<div dir="ltr">I found from [root@host pki-ca]# tail -n 100 /var/log/pki-ca/system that CA chain is missing; so I am thinking I may have to use <code class="">ipa-server-certinstall</code> to reinstall the two certs.<br><br>5135.main - [27/Jan/2016:14:10:14 EST] [3] [3] CASigningUnit: Object certificate not found. Error org.mozilla.jss.crypto.ObjectNotFoundException<br>2003.main - [27/Jan/2016:14:35:33 EST] [3] [3] CASigningUnit: Object certificate not found. Error org.mozilla.jss.crypto.ObjectNotFoundException<br>2003.TP-Processor3 - [27/Jan/2016:14:35:40 EST] [20] [3] Servlet caDisplayBySerial: The CA chain is missing or could not be obtained from the remote Certificate Manager or Registr<br>ation Manager. The remote server could be down.<br>2003.TP-Processor2 - [27/Jan/2016:14:35:40 EST] [20] [3] Servlet caDisplayBySerial: The CA chain is missing or could not be obtained from the remote Certificate Manager or Registr<br>ation Manager. The remote server could be down.<br>2000.main - [28/Jan/2016:07:43:00 EST] [3] [3] CASigningUnit: Object certificate not found. Error org.mozilla.jss.crypto.ObjectNotFoundException<br>2000.TP-Processor2 - [28/Jan/2016:07:43:07 EST] [20] [3] Servlet caDisplayBySerial: The CA chain is missing or could not be obtained from the remote Certificate Manager or Registr<br>ation Manager. The remote server could be down.<br>2000.TP-Processor3 - [28/Jan/2016:07:43:07 EST] [20] [3] Servlet caDisplayBySerial: The CA chain is missing or could not be obtained from the remote Certificate Manager or Registr<br>ation Manager. The remote server could be down.<br>2085.main - [03/Feb/2016:08:57:05 EST] [3] [3] CASigningUnit: Object certificate not found. Error org.mozilla.jss.crypto.ObjectNotFoundException<br>2085.TP-Processor2 - [27/Jan/2016:14:05:03 EST] [20] [3] Servlet caDisplayBySerial: The CA chain is missing or could not be obtained from the remote Certificate Manager or Registr<br>ation Manager. The remote server could be down.<br><br><div class="gmail_extra"><br><div class="gmail_quote">On Mon, May 16, 2016 at 11:45 AM, Adam Kaczka <span dir="ltr"><<a href="mailto:akaczka86@gmail.com" target="_blank">akaczka86@gmail.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir="ltr"><div>Certmonger cannot communicate with CA; the result of getlist cert shows:<br><br>RPC failed at server.  Certificate operation cannot be completed: Unable to communicate with CMS (Not Found)   <br><br></div>After setting time back, from /var/log/pki-ca/debug I get:<br><br>[30/Dec/2015:08:10:25][main]: CMS:Caught EBaseException<br>Certificate object not found<br>        at com.netscape.ca.SigningUnit.init(SigningUnit.java:190)<br>        at com.netscape.ca.CertificateAuthority.initSigUnit(CertificateAuthority.java:1205)<br>        at com.netscape.ca.CertificateAuthority.init(CertificateAuthority.java:260)<br>        at com.netscape.cmscore.apps.CMSEngine.initSubsystem(CMSEngine.java:866)<br>        at com.netscape.cmscore.apps.CMSEngine.initSubsystems(CMSEngine.java:795)<br>        at com.netscape.cmscore.apps.CMSEngine.init(CMSEngine.java:316)<br>        at com.netscape.certsrv.apps.CMS.init(CMS.java:153)<br>        at com.netscape.certsrv.apps.CMS.start(CMS.java:1530)<br>        at com.netscape.cms.servlet.base.CMSStartServlet.init(CMSStartServlet.java:85)<br>        at org.apache.catalina.core.StandardWrapper.loadServlet(StandardWrapper.java:1173)<br>        at org.apache.catalina.core.StandardWrapper.load(StandardWrapper.java:993)<br>        