Uploaded image for project: 'RHEL'
  1. RHEL
  2. RHEL-81038

Cannot fetch VCEK certificate with snpguest

Linking RHIVOS CVEs to...Migration: Automation ...Sync from "Extern...XMLWordPrintable

    • Icon: Bug Bug
    • Resolution: Not a Bug
    • Icon: Undefined Undefined
    • None
    • rhel-9.6
    • snpguest
    • None
    • No
    • Important
    • rhel-virt-core
    • ssg_virtualization
    • None
    • False
    • False
    • Hide

      None

      Show
      None
    • None
    • None
    • None
    • None
    • Unspecified
    • Unspecified
    • Unspecified
    • None

      What were you trying to do that didn't work?

      cannot fetch vcek certificate

      Please provide the package NVR for which the bug is seen:

      snpguest-0.8.3-1.el9.src.rpm

      How reproducible is this bug?:100%

      Steps to reproduce

      1. snpguest report attestation-report.bin request-data.txt --random 
      2. snpguest fetch vcek pem milan ./ attestation-report.bin

      Expected results

      fetch vcek successfully

      Actual results

      ERROR: Unable to fetch VCEK from URL: 404
      Error: Unable to fetch VCEK from URL: 404

      Additional

      can fetch vcek with url, amd KDS server works wll

      1. snphost show vcek-url 
        https://kdsintf.amd.com/vcek/v1/Milan/E18AB8A566916516B72307B543C9B4A4DFB10D28217252018EC5705A145B3DF8D6705EBAB5CF342A68CB074CFDC99B299E6394DE8FED0F46EABA2F850718F069?blSPL=03&teeSPL=00&snpSPL=22&ucodeSPL=210
      1. curl -o vcek.pem "https://kdsintf.amd.com/vcek/v1/Milan/E18AB8A566916516B72307B543C9B4A4DFB10D28217252018EC5705A145B3DF8D6705EBAB5CF342A68CB074CFDC99B299E6394DE8FED0F46EABA2F850718F069?blSPL=03&teeSPL=00&snpSPL=22&ucodeSPL=210" 

              tfanelli@redhat.com Tyler Fanelli
              jinl@redhat.com Jin Liu
              Tyler Fanelli Tyler Fanelli
              Jin Liu Jin Liu
              Votes:
              0 Vote for this issue
              Watchers:
              3 Start watching this issue

                Created:
                Updated:
                Resolved: