Randy Morgan wrote:
> On 9/9/2019 11:31 AM, Rob Crittenden wrote:
>> Randy Morgan via FreeIPA-users wrote:
>>> We have been working to solve an expired certificate issue in IPA.
>>> There is an open ticket in Red Hat supportCASE 02438518.  We have tried
>>> many things but so far have had no luck getting the certs to update.
>>> Currently the system is running RHEL 8.0 and IPA 4.7.1.
>>>
>>> pki-server cert-fix -n 'subsystemCert cert-pki-ca' -d
>>> /var/lib/pki/pki-tomcat/alias/ -C /root/passwd -vvv
>>> INFO: Loading instance: pki-tomcat
>>> INFO: Loading instance registry:
>>> /etc/sysconfig/pki/tomcat/pki-tomcat/pki-tomcat
>>> INFO: Loading password config: /etc/pki/pki-tomcat/password.conf
>>> INFO: Loading subsystem: ca
>>> INFO: Loading subsystem config: /var/lib/pki/pki-tomcat/ca/conf/CS.cfg
>>> INFO: Getting signing cert info for ca from CS.cfg
>>> INFO: Getting signing cert info for ca from NSS database
>>> INFO: Getting ocsp_signing cert info for ca from CS.cfg
>>> INFO: Getting ocsp_signing cert info for ca from NSS database
>>> INFO: Getting sslserver cert info for ca from CS.cfg
>>> INFO: Getting sslserver cert info for ca from NSS database
>>> INFO: Getting subsystem cert info for ca from CS.cfg
>>> INFO: Getting subsystem cert info for ca from NSS database
>>> INFO: Getting audit_signing cert info for ca from CS.cfg
>>> INFO: Getting audit_signing cert info for ca from NSS database
>>> INFO: Fixing the following certs: ['ca_ocsp_signing', 'sslserver',
>>> 'subsystem', 'ca_audit_signing']
>>> INFO: Stopping the instance to proceed with system cert renewal
>>> INFO: Selftests disabled for subsystems: ca
>>> INFO: Getting sslserver cert info for ca from CS.cfg
>>> INFO: Getting sslserver cert info for ca from NSS database
>>> INFO: Trying to create a new temp cert for sslserver.
>>> INFO: Generate temp SSL certificate
>>> INFO: Getting sslserver cert info for ca from CS.cfg
>>> INFO: Getting sslserver cert info for ca from NSS database
>>> INFO: CSR for sslserver has been written to
>>> /tmp/tmpg_738l5a/sslserver.csr
>>> INFO: Getting signing cert info for ca from CS.cfg
>>> INFO: Getting signing cert info for ca from NSS database
>>> INFO: CA cert written to /tmp/tmpg_738l5a/ca_certificate.crt
>>> INFO: AKI: 0x1D0F356A3E7A6968A231723231EB22DA5A01F542
>>> INFO: Temp cert for sslserver is available at
>>> /etc/pki/pki-tomcat/certs/sslserver.crt.
>>> INFO: Getting sslserver cert info for ca from CS.cfg
>>> INFO: Getting sslserver cert info for ca from NSS database
>>> INFO: Getting sslserver cert info for ca from CS.cfg
>>> INFO: Getting sslserver cert info for ca from NSS database
>>> INFO: Updating CS.cfg with the new certificate
>>> INFO: Getting ocsp_signing cert info for ca from CS.cfg
>>> INFO: Getting ocsp_signing cert info for ca from NSS database
>>> INFO: Trying to setup a secure connection to CA subsystem.
>>> INFO: Secure connection with CA is established.
