> - how many IPA servers do you have with a CA role? ipa server-role-find 
> --role "CA server"

We only have one IPA server executing the above command return:
    ipa: ERROR: cannot connect to 'https://freeipa.qc.lrtech.ca/ipa/json': 
Could not connect to freeipa.qc.lrtech.ca using any address: 
(PR_ADDRESS_NOT_SUPPORTED_ERROR) Network address type not supported.

> - among those, which one is the renewal master? ipa config-show | grep

Since we have only 1 server it should be freeipa.qc.lrtech.ca but the command 
return the same error as above.

> - can you provide the full output of "getcert list" executed on the IPA 
> renewal master

# getcert list
Number of certificates and requests being tracked: 8.
Request ID '20170113205242':
        status: CA_UNREACHABLE
        ca-error: Internal error
        stuck: no
        key pair storage: 
type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='auditSigningCert 
cert-pki-ca',token='NSS Certificate DB',pin set
        certificate: 
type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='auditSigningCert 
cert-pki-ca',token='NSS Certificate DB'
        CA: dogtag-ipa-ca-renew-agent
        issuer: CN=Certificate Authority,O=QC.LRTECH.CA
        subject: CN=CA Audit,O=QC.LRTECH.CA
        expires: 2022-03-03 20:49:21 UTC
        key usage: digitalSignature,nonRepudiation
        pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
        post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert 
"auditSigningCert cert-pki-ca"
        track: yes
        auto-renew: yes
Request ID '20170113205243':
        status: CA_UNREACHABLE
        ca-error: Internal error
        stuck: no
        key pair storage: 
type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='ocspSigningCert 
cert-pki-ca',token='NSS Certificate DB',pin set
        certificate: 
type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='ocspSigningCert 
cert-pki-ca',token='NSS Certificate DB'
        CA: dogtag-ipa-ca-renew-agent
        issuer: CN=Certificate Authority,O=QC.LRTECH.CA
        subject: CN=OCSP Subsystem,O=QC.LRTECH.CA
        expires: 2022-03-03 20:49:21 UTC
        eku: id-kp-OCSPSigning
        pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
        post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert 
"ocspSigningCert cert-pki-ca"
        track: yes
        auto-renew: yes
Request ID '20170113205244':
        status: CA_UNREACHABLE
        ca-error: Internal error
        stuck: no
        key pair storage: 
type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='subsystemCert 
cert-pki-ca',token='NSS Certificate DB',pin set
        certificate: 
type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='subsystemCert 
cert-pki-ca',token='NSS Certificate DB'
        CA: dogtag-ipa-ca-renew-agent
        issuer: CN=Certificate Authority,O=QC.LRTECH.CA
        subject: CN=CA Subsystem,O=QC.LRTECH.CA
        expires: 2022-03-03 20:49:21 UTC
        key usage: 
digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment
        eku: id-kp-serverAuth,id-kp-clientAuth
        pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
        post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert 
"subsystemCert cert-pki-ca"
        track: yes
        auto-renew: yes
Request ID '20170113205245':
        status: MONITORING
        stuck: no
        key pair storage: 
type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='caSigningCert 
cert-pki-ca',token='NSS Certificate DB',pin set
        certificate: 
type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='caSigningCert 
cert-pki-ca',token='NSS Certificate DB'
        CA: dogtag-ipa-ca-renew-agent
        issuer: [email protected],CN=LR Tech inc. Root CA 2022,OU=Intranet,O=LR 
Tech inc.,L=Levis,ST=Quebec,C=CA
        subject: CN=Certificate Authority,O=QC.LRTECH.CA
        expires: 2027-03-04 14:26:48 UTC
        pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
        post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert 
"caSigningCert cert-pki-ca"
        track: yes
        auto-renew: yes
Request ID '20170113205246':
        status: CA_UNREACHABLE
        ca-error: Internal error
        stuck: no
        key pair storage: 
type=NSSDB,location='/etc/httpd/alias',nickname='ipaCert',token='NSS 
Certificate DB',pinfile='/etc/httpd/alias/pwdfile.txt'
        certificate: 
type=NSSDB,location='/etc/httpd/alias',nickname='ipaCert',token='NSS 
Certificate DB'
        CA: dogtag-ipa-ca-renew-agent
        issuer: CN=Certificate Authority,O=QC.LRTECH.CA
        subject: CN=IPA RA,O=QC.LRTECH.CA
        expires: 2022-03-03 20:49:21 UTC
        key usage: 
digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment
        eku: id-kp-serverAuth,id-kp-clientAuth
        pre-save command: /usr/libexec/ipa/certmonger/renew_ra_cert_pre
        post-save command: /usr/libexec/ipa/certmonger/renew_ra_cert
        track: yes
        auto-renew: yes
Request ID '20170113205247':
        status: MONITORING
        stuck: no
        key pair storage: 
type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='Server-Cert 
cert-pki-ca',token='NSS Certificate DB',pin set
        certificate: 
type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='Server-Cert 
cert-pki-ca',token='NSS Certificate DB'
        CA: dogtag-ipa-renew-agent
        issuer: CN=Certificate Authority,O=QC.LRTECH.CA
        subject: CN=freeipa.qc.lrtech.ca,O=QC.LRTECH.CA
        expires: 2024-02-21 21:06:54 UTC
        key usage: 
digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment
        eku: id-kp-serverAuth,id-kp-clientAuth
        pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
        post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert 
"Server-Cert cert-pki-ca"
        track: yes
        auto-renew: yes
Request ID '20170113205302':
        status: MONITORING
        stuck: no
        key pair storage: 
type=NSSDB,location='/etc/dirsrv/slapd-QC-LRTECH-CA',nickname='Server-Cert',token='NSS
 Certificate DB',pinfile='/etc/dirsrv/slapd-QC-LRTECH-CA/pwdfile.txt'
        certificate: 
type=NSSDB,location='/etc/dirsrv/slapd-QC-LRTECH-CA',nickname='Server-Cert',token='NSS
 Certificate DB'
        CA: IPA
        issuer: CN=Certificate Authority,O=QC.LRTECH.CA
        subject: CN=freeipa.qc.lrtech.ca,O=QC.LRTECH.CA
        expires: 2024-03-02 05:02:09 UTC
        principal name: ldap/[email protected]
        key usage: 
digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment
        eku: id-kp-serverAuth,id-kp-clientAuth
        pre-save command:
        post-save command: /usr/libexec/ipa/certmonger/restart_dirsrv 
QC-LRTECH-CA
        track: yes
        auto-renew: yes
Request ID '20220304195651':
        status: MONITORING
        stuck: no
        key pair storage: 
type=NSSDB,location='/etc/httpd/alias',nickname='Server-Cert',token='NSS 
Certificate DB',pinfile='/etc/httpd/alias/pwdfile.txt'
        certificate: 
type=NSSDB,location='/etc/httpd/alias',nickname='Server-Cert',token='NSS 
Certificate DB'
        CA: IPA
        issuer: CN=Certificate Authority,O=QC.LRTECH.CA
        subject: CN=freeipa.qc.lrtech.ca,O=QC.LRTECH.CA
        expires: 2024-03-02 05:01:51 UTC
        dns: freeipa.qc.lrtech.ca
        principal name: HTTP/[email protected]
        key usage: 
digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment
        eku: id-kp-serverAuth,id-kp-clientAuth
        pre-save command:
        post-save command:
        track: yes
        auto-renew: yes

