Flo - That worked!

I noticed in the output of each "resubmit" that it said it was contacting the DogTag so it all kinda makes sense now as to why they couldn't renew.


I can see that the certs actually renewed when i run "getcert list" but when I'm in the web interface and goto "Authentication" --> "Certificates" and Select Cert #93 (for example).

It still shows an expiry date of 05/04/2023  and the "Subject" for the cert is "CN=CA Audit,O=[sanitized domain name]". The issuing CA is "ipa".

Are these the same certs that I'm seeing in "getcert list" output ?? Do I need to bounce a service to re-read or for the gui to see the changes?


Btw - I'm running ipa-server-4.6.8-5.el7   (On a cent 7.9 box)


v/r,

justin


On 4/17/2023 10:46 AM, Florence Blanc-Renaud wrote:
Hi,

On Mon, Apr 17, 2023 at 3:32 PM Justin Sanderson <[email protected]> wrote:


    Hey Flo - thanks for the quick response and input.


    I stumbled across the link you referenced this past weekend. For
    now, I'm ok with using BasicAuth to keep the system running.

    However, that is indicative of an underlying cert issue and may be
    related to the other issues mentioned in the post.


    My biggest/most-pressing issue is that I have an UNREACHABLE CA
    ... Is this problem due to the tomcat-pki not being able to
    login?? I would think that after switching over to binddn/password
    that the UNREACHABLE would resolve itself if that were the case.

    Basically, I think I'm having 2 issues.

    1) the dogtag pki --> ldap auth    which i think i have fixed for now.

    2) I don't know how to fix the UNREACHABLE for the certs on the
    NSSDB (see below)

Can you check if the PKI server is responsive using the following commands?
# kinit admin
# ipa cert-show 1

  * If the command properly returns something then it means PKI is
    reachable and you can retry the renewal with

# getcert resubmit -i <request id>
with <request id> corresponding to the ID for auditSigningCert cert-pki-ca / ocspSigningCert cert-pki-ca. Wait for one renewal to complete successfully (getcert list -i <request id> displays MONITORING when the renewal is done) before launching the next one.
You can observe the journal for additional logs.

  * If the command fails additional debugging will be needed, the
    first step would be to create /etc/ipa/server.conf with the
    following content:

[global]
debug=True

and restart the stack with "ipactl restart". Then check the content of /var/log/httpd/error_log when you run "ipa cert-show 1", it will contain additional messages.

By the way, which IPA version is installed? rpm -qa | grep ipa-server

flo


    I know I'm missing something but I'm so new to this platform that
    I literally don't know where/how to fix.


    Thanks again.


    On 4/17/2023 4:03 AM, Florence Blanc-Renaud wrote:
    Hi,

    On Mon, Apr 17, 2023 at 5:42 AM Justin Sanderson via
    FreeIPA-users <[email protected]> wrote:

        THANKS IN ADVANCE FOR ANY HELP INFO YOU CAN PROVIDE!!

        Greatly Appreciate!!


        Ok. So after doing a LOT of reading and learning about
        FreeIPA the past 2 days (yep, I inherited), I was able to fix
        my problem of pki-tomcatd (DogTAG i think its called) so that
        it would start.

        The pki-tomcatd service wouldn't start due to some cert
        issues. I was fortunate enough to figure out how to enable
        BasicAuth for now to get the service to start.. so thats a win.

    So it means that PKI was not able to authenticate to the LDAP
    server using the certificate subsystemCert cert-pki-ca and you
    switched from certificate-based authentication to simple bind
    using DN/password.

    There are some troubleshooting hints here for this specific
    issue:
    
https://floblanc.wordpress.com/2017/09/11/troubleshooting-freeipa-pki-tomcatd-fails-to-start/

    HTH,
    flo


        My SETUP:

        I have a single server instance as a VM. There are no replicas.

