Hi, On Sun, Sep 4, 2022 at 6:54 AM Ahmad Sahibzada via FreeIPA-users < [email protected]> wrote:
> Hi , This time I can't blame certmonger for not renewing my freeipa certs > because they were not added to the tracking list. Now I have manually added > them by following the KB article " > https://access.redhat.com/articles/4062581". Once added i followed the > following article to update it manually by following the KB article " > https://access.redhat.com/solutions/3357261". Even performing all the > steps where i had to reverse the system time and submitting the manual > renewal request using "ipa-getcert resubmit -i [Request ID]" command, i > have no luck renewing the following one. > "auditSigningCert cert-pki-ca" "ocspSigningCert cert-pki-ca" > "subsystemCert cert-pki-ca" "Server-Cert cert-pki-ca". Here is my getcert > list command output: > Number of certificates and requests being tracked: 8. > Request ID '20220903192955': > status: MONITORING > ca-error: Unable to determine principal name for signing request. > stuck: no > key pair storage: > type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='auditSigningCert > cert-pki-ca',token='NSS Certificate DB',pin set > certificate: > type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='auditSigningCert > cert-pki-ca',token='NSS Certificate DB' > CA: IPA > this is not the right CA to track this cert. The start-tracking command needs to specify -c dogtag-ipa-ca-renew-agent issuer: CN=Certificate Authority,O=XYZ.COM > subject: CN=CA Audit,O=XYZ.COM > expires: 2022-07-07 09:02:50 UTC > key usage: digitalSignature,nonRepudiation > pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad > post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert > "auditSigningCert cert-pki-ca" > track: yes > auto-renew: yes > Request ID '20220903193147': > status: MONITORING > ca-error: Unable to determine principal name for signing request. > stuck: no > key pair storage: > type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='ocspSigningCert > cert-pki-ca',token='NSS Certificate DB',pin set > certificate: > type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='ocspSigningCert > cert-pki-ca',token='NSS Certificate DB' > CA: IPA > Same comment as above, please use start-tracking with -c dogtag-ipa-ca-renew-agent. > issuer: CN=Certificate Authority,O=XYZ.COM > subject: CN=OCSP Subsystem,O=XYZ.COM > expires: 2022-07-07 09:01:40 UTC > eku: id-kp-OCSPSigning > pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad > post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert > "ocspSigningCert cert-pki-ca" > track: yes > auto-renew: yes > Request ID '20220903193259': > status: MONITORING > ca-error: Unable to determine principal name for signing request. > stuck: no > key pair storage: > type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='subsystemCert > cert-pki-ca',token='NSS Certificate DB',pin set > certificate: > type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='subsystemCert > cert-pki-ca',token='NSS Certificate DB' > CA: IPA > Same comment as above, please use start-tracking with -c dogtag-ipa-ca-renew-agent. > issuer: CN=Certificate Authority,O=XYZ.COM > subject: CN=CA Subsystem,O=XYZ.COM > expires: 2022-07-27 16:09:07 UTC > key usage: > digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment > eku: id-kp-serverAuth,id-kp-clientAuth > pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad > post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert > "subsystemCert cert-pki-ca" > track: yes > auto-renew: yes > Request ID '20220903193355': > status: MONITORING > ca-error: Unable to determine principal name for signing request. > stuck: no > key pair storage: > type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='Server-Cert > cert-pki-ca',token='NSS Certificate DB',pin set > certificate: > type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='Server-Cert > cert-pki-ca',token='NSS Certificate DB' > CA: IPA > Same comment as above, please use start-tracking with -c dogtag-ipa-ca-renew-agent. > issuer: CN=Certificate Authority,O=XYZ.COM > subject: CN=hq-idm-lxd-01.xyz.com,O=XYZ.COM > expires: 2022-07-27 16:08:27 UTC > key usage: > digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment > eku: id-kp-serverAuth,id-kp-clientAuth > pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad > post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert > "Server-Cert cert-pki-ca" > track: yes > auto-renew: yes > Request ID '20220903193457': > status: MONITORING > stuck: no > key pair storage: > type=FILE,location='/var/kerberos/krb5kdc/kdc.key' > certificate: type=FILE,location='/var/kerberos/krb5kdc/kdc.crt' > CA: IPA > issuer: CN=Certificate