Hi,

I have setup puppet (2.7.5) on 2 different machines on ec2.

Puppet master config
1. Ruby - 1.9.3
2. OS - Amazon linux image
3. runs from root user

Puppet agent config
1. Ruby - 1.9.3
2. OS - centos
3. runs from root user

When i run the agent, it throws an error "unknown ca" (can been seen
in tcpdump/server logs) and closes the SSL connection immediately. I
tried following things but no luck...

1>I tried copying the server 'certs\ca.pem' file on the agent to 'certs
\ca.pem' and 'ca\ca_crt.pem' (i don't know the difference).
2>I created a hash symbolic as suggested here (http://
projects.puppetlabs.com/issues/9084)..i thought may be openssl lib is
not able to validate.
3> I ran this command as well openssl s_client -connect
ip-10-172-42-217.us-west-1.compute.internal:8140 -showcerts -state -
verify 2 (output is at the end of this message)

No luck.

I have checked that there is no time difference b/w agent and server.

I have following questions
1. What is difference 'localcertca' and 'cacert' setting in the
puppet.conf?
2. At the time of fresh install of puppet, how does agent validates
server certificate (since agent doesn't have ca cert of master)? I am
wondering this problem should come every time during fresh install
since agent doesn't not have any certificates. But installation docs
doesn't say anything about setting up ssl cert so i presume it should
work with copying server ca cert. But how does agent validates?

I have struggling with this problem from last 2 days..tried all stuff
but no luck. Looking for suggestions..

Let me know if you need more information..

Thanks,
Sumit

Open SSL output..

verify depth is 2
CONNECTED(00000003)
SSL_connect:before/connect initialization
SSL_connect:SSLv2/v3 write client hello A
SSL_connect:SSLv3 read server hello A
depth=1 /CN=Puppet CA: ip-10-172-42-217.us-west-1.compute.internal
verify error:num=19:self signed certificate in certificate chain
verify return:1
depth=1 /CN=Puppet CA: ip-10-172-42-217.us-west-1.compute.internal
verify return:1
depth=0 /CN=ip-10-172-42-217.us-west-1.compute.internal
verify return:1
SSL_connect:SSLv3 read server certificate A
SSL_connect:SSLv3 read server key exchange A
SSL_connect:SSLv3 read server certificate request A
SSL_connect:SSLv3 read server done A
SSL_connect:SSLv3 write client certificate A
SSL_connect:SSLv3 write client key exchange A
SSL_connect:SSLv3 write change cipher spec A
SSL_connect:SSLv3 write finished A
SSL_connect:SSLv3 flush data
SSL_connect:SSLv3 read finished A
---
Certificate chain
 0 s:/CN=ip-10-172-42-217.us-west-1.compute.internal
   i:/CN=Puppet CA: ip-10-172-42-217.us-west-1.compute.internal
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
 1 s:/CN=Puppet CA: ip-10-172-42-217.us-west-1.compute.internal
   i:/CN=Puppet CA: ip-10-172-42-217.us-west-1.compute.internal
-----BEGIN CERTIFICATE-----
MIICcTCCAdqgAwIBAgIBATANBgkqhkiG9w0BAQUFADBBMT8wPQYDVQQDDDZQdXBw
ZXQgQ0E6IGlwLTEwLTE3Mi00Mi0yMTcudXMtd2VzdC0xLmNvbXB1dGUuaW50ZXJu
YWwwHhcNMTExMDA2MjAwMDA0WhcNMTYxMDA0MjAwMDA0WjBBMT8wPQYDVQQDDDZQ
dXBwZXQgQ0E6IGlwLTEwLTE3Mi00Mi0yMTcudXMtd2VzdC0xLmNvbXB1dGUuaW50
ZXJuYWwwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBANGdufxRcl+vlOAPM9kI
rHsW53OUeqH1eyu7KedhfwBeUIPQB8m73O7dJIFvr0Hm956cnwtboJQJHFnnwJSV
8uIlNncJRqWMiTXwl9G/W4lg/3y8S/8rv/9DR5cg+In0evnaICIVCxqOGIervjM4
8X8qDI7eFBKibsQLc0xUq9hnAgMBAAGjeTB3MDgGCWCGSAGG+EIBDQQrFilQdXBw
ZXQgUnVieS9PcGVuU1NMIEdlbmVyYXRlZCBDZXJ0aWZpY2F0ZTAPBgNVHRMBAf8E
BTADAQH/MB0GA1UdDgQWBBQ6U/Xm6NQ2CR5uX6OFoCs2BLeg3jALBgNVHQ8EBAMC
AQYwDQYJKoZIhvcNAQEFBQADgYEAYYL7tulcXbjfMyKO4nLKUkQrVByawnmGd1G1
SOQkpj6GIDA1SKe+I+QPRh4Fpn4/q0MLSm71SBl69lhGA4fc8zFFO/krZhdPnFs3
PZ40ljEncrDoiuvJO18kC0zVdx0ZMpWiQOPIFESiMA2SNaR9oNIt47WfmI+WTpjr
FVy9hck=
-----END CERTIFICATE-----
---
Server certificate
subject=/CN=ip-10-172-42-217.us-west-1.compute.internal
issuer=/CN=Puppet CA: ip-10-172-42-217.us-west-1.compute.internal
---
No client certificate CA names sent
---
SSL handshake has read 1973 bytes and written 331 bytes
---
New, TLSv1/SSLv3, Cipher is DHE-RSA-AES256-SHA
Server public key is 1024 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
SSL-Session:
    Protocol  : TLSv1
    Cipher    : DHE-RSA-AES256-SHA
    Session-ID:
BAF1F2B192C59CBA1B90ABA8E3C71E4B72F22AA9C2F1F6D0CCDBC0B3C581CEC1
    Session-ID-ctx:
    Master-Key:
74CC9A1363F8872EE2B4F64CEA78BC1F37D3A257D7192D6BA0A6CE126B01105ADAD5FA729D42BCD9BFBB083F99F40C2A
    Key-Arg   : None
    Krb5 Principal: None
    Start Time: 1318385207
    Timeout   : 300 (sec)
    Verify return code: 19 (self signed certificate in certificate
chain)
---

-- 
You received this message because you are subscribed to the Google Groups 
"Puppet Users" group.
To post to this group, send email to puppet-users@googlegroups.com.
To unsubscribe from this group, send email to 
puppet-users+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/puppet-users?hl=en.

Reply via email to