Hi,

On Fri, Mar 21, 2025 at 3:33 PM Petros Triantafyllidis via FreeIPA-users <
[email protected]> wrote:

> Thanks for your answer flo,
> ipa config-show shows both servers as renewal masters, depending where
> you run it. I guess this might be a cause of the problems:
>
> [root@mserver ~]# ipa config-show | grep renewal
>   IPA CA renewal master: mserver.example.com
>
> [root@fserver ~]# ipa config-show | grep renewal
>   IPA CA renewal master: fserver.example.com
>
> Even when I force the service to start on mserver, pki-tomcat still fails
> and consequently ipa-healthcheck reports the same errors.
>
Is the replication broken even after the service is force-started?

flo

> Assuming that I'd like fserver (the healthy one) to be the CA renewal
> master, how do I proceed? Should I run ipa-cert-fix on mserver ?
>
> Thanks again,
> Petros
>
>
> On 3/21/25 15:34, Florence Blanc-Renaud wrote:
>
> Hi,
>
> On Thu, Mar 20, 2025 at 10:06 PM Petros Triantafyllidis via FreeIPA-users <
> [email protected]> wrote:
>
>> Hi,
>>  I have two IPA servers 4.10.2-8.el9_3 (fserver & mserver) running Rocky
>> 9.3. I realized that some of the most recently created users, had problems
>> logging in. One strange thing was that when listing their home directory,
>> in place of owner there was their uidnumber instead their username.
>> One of the servers (mserver) fails to start pki-tomcat and suspected a
>> certificate issue (some show expiration a month ago). Below I show some
>> info (sanitized) and I could use some help:
>>
>> *[root@fserver]# ipa-healthcheck*
>> Internal server error 503 Server Error: Service Unavailable for url:
>> https://mserver.example.com:443/ca/rest/certs/search?size=3
>> [
>>   {
>>     "source": "pki.server.healthcheck.clones.connectivity_and_data",
>>     "check": "ClonesConnectivyAndDataCheck",
>>     "result": "ERROR",
>>     "uuid": "ae2033bb-9595-4907-8b6d-0db6d13813c3",
>>     "when": "20250320202815Z",
>>     "duration": "0.605725",
>>     "kw": {
>>       "status": "ERROR:  pki-tomcat : Internal error testing CA clone.
>> Host: mserver.example.com Port: 443"
>>     }
>>   },
>>   {
>>     "source": "ipahealthcheck.ds.replication",
>>     "check": "ReplicationCheck",
>>     "result": "ERROR",
>>     "uuid": "cd8ecc04-1e11-4229-b0e9-605fc08cc2af",
>>     "when": "20250320202818Z",
>>     "duration": "0.381935",
>>     "kw": {
>>       "key": "DSREPLLE0003",
>>       "items": [
>>         "Replication",
>>         "Agreement"
>>       ],
>>       "msg": "The replication agreement (metomserver.example.com) under
>> \"dc=IPA,dc=ss,dc=lan\" is not in synchronization.\nStatus message: error
>> (18) can't acquire replica (incremental update transient warning.  backing
>> off, will retry update later.)"
>>     }
>>   },
>>   {
>>     "source": "ipahealthcheck.ds.replication",
>>     "check": "ReplicationCheck",
>>     "result": "ERROR",
>>     "uuid": "2178f7ef-f4fc-426f-a4c4-f357c3540baa",
>>     "when": "20250320202818Z",
>>     "duration": "0.381965",
>>     "kw": {
>>       "key": "DSREPLLE0003",
>>       "items": [
>>         "Replication",
>>         "Agreement"
>>       ],
>>       "msg": "The replication agreement (catomserver.example.com) under
>> \"o=ipaca\" is not in synchronization.\nStatus message: error (18) can't
>> acquire replica (incremental update transient warning.  backing off, will
>> retry update later.)"
