Scep
These scenarios show how to configure the SCEP protocol to retrieve certificates from a PKI server.
Test SCEP Protocol With Linux PKI
Description
In this scenario, the SCEP protocol is used to retrieve digital certificates (X509) from a Linux PKI server.
Scenario
Step 1: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 10.215.168.64/24 set protocols static route 192.168.212.0/22 next-hop 10.215.168.1 set system certificate scep csr CSR cgi-path /scep set system certificate scep csr CSR cipher aes set system certificate scep csr CSR digest sha256 set system certificate scep csr CSR distinguished-names CN=MyUserCert set system certificate scep csr CSR encrypted-password U2FsdGVkX1+WYMoMEWKkBCE04PNsiXaq3f413Y5hNWs= set system certificate scep csr CSR port 8080 set system certificate scep csr CSR url 'http://10.215.168.1' set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Ping IP address 10.215.168.1 from DUT0:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.140 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.140/0.140/0.140/0.000 ms
Step 3: Run command pki scep show CSR at DUT0 and check if output matches the following regular expressions:
ca\s+Valid usercert\s+ValidShow output
------------------------------------------------------------------------------------------------- Certificate Status Usage NotBefore NotAfter ------------------------------------------------------------------------------------------------- ca Valid Encipherment & Signature Apr 16 09:19:39 2025 GMT Apr 11 09:19:39 2045 GMT usercert Valid - Dec 17 17:25:28 2025 GMT Dec 17 17:25:28 2026 GMT
Step 4: Run command pki show certificate running://auth/certificates/scep/CSR/ca/ca.der at DUT0 and check if output contains the following tokens:
Subject: CN = Teldat-PKI, O = Teldat, L = Madrid, C = ESShow output
Certificate: Data: Version: 3 (0x2) Serial Number: 7c:28:60:8a:6f:42:5d:c8:44:f0:10:0d:61:e5:ca:40:11:bc:ea:f2 Signature Algorithm: sha256WithRSAEncryption Issuer: CN = Teldat-PKI, O = Teldat, L = Madrid, C = ES Validity Not Before: Apr 16 09:19:39 2025 GMT Not After : Apr 11 09:19:39 2045 GMT Subject: CN = Teldat-PKI, O = Teldat, L = Madrid, C = ES Subject Public Key Info: Public Key Algorithm: rsaEncryption Public-Key: (2048 bit) Modulus: 00:de:b7:3b:d9:9b:e3:d3:57:9b:b0:33:67:c0:40: 4f:45:84:ea:c2:35:a6:08:3b:3a:fd:6d:fa:d7:2b: 