On Thu, Jun 14, 2012 at 10:12 AM, Scott Merrill <ski...@skippy.net> wrote:
> On Thu, Jun 14, 2012 at 12:50 PM, Nan Liu <n...@puppetlabs.com> wrote:
>> On Thu, Jun 14, 2012 at 9:27 AM, Scott Merrill <ski...@skippy.net> wrote:
>>> If I point that node to my top-level Master (via entry in /etc/hosts),
>>> the `puppet agent --test --noop` invocation works without error.
>>
>> You want to make sure the subordinate master present the same CA pub
>> key as the top-level master.
>
> This sounds like it may be the piece I've been missing.
>
> On the PuppetCA, I have the following in /etc/httpd/conf.d/puppet.conf:
>    SSLCertificateFile /var/lib/puppet/ssl/certs/top-level-master.domain.pem
>    SSLCertificateKeyFile
> /var/lib/puppet/ssl/private_keys/top-level-master.domain.pem
>    SSLCertificateChainFile /var/lib/puppet/ssl/certs/ca.pem
>    SSLCACertificateFile /var/lib/puppet/ssl/ca/ca_crt.pem

Shouldn't the last line also be?
/var/lib/puppet/ssl/certs/ca.pem

> On my subordinate masters, I have:
>    SSLCertificateFile /var/lib/puppet/ssl/certs/subordinate-master.pem
>    SSLCertificateKeyFile
> /var/lib/puppet/ssl/private_keys/subordinate-master.pem
>    SSLCertificateChainFile /var/lib/puppet/ssl/certs/ca.pem
>    SSLCACertificateFile /var/lib/puppet/ssl/certs/ca.pem
>
> On the subordinate masters, the ca.pem referenced in the
> SSLCertificateChainFile and SSLCACertificateFile is the same as the
> top-level master's SSLCertificateChainFile.
>
> I copied ca_crt.pem from the top-level master to the subordinate
> master, and updated the SSLCACertificateFile to point to it. The node
> still fails with the same error message.
>
> Perhaps I'm not fully understanding you. Do I need each subordinate
> master to use the same public _and_ private key as the CA?
>
>>> Subordinate masters can function as clients of the top-level Master
>>> successfully, so their certificates are installed and signed
>>> correctly, at least for the agent context.
>>
>> You only verified they have a working client cert, not that it's
>> presenting the correct CA pub key or server cert. An easy test is to
>> connect the subordinate master to itself and see if that works.
>>
>> I would run the following tests:
>>
>> client:
>> puppet agent -t --server sub-master --ca_server master
>
> This is essentially the test I've been performing using /etc/hosts
> entries to point to a specific subordinate master. Using an explicit
> "--server" argument does not produce different results on the node: it
> fails.
>
>> sub-master:
>> puppet agent -t --server sub-master  --ca_server master
>
> I had not tried this test. Doing so fails in the same way that the client 
> fails.

Yeah, so it confirms so far they are only valid client certs.

What's the result of the following command on sub-master and master?
openssl x509 -text -noout -in /var/lib/puppet/ssl/certs/ca.pem

What's the output of the following on the submaster?
openssl x509 -text -noout -in /var/lib/puppet/ssl/certs/subordinate-master.pem

Nan

-- 
You received this message because you are subscribed to the Google Groups 
"Puppet Users" group.
To post to this group, send email to puppet-users@googlegroups.com.
To unsubscribe from this group, send email to 
puppet-users+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/puppet-users?hl=en.

Reply via email to