Hi Florence.

I've tried to configure the wrong certificate in nss.conf (*ipaCert*), and
with this Apache started.
So I think the problem is in the *Server-Cert* stored in */etc/httpd/alias*,
even if all manul checks are ok.

These are logs with the wrong certificate test:
*# tail -f /var/log/httpd/error_log*










































































































*[Fri Nov 18 09:34:32.583700 2016] [suexec:notice] [pid 7709] AH01232:
suEXEC mechanism enabled (wrapper: /usr/sbin/suexec)[Fri Nov 18
09:34:32.584142 2016] [:warn] [pid 7709] NSSSessionCacheTimeout is
deprecated. Ignoring.[Fri Nov 18 09:34:32.584178 2016] [:debug] [pid 7709]
nss_engine_init.c(454): SNI: mlv-ipa01.ipa.mydomain.com
<http://mlv-ipa01.ipa.mydomain.com> -> ipaCert[Fri Nov 18 09:34:32.844487
2016] [:info] [pid 7709] Configuring server for SSL protocol[Fri Nov 18
09:34:32.844635 2016] [:debug] [pid 7709] nss_engine_init.c(770):
NSSProtocol:  Enabling TLSv1.0[Fri Nov 18 09:34:32.844657 2016] [:debug]
[pid 7709] nss_engine_init.c(775): NSSProtocol:  Enabling TLSv1.1[Fri Nov
18 09:34:32.844668 2016] [:debug] [pid 7709] nss_engine_init.c(780):
NSSProtocol:  Enabling TLSv1.2[Fri Nov 18 09:34:32.844677 2016] [:debug]
[pid 7709] nss_engine_init.c(839): NSSProtocol:  [TLS 1.0] (minimum)[Fri
Nov 18 09:34:32.844684 2016] [:debug] [pid 7709] nss_engine_init.c(866):
NSSProtocol:  [TLS 1.2] (maximum)[Fri Nov 18 09:34:32.844738 2016] [:debug]
[pid 7709] nss_engine_init.c(906): Disabling TLS Session Tickets[Fri Nov 18
09:34:32.844746 2016] [:debug] [pid 7709] nss_engine_init.c(916): Enabling
DHE key exchange[Fri Nov 18 09:34:32.844760 2016] [:debug] [pid 7709]
nss_engine_init.c(1077): NSSCipherSuite:  Configuring permitted SSL ciphers
[+aes_128_sha_256,+aes_256_sha_256,+ecdhe_ecdsa_aes_128_gcm_sha_256,+ecdhe_ecdsa_aes_128_sha,+ecdhe_ecdsa_aes_256_gcm_sha_384,+ecdhe_ecdsa_aes_256_sha,+ecdhe_rsa_aes_128_gcm_sha_256,+ecdhe_rsa_aes_128_sha,+ecdhe_rsa_aes_256_gcm_sha_384,+ecdhe_rsa_aes_256_sha,+rsa_aes_128_gcm_sha_256,+rsa_aes_128_sha,+rsa_aes_256_gcm_sha_384,+rsa_aes_256_sha][Fri
Nov 18 09:34:32.844825 2016] [:debug] [pid 7709] nss_engine_init.c(1140):
Disable cipher: rsa_null_md5...[Fri Nov 18 09:34:32.845105 2016] [:debug]
[pid 7709] nss_engine_init.c(1140): Enable cipher:
ecdhe_rsa_aes_128_gcm_sha_256[Fri Nov 18 09:34:32.845110 2016] [:info] [pid
7709] Using nickname ipaCert.[Fri Nov 18 09:34:32.847451 2016] [:error]
[pid 7709] Misconfiguration of certificate's CN and virtual name. The
certificate CN has IPA RA. We expected mlv-ipa01.ipa.mydomain.com
<http://mlv-ipa01.ipa.mydomain.com> as virtual name.[Fri Nov 18
09:34:33.028056 2016] [auth_digest:notice] [pid 7709] AH01757: generating
secret for digest authentication ...[Fri Nov 18 09:34:33.030039 2016]
[lbmethod_heartbeat:notice] [pid 7709] AH02282: No slotmem from
mod_heartmonitor[Fri Nov 18 09:34:33.030122 2016] [:warn] [pid 7709]
NSSSessionCacheTimeout is deprecated. Ignoring.[Fri Nov 18 09:34:33.030176
2016] [:debug] [pid 7709] nss_engine_init.c(454): SNI:
mlv-ipa01.ipa.mydomain.com <http://mlv-ipa01.ipa.mydomain.com> ->
