I thought I had some idea of what was going on, but apparantly not because try as I might I can't get anyting to work. What I've done so far:
--Created a 256-bit ECDSA keypair.
--Generated a CSR.
--E-mailed that to our certificate admin.
--Got a certificate back.
--Installed that certificate and the roots.
--Told HTTPS to use it.
The result? When I go to the site I get ERR_SSL_VERSION_OR_CIPHER_MISMATCH and near as I can tell the switch isn't supporting ANY protocols for SSL.
Everything looks ok to me (***** is me redacting things):
admin@*****> show security pki certificate-request
Certificate identifier: Web-Access
Issued to: *****
Public key algorithm: ecdsaEncryption(256 bits)
admin@*****> show security pki ca-certificate
Certificate identifier: InCommon_1
Issued to: AddTrust External CA Root, Issued by: C = SE, O = AddTrust AB, OU = AddTrust External TTP Network, CN = AddTrust External CA Root
Validity:
Not before: 05-30-2000 10:48 UTC
Not after: 05-30-2020 10:48 UTC
Public key algorithm: rsaEncryption(2048 bits)
Certificate identifier: InCommon_3
Issued to: InCommon RSA Server CA, Issued by: C = US, ST = New Jersey, L = Jersey City, O = The USERTRUST Network, CN = USERTrust RSA Certification Authority
Validity:
Not before: 10- 6-2014 00:00 UTC
Not after: 10- 5-2024 23:59 UTC
Public key algorithm: rsaEncryption(2048 bits)
Certificate identifier: InCommon_2
Issued to: USERTrust RSA Certification Authority, Issued by: C = SE, O = AddTrust AB, OU = AddTrust External TTP Network, CN = AddTrust External CA Root
Validity:
Not before: 05-30-2000 10:48 UTC
Not after: 05-30-2020 10:48 UTC
Public key algorithm: rsaEncryption(4096 bits)
admin@ECE-*****> show security pki local-certificate
Certificate identifier: Web-Access
Issued to: *****, Issued by: C = US, ST = MI, L = Ann Arbor, O = Internet2, OU = InCommon, CN = InCommon RSA Server CA
Validity:
Not before: 01-23-2019 00:00 UTC
Not after: 01-22-2021 23:59 UTC
Public key algorithm: ecdsaEncryption(256 bits)
admin@*****> show configuration system services
ssh {
protocol-version v2;
ciphers [ "aes128-gcm@openssh.com" "aes256-gcm@openssh.com" aes128-ctr aes256-ctr "chacha20-poly1305@openssh.com" aes256-cbc aes128-cbc ];
hostkey-algorithm {
no-ssh-dss;
ssh-ecdsa;
ssh-ed25519;
}
fingerprint-hash sha2-256;
}
netconf {
ssh;
}
web-management {
http;
https {
pki-local-certificate Web-Access;
}
}
Anyone have any idea what I'm doing wrong or what I'm missing?