[Freeipa-users] IPA certificates expired, please help!

Rob Crittenden rcritten at redhat.com
Tue Jul 26 21:22:47 UTC 2016


Linov Suresh wrote:
> Removed the duplicate certificates and and tried to renew the
> certificates, we were able to renew the certificates and "*ca-error:
> Internal error: no response to
> "http://caer.teloip.net:9180/ca/ee/ca/profileSubmit?profileId=caServerCert&serial_num=63&renewal=true&xml=true"*."
> gone this time.
>
> Thanks for your help. We have a master replica also, *how do we renew
> the replica server*?

Pretty much the same way: go back in time.

If you have a CA on this other master then it can fetch the subsystem 
certs directly from LDAP so that should pretty much work no matter what 
the current date is.

For the certs for 389-ds and Apache you'll probably need to go back in 
time to when they are still valid.

rob

>
> On Fri, Jul 22, 2016 at 3:36 PM, Linov Suresh <linov.suresh at gmail.com
> <mailto:linov.suresh at gmail.com>> wrote:
>
>     Thank you very much Rob.
>     Let me remove the duplicate certificates and try to renew the
>     certificates again to see if "*ca-error: Internal error: no response
>     to
>     "http://caer.teloip.net:9180/ca/ee/ca/profileSubmit?profileId=caServerCert&serial_num=63&renewal=true&xml=true"*."
>     goes away?
>
>
>     On Fri, Jul 22, 2016 at 2:45 PM, Rob Crittenden <rcritten at redhat.com
>     <mailto:rcritten at redhat.com>> wrote:
>
>         Linov Suresh wrote:
>
>             Could you please verify, if we have set correct trust
>             attributes on the
>             certificates
>
>             *root at caer ~]# certutil -d /var/lib/pki-ca/alias/ -L*
>
>             Certificate Nickname
>               Trust
>             Attributes
>
>                SSL,S/MIME,JAR/XPI
>
>             subsystemCert cert-pki-ca
>               u,u,Pu
>             ocspSigningCert cert-pki-ca
>               u,u,u
>             caSigningCert cert-pki-ca
>               CTu,Cu,Cu
>             subsystemCert cert-pki-ca
>               u,u,Pu
>             Server-Cert cert-pki-ca
>                 u,u,u
>             auditSigningCert cert-pki-ca
>                u,u,Pu
>             *
>             *
>             *[root at caer ~]# certutil -d /etc/httpd/alias/ -L*
>
>             Certificate Nickname
>               Trust
>             Attributes
>
>                SSL,S/MIME,JAR/XPI
>
>             ipaCert
>             u,u,u
>             Server-Cert                                                u,u,u
>             TELOIP.NET <http://TELOIP.NET> <http://TELOIP.NET> IPA CA
>                CT,C,C
>             ipaCert
>             u,u,u
>             Signing-Cert                                               u,u,u
>             Server-Cert                                                u,u,u
>
>             *[root at caer ~]# certutil -d /etc/dirsrv/slapd-TELOIP-NET/ -L*
>
>             Certificate Nickname
>               Trust
>             Attributes
>
>                SSL,S/MIME,JAR/XPI
>
>             Server-Cert
>             u,u,u
>             TELOIP.NET <http://TELOIP.NET> <http://TELOIP.NET> IPA CA
>                CT,,C
>             Server-Cert
>             u,u,u
>             [root at caer ~]#
>
>             *Please note, there are duplicate certificates in CA, HTTP
>             and LDAP
>             directory, subsystemCert cert-pki-ca, ipaCert  and
>             Server-Cert. I was
>             wondering if we need to remove these duplicate certificates? *
>
>
>         Yeah you should remove the duplicate certs, they seem to cause
>         problems with dogtag at least (certmonger _should_ handle this
>         automatically, we'll be looking into it soonish).
>
>         To remove the duplicate cert:
>
>         1. Shutdown the service
>         2. Back up the NSS database
>         3. certutil -L -d /path/to/db -n <nickname> -a > somefile
>         4. split somefile into separate files so each file as a
>         BEGIN/END certificate
>         5. openssl x509 -text -in -infile somefile1..n
>         6. Pick the one with the most recent issuance date
>         7. You backed up the NSS database, right?
>         8. certutil -D -d /path/to/db -n <nickname>
>         9. certutil -A -d /path/to/db -n <nickname> -t u,u,u -a -i
>         somefilex
>         10. Start the service, watch logs for errors
>
>         For the trust use whatever the original trust value was.
>
>         You don't need the P trust flag on the subsystemCert in the CA,
>         only the auditSigningCert.
>
>         I doubt the duplicated Server-Cert will be a problem. NSS is
>         supposed to deal with this automatically, picking the "most
>         correct" cert to use based on the validity period.
>
>         rob
>
>
>
>             On Fri, Jul 22, 2016 at 9:36 AM, Linov Suresh
>             <linov.suresh at gmail.com <mailto:linov.suresh at gmail.com>
>             <mailto:linov.suresh at gmail.com
>             <mailto:linov.suresh at gmail.com>>> wrote:
>
>                  I'm facing another issue now, my kerberos tickets are
>             not renewing,
>
>                  *[root at caer ~]# ipa cert-show 1*
>                  ipa: ERROR: Ticket expired
>
>                  *[root at caer ~]# klist*
>                  Ticket cache: FILE:/tmp/krb5cc_0
>                  Default principal: admin at TELOIP.NET
>             <mailto:admin at TELOIP.NET> <mailto:admin at TELOIP.NET
>             <mailto:admin at TELOIP.NET>>
>
>                  Valid starting     Expires            Service principal
>                  07/20/16 14:42:26  07/21/16 14:42:22
>             krbtgt/TELOIP.NET at TELOIP.NET <mailto:TELOIP.NET at TELOIP.NET>
>                  <mailto:TELOIP.NET at TELOIP.NET
>             <mailto:TELOIP.NET at TELOIP.NET>>
>                  07/20/16 14:42:36  07/21/16 14:42:22
>                    HTTP/caer.teloip.net at TELOIP.NET
>             <mailto:caer.teloip.net at TELOIP.NET>
>             <mailto:caer.teloip.net at TELOIP.NET
>             <mailto:caer.teloip.net at TELOIP.NET>>
>                  07/21/16 11:40:15  07/21/16 14:42:22
>                    ldap/caer.teloip.net at TELOIP.NET
>             <mailto:caer.teloip.net at TELOIP.NET>
>             <mailto:caer.teloip.net at TELOIP.NET
>             <mailto:caer.teloip.net at TELOIP.NET>>
>
>                  I need to manually renew the tickets every day,
>
>                  *[root at caer ~]# kinit admin*
>                  Password for admin at TELOIP.NET <mailto:admin at TELOIP.NET>
>             <mailto:admin at TELOIP.NET <mailto:admin at TELOIP.NET>>:
>                  Warning: Your password will expire in 6 days on Thu Jul
>             28 15:20:15 2016
>
>                  *[root at caer ~]# klist *
>                  Ticket cache: FILE:/tmp/krb5cc_0
>                  Default principal: admin at TELOIP.NET
>             <mailto:admin at TELOIP.NET> <mailto:admin at TELOIP.NET
>             <mailto:admin at TELOIP.NET>>
>
>                  Valid starting     Expires            Service principal
>                  07/22/16 09:34:52  07/23/16 09:34:49
>             krbtgt/TELOIP.NET at TELOIP.NET <mailto:TELOIP.NET at TELOIP.NET>
>                  <mailto:TELOIP.NET at TELOIP.NET
>             <mailto:TELOIP.NET at TELOIP.NET>>
>
>
>                  On Thu, Jul 21, 2016 at 12:23 PM, Rob Crittenden
>                  <rcritten at redhat.com <mailto:rcritten at redhat.com>
>             <mailto:rcritten at redhat.com <mailto:rcritten at redhat.com>>>
>             wrote:
>
>                      Linov Suresh wrote:
>
>                          The httpd_error log doesn't contain the part
>             where `ipa
>                          cert-show 1` was
>                          run. If it is from the same time.