3d:7f:1c:a1:92:15:08:8b:5c:02:ec:6a:66:46:c5: 6f:7f:9b:9d:c3:86:e1:97:47:9b:5e:ea:96:5b:bf: 68:35:96:4f:6e:64:c6:7d:f6:da:6b:f9:bf:98:b1: 32:63:ae:f4:5b:2f:cd:6d:d7:ef:db:01:12:b0:a4: 54:95:6e:e8:84:4a:0a:f1:13:83:13:a1:7a:1d:f4: 06:3f:e3:53:5d:9f:68:a1:a0:5c:51:05:ba:8c:da: 00:11:64:4b:e8:37:c3:70:43:9c:16:dd:46:fb:34: e4:3c:ae:a4:9a:a1:da:cf:a1:f5:93:13:a6:0e:68: 51:31:f7:26:63:a3:8b:47:c3:94:e4:34:d2:b0:36: cf:22:e5:81:dd:a4:01:e8:79:08:37:ad:7a:b9:da: 24:37:cc:53:f4:51:f8:b5:67:09:15:63:52:60:7f: b0:e2:f0:38:cd:3c:13:42:81:5f:e2:dd:e2:c5:37: f3:ef:05:8c:85:2f:2a:0a:f4:94:2f:70:56:7f:7d: a9:f6:ca:69:0b:a7:40:e1:fa:bc:f0:f4:01:7a:76: 55:f4:2a:57:43:8b:f1:87:58:f2:f4:db:23:26:33: f8:4f Exponent: 65537 (0x10001) X509v3 extensions: X509v3 Subject Key Identifier: D3:97:2E:56:37:6A:89:77:01:D4:E3:42:0D:EC:E7:10:79:9C:E8:7C X509v3 Authority Key Identifier: keyid:D3:97:2E:56:37:6A:89:77:01:D4:E3:42:0D:EC:E7:10:79:9C:E8:7C DirName:/CN=Teldat-PKI/O=Teldat/L=Madrid/C=ES serial:7C:28:60:8A:6F:42:5D:C8:44:F0:10:0D:61:E5:CA:40:11:BC:EA:F2 X509v3 Basic Constraints: critical CA:TRUE, pathlen:0 X509v3 Key Usage: critical Digital Signature, Key Encipherment, Certificate Sign, CRL Sign Signature Algorithm: sha256WithRSAEncryption Signature Value: 5e:0d:47:96:a2:24:38:fa:62:5b:0c:c2:4e:59:23:79:40:1b: 88:d1:63:11:0b:ce:bc:63:46:cd:70:33:52:75:4b:85:c1:39: be:3c:ce:7c:66:53:63:b4:39:07:ec:ef:52:fe:fa:dc:c1:fb: e4:51:61:28:58:4f:90:71:83:50:7d:62:a9:16:fa:45:89:08: 5f:39:43:6a:b1:bb:ad:4e:6f:50:bc:07:4f:1c:5b:07:df:63: ec:44:20:48:b6:97:00:e2:9d:8e:42:9e:96:5f:71:7a:43:96: de:fd:66:6b:45:85:5d:e4:dc:bf:e9:34:64:4f:3a:7b:33:a0: 54:80:3b:9a:5b:1f:3f:3f:1c:09:a3:8e:d8:b6:2a:ba:b2:07: 87:fa:0f:a5:69:41:06:b1:14:6f:09:4f:bb:88:60:87:70:83: 31:73:ed:2a:03:ca:3c:19:0a:b2:24:61:c6:ce:09:97:ac:6e: da:cb:47:88:c5:f5:a7:74:d2:96:e0:cc:c3:b6:b7:f6:64:9f: ad:1c:7f:36:fd:39:7c:57:54:a5:e9:8a:82:90:4d:cd:74:99: 27:4d:f6:62:a6:96:c5:6e:d3:02:ec:c1:4d:5f:46:b6:82:75: 12:61:d7:a3:d6:70:f6:35:9d:9c:30:06:84:af:b2:cb:a5:a0: 5e:d3:1d:6c
Step 5: Run command pki show certificate running://auth/certificates/scep/CSR/user/cert at DUT0 and check if output contains the following tokens:
Subject: CN = MyUserCertShow output