ipaCert[Fri Nov 18 09:34:33.051481 2016] [mpm_prefork:notice] [pid 7709]
AH00163: Apache/2.4.6 () mod_auth_gssapi/1.4.0 mod_auth_kerb/5.4
mod_nss/1.0.14 NSS/3.21 Basic ECC mod_wsgi/3.4 Python/2.7.5 configured --
resuming normal operations[Fri Nov 18 09:34:33.051551 2016] [core:notice]
[pid 7709] AH00094: Command line: '/usr/sbin/httpd -D FOREGROUND'[Fri Nov
18 09:34:33.096050 2016] [proxy:debug] [pid 7717] proxy_util.c(1838):
AH00924: worker ajp://localhost shared already initialized[Fri Nov 18
09:34:33.096163 2016] [proxy:debug] [pid 7717] proxy_util.c(1880): AH00926:
worker ajp://localhost local already initialized...[Fri Nov 18
09:34:33.105626 2016] [proxy:debug] [pid 7719] proxy_util.c(1838): AH00924:
worker unix:/run/httpd/ipa-custodia.sock|http://localhost/keys/
<http://localhost/keys/> shared already initialized[Fri Nov 18
09:34:33.105632 2016] [proxy:debug] [pid 7719] proxy_util.c(1880): AH00926:
worker unix:/run/httpd/ipa-custodia.sock|http://localhost/keys/
<http://localhost/keys/> local already initialized[Fri Nov 18
09:34:33.342762 2016] [:info] [pid 7717] Configuring server for SSL
protocol[Fri Nov 18 09:34:33.342867 2016] [:debug] [pid 7717]
nss_engine_init.c(770): NSSProtocol:  Enabling TLSv1.0[Fri Nov 18
09:34:33.342880 2016] [:debug] [pid 7717] nss_engine_init.c(775):
NSSProtocol:  Enabling TLSv1.1[Fri Nov 18 09:34:33.342885 2016] [:debug]
[pid 7717] nss_engine_init.c(780): NSSProtocol:  Enabling TLSv1.2[Fri Nov
18 09:34:33.342890 2016] [:debug] [pid 7717] nss_engine_init.c(839):
NSSProtocol:  [TLS 1.0] (minimum)[Fri Nov 18 09:34:33.342894 2016] [:debug]
[pid 7717] nss_engine_init.c(866): NSSProtocol:  [TLS 1.2] (maximum)[Fri
Nov 18 09:34:33.342900 2016] [:debug] [pid 7717] nss_engine_init.c(906):
Disabling TLS Session Tickets[Fri Nov 18 09:34:33.342904 2016] [:debug]
[pid 7717] nss_engine_init.c(916): Enabling DHE key exchange[Fri Nov 18
09:34:33.342917 2016] [:debug] [pid 7717] nss_engine_init.c(1077):
NSSCipherSuite:  Configuring permitted SSL ciphers
[+aes_128_sha_256,+aes_256_sha_256,+ecdhe_ecdsa_aes_128_gcm_sha_256,+ecdhe_ecdsa_aes_128_sha,+ecdhe_ecdsa_aes_256_gcm_sha_384,+ecdhe_ecdsa_aes_256_sha,+ecdhe_rsa_aes_128_gcm_sha_256,+ecdhe_rsa_aes_128_sha,+ecdhe_rsa_aes_256_gcm_sha_384,+ecdhe_rsa_aes_256_sha,+rsa_aes_128_gcm_sha_256,+rsa_aes_128_sha,+rsa_aes_256_gcm_sha_384,+rsa_aes_256_sha][Fri
Nov 18 09:34:33.342970 2016] [:debug] [pid 7717] nss_engine_init.c(1140):
Disable cipher: rsa_null_md5...[Fri Nov 18 09:34:33.343233 2016] [:debug]
[pid 7717] nss_engine_init.c(1140): Enable cipher:
ecdhe_rsa_aes_128_gcm_sha_256[Fri Nov 18 09:34:33.343237 2016] [:info] [pid
7717] Using nickname ipaCert.[Fri Nov 18 09:34:33.344533 2016] [:error]
[pid 7717] Misconfiguration of certificate's CN and virtual name. The
certificate CN has IPA RA. We expected mlv-ipa01.ipa.mydomain.com
<http://mlv-ipa01.ipa.mydomain.com> as virtual name.[Fri Nov 18
09:34:33.364061 2016] [:info] [pid 7718] Configuring server for SSL
protocol[Fri Nov 18 09:34:33.364156 2016] [:debug] [pid 7718]
nss_engine_init.c(770): NSSProtocol:  Enabling TLSv1.0[Fri Nov 18
09:34:33.364167 2016] [:debug] [pid 7718] nss_engine_init.c(775):
NSSProtocol:  Enabling TLSv1.1[Fri Nov 18 09:34:33.364172 2016] [:debug]
[pid 7718] nss_engine_init.c(780): NSSProtocol:  Enabling TLSv1.2[Fri Nov
18 09:34:33.364176 2016] [:debug] [pid 7718] nss_engine_init.c(839):
NSSProtocol:  [TLS 1.0] (minimum)[Fri Nov 18 09:34:33.364180 2016] [:debug]
[pid 7718] nss_engine_init.c(866): NSSProtocol:  [TLS 1.2] (maximum)[Fri
Nov 18 09:34:33.364187 2016] [:debug] [pid 7718] nss_engine_init.c(906):
Disabling TLS Session Tickets[Fri Nov 18 09:34:33.364191 2016] [:debug]
[pid 7718] nss_engine_init.c(916): Enabling DHE key exchange[Fri Nov 18
09:34:33.364202 2016] [:debug] [pid 7718] nss_engine_init.c(1077):
NSSCipherSuite:  Configuring permitted SSL ciphers
[+aes_128_sha_256,+aes_256_sha_256,+ecdhe_ecdsa_aes_128_gcm_sha_256,+ecdhe_ecdsa_aes_128_sha,+ecdhe_ecdsa_aes_256_gcm_sha_384,+ecdhe_ecdsa_aes_256_sha,+ecdhe_rsa_aes_128_gcm_sha_256,+ecdhe_rsa_aes_128_sha,+ecdhe_rsa_aes_256_gcm_sha_384,+ecdhe_rsa_aes_256_sha,+rsa_aes_128_gcm_sha_256,+rsa_aes_128_sha,+rsa_aes_256_gcm_sha_384,+rsa_aes_256_sha][Fri
Nov 18 09:34:33.364240 2016] [:debug] [pid 7718] nss_engine_init.c(1140):
Disable cipher: rsa_null_md5...[Fri Nov 18 09:34:33.364611 2016] [:debug]
[pid 7718] nss_engine_init.c(1140): Enable cipher:
ecdhe_rsa_aes_128_gcm_sha_256[Fri Nov 18 09:34:33.364625 2016] [:info] [pid
7718] Using nickname ipaCert.[Fri Nov 18 09:34:33.365549 2016] [:error]
[pid 7718] Misconfiguration of certificate's CN and virtual name. The
certificate CN has IPA RA. We expected mlv-ipa01.ipa.mydomain.com
<http://mlv-ipa01.ipa.mydomain.com> as virtual name.[Fri Nov 18
09:34:33.369972 2016] [:info] [pid 7720] Configuring server for SSL
protocol[Fri Nov 18 09:34:33.370200 2016] [:debug] [pid 7720]
nss_engine_init.c(770): NSSProtocol:  Enabling TLSv1.0[Fri Nov 18
09:34:33.370224 2016] [:debug] [pid 7720] nss_engine_init.c(775):
NSSProtocol:  Enabling TLSv1.1[Fri Nov 18 09:34:33.370239 2016] [:debug]
[pid 7720] nss_engine_init.c(780): NSSProtocol:  Enabling TLSv1.2[Fri Nov
18 09:34:33.370255 2016] [:debug] [pid 7720] nss_engine_init.c(839):
NSSProtocol:  [TLS 1.0] (minimum)[Fri Nov 18 09:34:33.370269 2016] [:debug]
[pid 7720] nss_engine_init.c(866): NSSProtocol:  [TLS 1.2] (maximum)[Fri
Nov 18 09:34:33.370286 2016] [:debug] [pid 7720] nss_engine_init.c(906):
Disabling TLS Session Tickets[Fri Nov 18 09:34:33.370301 2016] [:debug]
[pid 7720] nss_engine_init.c(916): Enabling DHE key exchange[Fri Nov 18
09:34:33.370322 2016] [:debug] [pid 7720] nss_engine_init.c(1077):
NSSCipherSuite:  Configuring permitted SSL ciphers
[+aes_128_sha_256,+aes_256_sha_256,+ecdhe_ecdsa_aes_128_gcm_sha_256,+ecdhe_ecdsa_aes_128_sha,+ecdhe_ecdsa_aes_256_gcm_sha_384,+ecdhe_ecdsa_aes_256_sha,+ecdhe_rsa_aes_128_gcm_sha_256,+ecdhe_rsa_aes_128_sha,+ecdhe_rsa_aes_256_gcm_sha_384,+ecdhe_rsa_aes_256_sha,+rsa_aes_128_gcm_sha_256,+rsa_aes_128_sha,+rsa_aes_256_gcm_sha_384,+rsa_aes_256_sha][Fri
Nov 18 09:34:33.370383 2016] [:debug] [pid 7720] nss_engine_init.c(1140):
Disable cipher: rsa_null_md5...[Fri Nov 18 09:34:33.371418 2016] [:debug]
[pid 7720] nss_engine_init.c(1140): Enable cipher:
ecdhe_rsa_aes_128_gcm_sha_256[Fri Nov 18 09:34:33.371437 2016] [:info] [pid
7720] Using nickname ipaCert.[Fri Nov 18 09:34:33.371486 2016] [:info] [pid
7716] Configuring server for SSL protocol[Fri Nov 18 09:34:33.372383 2016]
[:debug] [pid 7716] nss_engine_init.c(770): NSSProtocol:  Enabling
TLSv1.0[Fri Nov 18 09:34:33.372439 2016] [:debug] [pid 7716]
nss_engine_init.c(775): NSSProtocol:  Enabling TLSv1.1[Fri Nov 18
09:34:33.372459 2016] [:debug] [pid 7716] nss_engine_init.c(780):
NSSProtocol:  Enabling TLSv1.2[Fri Nov 18 09:34:33.372484 2016] [:debug]
[pid 7716] nss_engine_init.c(839): NSSProtocol:  [TLS 1.0] (minimum)[Fri
Nov 18 09:34:33.372513 2016] [:debug] [pid 7716] nss_engine_init.c(866):
NSSProtocol:  [TLS 1.2] (maximum)[Fri Nov 18 09:34:33.372534 2016] [:debug]
[pid 7716] nss_engine_init.c(906): Disabling TLS Session Tickets[Fri Nov 18
09:34:33.372553 2016] [:debug] [pid 7716] nss_engine_init.c(916): Enabling
DHE key exchange[Fri Nov 18 09:34:33.372580 2016] [:debug] [pid 7716]
nss_engine_init.c(1077): NSSCipherSuite:  Configuring permitted SSL ciphers
[+aes_128_sha_256,+aes_256_sha_256,+ecdhe_ecdsa_aes_128_gcm_sha_256,+ecdhe_ecdsa_aes_128_sha,+ecdhe_ecdsa_aes_256_gcm_sha_384,+ecdhe_ecdsa_aes_256_sha,+ecdhe_rsa_aes_128_gcm_sha_256,+ecdhe_rsa_aes_128_sha,+ecdhe_rsa_aes_256_gcm_sha_384,+ecdhe_rsa_aes_256_sha,+rsa_aes_128_gcm_sha_256,+rsa_aes_128_sha,+rsa_aes_256_gcm_sha_384,+rsa_aes_256_sha][Fri
Nov 18 09:34:33.372627 2016] [:debug] [pid 7716] nss_engine_init.c(1140):
Disable cipher: rsa_null_md5...[Fri Nov 18 09:34:33.373712 2016] [:debug]
[pid 7716] nss_engine_init.c(1140): Enable cipher:
ecdhe_rsa_aes_128_gcm_sha_256[Fri Nov 18 09:34:33.373734 2016] [:info] [pid
7716] Using nickname ipaCert.[Fri Nov 18 09:34:33.374652 2016] [:error]
[pid 7716] Misconfiguration of certificate's CN and virtual name. The
certificate CN has IPA RA. We expected mlv-ipa01.ipa.mydomain.com
<http://mlv-ipa01.ipa.mydomain.com> as virtual name.[Fri Nov 18
09:34:33.372295 2016] [:error] [pid 7720] Misconfiguration of certificate's
CN and virtual name. The certificate CN has IPA RA. We expected
mlv-ipa01.ipa.mydomain.com <http://mlv-ipa01.ipa.mydomain.com> as virtual
name.[Fri Nov 18 09:34:33.412689 2016] [:info] [pid 7719] Configuring
server for SSL protocol[Fri Nov 18 09:34:33.412791 2016] [:debug] [pid
7719] nss_engine_init.c(770): NSSProtocol:  Enabling TLSv1.0[Fri Nov 18
09:34:33.412803 2016] [:debug] [pid 7719] nss_engine_init.c(775):
NSSProtocol:  Enabling TLSv1.1[Fri Nov 18 09:34:33.412807 2016] [:debug]
[pid 7719] nss_engine_init.c(780): NSSProtocol:  Enabling TLSv1.2[Fri Nov
18 09:34:33.412812 2016] [:debug] [pid 7719] nss_engine_init.c(839):
NSSProtocol:  [TLS 1.0] (minimum)[Fri Nov 18 09:34:33.412817 2016] [:debug]
[pid 7719] nss_engine_init.c(866): NSSProtocol:  [TLS 1.2] (maximum)[Fri
Nov 18 09:34:33.412824 2016] [:debug] [pid 7719] nss_engine_init.c(906):
Disabling TLS Session Tickets[Fri Nov 18 09:34:33.412828 2016] [:debug]
[pid 7719] nss_engine_init.c(916): Enabling DHE key exchange[Fri Nov 18
