Issue has been created.
I would assign it to you, but lack credentials?

https://issues.apache.org/jira/browse/CLOUDSTACK-7635

Regards,
F.

On 26 Sep 2014, at 11:47, Stephen Turner <stephen.tur...@citrix.com> wrote:

> Yes, I would like a bug report for this. Please assign it to me. This bit of 
> UI has been rewritten on master, but it should work the same in all browsers, 
> so I'd like to investigate whether it's fixed on master, and also whether 
> there are any other similar controls that aren't working in FF 32.
> 
> If you can attach a public key and other data that illustrates the problem, 
> that would be great just to make sure that we can repro it. Thank you.
> 
> -- 
> Stephen Turner
> 
> 
> -----Original Message-----
> From: France [mailto:mailingli...@isg.si] 
> Sent: 25 September 2014 14:52
> To: dev@cloudstack.apache.org
> Subject: Re: Urgent. Importing certificate to CS 4.3.1 using GUI
> 
> There is a bug in ACS 4.3.1 GUI.
> The before mentioned process did not work with Firefox 32.0.2, while it 
> worked on latest Chrome.
> Because the problem is on the browser side, it did not reach management 
> server logs at all.
> I have done everything correct. Even a couple of times. ;-)
> 
> Hopefully this mail will help someone in the future. I would also advise to 
> update the documentation on the issue.
> 
> Do you want me to open a bug report for this? I am a little reluctant to do 
> so, because some of the bug reports i made previously just sit there for 
> years to come.
> 
> FYI also got contacted off the mailing list by Steve Roles from ShapeBlue who 
> kindly offered to sell annual 24/7 support to help me sort this issue.
> Too bad they did not want to provide help/support for this one incident, 
> which which they "have come across" already. They could get payed well for 
> telling me to use another browser. :-) While i appreciate what ShapeBlue does 
> for ACS, they could easily just have told us publicly on the mailing list to 
> use a different browser.
> 
> Many thanks to anyone else who actually tried to help on the issue. 
> Realhostip.com migration is now officially complete.
> 
> Regards,
> F.
> 
> On 25 Sep 2014, at 14:54, France <mailingli...@isg.si> wrote:
> 
>> I have created new key and csr. Signed it, converted key to pkcs8 format 
>> without encryption and added in ACS GUI with *.domain.tld and again with 
>> domain.tld. I did copy paste the crt and key with and without -----BEGIN 
>> CERTIFICATE-- tags. Nothing works. I have the same GUI error message as 
>> before. Management-log shows no errors or even logs regarding certificate 
>> manipulation. I have not created CA key and certs again. I have confirmed 
>> certificate before importing to ACS using: openssl x509 -in 
>> private/vse.somedomain.tls.crt -noout -text (result below).
>> 
>> Maybe i could just insert new certs straight into the database, destroy 
>> console proxy and see what happens.
>> Any more ideas?
>> 
>> Also there is a bug in 4.3 documentation, because it says one must 
>> enter *.domain.tld while you say, it should be just domain.tld
>> 
>> "
>> In the Update SSL Certificate screen of the CloudStack UI, paste the 
>> following:
>> 
>>      * The certificate you've just generated.
>>      * The private key you've just generated.
>>      * The desired domain name, prefixed with *.; for example, 
>> *.consoleproxy.company.com "
>> 
>> ////
>> [root@mc1 private]# openssl x509 -in vse.somedomain.si.crt -noout 
>> -text
>> Certificate:
>>   Data:
>>       Version: 3 (0x2)
>>       Serial Number: 4097 (0x1001)
>>   Signature Algorithm: sha256WithRSAEncryption
>>       Issuer: C=SI, ST=Slovenia, L=Ljubljana, O=XXX d.o.o., OU=IT 