Certificate: Data: Version: 3 (0x2) Serial Number: 2 (0x2) Signature Algorithm: sha256WithRSAEncryption Issuer: CN = Teldat-PKI, O = Teldat, L = Madrid, C = ES Validity Not Before: Dec 17 17:25:28 2025 GMT Not After : Dec 17 17:25:28 2026 GMT Subject: CN = MyUserCert Subject Public Key Info: Public Key Algorithm: rsaEncryption Public-Key: (2048 bit) Modulus: 00:b5:15:a8:c2:00:40:03:46:d8:df:bb:f0:e5:47: 5f:4f:00:88:d8:3b:88:9b:9e:cc:13:17:b7:9e:4a: e3:86:33:fc:f0:a5:0c:c2:ed:ea:b9:66:47:ef:45: 68:df:d6:c8:b1:c5:50:fb:f0:e6:24:2b:71:96:9e: 64:63:ad:bb:a5:4d:33:76:e4:19:17:ce:6f:ad:73: bd:d7:d6:2a:f2:28:99:cd:d8:d0:22:98:a6:fc:3e: 14:7c:27:58:b9:c2:39:8c:33:26:53:6e:8f:eb:3c: 8a:58:16:c3:17:b1:0c:5f:f6:cb:22:a6:4e:6a:95: 84:30:eb:9e:08:17:4f:47:1b:46:9a:11:9a:4c:f3: a2:17:c5:f6:1d:4a:14:08:43:d8:a4:3c:d8:7e:cf: e8:38:71:1c:71:8e:1d:5e:78:d7:17:05:28:5c:b0: e7:95:7d:a3:17:fa:b1:95:14:6c:b5:22:aa:c5:a2: 90:43:4d:a2:6f:a9:e1:85:0e:ce:dd:da:13:ab:51: 4c:6f:9d:dd:01:d9:ae:d5:62:98:0d:2a:fd:6a:b1: 13:0a:11:e6:8d:24:eb:27:a7:e8:0d:72:b0:43:bc: 18:c3:32:d5:9c:14:d8:eb:92:35:3a:11:52:bd:a2: 6e:0b:7c:ce:ec:16:eb:d7:0b:f7:00:f6:9c:e3:b4: 02:fd Exponent: 65537 (0x10001) X509v3 extensions: X509v3 Key Usage: critical Digital Signature X509v3 Extended Key Usage: TLS Web Client Authentication X509v3 Subject Key Identifier: 47:5D:63:A1:05:29:8B:EF:49:AF:72:FE:18:B8:2F:BE:3F:05:D3:9E X509v3 Authority Key Identifier: D3:97:2E:56:37:6A:89:77:01:D4:E3:42:0D:EC:E7:10:79:9C:E8:7C Signature Algorithm: sha256WithRSAEncryption Signature Value: 47:ae:2f:7f:34:bc:94:1c:48:08:d9:91:d5:e1:06:6f:15:9d: 99:0f:f3:64:35:b5:cb:ba:8c:15:f9:41:74:97:51:cb:8f:2d: 63:9a:6e:c8:7b:67:9a:da:f0:84:02:18:04:43:f1:6e:a3:0f: 7a:03:9c:88:e2:cf:fc:1e:32:39:5c:c4:2b:f2:14:10:02:c8: d5:af:5a:50:14:fa:8d:c0:27:37:64:4d:ac:f5:f5:db:6b:3e: d3:bd:05:b9:97:e2:b8:c4:60:b8:ac:61:ca:2b:c6:c6:e1:f8: 14:c5:ca:06:7f:de:43:89:75:07:7f:bd:a4:ce:49:f8:80:ec: 98:f3:86:f1:88:7e:7e:04:09:3e:97:7e:8e:7b:ae:40:1f:c3: cb:86:60:d9:fc:ec:d9:b3:b9:d9:c5:fd:d5:47:3c:c3:80:96: 28:b1:02:09:0a:8e:92:dd:89:b8:b5:0f:15:6b:ed:f6:4a:72: 21:85:6b:df:ac:59:df:2a:f0:e3:d7:ae:46:af:34:78:57:54: 05:02:31:59:92:ff:c6:e7:c4:3a:eb:03:cc:05:9c:ec:b5:b7: 2b:8a:9f:07:2f:80:28:34:82:aa:77:5d:2e:a9:9f:90:da:53: ff:83:a9:9e:c6:6c:bc:19:dd:bb:de:ff:53:11:e0:09:77:f1: 79:07:c5:36
Test SCEP Protocol With Windows Server PKI
Description
In this scenario, the SCEP protocol is used to retrieve digital certificates (X509) from a Windows PKI server.
