registry startup done [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: oidmap startup start [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: oidmap startup done [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: X500Name startup start [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: X500Name startup done [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: request startup start [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: request startup done [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: ca startup start [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: ca startup done [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: profile startup start [09/Nov/2014:05:59:28][localhost-startStop-1]: ProfileSubsystem: startup [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: profile startup done [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: selftests startup start [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: selftests startup done [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: CrossCertPair startup start [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: CrossCertPair startup done [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: stats startup start [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: stats startup done [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: auths startup start [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: auths startup done [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: authz startup start [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: authz startup done [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: jobsScheduler startup start [09/Nov/2014:05:59:28][localhost-startStop-1]: CMSEngine: jobsScheduler startup done [09/Nov/2014:05:59:29][http-bio-9443-exec-1]: according to ccMode, authorization for servlet: caGetStatus is LDAP based, not XML {1}, use default authz mgr: {2}. [09/Nov/2014:05:59:29][http-bio-9443-exec-1]: CMSServlet:service() uri = /ca/admin/ca/getStatus [09/Nov/2014:05:59:29][http-bio-9443-exec-1]: CMSServlet: caGetStatus start to service. [09/Nov/2014:05:59:29][http-bio-9443-exec-1]: CMSServlet: curDate=Sun Nov 09 05:59:29 IST 2014 id=caGetStatus time=30 [09/Nov/2014:05:59:31][http-bio-9443-exec-3]: AuthMethodInterceptor: SystemConfigResource.configure() [09/Nov/2014:05:59:31][http-bio-9443-exec-3]: AuthMethodInterceptor: mapping: default [09/Nov/2014:05:59:31][http-bio-9443-exec-3]: AuthMethodInterceptor: loading /usr/share/pki/ca/conf/auth-method.properties [09/Nov/2014:05:59:31][http-bio-9443-exec-3]: AuthMethodInterceptor: checking /var/lib/pki/pki-tomcat/ca/conf/auth-method.properties [09/Nov/2014:05:59:31][http-bio-9443-exec-3]: AuthMethodInterceptor: required auth methods: [*] [09/Nov/2014:05:59:31][http-bio-9443-exec-3]: AuthMethodInterceptor: anonymous access allowed [09/Nov/2014:05:59:31][http-bio-9443-exec-3]: ACLInterceptor: SystemConfigResource.configure() [09/Nov/2014:05:59:31][http-bio-9443-exec-3]: ACLInterceptor: No ACL mapping. [09/Nov/2014:05:59:31][http-bio-9443-exec-3]: MessageFormatInterceptor: SystemConfigResource.configure() [09/Nov/2014:05:59:31][http-bio-9443-exec-3]: MessageFormatInterceptor: content-type: application/json [09/Nov/2014:05:59:31][http-bio-9443-exec-3]: MessageFormatInterceptor: accept: [application/json] [09/Nov/2014:05:59:31][http-bio-9443-exec-3]: MessageFormatInterceptor: request format: application/json [09/Nov/2014:05:59:31][http-bio-9443-exec-3]: MessageFormatInterceptor: response format: application/json [09/Nov/2014:05:59:31][http-bio-9443-exec-3]: SystemConfigService(): configure() called [09/Nov/2014:05:59:31][http-bio-9443-exec-3]: ConfigurationRequest [pin=XXXX, token=Internal Key Storage Token, tokenPassword=XXXX, securityDomainType=newdomain, securityDomainUri=null, securityDomainName=cisco.com Security Domain, securityDomainUser=null, securityDomainPassword=XXXX, isClone=false, cloneUri=null, subsystemName=CA cibu-sec88.cisco.com 9443, p12File=null, p12Password=XXXX, hierarchy=join, dsHost=localhost.localdomain, dsPort=389, baseDN=o=pki-tomcat-CA, bindDN=cn=Directory Manager, bindpwd=XXXX, database=pki-tomcat-CA, secureConn=false, removeData=true, replicateSchema=null, masterReplicationPort=null, cloneReplicationPort=null, replicationSecurity=null, systemCerts=[com.netscape.certsrv.system.SystemCertData at 92216a2, com.netscape.certsrv.system.SystemCertData at 1cfbea5d, com.netscape.certsrv.system.SystemCertData at 5ed78e88, com.netscape.certsrv.system.SystemCertData at 19ceb35d, com.netscape.certsrv.system.SystemCertData at 5161abe7], issuingCA=External CA, backupKeys=false, backupPassword=XXXX, backupFile=null, adminUID=caadmin, adminPassword=XXXX, adminEmail=caadmin at cisco.com, adminCertRequest=MIIChTCCAW0CAQAwQDEiMCAGA1UEChMZY2lzY28uY29tIFNlY3VyaXR5IERvbWFp bjEaMBgGA1UEAxMRUEtJIEFkbWluaXN0cmF0b3IwggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDW9b2AYoS+BjuR4Xknomuil+3qpCsbpjj0pby8EZLI0/q8 c/iYTLnaQgkz6KXZgGhTigwGlILlLnO3veYXaMoDSGyV5phB/VKlkn7BTzBYYCoH qvhtuJuhvHflEtg9lW/3Vqzse8NEaDYEHIxy0rcmqyQkvRnHsR+ObvrRgrJxQZO4 zz3JkzwA/mDNYFDHhJKUv7skBg6qdZbiLGyr94dVK0MDKSZ19Kf6P+yG90kWD1NZ TgFSrNYD0lypGbQXjbwhZFWU6dxpDc2qdgPChhMG1WxpgEE04zyhj2Dn5yQPUOE/ ORrBVMjXlRQYFfl5rizTFP61iVZbWp8m/6SXRp4fAgMBAAGgADANBgkqhkiG9w0B AQsFAAOCAQEACvQVvNnIaSeI4DGfbdD+uPHS0g0eV+kiWeSZwdn0pYC/dS46cgqo 6krFStq3xkOEUe+G3wnulY4+kQDnuOvU8WUy1cSLj+QdGZu464blYPvX6QHpuISP cm2MaTZgfwJTgVkNEtx2wf5Gcl2Ce/+Vtd1s9D9T96AkP00PK1Cvotlb3o521x2s 2vhVKem2ZD6dJxG4/JlralODCgJtAYp6PIbUfG9bpAcBLEdbeHlOueyGdF/qMGG5 LQv9F9u4dd8iyn9W2nvsaGTrHxmFyO5EFcvM5JdVGjbYTnDLvVtwuIhZt+5+1CNU OEUCmUw8d36rvxbrnQhCQKaNKW7oN8UHiQ== , adminCertRequestType=pkcs10, adminSubjectDN=cn=PKI Administrator,o=cisco.com Security Domain, adminName=caadmin, adminProfileID=caAdminCert, adminCert=null, importAdminCert=false, generateServerCert=true, standAlone=false, stepTwo=false, authdbBaseDN=null, authdbHost=null, authdbPort=null, authdbSecureConn=null, caUri=null, kraUri=null, tksUri=null, enableServerSideKeyGen=null, importSharedSecret=null, generateSubsystemCert=true, sharedDB=false, sharedDBUserDN=null, createNewDB=true, setupReplication=null, subordinateSecurityDomainNamenull] [09/Nov/2014:05:59:31][http-bio-9443-exec-3]: === Token Panel === [09/Nov/2014:05:59:31][http-bio-9443-exec-3]: === Security Domain Panel === [09/Nov/2014:05:59:31][http-bio-9443-exec-3]: Creating new security domain [09/Nov/2014:05:59:31][http-bio-9443-exec-3]: === Subsystem Panel === [09/Nov/2014:05:59:31][http-bio-9443-exec-3]: === Hierarchy Panel === [09/Nov/2014:05:59:31][http-bio-9443-exec-3]: === Database Panel === [09/Nov/2014:05:59:31][http-bio-9443-exec-3]: LdapBoundConnFactory: init [09/Nov/2014:05:59:31][http-bio-9443-exec-3]: LdapBoundConnFactory:doCloning true [09/Nov/2014:05:59:31][http-bio-9443-exec-3]: LdapAuthInfo: init() [09/Nov/2014:05:59:31][http-bio-9443-exec-3]: LdapAuthInfo: init begins [09/Nov/2014:05:59:31][http-bio-9443-exec-3]: LdapAuthInfo: init: prompt is Internal LDAP Database [09/Nov/2014:05:59:31][http-bio-9443-exec-3]: LdapAuthInfo: init: try getting from memory cache [09/Nov/2014:05:59:31][http-bio-9443-exec-3]: LdapAuthInfo: init: password not in memory [09/Nov/2014:05:59:31][http-bio-9443-exec-3]: LdapAuthInfo: getPasswordFromStore: try to get it from password store [09/Nov/2014:05:59:31][http-bio-9443-exec-3]: CMSEngine: getPasswordStore(): password store not initialized before. [09/Nov/2014:05:59:31][http-bio-9443-exec-3]: CMSEngine: getPasswordStore(): password store initialized. [09/Nov/2014:05:59:31][http-bio-9443-exec-3]: LdapAuthInfo: getPasswordFromStore: about to get from passwored store: Internal LDAP Database [09/Nov/2014:05:59:31][http-bio-9443-exec-3]: LdapAuthInfo: getPasswordFromStore: password store available [09/Nov/2014:05:59:31][http-bio-9443-exec-3]: LdapAuthInfo: getPasswordFromStore: password for Internal LDAP Database not found, trying internaldb [09/Nov/2014:05:59:31][http-bio-9443-exec-3]: LdapAuthInfo: password ok: store in memory cache [09/Nov/2014:05:59:31][http-bio-9443-exec-3]: LdapAuthInfo: init ends [09/Nov/2014:05:59:31][http-bio-9443-exec-3]: init: before makeConnection errorIfDown is false [09/Nov/2014:05:59:31][http-bio-9443-exec-3]: makeConnection: errorIfDown false [09/Nov/2014:05:59:32][http-bio-9443-exec-3]: Established LDAP connection using basic authentication to host localhost.localdomain port 389 as cn=Directory Manager [09/Nov/2014:05:59:32][http-bio-9443-exec-3]: initializing with mininum 3 and maximum 15 connections to host localhost.localdomain port 389, secure connection, false, authentication type 1 [09/Nov/2014:05:59:32][http-bio-9443-exec-3]: increasing minimum connections by 3 [09/Nov/2014:05:59:32][http-bio-9443-exec-3]: new total available connections 3 [09/Nov/2014:05:59:32][http-bio-9443-exec-3]: new number of connections 3 [09/Nov/2014:05:59:32][http-bio-9443-exec-3]: In LdapBoundConnFactory::getConn() [09/Nov/2014:05:59:32][http-bio-9443-exec-3]: masterConn is connected: true [09/Nov/2014:05:59:32][http-bio-9443-exec-3]: getConn: conn is connected true [09/Nov/2014:05:59:32][http-bio-9443-exec-3]: getConn: mNumConns now 2 [09/Nov/2014:05:59:32][http-bio-9443-exec-3]: getBaseDNEntry: Checking subtree o=pki-tomcat-CA. [09/Nov/2014:05:59:32][http-bio-9443-exec-3]: getBaseDNEntry: Subtree o=pki-tomcat-CA already exists. [09/Nov/2014:05:59:32][http-bio-9443-exec-3]: getMappingDNEntry: Checking subtree o=pki-tomcat-CA mapping. [09/Nov/2014:05:59:32][http-bio-9443-exec-3]: getMapppingDNEntry: Mapping for subtree o=pki-tomcat-CA already exists. [09/Nov/2014:05:59:32][http-bio-9443-exec-3]: getDatabaseEntry: Checking database pki-tomcat-CA. [09/Nov/2014:05:59:32][http-bio-9443-exec-3]: getDatabaseEntry: Database pki-tomcat-CA already exists. [09/Nov/2014:05:59:32][http-bio-9443-exec-3]: confirmMappings: Checking other subtrees using database pki-tomcat-CA. [09/Nov/2014:05:59:32][http-bio-9443-exec-3]: confirmMappings: Database pki-tomcat-CA is not used by another subtree. [09/Nov/2014:05:59:32][http-bio-9443-exec-3]: populateDB: Deleting mapping cn="o=pki-tomcat-CA",cn=mapping tree, cn=config [09/Nov/2014:05:59:32][http-bio-9443-exec-3]: populateDB: Deleting database pki-tomcat-CA [09/Nov/2014:05:59:36][http-bio-9443-exec-3]: populateDB: Deleting subtree o=pki-tomcat-CA [09/Nov/2014:05:59:36][http-bio-9443-exec-3]: deleteSubtree: Subtree o=pki-tomcat-CA does not exist. [09/Nov/2014:05:59:37][http-bio-9443-exec-3]: Creating base DN: o=pki-tomcat-CA [09/Nov/2014:05:59:37][http-bio-9443-exec-3]: importLDIFS: param=preop.internaldb.schema.ldif [09/Nov/2014:05:59:37][http-bio-9443-exec-3]: importLDIFS(): ldif file = /usr/share/pki/ca/conf/schema.ldif [09/Nov/2014:05:59:37][http-bio-9443-exec-3]: importLDIFS(): ldif file copy to /var/lib/pki/pki-tomcat/ca/conf/schema.ldif [09/Nov/2014:05:59:54][http-bio-9443-exec-3]: importLDIFS: param=preop.internaldb.ldif [09/Nov/2014:05:59:54][http-bio-9443-exec-3]: importLDIFS(): ldif file = /usr/share/pki/ca/conf/database.ldif [09/Nov/2014:05:59:54][http-bio-9443-exec-3]: importLDIFS(): ldif file copy to /var/lib/pki/pki-tomcat/ca/conf/database.ldif [09/Nov/2014:05:59:54][http-bio-9443-exec-3]: importLDIFS: param=preop.internaldb.data_ldif [09/Nov/2014:05:59:54][http-bio-9443-exec-3]: importLDIFS(): ldif file = /usr/share/pki/ca/conf/db.ldif [09/Nov/2014:05:59:54][http-bio-9443-exec-3]: importLDIFS(): ldif file copy to /var/lib/pki/pki-tomcat/ca/conf/db.ldif [09/Nov/2014:05:59:55][http-bio-9443-exec-3]: importLDIFS(): ldif file = /usr/share/pki/ca/conf/acl.ldif [09/Nov/2014:05:59:55][http-bio-9443-exec-3]: importLDIFS(): ldif file copy to /var/lib/pki/pki-tomcat/ca/conf/acl.ldif [09/Nov/2014:05:59:55][http-bio-9443-exec-3]: importLDIFS: param=preop.internaldb.index_ldif [09/Nov/2014:05:59:55][http-bio-9443-exec-3]: importLDIFS(): ldif file = /usr/share/pki/ca/conf/index.ldif [09/Nov/2014:05:59:55][http-bio-9443-exec-3]: importLDIFS(): ldif file copy to /var/lib/pki/pki-tomcat/ca/conf/index.ldif [09/Nov/2014:05:59:55][http-bio-9443-exec-3]: DBSubsystem: init() mEnableSerialMgmt=false [09/Nov/2014:05:59:55][http-bio-9443-exec-3]: LdapBoundConnFactory: init [09/Nov/2014:05:59:55][http-bio-9443-exec-3]: LdapBoundConnFactory:doCloning true [09/Nov/2014:05:59:55][http-bio-9443-exec-3]: LdapAuthInfo: init() [09/Nov/2014:05:59:55][http-bio-9443-exec-3]: LdapAuthInfo: init begins [09/Nov/2014:05:59:55][http-bio-9443-exec-3]: LdapAuthInfo: init: prompt is Internal LDAP Database [09/Nov/2014:05:59:55][http-bio-9443-exec-3]: LdapAuthInfo: init: try getting from memory cache [09/Nov/2014:05:59:55][http-bio-9443-exec-3]: LdapAuthInfo: init: got password from memory [09/Nov/2014:05:59:55][http-bio-9443-exec-3]: LdapAuthInfo: init: password found for prompt. [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: LdapAuthInfo: password ok: store in memory cache [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: LdapAuthInfo: init ends [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: init: before makeConnection errorIfDown is true [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: makeConnection: errorIfDown true [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: Established LDAP connection using basic authentication to host localhost.localdomain port 389 as cn=Directory Manager [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: initializing with mininum 3 and maximum 15 connections to host localhost.localdomain port 389, secure connection, false, authentication type 1 [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: increasing minimum connections by 3 [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: new total available connections 3 [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: new number of connections 3 [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: CertificateAuthority init [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: Cert Repot inited [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: CRL Repot inited [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: Replica Repot inited [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: CertificateAuthority:initSigUnit: ca.signing.cert not found [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: SigningUnit init: debug Property ca.signing.cacertnickname missing value [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: CA signing unit inited [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: cachainNum= 0 [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: CertificateAuthority init: initRequestQueue [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: selected policy processor = classic [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: GenericPolicyProcessor::init begins [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: GenericPolicyProcessor::init Certificate Policy Framework (deprecated) is DISABLED [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: CA policy inited [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: CA service inited [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: CA notifier inited [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: CA pending notifier inited [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: RequestRepository: constructor2. [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: init: before makeConnection errorIfDown is false [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: makeConnection: errorIfDown false [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: Established LDAP connection using basic authentication to host localhost.localdomain port 389 as cn=Directory Manager [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: initializing with mininum 3 and maximum 20 connections to host localhost.localdomain port 389, secure connection, false, authentication type 1 [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: increasing minimum connections by 3 [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: new total available connections 3 [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: new number of connections 3 [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: increasing minimum number of connections by 3 [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: new total number of connections 3 [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: new total available connections 3 [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: FlatFileAuth: Splitting String: UID on commas [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: FlatFileAuth: countTokens:1 [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: FlatFileAuth: token 0 = UID [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: FlatFileAuth: Splitting String: PWD on commas [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: FlatFileAuth: countTokens:1 [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: FlatFileAuth: token 0 = PWD [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: FlatFileAuth: unionOfStrings: 0,0 = UID [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: FlatFileAuth: unionOfStrings: 1,0 = PWD [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: FlatFileAuth: mFilename = /var/lib/pki/pki-tomcat/conf/ca/flatfile.txt [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: FlatFileAuth: mKeyAttributes = UID [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: FlatFileAuth: mAuthAttrs = PWD [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: FlatFileAuth: stringArrays[0][0] = UID [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: FlatFileAuth: stringArrays[1][0] = PWD [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: FlatFileAuth: Read entries from password file - /var/lib/pki/pki-tomcat/conf/ca/flatfile.txt [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: Found authz manager plugin BasicAclAuthz [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: AAclAuthz: init begins [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: GroupAccessEvaluator: init [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: UserAccessEvaluator: init [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: UserOrigReqAccessEvaluator: init [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: Found authz manager plugin DirAclAuthz [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: AAclAuthz: init begins [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: GroupAccessEvaluator: init [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: UserAccessEvaluator: init [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: UserOrigReqAccessEvaluator: init [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: LdapBoundConnFactory: init [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: LdapBoundConnFactory:doCloning true [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: LdapAuthInfo: init() [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: LdapAuthInfo: init begins [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: LdapAuthInfo: init: prompt is Internal LDAP Database [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: LdapAuthInfo: init: try getting from memory cache [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: LdapAuthInfo: init: got password from memory [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: LdapAuthInfo: init: password found for prompt. [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: LdapAuthInfo: password ok: store in memory cache [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: LdapAuthInfo: init ends [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: init: before makeConnection errorIfDown is false [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: makeConnection: errorIfDown false [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: Established LDAP connection using basic authentication to host localhost.localdomain port 389 as cn=Directory Manager [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: initializing with mininum 3 and maximum 15 connections to host localhost.localdomain port 389, secure connection, false, authentication type 1 [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: increasing minimum connections by 3 [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: new total available connections 3 [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: new number of connections 3 [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: DirAclAuthz: about to ldap search aclResources [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: In LdapBoundConnFactory::getConn() [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: masterConn is connected: true [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: getConn: conn is connected true [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: getConn: mNumConns now 2 [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: returnConn: mNumConns now 3 [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: LdapBoundConnFactory: init [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: LdapBoundConnFactory:doCloning true [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: LdapAuthInfo: init() [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: LdapAuthInfo: init begins [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: LdapAuthInfo: init: prompt is Internal LDAP Database [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: LdapAuthInfo: init: try getting from memory cache [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: LdapAuthInfo: init: got password from memory [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: LdapAuthInfo: init: password found for prompt. [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: LdapAuthInfo: password ok: store in memory cache [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: LdapAuthInfo: init ends [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: init: before makeConnection errorIfDown is false [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: makeConnection: errorIfDown false [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: Established LDAP connection using basic authentication to host localhost.localdomain port 389 as cn=Directory Manager [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: initializing with mininum 3 and maximum 15 connections to host localhost.localdomain port 389, secure connection, false, authentication type 1 [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: increasing minimum connections by 3 [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: new total available connections 3 [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: new number of connections 3 [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: populateDBManager(): start [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: LdapBoundConnFactory: init [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: LdapBoundConnFactory:doCloning true [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: LdapAuthInfo: init() [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: LdapAuthInfo: init begins [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: LdapAuthInfo: init: prompt is Internal LDAP Database [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: LdapAuthInfo: init: try getting from memory cache [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: LdapAuthInfo: init: got password from memory [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: LdapAuthInfo: init: password found for prompt. [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: LdapAuthInfo: password ok: store in memory cache [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: LdapAuthInfo: init ends [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: init: before makeConnection errorIfDown is false [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: makeConnection: errorIfDown false [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: Established LDAP connection using basic authentication to host localhost.localdomain port 389 as cn=Directory Manager [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: initializing with mininum 3 and maximum 15 connections to host localhost.localdomain port 389, secure connection, false, authentication type 1 [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: increasing minimum connections by 3 [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: new total available connections 3 [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: new number of connections 3 [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: In LdapBoundConnFactory::getConn() [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: masterConn is connected: true [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: getConn: conn is connected true [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: getConn: mNumConns now 2 [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: importLDIFS: param=preop.internaldb.manager_ldif [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: importLDIFS(): ldif file = /usr/share/pki/ca/conf/manager.ldif [09/Nov/2014:05:59:56][http-bio-9443-exec-3]: importLDIFS(): ldif file copy to /var/lib/pki/pki-tomcat/ca/conf/manager.ldif [09/Nov/2014:05:59:57][http-bio-9443-exec-3]: importLDIFS(): LDAP Errors in importing /var/lib/pki/pki-tomcat/ca/conf/manager.ldif [09/Nov/2014:05:59:57][http-bio-9443-exec-3]: LDAPUtil:importLDIF: exception in adding entry ou=csusers,cn=config:netscape.ldap.LDAPException: error result (68) [09/Nov/2014:05:59:57][http-bio-9443-exec-3]: LDAPUtil:importLDIF: exception in modifying entry cn=ldbm database,cn=plugins,cn=config:netscape.ldap.LDAPException: error result (20) [09/Nov/2014:05:59:57][http-bio-9443-exec-3]: LDAPUtil:importLDIF: exception in modifying entry cn=config:netscape.ldap.LDAPException: error result (20) [09/Nov/2014:05:59:57][http-bio-9443-exec-3]: LDAPUtil:importLDIF: exception in modifying entry ou=csusers,cn=config:netscape.ldap.LDAPException: error result (20) [09/Nov/2014:05:59:57][http-bio-9443-exec-3]: LDAPUtil:importLDIF: exception in modifying entry cn=tasks,cn=config:netscape.ldap.LDAPException: error result (20) [09/Nov/2014:05:59:57][http-bio-9443-exec-3]: populateVLVIndexes(): start [09/Nov/2014:05:59:57][http-bio-9443-exec-3]: LdapBoundConnFactory: init [09/Nov/2014:05:59:57][http-bio-9443-exec-3]: LdapBoundConnFactory:doCloning true [09/Nov/2014:05:59:57][http-bio-9443-exec-3]: LdapAuthInfo: init() [09/Nov/2014:05:59:57][http-bio-9443-exec-3]: LdapAuthInfo: init begins [09/Nov/2014:05:59:57][http-bio-9443-exec-3]: LdapAuthInfo: init: prompt is Internal LDAP Database [09/Nov/2014:05:59:57][http-bio-9443-exec-3]: LdapAuthInfo: init: try getting from memory cache [09/Nov/2014:05:59:57][http-bio-9443-exec-3]: LdapAuthInfo: init: got password from memory [09/Nov/2014:05:59:57][http-bio-9443-exec-3]: LdapAuthInfo: init: password found for prompt. [09/Nov/2014:05:59:57][http-bio-9443-exec-3]: LdapAuthInfo: password ok: store in memory cache [09/Nov/2014:05:59:57][http-bio-9443-exec-3]: LdapAuthInfo: init ends [09/Nov/2014:05:59:57][http-bio-9443-exec-3]: init: before makeConnection errorIfDown is false [09/Nov/2014:05:59:57][http-bio-9443-exec-3]: makeConnection: errorIfDown false [09/Nov/2014:05:59:57][http-bio-9443-exec-3]: Established LDAP connection using basic authentication to host localhost.localdomain port 389 as cn=Directory Manager [09/Nov/2014:05:59:57][http-bio-9443-exec-3]: initializing with mininum 3 and maximum 15 connections to host localhost.localdomain port 389, secure connection, false, authentication type 1 [09/Nov/2014:05:59:57][http-bio-9443-exec-3]: increasing minimum connections by 3 [09/Nov/2014:05:59:57][http-bio-9443-exec-3]: new total available connections 3 [09/Nov/2014:05:59:57][http-bio-9443-exec-3]: new number of connections 3 [09/Nov/2014:05:59:57][http-bio-9443-exec-3]: In LdapBoundConnFactory::getConn() [09/Nov/2014:05:59:57][http-bio-9443-exec-3]: masterConn is connected: true [09/Nov/2014:05:59:57][http-bio-9443-exec-3]: getConn: conn is connected true [09/Nov/2014:05:59:57][http-bio-9443-exec-3]: getConn: mNumConns now 2 [09/Nov/2014:05:59:57][http-bio-9443-exec-3]: importLDIFS: param=preop.internaldb.post_ldif [09/Nov/2014:05:59:57][http-bio-9443-exec-3]: importLDIFS(): ldif file = /usr/share/pki/ca/conf/vlv.ldif [09/Nov/2014:05:59:57][http-bio-9443-exec-3]: importLDIFS(): ldif file copy to /var/lib/pki/pki-tomcat/ca/conf/vlv.ldif [09/Nov/2014:05:59:58][http-bio-9443-exec-3]: importLDIFS(): ldif file = /usr/share/pki/ca/conf/vlvtasks.ldif [09/Nov/2014:05:59:58][http-bio-9443-exec-3]: importLDIFS(): ldif file copy to /var/lib/pki/pki-tomcat/ca/conf/vlvtasks.ldif [09/Nov/2014:05:59:58][http-bio-9443-exec-3]: Checking wait_dn cn=index1160589769, cn=index, cn=tasks, cn=config [09/Nov/2014:05:59:59][http-bio-9443-exec-3]: external CA selected [09/Nov/2014:05:59:59][http-bio-9443-exec-3]: Found data for 'signing' [09/Nov/2014:05:59:59][http-bio-9443-exec-3]: SystemConfigService:processCerts: adding request extension to config [09/Nov/2014:05:59:59][http-bio-9443-exec-3]: configCert: caType is remote [09/Nov/2014:05:59:59][http-bio-9443-exec-3]: NamePanel: updateConfig() for certTag signing [09/Nov/2014:05:59:59][http-bio-9443-exec-3]: NamePanel: setting signing nickname=caSigningCert cert-pki-tomcat CA [09/Nov/2014:05:59:59][http-bio-9443-exec-3]: updateConfig() done [09/Nov/2014:05:59:59][http-bio-9443-exec-3]: configCert: remote CA [09/Nov/2014:05:59:59][http-bio-9443-exec-3]: CertRequestPanel: got public key [09/Nov/2014:05:59:59][http-bio-9443-exec-3]: CertRequestPanel: got private key [09/Nov/2014:05:59:59][http-bio-9443-exec-3]: ConfigurationUtils: handleCertRequest() begins [09/Nov/2014:05:59:59][http-bio-9443-exec-3]: handleCertRequest: tag=signing [09/Nov/2014:05:59:59][http-bio-9443-exec-3]: privKeyID=-442be13dfe85465b0ce1aa2e3b6a2517bea27c4a [09/Nov/2014:05:59:59][http-bio-9443-exec-3]: handleCertRequest: certTag is siging -- about to call createBasicCAExtensions() [09/Nov/2014:05:59:59][http-bio-9443-exec-3]: ConfigurationUtils: createBasicCAExtensions: begins [09/Nov/2014:05:59:59][http-bio-9443-exec-3]: ConfigurationUtils: createBasicCAExtensions: processing generic extension [09/Nov/2014:05:59:59][http-bio-9443-exec-3]: ConfigurationUtils: createBasicCAExtensions: generic extension added: 1.3.6.1.4.1.311.20.2 [09/Nov/2014:05:59:59][http-bio-9443-exec-3]: handleCertRequest: created cert request [09/Nov/2014:05:59:59][http-bio-9443-exec-3]: Found data for 'ocsp_signing' [09/Nov/2014:05:59:59][http-bio-9443-exec-3]: configCert: caType is local [09/Nov/2014:05:59:59][http-bio-9443-exec-3]: NamePanel: updateConfig() for certTag ocsp_signing [09/Nov/2014:05:59:59][http-bio-9443-exec-3]: NamePanel: setting signing nickname=ocspSigningCert cert-pki-tomcat CA [09/Nov/2014:05:59:59][http-bio-9443-exec-3]: updateConfig() done [09/Nov/2014:05:59:59][http-bio-9443-exec-3]: ConfigurationUtils: handleCertRequest() begins [09/Nov/2014:05:59:59][http-bio-9443-exec-3]: handleCertRequest: tag=ocsp_signing [09/Nov/2014:05:59:59][http-bio-9443-exec-3]: privKeyID=-49ab67c59ccb982f243b4d09668f695e73d90216 [09/Nov/2014:05:59:59][http-bio-9443-exec-3]: handleCertRequest: created cert request [09/Nov/2014:05:59:59][http-bio-9443-exec-3]: Found data for 'sslserver' [09/Nov/2014:06:00:00][http-bio-9443-exec-3]: configCert: caType is local [09/Nov/2014:06:00:00][http-bio-9443-exec-3]: NamePanel: updateConfig() for certTag sslserver [09/Nov/2014:06:00:00][http-bio-9443-exec-3]: updateConfig() done [09/Nov/2014:06:00:00][http-bio-9443-exec-3]: ConfigurationUtils: handleCertRequest() begins [09/Nov/2014:06:00:00][http-bio-9443-exec-3]: handleCertRequest: tag=sslserver [09/Nov/2014:06:00:00][http-bio-9443-exec-3]: privKeyID=-53dd59f03c82cfa2d5f7586e66b164156b4319a9 [09/Nov/2014:06:00:00][http-bio-9443-exec-3]: handleCertRequest: created cert request [09/Nov/2014:06:00:00][http-bio-9443-exec-3]: Found data for 'subsystem' [09/Nov/2014:06:00:02][http-bio-9443-exec-3]: configCert: caType is local [09/Nov/2014:06:00:02][http-bio-9443-exec-3]: NamePanel: updateConfig() for certTag subsystem [09/Nov/2014:06:00:02][http-bio-9443-exec-3]: updateConfig() done [09/Nov/2014:06:00:02][http-bio-9443-exec-3]: ConfigurationUtils: handleCertRequest() begins [09/Nov/2014:06:00:02][http-bio-9443-exec-3]: handleCertRequest: tag=subsystem [09/Nov/2014:06:00:02][http-bio-9443-exec-3]: privKeyID=22c5cf6ee0b08242d39b237897226214b0111688 [09/Nov/2014:06:00:02][http-bio-9443-exec-3]: handleCertRequest: created cert request [09/Nov/2014:06:00:02][http-bio-9443-exec-3]: Found data for 'audit_signing' [09/Nov/2014:06:00:03][http-bio-9443-exec-3]: configCert: caType is local [09/Nov/2014:06:00:03][http-bio-9443-exec-3]: NamePanel: updateConfig() for certTag audit_signing [09/Nov/2014:06:00:03][http-bio-9443-exec-3]: updateConfig() done [09/Nov/2014:06:00:03][http-bio-9443-exec-3]: ConfigurationUtils: handleCertRequest() begins [09/Nov/2014:06:00:03][http-bio-9443-exec-3]: handleCertRequest: tag=audit_signing [09/Nov/2014:06:00:03][http-bio-9443-exec-3]: privKeyID=-726505a79f2b2c173715f02e870e6757ceec052d [09/Nov/2014:06:00:03][http-bio-9443-exec-3]: handleCertRequest: created cert request [09/Nov/2014:06:00:03][http-bio-9443-exec-3]: Submit CSRs to external ca . . . [09/Nov/2014:06:00:21][localhost-startStop-1]: ============================================ [09/Nov/2014:06:00:21][localhost-startStop-1]: ===== DEBUG SUBSYSTEM INITIALIZED ======= [09/Nov/2014:06:00:21][localhost-startStop-1]: ============================================ [09/Nov/2014:06:00:21][localhost-startStop-1]: CMSEngine: done init id=debug [09/Nov/2014:06:00:21][localhost-startStop-1]: CMSEngine: initialized debug [09/Nov/2014:06:00:21][localhost-startStop-1]: CMSEngine: initSubsystem id=log [09/Nov/2014:06:00:21][localhost-startStop-1]: CMSEngine: ready to init id=log [09/Nov/2014:06:00:21][localhost-startStop-1]: CMSEngine: done init id=log [09/Nov/2014:06:00:21][localhost-startStop-1]: CMSEngine: initialized log [09/Nov/2014:06:00:21][localhost-startStop-1]: CMSEngine: initSubsystem id=jss [09/Nov/2014:06:00:21][localhost-startStop-1]: CMSEngine: ready to init id=jss [09/Nov/2014:06:00:21][localhost-startStop-1]: CMSEngine: done init id=jss [09/Nov/2014:06:00:21][localhost-startStop-1]: CMSEngine: initialized jss [09/Nov/2014:06:00:21][localhost-startStop-1]: CMSEngine: initSubsystem id=dbs [09/Nov/2014:06:00:21][localhost-startStop-1]: CMSEngine: ready to init id=dbs [09/Nov/2014:06:00:21][localhost-startStop-1]: DBSubsystem: init() mEnableSerialMgmt=false [09/Nov/2014:06:00:21][localhost-startStop-1]: LdapBoundConnFactory: init [09/Nov/2014:06:00:21][localhost-startStop-1]: LdapBoundConnFactory:doCloning true [09/Nov/2014:06:00:21][localhost-startStop-1]: LdapAuthInfo: init() [09/Nov/2014:06:00:21][localhost-startStop-1]: LdapAuthInfo: init begins [09/Nov/2014:06:00:21][localhost-startStop-1]: LdapAuthInfo: init: prompt is Internal LDAP Database [09/Nov/2014:06:00:21][localhost-startStop-1]: LdapAuthInfo: init: try getting from memory cache [09/Nov/2014:06:00:21][localhost-startStop-1]: LdapAuthInfo: init: password not in memory [09/Nov/2014:06:00:21][localhost-startStop-1]: LdapAuthInfo: getPasswordFromStore: try to get it from password store [09/Nov/2014:06:00:21][localhost-startStop-1]: CMSEngine: getPasswordStore(): password store not initialized before. [09/Nov/2014:06:00:21][localhost-startStop-1]: CMSEngine: getPasswordStore(): password store initialized. [09/Nov/2014:06:00:21][localhost-startStop-1]: LdapAuthInfo: getPasswordFromStore: about to get from passwored store: Internal LDAP Database [09/Nov/2014:06:00:21][localhost-startStop-1]: LdapAuthInfo: getPasswordFromStore: password store available [09/Nov/2014:06:00:21][localhost-startStop-1]: LdapAuthInfo: getPasswordFromStore: password for Internal LDAP Database not found, trying internaldb [09/Nov/2014:06:00:21][localhost-startStop-1]: LdapAuthInfo: password ok: store in memory cache [09/Nov/2014:06:00:21][localhost-startStop-1]: LdapAuthInfo: init ends [09/Nov/2014:06:00:21][localhost-startStop-1]: init: before makeConnection errorIfDown is true [09/Nov/2014:06:00:21][localhost-startStop-1]: makeConnection: errorIfDown true [09/Nov/2014:06:00:21][localhost-startStop-1]: Established LDAP connection using basic authentication to host localhost.localdomain port 389 as cn=Directory Manager [09/Nov/2014:06:00:21][localhost-startStop-1]: initializing with mininum 3 and maximum 15 connections to host localhost.localdomain port 389, secure connection, false, authentication type 1 [09/Nov/2014:06:00:21][localhost-startStop-1]: increasing minimum connections by 3 [09/Nov/2014:06:00:21][localhost-startStop-1]: new total available connections 3 [09/Nov/2014:06:00:21][localhost-startStop-1]: new number of connections 3 [09/Nov/2014:06:00:21][localhost-startStop-1]: CMSEngine: done init id=dbs [09/Nov/2014:06:00:21][localhost-startStop-1]: CMSEngine: initialized dbs [09/Nov/2014:06:00:21][localhost-startStop-1]: CMSEngine: initSubsystem id=usrgrp [09/Nov/2014:06:00:21][localhost-startStop-1]: CMSEngine: ready to init id=usrgrp [09/Nov/2014:06:00:21][localhost-startStop-1]: LdapBoundConnFactory: init [09/Nov/2014:06:00:21][localhost-startStop-1]: LdapBoundConnFactory:doCloning true [09/Nov/2014:06:00:21][localhost-startStop-1]: LdapAuthInfo: init() [09/Nov/2014:06:00:21][localhost-startStop-1]: LdapAuthInfo: init begins [09/Nov/2014:06:00:21][localhost-startStop-1]: LdapAuthInfo: init: prompt is Internal LDAP Database [09/Nov/2014:06:00:21][localhost-startStop-1]: LdapAuthInfo: init: try getting from memory cache [09/Nov/2014:06:00:21][localhost-startStop-1]: LdapAuthInfo: init: got password from memory [09/Nov/2014:06:00:21][localhost-startStop-1]: LdapAuthInfo: init: password found for prompt. [09/Nov/2014:06:00:21][localhost-startStop-1]: LdapAuthInfo: password ok: store in memory cache [09/Nov/2014:06:00:21][localhost-startStop-1]: LdapAuthInfo: init ends [09/Nov/2014:06:00:21][localhost-startStop-1]: init: before makeConnection errorIfDown is false [09/Nov/2014:06:00:21][localhost-startStop-1]: makeConnection: errorIfDown false [09/Nov/2014:06:00:21][localhost-startStop-1]: Established LDAP connection using basic authentication to host localhost.localdomain port 389 as cn=Directory Manager [09/Nov/2014:06:00:21][localhost-startStop-1]: initializing with mininum 3 and maximum 15 connections to host localhost.localdomain port 389, secure connection, false, authentication type 1 [09/Nov/2014:06:00:21][localhost-startStop-1]: increasing minimum connections by 3 [09/Nov/2014:06:00:21][localhost-startStop-1]: new total available connections 3 [09/Nov/2014:06:00:21][localhost-startStop-1]: new number of connections 3 [09/Nov/2014:06:00:21][localhost-startStop-1]: CMSEngine: done init id=usrgrp [09/Nov/2014:06:00:21][localhost-startStop-1]: CMSEngine: initialized usrgrp [09/Nov/2014:06:00:21][localhost-startStop-1]: CMSEngine: initSubsystem id=registry [09/Nov/2014:06:00:21][localhost-startStop-1]: CMSEngine: ready to init id=registry [09/Nov/2014:06:00:21][localhost-startStop-1]: RegistrySubsystem: start init [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin profile caEnrollImpl Generic Certificate Enrollment Profile Certificate Authority Generic Certificate Enrollment Profile com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin profile caCACertEnrollImpl CA Certificate Enrollment Profile Certificate Authority CA Certificate Enrollment Profile com.netscape.cms.profile.common.CACertCAEnrollProfile [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin profile caServerCertEnrollImpl Server Certificate Enrollment Profile Certificate Authority Server Certificate Enrollment Profile com.netscape.cms.profile.common.ServerCertCAEnrollProfile [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin profile caUserCertEnrollImpl User Certificate Enrollment Profile Certificate Authority User Certificate Enrollment Profile com.netscape.cms.profile.common.UserCertCAEnrollProfile [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin defaultPolicy noDefaultImpl No Default No Default com.netscape.cms.profile.def.NoDefault [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin defaultPolicy genericExtDefaultImpl Generic Extension Generic Extension com.netscape.cms.profile.def.GenericExtDefault [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin defaultPolicy autoAssignDefaultImpl Auto Request Assignment Default Auto Request Assignment Default com.netscape.cms.profile.def.AutoAssignDefault [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin defaultPolicy subjectNameDefaultImpl Subject Name Default Subject Name Default com.netscape.cms.profile.def.SubjectNameDefault [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin defaultPolicy validityDefaultImpl Validity Default Validty Default com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin defaultPolicy randomizedValidityDefaultImpl Randomized Validity Default Randomized Validity Default com.netscape.cms.profile.def.RandomizedValidityDefault [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin defaultPolicy caValidityDefaultImpl CA Certificate Validity Default CA Certificate Validty Default com.netscape.cms.profile.def.CAValidityDefault [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin defaultPolicy subjectKeyIdentifierExtDefaultImpl Subject Key Identifier Default Subject Key Identifier Default com.netscape.cms.profile.def.SubjectKeyIdentifierExtDefault [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin defaultPolicy authorityKeyIdentifierExtDefaultImpl Authority Key Identifier Extension Default Authority Key Identifier Extension Default com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin defaultPolicy basicConstraintsExtDefaultImpl Basic Constraints Extension Default Basic Constraints Extension Default com.netscape.cms.profile.def.BasicConstraintsExtDefault [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin defaultPolicy keyUsageExtDefaultImpl Key Usage Extension Default Key Usage Extension Default com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin defaultPolicy nsCertTypeExtDefaultImpl Netscape Certificate Type Extension Default Netscape Certificate Type Extension Default com.netscape.cms.profile.def.NSCertTypeExtDefault [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin defaultPolicy extendedKeyUsageExtDefaultImpl Extended Key Usage Extension Default Extended Key Usage Extension Default com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin defaultPolicy ocspNoCheckExtDefaultImpl OCSP No Check Extension Default OCSP No Check Extension Default com.netscape.cms.profile.def.OCSPNoCheckExtDefault [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin defaultPolicy issuerAltNameExtDefaultImpl Issuer Alternative Name Extension Default Issuer Alternative Name Extension Default com.netscape.cms.profile.def.IssuerAltNameExtDefault [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin defaultPolicy subjectAltNameExtDefaultImpl Subject Alternative Name Extension Default Subject Alternative Name Extension Default com.netscape.cms.profile.def.SubjectAltNameExtDefault [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin defaultPolicy userSubjectNameDefaultImpl User Supplied Subject Name Default User Supplied Subject Name Default com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin defaultPolicy signingAlgDefaultImpl Signing Algorithm Default Signing Algorithm Default com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin defaultPolicy userKeyDefaultImpl User Supplied Key Default User Supplied Key Default com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin defaultPolicy userValidityDefaultImpl User Supplied Validity Default User Supplied Validity Default com.netscape.cms.profile.def.UserValidityDefault [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin defaultPolicy userExtensionDefaultImpl User Supplied Extension Default User Supplied Extension Default com.netscape.cms.profile.def.UserExtensionDefault [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin defaultPolicy userSigningAlgDefaultImpl User Supplied Signing Alg Default User Supplied Signing Alg Default com.netscape.cms.profile.def.UserSigningAlgDefault [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin defaultPolicy authTokenSubjectNameDefaultImpl Token Supplied Subject Name Default Token Supplied Subject Name Default com.netscape.cms.profile.def.AuthTokenSubjectNameDefault [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin defaultPolicy subjectInfoAccessExtDefaultImpl Subject Info Access Extension Default Subject Info Access Extension Default com.netscape.cms.profile.def.SubjectInfoAccessExtDefault [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin defaultPolicy authInfoAccessExtDefaultImpl Authority Info Access Extension Default Authority Info Access Extension Default com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin defaultPolicy nscCommentExtDefaultImpl Netscape Comment Extension Default Netscape Comment Extension Default com.netscape.cms.profile.def.NSCCommentExtDefault [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin defaultPolicy freshestCRLExtDefaultImpl Freshest CRL Extension Default Freshest CRL Extension Default com.netscape.cms.profile.def.FreshestCRLExtDefault [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin defaultPolicy crlDistributionPointsExtDefaultImpl CRL Distribution Points Extension Default CRL Distribution Points Extension Default com.netscape.cms.profile.def.CRLDistributionPointsExtDefault [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin defaultPolicy policyConstraintsExtDefaultImpl Policy Constraints Extension Default Policy Constraints Extension Default com.netscape.cms.profile.def.PolicyConstraintsExtDefault [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin defaultPolicy policyMappingsExtDefaultImpl Policy Mappings Extension Default Policy Mappings Extension Default com.netscape.cms.profile.def.PolicyMappingsExtDefault [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin defaultPolicy nameConstraintsExtDefaultImpl Name Constraints Extension Default Name Constraints Extension Default com.netscape.cms.profile.def.NameConstraintsExtDefault [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin defaultPolicy certificateVersionDefaultImpl Certificate Version Default Certificate Version Default com.netscape.cms.profile.def.CertificateVersionDefault [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin defaultPolicy certificatePoliciesExtDefaultImpl Certificate Policies Extension Default Certificate Policies Extension Default com.netscape.cms.profile.def.CertificatePoliciesExtDefault [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin defaultPolicy subjectDirAttributesExtDefaultImpl Subject Directory Attributes Extension Default Subject Directory Attributes Extension Default com.netscape.cms.profile.def.SubjectDirAttributesExtDefault [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin defaultPolicy privateKeyPeriodExtDefaultImpl Private Key Period Ext Default Private Key Period Ext Default com.netscape.cms.profile.def.PrivateKeyUsagePeriodExtDefault [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin defaultPolicy inhibitAnyPolicyExtDefaultImpl Inhibit Any-Policy Extension Default Inhibit Any-Policy Extension Default com.netscape.cms.profile.def.InhibitAnyPolicyExtDefault [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin defaultPolicy imageDefaultImpl Image Default Image Default com.netscape.cms.profile.def.ImageDefault [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin defaultPolicy nsTokenDeviceKeySubjectNameDefaultImpl nsTokenDeviceKeySubjectNameDefault nsTokenDeviceKeySubjectNameDefaultImpl com.netscape.cms.profile.def.nsTokenDeviceKeySubjectNameDefault [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin defaultPolicy nsTokenUserKeySubjectNameDefaultImpl nsTokenUserKeySubjectNameDefault nsTokenUserKeySubjectNameDefaultImpl com.netscape.cms.profile.def.nsTokenUserKeySubjectNameDefault [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin constraintPolicy noConstraintImpl No Constraint No Constraint com.netscape.cms.profile.constraint.NoConstraint [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin constraintPolicy subjectNameConstraintImpl Subject Name Constraint Subject Name Constraint com.netscape.cms.profile.constraint.SubjectNameConstraint [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin constraintPolicy uniqueSubjectNameConstraintImpl Unique Subject Name Constraint Unique Subject Name Constraint com.netscape.cms.profile.constraint.UniqueSubjectNameConstraint [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin constraintPolicy userSubjectNameConstraintImpl User Subject Name Constraint User Subject Name Constraint com.netscape.cms.profile.constraint.UserSubjectNameConstraint [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin constraintPolicy validityConstraintImpl Validity Constraint Validity Constraint com.netscape.cms.profile.constraint.ValidityConstraint [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin constraintPolicy keyUsageExtConstraintImpl Key Usage Extension Constraint Key Usage Extension Constraint com.netscape.cms.profile.constraint.KeyUsageExtConstraint [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin constraintPolicy nsCertTypeExtConstraintImpl Netscape Certificate Type Extension Constraint Netscape Certificate Type Extension Constraint com.netscape.cms.profile.constraint.NSCertTypeExtConstraint [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin constraintPolicy extendedKeyUsageExtConstraintImpl Extended Key Usage Extension Constraint Extended Key Usage Extension Constraint com.netscape.cms.profile.constraint.ExtendedKeyUsageExtConstraint [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin constraintPolicy keyConstraintImpl Key Constraint Key Constraint com.netscape.cms.profile.constraint.KeyConstraint [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin constraintPolicy basicConstraintsExtConstraintImpl Basic Constraints Extension Constraint Basic Constraints Extension Constraint com.netscape.cms.profile.constraint.BasicConstraintsExtConstraint [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin constraintPolicy extensionConstraintImpl Extension Constraint Extension Constraint com.netscape.cms.profile.constraint.ExtensionConstraint [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin constraintPolicy signingAlgConstraintImpl Signing Algorithm Constraint Signing Algorithm Constraint com.netscape.cms.profile.constraint.SigningAlgConstraint [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin constraintPolicy uniqueKeyConstraintImpl Unique Public Key Constraint Unique Public Key Constraint com.netscape.cms.profile.constraint.UniqueKeyConstraint [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin constraintPolicy renewGracePeriodConstraintImpl Renewal Grace Period Constraint Renewal Grace Period Constraint com.netscape.cms.profile.constraint.RenewGracePeriodConstraint [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin profileInput cmcCertReqInputImpl CMC Certificate Request Input CMC Certificate Request Input com.netscape.cms.profile.input.CMCCertReqInput [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin profileInput certReqInputImpl Certificate Request Input Certificate Request Input com.netscape.cms.profile.input.CertReqInput [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin profileInput keyGenInputImpl Key Generation Input Key Generation Input com.netscape.cms.profile.input.KeyGenInput [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin profileInput encKeyGenInputImpl Encryption Key Generation Input Encryption Key Generation Input com.netscape.cms.profile.input.EncryptionKeyGenInput [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin profileInput signKeyGenInputImpl Encryption Key Generation Input Encryption Key Generation Input com.netscape.cms.profile.input.SigningKeyGenInput [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin profileInput dualKeyGenInputImpl Dual Key Generation Input Dual Key Generation Input com.netscape.cms.profile.input.DualKeyGenInput [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin profileInput subjectNameInputImpl Subject Name Input Subject Name Input com.netscape.cms.profile.input.SubjectNameInput [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin profileInput submitterInfoInputImpl Submitter Information Input Submitter Information Input com.netscape.cms.profile.input.SubmitterInfoInput [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin profileInput genericInputImpl Generic Input Generic Input com.netscape.cms.profile.input.GenericInput [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin profileInput fileSigningInputImpl File Signing Input File Signing Input com.netscape.cms.profile.input.FileSigningInput [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin profileInput imageInputImpl Image Input Image Input com.netscape.cms.profile.input.ImageInput [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin profileInput subjectDNInputImpl Subject DN Input Subject DN Input com.netscape.cms.profile.input.SubjectDNInput [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin profileInput nsNKeyCertReqInputImpl nsNKeyCertReqInputImpl nsNKeyCertReqInputImpl com.netscape.cms.profile.input.nsNKeyCertReqInput [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin profileInput nsHKeyCertReqInputImpl nsHKeyCertReqInputImpl nsHKeyCertReqInputImpl com.netscape.cms.profile.input.nsHKeyCertReqInput [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin profileInput serialNumRenewInputImpl Certificate Renewal Request Serial Number Input Certificate Renewal Request Serial Number Input com.netscape.cms.profile.input.SerialNumRenewInput [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin profileInput subjectAltNameExtInputImpl SAN Input SAN Input com.netscape.cms.profile.input.SubjectAltNameExtInput [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin profileOutput certOutputImpl Certificate Output Certificate Output com.netscape.cms.profile.output.CertOutput [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin profileOutput cmmfOutputImpl CMMF Response Output CMMF Response Output com.netscape.cms.profile.output.CMMFOutput [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin profileOutput pkcs7OutputImpl PKCS7 Output PKCS7 Output com.netscape.cms.profile.output.PKCS7Output [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin profileOutput nsNKeyOutputImpl nsNKeyOutputImpl nsNKeyOutputImpl com.netscape.cms.profile.output.nsNKeyOutput [09/Nov/2014:06:00:21][localhost-startStop-1]: added plugin profileUpdater subsystemGroupUpdaterImpl Updater for Subsystem Group Updater for Subsystem Group com.netscape.cms.profile.updater.SubsystemGroupUpdater [09/Nov/2014:06:00:21][localhost-startStop-1]: CMSEngine: done init id=registry [09/Nov/2014:06:00:21][localhost-startStop-1]: CMSEngine: initialized registry [09/Nov/2014:06:00:21][localhost-startStop-1]: CMSEngine: initSubsystem id=oidmap [09/Nov/2014:06:00:21][localhost-startStop-1]: CMSEngine: ready to init id=oidmap [09/Nov/2014:06:00:21][localhost-startStop-1]: CMSEngine: done init id=oidmap [09/Nov/2014:06:00:21][localhost-startStop-1]: CMSEngine: initialized oidmap [09/Nov/2014:06:00:21][localhost-startStop-1]: CMSEngine: initSubsystem id=X500Name [09/Nov/2014:06:00:21][localhost-startStop-1]: CMSEngine: ready to init id=X500Name [09/Nov/2014:06:00:21][localhost-startStop-1]: CMSEngine: done init id=X500Name [09/Nov/2014:06:00:21][localhost-startStop-1]: CMSEngine: initialized X500Name [09/Nov/2014:06:00:21][localhost-startStop-1]: CMSEngine: initSubsystem id=request [09/Nov/2014:06:00:21][localhost-startStop-1]: CMSEngine: ready to init id=request [09/Nov/2014:06:00:21][localhost-startStop-1]: CMSEngine: done init id=request [09/Nov/2014:06:00:21][localhost-startStop-1]: CMSEngine: initialized request [09/Nov/2014:06:00:21][localhost-startStop-1]: CMSEngine: initSubsystem id=ca [09/Nov/2014:06:00:21][localhost-startStop-1]: CMSEngine: ready to init id=ca [09/Nov/2014:06:00:21][localhost-startStop-1]: CertificateAuthority init [09/Nov/2014:06:00:21][localhost-startStop-1]: Cert Repot inited [09/Nov/2014:06:00:21][localhost-startStop-1]: CRL Repot inited [09/Nov/2014:06:00:21][localhost-startStop-1]: Replica Repot inited [09/Nov/2014:06:00:21][localhost-startStop-1]: CertificateAuthority:initSigUnit: ca cert found [09/Nov/2014:06:00:21][localhost-startStop-1]: CertificateAuthority init: initRequestQueue [09/Nov/2014:06:00:21][localhost-startStop-1]: selected policy processor = classic [09/Nov/2014:06:00:21][localhost-startStop-1]: GenericPolicyProcessor::init begins [09/Nov/2014:06:00:21][localhost-startStop-1]: GenericPolicyProcessor::init Certificate Policy Framework (deprecated) is DISABLED [09/Nov/2014:06:00:21][localhost-startStop-1]: CA policy inited [09/Nov/2014:06:00:21][localhost-startStop-1]: CA service inited [09/Nov/2014:06:00:21][localhost-startStop-1]: CA notifier inited [09/Nov/2014:06:00:21][localhost-startStop-1]: CA pending notifier inited [09/Nov/2014:06:00:21][localhost-startStop-1]: RequestRepository: constructor2. [09/Nov/2014:06:00:21][localhost-startStop-1]: CMSEngine: done init id=ca [09/Nov/2014:06:00:21][localhost-startStop-1]: CMSEngine: initialized ca [09/Nov/2014:06:00:21][localhost-startStop-1]: CMSEngine::initSubsystem ca Java subsytem about to calculate serverCertNickname. [09/Nov/2014:06:00:21][localhost-startStop-1]: Subsystem ca init sslserver: tokenName:Internal Key Storage Token nickName:Server-Cert cert-pki-tomcat [09/Nov/2014:06:00:21][localhost-startStop-1]: CMSEngine: initSubsystem id=profile [09/Nov/2014:06:00:21][localhost-startStop-1]: CMSEngine: ready to init id=profile [09/Nov/2014:06:00:21][localhost-startStop-1]: ProfileSubsystem: start init [09/Nov/2014:06:00:21][localhost-startStop-1]: Start Profile Creation - caUserCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:21][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:21][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:06:00:21][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.NoDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectAltNameExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_type=null [09/Nov/2014:06:00:22][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_pattern=null [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:06:00:22][localhost-startStop-1]: Done Profile Creation - caUserCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Start Profile Creation - caECUserCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.NoDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectAltNameExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_type=null [09/Nov/2014:06:00:22][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_pattern=null [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:06:00:22][localhost-startStop-1]: Done Profile Creation - caECUserCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Start Profile Creation - caUserSMIMEcapCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.NoDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectAltNameExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_type=null [09/Nov/2014:06:00:22][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_pattern=null [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.GenericExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:06:00:22][localhost-startStop-1]: Done Profile Creation - caUserSMIMEcapCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Start Profile Creation - caDualCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectAltNameExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_type=null [09/Nov/2014:06:00:22][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_pattern=null [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectAltNameExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_type=null [09/Nov/2014:06:00:22][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_pattern=null [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:06:00:22][localhost-startStop-1]: Done Profile Creation - caDualCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Start Profile Creation - caECDualCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectAltNameExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_type=null [09/Nov/2014:06:00:22][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_pattern=null [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectAltNameExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_type=null [09/Nov/2014:06:00:22][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_pattern=null [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:06:00:22][localhost-startStop-1]: Done Profile Creation - caECDualCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Start Profile Creation - AdminCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:06:00:22][localhost-startStop-1]: Done Profile Creation - AdminCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Start Profile Creation - caSignedLogCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:06:00:22][localhost-startStop-1]: Done Profile Creation - caSignedLogCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Start