09:34:33.412840 2016] [:debug] [pid 7719] nss_engine_init.c(1077):
NSSCipherSuite:  Configuring permitted SSL ciphers
[+aes_128_sha_256,+aes_256_sha_256,+ecdhe_ecdsa_aes_128_gcm_sha_256,+ecdhe_ecdsa_aes_128_sha,+ecdhe_ecdsa_aes_256_gcm_sha_384,+ecdhe_ecdsa_aes_256_sha,+ecdhe_rsa_aes_128_gcm_sha_256,+ecdhe_rsa_aes_128_sha,+ecdhe_rsa_aes_256_gcm_sha_384,+ecdhe_rsa_aes_256_sha,+rsa_aes_128_gcm_sha_256,+rsa_aes_128_sha,+rsa_aes_256_gcm_sha_384,+rsa_aes_256_sha][Fri
Nov 18 09:34:33.412891 2016] [:debug] [pid 7719] nss_engine_init.c(1140):
Disable cipher: rsa_null_md5...[Fri Nov 18 09:34:33.413159 2016] [:debug]
[pid 7719] nss_engine_init.c(1140): Enable cipher:
ecdhe_rsa_aes_128_gcm_sha_256[Fri Nov 18 09:34:33.413164 2016] [:info] [pid
7719] Using nickname ipaCert.[Fri Nov 18 09:34:33.414462 2016] [:error]
[pid 7719] Misconfiguration of certificate's CN and virtual name. The
certificate CN has IPA RA. We expected mlv-ipa01.ipa.mydomain.com
<http://mlv-ipa01.ipa.mydomain.com> as virtual name.[Fri Nov 18
09:34:35.558286 2016] [:error] [pid 7715] ipa: WARNING: session memcached
servers not running[Fri Nov 18 09:34:35.559653 2016] [:error] [pid 7714]
ipa: WARNING: session memcached servers not running[Fri Nov 18
09:34:37.511457 2016] [:error] [pid 7714] ipa: INFO: *** PROCESS START
***[Fri Nov 18 09:34:37.517899 2016] [:error] [pid 7715] ipa: INFO: ***
PROCESS START ***[Fri Nov 18 09:34:51.498536 2016] [:info] [pid 7717]
Connection to child 1 established (server mlv-ipa01.ipa.mydomain.com
<http://mlv-ipa01.ipa.mydomain.com>, client 192.168.0.239)[Fri Nov 18
09:34:51.510292 2016] [:info] [pid 7717] SSL input filter read failed.[Fri
Nov 18 09:34:51.510311 2016] [:error] [pid 7717] SSL Library Error: -12285
Unable to find the certificate or key necessary for authentication[Fri Nov
18 09:34:51.510356 2016] [:info] [pid 7717] Connection to child 1 closed
(server mlv-ipa01.ipa.mydomain.com:443
<http://mlv-ipa01.ipa.mydomain.com:443>, client 192.168.0.239)[Fri Nov 18
09:35:18.790760 2016] [mpm_prefork:notice] [pid 7709] AH00170: caught
SIGWINCH, shutting down gracefully*

Is possible to delete *Server-Cert* from */etc/httpd/alias* and reimport it
from the original certificates of *mlv-ipa01.ipa.mydomain.com
<http://mlv-ipa01.ipa.mydomain.com>*?
Where are stored the original certificates?

Please let me know, thanks.
Bye, Morgan

2016-11-17 17:09 GMT+01:00 Florence Blanc-Renaud <f...@redhat.com>:

> On 11/17/2016 04:51 PM, Morgan Marodin wrote:
>
>> Hi Rob.
>>
>> I've just tried to remove the group write to the *.db files, but it's
>> not the problem.
>> /[root@mlv-ipa01 ~]# grep NSSNickname /etc/httpd/conf.d/nss.conf
>> NSSNickname Server-Cert/
>>
>> I've tried to run manually /dirsrv.target/ and /krb5kdc.service/, and it
>> works, services went up.
>> The same for /ntpd/, /named-pkcs11.service/, /smb.service/,
>> /winbind.service/, /kadmin.service/, /memcached.service/ and
>> /pki-tomcatd.target/.
>>
>> But if I try to start /httpd.service/:
>> /[root@mlv-ipa01 ~]# tail -f /var/log/messages
>> Nov 17 16:46:06 mlv-ipa01 systemd[1]: Starting The Apache HTTP Server...
