On Thu, Jun 14, 2012 at 10:55 AM, Scott Merrill <ski...@skippy.net> wrote:
> On Thu, Jun 14, 2012 at 1:34 PM, Nan Liu <n...@puppetlabs.com> wrote:
>> On Thu, Jun 14, 2012 at 10:12 AM, Scott Merrill <ski...@skippy.net> wrote:
>>> On Thu, Jun 14, 2012 at 12:50 PM, Nan Liu <n...@puppetlabs.com> wrote:
>>>> On Thu, Jun 14, 2012 at 9:27 AM, Scott Merrill <ski...@skippy.net> wrote:
>>>>> If I point that node to my top-level Master (via entry in /etc/hosts),
>>>>> the `puppet agent --test --noop` invocation works without error.
>>>>
>>>> You want to make sure the subordinate master present the same CA pub
>>>> key as the top-level master.
>>>
>>> This sounds like it may be the piece I've been missing.
>>>
>>> On the PuppetCA, I have the following in /etc/httpd/conf.d/puppet.conf:
>>>    SSLCertificateFile /var/lib/puppet/ssl/certs/top-level-master.domain.pem
>>>    SSLCertificateKeyFile
>>> /var/lib/puppet/ssl/private_keys/top-level-master.domain.pem
>>>    SSLCertificateChainFile /var/lib/puppet/ssl/certs/ca.pem
>>>    SSLCACertificateFile /var/lib/puppet/ssl/ca/ca_crt.pem
>>
>> Shouldn't the last line also be?
>> /var/lib/puppet/ssl/certs/ca.pem
>
> You're asking me?  I'm the one looking for help!  ;)
>
>
>>>> sub-master:
>>>> puppet agent -t --server sub-master  --ca_server master
>>>
>>> I had not tried this test. Doing so fails in the same way that the client 
>>> fails.
>>
>> Yeah, so it confirms so far they are only valid client certs.
>>
>> What's the result of the following command on sub-master and master?
>> openssl x509 -text -noout -in /var/lib/puppet/ssl/certs/ca.pem
>
> The output is the same on both the top-level and subordinate master:
>
> Certificate:
>    Data:
>        Version: 3 (0x2)
>        Serial Number: 1 (0x1)
>        Signature Algorithm: sha1WithRSAEncryption
>        Issuer: CN=Puppet CA: top-level-master.domain
>        Validity
>            Not Before: May 15 18:40:44 2012 GMT
>            Not After : May 15 18:40:44 2017 GMT
>        Subject: CN=Puppet CA: nlvmjt036.nwideweb.net
>        Subject Public Key Info:
>            Public Key Algorithm: rsaEncryption
>                Public-Key: (4096 bit)
>         <-snip->
>        X509v3 extensions:
>            X509v3 Basic Constraints: critical
>                CA:TRUE
>            Netscape Comment:
>                Puppet Ruby/OpenSSL Internal Certificate
>            X509v3 Key Usage: critical
>                Certificate Sign, CRL Sign
>            X509v3 Subject Key Identifier:
>                F6:65:DC:F3:D7:A6:7F:C3:4C:BC:C3:72:A3:39:E3:4D:AA:F9:46:1D
>         <-snip->

So normally for self signed CA the issuer and subject is the same. In
this case you are issuing the certs via:
CN=Puppet CA: top-level-master.domain

However you are asking the system to verify against a CA cert that
presents the subject as:
CN=Puppet CA: nlvmjt036.nwideweb.net

So you can you locate your CA cert with the subject?
Subject: CN=Puppet CA: top-level-master.domain

This is the CA.pem file that should be used.

Nan

-- 
You received this message because you are subscribed to the Google Groups 
"Puppet Users" group.
To post to this group, send email to puppet-users@googlegroups.com.
To unsubscribe from this group, send email to 
puppet-users+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/puppet-users?hl=en.

Reply via email to