Profile Creation - caTPSCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:06:00:22][localhost-startStop-1]: Done Profile Creation - caTPSCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Start Profile Creation - caRARouterCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:06:00:22][localhost-startStop-1]: Done Profile Creation - caRARouterCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Start Profile Creation - caRouterCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:06:00:22][localhost-startStop-1]: Done Profile Creation - caRouterCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Start Profile Creation - caServerCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:06:00:22][localhost-startStop-1]: Done Profile Creation - caServerCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Start Profile Creation - caSubsystemCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:06:00:22][localhost-startStop-1]: Done Profile Creation - caSubsystemCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Start Profile Creation - caOtherCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:06:00:22][localhost-startStop-1]: Done Profile Creation - caOtherCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Start Profile Creation - caCACert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.CAValidityDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.BasicConstraintsExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:06:00:22][localhost-startStop-1]: Done Profile Creation - caCACert [09/Nov/2014:06:00:22][localhost-startStop-1]: Start Profile Creation - caCrossSignedCACert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.CAValidityDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.BasicConstraintsExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:06:00:22][localhost-startStop-1]: Done Profile Creation - caCrossSignedCACert [09/Nov/2014:06:00:22][localhost-startStop-1]: Start Profile Creation - caInstallCACert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.BasicConstraintsExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:06:00:22][localhost-startStop-1]: Done Profile Creation - caInstallCACert [09/Nov/2014:06:00:22][localhost-startStop-1]: Start Profile Creation - caRACert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:06:00:22][localhost-startStop-1]: Done Profile Creation - caRACert [09/Nov/2014:06:00:22][localhost-startStop-1]: Start Profile Creation - caOCSPCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.OCSPNoCheckExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:06:00:22][localhost-startStop-1]: Done Profile Creation - caOCSPCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Start Profile Creation - caStorageCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:06:00:22][localhost-startStop-1]: Done Profile Creation - caStorageCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Start Profile Creation - caTransportCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:06:00:22][localhost-startStop-1]: Done Profile Creation - caTransportCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Start Profile Creation - caDirPinUserCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthTokenSubjectNameDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.NoDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectAltNameExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_type=null [09/Nov/2014:06:00:22][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_pattern=null [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:06:00:22][localhost-startStop-1]: Done Profile Creation - caDirPinUserCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Start Profile Creation - caDirUserCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthTokenSubjectNameDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.NoDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectAltNameExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_type=null [09/Nov/2014:06:00:22][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_pattern=null [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:06:00:22][localhost-startStop-1]: Done Profile Creation - caDirUserCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Start Profile Creation - caECDirUserCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthTokenSubjectNameDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.NoDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectAltNameExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_type=null [09/Nov/2014:06:00:22][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_pattern=null [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:06:00:22][localhost-startStop-1]: Done Profile Creation - caECDirUserCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Start Profile Creation - caAgentServerCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:06:00:22][localhost-startStop-1]: Done Profile Creation - caAgentServerCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Start Profile Creation - caAgentFileSigning caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectNameDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:06:00:22][localhost-startStop-1]: Done Profile Creation - caAgentFileSigning [09/Nov/2014:06:00:22][localhost-startStop-1]: Start Profile Creation - caCMCUserCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:06:00:22][localhost-startStop-1]: Done Profile Creation - caCMCUserCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Start Profile Creation - caFullCMCUserCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:06:00:22][localhost-startStop-1]: Done Profile Creation - caFullCMCUserCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Start Profile Creation - caSimpleCMCUserCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:06:00:22][localhost-startStop-1]: Done Profile Creation - caSimpleCMCUserCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Start Profile Creation - caTokenDeviceKeyEnrollment caUserCertEnrollImpl com.netscape.cms.profile.common.UserCertCAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.UserCertCAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.nsTokenDeviceKeySubjectNameDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.BasicConstraintsExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:06:00:22][localhost-startStop-1]: Done Profile Creation - caTokenDeviceKeyEnrollment [09/Nov/2014:06:00:22][localhost-startStop-1]: Start Profile Creation - caTokenUserEncryptionKeyEnrollment caUserCertEnrollImpl com.netscape.cms.profile.common.UserCertCAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.UserCertCAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.nsTokenUserKeySubjectNameDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectAltNameExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_type=null [09/Nov/2014:06:00:22][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_pattern=null [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.BasicConstraintsExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:06:00:22][localhost-startStop-1]: Done Profile Creation - caTokenUserEncryptionKeyEnrollment [09/Nov/2014:06:00:22][localhost-startStop-1]: Start Profile Creation - caTokenUserSigningKeyEnrollment caUserCertEnrollImpl com.netscape.cms.profile.common.UserCertCAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.UserCertCAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.nsTokenUserKeySubjectNameDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectAltNameExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_type=null [09/Nov/2014:06:00:22][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_pattern=null [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.BasicConstraintsExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:06:00:22][localhost-startStop-1]: Done Profile Creation - caTokenUserSigningKeyEnrollment [09/Nov/2014:06:00:22][localhost-startStop-1]: Start Profile Creation - caTempTokenDeviceKeyEnrollment caUserCertEnrollImpl com.netscape.cms.profile.common.UserCertCAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.UserCertCAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.nsTokenDeviceKeySubjectNameDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.BasicConstraintsExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:06:00:22][localhost-startStop-1]: Done Profile Creation - caTempTokenDeviceKeyEnrollment [09/Nov/2014:06:00:22][localhost-startStop-1]: Start Profile Creation - caTempTokenUserEncryptionKeyEnrollment caUserCertEnrollImpl com.netscape.cms.profile.common.UserCertCAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.UserCertCAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.nsTokenUserKeySubjectNameDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectAltNameExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_type=null [09/Nov/2014:06:00:22][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_pattern=null [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.BasicConstraintsExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:06:00:22][localhost-startStop-1]: Done Profile Creation - caTempTokenUserEncryptionKeyEnrollment [09/Nov/2014:06:00:22][localhost-startStop-1]: Start Profile Creation - caTempTokenUserSigningKeyEnrollment caUserCertEnrollImpl com.netscape.cms.profile.common.UserCertCAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.UserCertCAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.nsTokenUserKeySubjectNameDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectAltNameExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_type=null [09/Nov/2014:06:00:22][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_pattern=null [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.BasicConstraintsExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:06:00:22][localhost-startStop-1]: Done Profile Creation - caTempTokenUserSigningKeyEnrollment [09/Nov/2014:06:00:22][localhost-startStop-1]: Start Profile Creation - caAdminCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:06:00:22][localhost-startStop-1]: Done Profile Creation - caAdminCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Start Profile Creation - caInternalAuthServerCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:06:00:22][localhost-startStop-1]: Done Profile Creation - caInternalAuthServerCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Start Profile Creation - caInternalAuthTransportCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:06:00:22][localhost-startStop-1]: Done Profile Creation - caInternalAuthTransportCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Start Profile Creation - caInternalAuthDRMstorageCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:06:00:22][localhost-startStop-1]: Done Profile Creation - caInternalAuthDRMstorageCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Start Profile Creation - caInternalAuthSubsystemCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:06:00:22][localhost-startStop-1]: Done Profile Creation - caInternalAuthSubsystemCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Start Profile Creation - caInternalAuthOCSPCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.OCSPNoCheckExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:06:00:22][localhost-startStop-1]: Done Profile Creation - caInternalAuthOCSPCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Start Profile Creation - caInternalAuthAuditSigningCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:06:00:22][localhost-startStop-1]: Done Profile Creation - caInternalAuthAuditSigningCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Start Profile Creation - DomainController caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.nsTokenUserKeySubjectNameDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectAltNameExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_type=null [09/Nov/2014:06:00:22][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_pattern=null [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.BasicConstraintsExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.GenericExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.CRLDistributionPointsExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:06:00:22][localhost-startStop-1]: Done Profile Creation - DomainController [09/Nov/2014:06:00:22][localhost-startStop-1]: Start Profile Creation - caDualRAuserCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectAltNameExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_type=null [09/Nov/2014:06:00:22][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_pattern=null [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:06:00:22][localhost-startStop-1]: Done Profile Creation - caDualRAuserCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Start Profile Creation - caRAagentCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectAltNameExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_type=null [09/Nov/2014:06:00:22][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_pattern=null [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:06:00:22][localhost-startStop-1]: Done Profile Creation - caRAagentCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Start Profile Creation - caRAserverCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:06:00:22][localhost-startStop-1]: Done Profile Creation - caRAserverCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Start Profile Creation - caUUIDdeviceCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectAltNameExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_type=null [09/Nov/2014:06:00:22][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_pattern=null [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:06:00:22][localhost-startStop-1]: Done Profile Creation - caUUIDdeviceCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Start Profile Creation - caSSLClientSelfRenewal caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:06:00:22][localhost-startStop-1]: Done Profile Creation - caSSLClientSelfRenewal [09/Nov/2014:06:00:22][localhost-startStop-1]: Start Profile Creation - caDirUserRenewal caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:06:00:22][localhost-startStop-1]: Done Profile Creation - caDirUserRenewal [09/Nov/2014:06:00:22][localhost-startStop-1]: Start Profile Creation - caManualRenewal caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:06:00:22][localhost-startStop-1]: Done Profile Creation - caManualRenewal [09/Nov/2014:06:00:22][localhost-startStop-1]: Start Profile Creation - caTokenMSLoginEnrollment caUserCertEnrollImpl com.netscape.cms.profile.common.UserCertCAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.UserCertCAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.nsTokenUserKeySubjectNameDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectAltNameExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_type=null [09/Nov/2014:06:00:22][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_pattern=null [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.BasicConstraintsExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.CRLDistributionPointsExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:06:00:22][localhost-startStop-1]: Done Profile Creation - caTokenMSLoginEnrollment [09/Nov/2014:06:00:22][localhost-startStop-1]: Start Profile Creation - caTokenUserSigningKeyRenewal caUserCertEnrollImpl com.netscape.cms.profile.common.UserCertCAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.UserCertCAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:06:00:22][localhost-startStop-1]: Done Profile Creation - caTokenUserSigningKeyRenewal [09/Nov/2014:06:00:22][localhost-startStop-1]: Start Profile Creation - caTokenUserEncryptionKeyRenewal caUserCertEnrollImpl com.netscape.cms.profile.common.UserCertCAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.UserCertCAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:06:00:22][localhost-startStop-1]: Done Profile Creation - caTokenUserEncryptionKeyRenewal [09/Nov/2014:06:00:22][localhost-startStop-1]: Start Profile Creation - caTokenUserAuthKeyRenewal caUserCertEnrollImpl com.netscape.cms.profile.common.UserCertCAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.UserCertCAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:06:00:22][localhost-startStop-1]: Done Profile Creation - caTokenUserAuthKeyRenewal [09/Nov/2014:06:00:22][localhost-startStop-1]: Start Profile Creation - caJarSigningCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.NSCertTypeExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:06:00:22][localhost-startStop-1]: Done Profile Creation - caJarSigningCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Start Profile Creation - caIPAserviceCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectNameDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:06:00:22][localhost-startStop-1]: Done Profile Creation - caIPAserviceCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Start Profile Creation - caEncUserCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectAltNameExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_type=null [09/Nov/2014:06:00:22][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_pattern=null [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:06:00:22][localhost-startStop-1]: Done Profile Creation - caEncUserCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Start Profile Creation - caEncECUserCert caEnrollImpl com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.CAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserKeyDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: KeyConstraint.init ecNames: nistp256,nistp384,nistp521,sect163k1,nistk163,sect163r1,sect163r2,nistb163,sect193r1,sect193r2,sect233k1,nistk233,sect233r1,nistb233,sect239k1,sect283k1,nistk283,sect283r1,nistb283,sect409k1,nistk409,sect409r1,nistb409,sect571k1,nistk571,sect571r1,nistb571,secp160k1,secp160r1,secp160r2,secp192k1,secp192r1,nistp192,secp224k1,secp224r1,nistp224,secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,c2pnb163v1,c2pnb163v2,c2pnb163v3,c2pnb176v1,c2tnb191v1,c2tnb191v2,c2tnb191v3,c2pnb208w1,c2tnb239v1,c2tnb239v2,c2tnb239v3,c2pnb272w1,c2pnb304w1,c2tnb359w1,c2pnb368w1,c2tnb431r1,secp112r1,secp112r2,secp128r1,secp128r2,sect113r1,sect113r2,sect131r1,sect131r2 [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthInfoAccessExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ExtendedKeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectAltNameExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_type=null [09/Nov/2014:06:00:22][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_pattern=null [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:06:00:22][localhost-startStop-1]: Done Profile Creation - caEncECUserCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Start Profile Creation - caTokenUserDelegateAuthKeyEnrollment caUserCertEnrollImpl com.netscape.cms.profile.common.UserCertCAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.UserCertCAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectAltNameExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_type=null [09/Nov/2014:06:00:22][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_pattern=null [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.BasicConstraintsExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:06:00:22][localhost-startStop-1]: Done Profile Creation - caTokenUserDelegateAuthKeyEnrollment [09/Nov/2014:06:00:22][localhost-startStop-1]: Start Profile Creation - caTokenUserDelegateSigningKeyEnrollment caUserCertEnrollImpl com.netscape.cms.profile.common.UserCertCAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: ProfileSubsystem: initing com.netscape.cms.profile.common.UserCertCAEnrollProfile [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: start init [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.ValidityDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SigningAlgDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.KeyUsageExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.UserSubjectNameDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectAltNameExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_type=null [09/Nov/2014:06:00:22][localhost-startStop-1]: SubjectAltNameExtDefault: Upgrading old_pattern=null [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.SubjectKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.AuthorityKeyIdentifierExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: loading default class com.netscape.cms.profile.def.BasicConstraintsExtDefault [09/Nov/2014:06:00:22][localhost-startStop-1]: BasicProfile: done init [09/Nov/2014:06:00:22][localhost-startStop-1]: Done Profile Creation - caTokenUserDelegateSigningKeyEnrollment [09/Nov/2014:06:00:22][localhost-startStop-1]: Registered Confirmation - caUserCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Registered Confirmation - caECUserCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Registered Confirmation - caUserSMIMEcapCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Registered Confirmation - caDualCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Registered Confirmation - caECDualCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Registered Confirmation - AdminCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Registered Confirmation - caSignedLogCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Registered Confirmation - caTPSCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Registered Confirmation - caRARouterCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Registered Confirmation - caRouterCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Registered Confirmation - caServerCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Registered Confirmation - caSubsystemCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Registered Confirmation - caOtherCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Registered Confirmation - caCACert [09/Nov/2014:06:00:22][localhost-startStop-1]: Registered Confirmation - caCrossSignedCACert [09/Nov/2014:06:00:22][localhost-startStop-1]: Registered Confirmation - caInstallCACert [09/Nov/2014:06:00:22][localhost-startStop-1]: Registered Confirmation - caRACert [09/Nov/2014:06:00:22][localhost-startStop-1]: Registered Confirmation - caOCSPCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Registered Confirmation - caStorageCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Registered Confirmation - caTransportCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Registered Confirmation - caDirPinUserCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Registered Confirmation - caDirUserCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Registered Confirmation - caECDirUserCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Registered Confirmation - caAgentServerCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Registered Confirmation - caAgentFileSigning [09/Nov/2014:06:00:22][localhost-startStop-1]: Registered Confirmation - caCMCUserCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Registered Confirmation - caFullCMCUserCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Registered Confirmation - caSimpleCMCUserCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Registered Confirmation - caTokenDeviceKeyEnrollment [09/Nov/2014:06:00:22][localhost-startStop-1]: Registered Confirmation - caTokenUserEncryptionKeyEnrollment [09/Nov/2014:06:00:22][localhost-startStop-1]: Registered Confirmation - caTokenUserSigningKeyEnrollment [09/Nov/2014:06:00:22][localhost-startStop-1]: Registered Confirmation - caTempTokenDeviceKeyEnrollment [09/Nov/2014:06:00:22][localhost-startStop-1]: Registered Confirmation - caTempTokenUserEncryptionKeyEnrollment [09/Nov/2014:06:00:22][localhost-startStop-1]: Registered Confirmation - caTempTokenUserSigningKeyEnrollment [09/Nov/2014:06:00:22][localhost-startStop-1]: Registered Confirmation - caAdminCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Registered Confirmation - caInternalAuthServerCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Registered Confirmation - caInternalAuthTransportCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Registered Confirmation - caInternalAuthDRMstorageCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Registered Confirmation - caInternalAuthSubsystemCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Registered Confirmation - caInternalAuthOCSPCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Registered Confirmation - caInternalAuthAuditSigningCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Registered Confirmation - DomainController [09/Nov/2014:06:00:22][localhost-startStop-1]: Registered Confirmation - caDualRAuserCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Registered Confirmation - caRAagentCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Registered Confirmation - caRAserverCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Registered Confirmation - caUUIDdeviceCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Registered Confirmation - caSSLClientSelfRenewal [09/Nov/2014:06:00:22][localhost-startStop-1]: Registered Confirmation - caDirUserRenewal [09/Nov/2014:06:00:22][localhost-startStop-1]: Registered Confirmation - caManualRenewal [09/Nov/2014:06:00:22][localhost-startStop-1]: Registered Confirmation - caTokenMSLoginEnrollment [09/Nov/2014:06:00:22][localhost-startStop-1]: Registered Confirmation - caTokenUserSigningKeyRenewal [09/Nov/2014:06:00:22][localhost-startStop-1]: Registered Confirmation - caTokenUserEncryptionKeyRenewal [09/Nov/2014:06:00:22][localhost-startStop-1]: Registered Confirmation - caTokenUserAuthKeyRenewal [09/Nov/2014:06:00:22][localhost-startStop-1]: Registered Confirmation - caJarSigningCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Registered Confirmation - caIPAserviceCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Registered Confirmation - caEncUserCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Registered Confirmation - caEncECUserCert [09/Nov/2014:06:00:22][localhost-startStop-1]: Registered Confirmation - caTokenUserDelegateAuthKeyEnrollment [09/Nov/2014:06:00:22][localhost-startStop-1]: Registered Confirmation - caTokenUserDelegateSigningKeyEnrollment [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: done init id=profile [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: initialized profile [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: initSubsystem id=selftests [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: ready to init id=selftests [09/Nov/2014:06:00:22][localhost-startStop-1]: SelfTestSubsystem::init(): ENTERING . . . [09/Nov/2014:06:00:22][localhost-startStop-1]: SelfTestSubsystem::init(): loading self test logger parameters [09/Nov/2014:06:00:22][localhost-startStop-1]: SelfTestSubsystem::init(): loading self test plugins [09/Nov/2014:06:00:22][localhost-startStop-1]: SelfTestSubsystem::init(): loading self test plugin parameters [09/Nov/2014:06:00:22][localhost-startStop-1]: SelfTestSubsystem::init(): loading on demand self tests [09/Nov/2014:06:00:22][localhost-startStop-1]: SelfTestSubsystem::init(): loading startup self tests [09/Nov/2014:06:00:22][localhost-startStop-1]: SelfTestSubsystem::init(): EXITING. [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: done init id=selftests [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: initialized selftests [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: initSubsystem id=CrossCertPair [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: ready to init id=CrossCertPair [09/Nov/2014:06:00:22][localhost-startStop-1]: LdapBoundConnFactory: init [09/Nov/2014:06:00:22][localhost-startStop-1]: LdapBoundConnFactory:doCloning true [09/Nov/2014:06:00:22][localhost-startStop-1]: LdapAuthInfo: init() [09/Nov/2014:06:00:22][localhost-startStop-1]: LdapAuthInfo: init begins [09/Nov/2014:06:00:22][localhost-startStop-1]: LdapAuthInfo: init: prompt is Internal LDAP Database [09/Nov/2014:06:00:22][localhost-startStop-1]: LdapAuthInfo: init: try getting from memory cache [09/Nov/2014:06:00:22][localhost-startStop-1]: LdapAuthInfo: init: got password from memory [09/Nov/2014:06:00:22][localhost-startStop-1]: LdapAuthInfo: init: password found for prompt. [09/Nov/2014:06:00:22][localhost-startStop-1]: LdapAuthInfo: password ok: store in memory cache [09/Nov/2014:06:00:22][localhost-startStop-1]: LdapAuthInfo: init ends [09/Nov/2014:06:00:22][localhost-startStop-1]: init: before makeConnection errorIfDown is false [09/Nov/2014:06:00:22][localhost-startStop-1]: makeConnection: errorIfDown false [09/Nov/2014:06:00:22][localhost-startStop-1]: Established LDAP connection using basic authentication to host localhost.localdomain port 389 as cn=Directory Manager [09/Nov/2014:06:00:22][localhost-startStop-1]: initializing with mininum 3 and maximum 15 connections to host localhost.localdomain port 389, secure connection, false, authentication type 1 [09/Nov/2014:06:00:22][localhost-startStop-1]: increasing minimum connections by 3 [09/Nov/2014:06:00:22][localhost-startStop-1]: new total available connections 3 [09/Nov/2014:06:00:22][localhost-startStop-1]: new number of connections 3 [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: done init id=CrossCertPair [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: initialized CrossCertPair [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: initSubsystem id=stats [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: ready to init id=stats [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: done init id=stats [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: initialized stats [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: initSubsystem id=auths [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: ready to init id=auths [09/Nov/2014:06:00:22][localhost-startStop-1]: init: before makeConnection errorIfDown is false [09/Nov/2014:06:00:22][localhost-startStop-1]: makeConnection: errorIfDown false [09/Nov/2014:06:00:22][localhost-startStop-1]: Established LDAP connection using basic authentication to host localhost.localdomain port 389 as cn=Directory Manager [09/Nov/2014:06:00:22][localhost-startStop-1]: initializing with mininum 3 and maximum 20 connections to host localhost.localdomain port 389, secure connection, false, authentication type 1 [09/Nov/2014:06:00:22][localhost-startStop-1]: increasing minimum connections by 3 [09/Nov/2014:06:00:22][localhost-startStop-1]: new total available connections 3 [09/Nov/2014:06:00:22][localhost-startStop-1]: new number of connections 3 [09/Nov/2014:06:00:22][localhost-startStop-1]: increasing minimum number of connections by 3 [09/Nov/2014:06:00:22][localhost-startStop-1]: new total number of connections 3 [09/Nov/2014:06:00:22][localhost-startStop-1]: new total available connections 3 [09/Nov/2014:06:00:22][localhost-startStop-1]: FlatFileAuth: Splitting String: UID on commas [09/Nov/2014:06:00:22][localhost-startStop-1]: FlatFileAuth: countTokens:1 [09/Nov/2014:06:00:22][localhost-startStop-1]: FlatFileAuth: token 0 = UID [09/Nov/2014:06:00:22][localhost-startStop-1]: FlatFileAuth: Splitting String: PWD on commas [09/Nov/2014:06:00:22][localhost-startStop-1]: FlatFileAuth: countTokens:1 [09/Nov/2014:06:00:22][localhost-startStop-1]: FlatFileAuth: token 0 = PWD [09/Nov/2014:06:00:22][localhost-startStop-1]: FlatFileAuth: unionOfStrings: 0,0 = UID [09/Nov/2014:06:00:22][localhost-startStop-1]: FlatFileAuth: unionOfStrings: 1,0 = PWD [09/Nov/2014:06:00:22][localhost-startStop-1]: FlatFileAuth: mFilename = /var/lib/pki/pki-tomcat/conf/ca/flatfile.txt [09/Nov/2014:06:00:22][localhost-startStop-1]: FlatFileAuth: mKeyAttributes = UID [09/Nov/2014:06:00:22][localhost-startStop-1]: FlatFileAuth: mAuthAttrs = PWD [09/Nov/2014:06:00:22][localhost-startStop-1]: FlatFileAuth: stringArrays[0][0] = UID [09/Nov/2014:06:00:22][localhost-startStop-1]: FlatFileAuth: stringArrays[1][0] = PWD [09/Nov/2014:06:00:22][localhost-startStop-1]: FlatFileAuth: Read entries from password file - /var/lib/pki/pki-tomcat/conf/ca/flatfile.txt [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: done init id=auths [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: initialized auths [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: initSubsystem id=authz [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: ready to init id=authz [09/Nov/2014:06:00:22][localhost-startStop-1]: Found authz manager plugin BasicAclAuthz [09/Nov/2014:06:00:22][localhost-startStop-1]: AAclAuthz: init begins [09/Nov/2014:06:00:22][localhost-startStop-1]: GroupAccessEvaluator: init [09/Nov/2014:06:00:22][localhost-startStop-1]: UserAccessEvaluator: init [09/Nov/2014:06:00:22][localhost-startStop-1]: UserOrigReqAccessEvaluator: init [09/Nov/2014:06:00:22][localhost-startStop-1]: Found authz manager plugin DirAclAuthz [09/Nov/2014:06:00:22][localhost-startStop-1]: AAclAuthz: init begins [09/Nov/2014:06:00:22][localhost-startStop-1]: GroupAccessEvaluator: init [09/Nov/2014:06:00:22][localhost-startStop-1]: UserAccessEvaluator: init [09/Nov/2014:06:00:22][localhost-startStop-1]: UserOrigReqAccessEvaluator: init [09/Nov/2014:06:00:22][localhost-startStop-1]: LdapBoundConnFactory: init [09/Nov/2014:06:00:22][localhost-startStop-1]: LdapBoundConnFactory:doCloning true [09/Nov/2014:06:00:22][localhost-startStop-1]: LdapAuthInfo: init() [09/Nov/2014:06:00:22][localhost-startStop-1]: LdapAuthInfo: init begins [09/Nov/2014:06:00:22][localhost-startStop-1]: LdapAuthInfo: init: prompt is Internal LDAP Database [09/Nov/2014:06:00:22][localhost-startStop-1]: LdapAuthInfo: init: try getting from memory cache [09/Nov/2014:06:00:22][localhost-startStop-1]: LdapAuthInfo: init: got password from memory [09/Nov/2014:06:00:22][localhost-startStop-1]: LdapAuthInfo: init: password found for prompt. [09/Nov/2014:06:00:22][localhost-startStop-1]: LdapAuthInfo: password ok: store in memory cache [09/Nov/2014:06:00:22][localhost-startStop-1]: LdapAuthInfo: init ends [09/Nov/2014:06:00:22][localhost-startStop-1]: init: before makeConnection errorIfDown is false [09/Nov/2014:06:00:22][localhost-startStop-1]: makeConnection: errorIfDown false [09/Nov/2014:06:00:22][localhost-startStop-1]: Established LDAP connection using basic authentication to host localhost.localdomain port 389 as cn=Directory Manager [09/Nov/2014:06:00:22][localhost-startStop-1]: initializing with mininum 3 and maximum 15 connections to host localhost.localdomain port 389, secure connection, false, authentication type 1 [09/Nov/2014:06:00:22][localhost-startStop-1]: increasing minimum connections by 3 [09/Nov/2014:06:00:22][localhost-startStop-1]: new total available connections 3 [09/Nov/2014:06:00:22][localhost-startStop-1]: new number of connections 3 [09/Nov/2014:06:00:22][localhost-startStop-1]: DirAclAuthz: about to ldap search aclResources [09/Nov/2014:06:00:22][localhost-startStop-1]: In LdapBoundConnFactory::getConn() [09/Nov/2014:06:00:22][localhost-startStop-1]: masterConn is connected: true [09/Nov/2014:06:00:22][localhost-startStop-1]: getConn: conn is connected true [09/Nov/2014:06:00:22][localhost-startStop-1]: getConn: mNumConns now 2 [09/Nov/2014:06:00:22][localhost-startStop-1]: returnConn: mNumConns now 3 [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: done init id=authz [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: initialized authz [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: initSubsystem id=jobsScheduler [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: ready to init id=jobsScheduler [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: done init id=jobsScheduler [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: initialized jobsScheduler [09/Nov/2014:06:00:22][localhost-startStop-1]: Java version=1.7.0_71 [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: Java Security Provider 0 class=Mozilla-JSS version 4.2.6 [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: Java Security Provider 1 class=SUN version 1.7 [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: Java Security Provider 2 class=SunRsaSign version 1.7 [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: Java Security Provider 3 class=SunJSSE version 1.7 [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: Java Security Provider 4 class=SunJCE version 1.7 [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: Java Security Provider 5 class=SunJGSS version 1.7 [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: Java Security Provider 6 class=SunSASL version 1.7 [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: Java Security Provider 7 class=XMLDSig version 1.0 [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: Java Security Provider 8 class=SunPCSC version 1.7 [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: Java Security Provider 9 class=CMS version 1.0 [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: debug startup start [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: debug startup done [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: log startup start [09/Nov/2014:06:00:22][localhost-startStop-1]: entering LogSubsystem.startup() [09/Nov/2014:06:00:22][localhost-startStop-1]: about to call inst=Transactions in LogSubsystem.startup() [09/Nov/2014:06:00:22][localhost-startStop-1]: LogFile: entering LogFile.startup() [09/Nov/2014:06:00:22][localhost-startStop-1]: about to call inst=SignedAudit in LogSubsystem.startup() [09/Nov/2014:06:00:22][localhost-startStop-1]: LogFile: entering LogFile.startup() [09/Nov/2014:06:00:22][localhost-startStop-1]: about to call inst=System in LogSubsystem.startup() [09/Nov/2014:06:00:22][localhost-startStop-1]: LogFile: entering LogFile.startup() [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: log startup done [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: jss startup start [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: jss startup done [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: dbs startup start [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: dbs startup done [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: usrgrp startup start [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: usrgrp startup done [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: registry startup start [09/Nov/2014:06:00:22][localhost-startStop-1]: RegistrySubsystem: startup [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: registry startup done [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: oidmap startup start [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: oidmap startup done [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: X500Name startup start [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: X500Name startup done [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: request startup start [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: request startup done [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: ca startup start [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: ca startup done [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: profile startup start [09/Nov/2014:06:00:22][localhost-startStop-1]: ProfileSubsystem: startup [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: profile startup done [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: selftests startup start [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: selftests startup done [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: CrossCertPair startup start [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: CrossCertPair startup done [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: stats startup start [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: stats startup done [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: auths startup start [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: auths startup done [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: authz startup start [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: authz startup done [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: jobsScheduler startup start [09/Nov/2014:06:00:22][localhost-startStop-1]: CMSEngine: jobsScheduler startup done [09/Nov/2014:06:03:41][http-bio-9443-exec-1]: according to ccMode, authorization for servlet: caGetStatus is LDAP based, not XML {1}, use default authz mgr: {2}. [09/Nov/2014:06:03:41][http-bio-9443-exec-1]: CMSServlet:service() uri = /ca/admin/ca/getStatus [09/Nov/2014:06:03:41][http-bio-9443-exec-1]: CMSServlet: caGetStatus start to service. [09/Nov/2014:06:03:41][http-bio-9443-exec-1]: CMSServlet: curDate=Sun Nov 09 06:03:41 IST 2014 id=caGetStatus time=46 [09/Nov/2014:06:03:43][http-bio-9443-exec-3]: AuthMethodInterceptor: SystemConfigResource.configure() [09/Nov/2014:06:03:43][http-bio-9443-exec-3]: AuthMethodInterceptor: mapping: default [09/Nov/2014:06:03:43][http-bio-9443-exec-3]: AuthMethodInterceptor: loading /usr/share/pki/ca/conf/auth-method.properties [09/Nov/2014:06:03:43][http-bio-9443-exec-3]: AuthMethodInterceptor: checking /var/lib/pki/pki-tomcat/ca/conf/auth-method.properties [09/Nov/2014:06:03:43][http-bio-9443-exec-3]: AuthMethodInterceptor: required auth methods: [*] [09/Nov/2014:06:03:43][http-bio-9443-exec-3]: AuthMethodInterceptor: anonymous access allowed [09/Nov/2014:06:03:43][http-bio-9443-exec-3]: ACLInterceptor: SystemConfigResource.configure() [09/Nov/2014:06:03:43][http-bio-9443-exec-3]: ACLInterceptor: No ACL mapping. [09/Nov/2014:06:03:43][http-bio-9443-exec-3]: MessageFormatInterceptor: SystemConfigResource.configure() [09/Nov/2014:06:03:43][http-bio-9443-exec-3]: MessageFormatInterceptor: content-type: application/json [09/Nov/2014:06:03:43][http-bio-9443-exec-3]: MessageFormatInterceptor: accept: [application/json] [09/Nov/2014:06:03:43][http-bio-9443-exec-3]: MessageFormatInterceptor: request format: application/json [09/Nov/2014:06:03:43][http-bio-9443-exec-3]: MessageFormatInterceptor: response format: application/json [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: SystemConfigService(): configure() called [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: ConfigurationRequest [pin=XXXX, token=Internal Key Storage Token, tokenPassword=XXXX, securityDomainType=newdomain, securityDomainUri=null, securityDomainName=cisco.com Security Domain, securityDomainUser=null, securityDomainPassword=XXXX, isClone=false, cloneUri=null, subsystemName=CA cibu-sec88.cisco.com 9443, p12File=null, p12Password=XXXX, hierarchy=join, dsHost=localhost.localdomain, dsPort=389, baseDN=o=pki-tomcat-CA, bindDN=cn=Directory Manager, bindpwd=XXXX, database=pki-tomcat-CA, secureConn=false, removeData=true, replicateSchema=null, masterReplicationPort=null, cloneReplicationPort=null, replicationSecurity=null, systemCerts=[com.netscape.certsrv.system.SystemCertData at 4f537364, com.netscape.certsrv.system.SystemCertData at 6fbcd2eb, com.netscape.certsrv.system.SystemCertData at 55bb7b9c, com.netscape.certsrv.system.SystemCertData at 7b06abd, com.netscape.certsrv.system.SystemCertData at 4f2fa23c], issuingCA=External CA, backupKeys=false, backupPassword=XXXX, backupFile=null, adminUID=caadmin, adminPassword=XXXX, adminEmail=caadmin at cisco.com, adminCertRequest=MIIChTCCAW0CAQAwQDEiMCAGA1UEChMZY2lzY28uY29tIFNlY3VyaXR5IERvbWFp bjEaMBgGA1UEAxMRUEtJIEFkbWluaXN0cmF0b3IwggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDbQL2fF3pU3HRvJlweDeS2MtdhAoTc0AMs+fJIMnT/l66x 4GnIWgs+LKtZetpousEL0xz5simd6XXvzdGOCdoaHPYDBYSgj29ENRCj5J7yunC7 D8mvxEskmBaIeNVXXBDNfpIwO/KpL7FhnqDQbryNKvVXuQNQWr/02pDAIq8tdxoM rbAFomzLrwJtevbJtKkvMaX2/p0ez9mwBVch6fzsVxenHjawuVpP2dBlo/nyTS65 WMU+YMoMd9FK3tucRYfO9lBHR5T+xyLEYdQOBILcgOU8bHzHhfCpmxQYQLpE+rUe PEcMNgE1YqUmwbflMPKit34Pk+OpLRgK+Vjw3bhrAgMBAAGgADANBgkqhkiG9w0B AQsFAAOCAQEAOu2TikpeJmNW85Orwkl4hbwZZum3Ku3VbHsEionF6Sd+CD/kGt1M m341SidxRszrG88U976kgqQu1Ygf3WP/QJMW1oAAii7wQhNb2uqJeb8UGmc6t0qG Ya6MNSv+XdWWRybirF06d9hrF1r7xIMa6cxmaxQsxG0OGNAecmH1sgI8fh9bk8Ba fhRGVhzP7mdhRttc0moeMdsXdtyAbmonkexul4tqdruECtIWRui2KGdd3wKWKvm8 B0p2BFPMkA97VOxXER6snOUrTf6f0mKLZMywPnz1ogOvH3OXAXP9SiIAPuO+q7Tm cJGxXmiP1Zsu4z8tBR3Kdqgk+4KLwspaHA== , adminCertRequestType=pkcs10, adminSubjectDN=cn=PKI Administrator,o=cisco.com Security Domain, adminName=caadmin, adminProfileID=caAdminCert, adminCert=null, importAdminCert=false, generateServerCert=true, standAlone=false, stepTwo=true, authdbBaseDN=null, authdbHost=null, authdbPort=null, authdbSecureConn=null, caUri=null, kraUri=null, tksUri=null, enableServerSideKeyGen=null, importSharedSecret=null, generateSubsystemCert=true, sharedDB=false, sharedDBUserDN=null, createNewDB=true, setupReplication=null, subordinateSecurityDomainNamenull] [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: === Token Panel === [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: === Security Domain Panel === [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: Creating new security domain [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: === Subsystem Panel === [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: === Hierarchy Panel === [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: === Database Panel === [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: external CA selected [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: Found data for 'signing' [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: SystemConfigService:processCerts: adding request extension to config [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: configure(): step two selected. keys will not be generated for 'signing' [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: Step 2: certStr for 'signing' is ...paste certificate here... [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: ConfigurationUtils: handleCertRequest() begins [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: handleCertRequest: tag=signing [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: privKeyID=-442be13dfe85465b0ce1aa2e3b6a2517bea27c4a [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: handleCertRequest: certTag is siging -- about to call createBasicCAExtensions() [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: ConfigurationUtils: createBasicCAExtensions: begins [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: ConfigurationUtils: createBasicCAExtensions: processing generic extension [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: ConfigurationUtils: createBasicCAExtensions: generic extension added: 1.3.6.1.4.1.311.20.2 [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: handleCertRequest: created cert request [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: Found data for 'ocsp_signing' [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: configure(): step two selected. keys will not be generated for 'ocsp_signing' [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: Step 2: certStr for 'ocsp_signing' is ...certificate be generated internally... [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: ConfigurationUtils: handleCertRequest() begins [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: handleCertRequest: tag=ocsp_signing [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: privKeyID=-49ab67c59ccb982f243b4d09668f695e73d90216 [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: handleCertRequest: created cert request [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: Found data for 'sslserver' [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: configure(): step two selected. keys will not be generated for 'sslserver' [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: Step 2: certStr for 'sslserver' is ...certificate be generated internally... [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: ConfigurationUtils: handleCertRequest() begins [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: handleCertRequest: tag=sslserver [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: privKeyID=-53dd59f03c82cfa2d5f7586e66b164156b4319a9 [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: handleCertRequest: created cert request [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: Found data for 'subsystem' [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: configure(): step two selected. keys will not be generated for 'subsystem' [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: Step 2: certStr for 'subsystem' is ...certificate be generated internally... [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: ConfigurationUtils: handleCertRequest() begins [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: handleCertRequest: tag=subsystem [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: privKeyID=22c5cf6ee0b08242d39b237897226214b0111688 [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: handleCertRequest: created cert request [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: Found data for 'audit_signing' [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: configure(): step two selected. keys will not be generated for 'audit_signing' [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: Step 2: certStr for 'audit_signing' is ...certificate be generated internally... [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: ConfigurationUtils: handleCertRequest() begins [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: handleCertRequest: tag=audit_signing [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: privKeyID=-726505a79f2b2c173715f02e870e6757ceec052d [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: handleCertRequest: created cert request [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: Processing 'signing' certificate: [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: handleCerts(): for cert tag 'signing' using cert type 'remote' [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: handleCerts(): process remote...import cert [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: handleCerts(): certchains length=1 [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: handlecerts: cert might not have contained chain...calling importCertificateChain: -----BEGIN PKCS7----- MIIIOQYJKoZIhvcNAQcCoIIIKjCCCCYCAQExADALBgkqhkiG9w0BBwGggggMMIIE gDCCA2igAwIBAgIJAJouQmjO2oyIMA0GCSqGSIb3DQEBBQUAMIGHMSowKAYDVQQD EyFLcml0ZWUgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkxCzAJBgNVBAgTAktB MQswCQYDVQQGEwJJTjEgMB4GCSqGSIb3DQEJARYRa2poYXdhckBjaXNjby5jb20x DjAMBgNVBAoTBUNpc2NvMQ0wCwYDVQQLEwRDSUJVMB4XDTE0MTEwMTA4MTkyNloX DTI0MTAyOTA4MTkyNlowgYcxKjAoBgNVBAMTIUtyaXRlZSBSb290IENlcnRpZmlj YXRlIEF1dGhvcml0eTELMAkGA1UECBMCS0ExCzAJBgNVBAYTAklOMSAwHgYJKoZI hvcNAQkBFhFramhhd2FyQGNpc2NvLmNvbTEOMAwGA1UEChMFQ2lzY28xDTALBgNV BAsTBENJQlUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC/G9Tyfppj O3DShmw2TPc17XGs3iiKNgIFxO2IoaCZqsa5bCAO0dDEhm94Eul6o8M/Odz12PbT r4Nv8np7EldNVdCZc1Qxbu/BXvZgGjxtZoqeeEkb2xVYSqA3KxLNrAJv9D3CEfY7 2ohvK5fo3RykRsXmGRO5LpAQLgnB5cLyLp3KPA7XI3qJSELTkX2hlLVRdE/Xzx6R gSEa4axZyn5byxkt2ob6TuBxiZ8d4Q7A5KqGg9VNkg6349tRtjk6EWHRktd7T5Ph 7/tmuvY7UZCSBPs1siGGc1v35ncxiCvt4NvWdu8eaL+pJpeqfjpzVCBGLxWrlwdK koaFl2KLvs7zAgMBAAGjgewwgekwgaYGA1UdIwSBnjCBm6GBjaSBijCBhzEqMCgG A1UEAxMhS3JpdGVlIFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5MQswCQYDVQQI EwJLQTELMAkGA1UEBhMCSU4xIDAeBgkqhkiG9w0BCQEWEWtqaGF3YXJAY2lzY28u Y29tMQ4wDAYDVQQKEwVDaXNjbzENMAsGA1UECxMEQ0lCVYIJAJouQmjO2oyIMA8G A1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgHGMB0GA1UdDgQWBBQ6tZte1Dxy OlUA93sPQJXbvS8TYzANBgkqhkiG9w0BAQUFAAOCAQEAS3GMkk80kyNGdeLY0ezZ 1RXTDpDUvxcr82ktaMyOaYh+tjAEJ4ZyYYrz/p4um02uBglDkmPY3m1FA6hD0+v4 zkiXIBqifSd9H6LEWTbrMTlXij+PzY2BREPQq94cxowavQHoeUBGIWYvaU2S9nfc vS/b46o8AkiPi/6l4ogZmxoiaW6naJ/Qo2EkoJeQ8H46EPM8lhCp0sGRQZ05ogUh gbZuCu6KFXq8tJMhlc9ygI0ACXJ0ee8jIZwJTPytODEL+xpmWDIDvX7zCJdlFE0J xiVtHChPqppJ029txMQDBwds+paY0eNuKyJxPdOh3bSZCj66oQrwluMOF+00c92u MDCCA4QwggJsoAMCAQICARowDQYJKoZIhvcNAQEFBQAwgYcxKjAoBgNVBAMTIUty aXRlZSBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eTELMAkGA1UECBMCS0ExCzAJ BgNVBAYTAklOMSAwHgYJKoZIhvcNAQkBFhFramhhd2FyQGNpc2NvLmNvbTEOMAwG A1UEChMFQ2lzY28xDTALBgNVBAsTBENJQlUwHhcNMTQxMTA5MTIzMTA5WhcNMTkx MTA4MTIzMTA5WjBDMRowGAYDVQQDDBFyb290REczLmNpc2NvLmNvbTEWMBQGA1UE CgwNQ2lzY28gU3lzdGVtczENMAsGA1UECwwEQ0lCVTCCASIwDQYJKoZIhvcNAQEB BQADggEPADCCAQoCggEBAJ/18dYs6Np2tY7xYCgOurUr36vd/zuNuXJYKVIqxAUf U8rEXD8VGGaN/333PMLuCG2f4kXFDXPiK+Q2JK8X1Yn8haoYv+PI4TGLg3sURh8O tQ7lXVLrN98cACS9LMFvYgVtqlhNcOXk0V6Y8zgYf6v3iAcoDMGFzt/kSQgQpu6o 4nFd8Pt6mjOe4Xeedc44td8wE6+CPLroZgOJdx0GU5uNX6qZnUrrapZ46NUKel77 Lm6RgB0FksbyC5wbAUG3iE1gNiijrzgshXWP1VdbZHbUGucfEu6Jg98L8WsLzmRx DkJ8XZMrMkYB+kGFMF4jRjZ5xoQ2qvLdQn9Us5GriPECAwEAAaM+MDwwDwYDVR0T AQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAcYwGQYJKwYBBAGCNxQCBAweCgBTAHUA YgBDAEEwDQYJKoZIhvcNAQEFBQADggEBAKaZzelXGHYFt7fpbRZVo9LQjipkuM2P wS/FHajckA0J7JQ7VDPZ9pHOFU0wlAjxDsTB0s5279azAXdJhNTAwLwYSnExpWkg hmvrvduLYbLVnO5zDM0jbbtWZ9YbUU4DEXIePfjK2HrR748wqW/6GCw+HO1rYAzD zUdciR5EjLLxIG07XG2GhTs0Zgne/F/232Z6Nvzv/MFHVwDnCScj7P8hT10YZX5Z cHequJyxnKg7ZcDvuG8X7NPHK5Ku13nI3yTpQk+cPuUu+u7dSlF7AHzSlhKgoQii NUtD+vIvAMqxR65+BiWFCxp9F7LTtWniFE7yM4QGDrKT8wrcVsS2QSuhADEA -----END PKCS7----- [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: handleCerts(): importCertChain: Exception: java.security.cert.CertificateEncodingException: Security library failed to decode certificate package: (-8183) security library: improperly formatted DER-encoded message. [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: handleCerts(): import certificate successfully, certTag=signing [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: handleCerts(): set trust on CA signing cert caSigningCert cert-pki-tomcat CA [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: CertificateAuthority init [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: Cert Repot inited [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: CRL Repot inited [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: Replica Repot inited [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: CertificateAuthority:initSigUnit: ca cert found [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: CertificateAuthority: initSigUnit 1- setting mIssuerObj and mSubjectObj [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: ca.signing Signing Unit nickname caSigningCert cert-pki-tomcat CA [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: Got token Internal Key Storage Token by name [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: Found cert by nickname: 'caSigningCert cert-pki-tomcat CA' with serial number: 26 [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: converted to x509CertImpl [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: Got private key from cert [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: Got public key from cert [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: got signing algorithm RSASignatureWithSHA256Digest [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: CA signing unit inited [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: cachainNum= 0 [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: in init - got CA chain from JSS. [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: ca.ocsp_signing Signing Unit nickname ocspSigningCert cert-pki-tomcat CA [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: Got token Internal Key Storage Token by name [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: SigningUnit init: debug org.mozilla.jss.crypto.ObjectNotFoundException [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: CertificateAuthority init: initRequestQueue [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: selected policy processor = classic [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: GenericPolicyProcessor::init begins [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: GenericPolicyProcessor::init Certificate Policy Framework (deprecated) is DISABLED [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: CA policy inited [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: CA service inited [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: CA notifier inited [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: CA pending notifier inited [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: RequestRepository: constructor2. [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: Processed 'signing' certificate. [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: Processing 'ocsp_signing' certificate: [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: handleCerts(): for cert tag 'ocsp_signing' using cert type 'local' [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: Creating local certificate... certTag=ocsp_signing [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: In LdapBoundConnFactory::getConn() [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: masterConn is connected: true [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: getConn: conn is connected true [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: getConn: mNumConns now 2 [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: Repository: getSerialNumber. [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: returnConn: mNumConns now 3 [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: Repository: getSerialNumber serial=1 [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: Repository: in InitCache [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: Repository: Instance of Certificate Repository. [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: Repository: minSerial:1 maxSerial: 10000000 [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: Repository: nextMinSerial: nextMaxSerial: [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: Repository: increment:10000000 lowWaterMark: 2000000 [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: CertificateRepository: in getLastSerialNumberInRange: low 1 high 268435456 [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: In LdapBoundConnFactory::getConn() [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: masterConn is connected: true [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: getConn: conn is connected true [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: getConn: mNumConns now 2 [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: Releasing ldap connection [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: returnConn: mNumConns now 3 [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: DBSubsystem: getEntryAttribute: dn=ou=certificateRepository, ou=ca, o=pki-tomcat-CA attr=description:; [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: CertificateRepository: getLastSerialNumberInRange mEnableRandomSerialNumbers=false mMinRandomBitLength=4 CollisionRecovery=3,10 [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: CertificateRepository: getLastSerialNumberInRange modeChange=false enableRsnAtConfig=false mForceModeChange=false mode= [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: CertificateRepository: getLastSerialNumberInRange mEnableRandomSerialNumbers=false [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: In LdapBoundConnFactory::getConn() [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: masterConn is connected: true [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: getConn: conn is connected true [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: getConn: mNumConns now 2 [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: In findCertRecordsInList with Jumpto 268435456 [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: In DBVirtualList filter attrs startFrom sortKey pageSize filter: (certStatus=*) attrs: null pageSize -5 startFrom 09268435456 [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: returnConn: mNumConns now 3 [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: getEntries returning 0 [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: mTop 0 [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: Getting Virtual List size: 0 [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: CertificateRepository:getLastSerialNumberInRange: recList size 0 [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: CertificateRepository:getLastSerialNumberInRange: index may be empty [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: CertificateRepository:getLastCertRecordSerialNo: returning 0 [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: Repository: mLastSerialNo: 0 [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: CertificateRepository: getNextSerialNumber mEnableRandomSerialNumbers=false [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: Repository: in getNextSerialNumber. [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: Repository: checkRange mLastSerialNo=1 [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: Repository: getNextSerialNumber: returning retSerial 1 [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: Creating local certificate... issuerdn=cn=rootDG.cisco.com,o=Cisco Systems,ou=CIBU,L=Bangalore [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: Creating local certificate... dn=cn=CA OCSP Signing Certificate,o=cisco.com Security Domain [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: Creating local certificate... setting