>>     }
>>   }
>>
>>
>> ===================================================================================
>>
>> *[root@mserver ~]# ipa-healthcheck *
>> Expired Cert: ocsp_signing
>> Expired Cert: subsystem
>> Expired Cert: audit_signing
>> Internal server error HTTPConnectionPool(host='mserver.example.com',
>> port=8080): Max retries exceeded with url:
>> /ca/rest/securityDomain/domainInfo (Caused by
>> NewConnectionError('<urllib3.connection.HTTPConnection object at
>> 0x7f1a6ea9c6d0>: Failed to establish a new connection: [Errno 111]
>> Connection refused'))
>> Internal server error HTTPSConnectionPool(host='mserver.example.com',
>> port=8443): Max retries exceeded with url: /ca/admin/ca/getStatus (Caused
>> by NewConnectionError('<urllib3.connection.HTTPSConnection object at
>> 0x7f1a6e9194f0>: Failed to establish a new connection: [Errno 111]
>> Connection refused'))
>> [
>>   {
>>     "source": "ipahealthcheck.meta.services",
>>     "check": "pki_tomcatd",
>>     "result": "ERROR",
>>     "uuid": "1f169946-8a47-4d93-ae38-f8072abf82e1",
>>     "when": "20250320203343Z",
>>     "duration": "0.000577",
>>     "kw": {
>>       "status": false,
>>       "msg": "pki_tomcatd: not running"
>>     }
>>   },
>>   {
>>     "source": "pki.server.healthcheck.certs.expiration",
>>     "check": "CASystemCertExpiryCheck",
>>     "result": "ERROR",
>>     "uuid": "d659a57c-f625-462d-b6d5-1a60d8216953",
>>     "when": "20250320203344Z",
>>     "duration": "0.143464",
>>     "kw": {
>>       "cert_id": "ocsp_signing",
>>       "expiry_date": "Feb 17 2025",
>>       "msg": "Certificate has ALREADY EXPIRED"
>>     }
>>   },
>>   {
>>     "source": "pki.server.healthcheck.certs.expiration",
>>     "check": "CASystemCertExpiryCheck",
>>     "result": "ERROR",
>>     "uuid": "7232e7cb-3cc2-4ff2-9953-954ef2e5d3b9",
>>     "when": "20250320203344Z",
>>     "duration": "0.280452",
>>     "kw": {
>>       "cert_id": "subsystem",
>>       "expiry_date": "Feb 17 2025",
>>       "msg": "Certificate has ALREADY EXPIRED"
>>     }
>>   },
>>   {
>>     "source": "pki.server.healthcheck.certs.expiration",
>>     "check": "CASystemCertExpiryCheck",
>>     "result": "ERROR",
>>     "uuid": "117eece4-37dd-45cb-bf6c-acdfa29fb525",
>>     "when": "20250320203344Z",
>>     "duration": "0.349712",
>>     "kw": {
>>       "cert_id": "audit_signing",
>>       "expiry_date": "Feb 17 2025",
>>       "msg": "Certificate has ALREADY EXPIRED"
>>     }
>>   },
>>   {
>>     "source": "pki.server.healthcheck.meta.connectivity",
>>     "check": "DogtagCACertsConnectivityCheck",
>>     "result": "CRITICAL",
>>     "uuid": "bb5c2f08-e28e-47d7-9752-404f83fb67a8",
>>     "when": "20250320203345Z",
>>     "duration": "0.035959",
>>     "kw": {
>>       "msg": "Internal server error. Is your CA subsystem and LDAP
>> database up?",
>>       "instance_name": "pki-tomcat",
>>       "exception": "HTTPSConnectionPool(host='mserver.example.com',
>> port=8443): Max retries exceeded with url: /ca/admin/ca/getStatus (Caused
>> by NewConnectionError('<urllib3.connection.HTTPSConnection object at
>> 0x7f1a6e9194f0>: Failed to establish a new connection: [Errno 111]
>> Connection refused'))"
>>     }
>>   },
>>   {
>>     "source": "ipahealthcheck.dogtag.ca",
>>     "check": "DogtagCertsConnectivityCheck",
>>     "result": "ERROR",
>>     "uuid": "2c134180-e055-41fe-bd8e-8aa9ca4f56a6",
>>     "when": "20250320203346Z",
>>     "duration": "0.423802",
>>     "kw": {
>>       "key": "cert_show_ra",
>>       "error": "cannot connect to '
>> https://mserver.example.com:443/ca/rest/certs/41': [SSL:
>> SSLV3_ALERT_CERTIFICATE_EXPIRED] sslv3 alert certificate expired
>> (_ssl.c:2633)",
>>       "serial": "41",
>>       "msg": "Request for certificate failed: {error}"
>>     }
>>   },
>>   {
>>     "source": "ipahealthcheck.ds.replication",
>>     "check": "ReplicationCheck",
>>     "result": "ERROR",
>>     "uuid": "55b716e8-43e9-44b0-8764-4263d283dc2d",
>>     "when": "20250320203347Z",
>>     "duration": "0.346086",
>>     "kw": {
>>       "key": "DSREPLLE0003",
>>       "items": [
>>         "Replication",
>>         "Agreement"
>>       ],
>>       "msg": "The replication agreement (metofserver.example.com) under
>> \"dc=IPA,dc=ss,dc=lan\" is not in synchronization.\nStatus message: error
>> (18) can't acquire replica (incremental update transient warning.  backing
>> off, will retry update later.)"