>
>                          *I am not sure about that, please see
>             httpd_error when `ipa
>                          cert-show 1`
>                          was run*
>
>
>                      The IPA API log isn't going to show much in this case.
>
>                      Requests to the CA are proxied through IPA. The CA
>             WAR is not
>                      running on tomcat so when Apache tries to proxy the
>             request
>                      tomcat returns a 404, Not Found.
>
>                      You need to start with the dogtag debug and
>             selftest logs to see
>                      what is going on. The logs are pretty verbose and
>             can be
>                      challenging to read.
>
>                      rob
>
>
>                          [root at caer ~]# *tail -f /var/log/httpd/error_log*
>                          [Thu Jul 21 12:01:21 2016] [error] ipa: DEBUG: WSGI
>                          wsgi_dispatch.__call__:
>                          [Thu Jul 21 12:01:21 2016] [error] ipa: DEBUG: WSGI
>                          xmlserver_session.__call__:
>                          [Thu Jul 21 12:01:21 2016] [error] ipa: DEBUG:
>             found session
>                          cookie_id =
>                          bc2c7ed0eccd840dc266efaf9ece913c
>                          [Thu Jul 21 12:01:21 2016] [error] ipa: DEBUG:
>             found session
>                          data in
>                          cache with id=bc2c7ed0eccd840dc266efaf9ece913c
>                          [Thu Jul 21 12:01:21 2016] [error] ipa: DEBUG:
>                          xmlserver_session.__call__:
>                          session_id=bc2c7ed0eccd840dc266efaf9ece913c
>                          start_timestamp=2016-07-21T11:58:54
>                          access_timestamp=2016-07-21T12:01:21
>                          expiration_timestamp=2016-07-21T12:18:54
>                          [Thu Jul 21 12:01:21 2016] [error] ipa: DEBUG:
>             storing
>                          ccache data into
>                          file "/var/run/ipa_memcached/krbcc_13554"
>                          [Thu Jul 21 12:01:21 2016] [error] ipa: DEBUG:
>                          get_credential_times:
>                          principal=HTTP/caer.teloip.net at TELOIP.NET
>             <mailto:caer.teloip.net at TELOIP.NET>
>                          <mailto:caer.teloip.net at TELOIP.NET
>             <mailto:caer.teloip.net at TELOIP.NET>>
>                          <mailto:caer.teloip.net at TELOIP.NET
>             <mailto:caer.teloip.net at TELOIP.NET>
>                          <mailto:caer.teloip.net at TELOIP.NET
>             <mailto:caer.teloip.net at TELOIP.NET>>>, authtime=07/21/16
>                          10:31:46,
>                          starttime=07/21/16 10:43:26, endtime=07/22/16
>             10:31:44,
>                          renew_till=12/31/69 19:00:00
>                          [Thu Jul 21 12:01:21 2016] [error] ipa: DEBUG:
>                          get_credential_times:
>                          principal=HTTP/caer.teloip.net at TELOIP.NET
>             <mailto:caer.teloip.net at TELOIP.NET>
>                          <mailto:caer.teloip.net at TELOIP.NET
>             <mailto:caer.teloip.net at TELOIP.NET>>
>                          <mailto:caer.teloip.net at TELOIP.NET
>             <mailto:caer.teloip.net at TELOIP.NET>
>                          <mailto:caer.teloip.net at TELOIP.NET
>             <mailto:caer.teloip.net at TELOIP.NET>>>, authtime=07/21/16
>                          10:31:46,
>
>                          starttime=07/21/16 10:43:26, endtime=07/22/16
>             10:31:44,
>                          renew_till=12/31/69 19:00:00
>                          [Thu Jul 21 12:01:21 2016] [error] ipa: DEBUG:
>             KRB5_CCache
>                          FILE:/var/run/ipa_memcached/krbcc_13554
>             endtime=1469197904
>                          (07/22/16
>                          10:31:44)
>                          [Thu Jul 21 12:01:21 2016] [error] ipa: DEBUG:
>                          set_session_expiration_time:
>             duration_type=inactivity_timeout
>                          duration=1200 max_age=1469197604
>             expiration=1469118081.77
>                          (2016-07-21T12:21:21)
>                          [Thu Jul 21 12:01:21 2016] [error] ipa: DEBUG: WSGI
>                          xmlserver.__call__:
>                          [Thu Jul 21 12:01:21 2016] [error] ipa: DEBUG:
>             Created
>                          connection
>                          context.ldap2
>                          [Thu Jul 21 12:01:21 2016] [error] ipa: DEBUG: WSGI
>                          WSGIExecutioner.__call__:
>                          [Thu Jul 21 12:01:21 2016] [error] ipa: DEBUG: raw:
>                          cert_show(u'1')
>                          [Thu Jul 21 12:01:21 2016] [error] ipa: DEBUG:
>             cert_show(u'1')
>                          [Thu Jul 21 12:01:21 2016] [error] ipa: DEBUG:
>             IPA: virtual
>                          verify
>                          retrieve certificate
>                          [Thu Jul 21 12:01:21 2016] [error] ipa: DEBUG:
>                          ipaserver.plugins.dogtag.ra.get_certificate()
>                          [Thu Jul 21 12:01:21 2016] [error] ipa: DEBUG:
>             https_request
>
>             'https://caer.teloip.net:443/ca/agent/ca/displayBySerial'
>                          [Thu Jul 21 12:01:21 2016] [error] ipa: DEBUG:
>             https_request
>                          post
>                          'xml=true&serialNumber=1'
>                          [Thu Jul 21 12:01:21 2016] [error] ipa: DEBUG:
>             NSSConnection
>                          init
>             caer.teloip.net <http://caer.teloip.net>
>             <http://caer.teloip.net>
>                          <http://caer.teloip.net>
>                          [Thu Jul 21 12:01:21 2016] [error] ipa: DEBUG:
>             Connecting:
>             10.20.0.75:0 <http://10.20.0.75:0> <http://10.20.0.75:0>
>                          <http://10.20.0.75:0>
>                          [Thu Jul 21 12:01:21 2016] [error] ipa: DEBUG:
>                          auth_certificate_callback: check_sig=True
>             is_server=False
>                          *.*
>                          *.*
>                          *.*
>                          [Thu Jul 21 12:01:21 2016] [error] ipa: DEBUG:
>             approved_usage =
>                          SSLServer intended_usage = SSLServer
>                          [Thu Jul 21 12:01:21 2016] [error] ipa: DEBUG:
>             cert valid
>                          True for
>                          "CN=caer.teloip.net <http://caer.teloip.net>
>             <http://caer.teloip.net>
>                          <http://caer.teloip.net>,O=TELOIP.NET
>             <http://TELOIP.NET> <http://TELOIP.NET>
>                          <http://TELOIP.NET>"
>                          [Thu Jul 21 12:01:21 2016] [error] ipa: DEBUG:
>             handshake
>                          complete, peer
>                          = 10.20.0.75:443 <http://10.20.0.75:443>
>             <http://10.20.0.75:443> <http://10.20.0.75:443>
>                          [Thu Jul 21 12:01:21 2016] [error] ipa: DEBUG:
>                          auth_certificate_callback: check_sig=True
>             is_server=False
>                          *.*
>                          *.*
>                          *.*
>                          [Thu Jul 21 12:01:21 2016] [error] ipa: DEBUG:
>             approved_usage =
>                          SSLServer intended_usage = SSLServer
>                          [Thu Jul 21 12:01:21 2016] [error] ipa: DEBUG:
>             cert valid
>                          True for
>                          "CN=caer.teloip.net <http://caer.teloip.net>
>             <http://caer.teloip.net>
>                          <http://caer.teloip.net>,O=TELOIP.NET
>             <http://TELOIP.NET> <http://TELOIP.NET>
>                          <http://TELOIP.NET>"
>                          [Thu Jul 21 12:01:21 2016] [error] ipa: DEBUG:
>             handshake
>                          complete, peer
>                          = 10.20.0.75:443 <http://10.20.0.75:443>
>             <http://10.20.0.75:443> <http://10.20.0.75:443>
>                          [Thu Jul 21 12:01:21 2016] [error] ipa: ERROR:
>                          ipaserver.plugins.dogtag.ra.get_certificate():
>             Unable to
>                          communicate
>                          with CMS (Not Found)
>                          [Thu Jul 21 12:01:21 2016] [error] ipa: INFO:
>             admin at TELOIP.NET <mailto:admin at TELOIP.NET>
>             <mailto:admin at TELOIP.NET <mailto:admin at TELOIP.NET>>
>                          <mailto:admin at TELOIP.NET
>             <mailto:admin at TELOIP.NET> <mailto:admin at TELOIP.NET
>             <mailto:admin at TELOIP.NET>>>:
>                          cert_show(u'1'): CertificateOperationError
>                          [Thu Jul 21 12:01:21 2016] [error] ipa: DEBUG:
>             response:
>                          CertificateOperationError: Certificate
>             operation cannot be
>                          completed:
>                          Unable to communicate with CMS (Not Found)
>                          [Thu Jul 21 12:01:21 2016] [error] ipa: DEBUG:
>             Destroyed
>                          connection
>                          context.ldap2
>                          [Thu Jul 21 12:01:21 2016] [error] ipa: DEBUG:
>             reading
>                          ccache data from
>                          file "/var/run/ipa_memcached/krbcc_13554"
>                          [Thu Jul 21 12:01:21 2016] [error] ipa: DEBUG:
>             store session:
>                          session_id=bc2c7ed0eccd840dc266efaf9ece913c
>                          start_timestamp=2016-07-21T11:58:54
>                          access_timestamp=2016-07-21T12:01:21
>                          expiration_timestamp=2016-07-21T12:21:21
>
>
>                          Does `ipa cert-show` communicate with the same
>             replica? Could be
>                          verified by `ipa -vv cert-show`
>
>                          *It's asking for the serial number of the
>             certificate. If I
>                          give 64
>                          (serial number of ipaCert ), I get ipa: ERROR:
>             Certificate
>                          operation
>                          cannot be completed: Unable to communicate with
>             CMS (Not Found)*
>
>                          *[root at caer ~]# ipa -vv cert-show*
>                          ipa: DEBUG: importing all plugin modules in
>
>             '/usr/lib/python2.6/site-packages/ipalib/plugins'...
>                          *.*
>                          *.*
>                          *.*
>                          ipa: DEBUG:
>             stdout=ipa_session=bc2c7ed0eccd840dc266efaf9ece913c;
>                          Domain=caer.teloip.net <http://caer.teloip.net>
>             <http://caer.teloip.net>
>                          <http://caer.teloip.net>; Path=/ipa; Expires=Thu,
>                          21 Jul 2016 16:25:32 GMT; Secure; HttpOnly
>                          ipa: DEBUG: stderr=
>                          ipa: DEBUG: found session_cookie in persistent
>             storage for
>                          principal
>                          'admin at TELOIP.NET <mailto:admin at TELOIP.NET>
>             <mailto:admin at TELOIP.NET <mailto:admin at TELOIP.NET>>
>                          <mailto:admin at TELOIP.NET
>             <mailto:admin at TELOIP.NET> <mailto:admin at TELOIP.NET
>             <mailto:admin at TELOIP.NET>>>', cookie:
>                          'ipa_session=bc2c7ed0eccd840dc266efaf9ece913c;
>                          Domain=caer.teloip.net <http://caer.teloip.net>
>             <http://caer.teloip.net>
>                          <http://caer.teloip.net>; Path=/ipa;
>             Expires=Thu, 21 Jul
>                          2016 16:25:32
>                          GMT; Secure; HttpOnly'
>                          ipa: DEBUG: setting session_cookie into context
>                          'ipa_session=bc2c7ed0eccd840dc266efaf9ece913c;'
>                          ipa: INFO: trying
>             https://caer.teloip.net/ipa/session/xml
>                          ipa: DEBUG: Created connection context.xmlclient
>                          Serial number: 64
>                          ipa: DEBUG: raw: cert_show(u'64')
>                          ipa: DEBUG: cert_show(u'64')
>                          ipa: INFO: Forwarding 'cert_show' to server
>                          u'https://caer.teloip.net/ipa/session/xml'
>                          ipa: DEBUG: NSSConnection init caer.teloip.net
>             <http://caer.teloip.net>
>                          <http://caer.teloip.net> <http://caer.teloip.net>
>                          ipa: DEBUG: Connecting: 10.20.0.75:0
>             <http://10.20.0.75:0> <http://10.20.0.75:0>
>                          <http://10.20.0.75:0>
>                          send: u'POST /ipa/session/xml HTTP/1.0\r\nHost:
>             caer.teloip.net <http://caer.teloip.net>
>             <http://caer.teloip.net>
>                          <http://caer.teloip.net>\r\nAccept-Language:
>             en-us\r\nReferer:
>             https://caer.teloip.net/ipa/xml\r\nCookie
>             <https://caer.teloip.net/ipa/xml%5Cr%5CnCookie>
>                          <https://caer.teloip.net/ipa/xml%5Cr%5CnCookie>:
>
>             ipa_session=bc2c7ed0eccd840dc266efaf9ece913c;\r\nUser-Agent:
>             xmlrpclib.py/1.0.1 <http://xmlrpclib.py/1.0.1>
>             <http://xmlrpclib.py/1.0.1>
>                          <http://xmlrpclib.py/1.0.1> (by
>             www.pythonware.com <http://www.pythonware.com>
>                          <http://www.pythonware.com>
>                          <http://www.pythonware.com>)\r\nContent-Type:
>                          text/xml\r\nContent-Length: 268\r\n\r\n'
>                          ipa: DEBUG: auth_certificate_callback:
>             check_sig=True
>                          is_server=False
>                          *.*
>                          *.*
>                          *.*
>                          ipa: DEBUG: approved_usage = SSLServer
>             intended_usage =
>                          SSLServer
>                          ipa: DEBUG: cert valid True for
>             "CN=caer.teloip.net <http://caer.teloip.net>
>                          <http://caer.teloip.net>
>                          <http://caer.teloip.net>,O=TELOIP.NET
>             <http://TELOIP.NET> <http://TELOIP.NET>
>                          <http://TELOIP.NET>"
>                          ipa: DEBUG: handshake complete, peer =
>             10.20.0.75:443 <http://10.20.0.75:443>
>                          <http://10.20.0.75:443>
>                          <http://10.20.0.75:443>
>                          send: "<?xml version='1.0'
>
>             encoding='UTF-8'?>\n<methodCall>\n<methodName>cert_show</methodName>\n<params>\n<param>\n<value><array><data>\n<value><string>64</string></value>\n</data></array></value>\n</param>\n<param>\n<value><struct>\n</struct></value>\n</param>\n</params>\n</methodCall>\n"
>                          reply: 'HTTP/1.1 200 Success\r\n'
>                          header: Date: Thu, 21 Jul 2016 16:05:40 GMT
>                          header: Server: Apache/2.2.15 (CentOS)
>                          header: Set-Cookie:
>                          ipa_session=bc2c7ed0eccd840dc266efaf9ece913c;
>                          Domain=caer.teloip.net <http://caer.teloip.net>
>             <http://caer.teloip.net>
>                          <http://caer.teloip.net>; Path=/ipa; Expires=Thu,
>                          21 Jul 2016 16:25:40 GMT; Secure; HttpOnly
>                          header: Connection: close
>                          header: Content-Type: text/xml; charset=utf-8
>                          ipa: DEBUG: received Set-Cookie
>                          'ipa_session=bc2c7ed0eccd840dc266efaf9ece913c;
>                          Domain=caer.teloip.net <http://caer.teloip.net>
>             <http://caer.teloip.net>
>                          <http://caer.teloip.net>; Path=/ipa;
>             Expires=Thu, 21 Jul
>                          2016 16:25:40
>                          GMT; Secure; HttpOnly'
>                          ipa: DEBUG: storing cookie
>                          'ipa_session=bc2c7ed0eccd840dc266efaf9ece913c;
>                          Domain=caer.teloip.net <http://caer.teloip.net>
>             <http://caer.teloip.net>
>                          <http://caer.teloip.net>; Path=/ipa;
>             Expires=Thu, 21 Jul
>                          2016 16:25:40
>                          GMT; Secure; HttpOnly' for principal
>             admin at TELOIP.NET <mailto:admin at TELOIP.NET>
>                          <mailto:admin at TELOIP.NET <mailto:admin at TELOIP.NET>>
>                          <mailto:admin at TELOIP.NET
>             <mailto:admin at TELOIP.NET> <mailto:admin at TELOIP.NET
>             <mailto:admin at TELOIP.NET>>>
>                          ipa: DEBUG: args=keyctl search @s user
>             ipa_session_cookie:admin at TELOIP.NET
>             <mailto:ipa_session_cookie%3Aadmin at TELOIP.NET>
>                          <mailto:ipa_session_cookie%3Aadmin at TELOIP.NET
>             <mailto:ipa_session_cookie%253Aadmin at TELOIP.NET>>
>                          <mailto:ipa_session_cookie%3Aadmin at TELOIP.NET
>             <mailto:ipa_session_cookie%253Aadmin at TELOIP.NET>
>                          <mailto:ipa_session_cookie%253Aadmin at TELOIP.NET
>             <mailto:ipa_session_cookie%25253Aadmin at TELOIP.NET>>>
>                          ipa: DEBUG: stdout=457971704
>
>                          ipa: DEBUG: stderr=
>                          ipa: DEBUG: args=keyctl search @s user
>             ipa_session_cookie:admin at TELOIP.NET
>             <mailto:ipa_session_cookie%3Aadmin at TELOIP.NET>
>                          <mailto:ipa_session_cookie%3Aadmin at TELOIP.NET
>             <mailto:ipa_session_cookie%253Aadmin at TELOIP.NET>>
>                          <mailto:ipa_session_cookie%3Aadmin at TELOIP.NET
>             <mailto:ipa_session_cookie%253Aadmin at TELOIP.NET>
>                          <mailto:ipa_session_cookie%253Aadmin at TELOIP.NET
>             <mailto:ipa_session_cookie%25253Aadmin at TELOIP.NET>>>
>                          ipa: DEBUG: stdout=457971704
>
>                          ipa: DEBUG: stderr=
>                          ipa: DEBUG: args=keyctl pupdate 457971704
>                          ipa: DEBUG: stdout=
>                          ipa: DEBUG: stderr=
>                          body: "<?xml version='1.0'
>
>             encoding='UTF-8'?>\n<methodResponse>\n<fault>\n<value><struct>\n<member>\n<name>faultCode</name>\n<value><int>4301</int></value>\n</member>\n<member>\n<name>faultString</name>\n<value><string>Certificate
>                          operation cannot be completed: Unable to
>             communicate with
>                          CMS (Not
>
>             Found)</string></value>\n</member>\n</struct></value>\n</fault>\n</methodResponse>\n"
>                          ipa: DEBUG: Caught fault 4301 from server
>             https://caer.teloip.net/ipa/session/xml: Certificate
>                          operation cannot be
>                          completed: Unable to communicate with CMS (Not
>             Found)
>                          ipa: DEBUG: Destroyed connection context.xmlclient
>                          ipa: ERROR: Certificate operation cannot be
>             completed: Unable to
>                          communicate with CMS (Not Found)
>                          [root at caer ~]#
>
>
>                          But more interesting is: SelfTestSubsystem: The
>             CRITICAL
>                          self test
>                          plugin called
>
>             selftests.container.instance.SystemCertsVerification
>                          running at startup FAILED!
>
>                          Are you sure that CA is running?
>                              # ipactl status
>                          *Yes, CA is runnig, *
>
>                          *[root at caer ~]# ipactl status*
>                          Directory Service: RUNNING
>                          KDC Service: RUNNING
>                          KPASSWD Service: RUNNING
>                          DNS Service: RUNNING
>                          MEMCACHE Service: RUNNING
>                          HTTP Service: RUNNING
>                          CA Service: RUNNING
>
>                          This looks like that self test fail and
>             therefore CA
>                          shouldn't start. It
>                          also says that some of CA cert is not valid.
>             Which one might
>                          be seen in
>                          /var/log/pki-ca/debug but a bigger chunk would
>             be needed.
>
>                          *[root at caer ~]# tail -100 /var/log/pki-ca/debug *
>
>                          [21/Jul/2016:11:48:29][CertStatusUpdateThread]:
>             getConn: conn is
>                          connected true
>                          [21/Jul/2016:11:48:29][CertStatusUpdateThread]:
>             getConn:
>                          mNumConns now 1
>                          [21/Jul/2016:11:48:29][CertStatusUpdateThread]: In
>                          findCertRecordsInListRawJumpto with Jumpto
>             20160721114829Z
>                          [21/Jul/2016:11:48:29][CertStatusUpdateThread]: In
>                          DBVirtualList filter
>                          attrs startFrom sortKey pageSize filter:
>                          (certStatus=REVOKED) attrs:
>                          [objectclass, certRevokedOn, certRecordId,
>             certRevoInfo,
>                          notAfter,
>                          x509cert] pageSize -200 startFrom 20160721114829Z
>                          [21/Jul/2016:11:48:29][CertStatusUpdateThread]:
>             returnConn:
>                          mNumConns now 2
>                          [21/Jul/2016:11:48:29][CertStatusUpdateThread]:
>             returnConn:
>                          mNumConns now 3
>                          [21/Jul/2016:11:48:29][CertStatusUpdateThread]:
>             getEntries
>                          returning 0
>                          [21/Jul/2016:11:48:29][CertStatusUpdateThread]:
>             mTop 0
>                          [21/Jul/2016:11:48:29][CertStatusUpdateThread]:
>             Getting
>                          Virtual List size: 0
>                          [21/Jul/2016:11:48:29][CertStatusUpdateThread]:
>             index may be
>                          empty
>                          [21/Jul/2016:11:48:29][CertStatusUpdateThread]:
>                          updateCertStatus done
>                          [21/Jul/2016:11:48:29][CertStatusUpdateThread]:
>             Starting
>                          cert checkRanges
>                          [21/Jul/2016:11:48:29][CertStatusUpdateThread]:
>             Serial
>                          numbers left in
>                          range: 268369849
>                          [21/Jul/2016:11:48:29][CertStatusUpdateThread]:
>             Last Serial
>                          Number: 71
>                          [21/Jul/2016:11:48:29][CertStatusUpdateThread]:
>             Serial Numbers
>                          available: 268369849
>                          [21/Jul/2016:11:48:29][CertStatusUpdateThread]:
>             cert
>                          checkRanges done
>                          [21/Jul/2016:11:48:29][CertStatusUpdateThread]:
>             Starting
>                          request checkRanges
>                          [21/Jul/2016:11:48:29][CertStatusUpdateThread]:
>             Serial
>                          numbers left in
>                          range: 9989888
>                          [21/Jul/2016:11:48:29][CertStatusUpdateThread]:
>             Last Serial
>                          Number: 112
>                          [21/Jul/2016:11:48:29][CertStatusUpdateThread]:
>             Serial Numbers
>                          available: 9989888
>                          [21/Jul/2016:11:48:29][CertStatusUpdateThread]:
>             request
>                          checkRanges done
>                          [21/Jul/2016:11:53:28][Timer-0]: CMSEngine:
>                          getPasswordStore(): password
>                          store initialized before.
>                          [21/Jul/2016:11:53:28][Timer-0]: CMSEngine:
>                          getPasswordStore(): password
>                          store initialized.
>                          [21/Jul/2016:11:58:28][Timer-0]: CMSEngine:
>                          getPasswordStore(): password
>                          store initialized before.
>                          [21/Jul/2016:11:58:28][Timer-0]: CMSEngine:
>                          getPasswordStore(): password
>                          store initialized.
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]:
>             About to start
>                          updateCertStatus
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]:
>             Starting
>                          updateCertStatus (entered lock)
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]: In
>                          updateCertStatus()
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]: In
>                          LdapBoundConnFactory::getConn()
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]:
>             masterConn
>                          is connected:
>                          true
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]:
>             getConn: conn is
>                          connected true
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]:
>             getConn:
>                          mNumConns now 2
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]:
>                          getInvalidCertificatesByNotBeforeDate filter
>                          (certStatus=INVALID)
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]:
>                          getInvalidCertificatesByNotBeforeDate: about to
>             call
>                          findCertRecordsInList
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]: In
>                          LdapBoundConnFactory::getConn()
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]:
>             masterConn
>                          is connected:
>                          true
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]:
>             getConn: conn is
>                          connected true
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]:
>             getConn:
>                          mNumConns now 1
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]: In
>                          findCertRecordsInListRawJumpto with Jumpto
>             20160721115829Z
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]: In
>                          DBVirtualList filter
>                          attrs startFrom sortKey pageSize filter:
>                          (certStatus=INVALID) attrs:
>                          [objectclass, certRecordId, x509cert] pageSize
>             -200 startFrom
>                          20160721115829Z
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]:
>             returnConn:
>                          mNumConns now 2
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]: In
>                          getInvalidCertsByNotBeforeDate finally.
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]:
>             returnConn:
>                          mNumConns now 3
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]:
>             getEntries
>                          returning 0
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]:
>             mTop 0
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]:
>             Getting
>                          Virtual List size: 0
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]:
>             index may be
>                          empty
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]: In
>                          LdapBoundConnFactory::getConn()
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]:
>             masterConn
>                          is connected:
>                          true
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]:
>             getConn: conn is
>                          connected true
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]:
>             getConn:
>                          mNumConns now 2
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]:
>                          getValidCertsByNotAfterDate filter
>             (certStatus=VALID)
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]: In
>                          LdapBoundConnFactory::getConn()
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]:
>             masterConn
>                          is connected:
>                          true
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]:
>             getConn: conn is
>                          connected true
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]:
>             getConn:
>                          mNumConns now 1
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]: In
>                          findCertRecordsInListRawJumpto with Jumpto
>             20160721115829Z
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]: In
>                          DBVirtualList filter
>                          attrs startFrom sortKey pageSize filter:
>             (certStatus=VALID)
>                          attrs:
>                          [objectclass, certRecordId, x509cert] pageSize
>             -200 startFrom
>                          20160721115829Z
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]:
>             returnConn:
>                          mNumConns now 2
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]:
>             returnConn:
>                          mNumConns now 3
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]:
>             getEntries
>                          returning 1
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]:
>             mTop 0
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]:
>             Getting
>                          Virtual List
>                          size: 14
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]:
>                          transidValidCertificates: list size: 14
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]:
>                          transitValidCertificates: ltSize 1
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]:
>                          getElementAt: 0 mTop 0
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]:
>             reverse
>                          direction
>                          getting index 0
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]:
>             Record does not
>                          qualify,notAfter Thu Jan 12 09:11:48 EST 2017
>             date Thu Jul
>                          21 11:58:29
>                          EDT 2016
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]:
>                          transitCertList EXPIRED
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]: In
>                          LdapBoundConnFactory::getConn()
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]:
>             masterConn
>                          is connected:
>                          true
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]:
>             getConn: conn is
>                          connected true
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]:
>             getConn:
>                          mNumConns now 2
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]:
>                          getRevokedCertificatesByNotAfterDate filter
>             (certStatus=REVOKED)
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]:
>                          getRevokedCertificatesByNotAfterDate: about to call
>                          findCertRecordsInList
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]: In
>                          LdapBoundConnFactory::getConn()
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]:
>             masterConn
>                          is connected:
>                          true
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]:
>             getConn: conn is
>                          connected true
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]:
>             getConn:
>                          mNumConns now 1
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]: In
>                          findCertRecordsInListRawJumpto with Jumpto
>             20160721115829Z
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]: In
>                          DBVirtualList filter
>                          attrs startFrom sortKey pageSize filter:
>                          (certStatus=REVOKED) attrs:
>                          [objectclass, certRevokedOn, certRecordId,
>             certRevoInfo,
>                          notAfter,
>                          x509cert] pageSize -200 startFrom 20160721115829Z
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]:
>             returnConn:
>                          mNumConns now 2
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]:
>             returnConn:
>                          mNumConns now 3
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]:
>             getEntries
>                          returning 0
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]:
>             mTop 0
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]:
>             Getting
>                          Virtual List size: 0
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]:
>             index may be
>                          empty
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]:
>                          updateCertStatus done
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]:
>             Starting
>                          cert checkRanges
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]:
>             Serial
>                          numbers left in
>                          range: 268369849
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]:
>             Last Serial
>                          Number: 71
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]:
>             Serial Numbers
>                          available: 268369849
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]:
>             cert
>                          checkRanges done
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]:
>             Starting
>                          request checkRanges
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]:
>             Serial
>                          numbers left in
>                          range: 9989888
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]:
>             Last Serial
>                          Number: 112
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]:
>             Serial Numbers
>                          available: 9989888
>                          [21/Jul/2016:11:58:29][CertStatusUpdateThread]:
>             request
>                          checkRanges done
>                          [21/Jul/2016:12:03:28][Timer-0]: CMSEngine:
>                          getPasswordStore(): password
>                          store initialized before.
>                          [21/Jul/2016:12:03:28][Timer-0]: CMSEngine:
>                          getPasswordStore(): password
>                          store initialized.
>
>                          On Thu, Jul 21, 2016 at 11:46 AM, Petr Vobornik
>                          <pvoborni at redhat.com
>             <mailto:pvoborni at redhat.com> <mailto:pvoborni at redhat.com
>             <mailto:pvoborni at redhat.com>>
>                          <mailto:pvoborni at redhat.com
>             <mailto:pvoborni at redhat.com> <mailto:pvoborni at redhat.com
>             <mailto:pvoborni at redhat.com>>>>
>                          wrote:
>
>                               On 07/21/2016 05:14 PM, Linov Suresh wrote:
>                               > I set debug=true in /etc/ipa/default.conf
>                               >
>                               > Here are my logs,
>
>                               The httpd_error log doesn't contain the
>             part where `ipa
>                          cert-show 1` was
>                               run. If it is from the same time. Does
>             `ipa cert-show`
>                          communicate with
>                               the same replica? Could be verified by
>             `ipa -vv cert-show`
>
>                               But more interesting is:
>
>                               SelfTestSubsystem: The CRITICAL self test
>             plugin called
>
>               selftests.container.instance.SystemCertsVerification
>                          running at startup
>                               FAILED!
>
>                               Are you sure that CA is running?
>                                  # ipactl status
>
>                               This looks like that self test fail and
>             therefore CA
>                          shouldn't start. It
>                               also says that some of CA cert is not
>             valid. Which one
>                          might be seen in
>                               /var/log/pki-ca/debug but a bigger chunk
>             would be needed.
>
>                                >
>                                > *[root at caer ~]# tail -f
>             /var/log/httpd/error_log*
>                                > [Thu Jul 21 11:00:38 2016] [error] ipa:
>             DEBUG: WSGI
>                               WSGIExecutioner.__call__:
>                                > [Thu Jul 21 11:00:38 2016] [error] ipa:
>             DEBUG: raw:
>                               user_show(u'admin',
>                                > rights=False, all=False, raw=False,
>             version=u'2.46')
>                                > [Thu Jul 21 11:00:38 2016] [error] ipa:
>             DEBUG:
>                               user_show(u'admin', rights=False,
>                                > all=False, raw=False, version=u'2.46')
>                                > [Thu Jul 21 11:00:38 2016] [error] ipa:
>             DEBUG:
>                          get_memberof:
>                                >
>             entry_dn=uid=admin,cn=users,cn=accounts,dc=teloip,dc=net
>                                >
>
>
>             memberof=[ipapython.dn.DN('cn=admins,cn=groups,cn=accounts,dc=teloip,dc=net'),
>                                > ipapython.dn.DN('cn=replication
>                                >
>             administrators,cn=privileges,cn=pbac,dc=teloip,dc=net'),
>                               ipapython.dn.DN('cn=add
>                                > replication
>
>             agreements,cn=permissions,cn=pbac,dc=teloip,dc=net'),
>                                > ipapython.dn.DN('cn=modify replication
>                                >
>             agreements,cn=permissions,cn=pbac,dc=teloip,dc=net'),
>                               ipapython.dn.DN('cn=remove
>                                > replication
>
>             agreements,cn=permissions,cn=pbac,dc=teloip,dc=net'),
>                                > ipapython.dn.DN('cn=unlock user
>                                >
>             accounts,cn=permissions,cn=pbac,dc=teloip,dc=net'),
>                               ipapython.dn.DN('cn=manage
>                                > service
>                          keytab,cn=permissions,cn=pbac,dc=teloip,dc=net'),
>                                > ipapython.dn.DN('cn=trust
>
>               admins,cn=groups,cn=accounts,dc=teloip,dc=net'),
>                                > ipapython.dn.DN('cn=host
>
>               enrollment,cn=privileges,cn=pbac,dc=teloip,dc=net'),
>                                > ipapython.dn.DN('cn=manage host
>                                >
>             keytab,cn=permissions,cn=pbac,dc=teloip,dc=net'),
>                               ipapython.dn.DN('cn=enroll a
>                                >
>             host,cn=permissions,cn=pbac,dc=teloip,dc=net'),
>                               ipapython.dn.DN('cn=add host
>                                >
>             password,cn=permissions,cn=pbac,dc=teloip,dc=net'),
>                               ipapython.dn.DN('cn=add
>                                > krbprincipalname to a
>                          host,cn=permissions,cn=pbac,dc=teloip,dc=net')]
>                                > [Thu Jul 21 11:00:38 2016] [error] ipa:
>             DEBUG:
>                          get_memberof: result
>                                >
>
>
>             direct=[ipapython.dn.DN('cn=admins,cn=groups,cn=accounts,dc=teloip,dc=net'),
>                                > ipapython.dn.DN('cn=trust
>
>               admins,cn=groups,cn=accounts,dc=teloip,dc=net')]
>                                > indirect=[ipapython.dn.DN('cn=replication
>                                >
>             administrators,cn=privileges,cn=pbac,dc=teloip,dc=net'),
>                               ipapython.dn.DN('cn=add
>                                > replication
>
>             agreements,cn=permissions,cn=pbac,dc=teloip,dc=net'),
>                                > ipapython.dn.DN('cn=modify replication
>                                >
>             agreements,cn=permissions,cn=pbac,dc=teloip,dc=net'),
>                               ipapython.dn.DN('cn=remove
>                                > replication
>
>             agreements,cn=permissions,cn=pbac,dc=teloip,dc=net'),
>                                > ipapython.dn.DN('cn=unlock user
>                                >
>             accounts,cn=permissions,cn=pbac,dc=teloip,dc=net'),
>                               ipapython.dn.DN('cn=manage
>                                > service
>                          keytab,cn=permissions,cn=pbac,dc=teloip,dc=net'),
>                                > ipapython.dn.DN('cn=host
>
>               enrollment,cn=privileges,cn=pbac,dc=teloip,dc=net'),
>                                > ipapython.dn.DN('cn=manage host
>                                >
>             keytab,cn=permissions,cn=pbac,dc=teloip,dc=net'),
>                               ipapython.dn.DN('cn=enroll a
>                                >
>             host,cn=permissions,cn=pbac,dc=teloip,dc=net'),
>                               ipapython.dn.DN('cn=add host
>                                >
>             password,cn=permissions,cn=pbac,dc=teloip,dc=net'),
>                               ipapython.dn.DN('cn=add
>                                > krbprincipalname to a
>                          host,cn=permissions,cn=pbac,dc=teloip,dc=net')]
>                                > [Thu Jul 21 11:00:38 2016] [error] ipa:
>             INFO:
>             admin at TELOIP.NET <mailto:admin at TELOIP.NET>
>             <mailto:admin at TELOIP.NET <mailto:admin at TELOIP.NET>>
>                               <mailto:admin at TELOIP.NET
>             <mailto:admin at TELOIP.NET> <mailto:admin at TELOIP.NET
>             <mailto:admin at TELOIP.NET>>>
>                                > <mailto:admin at TELOIP.NET
>             <mailto:admin at TELOIP.NET> <mailto:admin at TELOIP.NET
>             <mailto:admin at TELOIP.NET>>
>                          <mailto:admin at TELOIP.NET
>             <mailto:admin at TELOIP.NET> <mailto:admin at TELOIP.NET
>             <mailto:admin at TELOIP.NET>>>>:
>
>                               user_show(u'admin', rights=False, all=False,
>                               > raw=False, version=u'2.46'): SUCCESS
>                               > [Thu Jul 21 11:00:38 2016] [error] ipa:
>             DEBUG:
>                          response: entries returned 1
>                               > [Thu Jul 21 11:00:38 2016] [error] ipa:
>             DEBUG:
>                          Destroyed connection context.ldap2
>                               > [Thu Jul 21 11:00:38 2016] [error] ipa:
>             DEBUG:
>                          reading ccache data from file
>                               > "/var/run/ipa_memcached/krbcc_13554"
>                               > [Thu Jul 21 11:00:38 2016] [error] ipa:
>             DEBUG: store
>                          session:
>                               > session_id=10c5de02f8ae0f3969b96ef0f2e3a96d
>                          start_timestamp=2016-07-21T10:43:26
>                               > access_timestamp=2016-07-21T11:00:38
>                          expiration_timestamp=2016-07-21T11:20:38
>                               >
>                                > *[root at caer ~]# tail -f
>             /var/log/pki-ca/debug*
>                               >
>             [21/Jul/2016:11:08:29][CertStatusUpdateThread]:
>                          RequestQueue: curReqId: 9990001
>                               >
>             [21/Jul/2016:11:08:29][CertStatusUpdateThread]:
>                          getElementAt: 1 mTop 107
>                               >
>             [21/Jul/2016:11:08:29][CertStatusUpdateThread]:
>                          reverse direction getting index 4
>                               >
>             [21/Jul/2016:11:08:29][CertStatusUpdateThread]:
>                          RequestQueue: curReqId: 112
>                               >
>             [21/Jul/2016:11:08:29][CertStatusUpdateThread]:
>                          RequestQueue: getLastRequestId :
>                               > returning value 112
>                               >
>             [21/Jul/2016:11:08:29][CertStatusUpdateThread]:
>                          Repository:  mLastSerialNo: 112
>                               >
>             [21/Jul/2016:11:08:29][CertStatusUpdateThread]:
>                          Serial numbers left in range:
>                               > 9989888
>                               >
>             [21/Jul/2016:11:08:29][CertStatusUpdateThread]: Last
>                          Serial Number: 112
>                               >
>             [21/Jul/2016:11:08:29][CertStatusUpdateThread]:
>                          Serial Numbers available: 9989888
>                               >
>             [21/Jul/2016:11:08:29][CertStatusUpdateThread]:
>                          request checkRanges done
>                               >
>                                > *[root at caer ~]# tail -f
>             /var/log/pki-ca/transactions*
>                                > 6563.CRLIssuingPoint-MasterCRL -
>                          [20/Jul/2016:17:00:00 EDT] [20]
>                               [1] CRL Update
>                                > completed. CRL ID: MasterCRL CRL
>             Number: 8,912 last
>                          update time:
>                               7/20/16 5:00 PM
>                                > next update time: 7/20/16 9:00 PM
>             Number of entries
>                          in the CRL:
>                               11 time: 25  CRL
>                                > time: 25  delta CRL time: 0
>                          (0,0,0,0,0,0,0,8,17,0,0,25,25)
>                                > 6563.CRLIssuingPoint-MasterCRL -
>                          [20/Jul/2016:21:00:00 EDT] [20]
>                               [1] CRL update
>                                > started.  CRL ID: MasterCRL  CRL
>             Number: 8,913
>                          Delta CRL
>                               Enabled: false  CRL
>                                > Cache Enabled: true  Cache Recovery
>             Enabled: true
>                          Cache Cleared:
>                               false  Cache:
>                                > 11,0,0,0
>                                > 6563.CRLIssuingPoint-MasterCRL -
>                          [20/Jul/2016:21:00:00 EDT] [20]
>                               [1] CRL Update
>                                > completed. CRL ID: MasterCRL CRL
>             Number: 8,913 last
>                          update time:
>                               7/20/16 9:00 PM
>                                > next update time: 7/21/16 1:00 AM
>             Number of entries
>                          in the CRL:
>                               11 time: 11  CRL
>                                > time: 11  delta CRL time: 0
>                          (0,0,0,0,0,0,0,6,5,0,0,11,11)
>                                > 6563.CRLIssuingPoint-MasterCRL -
>                          [21/Jul/2016:01:00:00 EDT] [20]
>                               [1] CRL update
>                                > started.  CRL ID: MasterCRL  CRL
>             Number: 8,914
>                          Delta CRL
>                               Enabled: false  CRL
>                                > Cache Enabled: true  Cache Recovery
>             Enabled: true
>                          Cache Cleared:
>                               false  Cache:
>                                > 11,0,0,0
>                                > 6563.CRLIssuingPoint-MasterCRL -
>                          [21/Jul/2016:01:00:00 EDT] [20]
>                               [1] CRL Update
>                                > completed. CRL ID: MasterCRL CRL
>             Number: 8,914 last
>                          update time:
>                               7/21/16 1:00 AM
>                                > next update time: 7/21/16 5:00 AM
>             Number of entries
>                          in the CRL:
>                               11 time: 13  CRL
>                                > time: 13  delta CRL time: 0
>                          (0,0,0,0,0,0,0,6,7,0,0,13,13)
>                                > 6563.CRLIssuingPoint-MasterCRL -
>                          [21/Jul/2016:05:00:00 EDT] [20]
>                               [1] CRL update
>                                > started.  CRL ID: MasterCRL  CRL
>             Number: 8,915
>                          Delta CRL
>                               Enabled: false  CRL
>                                > Cache Enabled: true  Cache Recovery
>             Enabled: true
>                          Cache Cleared:
>                               false  Cache:
>                                > 11,0,0,0
>                                > 6563.CRLIssuingPoint-MasterCRL -
>                          [21/Jul/2016:05:00:00 EDT] [20]
>                               [1] CRL Update
>                                > completed. CRL ID: MasterCRL CRL
>             Number: 8,915 last
>                          update time:
>                               7/21/16 5:00 AM
>                                > next update time: 7/21/16 9:00 AM
>             Number of entries
>                          in the CRL:
>                               11 time: 16  CRL
>                                > time: 16  delta CRL time: 0
>                          (0,0,0,0,0,0,0,8,8,0,0,16,16)
>                                > 6563.CRLIssuingPoint-MasterCRL -
>                          [21/Jul/2016:09:00:00 EDT] [20]
>                               [1] CRL update
>                                > started.  CRL ID: MasterCRL  CRL
>             Number: 8,916
>                          Delta CRL
>                               Enabled: false  CRL
>                                > Cache Enabled: true  Cache Recovery
>             Enabled: true
>                          Cache Cleared:
>                               false  Cache:
>                                > 11,0,0,0
>                                > 6563.CRLIssuingPoint-MasterCRL -
>                          [21/Jul/2016:09:00:00 EDT] [20]
>                               [1] CRL Update
>                                > completed. CRL ID: MasterCRL CRL
>             Number: 8,916 last
>                          update time:
>                               7/21/16 9:00 AM
>                                > next update time: 7/21/16 1:00 PM
>             Number of entries
>                          in the CRL:
>                               11 time: 13  CRL
>                                > time: 13  delta CRL time: 0
>                          (0,0,0,0,0,0,0,6,7,0,0,13,13)
>                                > 10657.http-9443-2 -
>             [21/Jul/2016:10:28:19 EDT] [20]
>                          [1] renewal
>                               reqID 112
>                                > fromAgent userID: ipara authenticated by
>                          certUserDBAuthMgr is
>                               completed DN
>                                > requested: CN=CA Audit,O=TELOIP.NET
>             <http://TELOIP.NET>
>                          <http://TELOIP.NET> <http://TELOIP.NET>
>                               <http://TELOIP.NET> cert issued serial
>                                > number: 0x47 time: 39
>                                >
>                                > *[root at caer ~]# tail -f
>             /var/log/pki-ca/selftests.log*
>                               > 14116.main - [21/Jul/2016:10:58:29 EDT]
>             [20] [1]
>                          SelfTestSubsystem:  loading all
>                               > self test plugin logger parameters
>                               > 14116.main - [21/Jul/2016:10:58:29 EDT]
>             [20] [1]
>                          SelfTestSubsystem:  loading all
>                               > self test plugin instances
>                               > 14116.main - [21/Jul/2016:10:58:29 EDT]
>             [20] [1]
>                          SelfTestSubsystem:  loading all
>                               > self test plugin instance parameters
>                               > 14116.main - [21/Jul/2016:10:58:29 EDT]
>             [20] [1]
>                          SelfTestSubsystem:  loading
>                               > self test plugins in on-demand order
>                               > 14116.main - [21/Jul/2016:10:58:29 EDT]
>             [20] [1]
>                          SelfTestSubsystem:  loading
>                               > self test plugins in startup order
>                               > 14116.main - [21/Jul/2016:10:58:29 EDT]
>             [20] [1]
>                          SelfTestSubsystem: Self test
>                               > plugins have been successfully loaded!
>                               > 14116.main - [21/Jul/2016:10:58:30 EDT]
>             [20] [1]
>                          SelfTestSubsystem: Running self
>                               > test plugins specified to be executed at
>             startup:
>                               > 14116.main - [21/Jul/2016:10:58:30 EDT]
>             [20] [1]
>                          CAPresence:  CA is present
>                               > 14116.main - [21/Jul/2016:10:58:30 EDT]
>             [20] [1]
>                          SystemCertsVerification: system
>                               > certs verification failure
>                               > 14116.main - [21/Jul/2016:10:58:30 EDT]
>             [20] [1]
>                          SelfTestSubsystem: The CRITICAL
>                               > self test plugin called
>
>             selftests.container.instance.SystemCertsVerification
>                               > running at startup FAILED!
>                               >
>                                > But intrestingly, [root at caer ~]# ipa
>             cert-show 1
>                          returns "*ipa:
>                               ERROR:
>                               > Certificate operation cannot be
>             completed: Unable to
>
>
>




More information about the Freeipa-users mailing list