[Freeipa-users] IPA Error 4301: Certificate operation cannot be completed: Unable to communicate with CMS (Not Found)

Chris Tobey tobeychris at hotmail.com
Wed Jun 3 14:12:31 UTC 2015


Hi Martin,

Thank you for the response. Here is what I can see on my FreeIPA server (I
replaced my server name with server.com):

[Wed Jun 03 10:05:36:..//var/lib/pki-ca]$ ipa cert-show 1
ipa: ERROR: Certificate operation cannot be completed: Unable to communicate
with CMS (Not Found)
[Wed Jun 03 10:05:47:..//var/lib/pki-ca]$ getcert list
Number of certificates and requests being tracked: 8.
Request ID '20150407214802':
	status: MONITORING
	stuck: no
	key pair storage:
type=NSSDB,location='/var/lib/pki-ca/alias',nickname='auditSigningCert
cert-pki-ca',token='NSS Certificate DB',pin='303912620731'
	certificate:
type=NSSDB,location='/var/lib/pki-ca/alias',nickname='auditSigningCert
cert-pki-ca',token='NSS Certificate DB'
	CA: dogtag-ipa-renew-agent
	issuer: CN=Certificate Authority,O=SERVER.COM
	subject: CN=CA Audit,O=SERVER.COM
	expires: 2017-03-27 21:47:14 UTC
	key usage: digitalSignature,nonRepudiation
	pre-save command: 
	post-save command: 
	track: yes
	auto-renew: yes
Request ID '20150407214803':
	status: MONITORING
	stuck: no
	key pair storage:
type=NSSDB,location='/var/lib/pki-ca/alias',nickname='ocspSigningCert
cert-pki-ca',token='NSS Certificate DB',pin='303912620731'
	certificate:
type=NSSDB,location='/var/lib/pki-ca/alias',nickname='ocspSigningCert
cert-pki-ca',token='NSS Certificate DB'
	CA: dogtag-ipa-renew-agent
	issuer: CN=Certificate Authority,O=SERVER.COM
	subject: CN=OCSP Subsystem,O=SERVER.COM
	expires: 2017-03-27 21:47:13 UTC
	key usage: digitalSignature,nonRepudiation,keyCertSign,cRLSign
	eku: id-kp-OCSPSigning
	pre-save command: 
	post-save command: 
	track: yes
	auto-renew: yes
Request ID '20150407214804':
	status: MONITORING
	stuck: no
	key pair storage:
type=NSSDB,location='/var/lib/pki-ca/alias',nickname='subsystemCert
cert-pki-ca',token='NSS Certificate DB',pin='303912620731'
	certificate:
type=NSSDB,location='/var/lib/pki-ca/alias',nickname='subsystemCert
cert-pki-ca',token='NSS Certificate DB'
	CA: dogtag-ipa-renew-agent
	issuer: CN=Certificate Authority,O=SERVER.COM
	subject: CN=CA Subsystem,O=SERVER.COM
	expires: 2017-03-27 21:47:14 UTC
	key usage:
digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment
	eku: id-kp-serverAuth,id-kp-clientAuth
	pre-save command: 
	post-save command: 
	track: yes
	auto-renew: yes
Request ID '20150407214805':
	status: MONITORING
	stuck: no
	key pair storage:
type=NSSDB,location='/etc/httpd/alias',nickname='ipaCert',token='NSS
Certificate DB',pinfile='/etc/httpd/alias/pwdfile.txt'
	certificate:
type=NSSDB,location='/etc/httpd/alias',nickname='ipaCert',token='NSS
Certificate DB'
	CA: dogtag-ipa-renew-agent
	issuer: CN=Certificate Authority,O=SERVER.COM
	subject: CN=IPA RA,O=SERVER.COM
	expires: 2017-03-27 21:48:00 UTC
	key usage:
digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment
	eku: id-kp-serverAuth,id-kp-clientAuth
	pre-save command: 
	post-save command: 
	track: yes
	auto-renew: yes
Request ID '20150407214806':
	status: MONITORING
	stuck: no
	key pair storage:
type=NSSDB,location='/var/lib/pki-ca/alias',nickname='Server-Cert
cert-pki-ca',token='NSS Certificate DB',pin='303912620731'
	certificate:
type=NSSDB,location='/var/lib/pki-ca/alias',nickname='Server-Cert
cert-pki-ca',token='NSS Certificate DB'
	CA: dogtag-ipa-renew-agent
	issuer: CN=Certificate Authority,O=SERVER.COM
	subject: CN=chimera.server.com,O=SERVER.COM
	expires: 2017-03-27 21:47:14 UTC
	key usage:
digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment
	eku: id-kp-serverAuth
	pre-save command: 
	post-save command: 
	track: yes
	auto-renew: yes
Request ID '20150407214820':
	status: MONITORING
	stuck: no
	key pair storage:
type=NSSDB,location='/etc/dirsrv/slapd-BURLINGTON-EVERTZ-TV',nickname='Serve
r-Cert',token='NSS Certificate
DB',pinfile='/etc/dirsrv/slapd-BURLINGTON-EVERTZ-TV/pwdfile.txt'
	certificate:
type=NSSDB,location='/etc/dirsrv/slapd-BURLINGTON-EVERTZ-TV',nickname='Serve
r-Cert',token='NSS Certificate DB'
	CA: IPA
	issuer: CN=Certificate Authority,O=SERVER.COM
	subject: CN=chimera.server.com,O=SERVER.COM
	expires: 2017-04-07 21:48:20 UTC
	key usage:
digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment
	eku: id-kp-serverAuth,id-kp-clientAuth
	pre-save command: 
	post-save command: 
	track: yes
	auto-renew: yes
Request ID '20150407214856':
	status: MONITORING
	stuck: no
	key pair storage:
type=NSSDB,location='/etc/dirsrv/slapd-PKI-IPA',nickname='Server-Cert',token
='NSS Certificate DB',pinfile='/etc/dirsrv/slapd-PKI-IPA/pwdfile.txt'
	certificate:
type=NSSDB,location='/etc/dirsrv/slapd-PKI-IPA',nickname='Server-Cert',token
='NSS Certificate DB'
	CA: IPA
	issuer: CN=Certificate Authority,O=SERVER.COM
	subject: CN=chimera.server.com,O=SERVER.COM
	expires: 2017-04-07 21:48:55 UTC
	key usage:
digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment
	eku: id-kp-serverAuth,id-kp-clientAuth
	pre-save command: 
	post-save command: 
	track: yes
	auto-renew: yes
Request ID '20150407215219':
	status: MONITORING
	stuck: no
	key pair storage:
type=NSSDB,location='/etc/httpd/alias',nickname='Server-Cert',token='NSS
Certificate DB',pinfile='/etc/httpd/alias/pwdfile.txt'
	certificate:
type=NSSDB,location='/etc/httpd/alias',nickname='Server-Cert',token='NSS
Certificate DB'
	CA: IPA
	issuer: CN=Certificate Authority,O=SERVER.COM
	subject: CN=chimera.server.com,O=SERVER.COM
	expires: 2017-04-07 21:52:19 UTC
	key usage:
digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment
	eku: id-kp-serverAuth,id-kp-clientAuth
	pre-save command: 
	post-save command: 
	track: yes
	auto-renew: yes