>>     }
>>   },
>>   {
>>     "source": "ipahealthcheck.ds.replication",
>>     "check": "ReplicationCheck",
>>     "result": "ERROR",
>>     "uuid": "37bc48b0-7eca-4576-8e61-b30b1bde621b",
>>     "when": "20250320203347Z",
>>     "duration": "0.346109",
>>     "kw": {
>>       "key": "DSREPLLE0003",
>>       "items": [
>>         "Replication",
>>         "Agreement"
>>       ],
>>       "msg": "The replication agreement (catofserver.example.com) under
>> \"o=ipaca\" is not in synchronization.\nStatus message: error (18) can't
>> acquire replica (incremental update transient warning.  backing off, will
>> retry update later.)"
>>     }
>>   },
>>   {
>>     "source": "ipahealthcheck.ipa.certs",
>>     "check": "IPACertmongerExpirationCheck",
>>     "result": "ERROR",
>>     "uuid": "3170174f-6bb6-4afc-82f0-a795791036ed",
>>     "when": "20250320203347Z",
>>     "duration": "0.010887",
>>     "kw": {
>>       "key": "20240325182332",
>>       "expiration_date": "20250217085937Z",
>>       "msg": "Request id {key} expired on {expiration_date}"
>>     }
>>   },
>>   {
>>     "source": "ipahealthcheck.ipa.certs",
>>     "check": "IPACertmongerExpirationCheck",
>>     "result": "ERROR",
>>     "uuid": "727c67e4-f647-4942-b9f4-2861ffd244a8",
>>     "when": "20250320203347Z",
>>     "duration": "0.013823",
>>     "kw": {
>>       "key": "20240325182333",
>>       "expiration_date": "20250217085837Z",
>>       "msg": "Request id {key} expired on {expiration_date}"
>>     }
>>   },
>>   {
>>     "source": "ipahealthcheck.ipa.certs",
>>     "check": "IPACertmongerExpirationCheck",
>>     "result": "ERROR",
>>     "uuid": "83c634aa-24d0-41df-88c3-401a0ce804f4",
>>     "when": "20250320203347Z",
>>     "duration": "0.016737",
>>     "kw": {
>>       "key": "20240325182337",
>>       "expiration_date": "20250217085847Z",
>>       "msg": "Request id {key} expired on {expiration_date}"
>>     }
>>   },
>>   {
>>     "source": "ipahealthcheck.ipa.certs",
>>     "check": "IPACertmongerExpirationCheck",
>>     "result": "ERROR",
>>     "uuid": "d8ff80a5-f947-48a2-b97c-078becf2f8f9",
>>     "when": "20250320203347Z",
>>     "duration": "0.019678",
>>     "kw": {
>>       "key": "20240325182339",
>>       "expiration_date": "20250217085927Z",
>>       "msg": "Request id {key} expired on {expiration_date}"
>>     }
>>   },
>>   {
>>     "source": "ipahealthcheck.ipa.certs",
>>     "check": "IPACertfileExpirationCheck",
>>     "result": "ERROR",
>>     "uuid": "31b38213-3510-4a6d-b01f-4aef8f01fdfe",
>>     "when": "20250320203347Z",
>>     "duration": "0.059710",
>>     "kw": {
>>       "key": "20240325182332",
>>       "expiration_date": "20250217085937Z",
>>       "msg": "Request id {key} expired on {expiration_date}"
>>     }
>>   },
>>   {
>>     "source": "ipahealthcheck.ipa.certs",
>>     "check": "IPACertfileExpirationCheck",
>>     "result": "ERROR",
>>     "uuid": "140abdf2-c6a6-4f5a-9c4e-1381ad9ffef2",
>>     "when": "20250320203347Z",
>>     "duration": "0.103873",
>>     "kw": {
>>       "key": "20240325182333",
>>       "expiration_date": "20250217085837Z",
>>       "msg": "Request id {key} expired on {expiration_date}"
>>     }
>>   },
>>   {
>>     "source": "ipahealthcheck.ipa.certs",
>>     "check": "IPACertfileExpirationCheck",
>>     "result": "ERROR",
>>     "uuid": "bb70dc48-0382-43a5-80c9-1303302d0332",
>>     "when": "20250320203347Z",
>>     "duration": "0.148327",