Authority,O=XYZ.COM > subject: CN=hq-idm-lxd-01.xyz.com,O=XYZ.COM > expires: 2024-07-06 13:07:27 UTC > The KDC cert has been renewed 2022-07-06, this means that you must pick a date after 2022-07-06 if you retry to change the date in the past. principal name: krbtgt/[email protected] > key usage: > digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment > eku: id-kp-serverAuth,id-pkinit-KPKdc > certificate template/profile: KDCs_PKINIT_Certs > pre-save command: > post-save command: /usr/libexec/ipa/certmonger/renew_kdc_cert > track: yes > auto-renew: yes > Request ID '20220903193541': > status: MONITORING > ca-error: Unable to determine principal name for signing request. > stuck: no > key pair storage: type=FILE,location='/var/lib/ipa/ra-agent.key' > certificate: type=FILE,location='/var/lib/ipa/ra-agent.pem' > CA: IPA > Same comment as above, please use start-tracking with -c dogtag-ipa-ca-renew-agent. HTH, flo > issuer: CN=Certificate Authority,O=XYZ.COM > subject: CN=IPA RA,O=XYZ.COM > expires: 2022-07-27 16:08:37 UTC > key usage: > digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment > eku: id-kp-serverAuth,id-kp-clientAuth > pre-save command: /usr/libexec/ipa/certmonger/renew_ra_cert_pre > post-save command: /usr/libexec/ipa/certmonger/renew_ra_cert > track: yes > auto-renew: yes > Request ID '20220903193608': > status: MONITORING > stuck: no > key pair storage: > type=NSSDB,location='/etc/httpd/alias',nickname='Server-Cert',token='NSS > Certificate DB',pinfile='/etc/httpd/alias/pwdfile.txt' > certificate: > type=NSSDB,location='/etc/httpd/alias',nickname='Server-Cert',token='NSS > Certificate DB' > CA: IPA > issuer: CN=Certificate Authority,O=XYZ.COM > subject: CN=hq-idm-lxd-01.xyz.com,O=XYZ.COM > expires: 2024-07-06 13:08:14 UTC > principal name: HTTP/[email protected] > key usage: > digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment > eku: id-kp-serverAuth,id-kp-clientAuth > pre-save command: > post-save command: /usr/libexec/ipa/certmonger/restart_httpd > track: yes > auto-renew: yes > Request ID '20220903194017': > status: MONITORING > stuck: no > key pair storage: > type=NSSDB,location='/etc/dirsrv/slapd-XYZ.COM',nickname='Server-Cert',token='NSS > Certificate DB',pinfile='/etc/dirsrv/slapd-XYZ.COM/pwdfile.txt' > certificate: > type=NSSDB,location='/etc/dirsrv/slapd-XYZ.COM',nickname='Server-Cert',token='NSS > Certificate DB' > CA: IPA > issuer: CN=Certificate Authority,O=XYZ.COM > subject: CN=hq-idm-lxd-01.xyz.com,O=XYZ.COM > expires: 2024-07-06 13:08:32 UTC > principal name: ldap/[email protected] > key usage: > digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment > eku: id-kp-serverAuth,id-kp-clientAuth > pre-save command: > post-save command: /usr/libexec/ipa/certmonger/restart_dirsrv > slapd-XYZ.COM > track: yes > auto-renew: yes > Here is the output of the ipactl status command, all services run but > pki-tomcatd Service: STOPPED > [root@hq-idm-lxd-01 tmp]# ipactl status > Directory Service: RUNNING > krb5kdc Service: RUNNING > kadmin Service: RUNNING > named Service: RUNNING > httpd Service: RUNNING > ipa-custodia Service: RUNNING > ntpd Service: RUNNING > pki-tomcatd Service: STOPPED > smb Service: RUNNING > winbind Service: RUNNING > ipa-otpd Service: RUNNING > ipa-dnskeysyncd Service: RUNNING > ipa: INFO: The ipactl command was successful > The output of the log /var/log/pki/pki-tomcat/ca/debug > Internal Database Error encountered: Could not connect to LDAP server > host hq-idm-lxd-01.linuxdev.addev.ssa.gov port 636 Error > netscape.ldap.LDAPException: Authentication failed (48) > Finally > [root@hq-idm-lxd-01 tmp]# ipa --version > VERSION: 4.6.5, API_VERSION: 2.231 > [root@hq-idm-lxd-01 tmp]# cat /etc/redhat-release > CentOS Linux release 7.7.1908 (Core) > Due to my limited knowledge of certs and IPA , i would like someone to > help me mitigate this issue. I have exhausted all my resources but still no > luck > VR > Z Sahibzada > _______________________________________________ > FreeIPA-users mailing list -- [email protected] > To unsubscribe send an email to [email protected] > Fedora Code of Conduct: > https://docs.fedoraproject.org/en-US/project/code-of-conduct/ > List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines > List Archives: > https://lists.fedorahosted.org/archives/list/[email protected] > Do not reply to spam, report it: > https://pagure.io/fedora-infrastructure/new_issue >
_______________________________________________ FreeIPA-users mailing list -- [email protected] To unsubscribe send an email to [email protected] Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedorahosted.org/archives/list/[email protected] Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue
