[Freeipa-users] ipa-replica-prepare failing
David Dejaeghere
david.dejaeghere at gmail.com
Fri Apr 10 23:02:06 UTC 2015
Hi,
I get the same error when I use a pk12 with only the server certificate
(and key) in it.
Not sure what else I can try.
Regards,
D
2015-04-11 0:23 GMT+02:00 Rob Crittenden <rcritten at redhat.com>:
> David Dejaeghere wrote:
> > Hi,
> >
> > I even tried the command using an export from the http service nss db,
> > same issue.
> >
> > regarding SElinux:
> > ausearch -m AVC -ts recent
> > <no matches>
> >
> > Sending you the log personally.
>
> Ok, so the way the certs are imported is all the certs in the PKCS#12
> file are loaded in, then marked as untrusted.
>
> certutil -O is executed against the server cert which prints out what
> the trust chain should be and those certs marked as trusted CA's.
>
> That part is working fine.
>
> Finally it makes another pass through the database to verify the chain.
>
> Looking at the output there are two certs with the subject CN=Go Daddy
> Root Certificate Authority - G2,O="GoDaddy.com,
> Inc.",L=Scottsdale,ST=Arizona,C=US and different serial numbers. I
> wonder if this is confusing the cert loader. These certs are included in
> the PKCS#12 file (serial #0 and #1828629 AFAICT). I don't know which one
> is the "right' one, or if there even is one.
>
> rob
>
>
> >
> > Regards,
> >
> > D
> >
> > 2015-04-10 17:03 GMT+02:00 Rob Crittenden <rcritten at redhat.com
> > <mailto:rcritten at redhat.com>>:
> >
> > David Dejaeghere wrote:
> > > Hi Rob,
> > >
> > > Without the --http-pin the command will give a prompt to enter the
> password.
> > > Tried both.
> > >
> > > I am sending the output of the pk12util -l to you in another email.
> > > It holds the wildcard certificate and the godaddy bundle for as
> far as I
> > > can tell.
> >
> > I have to admit, I'm a bit stumped. (SEC_ERROR_LIBRARY_FAILURE) is a
> > rather generic NSS error which can mean any number of things. It
> often
> > means that the NSS database it is using is bad in some way but given
> > that this is a temporary database created just for this purpose I
> doubt
> > that's it. You may want to look for SELinux AVCs though: ausearch -m
> AVC
> > -ts recent.
> >
> > At the point where it is blowing up, the PKCS#12 file has already
> been
> > imported and IPA is walking through the results trying to ensure that
> > the full cert trust chain is available. It does this by reading the
> > certs out of the database, and at that point it's blowing up.
> >
> > The PKCS#12 output you sent me looks ok. I don't believe this is an
> > issue with trust or missing parts of the chain.
> >
> > I created a simple PKCS#12 file and was able to prepare a replica
> using
> > it, so AFAICT the code isn't completely broken.
> >
> > Can you provide the full output from ipa-replica-prepare?
> >
> > rob
> > >
> > > Regards,
> > >
> > > D
> > >
> > > 2015-04-09 21:39 GMT+02:00 Rob Crittenden <rcritten at redhat.com
> <mailto:rcritten at redhat.com>
> > > <mailto:rcritten at redhat.com <mailto:rcritten at redhat.com>>>:
> > >
> > > David Dejaeghere wrote:
> > > > Hi,
> > > >
> > > > Sorry for the lack of details!
> > > > You are indeed correct about the version its 4.1
> > > > The command I am using is this:
> > > > ipa-replica-prepare ipa-r1.myobscureddomain.com <
> http://ipa-r1.myobscureddomain.com>
> > <http://ipa-r1.myobscureddomain.com>
> > > > <http://ipa-r1.myobscureddomain.com> --http-cert-file
> > > > /home/fedora/newcert.pk12 --dirsrv-cert-file
> /home/fedora/newcert.pk12
> > > > --ip-address 172.31.16.31 -v
> > >
> > > I was pretty sure a pin was required with those options as
> well.
> > >
> > > What do the PKCS#12 files look like: pk12util -l
> > > /home/fedora/newcert.pk12
> > >
> > > rob
> > >
> > > >
> > > > Regards,
> > > >
> > > > D
> > > >
> > > > 2015-04-09 16:16 GMT+02:00 Rob Crittenden <
> rcritten at redhat.com <mailto:rcritten at redhat.com>
> > <mailto:rcritten at redhat.com <mailto:rcritten at redhat.com>>
> > > > <mailto:rcritten at redhat.com <mailto:rcritten at redhat.com>
> > <mailto:rcritten at redhat.com <mailto:rcritten at redhat.com>>>>:
> > > >
> > > > David Dejaeghere wrote:
> > > > > Hi,
> > > > >
> > > > > Does somebody have any pointers for me regarding this
> > issue?