>>> INFO: Placing cert creation request for serial: 49
>>> Traceback (most recent call last):
>>>    File "/usr/lib/python3.6/site-packages/urllib3/connectionpool.py",
>>> line 600, in urlopen
>>>      chunked=chunked)
>>>    File "/usr/lib/python3.6/site-packages/urllib3/connectionpool.py",
>>> line 343, in _make_request
>>>      self._validate_conn(conn)
>>>    File "/usr/lib/python3.6/site-packages/urllib3/connectionpool.py",
>>> line 849, in _validate_conn
>>>      conn.connect()
>>>    File "/usr/lib/python3.6/site-packages/urllib3/connection.py",
>>> line 356, in connect
>>>      ssl_context=context)
>>>    File "/usr/lib/python3.6/site-packages/urllib3/util/ssl_.py", line
>>> 350, in ssl_wrap_socket
>>>      context.load_cert_chain(certfile, keyfile)
>>> ssl.SSLError: [X509: KEY_VALUES_MISMATCH] key values mismatch
>>> (_ssl.c:3550)
>>>
>>> During handling of the above exception, another exception occurred:
>>>
>>> Traceback (most recent call last):
>>>    File "/usr/lib/python3.6/site-packages/requests/adapters.py", line
>>> 449, in send
>>>      timeout=timeout
>>>    File "/usr/lib/python3.6/site-packages/urllib3/connectionpool.py",
>>> line 638, in urlopen
>>>      _stacktrace=sys.exc_info()[2])
>>>    File "/usr/lib/python3.6/site-packages/urllib3/util/retry.py",
>>> line 398, in increment
>>>      raise MaxRetryError(_pool, url, error or ResponseError(cause))
>>> urllib3.exceptions.MaxRetryError:
>>> HTTPSConnectionPool(host='ipa2.chem.byu.edu', port=8443): Max retries
>>> exceeded with url: /ca/rest/certrequests/profiles/caManualRenewal
>>> (Caused by SSLError(SSLError(185073780, '[X509: KEY_VALUES_MISMATCH]
>>> key values mismatch (_ssl.c:3550)'),))
>>>
>>> During handling of the above exception, another exception occurred:
>>>
>>> Traceback (most recent call last):
>>>    File "/usr/lib/python3.6/site-packages/pki/server/pkiserver.py",
>>> line 119, in <module>
>>>      cli.execute(sys.argv)
>>>    File "/usr/lib/python3.6/site-packages/pki/server/pkiserver.py",
>>> line 111, in execute
>>>      super(PKIServerCLI, self).execute(args)
>>>    File "/usr/lib/python3.6/site-packages/pki/cli/__init__.py", line
>>> 204, in execute
>>>      module.execute(module_args)
>>>    File "/usr/lib/python3.6/site-packages/pki/cli/__init__.py", line
>>> 204, in execute
>>>      module.execute(module_args)
>>>    File "/usr/lib/python3.6/site-packages/pki/server/cli/cert.py",
>>> line 1154, in execute
>>>      renew=True)
>>>    File "/usr/lib/python3.6/site-packages/pki/server/__init__.py",
>>> line 1709, in cert_create
>>>      PKIServer.renew_certificate(connection, new_cert_file, serial)
>>>    File "/usr/lib/python3.6/site-packages/pki/server/__init__.py",
>>> line 202, in renew_certificate
>>>      ret = cert_client.enroll_cert(inputs=inputs,
>>> profile_id='caManualRenewal')
>>>    File "/usr/lib/python3.6/site-packages/pki/__init__.py", line 442,
>>> in handler
>>>      return fn_call(inst, *args, **kwargs)
>>>    File "/usr/lib/python3.6/site-packages/pki/cert.py", line 1011, in
>>> enroll_cert
>>>      enroll_request = self.create_enrollment_request(profile_id, inputs)
>>>    File "/usr/lib/python3.6/site-packages/pki/__init__.py", line 442,
>>> in handler
>>>      return fn_call(inst, *args, **kwargs)
>>>    File "/usr/lib/python3.6/site-packages/pki/cert.py", line 962, in
>>> create_enrollment_request
>>>      enrollment_template = self.get_enrollment_template(profile_id)
>>>    File "/usr/lib/python3.6/site-packages/pki/__init__.py", line 442,
>>> in handler
>>>      return fn_call(inst, *args, **kwargs)
>>>    File "/usr/lib/python3.6/site-packages/pki/cert.py", line 942, in
>>> get_enrollment_template
>>>      r = self.connection.get(url, self.headers)
