126718
Goto Top

FreeRadius: Zertifikat erstellen failed. - pfSense

Guten Morgen,

ich arbeite aktuell an meiner Projektarbeit.
Mein System auf dem ich arbeite ist ein x86.
- Intel Atom
- 8GB RAM
- 2xSSD im RAID1
- aktuellste pfSense Version

Hänge an folgendem Punkt. Ich möchte wie im Tutorial hier im Board Zertifikate die unter /usr/local/etc/raddb/certs/* gespeichert sind,
abändern auf die Daten meiner Firma. Lediglich beim abändern mache ich davor: make destroycerts und dann editiere ich:
- server.cnf
- ca.cnf

Danach kommt folgendes:
[2.3-RELEASE][admin@host]/usr/local/etc/raddb/certs: make all
/usr/bin/openssl gendh -out dh -2 2048
Generating DH parameters, 2048 bit long safe prime, generator 2
This is going to take a long time
........................................................................................................................................+.................................................................+...........................................+...............................................................+...+........................................................................................................+...................................................................+................................+........................+....................................................................................................................................................................................................+..................................................................................................................................................+.......................+................................................................................+.....................................................................................+......................................................+.....................................+...................................................................+..............+....................................................................................+........................................................................+...................................+................................+............+..........................................................................................................................................................................................................................................................................................+.................+...............................+.............................+.............+.....................................................................+..................+.....................................................+.............+............................................................................................................................................................................................+.........+..+.................+...................................................................................................................................................................................................................................................................+.............+.........................+.........................................................................................................................................................................+......................................................................................................+............+.......+.+..................................................................................................+..........+...........................................+...................................................................................+..................................................................................................................................+.............................................................................+........+............................................................................................................................................................................................................................................+...................................+....................+.................................................+............................+...........................+..................................................+........................+........................................................................................+......................................+............+......................................................................+......................................................+.............................................................................................................+.......................................................+...............................................................++*++*
/usr/bin/openssl req -new  -out server.csr -keyout server.key -config ./server.cnf
Generating a 2048 bit RSA private key
..............+++
......................+++
writing new private key to 'server.key'  
-----
/usr/bin/openssl req -new -x509 -keyout ca.key -out ca.pem  -days  -config ./ca.cnf
unknown option ./ca.cnf
req [options] <infile >outfile
where options  are
 -inform arg    input format - DER or PEM
 -outform arg   output format - DER or PEM
 -in arg        input file
 -out arg       output file
 -text          text form of request
 -pubkey        output public key
 -noout         do not output REQ
 -verify        verify signature on REQ
 -modulus       RSA modulus
 -nodes         don't encrypt the output key  
 -engine e      use engine e, possibly a hardware device
 -subject       output the request's subject  
 -passin        private key password source
 -key file      use the private key contained in file
 -keyform arg   key file format
 -keyout arg    file to send the key to
 -rand file:file:...
                load the file (or the files in the directory) into
                the random number generator
 -newkey rsa:bits generate a new RSA key of 'bits' in size  
 -newkey dsa:file generate a new DSA key, parameters taken from CA in 'file'  
 -newkey ec:file generate a new EC key, parameters taken from CA in 'file'  
 -[digest]      Digest to sign with (md5, sha1, md2, mdc2, md4)
 -config file   request template file.
 -subj arg      set or modify request subject
 -multivalue-rdn enable support for multivalued RDNs
 -new           new request.
 -batch         do not ask anything during request generation
 -x509          output a x509 structure instead of a cert. req.
 -days          number of days a certificate generated by -x509 is valid for.
 -set_serial    serial number to use for a certificate generated by -x509.
 -newhdr        output "NEW" in the header lines  
 -asn1-kludge   Output the 'request' in a format that is wrong but some CA's  
                have been reported as requiring
 -extensions .. specify certificate extension section (override value in config file)
 -reqexts ..    specify request extension section (override value in config file)
 -utf8          input characters are UTF8 (default ASCII)
 -nameopt arg    - various certificate name options
 -reqopt arg    - various request text options
 
*** Error code 1
 
Stop.
make: stopped in /usr/local/etc/raddb/certs

Warum?
Habe darauf geachtet, das alle Daten gleich sind.

Grüße face-smile


Lösung:
Ich habe das Makefile von Hand bearbeitet und die Variablen durch feste Werte ersetzt.
Danach neu ausgeführt und es funktioniert! face-smile

Content-Key: 302233

Url: https://administrator.de/contentid/302233

Ausgedruckt am: 29.03.2024 um 15:03 Uhr

Mitglied: aqui
aqui 19.04.2016 um 10:15:04 Uhr
Goto Top
Bitte lasse den Unsinn mit externen Bilderlinks und Zwangswerbung. Mit Klick auf das Kamerasymbol links kannst du hier jegliche Grafiken in deinen Thread hochladen und uns Extraklicks ersparen.
Einfach mal die FAQs lesen face-wink