issuerDN using exact CA signing cert subjectDN encoding [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: Cert Template: [ Version: V3 Subject: CN=CA OCSP Signing Certificate,O=cisco.com Security Domain Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: RSA Public Key Algorithm: RSA modulus: 00a8ce4b 469e61cd 4d2db7e3 1c6b7ef2 6a7d7128 35578738 3ad5a5ce 3d0599ad ad1ae91b e2531d75 049c3579 484e219e de248c81 275484fc 525c60c2 d6ee85cf 0023ea94 0a4eaf84 b4ee6a01 0877d77e 69391bb2 09922446 6d040b6b 695d4ee2 56d7b8e3 d231b536 290ae502 53058b2b a7f04e81 e49f8b17 028b4d0b e6564d8f b9928180 fbf54766 4d4e0096 f956953e a756c7f6 3f16b068 574a6aea f126298c 95923c4d f253cc2c 4ac99685 636d7ae5 34611198 5335d9fa 0b692e79 1d50dd39 3b49adee 7aa36aa5 1ac84aaa 2f35ff1b 301c7f4a 86e49c69 8f086daa 16366782 fd9bb165 f2b7d71c 1aca8eb1 1f0bf8b2 5fa789ef 38646c4e f78a3d29 c2f9a05b 7f publicExponent: 010001 Validity: [From: Sun Nov 09 06:03:44 IST 2014, To: Sun Nov 09 06:03:44 IST 2014] Issuer: OU=CIBU,O=Cisco Systems,CN=rootDG3.cisco.com SerialNumber: [ 01] ] [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: CertUtil: createLocalRequest for serial: 1 [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: Repository: in getNextSerialNumber. [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: In LdapBoundConnFactory::getConn() [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: masterConn is connected: true [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: getConn: conn is connected true [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: getConn: mNumConns now 2 [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: Repository: getSerialNumber. [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: returnConn: mNumConns now 3 [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: Repository: getSerialNumber serial=0 [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: Repository: in InitCache [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: Repository: Instance of Request Repository or CRLRepository. [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: Repository: minSerial:1 maxSerial: 10000000 [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: Repository: nextMinSerial: nextMaxSerial: [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: Repository: increment:10000000 lowWaterMark: 2000000 [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: RequestRepository: in getLastSerialNumberInRange: min 1 max 10000000 [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: RequestRepository: mRequestQueue com.netscape.cmscore.request.RequestQueue at 52f3aa85 [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: RequestRepository: about to call mRequestQueue.getLastRequestIdInRange [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: RequestQueue: getLastRequestId: low 1 high 10000000 [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: RequestQueue: getLastRequestId: filter (requeststate=*) fromId 10000000 [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: In LdapBoundConnFactory::getConn() [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: masterConn is connected: true [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: getConn: conn is connected true [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: getConn: mNumConns now 2 [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: In DBVirtualList filter attrs startFrom sortKey pageSize filter: (requeststate=*) attrs: null pageSize -5 startFrom 0810000000 [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: returnConn: mNumConns now 3 [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: getEntries returning 0 [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: mTop 0 [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: Getting Virtual List size: 0 [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: RequestQueue: getLastRequestId: size 0 [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: RequestQueue: getSizeBeforeJumpTo: 0 [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: RequestQueue: getLastRequestId: request list is empty. [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: CertificateRepository:getLastCertRecordSerialNo: returning 0 [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: Repository: mLastSerialNo: 0 [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: Repository: checkRange mLastSerialNo=1 [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: Repository: getNextSerialNumber: returning retSerial 1 [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: certUtil: newRequest called [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: certUtil: calling setRequestStatus [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: CertUtil profile name= caOCSPCert.profile [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: AuthInfoAccess: createExtension i=0 [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: CertUtil createSelfSignedCert: got CA private key [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: key algorithm is RSA [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: CA Signing Key type rsa [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: CA Signing Key algorithm SHA256withRSA [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: CA signing cert is not ecc [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: CertUtil createSelfSignedCert: got cert signed [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: In LdapBoundConnFactory::getConn() [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: masterConn is connected: true [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: getConn: conn is connected true [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: getConn: mNumConns now 2 [09/Nov/2014:06:03:45][http-bio-9443-exec-3]: returnConn: mNumConns now 3 [09/Nov/2014:06:03:45][http-bio-9443-exec-3]: NamePanel configCert: finished adding certificate record. [09/Nov/2014:06:03:45][http-bio-9443-exec-3]: certUtil: before updateRequest [09/Nov/2014:06:03:45][http-bio-9443-exec-3]: In LdapBoundConnFactory::getConn() [09/Nov/2014:06:03:45][http-bio-9443-exec-3]: masterConn is connected: true [09/Nov/2014:06:03:45][http-bio-9443-exec-3]: getConn: conn is connected true [09/Nov/2014:06:03:45][http-bio-9443-exec-3]: getConn: mNumConns now 2 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: returnConn: mNumConns now 3 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: handleCerts(): nickname=ocspSigningCert cert-pki-tomcat CA [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: handleCerts(): cert imported for certTag 'ocsp_signing' [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: Updating local request... certTag=ocsp_signing [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: In LdapBoundConnFactory::getConn() [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: masterConn is connected: true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: conn is connected true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: mNumConns now 2 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: returnConn: mNumConns now 3 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: In LdapBoundConnFactory::getConn() [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: masterConn is connected: true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: conn is connected true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: mNumConns now 2 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: returnConn: mNumConns now 3 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: Processed 'ocsp_signing' certificate. [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: Processing 'sslserver' certificate: [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: handleCerts(): for cert tag 'sslserver' using cert type 'local' [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: Creating local certificate... certTag=sslserver [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: CertificateRepository: getNextSerialNumber mEnableRandomSerialNumbers=false [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: Repository: in getNextSerialNumber. [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: Repository: checkRange mLastSerialNo=2 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: Repository: getNextSerialNumber: returning retSerial 2 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: Creating local certificate... issuerdn=cn=rootDG.cisco.com,o=Cisco Systems,ou=CIBU,L=Bangalore [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: Creating local certificate... dn=cn=cibu-sec88.cisco.com,o=cisco.com Security Domain [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: Creating local certificate... setting issuerDN using exact CA signing cert subjectDN encoding [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: Cert Template: [ Version: V3 Subject: CN=cibu-sec88.cisco.com,O=cisco.com Security Domain Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: RSA Public Key Algorithm: RSA modulus: 00d7818c b31bcbdf 1113e18e b516459e dfd6b5d4 e98a07b4 93e08f89 3e8300a7 2855002f 01b0993d 1151e61d 65e1fa1f 891ce7a2 2f54af5b 54df727d 64630612 d315cf78 c0a13231 271f7c83 f5b02bcb d2c46cd9 c2c7ea9c 85141cb2 9f380742 402a0ff1 d002b0f2 ec5a0043 dc8f7ab1 73525ac1 67a9a35e 0785f839 981d632f 36ac94ea ed63d946 40152916 815ce767 34ef9973 751c01f8 5dc83a69 2de4843b 69465903 c14f9ba3 bf84d57a db093a42 2d03fb3f 4c769557 b4fcfef8 8ab01f76 f89e595f 4dd5a0c9 ecd70387 14851a65 8536ebf9 87f684db eee245d1 657441f9 cf51aaa5 e6973227 b73931a2 d3bd9dd5 534aa976 2bdaf1d0 10eb4ae5 21787774 a5 publicExponent: 010001 Validity: [From: Sun Nov 09 06:03:46 IST 2014, To: Sun Nov 09 06:03:46 IST 2014] Issuer: OU=CIBU,O=Cisco Systems,CN=rootDG3.cisco.com SerialNumber: [ 02] ] [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: CertUtil: createLocalRequest for serial: 2 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: Repository: in getNextSerialNumber. [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: Repository: checkRange mLastSerialNo=2 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: Repository: getNextSerialNumber: returning retSerial 2 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: certUtil: newRequest called [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: certUtil: calling setRequestStatus [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: CertUtil profile name= serverCert.profile [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: AuthInfoAccess: createExtension i=0 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: CertUtil createSelfSignedCert: got CA private key [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: key algorithm is RSA [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: CA Signing Key type rsa [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: CA Signing Key algorithm SHA256withRSA [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: CA signing cert is not ecc [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: CertUtil createSelfSignedCert: got cert signed [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: In LdapBoundConnFactory::getConn() [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: masterConn is connected: true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: conn is connected true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: mNumConns now 2 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: returnConn: mNumConns now 3 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: NamePanel configCert: finished adding certificate record. [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: certUtil: before updateRequest [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: In LdapBoundConnFactory::getConn() [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: masterConn is connected: true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: conn is connected true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: mNumConns now 2 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: returnConn: mNumConns now 3 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: handleCerts(): nickname=Server-Cert cert-pki-tomcat [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: deleteCert: nickname=Server-Cert cert-pki-tomcat [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: deleteCert: cert deleted successfully [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: handleCerts(): cert imported for certTag 'sslserver' [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: Updating local request... certTag=sslserver [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: In LdapBoundConnFactory::getConn() [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: masterConn is connected: true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: conn is connected true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: mNumConns now 2 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: returnConn: mNumConns now 3 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: In LdapBoundConnFactory::getConn() [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: masterConn is connected: true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: conn is connected true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: mNumConns now 2 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: returnConn: mNumConns now 3 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: Processed 'sslserver' certificate. [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: Processing 'subsystem' certificate: [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: handleCerts(): for cert tag 'subsystem' using cert type 'local' [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: Creating local certificate... certTag=subsystem [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: CertificateRepository: getNextSerialNumber mEnableRandomSerialNumbers=false [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: Repository: in getNextSerialNumber. [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: Repository: checkRange mLastSerialNo=3 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: Repository: getNextSerialNumber: returning retSerial 3 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: Creating local certificate... issuerdn=cn=rootDG.cisco.com,o=Cisco Systems,ou=CIBU,L=Bangalore [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: Creating local certificate... dn=cn=Subsystem Certificate,o=cisco.com Security Domain [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: Creating local certificate... setting issuerDN using exact CA signing cert subjectDN encoding [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: Cert Template: [ Version: V3 Subject: CN=Subsystem Certificate,O=cisco.com Security Domain Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: RSA Public Key Algorithm: RSA modulus: 00ba8210 635df889 ddce3dd1 70441407 52b73ef6 07a61da0 dd4bf7e2 e19b207d 5b5c322e a9b88e94 8407be7f c2637e83 ac170847 877f7228 2a44e415 ca0839c2 7e229bf8 282da9be 90c9c3af baf1b727 7a974007 1c9a8a14 ecbcd2d0 7a28c7a5 4ed9f9f6 11a7fb72 ea67f45b 2fee89ad 0b4ba529 79408ba1 b2f82544 4cc81ebf b28aac7d 0e1ca118 838ee806 480069bf 682718f6 e5a1d658 e92a8698 17d8a535 11722f23 03f1304f 84940d0c 8e14d0fc d919f78c ffb2955f 1a536800 40831628 21277972 3e9f8c92 bd40966a 1ea86a6c deafae4a 3344b779 8b50d89f c1fa3333 d369d907 f7a26896 3c833a21 4edf69b5 aa63ff7a 120ea1aa 14d0eb88 02c8fc87 3f publicExponent: 010001 Validity: [From: Sun Nov 09 06:03:46 IST 2014, To: Sun Nov 09 06:03:46 IST 2014] Issuer: OU=CIBU,O=Cisco Systems,CN=rootDG3.cisco.com SerialNumber: [ 03] ] [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: CertUtil: createLocalRequest for serial: 3 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: Repository: in getNextSerialNumber. [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: Repository: checkRange mLastSerialNo=3 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: Repository: getNextSerialNumber: returning retSerial 3 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: certUtil: newRequest called [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: certUtil: calling setRequestStatus [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: CertUtil profile name= subsystemCert.profile [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: AuthInfoAccess: createExtension i=0 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: CertUtil createSelfSignedCert: got CA private key [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: key algorithm is RSA [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: CA Signing Key type rsa [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: CA Signing Key algorithm SHA256withRSA [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: CA signing cert is not ecc [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: CertUtil createSelfSignedCert: got cert signed [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: In LdapBoundConnFactory::getConn() [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: masterConn is connected: true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: conn is connected true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: mNumConns now 2 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: returnConn: mNumConns now 3 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: NamePanel configCert: finished adding certificate record. [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: certUtil: before updateRequest [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: In LdapBoundConnFactory::getConn() [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: masterConn is connected: true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: conn is connected true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: mNumConns now 2 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: returnConn: mNumConns now 3 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: handleCerts(): nickname=subsystemCert cert-pki-tomcat [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: handleCerts(): cert imported for certTag 'subsystem' [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: Updating local request... certTag=subsystem [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: In LdapBoundConnFactory::getConn() [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: masterConn is connected: true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: conn is connected true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: mNumConns now 2 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: returnConn: mNumConns now 3 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: In LdapBoundConnFactory::getConn() [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: masterConn is connected: true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: conn is connected true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: mNumConns now 2 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: returnConn: mNumConns now 3 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: Processed 'subsystem' certificate. [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: Processing 'audit_signing' certificate: [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: handleCerts(): for cert tag 'audit_signing' using cert type 'local' [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: Creating local certificate... certTag=audit_signing [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: CertificateRepository: getNextSerialNumber mEnableRandomSerialNumbers=false [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: Repository: in getNextSerialNumber. [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: Repository: checkRange mLastSerialNo=4 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: Repository: getNextSerialNumber: returning retSerial 4 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: Creating local certificate... issuerdn=cn=rootDG.cisco.com,o=Cisco Systems,ou=CIBU,L=Bangalore [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: Creating local certificate... dn=cn=CA Audit Signing Certificate,o=cisco.com Security Domain [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: Creating local certificate... setting issuerDN using exact CA signing cert subjectDN encoding [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: Cert Template: [ Version: V3 Subject: CN=CA Audit Signing Certificate,O=cisco.com Security Domain Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: RSA Public Key Algorithm: RSA modulus: 00d00b8b 93739665 51199fd9 d7799a7c 0a49ee80 e0a82adb 91303dc9 1eea1e27 58440c67 dffd3f34 ccebc454 3c37eb6d a422dc9f 71c70600 ff9f8cfb b0ae84e4 c8b1b8f8 43a51892 3badd3bf 3b11aa2b 22a3a1cc a953b169 5b78f4dc cb22f4bd 8108d388 06e5d020 dd381d30 c0679a40 62031c0e 89073aab 78999035 62b45312 fb9eac38 3ddfcb29 fde9d708 972185a0 83912cc5 fbd99922 abd86e8a 8b689f90 5df08bbd dd85cfc7 c7466b61 e34c3e42 09a96fe0 c39fc517 eac1d7e2 b1563a09 c0229c8c f9c5c487 b5719295 6b781c67 61f01ea8 4ba79743 46418050 43ee8dbc a2249240 99ed0437 e61990bc d87165d0 bb85973c 72164259 2ff4816d 5163a89d 13 publicExponent: 010001 Validity: [From: Sun Nov 09 06:03:46 IST 2014, To: Sun Nov 09 06:03:46 IST 2014] Issuer: OU=CIBU,O=Cisco Systems,CN=rootDG3.cisco.com SerialNumber: [ 04] ] [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: CertUtil: createLocalRequest for serial: 4 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: Repository: in getNextSerialNumber. [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: Repository: checkRange mLastSerialNo=4 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: Repository: getNextSerialNumber: returning retSerial 4 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: certUtil: newRequest called [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: certUtil: calling setRequestStatus [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: CertUtil profile name= caAuditSigningCert.profile [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: AuthInfoAccess: createExtension i=0 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: CertUtil createSelfSignedCert: got CA private key [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: key algorithm is RSA [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: CA Signing Key type rsa [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: CA Signing Key algorithm SHA256withRSA [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: CA signing cert is not ecc [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: CertUtil createSelfSignedCert: got cert signed [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: In LdapBoundConnFactory::getConn() [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: masterConn is connected: true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: conn is connected true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: mNumConns now 2 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: returnConn: mNumConns now 3 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: NamePanel configCert: finished adding certificate record. [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: certUtil: before updateRequest [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: In LdapBoundConnFactory::getConn() [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: masterConn is connected: true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: conn is connected true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: mNumConns now 2 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: returnConn: mNumConns now 3 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: handleCerts(): nickname=auditSigningCert cert-pki-tomcat CA [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: handleCerts(): cert imported for certTag 'audit_signing' [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: Updating local request... certTag=audit_signing [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: In LdapBoundConnFactory::getConn() [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: masterConn is connected: true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: conn is connected true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: mNumConns now 2 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: returnConn: mNumConns now 3 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: In LdapBoundConnFactory::getConn() [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: masterConn is connected: true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: conn is connected true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: mNumConns now 2 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: returnConn: mNumConns now 3 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: Processed 'audit_signing' certificate. [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: === BackupKeyCert Panel/SavePKCS12 Panel === [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: === Admin Panel === [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: In LdapBoundConnFactory::getConn() [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: masterConn is connected: true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: conn is connected true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: mNumConns now 2 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: returnConn: mNumConns now 3 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: In LdapBoundConnFactory::getConn() [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: masterConn is connected: true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: conn is connected true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: mNumConns now 2 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: returnConn: mNumConns now 3 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: dn: cn=Certificate Manager Agents,ou=Groups,o=pki-tomcat-CA [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: description: Agents for Certificate Manager [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: uniqueMember: uid=caadmin,ou=People,o=pki-tomcat-CA [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: In LdapBoundConnFactory::getConn() [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: masterConn is connected: true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: conn is connected true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: mNumConns now 2 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: returnConn: mNumConns now 3 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: In LdapBoundConnFactory::getConn() [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: masterConn is connected: true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: conn is connected true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: mNumConns now 2 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: returnConn: mNumConns now 3 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: dn: cn=Administrators,ou=Groups,o=pki-tomcat-CA [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: description: People who manage the Certificate System [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: uniqueMember: uid=caadmin,ou=People,o=pki-tomcat-CA [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: In LdapBoundConnFactory::getConn() [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: masterConn is connected: true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: conn is connected true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: mNumConns now 2 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: returnConn: mNumConns now 3 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: In LdapBoundConnFactory::getConn() [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: masterConn is connected: true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: conn is connected true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: mNumConns now 2 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: returnConn: mNumConns now 3 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: AdminPanel createAdmin: add user 'caadmin' to group 'Security Domain Administrators' [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: dn: cn=Security Domain Administrators,ou=Groups,o=pki-tomcat-CA [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: description: People who are the Security Domain administrators [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: uniqueMember: uid=caadmin,ou=People,o=pki-tomcat-CA [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: In LdapBoundConnFactory::getConn() [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: masterConn is connected: true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: conn is connected true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: mNumConns now 2 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: returnConn: mNumConns now 3 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: In LdapBoundConnFactory::getConn() [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: masterConn is connected: true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: conn is connected true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: mNumConns now 2 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: returnConn: mNumConns now 3 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: AdminPanel createAdmin: add user 'caadmin' to group 'Enterprise CA Administrators' [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: dn: cn=Enterprise CA Administrators,ou=Groups,o=pki-tomcat-CA [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: description: People who are the administrators for the security domain for CA [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: uniqueMember: uid=caadmin,ou=People,o=pki-tomcat-CA [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: In LdapBoundConnFactory::getConn() [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: masterConn is connected: true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: conn is connected true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: mNumConns now 2 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: returnConn: mNumConns now 3 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: In LdapBoundConnFactory::getConn() [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: masterConn is connected: true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: conn is connected true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: mNumConns now 2 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: returnConn: mNumConns now 3 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: AdminPanel createAdmin: add user 'caadmin' to group 'Enterprise KRA Administrators' [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: dn: cn=Enterprise KRA Administrators,ou=Groups,o=pki-tomcat-CA [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: description: People who are the administrators for the security domain for KRA [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: uniqueMember: uid=caadmin,ou=People,o=pki-tomcat-CA [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: In LdapBoundConnFactory::getConn() [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: masterConn is connected: true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: conn is connected true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: mNumConns now 2 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: returnConn: mNumConns now 3 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: In LdapBoundConnFactory::getConn() [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: masterConn is connected: true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: conn is connected true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: mNumConns now 2 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: returnConn: mNumConns now 3 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: AdminPanel createAdmin: add user 'caadmin' to group 'Enterprise RA Administrators' [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: dn: cn=Enterprise RA Administrators,ou=Groups,o=pki-tomcat-CA [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: description: People who are the administrators for the security domain for RA [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: uniqueMember: uid=caadmin,ou=People,o=pki-tomcat-CA [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: In LdapBoundConnFactory::getConn() [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: masterConn is connected: true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: conn is connected true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: mNumConns now 2 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: returnConn: mNumConns now 3 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: In LdapBoundConnFactory::getConn() [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: masterConn is connected: true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: conn is connected true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: mNumConns now 2 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: returnConn: mNumConns now 3 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: AdminPanel createAdmin: add user 'caadmin' to group 'Enterprise TKS Administrators' [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: dn: cn=Enterprise TKS Administrators,ou=Groups,o=pki-tomcat-CA [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: description: People who are the administrators for the security domain for TKS [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: uniqueMember: uid=caadmin,ou=People,o=pki-tomcat-CA [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: In LdapBoundConnFactory::getConn() [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: masterConn is connected: true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: conn is connected true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: mNumConns now 2 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: returnConn: mNumConns now 3 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: In LdapBoundConnFactory::getConn() [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: masterConn is connected: true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: conn is connected true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: mNumConns now 2 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: returnConn: mNumConns now 3 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: AdminPanel createAdmin: add user 'caadmin' to group 'Enterprise OCSP Administrators' [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: dn: cn=Enterprise OCSP Administrators,ou=Groups,o=pki-tomcat-CA [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: description: People who are the administrators for the security domain for OCSP [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: uniqueMember: uid=caadmin,ou=People,o=pki-tomcat-CA [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: In LdapBoundConnFactory::getConn() [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: masterConn is connected: true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: conn is connected true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: mNumConns now 2 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: returnConn: mNumConns now 3 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: In LdapBoundConnFactory::getConn() [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: masterConn is connected: true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: conn is connected true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: mNumConns now 2 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: returnConn: mNumConns now 3 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: AdminPanel createAdmin: add user 'caadmin' to group 'Enterprise TPS Administrators' [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: dn: cn=Enterprise TPS Administrators,ou=Groups,o=pki-tomcat-CA [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: description: People who are the administrators for the security domain for TPS [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: uniqueMember: uid=caadmin,ou=People,o=pki-tomcat-CA [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: In LdapBoundConnFactory::getConn() [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: masterConn is connected: true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: conn is connected true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: mNumConns now 2 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: returnConn: mNumConns now 3 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: Creating local certificate... certTag=admin [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: CertificateRepository: getNextSerialNumber mEnableRandomSerialNumbers=false [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: Repository: in getNextSerialNumber. [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: Repository: checkRange mLastSerialNo=5 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: Repository: getNextSerialNumber: returning retSerial 5 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: Creating local certificate... issuerdn=cn=rootDG.cisco.com,o=Cisco Systems,ou=CIBU,L=Bangalore [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: Creating local certificate... dn=cn=PKI Administrator,o=cisco.com Security Domain [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: Creating local certificate... setting issuerDN using exact CA signing cert subjectDN encoding [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: Cert Template: [ Version: V3 Subject: CN=PKI Administrator,O=cisco.com Security Domain Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: algorithm = RSA, unparsed keybits = 30 82 01 0A 02 82 01 01 00 DB 40 BD 9F 17 7A 54 DC 74 6F 26 5C 1E 0D E4 B6 32 D7 61 02 84 DC D0 03 2C F9 F2 48 32 74 FF 97 AE B1 E0 69 C8 5A 0B 3E 2C AB 59 7A DA 68 BA C1 0B D3 1C F9 B2 29 9D E9 75 EF CD D1 8E 09 DA 1A 1C F6 03 05 84 A0 8F 6F 44 35 10 A3 E4 9E F2 BA 70 BB 0F C9 AF C4 4B 24 98 16 88 78 D5 57 5C 10 CD 7E 92 30 3B F2 A9 2F B1 61 9E A0 D0 6E BC 8D 2A F5 57 B9 03 50 5A BF F4 DA 90 C0 22 AF 2D 77 1A 0C AD B0 05 A2 6C CB AF 02 6D 7A F6 C9 B4 A9 2F 31 A5 F6 FE 9D 1E CF D9 B0 05 57 21 E9 FC EC 57 17 A7 1E 36 B0 B9 5A 4F D9 D0 65 A3 F9 F2 4D 2E B9 58 C5 3E 60 CA 0C 77 D1 4A DE DB 9C 45 87 CE F6 50 47 47 94 FE C7 22 C4 61 D4 0E 04 82 DC 80 E5 3C 6C 7C C7 85 F0 A9 9B 14 18 40 BA 44 FA B5 1E 3C 47 0C 36 01 35 62 A5 26 C1 B7 E5 30 F2 A2 B7 7E 0F 93 E3 A9 2D 18 0A F9 58 F0 DD B8 6B 02 03 01 00 01 Validity: [From: Sun Nov 09 06:03:46 IST 2014, To: Sun Nov 09 06:03:46 IST 2014] Issuer: OU=CIBU,O=Cisco Systems,CN=rootDG3.cisco.com SerialNumber: [ 05] ] [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: CertUtil: createLocalRequest for serial: 5 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: Repository: in getNextSerialNumber. [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: Repository: checkRange mLastSerialNo=5 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: Repository: getNextSerialNumber: returning retSerial 5 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: certUtil: newRequest called [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: certUtil: calling setRequestStatus [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: CertUtil profile name= adminCert.profile [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: AuthInfoAccess: createExtension i=0 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: CertUtil createSelfSignedCert: got CA private key [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: key algorithm is RSA [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: CA Signing Key type rsa [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: CA Signing Key algorithm SHA256withRSA [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: CA signing cert is not ecc [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: CertUtil createSelfSignedCert: got cert signed [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: In LdapBoundConnFactory::getConn() [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: masterConn is connected: true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: conn is connected true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: mNumConns now 2 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: returnConn: mNumConns now 3 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: NamePanel configCert: finished adding certificate record. [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: certUtil: before updateRequest [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: In LdapBoundConnFactory::getConn() [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: masterConn is connected: true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: conn is connected true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: mNumConns now 2 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: returnConn: mNumConns now 3 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: Updating local request... certTag=admin [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: In LdapBoundConnFactory::getConn() [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: masterConn is connected: true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: conn is connected true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: mNumConns now 2 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: returnConn: mNumConns now 3 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: In LdapBoundConnFactory::getConn() [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: masterConn is connected: true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: conn is connected true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: mNumConns now 2 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: returnConn: mNumConns now 3 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: In LdapBoundConnFactory::getConn() [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: masterConn is connected: true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: conn is connected true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: getConn: mNumConns now 2 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: returnConn: mNumConns now 3 [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: LdapBoundConnFactory: init [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: LdapBoundConnFactory:doCloning true [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: LdapAuthInfo: init() [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: LdapAuthInfo: init begins [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: LdapAuthInfo: init: prompt is Internal LDAP Database [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: LdapAuthInfo: init: try getting from memory cache [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: LdapAuthInfo: init: got password from memory [09/Nov/2014:06:03:46][http-bio-9443-exec-3]: LdapAuthInfo: init: password found for prompt. [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: LdapAuthInfo: password ok: store in memory cache [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: LdapAuthInfo: init ends [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: init: before makeConnection errorIfDown is false [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: makeConnection: errorIfDown false [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: Established LDAP connection using basic authentication to host localhost.localdomain port 389 as cn=Directory Manager [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: initializing with mininum 3 and maximum 15 connections to host localhost.localdomain port 389, secure connection, false, authentication type 1 [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: increasing minimum connections by 3 [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: new total available connections 3 [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: new number of connections 3 [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: In LdapBoundConnFactory::getConn() [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: masterConn is connected: true [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: getConn: conn is connected true [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: getConn: mNumConns now 2 [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: returnConn: mNumConns now 3 [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: In LdapBoundConnFactory::getConn() [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: masterConn is connected: true [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: getConn: conn is connected true [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: getConn: mNumConns now 2 [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: returnConn: mNumConns now 3 [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: === Done Panel === [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: Creating new security domain [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: LdapBoundConnFactory: init [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: LdapBoundConnFactory:doCloning true [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: LdapAuthInfo: init() [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: LdapAuthInfo: init begins [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: LdapAuthInfo: init: prompt is Internal LDAP Database [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: LdapAuthInfo: init: try getting from memory cache [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: LdapAuthInfo: init: got password from memory [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: LdapAuthInfo: init: password found for prompt. [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: LdapAuthInfo: password ok: store in memory cache [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: LdapAuthInfo: init ends [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: init: before makeConnection errorIfDown is false [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: makeConnection: errorIfDown false [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: Established LDAP connection using basic authentication to host localhost.localdomain port 389 as cn=Directory Manager [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: initializing with mininum 3 and maximum 15 connections to host localhost.localdomain port 389, secure connection, false, authentication type 1 [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: increasing minimum connections by 3 [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: new total available connections 3 [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: new number of connections 3 [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: In LdapBoundConnFactory::getConn() [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: masterConn is connected: true [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: getConn: conn is connected true [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: getConn: mNumConns now 2 [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: createSecurityDomain(): finish updating domain info [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: In LdapBoundConnFactory::getConn() [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: masterConn is connected: true [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: getConn: conn is connected true [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: getConn: mNumConns now 2 [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: returnConn: mNumConns now 3 [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: setupDBUser(): creating user: pkidbuser [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: DonePanel getSubsystemCert: nickname=subsystemCert cert-pki-tomcat [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: In LdapBoundConnFactory::getConn() [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: masterConn is connected: true [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: getConn: conn is connected true [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: getConn: mNumConns now 2 [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: returnConn: mNumConns now 3 [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: setupDBUser(): successfully added the user [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: In LdapBoundConnFactory::getConn() [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: masterConn is connected: true [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: getConn: conn is connected true [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: getConn: mNumConns now 2 [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: returnConn: mNumConns now 3 [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: setupDBUser(): successfully add the user certificate [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: In LdapBoundConnFactory::getConn() [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: masterConn is connected: true [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: getConn: conn is connected true [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: getConn: mNumConns now 2 [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: returnConn: mNumConns now 3 [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: setupDBUser(): removing seeAlso from old dbusers [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: LdapBoundConnFactory: init [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: LdapBoundConnFactory:doCloning true [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: LdapAuthInfo: init() [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: LdapAuthInfo: init begins [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: LdapAuthInfo: init: prompt is Internal LDAP Database [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: LdapAuthInfo: init: try getting from memory cache [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: LdapAuthInfo: init: got password from memory [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: LdapAuthInfo: init: password found for prompt. [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: LdapAuthInfo: password ok: store in memory cache [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: LdapAuthInfo: init ends [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: init: before makeConnection errorIfDown is false [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: makeConnection: errorIfDown false [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: Established LDAP connection using basic authentication to host localhost.localdomain port 389 as cn=Directory Manager [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: initializing with mininum 3 and maximum 15 connections to host localhost.localdomain port 389, secure connection, false, authentication type 1 [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: increasing minimum connections by 3 [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: new total available connections 3 [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: new number of connections 3 [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: In LdapBoundConnFactory::getConn() [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: masterConn is connected: true [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: getConn: conn is connected true [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: getConn: mNumConns now 2 [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: LdapBoundConnFactory: init [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: LdapBoundConnFactory:doCloning true [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: LdapAuthInfo: init() [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: LdapAuthInfo: init begins [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: LdapAuthInfo: init: prompt is Internal LDAP Database [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: LdapAuthInfo: init: try getting from memory cache [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: LdapAuthInfo: init: got password from memory [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: LdapAuthInfo: init: password found for prompt. [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: LdapAuthInfo: password ok: store in memory cache [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: LdapAuthInfo: init ends [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: init: before makeConnection errorIfDown is false [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: makeConnection: errorIfDown false [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: Established LDAP connection using basic authentication to host localhost.localdomain port 389 as cn=Directory Manager [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: initializing with mininum 3 and maximum 15 connections to host localhost.localdomain port 389, secure connection, false, authentication type 1 [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: increasing minimum connections by 3 [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: new total available connections 3 [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: new number of connections 3 [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: In LdapBoundConnFactory::getConn() [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: masterConn is connected: true [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: getConn: conn is connected true [09/Nov/2014:06:03:47][http-bio-9443-exec-3]: getConn: mNumConns now 2 From cfu at redhat.com Tue Nov 11 20:49:42 2014 From: cfu at redhat.com (Christina Fu) Date: Tue, 11 Nov 2014 12:49:42 -0800 Subject: [Pki-users] Can OpensSSL be used as external CA ? In-Reply-To: References: <544E6FAB.1020003@redhat.com> <544FF41B.3010705@redhat.com> <5453C1A5.5090206@redhat.com> <545ADD75.2000508@redhat.com> <545CFC94.7050302@redhat.com> <6E1951E1-E8C7-4189-9A1F-DA9BD72CAB66@gmail.com> <54617802.4040500@redhat.com> Message-ID: <54627666.3060500@redhat.com> Kritee, I see the following error in the debug log: [09/Nov/2014:06:03:44][http-bio-9443-exec-3]: handleCerts(): importCertChain: Exception: java.security.cert.CertificateEncodingException: Security library failed to decode certificate package: (-8183) security library: improperly formatted DER-encoded message. It doesn't like your pkcs7 cert chain. Personally, I always use the whole chain from root down to and including the CA signing cert of the leaf CA. Actually, I wrote that part of the code, and that's how I remembered it too. I just don't remember why ;-( because it's been a long time. Maybe I didn't read your email closely enough and I am not sure what the purpose of your exercise is. The external CA feature is to support a non Dogtag CA as the issuer. Since we don't know what cert-chain auto-retrieval mechanisms are out there for every and which CA manufacturer, we just resolved to having people manually put the pkcs7 in the specified config file. You can always manually manipulate what goes into the nss cert db by using certutil (run certutil -H to see all options). You can add certs, delete certs, add trust, etc. Christina On 11/10/2014 06:55 PM, kritee jhawar wrote: > Hi Christina > > PFA the logs. As for my other question, this is the only mechanism > with which we can control the root certificate of dogtag?Is there no > other way where we can bring up Dogtag with an externally provided > certificate? > Because if I have to pass the root cert of OpenSSL along with the cert > signed for dogtag as chain, it defeats my whole purpose of the exercise. > Thanks again for helping out so actively. > > Regards > Kritee > > On Tue, Nov 11, 2014 at 8:14 AM, Christina Fu > wrote: > > hi Kritee, > I'm sorry I can't find anything visually. Could you send the > debug log? should be somewhere in > /var/lib/pki/pki-tomcat/ca/logs. While you are at it, maybe send > the system log and selftests.log as well. > > Christina > > > On 11/07/2014 10:48 PM, Kritee Jhawar wrote: >> Hi Christina >> >> When using Dogtag as external CA I had provided only the self >> signed certificate as pkcs7 (the same way I did for OpenSSL) and >> it had worked. >> >> The idea behind this was we needed a constant trust anchor to be >> burnt into the devices(which will function as clients). Initially >> I tried to find a way to provide a static root certificate to >> dogtag so that even after the crash it will come up with the same >> certificate. >> Then I moved onto the l >> >> Sent from my iPhone >> >> On 07-Nov-2014, at 22:38, Christina Fu > > wrote: >> >>> Hi Kritee, >>> >>> I just looked closely. Your ca cert chain contains only one >>> single self-signed root cert. I think what you need is a chain >>> down to the dogtag CA cert that links up from the root, so in >>> your case, you should have both the root and the dogtag CA cert >>> in the pkcs7. >>> >>> Hope that helps. >>> Christina >>> >>> >>> On 11/06/2014 01:25 AM, kritee jhawar wrote: >>>> Hi Christina >>>> >>>> Thanks for the response. PFA the typescript for pkispawn step1 >>>> and pkispawn step2. >>>> >>>> Thanks, >>>> Kritee >>>> >>>> On Thu, Nov 6, 2014 at 8:01 AM, Christina Fu >>> > wrote: >>>> >>>> Hi Kritee, >>>> I think we could use a bit more info. >>>> Could you try running pkispawn with script... something >>>> like the following: >>>> script -c 'pkispawn -s CA -f config-step2.txt -vvv' >>>> >>>> the resulting typescript file might give us some more clue. >>>> Christina >>>> >>>> >>>> On 10/31/2014 09:24 PM, kritee jhawar wrote: >>>>> Thanks Christina >>>>> >>>>> I checked out the master branch and built it. Now i can >>>>> see the added extensions in the CSR generated, however i >>>>> am getting the same error as earlier. >>>>> This time again, I tried the supply the certificate chain >>>>> with and without the headers. The chain is in a valid >>>>> pkcs7 format. >>>>> Following is how the extensions look in the certificate >>>>> signed by openssl for dogtag: >>>>> >>>>> X509v3 extensions: >>>>> X509v3 Basic Constraints: critical >>>>> CA:TRUE >>>>> X509v3 Key Usage: critical >>>>> Digital Signature, Non Repudiation, Certificate Sign, CRL Sign >>>>> 1.3.6.1.4.1.311.20.2: >>>>> . >>>>> .S.u.b.C.A >>>>> >>>>> The error i get in step 2 of pkispawn is as follows: >>>>> >>>>> pkispawn : INFO ....... BtoA >>>>> /root/.dogtag/pki-tomcat/ca/alias/admin_pkcs10.bin >>>>> /root/.dogtag/pki-tomcat/ca/alias/admin_pkcs10.bin.asc >>>>> pkispawn : INFO ....... loading external CA signing >>>>> certificate from file: '/home/kjhawar/dogtag/dg_ca.cert' >>>>> pkispawn : INFO ....... loading external CA signing >>>>> certificate chain from file: >>>>> '/home/kjhawar/dogtag/dg_chain.cert' >>>>> pkispawn : INFO ....... configuring PKI configuration data. >>>>> pkispawn : INFO ....... AtoB >>>>> /root/.dogtag/pki-tomcat/ca_admin.cert >>>>> /root/.dogtag/pki-tomcat/ca_admin.cert.der >>>>> pkispawn : INFO ....... certutil -A -d >>>>> /root/.dogtag/pki-tomcat/ca/alias -n PKI Administrator -t >>>>> u,u,u -i /root/.dogtag/pki-tomcat/ca_admin.cert.der -f >>>>> /root/.dogtag/pki-tomcat/ca/password.conf >>>>> Notice: Trust flag u is set automatically if the private >>>>> key is present. >>>>> pkispawn : INFO ....... pk12util -d >>>>> /root/.dogtag/pki-tomcat/ca/alias -o >>>>> /root/.dogtag/pki-tomcat/ca_admin_cert.p12 -n PKI >>>>> Administrator -w >>>>> /root/.dogtag/pki-tomcat/ca/pkcs12_password.conf -k >>>>> /root/.dogtag/pki-tomcat/ca/password.conf >>>>> pkispawn : INFO ... finalizing >>>>> 'pki.server.deployment.scriptlets.finalization' >>>>> pkispawn : INFO ....... cp -p >>>>> /etc/sysconfig/pki/tomcat/pki-tomcat/ca/deployment.cfg >>>>> /var/log/pki/pki-tomcat/ca/archive/spawn_deployment.cfg.20141101020655 >>>>> pkispawn : INFO ....... generating manifest file called >>>>> '/etc/sysconfig/pki/tomcat/pki-tomcat/ca/manifest' >>>>> pkispawn : INFO ....... cp -p >>>>> /etc/sysconfig/pki/tomcat/pki-tomcat/ca/manifest >>>>> /var/log/pki/pki-tomcat/ca/archive/spawn_manifest.20141101020655 >>>>> pkispawn : INFO ....... executing 'systemctl daemon-reload' >>>>> pkispawn : INFO ....... executing 'systemctl restart >>>>> pki-tomcatd at pki-tomcat.service >>>>> ' >>>>> Job for pki-tomcatd at pki-tomcat.service >>>>> canceled. >>>>> pkispawn : ERROR ....... subprocess.CalledProcessError: >>>>> Command '['systemctl', 'restart', >>>>> 'pki-tomcatd at pki-tomcat.service >>>>> ']' returned >>>>> non-zero exit status 1! >>>>> >>>>> Installation failed. >>>>> >>>>> Kindly let me know if any specific configuration has to be >>>>> done in my openssl CA. Attaching the config file i am >>>>> using currently >>>>> >>>>> Thanks >>>>> Kritee >>>>> >>>>> On Fri, Oct 31, 2014 at 10:36 PM, Christina Fu >>>>> > wrote: >>>>> >>>>> Kritee, >>>>> >>>>> At the minimum, you need the fixes I talked about. >>>>> They were