>>     "kw": {
>>       "key": "20240325182337",
>>       "expiration_date": "20250217085847Z",
>>       "msg": "Request id {key} expired on {expiration_date}"
>>     }
>>   },
>>   {
>>     "source": "ipahealthcheck.ipa.certs",
>>     "check": "IPACertfileExpirationCheck",
>>     "result": "ERROR",
>>     "uuid": "d7c88743-8fb3-4793-b193-5e7a6a963e4b",
>>     "when": "20250320203348Z",
>>     "duration": "0.192067",
>>     "kw": {
>>       "key": "20240325182339",
>>       "expiration_date": "20250217085927Z",
>>       "msg": "Request id {key} expired on {expiration_date}"
>>     }
>>   },
>>   {
>>     "source": "ipahealthcheck.ipa.certs",
>>     "check": "IPAOpenSSLChainValidation",
>>     "result": "ERROR",
>>     "uuid": "faab3d0d-c726-4d93-a4fd-b3f47cbee7a0",
>>     "when": "20250320203351Z",
>>     "duration": "0.016884",
>>     "kw": {
>>       "key": "/var/lib/ipa/ra-agent.pem",
>>       "reason": "O = IPA.SS.LAN, CN = IPA RA\nerror 10 at 0 depth lookup:
>> certificate has expired\nerror /var/lib/ipa/ra-agent.pem: verification
>> failed\n",
>>       "msg": "Certificate validation for {key} failed: {reason}"
>>     }
>>   },
>>   {
>>     "source": "ipahealthcheck.ipa.certs",
>>     "check": "IPACertRevocation",
>>     "result": "ERROR",
>>     "uuid": "c962600a-5f2e-4000-995e-0d6e2c51bf6c",
>>     "when": "20250320203351Z",
>>     "duration": "0.438354",
>>     "kw": {
>>       "key": "20240325182332",
>>       "serial": 41,
>>       "error": "cannot connect to '
>> https://mserver.example.com:443/ca/rest/certs/41': [SSL:
>> SSLV3_ALERT_CERTIFICATE_EXPIRED] sslv3 alert certificate expired
>> (_ssl.c:2633)",
>>       "msg": "Request for certificate serial number {serial} in request
>> {key} failed: {error}"
>>     }
>>   },
>>   {
>>     "source": "ipahealthcheck.ipa.certs",
>>     "check": "IPACertRevocation",
>>     "result": "ERROR",
>>     "uuid": "524f71a3-92aa-424c-a660-f48efef17684",
>>     "when": "20250320203351Z",
>>     "duration": "0.513622",
>>     "kw": {
>>       "key": "20240325182333",
>>       "serial": 37,
>>       "error": "cannot connect to '
>> https://mserver.example.com:443/ca/rest/certs/37': [SSL:
>> SSLV3_ALERT_CERTIFICATE_EXPIRED] sslv3 alert certificate expired
>> (_ssl.c:2633)",
>>       "msg": "Request for certificate serial number {serial} in request
>> {key} failed: {error}"
>>     }
>>   },
>>   {
>>     "source": "ipahealthcheck.ipa.certs",
>>     "check": "IPACertRevocation",
>>     "result": "ERROR",
>>     "uuid": "c2f9fc6f-0561-45e9-aa2b-c741b893a173",
>>     "when": "20250320203351Z",
>>     "duration": "0.591474",
>>     "kw": {
>>       "key": "20240325182337",
>>       "serial": 38,
>>       "error": "cannot connect to '
>> https://mserver.example.com:443/ca/rest/certs/38': [SSL:
>> SSLV3_ALERT_CERTIFICATE_EXPIRED] sslv3 alert certificate expired
>> (_ssl.c:2633)",
>>       "msg": "Request for certificate serial number {serial} in request
>> {key} failed: {error}"
>>     }
>>   },
>>   {
>>     "source": "ipahealthcheck.ipa.certs",
>>     "check": "IPACertRevocation",
>>     "result": "ERROR",
>>     "uuid": "a373bde5-64bd-4cdb-9db1-4b9a565f6d60",
>>     "when": "20250320203351Z",
>>     "duration": "0.667891",
>>     "kw": {
>>       "key": "20240325182339",
>>       "serial": 40,
>>       "error": "cannot connect to '
>> https://mserver.example.com:443/ca/rest/certs/40': [SSL:
>> SSLV3_ALERT_CERTIFICATE_EXPIRED] sslv3 alert certificate expired
