Dungan, Scott A. via FreeIPA-users wrote:
> Thank you, Flo. The  “ipa-cacert-manage delete …” command, followed by
> “ipa-certupdate” removed the invalid CA entries from the IPA servers
> (verified by looking at /etc/ipa/ca.crt). We also ran ipa-cartupdate on
> all enrolled clients.
> 
>  
> 
> One issue: We have three IPA servers. On two, healthcheck completes
> without error or warnings, but on one server healthcheck reports:
> 
>  
> 
> [
> 
>   {
> 
>     "source": "ipahealthcheck.ds.nss_ssl",
> 
>     "check": "NssCheck",
> 
>     "result": "ERROR",
> 
>     "uuid": "2537646d-88d9-4d26-8a38-dd445f1250bd",
> 
>     "when": "20240917154901Z",
> 
>     "duration": "0.390482",
> 
>     "kw": {
> 
>       "key": "DSCERTLE0001",
> 
>       "items": [
> 
>         "Expiring Certificate"
> 
>       ],
> 
>       "msg": "The certificate (Server-Cert) will expire in less than 30
> days"
> 
>     }
> 
>   }
> 
> ]
> 
>  
> 
> ipa-cacert-manage list on that server only shows the single internal CA
> as expected, and /etc/ipa/ca.crt has one entry. Can you advise how to
> find this ghost “Server-Cert” that healthcheck finds on only one server?

This is the certificate used by the LDAP server and is unrelated to CA
certificates.

To see the certificate tracking run: getcert list and look for the
certificate stored in the NSS database in /etc/dirsrv/slapd-REALM.

If it has an issuer of the IPA CA you can force renew it using : getcert
resubmit -i <id of tracking request>

It should should be automatically renewed by certmonger in a few days
(at 28).

rob
> 
>  
> 
>  
> 
>  
> 
> *From:*Florence Blanc-Renaud <[email protected]>
> *Sent:* Tuesday, September 17, 2024 12:02 AM
> *To:* FreeIPA users list <[email protected]>
> *Cc:* Dungan, Scott A. <[email protected]>
> *Subject:* Re: [Freeipa-users] Heathcheck error: expiring unused external CA
> 
>  
> 
> Hi,
> 
>  
> 
> On Mon, Sep 16, 2024 at 11:36 PM Dungan, Scott A. via FreeIPA-users
> <[email protected]
> <mailto:[email protected]>> wrote:
> 
>     Running ipa-server version 4.9.13-12 on RHEL8 we are getting the
>     following error/warning with ipa-healthcheck:
> 
>     [
> 
>       {
> 
>         "source": "ipahealthcheck.ds.nss_ssl",
> 
>         "check": "NssCheck",
> 
>         "result": "ERROR",
> 
>         "uuid": "1a2798fd-7fa5-4132-a288-7975f2c32b60",
> 
>         "when": "20240916211906Z",
> 
>         "duration": "0.498443",
> 
>         "kw": {
> 
>           "key": "DSCERTLE0001",
> 
>           "items": [
> 
>             "Expiring Certificate"
> 
>           ],
> 
>           "msg": "The certificate (CN=InCommon RSA Server
>     CA,OU=InCommon,O=Internet2,L=Ann Arbor,ST=MI,C=US) will expire in
>     less than 30 days"
> 
>         }
> 
>       },
> 
>       {
> 
>         "source": "ipahealthcheck.ipa.certs",
> 
>         "check": "IPACAChainExpirationCheck",
> 
>         "result": "WARNING",
> 
>         "uuid": "7c1317a8-fbf6-46c4-98a1-15b62f655df8",
> 
>         "when": "20240916211911Z",
> 
>         "duration": "0.014042",
> 
>         "kw": {
> 
>           "path": "/etc/ipa/ca.crt",
> 
>           "key": "CN=InCommon RSA Server
>     CA,OU=InCommon,O=Internet2,L=Ann Arbor,ST=MI,C=US",
> 
>           "days": 19,
> 
>           "msg": "CA '{key}' in {path} is expiring in {days} days."
> 
>         }
> 
>       }
> 
>     ]
> 
>      
> 
>     This is the external commercial CA that I believe was added at the
>     inception of the domain to allow for trusted user connections to the
>     web UI for self-service. That was reverted back to using an internal
>     certificate for the web UI more than three years ago, so the
>     InCommon CA is no longer required.
> 
>  
> 
> The tool "ipa-cacert-manage delete NICKNAME" can help you remove this
> CA. You can start with "ipa-cacert-manage list" which will print out the
> nicknames, identify the nickname used for your CA to remove, then use
> "ipa-cacert-manage delete NICKNAME".
> 
> Note: after the removal, ipa-certupdate needs to be run on each machine
> enrolled in the IPA domain in order to update the trusted CA list (for
> instance in /etc/ipa/ca.crt or in the NSS databases).
> 
>  
> 
> flo
> 
>  
> 
>      
> 
>     Running getcert list shows that certmonger is not tracking either
>     the CA (which makes sense), nor any certificates issued by the CA.
>     ipa cert-find shows 50 certificates all issued by the internal IPA CA.
> 
>      
> 
>     I would like to remove all references to the old CA from IPA and
>     resolve the healthcheck error. Any help would be appreciated.
> 
>      
> 
>      
> 
>     -- 
>     _______________________________________________
>     FreeIPA-users mailing list -- [email protected]
>     <mailto:[email protected]>
>     To unsubscribe send an email to
>     [email protected]
>     <mailto:[email protected]>
>     Fedora Code of Conduct:
>     https://docs.fedoraproject.org/en-US/project/code-of-conduct/
>     List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
>     List Archives:
>     
> https://lists.fedorahosted.org/archives/list/[email protected]
>     Do not reply to spam, report it:
>     https://pagure.io/fedora-infrastructure/new_issue
> 
> 

-- 
_______________________________________________
FreeIPA-users mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedorahosted.org/archives/list/[email protected]
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue

Reply via email to