Hi Rob,

Here’s the content of the CSR:

-----BEGIN NEW CERTIFICATE REQUEST-----
 MIIDjTCCAnUCAQAwIjEgMB4GA1UEAxMXbGluMDEuaXhicnUuaXBuZXhpYS5jb20w
 ggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC5co5U1FjtghUjNCUIwWBO
 +5b5cPGOR8Z3n6+MrUFmawrJmSS0MBkZJMRfxE2MQnNTm8zo0ASTQr2fyFqOLqdV
 PBCEcGBpNR0eaUKkqfo0ZatKVDJiYRSb+3/Nu2jyLOgHctGYzjXQ5DEgqnoHpUF8
 QTgv1n19zh3Fa7Oc1E7ZANtkaA6lXHCb+a+Vgp7d/TYrMPOVoLrnJywFC0fIOCvP
 5Yuf8hE+ayMqhJqvYzYa3rrdcKWQkreCYr2Jjgtbpe/RN6XvHXAWz2GsttXk3CsI
 yLLtR6xSCCXR5m8QSobU1HJG+ztqaSVUaFWqzjhqLdwGQledPY3oH60r/UneQ6Lj
 AgMBAAGgggEkMCsGCSqGSIb3DQEJFDEeHhwAMgAwADIANAAwADQAMAAyADEANwAz
 ADUAMgAwMIH0BgkqhkiG9w0BCQ4xgeYwgeMwgbAGA1UdEQEBAASBpTCBooIXbGlu
 MDEuaXhicnUuaXBuZXhpYS5jb22gOAYKKwYBBAGCNxQCA6AqDChIVFRQL2xpbjAx
 Lml4YnJ1LmlwbmV4aWEuY29tQElQTkVYSUEuQ09NoEcGBisGAQUCAqA9MDugDRsL
 SVBORVhJQS5DT02hKjAooAMCAQGhITAfGwRIVFRQGxdsaW4wMS5peGJydS5pcG5l
 eGlhLmNvbYcECv8OBTAMBgNVHRMBAf8EAjAAMCAGA1UdDgEBAAQWBBQ4324k861U
 Od3oR01IY2KjHEaxQjANBgkqhkiG9w0BAQsFAAOCAQEAVatcK3DB/WU5gEcNOkbd
 lHYB9CiyT32ylgZY1Q8W8qsT60Z9PXzsvTkNl/d5ttuAiWxQm26dpij6NzEz1RW0
 cmvMmVQxFhX+fzptlEZWu56B44uoBidEcAisSHIoAyPVmYvKEkzRCyjtGAR0boIW
 iV6+wEno9Xz84IaQhpoRYqsbfIRnbJ2IoV2DgjjyhsCappzZ4Ste39zwbhnh65Bv
 cQDkpPu3YmBCiX3f6Ml2ZKwkjo3o0sT8CH40agaonp7MR/Yecnf4Jsx6gOZYzr6m
 Of+35h3ncaQOr430Eqr2VzrsoizHwittMo3mKp1RRZgrYaHBnV9Z9+O+ifM8Jsjx
 4g==
 -----END NEW CERTIFICATE REQUEST-----

I can’t see any difference between this CSR and others that worked before. 
Could it be an issue with an updated version of ipa-client or openssl? I tested 
issuing a new certificate from a Ubuntu 22.04 host and that worked just fine. 
Openssl on Ubuntu 20.04 is 1.1.1f while Ubuntu 22.04 have v3.0.2.

The certificate ws requested with: sudo ipa-getcert request -N ${service} -K 
HTTP/${service} -k /etc/ssl/private/${service}.key -f 
/etc/ssl/certs/${service}.crt -D ${service} -A $(host -t A ${service} | awk 
'NF>1{print $NF}’)

Which has worked fine for us for over two years.