checked into the master but has not been >>>>> built officially so yum is not going to get you the >>>>> right rpm. However, you can check it out and build it >>>>> yourself. >>>>> Here is how you check out the master: >>>>> >>>>> git clone git://git.fedorahosted.org/git/pki.git >>>>> >>>>> You can then use the build scripts to build. >>>>> >>>>> Finally, I apologize that we are not supposed to >>>>> respond to private emails. Dogtag is a community >>>>> where we share our knowledge. In the future please >>>>> send requests to the mailing list. >>>>> I took the exception this time to look at your CSR and >>>>> certs and I could see that you need the fixes I talked >>>>> about. I don't know if you have other issues though, >>>>> but AFAIK you need those two fixes. >>>>> >>>>> Hope this helps. >>>>> Christina >>>>> >>>>> >>>>> On 10/29/2014 01:16 AM, kritee jhawar wrote: >>>>>> Hi Christina >>>>>> >>>>>> I have done the default configuration for 389ds and >>>>>> haven't specifically turned on ssl for it. >>>>>> >>>>>> Initially I tried using Microsoft and OpenSSL CA as >>>>>> external CAs. This is about a month back and I pull >>>>>> the Rpms using yum (so I assume they are the latest >>>>>> ones with the fix you mentioned). >>>>>> With this, my pki spawn went fine. Infect the admin >>>>>> cert got generated using the externally provided root >>>>>> cert as well. But dogtag couldn't connect to the ds. >>>>>> As mentioned earlier it gave me a PKIException error >>>>>> listing the certs with error code 500. >>>>>> Looking at the ds logs I found that the error was >>>>>> 'bad search filter'. >>>>>> However when I tried the same steps with dogtag as >>>>>> external CA the setup went through without a glitch. >>>>>> The chain I imported was directly from the GUI of >>>>>> dogtag. In fact I included the header and footer as >>>>>> well. >>>>>> >>>>>> When I tried to reverse engineer the chain, I took >>>>>> the root cert of external dogtag ca and used OpenSSL >>>>>> to convert it into pkcs7. This chain was not the same >>>>>> as provided from the GUI. Hence I thought that there >>>>>> is some particular format for the chain because of >>>>>> which the other CAs aren't working. >>>>>> >>>>>> Also, I updated the Rpms using yum and tried to >>>>>> generate the CSR with the extra attributes. My csr >>>>>> still doesn't reflect those added attributes. >>>>>> >>>>>> Is yum not the correct way to get the latest code ? >>>>>> >>>>>> I am very new to this, really appreciate your >>>>>> assistance and time. >>>>>> >>>>>> Regards >>>>>> Kritee >>>>>> >>>>>> On Wednesday, 29 October 2014, Christina Fu >>>>>> > wrote: >>>>>> >>>>>> the cert chain you provide in the file specified >>>>>> under >>>>>> pki_external_ca_cert_chain_path >>>>>> should be just pkcs7 without header/footer. >>>>>> >>>>>> I don't know why it would not talk to the DS (did >>>>>> you turn on ssl for the ds?). >>>>>> Not sure if you build your Dogtag from the >>>>>> master, if you do, I'd suggest you get the most >>>>>> updated so you get fixes from the tickets I >>>>>> provided previously which would address at least >>>>>> two issues relating to external CA. >>>>>> >>>>>> Christina >>>>>> >>>>>> On 10/27/2014 07:55 PM, kritee jhawar wrote: >>>>>>> Hi Christina >>>>>>> >>>>>>> I was undertaking this activity last month where >>>>>>> Microsoft CA didn't work out but Dogtag as >>>>>>> external CA did. >>>>>>> >>>>>>> While using Microsoft CA or OpenSSL CA, pki >>>>>>> spawn goes through without any error but dogtag >>>>>>> stops communications to 389ds. Upon calling the >>>>>>> rest Api /ca/rest/certs I get a "PKIException >>>>>>> error listing the certs". >>>>>>> >>>>>>> Is there a particular format for the ca cert >>>>>>> chain that we need to provide ? I was trying to >>>>>>> reverse engineer the chain provided by dogtag. >>>>>>> >>>>>>> Thanks >>>>>>> Kritee >>>>>>> >>>>>>> >>>>>>> >>>>>>> On Monday, 27 October 2014, Christina Fu >>>>>>> wrote: >>>>>>> >>>>>>> If you meant the following two: >>>>>>> https://fedorahosted.org/pki/ticket/1190 CA: >>>>>>> issuer DN encoding not preserved at issuance >>>>>>> with signing cert signed by an external CA >>>>>>> https://fedorahosted.org/pki/ticket/1110 - >>>>>>> pkispawn (configuration) does not provide CA >>>>>>> extensions in subordinate certificate >>>>>>> signing requests (CSR) >>>>>>> >>>>>>> They have just recently been fixed upstream >>>>>>> so I imagine you could use Microsoft CA now. >>>>>>> Theoretically any other CA can be used as an >>>>>>> external CA, but if you run into issues, >>>>>>> please feel free to report. >>>>>>> >>>>>>> Christina >>>>>>> >>>>>>> >>>>>>> On 10/27/2014 12:15 AM, kritee jhawar wrote: >>>>>>>> Hi >>>>>>>> >>>>>>>> In my recent thread i read that there is a >>>>>>>> bug due to which Microsoft CA can't work as >>>>>>>> external CA for dogtag. >>>>>>>> Can OpenSSL be used ? >>>>>>>> >>>>>>>> Thanks >>>>>>>> Kritee >>>>>>>> >>>>>>>> >>>>>>>> _______________________________________________ >>>>>>>> Pki-users mailing list >>>>>>>> Pki-users at redhat.com >>>>>>>> https://www.redhat.com/mailman/listinfo/pki-users >>>>>>> >>>>>> >>>>> >>>>> >>>>> _______________________________________________ >>>>> Pki-users mailing list >>>>> Pki-users at redhat.com >>>>> https://www.redhat.com/mailman/listinfo/pki-users >>>>> >>>>> >>>> >>>> >>> > > -------------- next part -------------- An HTML attachment was scrubbed... URL: From j.d.mclean at outlook.com Thu Nov 13 16:46:26 2014 From: j.d.mclean at outlook.com (John McLean) Date: Thu, 13 Nov 2014 08:46:26 -0800 Subject: [Pki-users] Using the linux sscep client with dogtag 10.1.2-2.fc20 Message-ID: Wondering if anyone is using the linux sscep client with Dogtag 10/fc20 and could shed some light on the command lines for "sscep getca ..." and "sscep enroll ..." Been combing through the documentation but everything seems to be describing older versions of dogtag, 1.3 and 9. From http://pki.fedoraproject.org/wiki/SCEP_in_Dogtag This example points to ca/cgi-bin/pkiclient.exe. In dogtag 10.1.2-2.fc20 theres: /usr/share/pki/ra/docroot/ee/scep/pkiclient.cgi Has anybody had any success in using this? Have I missed some newer docs somewhere? Much thanks, J. -------------- next part -------------- An HTML attachment was scrubbed... URL: From techpkiuser at gmail.com Fri Nov 14 06:31:18 2014 From: techpkiuser at gmail.com (pki tech) Date: Fri, 14 Nov 2014 12:01:18 +0530 Subject: [Pki-users] Urgent Help Needed - CA subsystem certificate renewal Message-ID: Dear All, In our Issuing CA, all the subsystem certificates are expired except the caSigningCert. I can generate the new certificate requests via certutil, but how can i get them signed? your swift response is appreciated. Regards, Kamal -------------- next part -------------- An HTML attachment was scrubbed... URL: From jmagne at redhat.com Fri Nov 14 18:11:14 2014 From: jmagne at redhat.com (John Magne) Date: Fri, 14 Nov 2014 13:11:14 -0500 (EST) Subject: [Pki-users] Urgent Help Needed - CA subsystem certificate renewal In-Reply-To: References: Message-ID: <1608008823.9172537.1415988674255.JavaMail.zimbra@redhat.com> Hi: If you could, could you tell us exactly which certs are expired? Also, related how much functionality does your CA have? Does it even start and field requests? thanks, jack ----- Original Message ----- > From: "pki tech" > To: pki-users at redhat.com > Sent: Thursday, November 13, 2014 10:31:18 PM > Subject: [Pki-users] Urgent Help Needed - CA subsystem certificate renewal > > Dear All, > > In our Issuing CA, all the subsystem certificates are expired except the > caSigningCert. > > I can generate the new certificate requests via certutil, but how can i get > them signed? > > your swift response is appreciated. > > Regards, > Kamal > > _______________________________________________ > Pki-users mailing list > Pki-users at redhat.com > https://www.redhat.com/mailman/listinfo/pki-users From techpkiuser at gmail.com Sat Nov 15 13:42:55 2014 From: techpkiuser at gmail.com (Kamal Perera) Date: Sat, 15 Nov 2014 19:12:55 +0530 Subject: [Pki-users] Urgent Help Needed - CA subsystem certificate renewal In-Reply-To: <1608008823.9172537.1415988674255.JavaMail.zimbra@redhat.com> References: <1608008823.9172537.1415988674255.JavaMail.zimbra@redhat.com> Message-ID: Dear John (remembering the movie dear John :)) Thank you for replying. all the four certificates (casubsystemCert, auditSigningCert, ocspSigningCert and serverCert) were expired, however after several tries, i was able to renew them by changing the system date back to a valid time and renew them via the pkiconsole. Although it was successful, now RA and OCSP are not communicating with the CA. Which means, OCSP updates are not being published, and RA requests are not being signed (getting the CA:invalid request error). Any suggestion? On Fri, Nov 14, 2014 at 11:41 PM, John Magne wrote: > Hi: > > If you could, could you tell us exactly which certs are expired? > > Also, related how much functionality does your CA have? Does it > even start and field requests? > > thanks, > jack > > > > ----- Original Message ----- > > From: "pki tech" > > To: pki-users at redhat.com > > Sent: Thursday, November 13, 2014 10:31:18 PM > > Subject: [Pki-users] Urgent Help Needed - CA subsystem certificate > renewal > > > > Dear All, > > > > In our Issuing CA, all the subsystem certificates are expired except the > > caSigningCert. > > > > I can generate the new certificate requests via certutil, but how can i > get > > them signed? > > > > your swift response is appreciated. > > > > Regards, > > Kamal > > > > _______________________________________________ > > Pki-users mailing list > > Pki-users at redhat.com > > https://www.redhat.com/mailman/listinfo/pki-users > -------------- next part -------------- An HTML attachment was scrubbed... URL: From alee at redhat.com Tue Nov 18 15:27:52 2014 From: alee at redhat.com (Ade Lee) Date: Tue, 18 Nov 2014 10:27:52 -0500 Subject: [Pki-users] Urgent Help Needed - CA subsystem certificate renewal In-Reply-To: References: <1608008823.9172537.1415988674255.JavaMail.zimbra@redhat.com> Message-ID: <1416324472.25186.23.camel@aleeredhat.laptop> The RA communicates with the CA using its subsystem cert. Is that cert expired too? You should look at the logs on the RA and the CA to try to see why the requests are not being processed correctly. Ade On Sat, 2014-11-15 at 19:12 +0530, Kamal Perera wrote: > Dear John (remembering the movie dear John :)) > > > Thank you for replying. > > > all the four certificates (casubsystemCert, auditSigningCert, > ocspSigningCert and serverCert) were expired, however after several > tries, i was able to renew them by changing the system date back to a > valid time and renew them via the pkiconsole. > > > Although it was successful, now RA and OCSP are not communicating with > the CA. Which means, OCSP updates are not being published, and RA > requests are not being signed (getting the CA:invalid request error). > > > Any suggestion? > > > On Fri, Nov 14, 2014 at 11:41 PM, John Magne > wrote: > Hi: > > If you could, could you tell us exactly which certs are > expired? > > Also, related how much functionality does your CA have? Does > it > even start and field requests? > > thanks, > jack > > > > ----- Original Message ----- > > From: "pki tech" > > To: pki-users at redhat.com > > Sent: Thursday, November 13, 2014 10:31:18 PM > > Subject: [Pki-users] Urgent Help Needed - CA subsystem > certificate renewal > > > > Dear All, > > > > In our Issuing CA, all the subsystem certificates are > expired except the > > caSigningCert. > > > > I can generate the new certificate requests via certutil, > but how can i get > > them signed? > > > > your swift response is appreciated. > > > > Regards, > > Kamal > > > > > _______________________________________________ > > Pki-users mailing list > > Pki-users at redhat.com > > https://www.redhat.com/mailman/listinfo/pki-users > > > _______________________________________________ > Pki-users mailing list > Pki-users at redhat.com > https://www.redhat.com/mailman/listinfo/pki-users From techpkiuser at gmail.com Wed Nov 19 03:11:54 2014 From: techpkiuser at gmail.com (Kamal Perera) Date: Wed, 19 Nov 2014 08:41:54 +0530 Subject: [Pki-users] Urgent Help Needed - CA subsystem certificate renewal In-Reply-To: <1416324472.25186.23.camel@aleeredhat.laptop> References: <1608008823.9172537.1415988674255.JavaMail.zimbra@redhat.com> <1416324472.25186.23.camel@aleeredhat.laptop> Message-ID: No all the certificates of RA are not expired. In the case of OCSP, once the CA system certificates are renewed, CA subSystemCert should be replaced in the OCSP via the pkiconsole. How can we do that in the RA? On Tue, Nov 18, 2014 at 8:57 PM, Ade Lee wrote: > The RA communicates with the CA using its subsystem cert. > Is that cert expired too? > > You should look at the logs on the RA and the CA to try to see why the > requests are not being processed correctly. > > Ade > > On Sat, 2014-11-15 at 19:12 +0530, Kamal Perera wrote: > > Dear John (remembering the movie dear John :)) > > > > > > Thank you for replying. > > > > > > all the four certificates (casubsystemCert, auditSigningCert, > > ocspSigningCert and serverCert) were expired, however after several > > tries, i was able to renew them by changing the system date back to a > > valid time and renew them via the pkiconsole. > > > > > > Although it was successful, now RA and OCSP are not communicating with > > the CA. Which means, OCSP updates are not being published, and RA > > requests are not being signed (getting the CA:invalid request error). > > > > > > Any suggestion? > > > > > > On Fri, Nov 14, 2014 at 11:41 PM, John Magne > > wrote: > > Hi: > > > > If you could, could you tell us exactly which certs are > > expired? > > > > Also, related how much functionality does your CA have? Does > > it > > even start and field requests? > > > > thanks, > > jack > > > > > > > > ----- Original Message ----- > > > From: "pki tech" > > > To: pki-users at redhat.com > > > Sent: Thursday, November 13, 2014 10:31:18 PM > > > Subject: [Pki-users] Urgent Help Needed - CA subsystem > > certificate renewal > > > > > > Dear All, > > > > > > In our Issuing CA, all the subsystem certificates are > > expired except the > > > caSigningCert. > > > > > > I can generate the new certificate requests via certutil, > > but how can i get > > > them signed? > > > > > > your swift response is appreciated. > > > > > > Regards, > > > Kamal > > > > > > > > _______________________________________________ > > > Pki-users mailing list > > > Pki-users at redhat.com > > > https://www.redhat.com/mailman/listinfo/pki-users > > > > > > _______________________________________________ > > Pki-users mailing list > > Pki-users at redhat.com > > https://www.redhat.com/mailman/listinfo/pki-users > > > -------------- next part -------------- An HTML attachment was scrubbed... URL: From WilliamC.Elliott at s-itsolutions.at Tue Nov 25 12:23:13 2014 From: WilliamC.Elliott at s-itsolutions.at (Elliott William C OSS sIT) Date: Tue, 25 Nov 2014 12:23:13 +0000 Subject: [Pki-users] SCEP Enrollment fails with Certificate not found . References: <85C87A9995875247B2DD471950E0AE4D1B844DC5@M0182.s-mxs.net> <542C9587.6080107@redhat.com> <542C98FC.3040209@redhat.com> Message-ID: <85C87A9995875247B2DD471950E0AE4D1B871CC7@M0182.s-mxs.net> We want to post the results of our solution to problem(s) we were having. In all, we had three different issues to overcome to get SCEP Enrollment working under RHEL6/Dogtag 9 when using Safenet HSMs. 1. "Certificate not found: osstest:caSigningCert cert-pki-testca1" This message is somewhat misleading because the correct combination of token and CA nickname are displayed. However the debug messages from method CryptoContext show that mNickname incorrectly has the token name prepended twice, and is what throws the exception: [05/Nov/2014:13:29:59][http-9180-1]: CRSEnrollment: CryptoContext: token name: osstest' [05/Nov/2014:13:29:59][http-9180-1]: CRSEnrollment: CryptoContext: mNickname: 'osstest:osstest:caSigningCert cert-pki-testca1' As described in my first post, mNickname is modified with every call to CryptoContext - an additional token name is then prepended with every call. In fact, using a HSM, the CA nickname already contains the token name when mNickname is set in init(), and needs never be prepended. Commenting out the offending line in CrypoContext() resolves the issue, when a HSM is used: pki-core-9.0.3-38.el6_6.src.rpm and pki-core-9.0.3-32.el6.src.rpm - both are identical in CRSEnrollment.java: 1973 if (mTokenName.equalsIgnoreCase(Constants.PR_INTERNAL_TOKEN) || 1974 mTokenName.equalsIgnoreCase("Internal Key Storage Token") || 1975 mTokenName.length() == 0) { 1976 keyStorageToken = cm.getInternalKeyStorageToken(); 1977 internalKeyStorageToken = keyStorageToken; 1978 CMS.debug("CRSEnrollment: CryptoContext: internal token name: '"+mTokenName+"'"); 1979 } else { 1980 keyStorageToken = cm.getTokenByName(mTokenName); 1981 internalKeyStorageToken = null; 1982 // mNickname = mTokenName + ":" + mNickname; 1983 CMS.debug("CRSEnrollment: CryptoContext: token name: "+mTokenName+"'"); 1984 } For some reason, the following relatively careful conditional prepending of the token name was removed from the init() methond and placed into CryptoContext() in version 9.0.3 that is packaged with RHEL6. In these versions we tested, mNickname is brutally prepended with every call. The following version 9 in the Dogtag git repository still had it right, and also in version 10 it's also correct again: DOGTAG_9_0_FEDORA_15_16_17_20111028 176 if (!(mTokenName.equalsIgnoreCase(Constants.PR_INTERNAL_TOKEN) || 177 mTokenName.equalsIgnoreCase("Internal Key Storage Token") || 178 mTokenName.length() == 0)) { 179 int i = mNickname.indexOf(':'); 180 if (!((i > -1) && (mTokenName.length() == i) && (mNickname.startsWith(mTokenName)))) { 181 mNickname = mTokenName + ":" + mNickname; 182 } 183 } DOGTAG_10_1_1_1_FEDORA_20_20140321 248 if (!(mTokenName.equalsIgnoreCase(Constants.PR_INTERNAL_TOKEN) || 249 mTokenName.equalsIgnoreCase("Internal Key Storage Token") || mTokenName.length() == 0)) { 250 int i = mNickname.indexOf(':'); 251 if (!((i > -1) && (mTokenName.length() == i) && (mNickname.startsWith(mTokenName)))) { 252 mNickname = mTokenName + ":" + mNickname; 253 } 254 } ******************* Should we submit a bug report for this in the current RHEL6 packages? We'd love to see this fixed in the RH packages and not have to compile our own packages with every update of RHEL6. ******************* 2. Could not to unwrap PKCS10 blob [14/Nov/2014:08:30:08][http-9180-1]: failed to unwrap PKCS10 org.mozilla.jss.crypto.SymmetricKey$NotExtractableException [14/Nov/2014:08:30:08][http-9180-1]: ServletException javax.servlet.ServletException: Couldn't handle CEP request (PKCSReq) - Could not unwrap PKCS10 blob: null Here, the CA is unable to process requests from the client (again sscep) encrypted with 3DES although this is the single allowed algorithm enabled by default. I have no idea what is causing this error, but the workaround is to fall back to DES: allow DES in CS.cfg and configure it on the client. When using no HSM, just a local nss keystore, the error doesn't occur. 3. FIPS 140-2 mode The same error message in 2. occurs when the HSM is _not_ in FIPS mode. Both RHEL6/Dogtag 9 and RHEL5/Dogtag 1.3 LunaSA 4 and 5. Without FIPS mode activated, all requests fail with Could not unwrap PKCS10 blob: null. (also when des is used for request) Workaround: activate FIPS mode on the HSM. - Case 3. (and maybe case 2.) is very similar to, if not related to [the still open] Bug 825887 (https://bugzilla.redhat.com/show_bug.cgi?id=825887). There, it was the activation of FIPS mode for a local NSS database which triggered the issue. (I assume that FIPS mode for NSS prevents the cloning/exporting of keys - which is of course always the behavior of the HSM, regardless of FIPS mode. ) Our requests also failed at exactly the same call getDESKeyGenerator().clone as described in the Bug 825887. Best regards, William -----Original Message----- From: Elliott William C OSS sIT Sent: Dienstag, 21. Oktober 2014 14:55 To: pki-users at redhat.com Subject: RE: [Pki-users] SCEP Enrollment fails with Certificate not found . [heur][html-removed] (sorry for the delay - I was out of the office for some time) The package version we're trying is pki-ca-9.0.3-32.el6.noarch, on RHEL6 as I said. But since the last email we've also tried 9.0.3-38, with the same result. We always ran through the wizard panels using all default values, changing nothing, but now we configure the ca with pkisilent with the same default values to make sure the configuration doesn't change from one test to the next. The only change we make is afterwords to enable scep in the config: ca.scep.allowedEncryptionAlgorithms=DES3 ca.scep.allowedHashAlgorithms=SHA1,SHA256,SHA512 ca.scep.enable=true ca.scep.encryptionAlgorithm=DES3 ca.scep.hashAlgorithm=SHA1 ca.scep.nonceSizeLimit=16 The whole thing always works fine when we use the internal token (and with RHEL5/Dogtag 1.3 on the hsm), but throws the exception when the hsm is used as token. We use sscep to submit requests to the ca. We had never set the two parameters (scep.nickname, scep.tokenname) you suggested trying. Here are the results of your suggestions below : ** 1. This is our current configuration which always produces the exception. From debug log: CRSEnrollment: init: SCEP support is enabled. CRSEnrollment: init: SCEP nickname: osstest:caSigningCert cert-pki-testca1 CRSEnrollment: init: CA nickname: osstest:caSigningCert cert-pki-testca1 CRSEnrollment: init: Token name: osstest CRSEnrollment: init: Is SCEP using CA keys: true CRSEnrollment: init: mNonceSizeLimit: 16 CRSEnrollment: init: mHashAlgorithm: SHA1 CRSEnrollment: init: mHashAlgorithmList: SHA1,SHA256,SHA512 CRSEnrollment: init: mAllowedHashAlgorithm[0]=SHA1 CRSEnrollment: init: mAllowedHashAlgorithm[1]=SHA256 CRSEnrollment: init: mAllowedHashAlgorithm[2]=SHA512 CRSEnrollment: init: mEncryptionAlgorithm: DES3 CRSEnrollment: init: mEncryptionAlgorithmList: DES3 CRSEnrollment: init: mAllowedEncryptionAlgorithm[0]=DES3 CRSEnrollment: init: mProfileId=caRouterCert ... CRSEnrollment: CryptoContext: token name: osstest' CRSEnrollment: CryptoContext: mNickname: 'osstest:osstest:caSigningCert cert-pki-testca1' handlePKIMessage exception com.netscape.cms.servlet.cert.scep.CRSEnrollment$CryptoContext$CryptoContextException: Certificate not found: osstest:caSigningCert cert-pki-testca1 com.netscape.cms.servlet.cert.scep.CRSEnrollment$CryptoContext$CryptoContextException: Certificate not found: osstest:caSigningCert cert-pki-testca1 at com.netscape.cms.servlet.cert.scep.CRSEnrollment$CryptoContext.(CRSEnrollment.java:2026) ... ** 2. Setting ca.scep.nickname at first produced no discernable change, other than, requests for the ca cert. with "sscep getca" then fail reliably. Due to token name not being set: From debug log: CRSEnrollment: init: SCEP support is enabled. CRSEnrollment: init: SCEP nickname: caSigningCert cert-pki-testca1 CRSEnrollment: init: CA nickname: osstest:caSigningCert cert-pki-testca1 CRSEnrollment: init: Token name: CRSEnrollment: init: Is SCEP using CA keys: false CRSEnrollment: init: mNonceSizeLimit: 16 CRSEnrollment: init: mHashAlgorithm: SHA1 CRSEnrollment: init: mHashAlgorithmList: SHA1,SHA256,SHA512 CRSEnrollment: init: mAllowedHashAlgorithm[0]=SHA1 CRSEnrollment: init: mAllowedHashAlgorithm[1]=SHA256 CRSEnrollment: init: mAllowedHashAlgorithm[2]=SHA512 CRSEnrollment: init: mEncryptionAlgorithm: DES3 CRSEnrollment: init: mEncryptionAlgorithmList: DES3 CRSEnrollment: init: mAllowedEncryptionAlgorithm[0]=DES3 CRSEnrollment: init: mProfileId=caRouterCert ... CRSEnrollment: CryptoContext: internal token name: '' CRSEnrollment: CryptoContext: mNickname: 'caSigningCert cert-pki-testca1' handlePKIMessage exception com.netscape.cms.servlet.cert.scep.CRSEnrollment$CryptoContext$CryptoContextException: Certificate not found: osstest:caSigningCert cert-pki-testca1 com.netscape.cms.servlet.cert.scep.CRSEnrollment$CryptoContext$CryptoContextException: Certificate not found: osstest:caSigningCert cert-pki-testca1 at com.netscape.cms.servlet.cert.scep.CRSEnrollment$CryptoContext.(CRSEnrollment.java:2026) ... ** 3. setting both ca.scep.nickname and ca.scep.tokenname also does not get around the problem. From debug log: CRSEnrollment: init: SCEP support is enabled. CRSEnrollment: init: SCEP nickname: caSigningCert cert-pki-testca1 CRSEnrollment: init: CA nickname: osstest:caSigningCert cert-pki-testca1 CRSEnrollment: init: Token name: osstest CRSEnrollment: init: Is SCEP using CA keys: false CRSEnrollment: init: mNonceSizeLimit: 16 CRSEnrollment: init: mHashAlgorithm: SHA1 CRSEnrollment: init: mHashAlgorithmList: SHA1,SHA256,SHA512 CRSEnrollment: init: mAllowedHashAlgorithm[0]=SHA1 CRSEnrollment: init: mAllowedHashAlgorithm[1]=SHA256 CRSEnrollment: init: mAllowedHashAlgorithm[2]=SHA512 CRSEnrollment: init: mEncryptionAlgorithm: DES3 CRSEnrollment: init: mEncryptionAlgorithmList: DES3 CRSEnrollment: init: mAllowedEncryptionAlgorithm[0]=DES3 CRSEnrollment: init: mProfileId=caRouterCert ... CRSEnrollment: CryptoContext: token name: osstest' <-- from sscep getca request CRSEnrollment: CryptoContext: mNickname: 'osstest:caSigningCert cert-pki-testca1' ... CRSEnrollment: CryptoContext: token name: osstest' CRSEnrollment: CryptoContext: mNickname: 'osstest:osstest:caSigningCert cert-pki-testca1' <-- from sscep enroll request handlePKIMessage exception com.netscape.cms.servlet.cert.scep.CRSEnrollment$CryptoContext$CryptoContextException: Certificate not found: osstest:caSigningCert cert-pki-testca1 com.netscape.cms.servlet.cert.scep.CRSEnrollment$CryptoContext$CryptoContextException: Certificate not found: osstest:caSigningCert cert-pki-testca1 at com.netscape.cms.servlet.cert.scep.CRSEnrollment$CryptoContext.(CRSEnrollment.java:2026) at com.netscape.cms.servlet.cert.scep.CRSEnrollment.handlePKIOperation(CRSEnrollment.java:803) at com.netscape.cms.servlet.cert.scep.CRSEnrollment.service(CRSEnrollment.java:297) best regards, William -----Original Message----- From: pki-users-bounces at redhat.com [mailto:pki-users-bounces at redhat.com] On Behalf Of Christina Fu Sent: Donnerstag, 02. Oktober 2014 02:15 To: pki-users at redhat.com Subject: Re: [Pki-users] SCEP Enrollment fails with Certificate not found . [heur][html-removed] btw, I'm not suggesting that you need either or both config params. three sets of config you can try: 1. don't specify either ca.scep.nickname or ca.scep.tokenname (I think by default it takes the ca signing cert, if that's what you intend to use anyway) 2. specify nickname only ca.scep.nickname (without the token) ca.scep.nickname=caSigningCert cert-pki-testca1 (I think by default, if the nickname you specified matches that of the ca, it will find the token for you) 3. specify both nickname and token: ca.scep.nickname=caSigningCert cert-pki-testca1 ca.scep.tokenname=osstest (last resort, because when you do this, it thinks it's not using the ca signing cert.. ) Let us know. Christina On 10/01/2014 05:00 PM, Christina Fu wrote: > What's your scep config values, specifically: > ca.scep.nickname > ca.scep.tokenname > > Christina > > On 09/29/2014 04:55 AM, Elliott William C OSS sIT wrote: >> >> Hello, >> >> We are currently trying to get a new RHEL6/Dogtag 9 with Safenet HSMs >> setup for SCEP enrollment. But, no matter whether we try the older >> HSMs( LunaSA 4) or the newer (LunaSA 5) we cannot complete a >> successful SCEP request. The following exception occurs in the debug log: >> >> [29/Sep/2014:13:41:17][http-9180-1]: operation=PKIOperation >> >> [29/Sep/2014:13:41:17][http-9180-1]: >> message=MIIHDQYJKoZIhvcNAQcCoIIG/jCCBvoCAQExDjAMBggqhkiG9w0CBQUAMIIDZQYJ >> >> KoZIhvcNAQcBoIIDVgSCA1IwggNOBgkqhkiG9w0BBwOgggM/MIIDOwIBADGCAW4w >> >> ggFqAgEAMFIwTTEVMBMGA1UEChMMRWJMYW4gRG9tYWluMRQwEgYDVQQLEwtwa2kt >> >> dGVzdGNhMTEeMBwGA1UEAxMVQ2VydGlmaWNhdGUgQXV0aG9yaXR5AgEBMA0GCSqG >> >> SIb3DQEBAQUABIIBADJhcbvaLYwGrTA6W1G+xB2BuHKJKnQ9DL+KsGWGuVh94CaH >> >> 7QAs2fbWcswpD6yhRDTirMS9gXBkdIdEZtGWvMKcZYpLbAxtoE/2V3oa9D5fdwjP >> >> RaLAt5rh6afS/pPbpdCkTYvHZZu7Y1//UDSP7Jkli/oBVE/vYEkteTgFlOgPhNJs >> >> HN/xVJAHJniIzJMc48YojxT8angpN045K+lAFldwsq5RpwS2szH7jaQeGsn5bx+r >> >> SQrEcPYz4noj9GnlzrOAnpvLK8XanJUj6KF4w8Am/adJhTRZrwAc6PVr88BO367g >> >> rjHcNApluo0m4+5DxvC8x7ri4N3wusfRN/oBpkMwggHCBgkqhkiG9w0BBwEwEQYF >> >> Kw4DAgcECGugmAolmOqhgIIBoIaPJ2m6nhY6DsUUBHGGqZRqVvlXimRX++u6UtWM >> >> X0r2jjmCfzpKuijFApiYAdrQzewMjk5AvLE0Pu6cH8mL7Sq973d8zG1vdqAQWZbW >> >> m8C6VRrpD9vw1Yd+q9Ma9UWSqIK0BicuqQk9jWRZVNWmVQT/q3Ht/+7s4rS7iiNu >> >> udSV9MAMAeZsR/AQh1f2DDMCtu2CKsRsQi+qL3gGO2YYQpmbTVBwIPj0O9X664qc >> >> AEqcFFUcGYlb5ES9RMmXtYWJb6rkrAQdWs8MPaaUuVON+t26mim9RazteY5dQ4rT >> >> l7UFujI+pIdc8JXflJ/SaJDb7USl1Y89OMS+j6Uxi1qimhzjedLmhpS27wKH1x61 >> >> JfEPqypjsz/AdKYiYH1IOXT3wVq52cpxOMlMpLEOl2eK3QCmvQMef1e9cmnku3fz >> >> cglipc6hT90ca/ugJWlXI84zlppEvKAJ3zqOtmJAf2TYcU++Cyg4Ai/Bi0Szon5z >> >> gOsL1Qpo8YdrmzHL4KbfAHGE7T/QCGA/CszbANL7aTMh4SNC6/A6ZIwoPDmTePNB >> >> dB0IoIIByzCCAccwggEwoAMCAQICIDRDNENCNUVFOUZGRkVCRkQzMUY5M0QwREJG >> >> NTZGMUY3MA0GCSqGSIb3DQEBBAUAMBoxGDAWBgNVBAMTDzAxMC4wMDAuMDAwLjAy >> >> MTAeFw0xNDA5MjkxMTQxMTdaFw0xNDEwMDUxMzQxMTdaMBoxGDAWBgNVBAMTDzAx >> >> MC4wMDAuMDAwLjAyMTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEA4vzJ7zuF >> >> gzXYtHQEDehMN+WniECBX9q6cV7ixr/F/Qn7ItbIiUrRfwMk+2orzSVRANE0dpBM >> >> rqohSq6USOoXwLp/YkITA5RNiQn5LRyebfWgul0IIgioq6L6EI88PG+elBbN2dip >> >> 9sjbedJlgIB+zxJ506f0Qf23nYJScdaJ/x8CAwEAATANBgkqhkiG9w0BAQQFAAOB >> >> gQCWENzZzQD6Dj88f33Y8aVY8DQoZjl/sIRHtPjJOKgINJrIt1bU2mlwQ2IrYtrN >> >> L2lv4UOpD9JsprK6FZb0XMMxZotCpXDHZevstDIq745srkHvZK15USjNY2QDvhOp >> >> e8YRESZf64jH7dAkiiFgJU7k6NZRNrIb5l8BuVd1K6sh4jGCAaswggGnAgEBMD4w >> >> GjEYMBYGA1UEAxMPMDEwLjAwMC4wMDAuMDIxAiA0QzRDQjVFRTlGRkZFQkZEMzFG >> >> OTNEMERCRjU2RjFGNzAMBggqhkiG9w0CBQUAoIHBMBIGCmCGSAGG+EUBCQIxBBMC >> >> MTkwGAYJKoZIhvcNAQkDMQsGCSqGSIb3DQEHATAcBgkqhkiG9w0BCQUxDxcNMTQw >> >> OTI5MTE0MTE3WjAfBgkqhkiG9w0BCQQxEgQQRAdYc3/0mIu36+n+4HjzcTAgBgpg >> >> hkgBhvhFAQkFMRIEEFgpmRCbIFZei2tsCn8+fx8wMAYKYIZIAYb4RQEJBzEiEyA0 >> >> QzRDQjVFRTlGRkZFQkZEMzFGOTNEMERCRjU2RjFGNzANBgkqhkiG9w0BAQEFAASB >> >> gDXExABpVsRfVAK8yB3C2N1v89zLSygNgejlh6UtB2Dq8gXW1Qmb+d03PZQzmFbH >> >> eaJKV9+5pIsKchOedlsaAks2ZSHw9Pj8is9mIRYM5pADo1BoEcsszshV2G5DKDwm >> >> /oBmEEz/Lwysh4v4GyZwcQad/xYjCODUt83k3s18LWS+ >> >> [29/Sep/2014:13:41:17][http-9180-1]: CRSEnrollment: CryptoContext: >> token name: osstest' >> >> [29/Sep/2014:13:41:17][http-9180-1]: CRSEnrollment: CryptoContext: >> mNickname: '*osstest:osstest*:caSigningCert cert-pki-testca1' >> >> [29/Sep/2014:13:41:17][http-9180-1]: handlePKIMessage exception >> com.netscape.cms.servlet.cert.scep.CRSEnrollment$CryptoContext$CryptoContextException: >> Certificate not found: osstest:caSigningCert cert-pki-testca1 >> >> com.netscape.cms.servlet.cert.scep.CRSEnrollment$CryptoContext$CryptoContextException: >> Certificate not found: osstest:caSigningCert cert-pki-testca1 >> >> at >> com.netscape.cms.servlet.cert.scep.CRSEnrollment$CryptoContext.