Scenario
Step 1: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 10.215.168.64/24 set protocols static route 192.168.212.0/22 next-hop 10.215.168.1 set system certificate scep csr CSR cgi-path CertSrv/mscep/mscep.dll/pkiclient.exe set system certificate scep csr CSR distinguished-names CN=MyUserCert set system certificate scep csr CSR encrypted-password U2FsdGVkX1/fut36tvmLOFlljkDJ5gzqNOEaDs+z9G+WB5hCWyeuVvNGi/hM0Z3pw+mZkrtUA9ZMDJMzatSIQQ== set system certificate scep csr CSR url 'http://192.168.213.25/' set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Ping IP address 10.215.168.1 from DUT0:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.152 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.152/0.152/0.152/0.000 ms
Step 3: Ping IP address 192.168.213.25 from DUT0:
admin@DUT0$ ping 192.168.213.25 count 1 size 56 timeout 1Show output
PING 192.168.213.25 (192.168.213.25) 56(84) bytes of data. 64 bytes from 192.168.213.25: icmp_seq=1 ttl=126 time=0.528 ms --- 192.168.213.25 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.528/0.528/0.528/0.000 ms
Step 4: Run command pki scep show CSR at DUT0 and check if output matches the following regular expressions:
ca\s+Valid usercert\s+ValidShow output
------------------------------------------------------------------------------------- Certificate Status Usage NotBefore NotAfter ------------------------------------------------------------------------------------- ca Valid Signature Dec 14 10:00:35 2023 GMT Dec 14 10:10:34 2053 GMT ra Valid Encipherment Dec 21 09:33:45 2023 GMT Dec 20 09:33:45 2025 GMT ra-2 Valid Signature Dec 21 09:33:43 2023 GMT Dec 20 09:33:43 2025 GMT usercert Valid - Dec 17 16:57:52 2025 GMT Dec 17 20:57:52 2025 GMT
Step 5: Run command pki show certificate running://auth/certificates/scep/CSR/ca/ca.der at DUT0 and check if output contains the following tokens:
Subject: DC = com, DC = scep, CN = scep-TELDATPKI-CAShow output
Certificate: Data: Version: 3 (0x2) Serial Number: 1a:ea:6d:57:94:fe:a5:9c:42:14:81:ca:79:1b:75:d7 Signature Algorithm: sha256WithRSAEncryption Issuer: DC = com, DC = scep, CN = scep-TELDATPKI-CA Validity Not Before: Dec 14 10:00:35 2023 GMT Not After : Dec 14 10:10:34 2053 GMT Subject: DC = com, DC = scep, CN = scep-TELDATPKI-CA Subject Public Key Info: Public Key Algorithm: rsaEncryption Public-Key: (2048 bit) Modulus: 00:bf:c5:be:9a:32:e2:a5:42:6c:b8:42:b5:7b:21: e5:71:b0:79:46:b1:41:bd:25:c3:40:e1:33:8e:1a: 3b:12:ca:26:1e:f3:c9:44:d6:b5:9a:03:cb:14:f5: 82:6f:a8:7e:47:bc:e7:e0:b3:1f:c6:ff:84:54:2b: fd:b6:0d:e1:4f:c3:b7:6a:0f:98:99:c2:8a:b6:b8: 9d:f3:5d:36:f3:af:48:0f:7d:cd:5a:6c:a8:10:0c: 02:b2:0c:af:b3:d8:c3:b4:de:0e:b8:15:6d:4a:f0: 4e:67:7d:c2:3a:dd:03:f7:3d:80:69:63:2c:f9:97: fa:d3:4d:80:13:dd:24:ac:54:ad:f7:cc:25:94:41: fd:2d:e8:2a:8e:a8:91:96:89:d2:9f:0c:17:03:99: 11:f5:ce:2c:db:78:b7:09:75:d1:96:af:58:82:58: 62:86:63:01:16:68:fc:06:db:92:d0:c5:6d:9d:6d: fd:5d:13:b0:2b:37:2f:9c:ae:3b:e3:34:d6:42:7b: 12:01:93:da:ea:b4:c8:ba:9f:57:35:4f:6a:a1:95: c2:5f:40:9d:6b:c1:72:ec:91:9b:72:cc:6a:b8:9e: dc:08:f0:53:09:4f:d4:09:75:28:99:56:f5:66:be: 7d:ca:59:0e:9b:50:4d:be:98:04:20:4d:98:e6:5f: 58:c5 Exponent: 65537 (0x10001) X509v3 extensions: 1.3.6.1.4.1.311.20.2: ...C.A X509v3 Key Usage: critical Digital Signature, Certificate Sign, CRL Sign X509v3 Basic Constraints: critical CA:TRUE X509v3 Subject Key Identifier: AF:CF:34:AD:5B:BC:15:CF:9E:0B:FB:4A:ED:09:79:E0:01:68:5D:B8 1.3.6.1.4.1.311.21.1: ... Signature Algorithm: sha256WithRSAEncryption Signature Value: 6c:44:b8:33:b1:75:08:00:07:7f:2b:a4:80:f2:6a:ff:94:4c: ee:85:cc:61:db:49:59:19:cc:01:2f:c5:45:4b:d2:8d:dc:77: 54:7d:3c:34:75:28:c9:16:28:94:15:51:3d:e6:f7:dc:9b:d8: cd:63:bb:d3:ec:fc:ae:32:7e:cd:be:50:c2:9f:f7:91:de:9e: bb:44:d3:24:09:4d:dd:5f:67:ad:58:ad:7e:cc:9e:9f:8f:c8: 48:f5:d9:03:9a:a3:df:cd:e5:8a:e0:03:9e:36:f9:ba:fd:ff: 0b:a0:15:8c:66:9f:49:bc:e8:94:3e:61:7d:78:ff:48:66:d1: 13:54:1d:41:61:63:28:ba:d9:f8:6a:c4:df:48:16:d2:69:39: c0:38:ea:54:84:e0:40:17:d9:2c:43:58:be:e4:a1:5d:e2:6c: e9:23:55:b7:6e:61:8f:4e:72:4f:c2:d5:c4:7a:74:f5:8e:b3: 0e:2c:bc:5d:7d:ba:f8:ae:3b:f0:d6:b0:2e:1f:3f:fd:2d:77: 7d:52:bf:f7:07:ba:9d:64:60:57:1d:68:34:bb:cb:44:ac:dd: 55:c2:40:a1:98:84:b7:74:50:a4:50:95:0e:12:59:96:b9:af: bc:b3:09:e6:67:39:26:7e:b0:41:07:90:57:72:40:2a:11:7a: 2e:ac:be:b8
Step 6: Run command pki show certificate running://auth/certificates/scep/CSR/user/cert at DUT0 and check if output contains the following tokens:
Subject: CN = MyUserCertShow output
Certificate: Data: Version: 3 (0x2) Serial Number: 1c:00:01:25:90:9e:f9:fa:7b:ff:ba:ed:32:00:00:00:01:25:90 Signature Algorithm: sha256WithRSAEncryption Issuer: DC = com, DC = scep, CN = scep-TELDATPKI-CA Validity Not Before: Dec 17 16:57:52 2025 GMT Not After : Dec 17 20:57:52 2025 GMT Subject: CN = MyUserCert Subject Public Key Info: Public Key Algorithm: rsaEncryption Public-Key: (2048 bit) Modulus: 00:c9:f8:2d:3c:bd:75:8b:5a:e4:e6:9e:d9:af:b5: a2:76:f4:d3:f3:cc:87:55:e8:b0:6c:a3:a9:24:aa: 4b:0e:7d:76:08:50:58:1d:0e:ba:91:b3:22:47:b4: ad:cc:f6:37:35:52:3d:9f:27:83:69:29:4b:56:44: db:1a:4a:8f:85:68:89:ec:e1:90:a8:47:4e:2f:62: 