>> (_ssl.c:2633)",
>>       "msg": "Request for certificate serial number {serial} in request
>> {key} failed: {error}"
>>     }
>>   },
>>   {
>>     "source": "ipahealthcheck.ipa.certs",
>>     "check": "IPACertRevocation",
>>     "result": "ERROR",
>>     "uuid": "4adb473e-4604-4f6b-85de-aeda264b2bfd",
>>     "when": "20250320203352Z",
>>     "duration": "0.749218",
>>     "kw": {
>>       "key": "20240325182340",
>>       "serial": 1,
>>       "error": "cannot connect to '
>> https://mserver.example.com:443/ca/rest/certs/1': [SSL:
>> SSLV3_ALERT_CERTIFICATE_EXPIRED] sslv3 alert certificate expired
>> (_ssl.c:2633)",
>>       "msg": "Request for certificate serial number {serial} in request
>> {key} failed: {error}"
>>     }
>>   },
>>   {
>>     "source": "ipahealthcheck.ipa.certs",
>>     "check": "IPACertRevocation",
>>     "result": "ERROR",
>>     "uuid": "3cd2e311-a4cc-47a1-86fa-c80ae7c35535",
>>     "when": "20250320203352Z",
>>     "duration": "0.826249",
>>     "kw": {
>>       "key": "20240325182341",
>>       "serial": 805175299,
>>       "error": "cannot connect to '
>> https://mserver.example.com:443/ca/rest/certs/805175299': [SSL:
>> SSLV3_ALERT_CERTIFICATE_EXPIRED] sslv3 alert certificate expired
>> (_ssl.c:2633)",
>>       "msg": "Request for certificate serial number {serial} in request
>> {key} failed: {error}"
>>     }
>>   },
>>   {
>>     "source": "ipahealthcheck.ipa.certs",
>>     "check": "IPACertRevocation",
>>     "result": "ERROR",
>>     "uuid": "3355e9e4-e18d-48b5-9a1f-018ea8a02018",
>>     "when": "20250320203352Z",
>>     "duration": "0.865347",
>>     "kw": {
>>       "key": "20240325182024",
>>       "serial": 805175298,
>>       "error": "cannot connect to '
>> https://mserver.example.com:443/ca/rest/certs/805175298': [SSL:
>> SSLV3_ALERT_CERTIFICATE_EXPIRED] sslv3 alert certificate expired
>> (_ssl.c:2633)",
>>       "msg": "Request for certificate serial number {serial} in request
>> {key} failed: {error}"
>>     }
>>   },
>>   {
>>     "source": "ipahealthcheck.ipa.certs",
>>     "check": "IPACertRevocation",
>>     "result": "ERROR",
>>     "uuid": "43779b90-74cd-4db1-a1b2-19b30f1400ac",
>>     "when": "20250320203352Z",
>>     "duration": "0.947838",
>>     "kw": {
>>       "key": "20240325182004",
>>       "serial": 805175297,
>>       "error": "cannot connect to '
>> https://mserver.example.com:443/ca/rest/certs/805175297': [SSL:
>> SSLV3_ALERT_CERTIFICATE_EXPIRED] sslv3 alert certificate expired
>> (_ssl.c:2633)",
>>       "msg": "Request for certificate serial number {serial} in request
>> {key} failed: {error}"
>>     }
>>   },
>>   {
>>     "source": "ipahealthcheck.ipa.certs",
>>     "check": "IPACertRevocation",
>>     "result": "ERROR",
>>     "uuid": "76a26aa3-c56f-4984-8abc-c5113d25f2e2",
>>     "when": "20250320203352Z",
>>     "duration": "0.992108",
>>     "kw": {
>>       "key": "20240325182408",
>>       "serial": 268304393,
>>       "error": "cannot connect to '
>> https://mserver.example.com:443/ca/rest/certs/268304393': [SSL:
>> SSLV3_ALERT_CERTIFICATE_EXPIRED] sslv3 alert certificate expired
>> (_ssl.c:2633)",
>>       "msg": "Request for certificate serial number {serial} in request
>> {key} failed: {error}"
>>     }
>>   }
>> ]
>>
>>
>> ===================================================================================
>>
>> *[root@mserver]# ipactl -d status*
>>
>> [...]
