Server Products
Data Center Products including boards, integrated systems, Intel® Xeon® Processors, RAID Storage, and Intel® Xeon® Processors
4991 Discussions

S2600WFT - Latest BIOS (02.01.0014 - 2021/12/03) - Unable to import SSL certificate

bbs2web
Novice
883 Views

Hi,

 

I'm new here, was hoping to be able to get some support importing a wildcard certificate that worked on the previous BIOS version (02.01.0013).

 

We've reproduced the problem on two systems, after upgrading from 02.01.0013 to 02.01.0014.

BIOS UEFI update files:

https://www.intel.com/content/www/us/en/download/18911/intel-server-board-s2600wf-family-bios-and-firmware-update-package-for-uefi.html?wapkw=S2600WFT%20

 

Platforms are Intel R1208WFTYSR:

bbs2web_0-1642532810921.png

 

BMC version information:

bbs2web_1-1642532881267.png

 

Security Settings:

bbs2web_2-1642532975640.png

 

Uploading SSL certificate files:

bbs2web_3-1642533049671.png

 

I confirm to replace the self generated one (BMC web interface was unavailable for approximately 5 minutes before appearing to have replaced the previously working certificate and key with a new self-generated one):

bbs2web_4-1642533155993.png

 

Resulting error:

bbs2web_5-1642533207127.png

 

We have dumps via syscfg of the BIOS and BMC settings, should it be relevant.

 

Herewith information on the certificate:

Certificate:
Data:
Version: 3 (0x2)
Serial Number:
f0:84:9c:f0:23:15:cd:b3:d7:dd:a2:28:70:a8:c0:b1
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=GB, ST=Greater Manchester, L=Salford, O=Sectigo Limited, CN=Sectigo RSA Domain Validation Secure Server CA
Validity
Not Before: Sep 24 00:00:00 2021 GMT
Not After : Sep 24 23:59:59 2022 GMT
Subject: CN=redacted.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public Key: (2048 bit)
Modulus (2048 bit):
<snip>
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Authority Key Identifier:
keyid:8D:8C:5E:C4:54:AD:8A:E1:77:E9:9B:F9:9B:05:E1:B8:01:8D:61:E1

X509v3 Subject Key Identifier:
90:FE:50:C3:E4:CC:3B:8D:D7:BB:2C:D8:90:F1:A3:7E:18:74:25:29
X509v3 Key Usage: critical
Digital Signature, Key Encipherment
X509v3 Basic Constraints: critical
CA:FALSE
X509v3 Extended Key Usage:
TLS Web Server Authentication, TLS Web Client Authentication
X509v3 Certificate Policies:
Policy: 1.3.6.1.4.1.6449.1.2.2.7
CPS: https://sectigo.com/CPS
Policy: 2.23.140.1.2.1

Authority Information Access:
CA Issuers - URI:http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt
OCSP - URI:http://ocsp.sectigo.com

1.3.6.1.4.1.11129.2.4.2:
...k.i.w.F.U.u.. 0...i..}.,At..I.....p.mG...|..c .....H0F.!.... 6..xS.>..Sk/..I.Z..r.\.i.....!..]{V.Ls.'.>_.j...G_.{.)A)5.@.T...w.A...."FJ...:.B.^N1.....K.h..b......|..b......H0F.!..CR!..Ra.j....h...$i.....k.ib(...!..1..P.....X`..@M?D=.....sz;....U.u.)y...99!.Vs.c.w..W}.`
..M]&\%].....|..b......F0D. Ba\z7........|C..v.....ppl.....%. L...FL.........}.......T........
X509v3 Subject Alternative Name:
DNS:redacted.com, DNS:*.redacted2.com, DNS:*.*.redacted3.com, DNS:*.redacted.com
Signature Algorithm: sha256WithRSAEncryption
<snip>

 

PS: Trying to turn off HTTPS and only have HTTP enabled results in all web access being blocked. Be sure to set KCS to allow all to avoid bricking (technically locking yourself out) the BMC. If KCS it in allow all mode you can run 'ipmitool raw 0x30 0xb1 0x01 0x79 0x00' on a Linux host to enable HTTPS on LAN channel 3 (dedicated port).

 

Regards

David Herselman

Labels (1)
0 Kudos
0 Replies
Reply