Here is what I can see on my Puppet Master (single server that hosts
foreman, puppet, and everything related to them).

[Wed Jun 03 10:08:07:~]$ getcert list 
Number of certificates and requests being tracked: 1.
Request ID '20150407223624':
	status: MONITORING
	stuck: no
	key pair storage: type=NSSDB,location='/etc/pki/nssdb',nickname='IPA
Machine Certificate - puppetmaster.server.com',token='NSS Certificate DB'
	certificate: type=NSSDB,location='/etc/pki/nssdb',nickname='IPA
Machine Certificate - puppetmaster.server.com',token='NSS Certificate DB'
	CA: IPA
	issuer: CN=Certificate Authority,O=SERVER.COM
	subject: CN=puppetmaster.server.com,O=SERVER.COM
	expires: 2017-04-07 22:36:24 UTC
	key usage:
digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment
	eku: id-kp-serverAuth,id-kp-clientAuth
	pre-save command: 
	post-save command: 
	track: yes
	auto-renew: yes

>From here the status shows as MONITORING, which is what I think it is
supposed to show, and they do not expire until 2017.

Thanks,
-Chris Tobey

-----Original Message-----
From: Martin Kosek [mailto:mkosek at redhat.com] 
Sent: June-03-15 3:44 AM
To: Chris Tobey; freeipa-users at redhat.com
Subject: Re: [Freeipa-users] IPA Error 4301: Certificate operation cannot be
completed: Unable to communicate with CMS (Not Found)

On 06/02/2015 10:10 PM, Chris Tobey wrote:
> Hi everyone,
> 
>  
> 
> This is my first time posting here - please be gentle.

Ok :-)

> I currently have ~40 CentOS 6.6 servers authenticating against my 
> FreeIPA server running on another CentOS 6.6 server.
> (ipa-server-3.0.0-42.el6.centos.x86_64 and
> ipa-client-3.0.0-42.el6.centos.x86_64) The server has been running 
> stable for the last ~4 months without issue, slowly building up from 
> five servers to the current forty. This server is paired with a 
> puppet/foreman server to manage the servers themselves.
> 
>  
> 
> I am having an issue with my FreeIPA server and I cannot figure out 
> what is going wrong. As of right now all 40 servers can still 
> authenticate without issue, so that is good.
> 
>  
> 
> My issue is similar to what I saw here:
> https://www.redhat.com/archives/freeipa-users/2011-November/msg00125.h
> tml where I receive a pop-up error "IPA Error 4301: Certificate 
> operation cannot be completed: Unable to communicate with CMS (Not 
> Found)". The issue described at the above link is fairly old, and I 
> checked my .jar symlinks and they appear to all be ok. The pop-up 
> appears when I go to Identity > Hosts > and click on a host. The host 
> information appears to all be correct, and if I make changes the error 
> appears again, but the changes seem to take effect (tested changing a 
> host description).
> 
>  
> 
> The failures prevent me from adding new hosts in Foreman. When I try 
> to add a new host is says "Unable to save - Failed to create 
> testvm.server.com's realm entry: ERF12-5287 
> [ProxyAPI::ProxyException]: Unable to create realm entry 
> ([RestClient::BadRequest]: 400 Bad Request) for proxy
https://puppetmaster.server.com:8443/realm/SERVER.COM."
> 
>  
> 
> Does anyone have any ideas on what I can do to fix this? I can post 
> any logs that I have, but I do not know which are relevant to this issue.

Could this be the dreaded expiration of the FreeIPA CA subsystem
certificates?
I would suggest logging to FreeIPA CA servers and running

# getcert list

and giving us the output.

https://www.freeipa.org/page/Troubleshooting#IPA_won.27t_start.2C_expired_ce
rtificates

Thanks,
Martin




More information about the Freeipa-users mailing list