> > > >
> > > > It would help very much if you'd include the version
> > you're working
> > > > with. Based on line numbers I'll assume IPA 4.1.
> > > >
> > > > It's hard to say since you don't include the
> > command-line you're using,
> > > > or what those files consist of.
> > > >
> > > > It looks like it is blowing up trying to verify that the
> > whole
> > > > certificate chain is available. NSS unfortunately
> > doesn't always provide
> > > > the best error messages so it's hard to say why this
> > particular cert
> > > > can't be loaded.
> > > >
> > > > rob
> > > >
> > > > >
> > > > > Regards,
> > > > >
> > > > > D
> > > > >
> > > > > 2015-04-07 13:34 GMT+02:00 David Dejaeghere
> > <david.dejaeghere at gmail.com <mailto:david.dejaeghere at gmail.com>
> > <mailto:david.dejaeghere at gmail.com <mailto:
> david.dejaeghere at gmail.com>>
> > > <mailto:david.dejaeghere at gmail.com
> > <mailto:david.dejaeghere at gmail.com>
> > <mailto:david.dejaeghere at gmail.com <mailto:
> david.dejaeghere at gmail.com>>>
> > > > > <mailto:david.dejaeghere at gmail.com
> > <mailto:david.dejaeghere at gmail.com>
> > > <mailto:david.dejaeghere at gmail.com
> > <mailto:david.dejaeghere at gmail.com>>
> > > > <mailto:david.dejaeghere at gmail.com
> > <mailto:david.dejaeghere at gmail.com>
> > > <mailto:david.dejaeghere at gmail.com
> > <mailto:david.dejaeghere at gmail.com>>>>>:
> > > > >
> > > > > Hello,
> > > > >
> > > > > I am trying to setup a replica for my master which
> has
> > > been setup
> > > > > with an external CA to use our godaddy wildcard
> > certificate.
> > > > > The ipa-replica-prepare is failing with the
> > following debug
> > > > information.
> > > > > I am using --http-cert and --dirsrv-cert with my
> pk12
> > > server
> > > > > certificate.
> > > > > What can I verify to get an idea of what is going
> > wrong?
> > > > >
> > > > > ipa: DEBUG: stderr=
> > > > >
> > > ipa.ipaserver.install.ipa_replica_prepare.ReplicaPrepare:
> DEBUG:
> > > > > File
> > > >
> > "/usr/lib/python2.7/site-packages/ipapython/admintool.py", line
> > > > > 169, in execute
> > > > > self.ask_for_options()
> > > > > File
> > > > >
> > > >
> > >
> >
> "/usr/lib/python2.7/site-packages/ipaserver/install/ipa_replica_prepare.py",
> > > > > line 276, in ask_for_options
> > > > > options.http_cert_name)
> > > > > File
> > > > >
> > > >
> > >
> >
> "/usr/lib/python2.7/site-packages/ipaserver/install/ipa_replica_prepare.py",
> > > > > line 176, in load_pkcs12
> > > > > host_name=self.replica_fqdn)
> > > > > File
> > > > >
> > > >
> > >
> >
> "/usr/lib/python2.7/site-packages/ipaserver/install/installutils.py",
> > > > line
> > > > > 785, in load_pkcs12
> > > > > nss_cert = x509.load_certificate(cert,
> x509.DER)
> > > > > File
> > > "/usr/lib/python2.7/site-packages/ipalib/x509.py", line
> > > > 128,
> > > > > in load_certificate
> > > > > return nss.Certificate(buffer(data))
> > > > >
> > > > >
> > ipa.ipaserver.install.ipa_replica_prepare.ReplicaPrepare:
> > > > DEBUG: The
> > > > > ipa-replica-prepare command failed, exception:
> > NSPRError:
> > > > > (SEC_ERROR_LIBRARY_FAILURE) security library
> failure.
> > > > >
> > > ipa.ipaserver.install.ipa_replica_prepare.ReplicaPrepare:
> ERROR:
> > > > > (SEC_ERROR_LIBRARY_FAILURE) security library
> failure.
> > > > >
> > > > > Regards,
> > > > >
> > > > > D
> > > > >
> > > > >
> > > > >
> > > > >
> > > >
> > > >
> > >
> > >
> >
> >
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://listman.redhat.com/archives/freeipa-users/attachments/20150411/96881232/attachment.htm>
More information about the Freeipa-users
mailing list