<html><body><div style="font-family: arial,helvetica,sans-serif; font-size: 10pt; color: #000000"><div><span name="x"></span><br></div><hr id="zwchr"><blockquote style="border-left:2px solid #1010FF;margin-left:5px;padding-left:5px;color:#000;font-weight:normal;font-style:normal;text-decoration:none;font-family:Helvetica,Arial,sans-serif;font-size:12pt;" data-mce-style="border-left: 2px solid #1010FF; margin-left: 5px; padding-left: 5px; color: #000; font-weight: normal; font-style: normal; text-decoration: none; font-family: Helvetica,Arial,sans-serif; font-size: 12pt;"><b>De: </b>"Florence Blanc-Renaud" <flo@redhat.com><br><b>À: </b>"Bertrand Rétif" <bretif@phosphore.eu>, freeipa-users@redhat.com<br><b>Envoyé: </b>Mercredi 23 Novembre 2016 08:49:28<br><b>Objet: </b>Re: [Freeipa-users] Impossible to renew certificate. pki-tomcat issue<br><div><br></div>On 11/22/2016 06:06 PM, Bertrand Rétif wrote:<br>> Hi Florence,<br>><br>> Thanks for clarification.<br>> Your explanation was very clear and I better understand<br>><br>> Now my issue is that I need to start tracking "auditSigningCert<br>> cert-pki-ca", "ocspSigningCert cert-pki-ca" and "subsystemCert<br>> cert-pki-ca" on a server.<br>><br>> I take a look on another server where they are properly tracked. However<br>> getcert list return me "pin set" and not a "pinfile" as described in<br>> your mail.<br>> In "/etc/pki/pki-tomcat/alias" I do not see any pwdfile.txt file, so my<br>> question is where do I get the PIN?<br>><br>Hi Bertrand,<br><div><br></div>With IPA 4.2.0 I believe that the pin is stored in <br>/var/lib/pki/pki-tomcat/conf/password.conf, in the 'internal' field:<br>$ grep 'internal=' /var/lib/pki/pki-tomcat/conf/password.conf<br>internal=0123456789101<br><div><br></div>HTH,<br>Flo<br><div><br></div>> Once again, thanks for your support, I tried to fix this issue for days!<br>><br>> Regards<br>> Bertrand<br>><br>><br>> --<br>> Bertrand Rétif<br>> Phosphore Services Informatiques - http://www.phosphore.eu<br>> Tel: 04 66 51 87 73 / Mob: 06 61 87 03 30 / Fax: 09 72 12 61 44<br>><br>> ------------------------------------------------------------------------<br>><br>> *De: *"Florence Blanc-Renaud" <flo@redhat.com><br>> *À: *"Bertrand Rétif" <bretif@phosphore.eu>, freeipa-users@redhat.com<br>> *Envoyé: *Mardi 22 Novembre 2016 13:17:34<br>> *Objet: *Re: [Freeipa-users] Impossible to renew certificate.<br>> pki-tomcat issue<br>><br>> On 11/22/2016 11:50 AM, Bertrand Rétif wrote:<br>> ><br>> ><br>> > *De: *"Florence Blanc-Renaud" <flo@redhat.com><br>> > *À: *"Bertrand Rétif" <bretif@phosphore.eu>,<br>> freeipa-users@redhat.com<br>> > *Envoyé: *Mardi 22 Novembre 2016 11:33:45<br>> > *Objet: *Re: [Freeipa-users] Impossible to renew certificate.<br>> > pki-tomcat issue<br>> ><br>> > On 11/22/2016 10:07 AM, Bertrand Rétif wrote:<br>> > ><br>> ><br>> ------------------------------------------------------------------------<br>> > ><br>> > > *De: *"Bertrand Rétif" <bretif@phosphore.eu><br>> > > *À: *freeipa-users@redhat.com<br>> > > *Envoyé: *Mardi 25 Octobre 2016 17:51:09<br>> > > *Objet: *Re: [Freeipa-users] Impossible to renew<br>> certificate.<br>> > > pki-tomcat issue<br>> > ><br>> > ><br>> > ><br>> ><br>> ------------------------------------------------------------------------<br>> > ><br>> > > *De: *"Florence Blanc-Renaud" <flo@redhat.com><br>> > > *À: *"Bertrand Rétif" <bretif@phosphore.eu>,<br>> > > freeipa-users@redhat.com<br>> > > *Envoyé: *Jeudi 20 Octobre 2016 18:45:21<br>> > > *Objet: *Re: [Freeipa-users] Impossible to renew<br>> certificate.