[Freeipa-users] ipa-replica-install: Certificate operation cannot be completed: Unable to communicate with CMS (503)

Jens Timmerman jens.timmerman at ugent.be
Tue Feb 14 15:01:36 UTC 2017


Hi Carlos,



On 14/02/2017 15:11, Carlos Silva wrote:
> It should be this problem: https://fedorahosted.org/freeipa/ticket/6613
Indeed this was the issue, changing  in /etc/hosts
 ::1              localhost6.localdomain6 localhost6
to
::1             localhost localhost.localdomain localhost6.localdomain6
localhost6

made the ipa-replica-install work.

Thank you very much!
I could have spent a long time further debugging this.

Regards
Jens Timmerman
>
> On Tue, Feb 14, 2017 at 1:32 PM, Jens Timmerman
> <jens.timmerman at ugent.be <mailto:jens.timmerman at ugent.be>> wrote:
>
>     Hi all,
>
>
>     I'm trying to setup a freeipa masterserver and a replica, on a fresh
>     install of CentOS 7.3
>
>     after running ipa-server-install on the master and running
>     ipa-client-install on the replica the ipa-replica-install command
>     fails
>     to restart the directory server.
>
>     Turns out this is because the DS Certificate was never received. It
>     fails with status: CA_UNREACHABLE and I can't figure out why this is
>     failing.
>
>     Could someone give me some pointers?
>
>     on the replica:
>
>
>     /var/log/ipareplica-install.log
>     2017-02-14T12:21:20Z DEBUG certmonger request is in state
>     dbus.String(u'NEWLY_ADDED_READING_KEYINFO', variant_level=1)
>     2017-02-14T12:21:25Z DEBUG certmonger request is in state
>     dbus.String(u'CA_UNREACHABLE', variant_level=1)
>     2017-02-14T12:21:25Z DEBUG flushing
>     ldapi://%2fvar%2frun%2fslapd-MY-REALM.socket from SchemaCache
>     2017-02-14T12:21:25Z DEBUG retrieving schema for SchemaCache
>     url=ldapi://%2fvar%2frun%2fslapd-MY-REALM.socket
>     conn=<ldap.ldapobject.SimpleLDAPObject instance at 0x73101b8>
>     2017-02-14T12:21:25Z DEBUG   duration: 5 seconds
>     2017-02-14T12:21:25Z DEBUG   [28/44]: restarting directory server
>
>     <fails>
>
>
>     # getcert list
>     Number of certificates and requests being tracked: 1.
>     Request ID '20170214122119':
>         status: CA_UNREACHABLE
>         ca-error: Server at https://<ipa-server>/ipa/xml failed request,
>     will retry: 4301 (RPC failed at server.  Certificate operation
>     cannot be
>     completed: Unable to communicate with CMS (503)).
>         stuck: no
>         key pair storage:
>     type=NSSDB,location='/etc/dirsrv/slapd-MY_REALM',nickname='Server-Cert',token='NSS
>     Certificate DB',pinfile='/etc/dirsrv/slapd-MY_REALM//pwdfile.txt'
>         certificate:
>     type=NSSDB,location='/etc/dirsrv/slapd-MY_REALM',nickname='Server-Cert'
>         CA: IPA
>         issuer:
>         subject:
>         expires: unknown
>         pre-save command:
>         post-save command:
>         track: yes
>         auto-renew: yes
>
>
>
>     # certutil -L -d /etc/dirsrv/slapd-MY_REALM/
>
>     Certificate Nickname                                         Trust
>     Attributes
>
>     SSL,S/MIME,JAR/XPI
>
>     MY_REALM IPA CA                                          CT,C,C
>
>
>     # certutil -L -d /etc/httpd/alias/
>
>     Certificate Nickname                                         Trust
>     Attributes
>
>     SSL,S/MIME,JAR/XPI
>
>     cacert                                                       CTu,Cu,Cu
>     beta                                                         u,pu,u
>     alpha                                                        u,pu,u
>     Server-Cert                                                  u,u,u
>
>
>
>
>     # curl --negotiate -u : https://ipa-server/ipa/xml --referer
>     https://ipa-server/ipa/xml -I
>     HTTP/1.1 401 Unauthorized
>     Date: Tue, 14 Feb 2017 12:07:02 GMT
>     Server: Apache/2.4.6 (CentOS) mod_auth_gssapi/1.4.0 mod_nss/1.0.14
>     NSS/3.21 Basic ECC mod_wsgi/3.4 Python/2.7.5
>     WWW-Authenticate: Negotiate
>     X-Frame-Options: DENY
>     Content-Security-Policy: frame-ancestors 'none'
>     Last-Modified: Tue, 17 Jan 2017 17:34:23 GMT
>     Accept-Ranges: bytes
>     Content-Length: 1474
>     Content-Type: text/html; charset=UTF-8
>
>     HTTP/1.1 200 Success
>     Date: Tue, 14 Feb 2017 12:07:02 GMT
>     Server: Apache/2.4.6 (CentOS) mod_auth_gssapi/1.4.0 mod_nss/1.0.14
>     NSS/3.21 Basic ECC mod_wsgi/3.4 Python/2.7.5
>     Set-Cookie: ipa_session=<snip>
>     WWW-Authenticate: Negotiate <snip>
>     X-Frame-Options: DENY
>     Content-Security-Policy: frame-ancestors 'none'
>     Vary: Accept-Encoding
>     Content-Type: text/xml; charset=utf-8
>
>
>     On the ipa-server:
>
>     /var/log/pki/pki-tomcat/ca/debug
>
>
>     [14/Feb/2017:13:20:15][Timer-0]: SessionTimer: run()
>     [14/Feb/2017:13:20:15][Timer-0]: LDAPSecurityDomainSessionTable:
>     getSessionIds()
>     [14/Feb/2017:13:20:15][Timer-0]: LDAPSecurityDomainSessionTable:
>     searching ou=sessions,ou=Security Domain,o=ipaca
>     [14/Feb/2017:13:20:15][Timer-0]: In LdapBoundConnFactory::getConn()
>     [14/Feb/2017:13:20:15][Timer-0]: masterConn is connected: true
>     [14/Feb/2017:13:20:15][Timer-0]: getConn: conn is connected true
>     [14/Feb/2017:13:20:15][Timer-0]: getConn: mNumConns now 2
>     [14/Feb/2017:13:20:15][Timer-0]: SecurityDomainSessionTable: No active
>     sessions.
>     [14/Feb/2017:13:20:15][Timer-0]: returnConn: mNumConns now 3
>     [14/Feb/2017:13:25:15][Timer-0]: SessionTimer: run()
>     [14/Feb/2017:13:25:15][Timer-0]: LDAPSecurityDomainSessionTable:
>     getSessionIds()
>     [14/Feb/2017:13:25:15][Timer-0]: LDAPSecurityDomainSessionTable:
>     searching ou=sessions,ou=Security Domain,o=ipaca
>     [14/Feb/2017:13:25:15][Timer-0]: In LdapBoundConnFactory::getConn()
>     [14/Feb/2017:13:25:15][Timer-0]: masterConn is connected: true
>     [14/Feb/2017:13:25:15][Timer-0]: getConn: conn is connected true
>     [14/Feb/2017:13:25:15][Timer-0]: getConn: mNumConns now 2
>     [14/Feb/2017:13:25:15][Timer-0]: SecurityDomainSessionTable: No active
>     sessions.
>     [14/Feb/2017:13:25:15][Timer-0]: returnConn: mNumConns now 3
>
>
>     (so nothing at 13:21:14)
>
>
>
>     ==> /var/log/pki/pki-tomcat/ca/selftests.log <==
>     0.localhost-startStop-1 - [14/Feb/2017:10:20:14 CET] [20] [1]
>     SelfTestSubsystem:  loading all self test plugin logger parameters
>     0.localhost-startStop-1 - [14/Feb/2017:10:20:14 CET] [20] [1]
>     SelfTestSubsystem:  loading all self test plugin instances
>     0.localhost-startStop-1 - [14/Feb/2017:10:20:14 CET] [20] [1]
>     SelfTestSubsystem:  loading all self test plugin instance parameters
>     0.localhost-startStop-1 - [14/Feb/2017:10:20:14 CET] [20] [1]
>     SelfTestSubsystem:  loading self test plugins in on-demand order
>     0.localhost-startStop-1 - [14/Feb/2017:10:20:14 CET] [20] [1]
>     SelfTestSubsystem:  loading self test plugins in startup order
>     0.localhost-startStop-1 - [14/Feb/2017:10:20:14 CET] [20] [1]
>     SelfTestSubsystem: Self test plugins have been successfully loaded!
>     0.localhost-startStop-1 - [14/Feb/2017:10:20:15 CET] [20] [1]
>     SelfTestSubsystem: Running self test plugins specified to be
>     executed at
>     startup:
>     0.localhost-startStop-1 - [14/Feb/2017:10:20:15 CET] [20] [1]
>     CAPresence:  CA is present
>     0.localhost-startStop-1 - [14/Feb/2017:10:20:15 CET] [20] [1]
>     SystemCertsVerification: system certs verification success
>     0.localhost-startStop-1 - [14/Feb/2017:10:20:15 CET] [20] [1]
>     SelfTestSubsystem: All CRITICAL self test plugins ran SUCCESSFULLY at
>     startup!
>
>
>     and /var/log/pki/pki-tomcat/localhost.2017-02-14.log is filled with
>     these exceptions that aren't pointing me to anywhere.
>
>     SEVERE: Servlet.service() for servlet [Resteasy] in context with path
>     [/ca] threw exception
>     org.jboss.resteasy.spi.UnhandledException:
>     org.jboss.resteasy.core.NoMessageBodyWriterFoundFailure: Could not
>     find
>     MessageBodyWriter for response object of type:
>     com.netscape.certsrv.base.PKIException$Data of media type:
>     application/x-www-form-urlencoded
>             at
>     org.jboss.resteasy.core.SynchronousDispatcher.writeException(SynchronousDispatcher.java:157)
>             at
>     org.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:372)
>             at
>     org.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:179)
>             at
>     org.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:220)
>             at
>     org.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)
>             at
>     org.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)
>             at
>     javax.servlet.http.HttpServlet.service(HttpServlet.java:731)
>             at sun.reflect.GeneratedMethodAccessor42.invoke(Unknown
>     Source)
>             at
>     sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>             at java.lang.reflect.Method.invoke(Method.java:498)
>             at
>     org.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:288)
>             at
>     org.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:285)
>             at java.security.AccessController.doPrivileged(Native Method)
>
>             ...
>
>
>     # getcert list
>     Number of certificates and requests being tracked: 8.
>     Request ID '20170214084423':
>         status: MONITORING
>         stuck: no
>         key pair storage:
>     type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='auditSigningCert
>     cert-pki-ca',token='NSS Certificate DB',pin set
>         certificate:
>     type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='auditSigningCert
>     cert-pki-ca',token='NSS Certificate DB'
>         CA: dogtag-ipa-ca-renew-agent
>         issuer: CN=Certificate Authority,O=MY-REALM
>         subject: CN=CA Audit,O=MY-REALM
>         expires: 2019-02-04 08:42:52 UTC
>         key usage: digitalSignature,nonRepudiation
>         pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
>         post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert
>     "auditSigningCert cert-pki-ca"
>         track: yes
>         auto-renew: yes
>     Request ID '20170214084425':
>         status: MONITORING
>         stuck: no
>         key pair storage:
>     type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='ocspSigningCert
>     cert-pki-ca',token='NSS Certificate DB',pin set
>         certificate:
>     type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='ocspSigningCert
>     cert-pki-ca',token='NSS Certificate DB'
>         CA: dogtag-ipa-ca-renew-agent
>         issuer: CN=Certificate Authority,O=MY-REALM
>         subject: CN=OCSP Subsystem,O=MY-REALM
>         expires: 2019-02-04 08:42:48 UTC
>         key usage: digitalSignature,nonRepudiation,keyCertSign,cRLSign
>         eku: id-kp-OCSPSigning
>         pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
>         post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert
>     "ocspSigningCert cert-pki-ca"
>         track: yes
>         auto-renew: yes
>     Request ID '20170214084428':
>         status: MONITORING
>         stuck: no
>         key pair storage:
>     type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='subsystemCert
>     cert-pki-ca',token='NSS Certificate DB',pin set
>         certificate:
>     type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='subsystemCert
>     cert-pki-ca',token='NSS Certificate DB'
>         CA: dogtag-ipa-ca-renew-agent
>         issuer: CN=Certificate Authority,O=MY-REALM
>         subject: CN=CA Subsystem,O=MY-REALM
>         expires: 2019-02-04 08:42:51 UTC
>         key usage:
>     digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment
>         eku: id-kp-serverAuth,id-kp-clientAuth
>         pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
>         post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert
>     "subsystemCert cert-pki-ca"
>         track: yes
>         auto-renew: yes
>     Request ID '20170214084431':
>         status: MONITORING
>         stuck: no
>         key pair storage:
>     type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='caSigningCert
>     cert-pki-ca',token='NSS Certificate DB',pin set
>         certificate:
>     type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='caSigningCert
>     cert-pki-ca',token='NSS Certificate DB'
>         CA: dogtag-ipa-ca-renew-agent
>         issuer: CN=Certificate Authority,O=MY-REALM
>         subject: CN=Certificate Authority,O=MY-REALM
>         expires: 2037-02-14 08:42:43 UTC
>         key usage: digitalSignature,nonRepudiation,keyCertSign,cRLSign
>         pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
>         post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert
>     "caSigningCert cert-pki-ca"
>         track: yes
>         auto-renew: yes
>     Request ID '20170214084434':
>         status: MONITORING
>         stuck: no
>         key pair storage:
>     type=NSSDB,location='/etc/httpd/alias',nickname='ipaCert',token='NSS
>     Certificate DB',pinfile='/etc/httpd/alias/pwdfile.txt'
>         certificate:
>     type=NSSDB,location='/etc/httpd/alias',nickname='ipaCert',token='NSS
>     Certificate DB'
>         CA: dogtag-ipa-ca-renew-agent
>         issuer: CN=Certificate Authority,O=MY-REALM
>         subject: CN=IPA RA,O=MY-REALM
>         expires: 2019-02-04 08:44:09 UTC
>         key usage:
>     digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment
>         eku: id-kp-serverAuth,id-kp-clientAuth
>         pre-save command: /usr/libexec/ipa/certmonger/renew_ra_cert_pre
>         post-save command: /usr/libexec/ipa/certmonger/renew_ra_cert
>         track: yes
>         auto-renew: yes
>     Request ID '20170214084436':
>         status: MONITORING
>         stuck: no
>         key pair storage:
>     type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='Server-Cert
>     cert-pki-ca',token='NSS Certificate DB',pin set
>         certificate:
>     type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='Server-Cert
>     cert-pki-ca',token='NSS Certificate DB'
>         CA: dogtag-ipa-renew-agent
>         issuer: CN=Certificate Authority,O=MY-REALM
>         subject: CN=ipa-server,O=MY-REALM
>         expires: 2019-02-04 08:42:49 UTC
>         key usage:
>     digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment
>         eku: id-kp-serverAuth
>         pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
>         post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert
>     "Server-Cert cert-pki-ca"
>         track: yes
>         auto-renew: yes
>     Request ID '20170214084646':
>         status: MONITORING
>         stuck: no
>         key pair storage:
>     type=NSSDB,location='/etc/dirsrv/slapd-MY-REALM',nickname='Server-Cert',token='NSS
>     Certificate DB',pinfile='/etc/dirsrv/slapd-MY-REALM/pwdfile.txt'
>         certificate:
>     type=NSSDB,location='/etc/dirsrv/slapd-MY-REALM',nickname='Server-Cert',token='NSS
>     Certificate DB'
>         CA: IPA
>         issuer: CN=Certificate Authority,O=MY-REALM
>         subject: CN=ipa-server,O=MY-REALM
>         expires: 2019-02-15 08:46:45 UTC
>         key usage:
>     digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment
>         eku: id-kp-serverAuth,id-kp-clientAuth
>         pre-save command:
>         post-save command: /usr/libexec/ipa/certmonger/restart_dirsrv
>     MY-REALM
>         track: yes
>         auto-renew: yes
>     Request ID '20170214085151':
>         status: MONITORING
>         stuck: no
>         key pair storage:
>     type=NSSDB,location='/etc/httpd/alias',nickname='Server-Cert',token='NSS
>     Certificate DB',pinfile='/etc/httpd/alias/pwdfile.txt'
>         certificate:
>     type=NSSDB,location='/etc/httpd/alias',nickname='Server-Cert',token='NSS
>     Certificate DB'
>         CA: IPA
>         issuer: CN=Certificate Authority,O=MY-REALM
>         subject: CN=ipa-server,O=MY-REALM
>         expires: 2019-02-15 08:51:50 UTC
>         key usage:
>     digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment
>         eku: id-kp-serverAuth,id-kp-clientAuth
>         pre-save command:
>         post-save command: /usr/libexec/ipa/certmonger/restart_httpd
>         track: yes
>         auto-renew: yes
>
>     # systemctl status pki-tomcatd at pki-tomcat.service
>pki-tomcatd at pki-tomcat.service - PKI Tomcat Server pki-tomcat
>        Loaded: loaded (/lib/systemd/system/pki-tomcatd at .service; enabled;
>     vendor preset: disabled)
>        Active: active (running) since Tue 2017-02-14 10:19:32 CET; 3h
>     40min ago
>      Main PID: 1300 (java)
>        CGroup:
>     /system.slice/system-pki\x2dtomcatd.slice/pki-tomcatd at pki-tomcat.service
>                └─1300 /usr/lib/jvm/jre-1.8.0-openjdk/bin/java
>     -DRESTEASY_LIB=/usr/share/java/resteasy-base
>     -Djava.library.path=/usr/lib64/nuxwdog-jni -classpath
>     /usr/share/tomcat/bin/bootstrap.jar:/usr/share/tomcat/bin/...
>
>     Feb 14 10:19:57ipa-server server[1300]: SSLAuthenticatorWithFallback:
>     Creating SSL authenticator with fallback
>     Feb 14 10:19:57ipa-server server[1300]: SSLAuthenticatorWithFallback:
>     Setting container
>     Feb 14 10:20:07ipa-server server[1300]: SSLAuthenticatorWithFallback:
>     Initializing authenticators
>     Feb 14 10:20:07ipa-server server[1300]: SSLAuthenticatorWithFallback:
>     Starting authenticators
>     Feb 14 10:20:10ipa-server server[1300]:
>     CMSEngine.initializePasswordStore() begins
>     Feb 14 10:20:10ipa-server server[1300]:
>     CMSEngine.initializePasswordStore(): tag=internaldb
>     Feb 14 10:20:10ipa-server server[1300]:
>     CMSEngine.initializePasswordStore(): tag=replicationdb
>     Feb 14 10:20:15ipa-server server[1300]: CA is started.
>     Feb 14 10:20:26ipa-server server[1300]: PKIListener:
>     org.apache.catalina.core.StandardServer[after_start]
>     Feb 14 10:20:26ipa-server server[1300]: PKIListener: Subsystem CA is
>     running.
>
>
>
>     Regards,
>     Jens Timmerman
>
>
>
>
>     --
>     Manage your subscription for the Freeipa-users mailing list:
>     https://www.redhat.com/mailman/listinfo/freeipa-users
>     <https://www.redhat.com/mailman/listinfo/freeipa-users>
>     Go to http://freeipa.org for more info on the project
>
>
>
>

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://listman.redhat.com/archives/freeipa-users/attachments/20170214/a6445445/attachment.htm>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <http://listman.redhat.com/archives/freeipa-users/attachments/20170214/a6445445/attachment.sig>


More information about the Freeipa-users mailing list