at org.apache.catalina.core.StandardContext.loadOnStartup(StandardContext.java:4425)<br>        at org.apache.catalina.core.StandardContext.start(StandardContext.java:4738)<br>        at org.apache.catalina.core.ContainerBase.addChildInternal(ContainerBase.java:791)<br>        at org.apache.catalina.core.ContainerBase.addChild(ContainerBase.java:771)<br>        at org.apache.catalina.core.StandardHost.addChild(StandardHost.java:526)<br>        at org.apache.catalina.startup.HostConfig.deployDirectory(HostConfig.java:1041)<br>        at org.apache.catalina.startup.HostConfig.deployDirectories(HostConfig.java:964)<br>        at org.apache.catalina.startup.HostConfig.deployApps(HostConfig.java:502)<br>        at org.apache.catalina.startup.HostConfig.start(HostConfig.java:1277)<br>        at org.apache.catalina.startup.HostConfig.lifecycleEvent(HostConfig.java:321)<br>        at org.apache.catalina.util.LifecycleSupport.fireLifecycleEvent(LifecycleSupport.java:142)<br>        at org.apache.catalina.core.ContainerBase.start(ContainerBase.java:1053)<br>        at org.apache.catalina.core.StandardHost.start(StandardHost.java:722)<br>        at org.apache.catalina.core.ContainerBase.start(ContainerBase.java:1045)<br>        at org.apache.catalina.core.StandardEngine.start(StandardEngine.java:443)<br>        at org.apache.catalina.core.StandardService.start(StandardService.java:516)<br>        at org.apache.catalina.core.StandardServer.start(StandardServer.java:710)<br>        at org.apache.catalina.startup.Catalina.start(Catalina.java:593)<br>        at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)<br>        at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:57)<br>        at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)<br>        at java.lang.reflect.Method.invoke(Method.java:606)<br>        at org.apache.catalina.startup.Bootstrap.start(Bootstrap.java:289)<br>        at org.apache.catalina.startup.Bootstrap.main(Bootstrap.java:414)<br>[30/Dec/2015:08:10:25][main]: CMSEngine.shutdown()<br>[30/Dec/2015:08:10:32][http-9180-1]: according to ccMode, authorization for servlet: caProfileSubmit is LDAP based, not XML {1}, use default authz mgr: {2}.<br>[30/Dec/2015:08:10:32][http-9180-1]: according to ccMode, authorization for servlet: caProfileSubmit is LDAP based, not XML {1}, use default authz mgr: {2}.<br>[30/Dec/2015:08:10:33][TP-Processor2]: according to ccMode, authorization for servlet: caDisplayBySerial is LDAP based, not XML {1}, use default authz mgr: {2}.<br>[30/Dec/2015:08:10:33][TP-Processor3]: according to ccMode, authorization for servlet: caDisplayBySerial is LDAP based, not XML {1}, use default authz mgr: {2}.<br><br></div><div class="HOEnZb"><div class="h5"><div class="gmail_extra"><br><div class="gmail_quote">On Mon, May 16, 2016 at 6:28 AM, Petr Vobornik <span dir="ltr"><<a href="mailto:pvoborni@redhat.com" target="_blank">pvoborni@redhat.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><span>On 05/14/2016 12:01 AM, Adam Kaczka wrote:<br>
> Hi all,<br>
><br>
> I have inherited a IPA system that has an expired cert and the old admins have<br>
> left; I followed (<a href="http://www.freeipa.org/page/IPA_2x_Certificate_Renewal" rel="noreferrer" target="_blank">http://www.freeipa.org/page/IPA_2x_Certificate_Renewal</a>) but<br>
> running into errors when I try to renew the CA certs even after time is reset.<br>
> Also tried the troubleshooting under<br>