>> department, CN=optimus.si/emailAddress=sis...@xxxb.si
>>       Validity
>>           Not Before: Sep 25 12:25:32 2014 GMT
>>           Not After : Jun  3 12:25:32 2028 GMT
>>       Subject: C=SI, ST=Slovenia, O=XXX d.o.o., OU=IT department, 
>> CN=*.somedomain.si/emailAddress=sis...@xxxb.si
>>       Subject Public Key Info:
>>           Public Key Algorithm: rsaEncryption
>>               Public-Key: (2048 bit)
>>               Modulus:
>>                   00:a8:50:02:21:7a:49:b1:48:07:96:21:87:69:1d:
>>                   94:6f:d8:4f:0b:31:f4:8f:6f:e4:b2:78:94:38:d4:
>>                   72:92:5b:d5:43:73:aa:e4:33:48:31:11:5a:62:7e:
>>                   95:2b:e1:78:11:81:f0:ef:1a:0d:d0:52:90:47:2b:
>>                   fd:ab:0d:89:57:fa:ee:6b:3b:d1:24:c9:a9:6d:d6:
>>                   fb:0f:14:e3:72:63:a7:75:3d:3e:f5:57:45:09:7e:
>>                   83:18:f1:77:c9:3a:1e:de:6f:cd:43:0f:84:11:08:
>>                   05:3b:da:ed:3e:a6:65:7c:e9:3f:3b:b9:73:b3:87:
>>                   b6:a2:14:af:fd:3e:a9:6f:0f:e4:fb:4d:91:70:d6:
>>                   9a:78:b8:00:2e:f0:ad:24:07:01:64:b8:1f:ce:62:
>>                   f6:83:e3:fb:45:b9:3e:a1:c3:e6:de:87:d9:37:d3:
>>                   28:cf:20:6c:f9:78:5f:24:64:fb:d4:dd:79:90:87:
>>                   69:36:ad:83:3d:bd:ab:fd:aa:1d:6a:a6:b8:d5:8a:
>>                   f9:d6:e4:f0:db:9a:81:d4:41:e9:19:bf:a5:e8:fb:
>>                   d9:f5:e2:50:3c:4d:01:6d:3d:96:26:59:76:70:99:
>>                   8c:2e:c0:cf:dd:09:3b:fb:6f:8d:43:29:0c:7e:8a:
>>                   5c:8d:49:f4:9a:96:ba:54:72:44:d8:fa:aa:64:71:
>>                   27:21
>>               Exponent: 65537 (0x10001)
>>       X509v3 extensions:
>>           X509v3 Basic Constraints: 
>>               CA:FALSE
>>           X509v3 Key Usage: 
>>               Digital Signature, Non Repudiation, Key Encipherment
>>           Netscape Comment: 
>>               OpenSSL Generated Certificate
>>           X509v3 Subject Key Identifier: 
>>               13:B4:E9:B7:EA:67:BC:00:BA:20:F9:9D:AB:02:14:0D:22:B4:F7:5B
>>           X509v3 Authority Key Identifier: 
>> 
>> keyid:B9:4F:AC:D0:CA:A4:32:E0:A0:49:48:8D:D4:C9:6A:6D:6F:6C:8F:42
>> 
>>   Signature Algorithm: sha256WithRSAEncryption
>>        a9:f2:77:c2:10:9b:87:f4:44:9c:57:52:1b:dc:70:a7:e2:bf:
>>        97:8d:bb:3d:bc:b7:a9:90:55:75:43:47:ac:bf:6f:2a:5e:90:
>>        b1:5b:8c:41:e7:5a:51:2a:f7:db:2e:6a:37:e5:6e:18:3a:88:
>>        ae:10:42:1e:97:4c:75:e9:8a:51:37:8f:e9:99:bc:40:46:18:
>>        85:18:ce:6f:03:24:c7:b3:43:f2:53:51:34:36:70:d8:3b:84:
>>        09:70:91:13:51:a9:b7:30:e4:d3:f7:1a:34:f4:6b:25:b7:46:
>>        a1:dd:b7:eb:19:b3:03:be:b5:3d:12:b7:ee:a9:47:26:17:89:
>>        ef:06:9e:90:b4:78:5d:d9:52:1c:b4:0d:14:f2:37:64:9a:d8:
>>        4d:89:95:1e:c0:6b:14:93:e8:ea:91:84:69:c5:22:1f:d2:82:
>>        54:bd:fe:06:f8:ea:f3:66:a1:27:41:72:88:25:78:eb:2b:1b:
>>        73:fb:98:0f:00:58:b0:43:22:5b:3b:ea:89:b5:4f:3e:2a:ed:
>>        92:5f:48:37:39:ec:39:6c:b5:73:d3:0d:9c:ff:3b:37:92:5b:
>>        c6:ef:64:65:7a:99:1a:be:09:0e:bb:62:1b:9f:9e:ad:5d:cf:
>>        32:8c:81:42:c2:d9:11:65:64:8d:ce:5e:f5:b4:77:66:74:eb:
>>        10:d5:7e:58:d7:ba:70:fe:96:4b:94:f5:66:5c:af:57:ae:e0:
>>        ad:72:7a:ef:04:80:7e:4b:6d:ee:13:e2:de:20:94:4e:bb:7b:
>>        a6:87:0f:92:d8:c4:01:9b:50:fd:b4:0b:60:b2:93:91:32:ce:
>>        31:f9:b7:4f:a0:72:71:a1:87:b4:02:ff:5b:49:c1:2f:a1:6d:
>>        13:98:c1:81:9c:33:f6:61:b9:f9:47:7b:7b:2a:b2:e0:7b:21:
>>        4b:67:c0:23:04:b7:08:e5:7d:a3:44:b5:a5:aa:ce:03:be:93:
>>        cb:78:fe:2d:e5:a7:61:20:03:b2:a1:ac:92:41:54:c0:25:b5:
>>        32:c6:c5:83:49:7a:cd:a8:16:4e:80:f2:05:9c:47:17:74:1f:
>>        55:63:f2:9c:e3:fa:48:cb:93:40:8f:63:7b:69:2f:2a:22:4e:
