Hey Flo - thanks for the quick response and input.
I stumbled across the link you referenced this past weekend. For now,
I'm ok with using BasicAuth to keep the system running.
However, that is indicative of an underlying cert issue and may be
related to the other issues mentioned in the post.
My biggest/most-pressing issue is that I have an UNREACHABLE CA ... Is
this problem due to the tomcat-pki not being able to login?? I would
think that after switching over to binddn/password that the UNREACHABLE
would resolve itself if that were the case.
Basically, I think I'm having 2 issues.
1) the dogtag pki --> ldap auth which i think i have fixed for now.
2) I don't know how to fix the UNREACHABLE for the certs on the NSSDB
(see below)
I know I'm missing something but I'm so new to this platform that I
literally don't know where/how to fix.
Thanks again.
On 4/17/2023 4:03 AM, Florence Blanc-Renaud wrote:
Hi,
On Mon, Apr 17, 2023 at 5:42 AM Justin Sanderson via FreeIPA-users
<[email protected]> wrote:
THANKS IN ADVANCE FOR ANY HELP INFO YOU CAN PROVIDE!!
Greatly Appreciate!!
Ok. So after doing a LOT of reading and learning about FreeIPA the
past 2 days (yep, I inherited), I was able to fix my problem of
pki-tomcatd (DogTAG i think its called) so that it would start.
The pki-tomcatd service wouldn't start due to some cert issues. I
was fortunate enough to figure out how to enable BasicAuth for now
to get the service to start.. so thats a win.
So it means that PKI was not able to authenticate to the LDAP server
using the certificate subsystemCert cert-pki-ca and you switched from
certificate-based authentication to simple bind using DN/password.
There are some troubleshooting hints here for this specific issue:
https://floblanc.wordpress.com/2017/09/11/troubleshooting-freeipa-pki-tomcatd-fails-to-start/
HTH,
flo
My SETUP:
I have a single server instance as a VM. There are no replicas.
The FreeIPA configuration is:
1) No DNS BIND server - using external DNS via AD in /etc/resolv.conf
2) We ARE running all other services
3) Self-Signed CA configuration using DogTag i think its called.
there are not external certs being used.
ipactl start has no issues now after I fixed the pki-tomcatd start
problem using BasicAuth (workaround)
PROBLEM :
When i run "getcert list" I have 3 that have status CA_UNREACHABLE
and ALL of them are related to /etc/pki/pki-tomcat/alias NSSDB.
They are set to expire in a few weeks so I need to figure this
out.. needing some help.
The getcert list outputs a total of 9 or 10 certs so I don't think
I'm missing anything.. Based off what I was able to find, it's
common to have 8-10 certs in the output...?
Below are 2 of 3 certs that are going to expire soon and their CA
is in an UNREACHABLE state. They all use the same NSSDB
**I have no idea where to start looking to fix this problem...
which log file... how is it supposed to talk to the NSSDB. it's
not a socket...? **
I'm worried that the certs will expire and I won't know how to fix
it. or where to even look. HELP*!*!
I've seen several people posting already about certmonger not
succesfully tracking/renewing some certs so Im a bit concerned
espicially since the CA_UNREAHABLE error.
How do I fix this:
1) manually generate new certs and wth do I put them?
2) why is the CA_UNREACHABLE on a NSSDB ..? The files are there
and intact. I can view the contents no prob.
============ getcert list output ============================
Request ID '20190621200128':
status: CA_UNREACHABLE
ca-error: Internal error
stuck: no
key pair storage:
type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='auditSigningCert
cert-pki-ca',token='NSS FIPS 140-2 Certificate DB',pin set
certificate:
type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='auditSigningCert
cert-pki-ca',token='NSS FIPS 140-2 Certificate DB'
CA: dogtag-ipa-ca-renew-agent
issuer: CN=Certificate Authority,O=[SANITIZED DNS NAME]
subject: CN=CA Audit,O=[SANITIZED DNS NAME]
expires: 2023-05-04 12:52:47 UTC
key usage: digitalSignature,nonRepudiation
pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
post-save command:
/usr/libexec/ipa/certmonger/renew_ca_cert "auditSigningCert
cert-pki-ca"
track: yes
auto-renew: yes
Request ID '20190621200129':
status: CA_UNREACHABLE
ca-error: Internal error
stuck: no
key pair storage:
type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='ocspSigningCert
cert-pki-ca',token='NSS FIPS 140-2 Certificate DB',pin set
certificate:
type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='ocspSigningCert
cert-pki-ca',token='NSS FIPS 140-2 Certificate DB'
CA: dogtag-ipa-ca-renew-agent
issuer: CN=Certificate Authority,O=[SANITIZED DNS NAME]
subject: CN=OCSP Subsystem,O=[SANITIZED DNS NAME]
expires: 2023-05-04 12:53:17 UTC
eku: id-kp-OCSPSigning
pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
post-save command:
/usr/libexec/ipa/certmonger/renew_ca_cert "ocspSigningCert
cert-pki-ca"
track: yes
auto-renew: yes
===================================================================================================================================
_______________________________________________
FreeIPA-users mailing list -- [email protected]
To unsubscribe send an email to
[email protected]
Fedora Code of Conduct:
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines:
https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives:
https://lists.fedorahosted.org/archives/list/[email protected]
Do not reply to spam, report it:
https://pagure.io/fedora-infrastructure/new_issue
_______________________________________________
FreeIPA-users mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Fedora Code of Conduct:
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives:
https://lists.fedorahosted.org/archives/list/[email protected]
Do not reply to spam, report it:
https://pagure.io/fedora-infrastructure/new_issue