> (<a href="http://www.freeipa.org/page/Troubleshooting#Authentication_Errors" rel="noreferrer" target="_blank">http://www.freeipa.org/page/Troubleshooting#Authentication_Errors</a>);<br>
> specifically using "certutil -L -d /etc/httpd/alias -n ipaCert -a > /tmp/ra.crt"<br>
> to add the cert in the database.<br>
><br>
>  From the output of getcert list, I see both CA_UNREACHABLE and<br>
> NEED_CSR_GEN_PIN.  I followed redhat article here<br>
> (<a href="https://access.redhat.com/solutions/1142913" rel="noreferrer" target="_blank">https://access.redhat.com/solutions/1142913</a>) which verified key file password<br>
> is correct and I have reset time.  However the NEED_CSR_GEN_PIN status remains.<br>
> My company actually has redhat support but when they built this IPA whoever<br>
> built it was using Centos 6 so I am out of luck here.<br>
><br>
> Would really appreciate any help since I am stuck at this point?  What else I<br>
> can do at this point?  e.g. Is generate a new CA cert necessary, etc.?<br>
<br>
</span>Hi,<br>
<br>
you don't need to renew CA cert, it seems to be valid. But your server<br>
cert is expired. It expired on 2016-03-29.<br>
<br>
1. Move date back before this date, e.g., 2016-03-27.<br>
2. Verify that IPA is running `ipactl status`. Maybe restart will be needed.<br>
3. run `getcert list` to see if certmonger can communicate with CA<br>
4. if certmonger doesn't renew the certs automatically, run `getcert<br>
resubmit -i $certid` for the expired cert.<br>
<div><div><br>
><br>
> Version:<br>
> ipa-pki-ca-theme.noarch                    9.0.3-7.el6                        @base<br>
> ipa-pki-common-theme.noarch          9.0.3-7.el6                        @base<br>
> ipa-pmincho-fonts.noarch             003.02-3.1.el6                     @base<br>
> ipa-python.x86_64                    3.0.0-47.el6.centos.2              @updates<br>
> ipa-server.x86_64                    3.0.0-47.el6.centos.2              @updates<br>
> ipa-server-selinux.x86_64            3.0.0-47.el6.centos.2              @updates<br>
><br>
> Part of error logs from /var/log/pki-ca/debug after I reset clock; I see these<br>
> errors which I think is relevlant?:<br>
> [27/Dec/2015:14:12:01][main]: SigningUnit init: debug<br>
> org.mozilla.jss.crypto.ObjectNotFoundException<br>
> Certificate object not found<br>
> [27/Dec/2015:14:12:01][main]: CMS:Caught EBaseException<br>
> Certificate object not found<br>
> [27/Dec/2015:14:12:01][main]: CMSEngine.shutdown()<br>
><br>
> Result seems to show key file password is correct:<br>
> certutil -K -d /etc/dirsrv/slapd-REALM-NET/ -f<br>
> /etc/dirsrv/slapd-REALM-NET/pwdfile.txt<br>
> certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and<br>
> Certificate Services"<br>
> < 0> rsa      ############################   NSS Certificate DB:Server-Cert<br>
><br>
><br>
> certutil -L -d /var/lib/pki-ca/alias<br>
><br>
> Certificate Nickname                                         Trust Attributes<br>
>                                                               SSL,S/MIME,JAR/XPI<br>
><br>
> ocspSigningCert cert-pki-ca                                  u,u,u<br>
> subsystemCert cert-pki-ca                                    u,u,u<br>
> Server-Cert cert-pki-ca                                         u,u,u<br>
> auditSigningCert cert-pki-ca                                 u,u,Pu<br>
> caSigningCert cert-pki-ca                                    CTu,Cu,Cu<br>
><br>
><br>
> certutil -L -d /etc/httpd/alias<br>
><br>
> Certificate Nickname                                         Trust Attributes<br>
