Thank you, Flo. The “ipa-cacert-manage delete …” command, followed by
“ipa-certupdate” removed the invalid CA entries from the IPA servers (verified
by looking at /etc/ipa/ca.crt). We also ran ipa-cartupdate on all enrolled
clients.
One issue: We have three IPA servers. On two, healthcheck completes without
error or warnings, but on one server healthcheck reports:
[
{
"source": "ipahealthcheck.ds.nss_ssl",
"check": "NssCheck",
"result": "ERROR",
"uuid": "2537646d-88d9-4d26-8a38-dd445f1250bd",
"when": "20240917154901Z",
"duration": "0.390482",
"kw": {
"key": "DSCERTLE0001",
"items": [
"Expiring Certificate"
],
"msg": "The certificate (Server-Cert) will expire in less than 30 days"
}
}
]
ipa-cacert-manage list on that server only shows the single internal CA as
expected, and /etc/ipa/ca.crt has one entry. Can you advise how to find this
ghost “Server-Cert” that healthcheck finds on only one server?
From: Florence Blanc-Renaud <[email protected]>
Sent: Tuesday, September 17, 2024 12:02 AM
To: FreeIPA users list <[email protected]>
Cc: Dungan, Scott A. <[email protected]>
Subject: Re: [Freeipa-users] Heathcheck error: expiring unused external CA
Hi,
On Mon, Sep 16, 2024 at 11:36 PM Dungan, Scott A. via FreeIPA-users
<[email protected]<mailto:[email protected]>>
wrote:
Running ipa-server version 4.9.13-12 on RHEL8 we are getting the following
error/warning with ipa-healthcheck:
[
{
"source": "ipahealthcheck.ds.nss_ssl",
"check": "NssCheck",
"result": "ERROR",
"uuid": "1a2798fd-7fa5-4132-a288-7975f2c32b60",
"when": "20240916211906Z",
"duration": "0.498443",
"kw": {
"key": "DSCERTLE0001",
"items": [
"Expiring Certificate"
],
"msg": "The certificate (CN=InCommon RSA Server
CA,OU=InCommon,O=Internet2,L=Ann Arbor,ST=MI,C=US) will expire in less than 30
days"
}
},
{
"source": "ipahealthcheck.ipa.certs",
"check": "IPACAChainExpirationCheck",
"result": "WARNING",
"uuid": "7c1317a8-fbf6-46c4-98a1-15b62f655df8",
"when": "20240916211911Z",
"duration": "0.014042",
"kw": {
"path": "/etc/ipa/ca.crt",
"key": "CN=InCommon RSA Server CA,OU=InCommon,O=Internet2,L=Ann
Arbor,ST=MI,C=US",
"days": 19,
"msg": "CA '{key}' in {path} is expiring in {days} days."
}
}
]
This is the external commercial CA that I believe was added at the inception of
the domain to allow for trusted user connections to the web UI for
self-service. That was reverted back to using an internal certificate for the
web UI more than three years ago, so the InCommon CA is no longer required.
The tool "ipa-cacert-manage delete NICKNAME" can help you remove this CA. You
can start with "ipa-cacert-manage list" which will print out the nicknames,
identify the nickname used for your CA to remove, then use "ipa-cacert-manage
delete NICKNAME".
Note: after the removal, ipa-certupdate needs to be run on each machine
enrolled in the IPA domain in order to update the trusted CA list (for instance
in /etc/ipa/ca.crt or in the NSS databases).
flo
Running getcert list shows that certmonger is not tracking either the CA (which
makes sense), nor any certificates issued by the CA. ipa cert-find shows 50
certificates all issued by the internal IPA CA.
I would like to remove all references to the old CA from IPA and resolve the
healthcheck error. Any help would be appreciated.
--
_______________________________________________
FreeIPA-users mailing list --
[email protected]<mailto:[email protected]>
To unsubscribe send an email to
[email protected]<mailto:[email protected]>
Fedora Code of Conduct:
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives:
https://lists.fedorahosted.org/archives/list/[email protected]
Do not reply to spam, report it:
https://pagure.io/fedora-infrastructure/new_issue
--
_______________________________________________
FreeIPA-users mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Fedora Code of Conduct:
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives:
https://lists.fedorahosted.org/archives/list/[email protected]
Do not reply to spam, report it:
https://pagure.io/fedora-infrastructure/new_issue