>>
>> ipa-custodia Service: RUNNING
>> ipa: DEBUG: request POST
>> http://mserver.example.com:8080/ca/admin/ca/getStatus
>> ipa: DEBUG: request body ''
>> ipa: DEBUG: httplib request failed:
>> Traceback (most recent call last):
>>   File "/usr/lib/python3.9/site-packages/ipapython/dogtag.py", line 271,
>> in _httplib_request
>>     conn.request(method, path, body=request_body, headers=headers)
>>   File "/usr/lib64/python3.9/http/client.py", line 1285, in request
>>     self._send_request(method, url, body, headers, encode_chunked)
>>   File "/usr/lib64/python3.9/http/client.py", line 1331, in _send_request
>>     self.endheaders(body, encode_chunked=encode_chunked)
>>   File "/usr/lib64/python3.9/http/client.py", line 1280, in endheaders
>>     self._send_output(message_body, encode_chunked=encode_chunked)
>>   File "/usr/lib64/python3.9/http/client.py", line 1040, in _send_output
>>     self.send(msg)
>>   File "/usr/lib64/python3.9/http/client.py", line 980, in send
>>     self.connect()
>>   File "/usr/lib64/python3.9/http/client.py", line 946, in connect
>>     self.sock = self._create_connection(
>>   File "/usr/lib64/python3.9/socket.py", line 844, in create_connection
>>     raise err
>>   File "/usr/lib64/python3.9/socket.py", line 832, in create_connection
>>     sock.connect(sa)
>> ConnectionRefusedError: [Errno 111] Connection refused
>> ipa: DEBUG: Failed to check CA status: cannot connect to '
>> http://mserver.example.com:8080/ca/admin/ca/getStatus': [Errno 111]
>> Connection refused
>> pki-tomcatd Service: STOPPED
>> [...]
>>
>>
>> ===================================================================================
>>
>> *[root@mserver ~]# getcert list*
>> Number of certificates and requests being tracked: 9.
>> Request ID '20240325182004':
>>         status: MONITORING
>>         stuck: no
>>         key pair storage:
>> type=NSSDB,location='/etc/dirsrv/slapd-IPA-SS-LAN',nickname='Server-Cert',token='NSS
>> Certificate DB',pinfile='/etc/dirsrv/slapd-IPA-SS-LAN/pwdfile.txt'
>>         certificate:
>> type=NSSDB,location='/etc/dirsrv/slapd-IPA-SS-LAN',nickname='Server-Cert',token='NSS
>> Certificate DB'
>>         CA: IPA
>>         issuer: CN=Certificate Authority,O=IPA.SS.LAN
>>         subject: CN=mserver.example.com,O=IPA.SS.LAN
>>         issued: 2024-03-25 20:20:06 EET
>>         expires: 2026-03-26 20:20:06 EET
>>         dns: mserver.example.com
>>         principal name: ldap/[email protected]
>>         key usage:
>> digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment
>>         eku: id-kp-serverAuth,id-kp-clientAuth
>>         profile: caIPAserviceCert
>>         pre-save command:
>>         post-save command: /usr/libexec/ipa/certmonger/restart_dirsrv
>> IPA-SS-LAN
>>         track: yes
>>         auto-renew: yes
>> Request ID '20240325182024':
>>         status: MONITORING
>>         stuck: no
>>         key pair storage:
>> type=FILE,location='/var/lib/ipa/private/httpd.key',pinfile='/var/lib/ipa/passwds/mserver.example.com-443-RSA'
>>         certificate: type=FILE,location='/var/lib/ipa/certs/httpd.crt'
>>         CA: IPA
>>         issuer: CN=Certificate Authority,O=IPA.SS.LAN
>>         subject: CN=mserver.example.com,O=IPA.SS.LAN
>>         issued: 2024-03-25 20:20:25 EET
>>         expires: 2026-03-26 20:20:25 EET
>>         dns: mserver.example.com,ipa-ca.IPA.SS.LAN
>>         principal name: HTTP/[email protected]
>>         key usage:
>> digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment
>>         eku: id-kp-serverAuth,id-kp-clientAuth
>>         profile: caIPAserviceCert
>>         pre-save command:
>>         post-save command: /usr/libexec/ipa/certmonger/restart_httpd
>>         track: yes
>>         auto-renew: yes
>> Request ID '20240325182332':
>>         status: CA_WORKING
>>         stuck: no
>>         key pair storage: type=FILE,location='/var/lib/ipa/ra-agent.key'
>>         certificate: type=FILE,location='/var/lib/ipa/ra-agent.pem'
>>         CA: dogtag-ipa-ca-renew-agent
>>         issuer: CN=Certificate Authority,O=IPA.SS.LAN