(CRSEnrollment.java:2026) >> >> at >> com.netscape.cms.servlet.cert.scep.CRSEnrollment.handlePKIOperation(CRSEnrollment.java:803) >> >> at >> com.netscape.cms.servlet.cert.scep.CRSEnrollment.service(CRSEnrollment.java:297) >> >> at javax.servlet.http.HttpServlet.service(HttpServlet.java:717) >> >> at >> org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:290) >> >> at >> org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206) >> >> at >> com.netscape.cms.servlet.filter.EERequestFilter.doFilter(EERequestFilter.java:176) >> >> at >> org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:235) >> >> at >> org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206) >> >> at >> org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:233) >> >> at >> org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:191) >> >> at >> org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:127) >> >> at >> org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:102) >> >> at >> org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:109) >> >> at >> org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:298) >> >> at >> org.apache.coyote.http11.Http11Processor.process(Http11Processor.java:857) >> >> at >> org.apache.coyote.http11.Http11Protocol$Http11ConnectionHandler.process(Http11Protocol.java:588) >> >> at >> org.apache.tomcat.util.net.JIoEndpoint$Worker.run(JIoEndpoint.java:489) >> >> at java.lang.Thread.run(Thread.java:701) >> >> [29/Sep/2014:13:41:17][http-9180-1]: ServletException >> javax.servlet.ServletException: Failed to process message in CEP >> servlet: Certificate not found: osstest:caSigningCert cert-pki-testca1 >> >> What stands out is the line with mNickname. After restarting the >> service, with the first request, the HSM token name appears to be >> listed twice in the *mNickname* string. Interestingly, with each new >> request, the number of token names increases by one in the string. >> i.e. with the 2^nd attempt, the same exception occurs but the token >> name appears three times: >> >> [29/Sep/2014:13:41:17][http-9180-1]: CRSEnrollment: CryptoContext: >> token name: osstest' >> >> [29/Sep/2014:13:41:17][http-9180-1]: CRSEnrollment: CryptoContext: >> mNickname: '*osstest:osstest:osstest*:caSigningCert cert-pki-testca1' >> >> [29/Sep/2014:13:41:17][http-9180-1]: handlePKIMessage exception >> com.netscape.cms.servlet.cert.scep.CRSEnrollment$CryptoContext$CryptoContextException: >> Certificate not found: osstest:caSigningCert cert-pki-testca1 >> >> com.netscape.cms.servlet.cert.scep.CRSEnrollment$CryptoContext$CryptoContextException: >> Certificate not found: osstest:caSigningCert cert-pki-testca1 >> >> at >> com.netscape.cms.servlet.cert.scep.CRSEnrollment$CryptoContext.(CRSEnrollment.java:2026) >> >> at >> com.netscape.cms.servlet.cert.scep.CRSEnrollment.handlePKIOperation(CRSEnrollment.java:803) >> >> at >> com.netscape.cms.servlet.cert.scep.CRSEnrollment.service(CRSEnrollment.java:297) >> >> at javax.servlet.http.HttpServlet.service(HttpServlet.java:717) >> >> at >> org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:290) >> >> at >> org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206) >> >> at >> com.netscape.cms.servlet.filter.EERequestFilter.doFilter(EERequestFilter.java:176) >> >> at >> org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:235) >> >> at >> org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206) >> >> at >> org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:233) >> >> at >> org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:191) >> >> at >> org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:127) >> >> at >> org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:102) >> >> at >> org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:109) >> >> at >> org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:298) >> >> at >> org.apache.coyote.http11.Http11Processor.process(Http11Processor.java:857) >> >> at >> org.apache.coyote.http11.Http11Protocol$Http11ConnectionHandler.process(Http11Protocol.java:588) >> >> at >> org.apache.tomcat.util.net.JIoEndpoint$Worker.run(JIoEndpoint.java:489) >> >> at java.lang.Thread.run(Thread.java:701) >> >> [29/Sep/2014:13:41:17][http-9180-1]: ServletException >> javax.servlet.ServletException: Failed to process message in CEP >> servlet: Certificate not found: osstest:caSigningCert cert-pki-testca1 >> >> As mentioned, the exception occurs with both versions 4 and 5 of >> LunaSA. (We currently have RHEL5 systems with Dogtag 1.3 operating >> with SCEP enrollment.) With local tokens, (no HSMs) the error does >> not occur. >> >> Any Ideas, how we can track this down? We definitely need to get this >> running. >> >> Best regards! >> >> William Elliott >> >> s IT Solutions >> >> Open System Services >> >> s IT Solutions AT Spardat GmbH >> >> A-1110 Wien, Geiselbergstra?e 21 - 25 >> >> Phone: +43 (0)5 0100 - 39376 >> >> Fax: +43 (0)5 0100 9 - 39376 >> >> Mobile: +43 (0)5 0100 6 - 39376 >> >> _mailto:william.elliott at s-itsolutions.at >> _ >> >> www.s-itsolutions.com >> >> Head Office: Vienna Commercial Register No.: 152289f Commercial Court >> of Vienna >> >> This message and any attached files are confidential and intended >> solely for the addressee(s). Any publication, transmission or other >> use of the information by a person or entity other than the intended >> addressee is prohibited. If you receive this in error please contact >> the sender and delete the material. The sender does not accept >> liability for any errors or omissions as a result of the transmission. >> >> >> >> _______________________________________________ >> Pki-users mailing list >> Pki-users at redhat.com >> https://www.redhat.com/mailman/listinfo/pki-users > > > > _______________________________________________ > Pki-users mailing list > Pki-users at redhat.com > https://www.redhat.com/mailman/listinfo/pki-users _______________________________________________ Pki-users mailing list Pki-users at redhat.com https://www.redhat.com/mailman/listinfo/pki-users From cfu at redhat.com Tue Nov 25 17:57:03 2014 From: cfu at redhat.com (Christina Fu) Date: Tue, 25 Nov 2014 09:57:03 -0800 Subject: [Pki-users] SCEP Enrollment fails with Certificate not found . In-Reply-To: <85C87A9995875247B2DD471950E0AE4D1B871CC7@M0182.s-mxs.net> References: <85C87A9995875247B2DD471950E0AE4D1B844DC5@M0182.s-mxs.net> <542C9587.6080107@redhat.com> <542C98FC.3040209@redhat.com> <85C87A9995875247B2DD471950E0AE4D1B871CC7@M0182.s-mxs.net> Message-ID: <5474C2EF.8010805@redhat.com> Hi William, Thank you very much for your feedback. I find helping people like you very rewarding. I do not have time to read it through carefully at the moment, but could you please file two bug? One for #1 and one for the LunaSA unwrapping related issues. You can just copy and paste the relevant portion of your email into each bug. Here is the info: http://pki.fedoraproject.org/wiki/PKI_Bugs btw, out of curiosity, can you search in your debug log for the string: "handlePKIOperation: Encryption algorithm" What algorithm does it say? Please put that in bug #2 as well. Each HSM actually requires different flags and attributes to work. For example, to unwrap, Lunasa would require sensitive to be false and extractable to be true, while Thales nethsm would require sensitive to be false and extractable to be false. key types make a difference too for rsa and ecc keys need different attributes. I suspect the code in the SCEP part of the woods might not have been tuned to handle such differences. thanks, Christina On 11/25/2014 04:23 AM, Elliott William C OSS sIT wrote: > We want to post the results of our solution to problem(s) we were having. > > In all, we had three different issues to overcome to get SCEP Enrollment working under RHEL6/Dogtag 9 when using Safenet HSMs. > > > 1. "Certificate not found: osstest:caSigningCert cert-pki-testca1" > > This message is somewhat misleading because the correct combination of token and CA nickname are displayed. However the debug messages from > method CryptoContext show that mNickname incorrectly has the token name prepended twice, and is what throws the exception: > > [05/Nov/2014:13:29:59][http-9180-1]: CRSEnrollment: CryptoContext: token name: osstest' > [05/Nov/2014:13:29:59][http-9180-1]: CRSEnrollment: CryptoContext: mNickname: 'osstest:osstest:caSigningCert cert-pki-testca1' > > As described in my first post, mNickname is modified with every call to CryptoContext - an additional token name is then prepended with every call. > In fact, using a HSM, the CA nickname already contains the token name when mNickname is set in init(), and needs never be prepended. > > Commenting out the offending line in CrypoContext() resolves the issue, when a HSM is used: > > pki-core-9.0.3-38.el6_6.src.rpm and pki-core-9.0.3-32.el6.src.rpm - both are identical in CRSEnrollment.java: > 1973 if (mTokenName.equalsIgnoreCase(Constants.PR_INTERNAL_TOKEN) || > 1974 mTokenName.equalsIgnoreCase("Internal Key Storage Token") || > 1975 mTokenName.length() == 0) { > 1976 keyStorageToken = cm.getInternalKeyStorageToken(); > 1977 internalKeyStorageToken = keyStorageToken; > 1978 CMS.debug("CRSEnrollment: CryptoContext: internal token name: '"+mTokenName+"'"); > 1979 } else { > 1980 keyStorageToken = cm.getTokenByName(mTokenName); > 1981 internalKeyStorageToken = null; > 1982 // mNickname = mTokenName + ":" + mNickname; > 1983 CMS.debug("CRSEnrollment: CryptoContext: token name: "+mTokenName+"'"); > 1984 } > > For some reason, the following relatively careful conditional prepending of the token name was removed from the init() methond and placed into CryptoContext() in version 9.0.3 that is packaged with RHEL6. In these versions we tested, mNickname is brutally prepended with every call. > > The following version 9 in the Dogtag git repository still had it right, and also in version 10 it's also correct again: > > DOGTAG_9_0_FEDORA_15_16_17_20111028 > 176 if (!(mTokenName.equalsIgnoreCase(Constants.PR_INTERNAL_TOKEN) || > 177 mTokenName.equalsIgnoreCase("Internal Key Storage Token") || > 178 mTokenName.length() == 0)) { > 179 int i = mNickname.indexOf(':'); > 180 if (!((i > -1) && (mTokenName.length() == i) && (mNickname.startsWith(mTokenName)))) { > 181 mNickname = mTokenName + ":" + mNickname; > 182 } > 183 } > > DOGTAG_10_1_1_1_FEDORA_20_20140321 > 248 if (!(mTokenName.equalsIgnoreCase(Constants.PR_INTERNAL_TOKEN) || > 249 mTokenName.equalsIgnoreCase("Internal Key Storage Token") || mTokenName.length() == 0)) { > 250 int i = mNickname.indexOf(':'); > 251 if (!((i > -1) && (mTokenName.length() == i) && (mNickname.startsWith(mTokenName)))) { > 252 mNickname = mTokenName + ":" + mNickname; > 253 } > 254 } > > > ******************* > Should we submit a bug report for this in the current RHEL6 packages? > We'd love to see this fixed in the RH packages and not have to compile our own packages with every update of RHEL6. > ******************* > > 2. Could not to unwrap PKCS10 blob > > [14/Nov/2014:08:30:08][http-9180-1]: failed to unwrap PKCS10 org.mozilla.jss.crypto.SymmetricKey$NotExtractableException > [14/Nov/2014:08:30:08][http-9180-1]: ServletException javax.servlet.ServletException: Couldn't handle CEP request (PKCSReq) - Could not unwrap PKCS10 blob: null > > Here, the CA is unable to process requests from the client (again sscep) encrypted with 3DES although this is the single allowed algorithm enabled by default. > I have no idea what is causing this error, but the workaround is to fall back to DES: allow DES in CS.cfg and configure it on the client. > When using no HSM, just a local nss keystore, the error doesn't occur. > > 3. FIPS 140-2 mode > > The same error message in 2. occurs when the HSM is _not_ in FIPS mode. Both RHEL6/Dogtag 9 and RHEL5/Dogtag 1.3 LunaSA 4 and 5. Without FIPS mode activated, all requests fail with Could not unwrap PKCS10 blob: null. (also when des is used for request) > > Workaround: activate FIPS mode on the HSM. - > > > Case 3. (and maybe case 2.) is very similar to, if not related to [the still open] Bug 825887 (https://bugzilla.redhat.com/show_bug.cgi?id=825887). There, it was the activation of FIPS mode for a local NSS database which triggered the issue. (I assume that FIPS mode for NSS prevents the cloning/exporting of keys - which is of course always the behavior of the HSM, regardless of FIPS mode. ) Our requests also failed at exactly the same call getDESKeyGenerator().clone as described in the Bug 825887. > > > Best regards, > William > > -----Original Message----- > From: Elliott William C OSS sIT > Sent: Dienstag, 21. Oktober 2014 14:55 > To: pki-users at redhat.com > Subject: RE: [Pki-users] SCEP Enrollment fails with Certificate not found . [heur][html-removed] > > (sorry for the delay - I was out of the office for some time) > > The package version we're trying is pki-ca-9.0.3-32.el6.noarch, on RHEL6 as I said. But since the last email we've also tried 9.0.3-38, with the same result. > We always ran through the wizard panels using all default values, changing nothing, but now we configure the ca with pkisilent with the same default values to make sure the configuration doesn't change from one test to the next. > > The only change we make is afterwords to enable scep in the config: > > ca.scep.allowedEncryptionAlgorithms=DES3 > ca.scep.allowedHashAlgorithms=SHA1,SHA256,SHA512 > ca.scep.enable=true > ca.scep.encryptionAlgorithm=DES3 > ca.scep.hashAlgorithm=SHA1 > ca.scep.nonceSizeLimit=16 > > The whole thing always works fine when we use the internal token (and with RHEL5/Dogtag 1.3 on the hsm), but throws the exception when the hsm is used as token. > We use sscep to submit requests to the ca. > > We had never set the two parameters (scep.nickname, scep.tokenname) you suggested trying. > Here are the results of your suggestions below : > > ** 1. This is our current configuration which always produces the exception. > From debug log: > CRSEnrollment: init: SCEP support is enabled. > CRSEnrollment: init: SCEP nickname: osstest:caSigningCert cert-pki-testca1 > CRSEnrollment: init: CA nickname: osstest:caSigningCert cert-pki-testca1 > CRSEnrollment: init: Token name: osstest > CRSEnrollment: init: Is SCEP using CA keys: true > CRSEnrollment: init: mNonceSizeLimit: 16 > CRSEnrollment: init: mHashAlgorithm: SHA1 > CRSEnrollment: init: mHashAlgorithmList: SHA1,SHA256,SHA512 > CRSEnrollment: init: mAllowedHashAlgorithm[0]=SHA1 > CRSEnrollment: init: mAllowedHashAlgorithm[1]=SHA256 > CRSEnrollment: init: mAllowedHashAlgorithm[2]=SHA512 > CRSEnrollment: init: mEncryptionAlgorithm: DES3 > CRSEnrollment: init: mEncryptionAlgorithmList: DES3 > CRSEnrollment: init: mAllowedEncryptionAlgorithm[0]=DES3 > CRSEnrollment: init: mProfileId=caRouterCert > ... > CRSEnrollment: CryptoContext: token name: osstest' > CRSEnrollment: CryptoContext: mNickname: 'osstest:osstest:caSigningCert cert-pki-testca1' > handlePKIMessage exception com.netscape.cms.servlet.cert.scep.CRSEnrollment$CryptoContext$CryptoContextException: Certificate not found: osstest:caSigningCert cert-pki-testca1 > com.netscape.cms.servlet.cert.scep.CRSEnrollment$CryptoContext$CryptoContextException: Certificate not found: osstest:caSigningCert cert-pki-testca1 > at com.netscape.cms.servlet.cert.scep.CRSEnrollment$CryptoContext.(CRSEnrollment.java:2026) > ... > > ** 2. Setting ca.scep.nickname at first produced no discernable change, > other than, requests for the ca cert. with "sscep getca" then fail reliably. > Due to token name not being set: > From debug log: > CRSEnrollment: init: SCEP support is enabled. > CRSEnrollment: init: SCEP nickname: caSigningCert cert-pki-testca1 > CRSEnrollment: init: CA nickname: osstest:caSigningCert cert-pki-testca1 > CRSEnrollment: init: Token name: > CRSEnrollment: init: Is SCEP using CA keys: false > CRSEnrollment: init: mNonceSizeLimit: 16 > CRSEnrollment: init: mHashAlgorithm: SHA1 > CRSEnrollment: init: mHashAlgorithmList: SHA1,SHA256,SHA512 > CRSEnrollment: init: mAllowedHashAlgorithm[0]=SHA1 > CRSEnrollment: init: mAllowedHashAlgorithm[1]=SHA256 > CRSEnrollment: init: mAllowedHashAlgorithm[2]=SHA512 > CRSEnrollment: init: mEncryptionAlgorithm: DES3 > CRSEnrollment: init: mEncryptionAlgorithmList: DES3 > CRSEnrollment: init: mAllowedEncryptionAlgorithm[0]=DES3 > CRSEnrollment: init: mProfileId=caRouterCert > ... > CRSEnrollment: CryptoContext: internal token name: '' > CRSEnrollment: CryptoContext: mNickname: 'caSigningCert cert-pki-testca1' > handlePKIMessage exception com.netscape.cms.servlet.cert.scep.CRSEnrollment$CryptoContext$CryptoContextException: Certificate not found: osstest:caSigningCert cert-pki-testca1 > com.netscape.cms.servlet.cert.scep.CRSEnrollment$CryptoContext$CryptoContextException: Certificate not found: osstest:caSigningCert cert-pki-testca1 > at com.netscape.cms.servlet.cert.scep.CRSEnrollment$CryptoContext.(CRSEnrollment.java:2026) > ... > > ** 3. setting both ca.scep.nickname and ca.scep.tokenname also does not get around the problem. > > From debug log: > CRSEnrollment: init: SCEP support is enabled. > CRSEnrollment: init: SCEP nickname: caSigningCert cert-pki-testca1 > CRSEnrollment: init: CA nickname: osstest:caSigningCert cert-pki-testca1 > CRSEnrollment: init: Token name: osstest > CRSEnrollment: init: Is SCEP using CA keys: false > CRSEnrollment: init: mNonceSizeLimit: 16 > CRSEnrollment: init: mHashAlgorithm: SHA1 > CRSEnrollment: init: mHashAlgorithmList: SHA1,SHA256,SHA512 > CRSEnrollment: init: mAllowedHashAlgorithm[0]=SHA1 > CRSEnrollment: init: mAllowedHashAlgorithm[1]=SHA256 > CRSEnrollment: init: mAllowedHashAlgorithm[2]=SHA512 > CRSEnrollment: init: mEncryptionAlgorithm: DES3 > CRSEnrollment: init: mEncryptionAlgorithmList: DES3 > CRSEnrollment: init: mAllowedEncryptionAlgorithm[0]=DES3 > CRSEnrollment: init: mProfileId=caRouterCert > ... > CRSEnrollment: CryptoContext: token name: osstest' <-- from sscep getca request > CRSEnrollment: CryptoContext: mNickname: 'osstest:caSigningCert cert-pki-testca1' > ... > CRSEnrollment: CryptoContext: token name: osstest' > CRSEnrollment: CryptoContext: mNickname: 'osstest:osstest:caSigningCert cert-pki-testca1' <-- from sscep enroll request > handlePKIMessage exception com.netscape.cms.servlet.cert.scep.CRSEnrollment$CryptoContext$CryptoContextException: Certificate not found: osstest:caSigningCert cert-pki-testca1 > com.netscape.cms.servlet.cert.scep.CRSEnrollment$CryptoContext$CryptoContextException: Certificate not found: osstest:caSigningCert cert-pki-testca1 > at com.netscape.cms.servlet.cert.scep.CRSEnrollment$CryptoContext.(CRSEnrollment.java:2026) > at com.netscape.cms.servlet.cert.scep.CRSEnrollment.handlePKIOperation(CRSEnrollment.java:803) > at com.netscape.cms.servlet.cert.scep.CRSEnrollment.service(CRSEnrollment.java:297) > > > best regards, > William > > -----Original Message----- > From: pki-users-bounces at redhat.com [mailto:pki-users-bounces at redhat.com] On Behalf Of Christina Fu > Sent: Donnerstag, 02. Oktober 2014 02:15 > To: pki-users at redhat.com > Subject: Re: [Pki-users] SCEP Enrollment fails with Certificate not found . [heur][html-removed] > > btw, I'm not suggesting that you need either or both config params. > > three sets of config you can try: > 1. don't specify either ca.scep.nickname or ca.scep.tokenname > (I think by default it takes the ca signing cert, if that's what you > intend to use anyway) > > 2. specify nickname only ca.scep.nickname (without the token) > ca.scep.nickname=caSigningCert cert-pki-testca1 > (I think by default, if the nickname you specified matches that of the > ca, it will find the token for you) > > 3. specify both nickname and token: > ca.scep.nickname=caSigningCert cert-pki-testca1 > ca.scep.tokenname=osstest > (last resort, because when you do this, it thinks it's not using the ca > signing cert.. ) > > Let us know. > Christina > > On 10/01/2014 05:00 PM, Christina Fu wrote: >> What's your scep config values, specifically: >> ca.scep.nickname >> ca.scep.tokenname >> >> Christina >> >> On 09/29/2014 04:55 AM, Elliott William C OSS sIT wrote: >>> Hello, >>> >>> We are currently trying to get a new RHEL6/Dogtag 9 with Safenet HSMs >>> setup for SCEP enrollment. But, no matter whether we try the older >>> HSMs( LunaSA 4) or the newer (LunaSA 5) we cannot complete a >>> successful SCEP request. The following exception occurs in the debug log: >>> >>> [29/Sep/2014:13:41:17][http-9180-1]: operation=PKIOperation >>> >>> [29/Sep/2014:13:41:17][http-9180-1]: >>> message=MIIHDQYJKoZIhvcNAQcCoIIG/jCCBvoCAQExDjAMBggqhkiG9w0CBQUAMIIDZQYJ >>> >>> KoZIhvcNAQcBoIIDVgSCA1IwggNOBgkqhkiG9w0BBwOgggM/MIIDOwIBADGCAW4w >>> >>> ggFqAgEAMFIwTTEVMBMGA1UEChMMRWJMYW4gRG9tYWluMRQwEgYDVQQLEwtwa2kt >>> >>> dGVzdGNhMTEeMBwGA1UEAxMVQ2VydGlmaWNhdGUgQXV0aG9yaXR5AgEBMA0GCSqG >>> >>> SIb3DQEBAQUABIIBADJhcbvaLYwGrTA6W1G+xB2BuHKJKnQ9DL+KsGWGuVh94CaH >>> >>> 7QAs2fbWcswpD6yhRDTirMS9gXBkdIdEZtGWvMKcZYpLbAxtoE/2V3oa9D5fdwjP >>> >>> RaLAt5rh6afS/pPbpdCkTYvHZZu7Y1//UDSP7Jkli/oBVE/vYEkteTgFlOgPhNJs >>> >>> HN/xVJAHJniIzJMc48YojxT8angpN045K+lAFldwsq5RpwS2szH7jaQeGsn5bx+r >>> >>> SQrEcPYz4noj9GnlzrOAnpvLK8XanJUj6KF4w8Am/adJhTRZrwAc6PVr88BO367g >>> >>> rjHcNApluo0m4+5DxvC8x7ri4N3wusfRN/oBpkMwggHCBgkqhkiG9w0BBwEwEQYF >>> >>> Kw4DAgcECGugmAolmOqhgIIBoIaPJ2m6nhY6DsUUBHGGqZRqVvlXimRX++u6UtWM >>> >>> X0r2jjmCfzpKuijFApiYAdrQzewMjk5AvLE0Pu6cH8mL7Sq973d8zG1vdqAQWZbW >>> >>> m8C6VRrpD9vw1Yd+q9Ma9UWSqIK0BicuqQk9jWRZVNWmVQT/q3Ht/+7s4rS7iiNu >>> >>> udSV9MAMAeZsR/AQh1f2DDMCtu2CKsRsQi+qL3gGO2YYQpmbTVBwIPj0O9X664qc >>> >>> AEqcFFUcGYlb5ES9RMmXtYWJb6rkrAQdWs8MPaaUuVON+t26mim9RazteY5dQ4rT >>> >>> l7UFujI+pIdc8JXflJ/SaJDb7USl1Y89OMS+j6Uxi1qimhzjedLmhpS27wKH1x61 >>> >>> JfEPqypjsz/AdKYiYH1IOXT3wVq52cpxOMlMpLEOl2eK3QCmvQMef1e9cmnku3fz >>> >>> cglipc6hT90ca/ugJWlXI84zlppEvKAJ3zqOtmJAf2TYcU++Cyg4Ai/Bi0Szon5z >>> >>> gOsL1Qpo8YdrmzHL4KbfAHGE7T/QCGA/CszbANL7aTMh4SNC6/A6ZIwoPDmTePNB >>> >>> dB0IoIIByzCCAccwggEwoAMCAQICIDRDNENCNUVFOUZGRkVCRkQzMUY5M0QwREJG >>> >>> NTZGMUY3MA0GCSqGSIb3DQEBBAUAMBoxGDAWBgNVBAMTDzAxMC4wMDAuMDAwLjAy >>> >>> MTAeFw0xNDA5MjkxMTQxMTdaFw0xNDEwMDUxMzQxMTdaMBoxGDAWBgNVBAMTDzAx >>> >>> MC4wMDAuMDAwLjAyMTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEA4vzJ7zuF >>> >>> gzXYtHQEDehMN+WniECBX9q6cV7ixr/F/Qn7ItbIiUrRfwMk+2orzSVRANE0dpBM >>> >>> rqohSq6USOoXwLp/YkITA5RNiQn5LRyebfWgul0IIgioq6L6EI88PG+elBbN2dip >>> >>> 9sjbedJlgIB+zxJ506f0Qf23nYJScdaJ/x8CAwEAATANBgkqhkiG9w0BAQQFAAOB >>> >>> gQCWENzZzQD6Dj88f33Y8aVY8DQoZjl/sIRHtPjJOKgINJrIt1bU2mlwQ2IrYtrN >>> >>> L2lv4UOpD9JsprK6FZb0XMMxZotCpXDHZevstDIq745srkHvZK15USjNY2QDvhOp >>> >>> e8YRESZf64jH7dAkiiFgJU7k6NZRNrIb5l8BuVd1K6sh4jGCAaswggGnAgEBMD4w >>> >>> GjEYMBYGA1UEAxMPMDEwLjAwMC4wMDAuMDIxAiA0QzRDQjVFRTlGRkZFQkZEMzFG >>> >>> OTNEMERCRjU2RjFGNzAMBggqhkiG9w0CBQUAoIHBMBIGCmCGSAGG+EUBCQIxBBMC >>> >>> MTkwGAYJKoZIhvcNAQkDMQsGCSqGSIb3DQEHATAcBgkqhkiG9w0BCQUxDxcNMTQw >>> >>> OTI5MTE0MTE3WjAfBgkqhkiG9w0BCQQxEgQQRAdYc3/0mIu36+n+4HjzcTAgBgpg >>> >>> hkgBhvhFAQkFMRIEEFgpmRCbIFZei2tsCn8+fx8wMAYKYIZIAYb4RQEJBzEiEyA0 >>> >>> QzRDQjVFRTlGRkZFQkZEMzFGOTNEMERCRjU2RjFGNzANBgkqhkiG9w0BAQEFAASB >>> >>> gDXExABpVsRfVAK8yB3C2N1v89zLSygNgejlh6UtB2Dq8gXW1Qmb+d03PZQzmFbH >>> >>> eaJKV9+5pIsKchOedlsaAks2ZSHw9Pj8is9mIRYM5pADo1BoEcsszshV2G5DKDwm >>> >>> /oBmEEz/Lwysh4v4GyZwcQad/xYjCODUt83k3s18LWS+ >>> >>> [29/Sep/2014:13:41:17][http-9180-1]: CRSEnrollment: CryptoContext: >>> token name: osstest' >>> >>> [29/Sep/2014:13:41:17][http-9180-1]: CRSEnrollment: CryptoContext: >>> mNickname: '*osstest:osstest*:caSigningCert cert-pki-testca1' >>> >>> [29/Sep/2014:13:41:17][http-9180-1]: handlePKIMessage exception >>> com.netscape.cms.servlet.cert.scep.CRSEnrollment$CryptoContext$CryptoContextException: >>> Certificate not found: osstest:caSigningCert cert-pki-testca1 >>> >>> com.netscape.cms.servlet.cert.scep.CRSEnrollment$CryptoContext$CryptoContextException: >>> Certificate not found: osstest:caSigningCert cert-pki-testca1 >>> >>> at >>> com.netscape.cms.servlet.cert.scep.CRSEnrollment$CryptoContext.(CRSEnrollment.java:2026) >>> >>> at >>> com.netscape.cms.servlet.cert.scep.CRSEnrollment.handlePKIOperation(CRSEnrollment.java:803) >>> >>> at >>> com.netscape.cms.servlet.cert.scep.CRSEnrollment.service(CRSEnrollment.java:297) >>> >>> at javax.servlet.http.HttpServlet.service(HttpServlet.java:717) >>> >>> at >>> org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:290) >>> >>> at >>> org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206) >>> >>> at >>> com.netscape.cms.servlet.filter.EERequestFilter.doFilter(EERequestFilter.java:176) >>> >>> at >>> org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:235) >>> >>> at >>> org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206) >>> >>> at >>> org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:233) >>> >>> at >>> org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:191) >>> >>> at >>> org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:127) >>> >>> at >>> org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:102) >>> >>> at >>> org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:109) >>> >>> at >>> org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:298) >>> >>> at >>> org.apache.coyote.http11.Http11Processor.process(Http11Processor.java:857) >>> >>> at >>> org.apache.coyote.http11.Http11Protocol$Http11ConnectionHandler.process(Http11Protocol.java:588) >>> >>> at >>> org.apache.tomcat.util.net.JIoEndpoint$Worker.run(JIoEndpoint.java:489) >>> >>> at java.lang.Thread.run(Thread.java:701) >>> >>> [29/Sep/2014:13:41:17][http-9180-1]: ServletException >>> javax.servlet.ServletException: Failed to process message in CEP >>> servlet: Certificate not found: osstest:caSigningCert cert-pki-testca1 >>> >>> What stands out is the line with mNickname. After restarting the >>> service, with the first request, the HSM token name appears to be >>> listed twice in the *mNickname* string. Interestingly, with each new >>> request, the number of token names increases by one in the string. >>> i.e. with the 2^nd attempt, the same exception occurs but the token >>> name appears three times: >>> >>> [29/Sep/2014:13:41:17][http-9180-1]: CRSEnrollment: CryptoContext: >>> token name: osstest' >>> >>> [29/Sep/2014:13:41:17][http-9180-1]: CRSEnrollment: CryptoContext: >>> mNickname: '*osstest:osstest:osstest*:caSigningCert cert-pki-testca1' >>> >>> [29/Sep/2014:13:41:17][http-9180-1]: handlePKIMessage exception >>> com.netscape.cms.servlet.cert.scep.CRSEnrollment$CryptoContext$CryptoContextException: >>> Certificate not found: osstest:caSigningCert cert-pki-testca1 >>> >>> com.netscape.cms.servlet.cert.scep.CRSEnrollment$CryptoContext$CryptoContextException: >>> Certificate not found: osstest:caSigningCert cert-pki-testca1 >>> >>> at >>> com.netscape.cms.servlet.cert.scep.CRSEnrollment$CryptoContext.(CRSEnrollment.java:2026) >>> >>> at >>> com.netscape.cms.servlet.cert.scep.CRSEnrollment.handlePKIOperation(CRSEnrollment.java:803) >>> >>> at >>> com.netscape.cms.servlet.cert.scep.CRSEnrollment.service(CRSEnrollment.java:297) >>> >>> at javax.servlet.http.HttpServlet.service(HttpServlet.java:717) >>> >>> at >>> org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:290) >>> >>> at >>> org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206) >>> >>> at >>> com.netscape.cms.servlet.filter.EERequestFilter.doFilter(EERequestFilter.java:176) >>> >>> at >>> org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:235) >>> >>> at >>> org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206) >>> >>> at >>> org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:233) >>> >>> at >>> org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:191) >>> >>> at >>> org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:127) >>> >>> at >>> org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:102) >>> >>> at >>> org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:109) >>> >>> at >>> org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:298) >>> >>> at >>> org.apache.coyote.http11.Http11Processor.process(Http11Processor.java:857) >>> >>> at >>> org.apache.coyote.http11.Http11Protocol$Http11ConnectionHandler.process(Http11Protocol.java:588) >>> >>> at >>> org.apache.tomcat.util.net.JIoEndpoint$Worker.run(JIoEndpoint.java:489) >>> >>> at java.lang.Thread.run(Thread.java:701) >>> >>> [29/Sep/2014:13:41:17][http-9180-1]: ServletException >>> javax.servlet.ServletException: Failed to process message in CEP >>> servlet: Certificate not found: osstest:caSigningCert cert-pki-testca1 >>> >>> As mentioned, the exception occurs with both versions 4 and 5 of >>> LunaSA. (We currently have RHEL5 systems with Dogtag 1.3 operating >>> with SCEP enrollment.) With local tokens, (no HSMs) the error does >>> not occur. >>> >>> Any Ideas, how we can track this down? We definitely need to get this >>> running. >>> >>> Best regards! >>> >>> William Elliott >>> >>> s IT Solutions >>> >>> Open System Services >>> >>> s IT Solutions AT Spardat GmbH >>> >>> A-1110 Wien, Geiselbergstra?e 21 - 25 >>> >>> Phone: +43 (0)5 0100 - 39376 >>> >>> Fax: +43 (0)5 0100 9 - 39376 >>> >>> Mobile: +43 (0)5 0100 6 - 39376 >>> >>> _mailto:william.elliott at s-itsolutions.at >>> _ >>> >>> www.s-itsolutions.com >>> >>> Head Office: Vienna Commercial Register No.: 152289f Commercial Court >>> of Vienna >>> >>> This message and any attached files are confidential and intended >>> solely for the addressee(s). Any publication, transmission or other >>> use of the information by a person or entity other than the intended >>> addressee is prohibited. If you receive this in error please contact >>> the sender and delete the material. The sender does not accept >>> liability for any errors or omissions as a result of the transmission. >>> >>> >>> >>> _______________________________________________ >>> Pki-users mailing list >>> Pki-users at redhat.com >>> https://www.redhat.com/mailman/listinfo/pki-users >> >> >> _______________________________________________ >> Pki-users mailing list >> Pki-users at redhat.com >> https://www.redhat.com/mailman/listinfo/pki-users > _______________________________________________ > Pki-users mailing list > Pki-users at redhat.com > https://www.redhat.com/mailman/listinfo/pki-users > > _______________________________________________ > Pki-users mailing list > Pki-users at redhat.com > https://www.redhat.com/mailman/listinfo/pki-users