>                                                               SSL,S/MIME,JAR/XPI<br>
><br>
> Server-Cert                                                      u,u,u<br>
> ipaCert                                                             u,u,u<br>
</div></div>> <a href="http://REALM.COM" rel="noreferrer" target="_blank">REALM.COM</a> <<a href="http://REALM.COM" rel="noreferrer" target="_blank">http://REALM.COM</a>> IPA CA                                      CT,C,<br>
<span>><br>
><br>
> certutil -L -d /etc/dirsrv/slapd-REALM-COM<br>
><br>
> Certificate Nickname                                         Trust Attributes<br>
>                                                               SSL,S/MIME,JAR/XPI<br>
><br>
> Server-Cert                                                          u,u,u<br>
</span>> <a href="http://REALM.COM" rel="noreferrer" target="_blank">REALM.COM</a> <<a href="http://REALM.COM" rel="noreferrer" target="_blank">http://REALM.COM</a>> IPA CA                                          CT,C,C<br>
<span>><br>
><br>
> Output of getcert list:<br>
><br>
> Number of certificates and requests being tracked: 7.<br>
> Request ID '21135214223243':<br>
>          status: CA_UNREACHABLE<br>
>          ca-error: Server at <a href="https://host.example.net/ipa/xml" rel="noreferrer" target="_blank">https://host.example.net/ipa/xml</a> failed request,<br>
> will retry: 4301 (RPC failed at server.  Certificate oper<br>
> ation cannot be completed: Unable to communicate with CMS (Not Found)).<br>
>          stuck: no<br>
>          key pair storage:<br>
> type=NSSDB,location='/etc/dirsrv/slapd-example-NET',nickname='Server-Cert',token='NSS<br>
> Certificate DB',pinfil<br>
> e='/etc/dirsrv/slapd-example-NET//pwdfile.txt'<br>
>          certificate:<br>
> type=NSSDB,location='/etc/dirsrv/slapd-example-NET',nickname='Server-Cert',token='NSS<br>
> Certificate DB'<br>
>          CA: IPA<br>
>          issuer: CN=Certificate Authority,O=example.NET<br>
</span>>          subject: CN=<a href="http://host.example.net" rel="noreferrer" target="_blank">host.example.net</a> <<a href="http://host.example.net" rel="noreferrer" target="_blank">http://host.example.net</a>>,O=example.NET<br>
<span>>          expires: 2016-03-29 14:09:46 UTC<br>
>          key usage: digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment<br>
>          eku: id-kp-serverAuth<br>
>          pre-save command:<br>
>          post-save command:<br>
>          track: yes<br>
>          auto-renew: yes<br>
> Request ID '21135214223300':<br>
>          status: CA_UNREACHABLE<br>
>          ca-error: Server at <a href="https://host.example.net/ipa/xml" rel="noreferrer" target="_blank">https://host.example.net/ipa/xml</a> failed request,<br>
> will retry: 4301 (RPC failed at server.  Certificate oper<br>
> ation cannot be completed: Unable to communicate with CMS (Not Found)).<br>
>          stuck: no<br>
>          key pair storage:<br>
> type=NSSDB,location='/etc/dirsrv/slapd-PKI-IPA',nickname='Server-Cert',token='NSS Certificate<br>
> DB',pinfile='<br>
> /etc/dirsrv/slapd-PKI-IPA//pwdfile.txt'<br>
>          certificate:<br>
> type=NSSDB,location='/etc/dirsrv/slapd-PKI-IPA',nickname='Server-Cert',token='NSS Certificate<br>
> DB'<br>
>          CA: IPA<br>
>          issuer: CN=Certificate Authority,O=example.NET<br>
</span>>          subject: CN=<a href="http://host.example.net" rel="noreferrer" target="_blank">host.example.net</a> <<a href="http://host.example.net" rel="noreferrer" target="_blank">http://host.example.net</a>>,O=example.NET<br>
