Guest

Preview Tool

Cisco Bug: CSCuu58146 - IOS PKI: CRL Prefetch from an unenrolled Sub-CA trustpoint fails

Last Modified

Jun 30, 2015

Products (96)

  • Cisco IOS
  • Cisco C892FSP Integrated Services Router
  • Cisco 892W Integrated Services Router
  • Cisco VG204XM Analog Voice Gateway
  • Cisco 886VA-CUBE Integrated Services Router
  • Cisco 888W Integrated Services Router
  • Cisco 812 CiFi Integrated Services Router
  • Cisco 819 Hardened Integrated Services Router
  • Cisco C897VA Integrated Services Router
  • Cisco 881SRSTW Integrated Services Router
View all products in Bug Search Tool Login Required

Known Affected Releases

15.4(3)M1

Description (partial)

Symptom:
CRL prefetch feature allows the admin to configure the following:

crypto pki crl download trustpoint <Trustpoint-name>
- Here, note that This trustpoint should contain a device certificate [aka an ID certificate]
- And IOS will download the CRL from the CDP embedded in the device-certificate.

In the below example, If the admin executes:
crypto pki crl download trustpoint  Sub_1

We fail to validate the signature of the CRL:
%PKI-4-CRLINSERTFAIL: Trustpoint "Sub_1" failed to verify CRL signature (error 1815:E_NAME_ENCODING : invalid encoded format for name)

Conditions:
Cisco IOS configured with:

crypto pki trustpoint Root-CA
 !! authenticated with Root-CA

crypto pki trustpoint Sub_1
 !! only authenticated with Sub-CA-1

And we would like to fetch the CRL issued by Root-CA to validate Sub-CA-1
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.