>> Nov 17 16:46:06 mlv-ipa01 ipa-httpd-kdcproxy: ipa         : INFO     KDC
>> proxy enabled
>> Nov 17 16:46:07 mlv-ipa01 systemd[1]: httpd.service: main process
>> exited, code=exited, status=1/FAILURE
>> Nov 17 16:46:07 mlv-ipa01 kill: kill: cannot find process ""
>> Nov 17 16:46:07 mlv-ipa01 systemd[1]: httpd.service: control process
>> exited, code=exited status=1
>> Nov 17 16:46:07 mlv-ipa01 systemd[1]: Failed to start The Apache HTTP
>> Server.
>> Nov 17 16:46:07 mlv-ipa01 systemd[1]: Unit httpd.service entered failed
>> state.
>> Nov 17 16:46:07 mlv-ipa01 systemd[1]: httpd.service failed./
>>
>> Any other ideas?
>>
> Hi,
>
> - Does the NSS Db contain the private key for Server-Cert? If yes, the
> command
> $ certutil -K -d /etc/httpd/alias/ -f /etc/httpd/alias/pwdfile.txt
> should display a line like this one:
> < 0> rsa      01a6cbd773f3d785ffa44233148dcb8ade266ea5   NSS Certificate
> DB:Server-Cert
>
> - Is your system running with SElinux enforcing? If yes, you can check if
> there were SElinux permission denials using
> $ ausearch -m avc --start recent
>
> - If the certificate was expired, I believe you would see a different
> message, but it doesn't hurt to check its validity
> $ certutil -L -d /etc/httpd/alias/ -n Server-Cert | egrep "Not Before|Not
> After"
>
>
> Flo.
>
>>
>> Please let me know, thanks.
>> Morgan
>>
>> 2016-11-17 16:11 GMT+01:00 Rob Crittenden <rcrit...@redhat.com
>> <mailto:rcrit...@redhat.com>>:
>>
>>
>>     Morgan Marodin wrote:
>>     > Hi Florence.
>>     >
>>     > Thanks for your support.
>>     >
>>     > Yes, httpd is using /etc/httpd/alias as NSS DB. And seems that all
>>     > permissions and certificates are good:
>>     > /[root@mlv-ipa01 ~]# ls -l /etc/httpd/alias/
>>     > total 184
>>     > -r--r--r--  1 root root    1345 Sep  7  2015 cacert.asc
>>     > -rw-rw----  1 root apache 65536 Nov 17 11:06 cert8.db
>>     > -rw-r-----. 1 root apache 65536 Sep  4  2015 cert8.db.orig
>>     > -rw-------. 1 root root    4833 Sep  4  2015 install.log
>>     > -rw-rw----  1 root apache 16384 Nov 17 11:06 key3.db
>>     > -rw-r-----. 1 root apache 16384 Sep  4  2015 key3.db.orig
>>     > lrwxrwxrwx  1 root root      24 Nov 17 10:24 libnssckbi.so ->
>>     > /usr/lib64/libnssckbi.so
>>     > -rw-rw----  1 root apache    20 Sep  7  2015 pwdfile.txt
>>     > -rw-rw----  1 root apache 16384 Sep  7  2015 secmod.db
>>     > -rw-r-----. 1 root apache 16384 Sep  4  2015 secmod.db.orig/
>>
>>     Eventually you'll want to remove group write on the *.db files.
>>
>>     > And password validations seems ok, too:
>>     > /[root@mlv-ipa01 ~]# certutil -K -d /etc/httpd/alias/ -f
>>     > /etc/httpd/alias/pwdfile.txt
>>     good
>>
>>     > Enabling mod-nss debug I can see these logs:
>>     > /[root@mlv-ipa01 ~]# tail -f /var/log/httpd/error_log
>>     > [Thu Nov 17 15:05:10.807603 2016] [suexec:notice] [pid 10660]
>> AH01232:
>>     > suEXEC mechanism enabled (wrapper: /usr/sbin/suexec)
>>     > [Thu Nov 17 15:05:10.807958 2016] [:warn] [pid 10660]
>>     > NSSSessionCacheTimeout is deprecated. Ignoring.