<div><div>>          expires: 2016-03-29 14:09:45 UTC<br>
>          key usage: digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment<br>
>          eku: id-kp-serverAuth<br>
>          pre-save command:<br>
>          post-save command:<br>
>          track: yes<br>
>          auto-renew: yes<br>
> Request ID '20130519130741':<br>
>          status: NEED_CSR_GEN_PIN<br>
>          ca-error: Internal error: no response to<br>
> "<a href="http://host.example.net:9180/ca/ee/ca/profileSubmit?profileId=auditSigningCert+cert-" rel="noreferrer" target="_blank">http://host.example.net:9180/ca/ee/ca/profileSubmit?profileId=auditSigningCert+cert-</a><br>
> pki-ca&serial_num=61&renewal=true&xml=true".<br>
>          stuck: yes<br>
>          key pair storage:<br>
> type=NSSDB,location='/var/lib/pki-ca/alias',nickname='auditSigningCert<br>
> cert-pki-ca',token='NSS Certificate<br>
> DB',pin set<br>
>          certificate:<br>
> type=NSSDB,location='/var/lib/pki-ca/alias',nickname='auditSigningCert<br>
> cert-pki-ca',token='NSS Certificate DB'<br>
>          CA: dogtag-ipa-renew-agent<br>
>          issuer: CN=Certificate Authority,O=example.NET<br>
>          subject: CN=CA Audit,O=example.NET<br>
>          expires: 2017-10-13 14:10:49 UTC<br>
>          key usage: digitalSignature,nonRepudiation<br>
>          pre-save command: /usr/lib64/ipa/certmonger/stop_pkicad<br>
>          post-save command: /usr/lib64/ipa/certmonger/renew_ca_cert<br>
> "auditSigningCert cert-pki-ca"<br>
>          track: yes<br>
>          auto-renew: yes<br>
> Request ID '20130519130742':<br>
>          status: NEED_CSR_GEN_PIN<br>
>          ca-error: Internal error: no response to<br>
> "<a href="http://host.example.net:9180/ca/ee/ca/profileSubmit?profileId=caServerCert&serial_nu" rel="noreferrer" target="_blank">http://host.example.net:9180/ca/ee/ca/profileSubmit?profileId=caServerCert&serial_nu</a><br>
> m=60&renewal=true&xml=true".<br>
>          stuck: yes<br>
>          key pair storage:<br>
> type=NSSDB,location='/var/lib/pki-ca/alias',nickname='ocspSigningCert<br>
> cert-pki-ca',token='NSS Certificate D<br>
> B',pin set<br>
>          certificate:<br>
> type=NSSDB,location='/var/lib/pki-ca/alias',nickname='ocspSigningCert<br>
> cert-pki-ca',token='NSS Certificate DB'<br>
>          CA: dogtag-ipa-renew-agent<br>
>          issuer: CN=Certificate Authority,O=example.NET<br>
>          subject: CN=OCSP Subsystem,O=example.NET<br>
>          expires: 2017-10-13 14:09:49 UTC<br>
>          eku: id-kp-OCSPSigning<br>
>          pre-save command: /usr/lib64/ipa/certmonger/stop_pkicad<br>
>          post-save command: /usr/lib64/ipa/certmonger/renew_ca_cert<br>
> "ocspSigningCert cert-pki-ca"<br>
>          track: yes<br>
>          auto-renew: yes<br>
> Request ID '20130519130743':<br>
>          status: NEED_CSR_GEN_PIN<br>
>          ca-error: Internal error: no response to<br>
> "<a href="http://host.example.net:9180/ca/ee/ca/profileSubmit?profileId=caServerCert&serial_nu" rel="noreferrer" target="_blank">http://host.example.net:9180/ca/ee/ca/profileSubmit?profileId=caServerCert&serial_nu</a><br>
> m=62&renewal=true&xml=true".<br>
>          stuck: yes<br>
>          key pair storage:<br>
> type=NSSDB,location='/var/lib/pki-ca/alias',nickname='subsystemCert<br>
> cert-pki-ca',token='NSS Certificate DB'<br>
> ,pin set<br>
>          certificate:<br>