4f:31:a7:da:59:8f:21:a8:d2:53:97:ec:0c:5e:ab: df:4d:a6:19:9b:c7:43:69:34:7a:6d:89:10:69:c4: 99:ab:3b:7d:33:b5:4b:55:2a:2c:86:8e:f4:0a:8e: b8:18:27:da:47:50:a9:45:3e:9a:c5:a7:9b:25:75: f8:e1:96:87:e2:26:ad:ce:75:cc:04:c5:8b:28:3a: 32:01:a8:d3:b0:34:c6:4c:cd:2a:20:9d:11:ba:42: 80:dd:35:91:9f:72:44:b8:f9:0e:f1:43:0b:39:65: 0c:a1:b6:99:5b:ff:63:ed:6c:41:a4:42:d0:70:f6: a6:32:7c:f3:74:93:e3:10:a6:92:c2:a3:c0:7d:9d: c3:39:d9:da:8f:89:4b:c7:90:4c:6a:8f:ef:b3:d5: 5b:6d:79:ee:ff:ed:85:7e:02:b6:f3:b2:84:47:b0: da:ff:45:59:e0:a8:e4:52:0e:82:86:fc:10:69:cb: 80:cb Exponent: 65537 (0x10001) X509v3 extensions: X509v3 Subject Key Identifier: 69:E0:15:08:F8:DE:8E:85:16:E9:DD:C7:2D:E6:6A:FA:E1:D3:6A:29 X509v3 Authority Key Identifier: AF:CF:34:AD:5B:BC:15:CF:9E:0B:FB:4A:ED:09:79:E0:01:68:5D:B8 X509v3 CRL Distribution Points: Full Name: URI:http://192.168.213.25/CertEnroll/scep-TELDATPKI-CA.crl Authority Information Access: CA Issuers - URI:ldap:///CN=scep-TELDATPKI-CA,CN=AIA,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=scep,DC=com?cACertificate?base?objectClass=certificationAuthority X509v3 Key Usage: critical Digital Signature, Key Encipherment, Data Encipherment 1.3.6.1.4.1.311.21.7: 0..&+.....7.....3......./...(...f<...[...]..d.. X509v3 Extended Key Usage: 1.3.6.1.4.1.311.20.1, Microsoft Encrypted File System, Code Signing, Any Extended Key Usage, TLS Web Server Authentication, Signing KDC Response, TLS Web Client Authentication, 1.3.6.1.4.1.311.21.5, 1.3.6.1.4.1.311.20.2.1, 1.3.6.1.5.5.8.2.2 1.3.6.1.4.1.311.21.10: 0y0...+.....7..0.. +.....7 ..0 ..+.......0...U.%.0 ..+.......0...+......0 ..+.......0...+.....7..0.. +.....7...0 ..+....... S/MIME Capabilities: 050...*.H.. ......0...*.H.. ......0...+....0 ..*.H.. .. Signature Algorithm: sha256WithRSAEncryption Signature Value: bd:b0:49:35:66:5d:1d:03:79:c0:d3:ab:f7:52:df:a9:98:1b: b7:c4:91:0f:75:1d:14:96:47:61:7b:6a:13:8a:83:ad:05:ef: 3f:ba:9f:7e:94:c6:32:ea:bc:9c:f0:95:f2:76:42:51:22:e9: 2e:eb:19:1f:cf:f4:07:2f:01:76:05:1e:15:b8:34:9b:6f:c8: 30:ad:02:be:d9:0c:c2:85:3a:5c:0d:94:52:2b:02:fc:a5:ab: 74:95:ef:6b:eb:75:c8:be:17:ba:fb:9c:96:67:d6:3e:27:c4: 61:30:72:cd:21:f3:89:91:e5:b6:09:94:d4:09:f9:79:8c:4a: bd:0a:36:5b:1c:67:79:b8:fe:ee:e3:60:be:1d:70:1e:f2:15: c8:9f:1a:b9:16:15:da:b3:4f:ac:9d:e8:8f:33:14:a9:d8:8e: 00:85:ba:5a:e3:78:f2:f0:6b:5c:59:6b:67:f5:e8:58:64:12: 5b:ff:df:d3:5a:1a:7a:c2:bd:32:f1:5f:7b:72:18:11:45:c5: 95:6b:5c:d2:7d:e9:c5:b1:c0:f8:8e:b5:5b:c1:74:7b:ea:08: ef:aa:9c:03:22:fa:26:68:33:75:f8:41:a7:25:7e:fa:d9:6a: 10:64:3c:62:89:8f:f4:b7:ad:dd:1e:01:94:6c:49:71:e1:2b: 4b:97:9d:b4