>>     > [Thu Nov 17 15:05:10.807991 2016] [:debug] [pid 10660]
>>     > nss_engine_init.c(454): SNI: mlv-ipa01.ipa.mydomain.com <
>> http://mlv-ipa01.ipa.mydomain.com>
>>     > <http://mlv-ipa01.ipa.mydomain.com
>>
>>     <http://mlv-ipa01.ipa.mydomain.com>> -> Server-Cert
>>     > [Thu Nov 17 15:05:11.002664 2016] [:info] [pid 10660] Configuring
>> server
>>     > for SSL protocol
>>     > [Thu Nov 17 15:05:11.002817 2016] [:debug] [pid 10660]
>>     > nss_engine_init.c(770): NSSProtocol:  Enabling TLSv1.0
>>     > [Thu Nov 17 15:05:11.002838 2016] [:debug] [pid 10660]
>>     > nss_engine_init.c(775): NSSProtocol:  Enabling TLSv1.1
>>     > [Thu Nov 17 15:05:11.002847 2016] [:debug] [pid 10660]
>>     > nss_engine_init.c(780): NSSProtocol:  Enabling TLSv1.2
>>     > [Thu Nov 17 15:05:11.002856 2016] [:debug] [pid 10660]
>>     > nss_engine_init.c(839): NSSProtocol:  [TLS 1.0] (minimum)
>>     > [Thu Nov 17 15:05:11.002876 2016] [:debug] [pid 10660]
>>     > nss_engine_init.c(866): NSSProtocol:  [TLS 1.2] (maximum)
>>     > [Thu Nov 17 15:05:11.003099 2016] [:debug] [pid 10660]
>>     > nss_engine_init.c(906): Disabling TLS Session Tickets
>>     > [Thu Nov 17 15:05:11.003198 2016] [:debug] [pid 10660]
>>     > nss_engine_init.c(916): Enabling DHE key exchange
>>     > [Thu Nov 17 15:05:11.003313 2016] [:debug] [pid 10660]
>>     > nss_engine_init.c(1077): NSSCipherSuite:  Configuring permitted SSL
>>     > ciphers
>>     > [+aes_128_sha_256,+aes_256_sha_256,+ecdhe_ecdsa_aes_128_gcm_
>> sha_256,+ecdhe_ecdsa_aes_128_sha,+ecdhe_ecdsa_aes_256_gcm_
>> sha_384,+ecdhe_ecdsa_aes_256_sha,+ecdhe_rsa_aes_128_gcm_
>> sha_256,+ecdhe_rsa_aes_128_sha,+ecdhe_rsa_aes_256_gcm_
>> sha_384,+ecdhe_rsa_aes_256_sha,+rsa_aes_128_gcm_sha_256,+
>> rsa_aes_128_sha,+rsa_aes_256_gcm_sha_384,+rsa_aes_256_sha]
>>     > [Thu Nov 17 15:05:11.003469 2016] [:debug] [pid 10660]
>>     > [Thu Nov 17 15:05:11.006759 2016] [:info] [pid 10660] Using nickname
>>     > Server-Cert.
>>     [snip]
>>     > [Thu Nov 17 15:05:11.006771 2016] [:error] [pid 10660] Certificate
>> not
>>     > found: 'Server-Cert'
>>
>>     Can you shows what this returns:
>>
>>     # grep NSSNickname /etc/httpd/conf.d/nss.conf
>>
>>     > Do you think there is a kerberos problem?
>>
>>     It definitely is not.
>>
>>     You can bring the system up in a minimal way by manually starting the
>>     dir...@example.com <mailto:dir...@example.com> service and then
>>     krb5kdc. This will at least let your
>>     users authenticate. The management framework (GUI) runs through Apache
>>     so that will be down until we can get Apache started again.
>>
>>     rob
>>
>>     >
>>     > Please let me know, thanks.
>>     > Bye, Morgan
>>     >
>>     > 2016-11-17 14:39 GMT+01:00 Florence Blanc-Renaud <f...@redhat.com
>> <mailto:f...@redhat.com>
>>     > <mailto:f...@redhat.com <mailto:f...@redhat.com>>>:
>>
>>     >
>>     >     On 11/17/2016 12:09 PM, Morgan Marodin wrote:
>>     >
>>     >         Hello.
>>     >
>>     >         This morning I've tried to upgrade my IPA server, but the
>>     upgrade
>>     >         failed, and now the service doesn't start! :(
>>     >
>>     >         If I try lo launch the upgrade manually this is the output:
>>     >         /[root@mlv-ipa01 download]# ipa-server-upgrade
>>     >
>>     >         Upgrading IPA:
>>     >           [1/8]: saving configuration
>>     >           [2/8]: disabling listeners
>>     >           [3/8]: enabling DS global lock
>>     >           [4/8]: starting directory server
>>     >           [5/8]: updating schema
>>     >           [6/8]: upgrading server
>>     >           [7/8]: stopping directory server
>>     >           [8/8]: restoring configuration
>>     >         Done.