>>         subject: CN=IPA RA,O=IPA.SS.LAN
>>         issued: 2023-02-28 10:59:37 EET
>>         expires: 2025-02-17 10:59:37 EET
>>         key usage:
>> digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment
>>         eku: id-kp-serverAuth,id-kp-clientAuth
>>         profile: caSubsystemCert
>>         pre-save command: /usr/libexec/ipa/certmonger/renew_ra_cert_pre
>>         post-save command: /usr/libexec/ipa/certmonger/renew_ra_cert
>>         track: yes
>>         auto-renew: yes
>> Request ID '20240325182333':
>>         status: CA_WORKING
>>         stuck: no
>>         key pair storage:
>> type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='auditSigningCert
>> cert-pki-ca',token='NSS Certificate DB',pin set
>>         certificate:
>> type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='auditSigningCert
>> cert-pki-ca',token='NSS Certificate DB'
>>         CA: dogtag-ipa-ca-renew-agent
>>         issuer: CN=Certificate Authority,O=IPA.SS.LAN
>>         subject: CN=CA Audit,O=IPA.SS.LAN
>>         issued: 2023-02-28 10:58:37 EET
>>         expires: 2025-02-17 10:58:37 EET
>>         key usage: digitalSignature,nonRepudiation
>>         profile: caSignedLogCert
>>         pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
>>         post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert
>> "auditSigningCert cert-pki-ca"
>>         track: yes
>>         auto-renew: yes
>> Request ID '20240325182337':
>>         status: CA_WORKING
>>         stuck: no
>>         key pair storage:
>> type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='ocspSigningCert
>> cert-pki-ca',token='NSS Certificate DB',pin set
>>         certificate:
>> type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='ocspSigningCert
>> cert-pki-ca',token='NSS Certificate DB'
>>         CA: dogtag-ipa-ca-renew-agent
>>         issuer: CN=Certificate Authority,O=IPA.SS.LAN
>>         subject: CN=OCSP Subsystem,O=IPA.SS.LAN
>>         issued: 2023-02-28 10:58:47 EET
>>         expires: 2025-02-17 10:58:47 EET
>>         eku: id-kp-OCSPSigning
>>         profile: caOCSPCert
>>         pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
>>         post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert
>> "ocspSigningCert cert-pki-ca"
>>         track: yes
>>         auto-renew: yes
>> Request ID '20240325182339':
>>         status: CA_WORKING
>>         stuck: no
>>         key pair storage:
>> type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='subsystemCert
>> cert-pki-ca',token='NSS Certificate DB',pin set
>>         certificate:
>> type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='subsystemCert
>> cert-pki-ca',token='NSS Certificate DB'
>>         CA: dogtag-ipa-ca-renew-agent
>>         issuer: CN=Certificate Authority,O=IPA.SS.LAN
>>         subject: CN=CA Subsystem,O=IPA.SS.LAN
>>         issued: 2023-02-28 10:59:27 EET
>>         expires: 2025-02-17 10:59:27 EET
>>         key usage:
>> digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment
>>         eku: id-kp-serverAuth,id-kp-clientAuth
>>         profile: caSubsystemCert
>>         pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
>>         post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert
>> "subsystemCert cert-pki-ca"
>>         track: yes
>>         auto-renew: yes
>> Request ID '20240325182340':
>>         status: MONITORING
>>         stuck: no
>>         key pair storage:
>> type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='caSigningCert
>> cert-pki-ca',token='NSS Certificate DB',pin set
>>         certificate:
>> type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='caSigningCert
>> cert-pki-ca',token='NSS Certificate DB'
>>         CA: dogtag-ipa-ca-renew-agent
>>         issuer: CN=Certificate Authority,O=IPA.SS.LAN
>>         subject: CN=Certificate Authority,O=IPA.SS.LAN
>>         issued: 2017-06-20 18:03:50 EEST
>>         expires: 2037-06-20 18:03:50 EEST
>>         key usage: digitalSignature,nonRepudiation,keyCertSign,cRLSign
>>         profile: caCACert