> - is the new root CA present in /etc/ipa/ca.crt (this file should contain IPA 
> CA cert + the new and old root ca)

Yes, both certificate are present

> - is the new root CA present in /etc/ipa/nssdb, /etc/httpd/alias, 
> /etc/dirsrv/slapd-xx, /etc/pki/pki-tomcat/alias ?

Yes, for the 4 path above

> - is the new IPA CA present in the same nss databases?

The IPA CA cert might not be in slapd-xx see below for the content:

# certutil -L -d /etc/ipa/nssdb
Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

[email protected],CN=LR Tech inc. ROOT CA,OU=Intranet,O=LR Tech 
inc.,L=Levis,ST=QC,C=CA CT,C,C
QC.LRTECH.CA IPA CA                                          CT,C,C
QC.LRTECH.CA IPA CA                                          CT,C,C
QC.LRTECH.CA IPA CA                                          CT,C,C
[email protected],CN=LR Tech inc. Root CA 2022,OU=Intranet,O=LR Tech 
inc.,L=Levis,ST=Quebec,C=CA ,,

# certutil -L -d /etc/httpd/alias
Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

ipaCert                                                      u,u,u
[email protected],CN=LR Tech inc. ROOT CA,OU=Intranet,O=LR Tech 
inc.,L=Levis,ST=QC,C=CA CT,C,C
QC.LRTECH.CA IPA CA                                          CT,C,C
Server-Cert                                                  u,u,u
Signing-Cert                                                 u,u,u
QC.LRTECH.CA IPA CA                                          CT,C,C
QC.LRTECH.CA IPA CA                                          CT,C,C
[email protected],CN=LR Tech inc. Root CA 2022,OU=Intranet,O=LR Tech 
inc.,L=Levis,ST=Quebec,C=CA ,,

# certutil -L -d /etc/dirsrv/slapd-QC-LRTECH-CA/
Certificate Nickname                                         Trust Attributes
                                                                          
SSL,S/MIME,JAR/XPI

[email protected],CN=LR Tech inc. ROOT CA,OU=Intranet,O=LR Tech 
inc.,L=Levis,ST=QC,C=CA CT,C,C
QC.LRTECH.CA IPA CA                                     CT,C,C
QC.LRTECH.CA IPA CA                                     CT,C,C
QC.LRTECH.CA IPA CA                                     CT,C,C
[email protected],CN=LR Tech inc. Root CA 2022,OU=Intranet,O=LR Tech 
inc.,L=Levis,ST=Quebec,C=CA ,,
Server-Cert                                                         u,u,u


# certutil -L -d /etc/pki/pki-tomcat/alias/
Certificate Nickname                                         Trust Attributes
                                                                          
SSL,S/MIME,JAR/XPI

subsystemCert cert-pki-ca                                 u,u,u
[email protected],CN=LR Tech inc. ROOT CA,OU=Intranet,O=LR Tech 
inc.,L=Levis,ST=QC,C=CA CT,C,C
Server-Cert cert-pki-ca                                      u,u,u
ocspSigningCert cert-pki-ca                               u,u,u
auditSigningCert cert-pki-ca                               u,u,Pu
caSigningCert cert-pki-ca                                    CTu,Cu,Cu
caSigningCert cert-pki-ca                                    CTu,Cu,Cu
[email protected],CN=LR Tech inc. Root CA 2022,OU=Intranet,O=LR Tech 
inc.,L=Levis,ST=Quebec,C=CA C,,

Eric
_______________________________________________
FreeIPA-users mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedorahosted.org/archives/list/[email protected]
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure

Reply via email to