>>     >         Update complete
>>     >         Upgrading IPA services
>>     >         Upgrading the configuration of the IPA services
>>     >         [Verifying that root certificate is published]
>>     >         [Migrate CRL publish directory]
>>     >         CRL tree already moved
>>     >         [Verifying that CA proxy configuration is correct]
>>     >         [Verifying that KDC configuration is using ipa-kdb backend]
>>     >         [Fix DS schema file syntax]
>>     >         Syntax already fixed
>>     >         [Removing RA cert from DS NSS database]
>>     >         RA cert already removed
>>     >         [Enable sidgen and extdom plugins by default]
>>     >         [Updating HTTPD service IPA configuration]
>>     >         [Updating mod_nss protocol versions]
>>     >         Protocol versions already updated
>>     >         [Updating mod_nss cipher suite]
>>     >         [Fixing trust flags in /etc/httpd/alias]
>>     >         Trust flags already processed
>>     >         [Exporting KRA agent PEM file]
>>     >         KRA is not enabled
>>     >         IPA server upgrade failed: Inspect /var/log/ipaupgrade.log
>>     and run
>>     >         command ipa-server-upgrade manually.
>>     >         Unexpected error - see /var/log/ipaupgrade.log for details:
>>     >         CalledProcessError: Command '/bin/systemctl start
>>     httpd.service'
>>     >         returned non-zero exit status 1
>>     >         The ipa-server-upgrade command failed. See
>>     >         /var/log/ipaupgrade.log for
>>     >         more information/
>>     >
>>     >         These are error logs of Apache:
>>     >         /[Thu Nov 17 11:48:45.498510 2016] [suexec:notice] [pid
>> 5664]
>>     >         AH01232:
>>     >         suEXEC mechanism enabled (wrapper: /usr/sbin/suexec)
>>     >         [Thu Nov 17 11:48:45.499220 2016] [:warn] [pid 5664]
>>     >         NSSSessionCacheTimeout is deprecated. Ignoring.
>>     >         [Thu Nov 17 11:48:45.830910 2016] [:error] [pid 5664]
>>     >         Certificate not
>>     >         found: 'Server-Cert'/
>>     >
>>     >         The problem seems to be the /Server-Cert /that could not
>>     be found.
>>     >         But if I try to execute the certutil command manually I
>>     can see it:/
>>     >         [root@mlv-ipa01 log]# certutil -L -d /etc/httpd/alias/
>>     >         Certificate Nickname
>>        Trust
>>     >         Attributes
>>     >
>>     >         SSL,S/MIME,JAR/XPI
>>     >         Signing-Cert
>>        u,u,u
>>     >         ipaCert
>>       u,u,u
>>     >         Server-Cert
>>       Pu,u,u
>>     >         IPA.MYDOMAIN.COM <http://IPA.MYDOMAIN.COM>
>>     <http://IPA.MYDOMAIN.COM>
>>     >         <http://IPA.MYDOMAIN.COM> IPA
>>     >         CA                                    CT,C,C/
>>     >
>>     >         Could you help me?
>>     >         What could I try to do to restart my service?
>>     >
>>     >     Hi,
>>     >
>>     >     I would first make sure that httpd is using /etc/httpd/alias
>>     as NSS
>>     >     DB (check the directive NSSCertificateDatabase in
>>     >     /etc/httpd/conf.d/nss.conf).
>>     >     Then it may be a file permission issue: the NSS DB should
>>     belong to
>>     >     root:apache (the relevant files are cert8.db, key3.db and
>>     secmod.db).
>>     >     You should also find a pwdfile.txt in the same directory,
>>     containing
>>     >     the NSS DB password. Check that the password is valid using
>>     >     certutil -K -d /etc/httpd/alias/ -f /etc/httpd/alias/pwdfile.txt
>>     >     (if the command succeeds then the password in pwdfile is OK).
>>     >
>>     >     You can also enable mod-nss debug in /etc/httpd/conf/nss.conf by
>>     >     setting "LogLevel debug", and check the output in
>>     >     /var/log/httpd/error_log.
>>     >
>>     >     HTH,
>>     >     Flo.
>>     >
>>     >         Thanks, Morgan
>>     >
>>     >
>>     >
>>     >     --
>>     >     Manage your subscription for the Freeipa-users mailing list:
>>     >     https://www.redhat.com/mailman/listinfo/freeipa-users
>>     <https://www.redhat.com/mailman/listinfo/freeipa-users>
>>     >     <https://www.redhat.com/mailman/listinfo/freeipa-users
>>     <https://www.redhat.com/mailman/listinfo/freeipa-users>>
>>     >     Go to http://freeipa.org for more info on the project
>>     >
>>     >
>>
>>
-- 
Manage your subscription for the Freeipa-users mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-users
Go to http://freeipa.org for more info on the project

Reply via email to