> type=NSSDB,location='/var/lib/pki-ca/alias',nickname='subsystemCert<br>
> cert-pki-ca',token='NSS Certificate DB'<br>
>          CA: dogtag-ipa-renew-agent<br>
>          issuer: CN=Certificate Authority,O=example.NET<br>
>          subject: CN=CA Subsystem,O=example.NET<br>
>          expires: 2017-10-13 14:09:49 UTC<br>
>          key usage: digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment<br>
>          eku: id-kp-serverAuth,id-kp-clientAuth<br>
>          pre-save command: /usr/lib64/ipa/certmonger/stop_pkicad<br>
>          post-save command: /usr/lib64/ipa/certmonger/renew_ca_cert<br>
> "subsystemCert cert-pki-ca"<br>
>          track: yes<br>
>          auto-renew: yes<br>
> Request ID '20130519130744':<br>
>          status: MONITORING<br>
>          ca-error: Internal error: no response to<br>
> "<a href="http://host.example.net:9180/ca/ee/ca/profileSubmit?profileId=caServerCert&serial_nu" rel="noreferrer" target="_blank">http://host.example.net:9180/ca/ee/ca/profileSubmit?profileId=caServerCert&serial_nu</a><br>
> m=64&renewal=true&xml=true".<br>
>          stuck: no<br>
>          key pair storage:<br>
> type=NSSDB,location='/etc/httpd/alias',nickname='ipaCert',token='NSS Certificate<br>
> DB',pinfile='/etc/httpd/al<br>
> ias/pwdfile.txt'<br>
>          certificate:<br>
> type=NSSDB,location='/etc/httpd/alias',nickname='ipaCert',token='NSS Certificate DB'<br>
>          CA: dogtag-ipa-renew-agent<br>
>          issuer: CN=Certificate Authority,O=example.NET<br>
>          subject: CN=RA Subsystem,O=example.NET<br>
>          expires: 2017-10-13 14:09:49 UTC<br>
>          key usage: digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment<br>
>          eku: id-kp-serverAuth,id-kp-clientAuth<br>
>          pre-save command:<br>
>          post-save command: /usr/lib64/ipa/certmonger/renew_ra_cert<br>
>          track: yes<br>
>          auto-renew: yes<br>
> Request ID '20130519130745':<br>
>          status: NEED_CSR_GEN_PIN<br>
>          ca-error: Internal error: no response to<br>
> "<a href="http://host.example.net:9180/ca/ee/ca/profileSubmit?profileId=caServerCert&serial_nu" rel="noreferrer" target="_blank">http://host.example.net:9180/ca/ee/ca/profileSubmit?profileId=caServerCert&serial_nu</a><br>
> m=63&renewal=true&xml=true".<br>
>          stuck: yes<br>
>          key pair storage:<br>
> type=NSSDB,location='/var/lib/pki-ca/alias',nickname='Server-Cert<br>
> cert-pki-ca',token='NSS Certificate DB',p<br>
> in set<br>
>          certificate:<br>
> type=NSSDB,location='/var/lib/pki-ca/alias',nickname='Server-Cert<br>
> cert-pki-ca',token='NSS Certificate DB'<br>
>          CA: dogtag-ipa-renew-agent<br>
>          issuer: CN=Certificate Authority,O=example.NET<br>
</div></div>>          subject: CN=<a href="http://host.example.net" rel="noreferrer" target="_blank">host.example.net</a> <<a href="http://host.example.net" rel="noreferrer" target="_blank">http://host.example.net</a>>,O=example.NET<br>
<div><div>>          expires: 2017-10-13 14:09:49 UTC<br>
>          key usage: digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment<br>
>          eku: id-kp-serverAuth,id-kp-clientAuth<br>
>          pre-save command:<br>
>          post-save command:<br>
>          track: yes<br>
>          auto-renew: yes<br>
><br>
><br>
> Regards, Adam<br>
><br>
><br>
><br>
<br>
<br>
</div></div><span><font color="#888888">--<br>
Petr Vobornik<br>
</font></span></blockquote></div><br></div>
</div></div></blockquote></div><br></div></div>