Is the Cert Store 's CA same ? It same just import again a valid cert then
Should be fine ..

On Thu, Jan 17, 2019 at 11:31 AM Bhavin Vaidya via FreeIPA-users <
freeipa-users@lists.fedorahosted.org> wrote:

> Hello,
>
> We rebooted our Primary FreeIPA server (ds01) and then it will not start
> pki-tomcatd, Kerberos will also not work, though it starts.
> We realized that 2 certificates have expired.
> we tried stopped ipa, stopped NTP, going back to Dec 14th, 2018 and
> restarted certmonger, bring back date but still no luck.
>
> this is our primary, and we do have 2 local and 2 remote FreeIPA server on
> them only one of the certificate (June 15th, 2018) is showing expired and
> others are good.
>
> Do we have to go back on date before June 15th, 2018 on ds01?
> Details are:
>
> [root@ds01 ~]# cat /etc/centos-release
> CentOS Linux release 7.4.1708 (Core)
>
> [root@ds01 ~]# ipa ca-find
> ------------
> 1 CA matched
> ------------
>   Name: ipa
>   Description: IPA CA
>   Authority ID: 606<...........SNIP..........>450
>   Subject DN: CN=Certificate Authority,O=DOMAIN.COM
>   Issuer DN: CN=Certificate Authority,O=DOMAIN.COM
> ----------------------------
> Number of entries returned 1
> ----------------------------
>
> [root@ds02 ~]# ipa ping
> -------------------------------------------
> IPA server version 4.5.0. API version 2.228
>
> [root@ds01 ~]# KRB5_TRACE=/dev/stdout kinit admin
> [5509] 1547598366.261229: Getting initial credentials for ad...@domain.com
> [5509] 1547598366.267532: Sending request (171 bytes) to DOMAIN.COM
> [5509] 1547598366.268593: Resolving hostname ds01.domain.com
> [5509] 1547598366.269479: Sending initial UDP request to dgram
> 192.1xx.xxx.xxx:88
> [5509] 1547598367.270712: Initiating TCP connection to stream
> 192.1xx.xxx.xxx:88
> [5509] 1547598367.270884: Sending TCP request to stream 192.1xx.xxx.xxx:88
> [5509] 1547598372.338780: Received answer (171 bytes) from dgram
> 192.1xx.xxx.xxx:88
> [5509] 1547598372.338841: Terminating TCP connection to stream
> 192.1xx.xxx.xxx:88
> [5509] 1547598372.338989: Response was from master KDC
> [5509] 1547598372.339095: Received error from KDC: -1765328324/Generic
> error (see e-text)
> kinit: Generic error (see e-text) while getting initial credentials
>
>
> [root@ds01 ~]# getcert list
> Number of certificates and requests being tracked: 9.
> Request ID '20180228053337':
>         status: MONITORING
>         stuck: no
>         key pair storage:
> type=FILE,location='/var/kerberos/krb5kdc/kdc.key'
>         certificate: type=FILE,location='/var/kerberos/krb5kdc/kdc.crt'
>         CA: SelfSign
>         issuer: CN=ds01.domain.com,O=DOMAIN.COM
>         subject: CN=ds01.domain.com,O=DOMAIN.COM
>         expires: 2019-03-07 06:24:12 UTC
>         principal name: krbtgt/domain....@domain.com
>         certificate template/profile: KDCs_PKINIT_Certs
>         pre-save command:
>         post-save command: /usr/libexec/ipa/certmonger/renew_kdc_cert
>         track: yes
>         auto-renew: yes
> Request ID '20180315021457':
>         status: MONITORING
>         stuck: no
>         key pair storage:
> type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='auditSigningCert
> cert-pki-ca',token='NSS Certificate DB',pin set
>         certificate:
> type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='auditSigningCert
> cert-pki-ca',token='NSS Certificate DB'
>         CA: dogtag-ipa-ca-renew-agent
>         issuer: CN=Certificate Authority,O=DOMAIN.COM
>         subject: CN=CA Audit,O=DOMAIN.COM
>         expires: 2020-02-25 04:27:49 UTC
>         key usage: digitalSignature,nonRepudiation
>         pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
>         post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert
> "auditSigningCert cert-pki-ca"
>         track: yes
>         auto-renew: yes
> Request ID '20180315021500':
>         status: MONITORING
>         stuck: no
>         key pair storage:
> type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='ocspSigningCert
> cert-pki-ca',token='NSS Certificate DB',pin set
>         certificate:
> type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='ocspSigningCert
> cert-pki-ca',token='NSS Certificate DB'
>         CA: dogtag-ipa-ca-renew-agent
>         issuer: CN=Certificate Authority,O=DOMAIN.COM
>         subject: CN=OCSP Subsystem,O=DOMAIN.COM
>         expires: 2020-02-25 04:28:38 UTC
>         eku: id-kp-OCSPSigning
>         pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
>         post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert
> "ocspSigningCert cert-pki-ca"
>         track: yes
>         auto-renew: yes
> Request ID '20180315021501':
>         status: MONITORING
>         stuck: no
>         key pair storage:
> type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='subsystemCert
> cert-pki-ca',token='NSS Certificate DB',pin set
>         certificate:
> type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='subsystemCert
> cert-pki-ca',token='NSS Certificate DB'
>         CA: dogtag-ipa-ca-renew-agent
>         issuer: CN=Certificate Authority,O=DOMAIN.COM
>         subject: CN=CA Subsystem,O=DOMAIN.COM
>         expires: 2020-02-25 04:31:47 UTC
>         key usage:
> digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment
>         eku: id-kp-serverAuth,id-kp-clientAuth
>         pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
>         post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert
> "subsystemCert cert-pki-ca"
>         track: yes
>         auto-renew: yes
> Request ID '20180315021502':
>         status: MONITORING
>         stuck: no
>         key pair storage:
> type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='caSigningCert
> cert-pki-ca',token='NSS Certificate DB',pin set
>         certificate:
> type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='caSigningCert
> cert-pki-ca',token='NSS Certificate DB'
>         CA: dogtag-ipa-ca-renew-agent
>         issuer: CN=Certificate Authority,O=DOMAIN.COM
>         subject: CN=Certificate Authority,O=DOMAIN.COM
>         expires: 2038-03-07 03:47:46 UTC
>         key usage: digitalSignature,nonRepudiation,keyCertSign,cRLSign
>         pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
>         post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert
> "caSigningCert cert-pki-ca"
>         track: yes
>         auto-renew: yes
> Request ID '20180315021503':
>         status: CA_UNREACHABLE
>         ca-error: Internal error
>         stuck: no
>         key pair storage: type=FILE,location='/var/lib/ipa/ra-agent.key'
>         certificate: type=FILE,location='/var/lib/ipa/ra-agent.pem'
>         CA: dogtag-ipa-ca-renew-agent
>         issuer: CN=Certificate Authority,O=DOMAIN.COM
>         subject: CN=IPA RA,O=DOMAIN.COM
>         expires: 2018-06-15 23:15:23 UTC
>         key usage:
> digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment
>         eku: id-kp-serverAuth,id-kp-clientAuth
>         pre-save command: /usr/libexec/ipa/certmonger/renew_ra_cert_pre
>         post-save command: /usr/libexec/ipa/certmonger/renew_ra_cert
>         track: yes
>         auto-renew: yes
> Request ID '20180315021504':
>         status: CA_UNREACHABLE
>         ca-error: Internal error
>         stuck: no
>         key pair storage:
> type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='Server-Cert
> cert-pki-ca',token='NSS Certificate DB',pin set
>         certificate:
> type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='Server-Cert
> cert-pki-ca',token='NSS Certificate DB'
>         CA: dogtag-ipa-ca-renew-agent
>         issuer: CN=Certificate Authority,O=DOMAIN.COM
>         subject: CN=ds01.domain.com,O=DOMAIN.COM
>         expires: 2018-12-16 21:02:44 UTC
>         key usage:
> digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment
>         eku: id-kp-serverAuth,id-kp-clientAuth,id-kp-emailProtection
>         pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
>         post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert
> "Server-Cert cert-pki-ca"
>         track: yes
>         auto-renew: yes
> Request ID '20180315021505':
>         status: MONITORING
>         stuck: no
>         key pair storage:
> type=NSSDB,location='/etc/dirsrv/slapd-DOMAIN-COM',nickname='Server-Cert',token='NSS
> Certificate DB',pinfile='/etc/dirsrv/slapd-DOMAIN-COM/pwdfile.txt'
>         certificate:
> type=NSSDB,location='/etc/dirsrv/slapd-DOMAIN-COM',nickname='Server-Cert',token='NSS
> Certificate DB'
>         CA: IPA
>         issuer: CN=Certificate Authority,O=DOMAIN.COM
>         subject: CN=ds01.domain.com,O=DOMAIN.COM
>         expires: 2020-03-07 08:49:36 UTC
>         principal name: ldap/ds01.domain....@domain.com
>         key usage:
> digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment
>         eku: id-kp-serverAuth,id-kp-clientAuth
>         pre-save command:
>         post-save command: /usr/libexec/ipa/certmonger/restart_dirsrv
> DOMAIN-COM
>         track: yes
>         auto-renew: yes
> Request ID '20180315021510':
>         status: MONITORING
>         stuck: no
>         key pair storage:
> type=NSSDB,location='/etc/httpd/alias',nickname='Server-Cert',token='NSS
> Certificate DB',pinfile='/etc/httpd/alias/pwdfile.txt'
>         certificate:
> type=NSSDB,location='/etc/httpd/alias',nickname='Server-Cert',token='NSS
> Certificate DB'
>         CA: IPA
>         issuer: CN=Certificate Authority,O=DOMAIN.COM
>         subject: CN=ds01.domain.com,O=DOMAIN.COM
>         expires: 2020-03-07 08:49:51 UTC
>         principal name: HTTP/ds01.domain....@domain.com
>         key usage:
> digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment
>         eku: id-kp-serverAuth,id-kp-clientAuth
>         pre-save command:
>         post-save command: /usr/libexec/ipa/certmonger/restart_httpd
>         track: yes
>         auto-renew: yes
>
> thank you,
> Bhavin
> _______________________________________________
> FreeIPA-users mailing list -- freeipa-users@lists.fedorahosted.org
> To unsubscribe send an email to freeipa-users-le...@lists.fedorahosted.org
> Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives:
> https://lists.fedorahosted.org/archives/list/freeipa-users@lists.fedorahosted.org
>
_______________________________________________
FreeIPA-users mailing list -- freeipa-users@lists.fedorahosted.org
To unsubscribe send an email to freeipa-users-le...@lists.fedorahosted.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedorahosted.org/archives/list/freeipa-users@lists.fedorahosted.org

Reply via email to