>>         pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
>>         post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert
>> "caSigningCert cert-pki-ca"
>>         track: yes
>>         auto-renew: yes
>> Request ID '20240325182341':
>>         status: MONITORING
>>         stuck: no
>>         key pair storage:
>> type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='Server-Cert
>> cert-pki-ca',token='NSS Certificate DB',pin set
>>         certificate:
>> type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='Server-Cert
>> cert-pki-ca',token='NSS Certificate DB'
>>         CA: dogtag-ipa-ca-renew-agent
>>         issuer: CN=Certificate Authority,O=IPA.SS.LAN
>>         subject: CN=mserver.example.com,O=IPA.SS.LAN
>>         issued: 2024-03-25 20:22:48 EET
>>         expires: 2026-03-15 20:22:48 EET
>>         key usage:
>> digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment
>>         eku: id-kp-serverAuth,id-kp-clientAuth,id-kp-emailProtection
>>         profile: caServerCert
>>         pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
>>         post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert
>> "Server-Cert cert-pki-ca"
>>         track: yes
>>         auto-renew: yes
>> Request ID '20240325182408':
>>         status: MONITORING
>>         stuck: no
>>         key pair storage:
>> type=FILE,location='/var/kerberos/krb5kdc/kdc.key'
>>         certificate: type=FILE,location='/var/kerberos/krb5kdc/kdc.crt'
>>         CA: IPA
>>         issuer: CN=Certificate Authority,O=IPA.SS.LAN
>>         subject: CN=mserver.example.com,O=IPA.SS.LAN
>>         issued: 2024-03-25 20:24:13 EET
>>         expires: 2026-03-26 20:24:13 EET
>>         dns: mserver.example.com
>>         principal name: krbtgt/[email protected]
>>         key usage:
>> digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment
>>         eku: id-kp-serverAuth,id-pkinit-KPKdc
>>         profile: KDCs_PKINIT_Certs
>>         pre-save command:
>>         post-save command: /usr/libexec/ipa/certmonger/renew_kdc_cert
>>         track: yes
>>         auto-renew: yes
>>
>>
>> ===================================================================================
>>
>
>
> From your logs,
>
>    - replication between your servers is broken (could be related to the
>    expired certs or the cause for expired certs...)
>    - on mserver:
>       - PKI server not running
>       - the shared PKI certificates are expired (Feb 17 2025):
>       ra-agent.pem + auditSigningCert cert-pki-ca + ocspSigningCert
>       cert-pki-ca + subsystemCert cert-pki-ca
>
> Can you check which server is the CA renewal master?
> kinit admin
> ipa config-show | grep renewal
>   IPA CA renewal master: *server.ipa.test*
>
> Then you can force the startup of ipa services on mserver:
> ipactl start --ignore-service-failures
>
> At this point, check if the replication is working (for instance with
> ipa-healthcheck or by creating a user on mserver and ensuring it is present
> on fserver and vice-versa). Then let us know the situation, depending on
> your answers you will have to follow one of the sections of
> https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/9/html/managing_certificates_in_idm/renewing-expired-system-certificates-when-idm-is-offline_managing-certificates-in-idm#renewing-expired-system-certificates-when-idm-is-offline_managing-certificates-in-idm
>
> flo
>
>>
> --
> _______________________________________________
> FreeIPA-users mailing list -- [email protected]
> To unsubscribe send an email to [email protected]
> Fedora Code of Conduct:
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives:
> https://lists.fedorahosted.org/archives/list/[email protected]
> Do not reply to spam, report it:
> https://pagure.io/fedora-infrastructure/new_issue
>
-- 
_______________________________________________
FreeIPA-users mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedorahosted.org/archives/list/[email protected]
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue

Reply via email to