        The FreeIPA configuration is:

        1) No DNS BIND server - using external DNS via AD in
        /etc/resolv.conf

        2)  We ARE running all other services

        3) Self-Signed CA configuration using DogTag i think its
        called. there are not external certs being used.


        ipactl start has no issues now after I fixed the pki-tomcatd
        start problem using BasicAuth (workaround)


        PROBLEM :

        When i run "getcert list" I have 3 that have status
        CA_UNREACHABLE and ALL of them are related to
        /etc/pki/pki-tomcat/alias NSSDB.

        They are set to expire in a few weeks so I need to figure
        this out.. needing some help.

        The getcert list outputs a total of 9 or 10 certs so I don't
        think I'm missing anything.. Based off what I was able to
        find, it's common to have 8-10 certs in the output...?


        Below are 2 of 3 certs that are going to expire soon and
        their CA is in an UNREACHABLE state. They all use the same NSSDB

        **I have no idea where to start looking to fix this
        problem... which log file... how is it supposed to talk to
        the NSSDB. it's not a socket...? **

        I'm worried that the certs will expire and I won't know how
        to fix it. or where to even look. HELP*!*!

        I've seen several people posting already about certmonger not
        succesfully tracking/renewing some certs so Im a bit
        concerned espicially since the CA_UNREAHABLE error.

        How do I fix this:

        1) manually generate new certs and wth do I put them?

        2) why is the CA_UNREACHABLE on a NSSDB ..? The files are
        there and intact. I can view the contents no prob.


        ============ getcert list output ============================

        Request ID '20190621200128':

                status: CA_UNREACHABLE

                ca-error: Internal error

                stuck: no

                key pair storage:
        
type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='auditSigningCert
        cert-pki-ca',token='NSS FIPS 140-2 Certificate DB',pin set

                certificate:
        
type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='auditSigningCert
        cert-pki-ca',token='NSS FIPS 140-2 Certificate DB'

                CA: dogtag-ipa-ca-renew-agent

                issuer: CN=Certificate Authority,O=[SANITIZED DNS NAME]

                subject: CN=CA Audit,O=[SANITIZED DNS NAME]

                expires: 2023-05-04 12:52:47 UTC

                key usage: digitalSignature,nonRepudiation

                pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad

                post-save command:
        /usr/libexec/ipa/certmonger/renew_ca_cert "auditSigningCert
        cert-pki-ca"

                track: yes

                auto-renew: yes

        Request ID '20190621200129':

                status: CA_UNREACHABLE

                ca-error: Internal error

                stuck: no

                key pair storage:
        
type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='ocspSigningCert
        cert-pki-ca',token='NSS FIPS 140-2 Certificate DB',pin set

                certificate:
        
type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='ocspSigningCert
        cert-pki-ca',token='NSS FIPS 140-2 Certificate DB'

                CA: dogtag-ipa-ca-renew-agent

                issuer: CN=Certificate Authority,O=[SANITIZED DNS NAME]

                subject: CN=OCSP Subsystem,O=[SANITIZED DNS NAME]

                expires: 2023-05-04 12:53:17 UTC

                eku: id-kp-OCSPSigning

                pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad

                post-save command:
        /usr/libexec/ipa/certmonger/renew_ca_cert "ocspSigningCert
        cert-pki-ca"

                track: yes

                auto-renew: yes

         
===================================================================================================================================




        _______________________________________________
        FreeIPA-users mailing list --
        [email protected]
        To unsubscribe send an email to
        [email protected]
        Fedora Code of Conduct:
        https://docs.fedoraproject.org/en-US/project/code-of-conduct/
        List Guidelines:
        https://fedoraproject.org/wiki/Mailing_list_guidelines
        List Archives:
        
https://lists.fedorahosted.org/archives/list/[email protected]
        Do not reply to spam, report it:
        https://pagure.io/fedora-infrastructure/new_issue
_______________________________________________
FreeIPA-users mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedorahosted.org/archives/list/[email protected]
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue

Reply via email to