<br>> > > pki-tomcat issue<br>> > ><br>> > > On 10/19/2016 08:18 PM, Bertrand Rétif wrote:<br>> > > > *De: *"Bertrand Rétif" <bretif@phosphore.eu><br>> > > ><br>> > > > *À: *freeipa-users@redhat.com<br>> > > > *Envoyé: *Mercredi 19 Octobre 2016 15:42:07<br>> > > > *Objet: *Re: [Freeipa-users] Impossible to renew<br>> > certificate.<br>> > > > pki-tomcat issue<br>> > > ><br>> > > ><br>> > > ><br>> > ><br>> ><br>> ------------------------------------------------------------------------<br>> > > ><br>> > > > *De: *"Rob Crittenden" <rcritten@redhat.com><br>> > > > *À: *"Bertrand Rétif" <bretif@phosphore.eu>,<br>> > > > freeipa-users@redhat.com<br>> > > > *Envoyé: *Mercredi 19 Octobre 2016 15:30:14<br>> > > > *Objet: *Re: [Freeipa-users] Impossible to<br>> renew<br>> > > certificate.<br>> > > > pki-tomcat issue<br>> > > ><br>> > > > Bertrand Rétif wrote:<br>> > > > >> De: "Martin Babinsky" <mbabinsk@redhat.com><br>> > > > >> À: freeipa-users@redhat.com<br>> > > > >> Envoyé: Mercredi 19 Octobre 2016 08:45:49<br>> > > > >> Objet: Re: [Freeipa-users] Impossible<br>> to renew<br>> > > certificate.<br>> > > > pki-tomcat issue<br>> > > > ><br>> > > > >> On 10/18/2016 11:22 PM, Bertrand Rétif<br>> wrote:<br>> > > > >>> Hello,<br>> > > > >>><br>> > > > >>> I had an issue with pki-tomcat.<br>> > > > >>> I had serveral certificate that was<br>> expired and<br>> > > pki-tomcat<br>> > > > did not start<br>> > > > >>> anymore.<br>> > > > >>><br>> > > > >>> I set the dateon the server before<br>> certificate<br>> > > expiration<br>> > > > and then<br>> > > > >>> pki-tomcat starts properly.<br>> > > > >>> Then I try to resubmit the<br>> certificate, but<br>> > I get<br>> > > below error:<br>> > > > >>> "Profile caServerCert Not Found"<br>> > > > >>><br>> > > > >>> Do you have any idea how I could fix<br>> this issue.<br>> > > > >>><br>> > > > >>> Please find below output of commands:<br>> > > > >>><br>> > > > >>><br>> > > > >>> # getcert resubmit -i 20160108170324<br>> > > > >>><br>> > > > >>> # getcert list -i 20160108170324<br>> > > > >>> Number of certificates and requests being<br>> > tracked: 7.<br>> > > > >>> Request ID '20160108170324':<br>> > > > >>> status: MONITORING<br>> > > > >>> ca-error: Server at<br>> > > > >>><br>> > ><br>> "http://sdkipa01.a.skinfra.eu:8080/ca/ee/ca/profileSubmit"<br>> > > > replied:<br>> > > > >>> Profile caServerCert Not Found<br>> > > > >>> stuck: no<br>> > > > >>> key pair storage:<br>> > > > >>><br>> > > ><br>> > ><br>> ><br>> type=NSSDB,location='/etc/httpd/alias',nickname='ipaCert',token='NSS<br>> > > > >>> Certificate<br>> > DB',pinfile='/etc/httpd/alias/pwdfile.txt'<br>> > > > >>> certificate:<br>> > > > >>><br>> > > ><br>> > ><br>> ><br>> type=NSSDB,location='/etc/httpd/alias',nickname='ipaCert',token='NSS<br>> > > > >>> Certificate DB'<br>> > > > >>> CA: dogtag-ipa-ca-renew-agent<br>> > > > >>> issuer: CN=Certificate<br>> Authority,O=A.SKINFRA.EU<br>> > > > >>> subject: CN=IPA RA,O=A.SKINFRA.EU<br>> > > > >>> expires: 2016-06-28 15:25:11 UTC<br>> > > > >>> key usage:<br>> > > > >>><br>> > ><br>> > digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment<br>> > > > >>> eku: id-kp-serverAuth,id-kp-clientAuth<br>> > > > >>> pre-save command:<br>> > > /usr/lib64/ipa/certmonger/renew_ra_cert_pre<br>> > > > >>> post-save command:<br>> > > /usr/lib64/ipa/certmonger/renew_ra_cert<br>> > > > >>> track: yes<br>> > > > >>> auto-renew: yes<br>> > > > >>><br>> > > > >>><br>> > > > >>> Thanksby advance for your help.<br>> > > > >>> Bertrand<br>> > > > >>><br>> > > > >>><br>> > > > >>><br>> > > > >>><br>> > > > ><br>> > > > >> Hi Betrand,<br>> > > > ><br>> > > > >> what version of FreeIPA and Dogtag are you<br>> > running?<br>> > > > ><br>> > > > >> Also perform the following search on<br>> the IPA<br>> > master<br>> > > and post<br>> > > > the result:<br>> > > > ><br>> > > > >> """<br>> > > > >> ldapsearch -D "cn=Directory Manager" -W -b<br>> > > > >> 'ou=certificateProfiles,ou=ca,o=ipaca'<br>> > > > '(objectClass=certProfile)'<br>> > > > >> """<br>> > > > ><br>> > > > > Hi Martin,<br>> > > > ><br>> > > > > Thanks for your reply.<br>> > > > ><br>> > > > > Here is version:<br>> > > > > - FreeIPA 4.2.0<br>> > > > > - Centos 7.2<br>> > > > ><br>> > > > > I have been able to fix the issue with<br>> "Profile<br>> > > caServerCert<br>> > > > Not Found" by editing<br>> > > /var/lib/pki/pki-tomcat/ca/conf/CS.cfg<br>> > > > > I replace below entry<br>> > > > ><br>> > > ><br>> > ><br>> ><br>> "subsystem.1.class=com.netscape.cmscore.profile.LDAPProfileSubsystem"<br>> > > > > by<br>> > > > ><br>> > ><br>> > "subsystem.1.class=com.netscape.cmscore.profile.ProfileSubsystem"<br>> > > > ><br>> > > > > and then launch "ipa-server-upgrade" command<br>> > > > > I found this solution in this post:<br>> > > ><br>> > http://osdir.com/ml/freeipa-users/2016-03/msg00280.html<br>> > > > ><br>> > > > > Then I was able to renew my certificate.<br>> > > > ><br>> > > > > However I reboot my server to and pki-tomcat<br>> > do not<br>> > > start and<br>> > > > provide with a new erreor in<br>> > > /var/log/pki/pki-tomcat/ca/debug<br>> > > > ><br>> > > > ><br>> [19/Oct/2016:11:11:52][localhost-startStop-1]:<br>> > > CertUtils:<br>> > > > verifySystemCertByNickname() passed:<br>> > auditSigningCert<br>> > > cert-pki-ca<br>> > > > ><br>> [19/Oct/2016:11:11:52][localhost-startStop-1]:<br>> > > > SignedAuditEventFactory: create()<br>> > > ><br>> > message=[AuditEvent=CIMC_CERT_VERIFICATION][SubjectID=$<br>> > > > ><br>> > System$][Outcome=Success][CertNickName=auditSigningCert<br>> > > > cert-pki-ca] CIMC certificate verification<br>> > > > ><br>> > > > > java.lang.Exception:<br>> SystemCertsVerification:<br>> > system<br>> > > certs<br>> > > > verification failure<br>> > > > > at<br>> > > ><br>> > ><br>> ><br>> com.netscape.cms.selftests.common.SystemCertsVerification.runSelfTest(SystemCertsVerification.java:198)<br>> > > > > at<br>> > > ><br>> > ><br>> ><br>> com.netscape.cmscore.selftests.SelfTestSubsystem.runSelfTestsAtStartup(SelfTestSubsystem.java:861)<br>> > > > > at<br>> > > ><br>> > ><br>> ><br>> com.netscape.cmscore.selftests.SelfTestSubsystem.startup(SelfTestSubsystem.java:1797)<br>> > > > > at<br>> > > ><br>> > ><br>> ><br>> com.netscape.cmscore.apps.CMSEngine.startupSubsystems(CMSEngine.java:1701)<br>> > > > > at<br>> > > ><br>> > ><br>> > com.netscape.cmscore.apps.CMSEngine.startup(CMSEngine.java:1148)<br>> > > > > at<br>> > com.netscape.certsrv.apps.CMS.startup(CMS.java:200)<br>> > > > > at<br>> > com.netscape.certsrv.apps.CMS.start(CMS.java:1602)<br>> > > > > at<br>> > > ><br>> > ><br>> ><br>> com.netscape.cms.servlet.base.CMSStartServlet.init(CMSStartServlet.java:114)<br>> > > > > at<br>> > ><br>> javax.servlet.GenericServlet.init(GenericServlet.java:158)<br>> > > > > at<br>> > > sun.reflect.NativeMethodAccessorImpl.invoke0(Native<br>> Method)<br>> > > > > at<br>> > > ><br>> > ><br>> ><br>> sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:57)<br>> > > > > at<br>> > > ><br>> > ><br>> ><br>> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)<br>> > > > > at<br>> > java.lang.reflect.Method.invoke(Method.java:606)<br>> > > > > at<br>> > > ><br>> > ><br>> ><br>> org.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:277)<br>> > > > > at<br>> > > ><br>> > ><br>> ><br>> org.apache.catalina.security.SecurityUtil$1.run(SecurityUtil.java:274)<br>> > > > > at<br>> > > java.security.AccessController.doPrivileged(Native<br>> Method)<br>> > > > > at<br>> > ><br>> javax.security.auth.Subject.doAsPrivileged(Subject.java:536)<br>> > > > > at<br>> > > ><br>> > ><br>> ><br>> org.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:309)<br>> > > > > at<br>> > > ><br>> > ><br>> ><br>> org.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:169)<br>> > > > > at<br>> > > ><br>> > ><br>> ><br>> org.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.java:123)<br>> > > > > at<br>> > > ><br>> > ><br>> ><br>> org.apache.catalina.core.StandardWrapper.initServlet(StandardWrapper.java:1272)<br>> > > > > at<br>> > > ><br>> > ><br>> ><br>> org.apache.catalina.core.StandardWrapper.loadServlet(StandardWrapper.java:1197)<br>> > > > > at<br>> > > ><br>> > ><br>> ><br>> org.apache.catalina.core.StandardWrapper.load(StandardWrapper.java:1087)<br>> > > > > at<br>> > > ><br>> > ><br>> ><br>> org.apache.catalina.core.StandardContext.loadOnStartup(StandardContext.java:5210)<br>> > > > > at<br>> > > ><br>> > ><br>> ><br>> org.apache.catalina.core.StandardContext.startInternal(StandardContext.java:5493)<br>> > > > > at<br>> > > ><br>> > ><br>> ><br>> org.apache.catalina.util.LifecycleBase.start(LifecycleBase.java:150)<br>> > > > > at<br>> > > ><br>> > ><br>> ><br>> org.apache.catalina.core.ContainerBase.addChildInternal(ContainerBase.java:901)<br>> > > > > at<br>> > > ><br>> > ><br>> ><br>> org.apache.catalina.core.ContainerBase.access$000(ContainerBase.java:133)<br>> > > > > at<br>> > > ><br>> > ><br>> ><br>> org.apache.catalina.core.ContainerBase$PrivilegedAddChild.run(ContainerBase.java:156)<br>> > > > > at<br>> > > ><br>> > ><br>> ><br>> org.apache.catalina.core.ContainerBase$PrivilegedAddChild.run(ContainerBase.java:145)<br>> > > > > at<br>> > > java.security.AccessController.doPrivileged(Native<br>> Method)<br>> > > > > at<br>> > > ><br>> > ><br>> ><br>> org.apache.catalina.core.ContainerBase.addChild(ContainerBase.java:875)<br>> > > > > at<br>> > > ><br>> > ><br>> ><br>> org.apache.catalina.core.StandardHost.addChild(StandardHost.java:632)<br>> > > > > at<br>> > > ><br>> > ><br>> ><br>> org.apache.catalina.startup.HostConfig.deployDescriptor(HostConfig.java:672)<br>> > > > > at<br>> > > ><br>> > ><br>> ><br>> org.apache.catalina.startup.HostConfig$DeployDescriptor.run(HostConfig.java:1862)<br>> > > > > at<br>> > > ><br>> > ><br>> ><br>> java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:471)<br>> > > > > at<br>> > > java.util.concurrent.FutureTask.run(FutureTask.java:262)<br>> > > > > at<br>> > > ><br>> > ><br>> ><br>> java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1145)<br>> > > > > at<br>> > > ><br>> > ><br>> ><br>> java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:615)<br>> > > > > at java.lang.Thread.run(Thread.java:745)<br>> > > > ><br>> [19/Oct/2016:11:11:52][localhost-startStop-1]:<br>> > > > SignedAuditEventFactory: create()<br>> > > ><br>> > ><br>> ><br>> message=[AuditEvent=SELFTESTS_EXECUTION][SubjectID=$System$][Outcome=Failure]<br>> > > > self tests execution (see selftests.log<br>> for details)<br>> > > > ><br>> [19/Oct/2016:11:11:52][localhost-startStop-1]:<br>> > > > CMSEngine.shutdown()<br>> > > > ><br>> > > > ><br>> > > > > I am currently stuck here.<br>> > > > > Thanks a lot for your help.<br>> > > ><br>> > > > I'm guessing at least one of the CA subsystem<br>> > > certificates are<br>> > > > still<br>> > > > expired. Look at the "getcert list" output<br>> to see if<br>> > > there are any<br>> > > > expired certificates.<br>> > > ><br>> > > > rob<br>> > > ><br>> > > > ><br>> > > > > Bertrand<br>> > > > ><br>> > > > ><br>> > > ><br>> > > > Hello Rob,<br>> > > ><br>> > > > I check on my 2 servers and no certificate is<br>> expired<br>> > > ><br>> > > > [root@sdkipa03 ~]# getcert list |grep expire<br>> > > > expires: 2018-06-22 22:02:26 UTC<br>> > > > expires: 2018-06-22 22:02:47 UTC<br>> > > > expires: 2034-07-09 15:24:34 UTC<br>> > > > expires: 2016-10-30 13:35:29 UTC<br>> > > ><br>> > > > [root@sdkipa01 conf]# getcert list |grep expire<br>> > > > expires: 2018-06-12 23:38:01 UTC<br>> > > > expires: 2018-06-12 23:37:41 UTC<br>> > > > expires: 2018-06-11 22:53:57 UTC<br>> > > > expires: 2018-06-11 22:55:50 UTC<br>> > > > expires: 2018-06-11 22:57:47 UTC<br>> > > > expires: 2034-07-09 15:24:34 UTC<br>> > > > expires: 2018-06-11 22:59:55 UTC<br>> > > ><br>> > > > I see that one certificate is in status:<br>> CA_UNREACHABLE,<br>> > > maybe I<br>> > > > reboot to soon my server...<br>> > > ><br>> > > > I continue to investigate<br>> > > ><br>> > > > Thanks for your help.<br>> > > > Bertrand<br>> > > ><br>> > > > I fix my previous issue.<br>> > > > Now I have an issue with a server.<br>> > > > This server can not start pki-tomcatd, I get this<br>> error in<br>> > > debug file:<br>> > > > "Error netscape.ldap.LDAPExceptio n: IO Error creating<br>> > JSS SSL<br>> > > Socket (-1)"<br>> > > ><br>> > > > After investigation i see that I do not have "ipaCert"<br>> > > certificat in<br>> > > > "/etc/httpd/alias"<br>> > > > cf below command:<br>> > > ><br>> > > > [root@sdkipa03 ~]# getcert list -d /etc/httpd/alias<br>> > > > Number of certificates and requests being tracked: 4.<br>> > > > Request ID '20141110133632':<br>> > > > status: MONITORING<br>> > > > stuck: no<br>> > > > key pair storage:<br>> > > ><br>> > ><br>> ><br>> type=NSSDB,location='/etc/httpd/alias',nickname='Server-Cert',token='NSS<br>> > > > Certificate DB',pinfile='/etc/httpd/alias/pwdfile.txt'<br>> > > > certificate:<br>> > > ><br>> > ><br>> ><br>> type=NSSDB,location='/etc/httpd/alias',nickname='Server-Cert',token='NSS<br>> > > > Certificate DB'<br>> > > > CA: IPA<br>> > > > issuer: CN=Certificate Authority,O=A.SKINFRA.EU<br>> > > > subject: CN=sdkipa03.skinfra.eu,O=A.SKINFRA.EU<br>> > > > expires: 2018-06-22 22:02:47 UTC<br>> > > > principal name:<br>> HTTP/sdkipa03.skinfra.eu@A.SKINFRA.EU<br>> > > > key usage:<br>> > > ><br>> > digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment<br>> > > > eku: id-kp-serverAuth,id-kp-clientAuth<br>> > > > pre-save command:<br>> > > > post-save command:<br>> > /usr/lib64/ipa/certmonger/restart_httpd<br>> > > > track: yes<br>> > > > auto-renew: yes<br>> > > ><br>> > > ><br>> > > > How can I add the certificate to /etc/httpd/alias?<br>> > > ><br>> > > Hi,<br>> > ><br>> > > for the record, the command getcert list that you<br>> supplied<br>> > shows<br>> > > the<br>> > > certificates in /etc/httpd/alias that are tracked by<br>> > certmonger.<br>> > > If you<br>> > > want to display all the certificates contained in<br>> > /etc/httpd/alias<br>> > > (whether tracked or not), then you may want to use<br>> > certutil -L -d<br>> > > /etc/httpd/alias instead.<br>> > ><br>> > > If ipaCert is missing, you can export ipaCert<br>> certificate from<br>> > > another<br>> > > master, then import it to your server.<br>> > ><br>> > > On a master containing the cert:<br>> > > # certutil -d /etc/httpd/alias -L -n 'ipaCert' -a ><br>> > > /tmp/newRAcert.crt<br>> > ><br>> > > Then copy the file /tmp/newRAcert.crt to your server and<br>> > import<br>> > > the cert:<br>> > > # certutil -d /etc/httpd/alias -A -n 'ipaCert' -a -i<br>> > > /tmp/newRAcert.crt<br>> > > -t u,u,u<br>> > ><br>> > > And finally you need to tell certmonger to monitor the<br>> > cert using<br>> > > getcert start-tracking.<br>> > ><br>> > > Hope this helps,<br>> > > Flo.<br>> > ><br>> > > > Thanks fo ryour support.<br>> > > > Regards<br>> > > > Bertrand<br>> > > ><br>> > > ><br>> > > ><br>> > ><br>> > > Hi,<br>> > ><br>> > > Florence, thanks for your help.<br>> > > I was able to import correctly ipaCert with your commands.<br>> > > Now it seems that I also have an issue on one server with<br>> > > "subsystemCert cert-pki-ca" in /etc/pki/pki-tomcat/alias<br>> as I get<br>> > > below error when pki-tomcat try to start<br>> > ><br>> > ><br>> > > LdapJssSSLSocket set client auth cert nickname subsystemCert<br>> > cert-pki-ca<br>> > > Could not connect to LDAP server host sdkipa03.XX.YY<br>> port 636<br>> > Error<br>> > > netscape.ldap.LDAPException: IO Error creating JSS SSL<br>> Socket (<br>> > > -1)<br>> > ><br>> > ><br>> > > Is there a way to restore a correct "subsystemCert<br>> cert-pki-ca"?<br>> > ><br>> > > Regards<br>> > > Bertrand<br>> > ><br>> > > Hello,<br>> > ><br>> > > I am still stuck with my IPA server.<br>> > > I have issues on both servers.<br>> > > On server1, below certificate is not renewed properly<br>> > > certutil -L -d /etc/httpd/alias/ -n "ipaCert"<br>> > ><br>> > > and on server 2 this is this certificate:<br>> > > certutil -L -d /var/lib/pki/pki-tomcat/alias/ -n "Server-Cert<br>> > cert-pki-ca"<br>> > ><br>> > > Could you provide me with the correct syntax with start-tracking<br>> > command.<br>> > > I tried to laucnh this command but my certificat remains in<br>> > > "NEWLY_ADDED_NEED_KEYINFO_READ_PIN" state.<br>> > > Here is the comnd I use:<br>> > > getcert start-tracking -c dogtag-ipa-retrieve-agent-submit -d<br>> > > /var/lib/pki/pki-tomcat/alias -n 'Server-Cert cert-pki-ca' -B<br>> > > /usr/lib64/ipa/certmonger/stop_pkicad -C<br>> > > '/usr/lib64/ipa/certmonger/renew_ca_cert "Server-Cert<br>> cert-pki-ca"' -T<br>> > > "Server-Cert cert-pki-ca" -P '20160614000000'<br>> > ><br>> > Hi Bertrand,<br>> ><br>> > to get the right command, you can check on a system where the<br>> > certificate is properly monitored, this will show you the right<br>> > parameters:<br>> > $ sudo getcert list -n ipaCert<br>> > Number of certificates and requests being tracked: 8.<br>> > Request ID '20161122095344':<br>> > [..] key pair storage:<br>> ><br>> type=NSSDB,location='/etc/httpd/alias',nickname='ipaCert',token='NSS<br>> > Certificate DB',pinfile='/etc/httpd/alias/pwdfile.txt'<br>> > [...]<br>> > CA: dogtag-ipa-ca-renew-agent<br>> > [...]<br>> > pre-save command:<br>> /usr/lib64/ipa/certmonger/renew_ra_cert_pre<br>> > post-save command: /usr/lib64/ipa/certmonger/renew_ra_cert<br>> > [...]<br>> ><br>> > The relevant fields are NSSDB location, pinfile, nickname, CA,<br>> pre and<br>> > post-save commands. So in order to monitor ipaCert, you will<br>> need to use<br>> > $ sudo getcert start-tracking -d /etc/httpd/alias -n ipaCert \<br>> > -p /etc/httpd/alias/pwdfile.txt \<br>> > -c dogtag-ipa-ca-renew-agent \<br>> > -B /usr/lib64/ipa/certmonger/renew_ra_cert_pre \<br>> > -C /usr/lib64/ipa/certmonger/renew_ra_cert<br>> ><br>> > HTH,<br>> > Flo.<br>> ><br>> > > Thanks by advance for your help.<br>> > ><br>> > > Regards<br>> > > Bertrand<br>> ><br>> > Hello Florence,<br>> ><br>> > Thanks for your reply.<br>> > Before doing any mistakes, I just need some explanations as I<br>> think I do<br>> > not well understand how it should work.<br>> ><br>> > Do all the certificate need to be track by certmonger on all<br>> servers or<br>> > they should only be tracked on one server and FreeIPA will update them<br>> > on other servers?<br>> ><br>> > In my case I have below certicates outdated and not track on<br>> "server 1":<br>> > - certutil -L -d /var/lib/pki/pki-tomcat/alias/ -n<br>> "auditSigningCert<br>> > cert-pki-ca"<br>> > - certutil -L -d /var/lib/pki/pki-tomcat/alias/ -n "ocspSigningCert<br>> > cert-pki-ca"<br>> > - certutil -L -d /var/lib/pki/pki-tomcat/alias/ -n "subsystemCert<br>> > cert-pki-ca"<br>> ><br>> > They are tracked by certmonger and have been correctly renewed on<br>> "server 2"<br>> > Do I need to add them tracked by certmonger on "server 1"?<br>> > If not, it means FreeIPA failed to update them? Should I delete and<br>> > import them manually on server 2?<br>> ><br>> > If you need more details, do not hesitate to ask.<br>> ><br>> Hi Bertrand,<br>><br>> The certificate tracking depends on the type of certificate and on the<br>> server you're considering. For instance, if IPA includes a Certificate<br>> Authority, then ipaCert will be present on all the IPA servers<br>> (master/replicas) and tracked on all of them. The same ipaCert<br>> certificate is used on all the replicas. On the renewal master, the<br>> renewal operation actually renews the certificate and uploads the cert<br>> on LDAP, but on the other replicas the operation consists in<br>> downloading<br>> the new certificate from LDAP.<br>><br>> The HTTP and LDAP server certificates are present and tracked on all<br>> the<br>> IPA servers, but they are different on each server (you can see that<br>> the<br>> Subject of the certificate contains the hostname). They can be renewed<br>> independently on each IPA server.<br>><br>> The certificates used by Dogtag (the component providing the<br>> Certificate<br>> System) are present and tracked only on the IPA servers where the CA<br>> was<br>> setup (for instance if you installed a replica with --setup-ca or if<br>> you<br>> ran ipa-ca-install later on). The same certificates are used on all<br>> replicas containing a CA instance.<br>> They are: 'ocspSigningCert cert-pki-ca', 'subsystemCert cert-pki-ca',<br>> 'caSigningCert cert-pki-ca' and 'Server-Cert cert-pki-ca'.<br>> The renewal operation renews them on the renewal master and uploads<br>> them<br>> in LDAP, but just downloads them from LDAP on the other servers.<br>><br>> In your example, if server1 also contains a CA instance then it should<br>> also track the above certs.<br>><br>> You can find the renewal master with the following ldapsearch command:<br>> $ ldapsearch -h localhost -p 389 -D 'cn=Directory Manager' -w password<br>> -b "cn=masters,cn=ipa,cn=etc,$BASEDN" -LLL<br>> '(&(cn=CA)(ipaConfigString=caRenewalMaster))' dn<br>> dn: cn=CA,cn=ipaserver.fqdn,cn=masters,cn=ipa,cn=etc,$BASEDN<br>><br>> In this case the renewal master is ipaserver.fqdn<br>><br>> Hope this clarifies,<br>> Flo.<br>><br>> > Regards<br>> > Bertrand<br>> ><br>> ><br></blockquote><div><div>Hi Florence,</div><div><br></div><div>Thanks.</div><div>All my certificate are now renewed and tracked. I set back current time on my servers and everything is now running properly.</div><div><br></div><div>However now I get an issue with ldap replication.</div><div>Here are details of my 3 servers S1, S2 S3</div><span name="x"></span><div><br></div><div>All below commands are launched on S1 servers</div><div><br></div><div># ipa-replica-manage list<br>S1: master<br>S2: master<br>S3: master<br><br></div><div># ipa-replica-manage -v list S1<br>S2: replica<br> last init status: 0 Total update succeeded<br> last init ended: 2016-11-23 12:56:27+00:00<br> last update status: 0 Replica acquired successfully: Incremental update succeeded<br> last update ended: 2016-11-23 13:12:00+00:00<br>S3: replica<br> last init status: 0 Total update succeeded<br> last init ended: 2016-11-23 12:54:51+00:00<br> last update status: 0 Replica acquired successfully: Incremental update succeeded<br> last update ended: 2016-11-23 13:12:00+00:00<br><br></div><div># ipa-replica-manage -v S2<br>S1: replica<br> last init status: None<br> last init ended: 1970-01-01 00:00:00+00:00<br> last update status: -1 Incremental update has failed and requires administrator actionLDAP error: Can't contact LDAP server<br> last update ended: 1970-01-01 00:00:00+00:00<br><br></div><div><br></div><div># ipa-replica-manage -v S3<br>S3: replica<br> last init status: None<br> last init ended: 1970-01-01 00:00:00+00:00<br> last update status: -1 Incremental update has failed and requires administrator actionLDAP error: Can't contact LDAP server<br> last update ended: 1970-01-01 00:00:00+00:00</div><div><br></div><div><br></div><div>I tried to reinitialize S2 server, however I still get the issue:</div><div>Command below is run on S2:</div><div><br></div><div>S2# ipa-replica-manage re-initialize --from S1<br>ipa: INFO: Setting agreement cn=meToS2.skinfra.eu,cn=replica,cn=dc\=a\,dc\=skinfra\,dc\=eu,cn=mapping tree,cn=config schedule to 2358-2359 0 to force synch<br>ipa: INFO: Deleting schedule 2358-2359 0 from agreement cn=meToS2,cn=replica,cn=dc\=a\,dc\=skinfra\,dc\=eu,cn=mapping tree,cn=config<br>Update in progress, 2 seconds elapsed<br>Update succeeded<br><br>On S2 server in /var/log/dirsrv/slapd-REALM/errors log I get<br><br></div><div>[23/Nov/2016:13:54:51 +0100] agmt="cn=meToS1" (S1:389) - Can't locate CSN 583669ee000a000f0000 in the changelog (DB rc=-30988). If replication stops, the consumer may need to be reinitialized.<br>[23/Nov/2016:13:54:51 +0100] NSMMReplicationPlugin - changelog program - agmt="cn=meToS1" (S1:389): CSN 583669ee000a000f0000 not found, we aren't as up to date, or we purged<br>[23/Nov/2016:13:54:51 +0100] NSMMReplicationPlugin - agmt="cn=meToS1" (S1:389): Data required to update replica has been purged. The replica must be reinitialized.<br>[23/Nov/2016:13:54:51 +0100] NSMMReplicationPlugin - agmt="cn=meToS1" (S1:389): Incremental update failed and requires administrator action<br>..............</div><div>[23/Nov/2016:14:18:10 +0100] slapi_ldap_bind - Error: could not bind id [cn=Replication Manager cloneAgreement1-S2,ou=csusers,cn=config] authentication mechanism [SIMPLE]: error 32 (No such object) errno 0 (Success)</div><div><br></div><div><br></div><div>I search on google but I did not find any solution to fix issue and I do not want to break everything</div><div><br></div><div>Regards</div>Bertrand</div></div></body></html>