>>>    File "/usr/lib/python3.6/site-packages/pki/client.py", line 46, in
>>> wrapper
>>>      return func(self, *args, **kwargs)
>>>    File "/usr/lib/python3.6/site-packages/pki/client.py", line 160,
>>> in get
>>>      timeout=timeout,
>>>    File "/usr/lib/python3.6/site-packages/requests/sessions.py", line
>>> 537, in get
>>>      return self.request('GET', url, **kwargs)
>>>    File "/usr/lib/python3.6/site-packages/requests/sessions.py", line
>>> 524, in request
>>>      resp = self.send(prep, **send_kwargs)
>>>    File "/usr/lib/python3.6/site-packages/requests/sessions.py", line
>>> 637, in send
>>>      r = adapter.send(request, **kwargs)
>>>    File "/usr/lib/python3.6/site-packages/requests/adapters.py", line
>>> 514, in send
>>>      raise SSLError(e, request=request)
>>> requests.exceptions.SSLError:
>>> HTTPSConnectionPool(host='ipa2.chem.byu.edu', port=8443): Max retries
>>> exceeded with url: /ca/rest/certrequests/profiles/caManualRenewal
>>> (Caused by SSLError(SSLError(185073780, '[X509: KEY_VALUES_MISMATCH]
>>> key values mismatch (_ssl.c:3550)'),))
>>> ERROR: HTTPSConnectionPool(host='ipa2.chem.byu.edu', port=8443): Max
>>> retries exceeded with url:
>>> /ca/rest/certrequests/profiles/caManualRenewal (Caused by
>>> SSLError(SSLError(185073780, '[X509: KEY_VALUES_MISMATCH] key values
>>> mismatch (_ssl.c:3550)'),))
>>>
>>> [root@ipa2 ~]# echo "--Certificate:" && openssl x509 -noout -modulus -in
>>> /var/lib/ipa/ra-agent.pem && echo "--Key:" && openssl rsa -noout
>>> -modulus -in /var/lib/ipa/ra-agent.key
>>> --Certificate:
>>> Modulus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
>>>
>>> --Key:
>>> Modulus=CBA68178847F53CC0D4A45871FEA7CCFD879D6423923DF75E557011E4C458BD5207ACBB4EAFC7A460C050878621E22406E7661105F7D8E7AF448AA1F0988C908F3173B77D87581BE7006ED09F76F0D4D736050088E986133DE851A0FB93A101AA77921CC24063A94E5076FD74D4D81139E7A2AAC61B86D07D424158CE56913ABB08C1CDBDAE35CE2D7BCEB9EF9D5A909FFF502A02E1E847DC44E8672A8889A65A721DC78FE70C24D9E12BB4E88D7AD0A49948E2BF40A22431731872ADFC3B81E368C655EB9B00DC37D04526EE2917445D2FAEBCF116821486FF088E500F12128A8D90309E8ED275CDD48E77BDE0E3358A6A81BD9DD2AD5AC6F68315C96FC50E9
>>>
>>> [root@ipa2 ~]# openssl rsa -noout -modulus -in /var/lib/ipa/ra-agent.key
>>> | openssl md5
>>> (stdin)= 0915781edbe620c5791cda50f310c538
>>> [root@ipa2 ~]# openssl x509 -noout -modulus -in
>>> /var/lib/ipa/ra-agent.pem | openssl md5
>>> (stdin)= 0915781edbe620c5791cda50f310c538
>>>
>>> Looking at the cert and the key, they are a match and modulus also
>>> matches.  What I can't figure out is why I am seeing this error if the
>>> key and cert match.  Is it possible to have a timestamp issue, or is
>>> there some other reason that I can't find.  Any help would be greatly
>>> appreciated.
>> I'm not familiar with this command but based on the options you are
>> passing you compared the wrong cert. You compared the RA agent cert and
>> you asked to renew the subsystem cert.
>>
>> You might want to see what cert owns serial number 49.
>>
>> rob
> 
> 
> The reason these are the two compared is that there are no other keys on
> the server.  Looking through the documentation seems to indicate that
> all certs are generated from this key pair.  Is that not correct, and if
> it is not correct then where are the keys located for the other certs, I
> have been unable to locate them anywhere on the server.

The certs and keys are stored in the NSS database in
/etc/pki/pki-tomcat/alias/

rob
_______________________________________________
FreeIPA-users mailing list -- freeipa-users@lists.fedorahosted.org
To unsubscribe send an email to freeipa-users-le...@lists.fedorahosted.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedorahosted.org/archives/list/freeipa-users@lists.fedorahosted.org

Reply via email to