View Issue Details

IDProjectCategoryView StatusLast Update
0004791CTT UA Binary3 - Feature Requestpublic2024-01-26 15:56
ReporterAlexander Allmendinger Assigned ToSebastian Allmendinger  
PrioritynormalSeverityminorReproducibilityhave not tried
Status assignedResolutionopen 
Summary0004791: Automatic server configuration for certificates using GDS features
Description

As more servers are implementing GDS capabilities to receive certificates by a GDS this could be utilized for the automatic configuration of the certificates as needed in a CTT test run.

TagsNo tags attached.
Files Affected

Activities

Paul Hunkar

2019-06-21 20:46

administrator   ~0010395

Agree that this should be included in the CTT, but it will not be the only aspect of certificate configuration required for the CTT. The CTT needs a large variety of certificates to be trusted on the server being tested, a commercial GDS is not designed for pushing the variety of certificates we will need.
If we add GDS functionality to the CTT then it could be it's own GDS. This might be able to handle more of the required items and it could also be used to facilitate testing of the GDS functionality.

Christian Zugfil

2019-06-24 09:09

reporter   ~0010401

The idea was to have an action (manual menu command or automatic) in the CTT which copies the certficates into the server by writing the TrustList file object in the servers address space. No GDS required in this case, although the GDS would also use this method in push configuration. The CTT would need to be able to serialize the TrustList, i.e. support the TrustListDataType.

Paul Hunkar

2022-08-18 15:51

administrator   ~0017334

assigned for investigation to start with.

Alexander Allmendinger

2024-01-26 15:56

developer   ~0020716

Initially create a list of certificates which can be pushed via the certificate management, also check which ones could be pushed when switching from self-signed certificates to issued certificates. For example when changing the certificate with the invalid signature or invalid field combinations we don't do that on a self-signed but on an issued certificate. In this case the trust list check should succeed because the CA would then be in the trust list.

Issue History

Date Modified Username Field Change
2019-06-20 15:31 Alexander Allmendinger New Issue
2019-06-21 20:46 Paul Hunkar Assigned To => Paul Hunkar
2019-06-21 20:46 Paul Hunkar Status new => acknowledged
2019-06-21 20:46 Paul Hunkar Note Added: 0010395
2019-06-24 09:09 Christian Zugfil Note Added: 0010401
2019-09-16 06:30 Paul Hunkar Assigned To Paul Hunkar => Alexander Allmendinger
2022-08-18 15:51 Paul Hunkar Assigned To Alexander Allmendinger => Archie Miller
2022-08-18 15:51 Paul Hunkar Status acknowledged => assigned
2022-08-18 15:51 Paul Hunkar Note Added: 0017334
2022-08-25 03:16 Paul Hunkar Project Compliance Test Tool (CTT) Unified Architecture => CTT UA Binary
2024-01-26 15:38 Paul Hunkar Assigned To Archie Miller => Sebastian Allmendinger
2024-01-26 15:56 Alexander Allmendinger Note Added: 0020716