Red Hat CERTIFICATE 8.0 RELEASE NOTES Installationsanleitung

Stöbern Sie online oder laden Sie Installationsanleitung nach Telefone Red Hat CERTIFICATE 8.0 RELEASE NOTES herunter. Red Hat CERTIFICATE 8.0 RELEASE NOTES Installation guide Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken

Inhaltsverzeichnis

Seite 1 - Release Notes

LandmannRed Hat Certificate System 8.0Release Noteswith Updates for Errata RHSA-2010:0838Edition 8.0.7

Seite 2 - Edition 8.0.7

rpm -qi compat-libstdc++ --queryformat '%{NAME}-%{VERSION}-%{RELEASE}.%{ARCH}.rpm \n' | grep x86_64Numerous libraries should be displayed.3.

Seite 3

The Certificate System subsystems have been tested using the following tokens:Gemalto T OP IM FIPS CY2 64K token, both as a smart card and GemPCKey US

Seite 4 - Table of Contents

After installing the JDK, run /usr/sbin/alternatives as root to insure that the proper JDK isavailable:/usr/sbin/alternatives --config javaThere are 3

Seite 5

yum install httpd4.5. Installing mod_nssBefore installing the subsystem packages on Red Hat Enterprise Linux, first install or upgrade m od_nss.mod_ns

Seite 6

there are important changes and enhancements to the 8.0 documentation:5.1. Documentation Changes in 8.0The Administrator's Guide has been reorgan

Seite 7

Certificate System Installation Guide covers the installation process for all Certificate Systemsubsystems.This manual is intended for Certificate Sys

Seite 8

Table 5. Fixed BugsBug Number Description209213 There was a random error in the Enterprise Security Client thatwhen an enrolled card was inserted and

Seite 9 - 3. Supported Platforms

482935process (ns-slapd) to reach 100% CPU.253323 When using the Certicom PKCS #11 module with the OCSP, theOCSP failed to start because the OCSP sign

Seite 10 - 3.4. Supported Smart Cards

445436 Searching for certificates through the Revoke Certificatespage in the CA's agent services reported a bad search filter. Theschema used for

Seite 11 - 4.2. Install the Required JDK

indexed key version.491000 Trying to format or re-enroll a formatted security officer tokencaused the Enterprise Security Client to throw error 28 on

Seite 12 - 4.4. Verifying Apache

Red Hat Certificate System 8.0 Release Noteswith Updates for Errata RHSA-2010:0838Edition [email protected] m

Seite 13 - 4.5. Installing mod_nss

Table 6. Errata ReleasesAdvisory Description Release DateRHSA-2010-0837 This erratum introduces bugfixes and enhancements forSCEP operations.CVE-2010-

Seite 14 - 5.2. Documentation with 8.0

encryption and hash algorithms.RHBA-2010-0701 This erratum introducesenhancements for certificateand token policy settings.Bugzilla #609331. It waspos

Seite 15

special security officer modeof esc did not function onMac. Security officer modeallows designated users toperform in-person tokenenrollments, as adde

Seite 16

cryptographic functionsexpected of smart cardswere not possible. Forinstance, an encrypted emailcould not be sent with 2048-bit keys.RHBA-2010:0169 Th

Seite 17

helpful error message hasbeen added to the client.Bugzilla 523568. Smartcards could not be enrolledusing LDAP authenticationwhen the passwords wherest

Seite 18

Bugzilla 351162RHBA-2009:1596 This update addresses Bug505682 - Allow configuration ofNSS OCSP cache settings. Newparameters are enabled to allowuser-

Seite 19

TLS Renegotiation Attack" provides additional details about this flaw.In Certificate System, this kind of session renegotiation occurs if a user

Seite 20

a. At the top of the file, replace the PKI status definitions with the following section, with thecorrect hostname and ports. Replace all the lines w

Seite 21

4. Modify the /etc/init.d/instance_name initialization script to read the new status definitions.a. At line 242, replace the following lines. Replac

Seite 22

7. Edit the profile selection template to use the URL for the new secure end-entities clientauthentication services port. For example, assuming the d

Seite 23

Legal NoticeCopyright © 2009 Red Hat, Inc..This document is licensed by Red Hat under the Creative Commons Attribution-ShareAlike 3.0 UnportedLicense

Seite 24

These are known issues in the 8.0 release of Red Hat Certificate System. When available, workaroundsare included.8. Known Issues 27

Seite 25 - 8. Known Issues

Table 7. Known IssuesBugNumberDescription Workaround223299 If a TKS master key is generated on a SafeNet LunaSAHSM, server-side key generation fails w

Seite 26

though the tokens contain Phone Home URLs.235150 The TKS sub-system start and stop scripts currently donot check that the package is installed beforea

Seite 27

456701 The default signing algorithm used by the CA cannot besuccessfully changed in the CA configuration or whensetting up the CA. T he default is ha

Seite 28

499014 When trying to renew a DRM certificate using thecertificate wizard tool in the Java console(pkiconsole), the certificate renewal fails and theD

Seite 29

chcon -t textrel_shlib_t '/usr/lib/libsbgse2.so'2. T hen change the defaultfile context files on thesystem so that theupdated context ispre

Seite 30

Misc { NetscapeCustom ize=1023; }Additionally, these two linesmust be removed:AppIdMajor=2;AppIdMinor=4;511327 Trying to set up a T PS using a Safenet

Seite 31

2. Open the CS.cfg fileand change the authType value to theclient authenticationsetting.vim /var/lib/pki-ca/conf/CS.cfgauthType=sslclientauth3. Open

Seite 32 - 1706.http-9080-Processor24

a. Open the user'sconsole directory./user-directory/.redhat-idm-consoleb. Create newsecuritydatabases.certutil -N -d .c. Export theadministrat

Seite 33

certificate from thebase 64-blobassociated withthe admin usercert.certutil -A -d . -n ca -t CT,C,C -i ./ca.crt6. T he next time you run pkiconsole, i

Seite 34

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Seite 35

vim /var/lib/pki-ca/conf/CS.cfgca.crl.MasterCRL.extension.AuthorityInform ationAccess.accessLocation0=http://hostname:9180/ca/ocspca.crl.MasterCRL.ext

Seite 36 - IMPORTANT

Administrator's Guide.523568 On Windows XP and Vista systems, logging into theEnterprise Security Client using LDAP authenticationcan fail if the

Seite 37

http://jakarta.apache.org/tomcat/index.html.9.1.2. Mozilla FoundationRed Hat Certificate System uses version 4.2 of the Java™ Security Services (JSS)

Seite 38

Mozilla Project. If any problems are found in these specific libraries, the source code and buildinstructions for the latest version of these librarie

Seite 39

Redistributions of source code must retain the above copyright notice, this list of conditions andthe following disclaimer.Redistributions in binary f

Seite 40

9.1.1. Apache Software Foundation9.1.2. Mozilla Foundation9.1.3. Red Hat9.2. Copyrights for Certificate System Clients9.2.1. Mozilla Foundation9.2.2.

Seite 41

These release notes contain important information related to Red Hat Certificate System 8.0 that maynot be currently available in the Product Manuals.

Seite 42

Certificate System 8.0, although it does not ship with an ECC module, does support loading and usingthird-party ECC PKCS#11 modules with the CA. The c

Seite 43

2.1. Default Port SeparationStarting in Certificate System 8.0, there are three SSL ports, one each for each of the user interfaces(agents, administra

Seite 44

pki_load, can be obtained from Red Hat support to send the certificate requests to httpclient.3. Supported PlatformsThis section covers the different

Kommentare zu diesen Handbüchern

Keine Kommentare