>>        0e:44:1b:52:3e:70:fb:65:43:be:a2:0a:04:5e:70:cf:d7:fe:
>>        d5:66:0a:19:81:d5:bf:54:ce:fd:25:cc:d8:f6:cc:be:e8:a9:
>>        e1:a9:38:ef:81:80:2e:61:52:fb:0a:0c:e5:21:e1:7a:c8:3f:
>>        8e:6a:9a:ab:a6:72:81:54:43:08:65:b8:62:00:08:c8:c2:f6:
>>        88:82:7e:fb:07:22:67:09:c0:1a:fb:d9:69:17:2a:d8:be:01:
>>        7e:e5:ee:3d:1b:f1:bf:3f
>> ////
>> 
>> 
>> Tnx and regards,
>> F.
>> 
>> 
>> On 25 Sep 2014, at 13:48, France <mailingli...@isg.si> wrote:
>> 
>>> Tnx Amogh,
>>> 
>>> i have checked management-server.log and no new entries or errors regarding 
>>> certificate operation are written at the time when i get "Failed to update 
>>> SSL Certificate." error message. I tried it a couple of times. I also used 
>>> somedomain.tld in the GUI. Certificate is for *.somedomain.tld.
>>> I will go thru whole create CA and certificate process again and retry.
>>> There must be some simple mistake in my process somewhere. Lack of 
>>> errors in logs, is also strange. :-/
>>> 
>>> Regards,
>>> F.
>>> 
>>> On 24 Sep 2014, at 21:10, Amogh Vasekar <amogh.vase...@citrix.com> wrote:
>>> 
>>>> Hi,
>>>> 
>>>> Couple of things :
>>>> 
>>>> 1. The error will be logged to the cloudstack management server log 
>>>> file
>>>> (management-server.log) and would really help to know what it is.
>>>> 2. While uploading the certificate, the domain_suffix should be 
>>>> somedomain.tld and not *.somedomain.tld (the asterisk is only for 
>>>> global config so that cloudstack can distinguish between HTTP and 
>>>> HTTPS modes)
>>>> 
>>>> Thanks
>>>> Amogh
>>>> 
>>>> On 9/24/14 7:40 AM, "France" <mailingli...@isg.si> wrote:
>>>> 
>>>>> Hi guys,
>>>>> 
>>>>> i want to migrate away from realhostip.com. I have set up DNS 
>>>>> service in no time, but am having problems importing certificates to ACS 
>>>>> 3.4.1.
>>>>> 
>>>>> I created my own CA like this:
>>>>> 
>>>>> cd /etc/pki/CA
>>>>> touch index.txt
>>>>> echo 1000 > serial
>>>>> openssl genrsa -aes256 -out /etc/pki/CA/private/ca.key.pem 4096 
>>>>> chmod 400 /etc/pki/CA/private/ca.key.pem nano -w 
>>>>> /etc/pki/tls/openssl.cnf openssl req -new -x509 -days 63650 -key 
>>>>> /etc/pki/CA/private/ca.key.pem
>>>>> -sha256 -extensions v3_ca -out /etc/pki/CA/certs/ca.cert.pem
>>>>> 
>>>>> 
>>>>> Signed my own keys and converted them to pkcs8 format like this:
>>>>> 
>>>>> cd /etc/pki/CA
>>>>> openssl genrsa -out private/vse.somedomain.tld.key.pem 4096 chmod 
>>>>> 400 private/vse.somedomain.tld.key.pem
>>>>> openssl req -sha256 -new -key private/vse.somedomain.tld.key.pem  
>>>>> -out certs/vse.somedomain.tld.csr.pem openssl ca -keyfile 
>>>>> private/ca.key.pem -cert certs/ca.cert.pem -extensions usr_cert 
>>>>> -notext -md sha256 -days 63649 -in certs/vse.somedomain.tld.csr.pem 
>>>>> -out certs/vse.somedomain.tld.cert.pem openssl pkcs8 -topk8 -in 
>>>>> private/vse.somedomain.tld.key.pem -out
>>>>> private/vse.somedomain.tld.key.encrypted.pkcs8
>>>>> openssl pkcs8 -in private/vse.somedomain.tld.key.encrypted.pkcs8 
>>>>> -out
>>>>> private/vse.somedomain.tld.key.pkcs8
>>>>> chmod 400 private/vse.somedomain.tld.key.encrypted.pkcs8
>>>>> chmod 400 private/vse.somedomain.tld.key.pkcs8
>>>>> 
>>>>> 
>>>>> 
>>>>> But when trying to import it via GUI: infrastructure -> SSL Certificate:
>>>>> Certificate from vse.somedomain.tld.cert.pem
>>>>> PKCS8 from private/vse.somedomain.tld.key.pkcs8
>>>>> DNS domain suffix to: *.somedomain.tld
>>>>> 
>>>>> But it fails with:
>>>>> "Failed to update SSL Certificate."
>>>>> 
>>>>> Please help me upload the new certificate.
>>>>> Catalina.out shows no error. I have no idea what else to check.
>>>>> 
>>>>> Thank you.
>>>>> F.
>>>>> 
>>>>> 
>>>> 
>>> 
>> 
> 

Reply via email to