Thanks,
Djerk Geurts

> On 2 Apr 2024, at 22:29, Rob Crittenden <[email protected]> wrote:
> 
> Djerk Geurts via FreeIPA-users wrote:
>> Hi,
>> 
>> A month or so ago we upgraded from Fedora 37 to 39. I guess this is the
>> first time I’m getting round to requesting a new certificate, and it’s
>> failing from a server we use to manage several certificates for non-IPA
>> client hosts.
>> 
>> Output of ipa-getcert list:
>> 
>> Request ID '20240402190326':
>>         status: CA_UNREACHABLE
>>         ca-error: Server at https://ipa.domain.com/ipa/xml failed
>> request, will retry: 903 (RPC failed at server.  an internal error has
>> occurred).
>>         stuck: no
>>         key pair storage:
>> type=FILE,location='/etc/ssl/private/host.domain.com.key'
>>         certificate: type=FILE,location='/etc/ssl/certs/host.domain.com.crt'
>>         CA: IPA
>>         issuer:
>>         subject:
>>         expires: unknown
>>         pre-save command:
>>         post-save command:
>>         track: yes
>>         auto-renew: yes
>> 
>> The httpd log on the IPA server:
>> 
>> [Tue Apr 02 21:03:26.989287 2024] [wsgi:error] [pid 1606:tid 1957]
>> [remote 10.2.0.92:50078] ipa: ERROR: non-public: ValueError: Only
>> single-valued attributes are supported
>> [Tue Apr 02 21:03:26.989320 2024] [wsgi:error] [pid 1606:tid 1957]
>> [remote 10.2.0.92:50078] Traceback (most recent call last):
>> [Tue Apr 02 21:03:26.989326 2024] [wsgi:error] [pid 1606:tid 1957]
>> [remote 10.2.0.92:50078]   File
>> "/usr/lib/python3.12/site-packages/ipaserver/rpcserver.py", line 417, in
>> wsgi_execute
>> [Tue Apr 02 21:03:26.989330 2024] [wsgi:error] [pid 1606:tid 1957]
>> [remote 10.2.0.92:50078]     result = command(*args, **options)
>> [Tue Apr 02 21:03:26.989333 2024] [wsgi:error] [pid 1606:tid 1957]
>> [remote 10.2.0.92:50078]              ^^^^^^^^^^^^^^^^^^^^^^^^^
>> [Tue Apr 02 21:03:26.989337 2024] [wsgi:error] [pid 1606:tid 1957]
>> [remote 10.2.0.92:50078]   File
>> "/usr/lib/python3.12/site-packages/ipalib/frontend.py", line 471, in
>> __call__
>> [Tue Apr 02 21:03:26.989341 2024] [wsgi:error] [pid 1606:tid 1957]
>> [remote 10.2.0.92:50078]     return self.__do_call(*args, **options)
>> [Tue Apr 02 21:03:26.989345 2024] [wsgi:error] [pid 1606:tid 1957]
>> [remote 10.2.0.92:50078]            ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>> [Tue Apr 02 21:03:26.989348 2024] [wsgi:error] [pid 1606:tid 1957]
>> [remote 10.2.0.92:50078]   File
>> "/usr/lib/python3.12/site-packages/ipalib/frontend.py", line 499, in
>> __do_call
>> [Tue Apr 02 21:03:26.989353 2024] [wsgi:error] [pid 1606:tid 1957]
>> [remote 10.2.0.92:50078]     ret = self.run(*args, **options)
>> [Tue Apr 02 21:03:26.989358 2024] [wsgi:error] [pid 1606:tid 1957]
>> [remote 10.2.0.92:50078]           ^^^^^^^^^^^^^^^^^^^^^^^^^^
>> [Tue Apr 02 21:03:26.989371 2024] [wsgi:error] [pid 1606:tid 1957]
>> [remote 10.2.0.92:50078]   File
>> "/usr/lib/python3.12/site-packages/ipalib/frontend.py", line 816, in run
>> [Tue Apr 02 21:03:26.989376 2024] [wsgi:error] [pid 1606:tid 1957]
>> [remote 10.2.0.92:50078]     return self.execute(*args, **options)
>> [Tue Apr 02 21:03:26.989381 2024] [wsgi:error] [pid 1606:tid 1957]
>> [remote 10.2.0.92:50078]            ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>> [Tue Apr 02 21:03:26.989385 2024] [wsgi:error] [pid 1606:tid 1957]
>> [remote 10.2.0.92:50078]   File
>> "/usr/lib/python3.12/site-packages/ipaserver/plugins/cert.py", line 716,
>> in execute
>> [Tue Apr 02 21:03:26.989389 2024] [wsgi:error] [pid 1606:tid 1957]
>> [remote 10.2.0.92:50078]     ext_san = csr.extensions.get_extension_for_oid(
>> [Tue Apr 02 21:03:26.989392 2024] [wsgi:error] [pid 1606:tid 1957]
>> [remote 10.2.0.92:50078]               ^^^^^^^^^^^^^^
>> [Tue Apr 02 21:03:26.989396 2024] [wsgi:error] [pid 1606:tid 1957]
>> [remote 10.2.0.92:50078] ValueError: Only single-valued attributes are
>> supported
>> [Tue Apr 02 21:03:26.989527 2024] [wsgi:error] [pid 1606:tid 1957]
>> [remote 10.2.0.92:50078] ipa: INFO: [xmlserver]
>> host/[email protected]: cert_request(‘MIID**********d1A==',
>> principal='HTTP/[email protected]', add=True, version='2.51'):
>> InternalError
>> 
>> The requesting machine is allowed to manage both the host and the
>> service. Requesting the certificate on the IPA server itself works fine.
>> I’ve read elsewhere that this could be an incompatibility between the
>> client and the server.
>> 
>> Client: Ubuntu 20.04 LTS, ipa-client: v4.8.6
>> Server: Fedora 39, ipa-server: v4.11.1
> 
> Can we see the whole CSR? You should be able to find it in the
> certmonger request file in /var/lib/certmonger/requests/<some value>
> Sometimes the value matches the Request ID but not always.
> 
> It is the parsing of the CSR where it blew up, getting multiple values
> where only one was expected.
> 
> rob

--
_______________________________________________
FreeIPA-users mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedorahosted.org/archives/list/[email protected]
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue

Reply via email to