Hi,
I have two IPA servers 4.10.2-8.el9_3 (fserver & mserver) running
Rocky 9.3. I realized that some of the most recently created users, had
problems logging in. One strange thing was that when listing their home
directory, in place of owner there was their uidnumber instead their
username.
One of the servers (mserver) fails to start pki-tomcat and suspected a
certificate issue (some show expiration a month ago). Below I show some
info (sanitized) and I could use some help:
*[root@fserver]# ipa-healthcheck*
Internal server error 503 Server Error: Service Unavailable for url:
https://mserver.example.com:443/ca/rest/certs/search?size=3
[
{
"source": "pki.server.healthcheck.clones.connectivity_and_data",
"check": "ClonesConnectivyAndDataCheck",
"result": "ERROR",
"uuid": "ae2033bb-9595-4907-8b6d-0db6d13813c3",
"when": "20250320202815Z",
"duration": "0.605725",
"kw": {
"status": "ERROR: pki-tomcat : Internal error testing CA clone.
Host: mserver.example.com Port: 443"
}
},
{
"source": "ipahealthcheck.ds.replication",
"check": "ReplicationCheck",
"result": "ERROR",
"uuid": "cd8ecc04-1e11-4229-b0e9-605fc08cc2af",
"when": "20250320202818Z",
"duration": "0.381935",
"kw": {
"key": "DSREPLLE0003",
"items": [
"Replication",
"Agreement"
],
"msg": "The replication agreement (metomserver.example.com) under
\"dc=IPA,dc=ss,dc=lan\" is not in synchronization.\nStatus message:
error (18) can't acquire replica (incremental update transient warning.
backing off, will retry update later.)"
}
},
{
"source": "ipahealthcheck.ds.replication",
"check": "ReplicationCheck",
"result": "ERROR",
"uuid": "2178f7ef-f4fc-426f-a4c4-f357c3540baa",
"when": "20250320202818Z",
"duration": "0.381965",
"kw": {
"key": "DSREPLLE0003",
"items": [
"Replication",
"Agreement"
],
"msg": "The replication agreement (catomserver.example.com) under
\"o=ipaca\" is not in synchronization.\nStatus message: error (18) can't
acquire replica (incremental update transient warning. backing off,
will retry update later.)"
}
}
===================================================================================
*[root@mserver ~]# ipa-healthcheck *
Expired Cert: ocsp_signing
Expired Cert: subsystem
Expired Cert: audit_signing
Internal server error HTTPConnectionPool(host='mserver.example.com',
port=8080): Max retries exceeded with url:
/ca/rest/securityDomain/domainInfo (Caused by
NewConnectionError('<urllib3.connection.HTTPConnection object at
0x7f1a6ea9c6d0>: Failed to establish a new connection: [Errno 111]
Connection refused'))
Internal server error HTTPSConnectionPool(host='mserver.example.com',
port=8443): Max retries exceeded with url: /ca/admin/ca/getStatus
(Caused by NewConnectionError('<urllib3.connection.HTTPSConnection
object at 0x7f1a6e9194f0>: Failed to establish a new connection: [Errno
111] Connection refused'))
[
{
"source": "ipahealthcheck.meta.services",
"check": "pki_tomcatd",
"result": "ERROR",
"uuid": "1f169946-8a47-4d93-ae38-f8072abf82e1",
"when": "20250320203343Z",
"duration": "0.000577",
"kw": {
"status": false,
"msg": "pki_tomcatd: not running"
}
},
{
"source": "pki.server.healthcheck.certs.expiration",
"check": "CASystemCertExpiryCheck",
"result": "ERROR",
"uuid": "d659a57c-f625-462d-b6d5-1a60d8216953",
"when": "20250320203344Z",
"duration": "0.143464",
"kw": {
"cert_id": "ocsp_signing",
"expiry_date": "Feb 17 2025",
"msg": "Certificate has ALREADY EXPIRED"
}
},
{
"source": "pki.server.healthcheck.certs.expiration",
"check": "CASystemCertExpiryCheck",
"result": "ERROR",
"uuid": "7232e7cb-3cc2-4ff2-9953-954ef2e5d3b9",
"when": "20250320203344Z",
"duration": "0.280452",
"kw": {
"cert_id": "subsystem",
"expiry_date": "Feb 17 2025",
"msg": "Certificate has ALREADY EXPIRED"
}
},
{
"source": "pki.server.healthcheck.certs.expiration",
"check": "CASystemCertExpiryCheck",
"result": "ERROR",
"uuid": "117eece4-37dd-45cb-bf6c-acdfa29fb525",
"when": "20250320203344Z",
"duration": "0.349712",
"kw": {
"cert_id": "audit_signing",
"expiry_date": "Feb 17 2025",
"msg": "Certificate has ALREADY EXPIRED"
}
},
{
"source": "pki.server.healthcheck.meta.connectivity",
"check": "DogtagCACertsConnectivityCheck",
"result": "CRITICAL",
"uuid": "bb5c2f08-e28e-47d7-9752-404f83fb67a8",
"when": "20250320203345Z",
"duration": "0.035959",
"kw": {
"msg": "Internal server error. Is your CA subsystem and LDAP
database up?",
"instance_name": "pki-tomcat",
"exception": "HTTPSConnectionPool(host='mserver.example.com',
port=8443): Max retries exceeded with url: /ca/admin/ca/getStatus
(Caused by NewConnectionError('<urllib3.connection.HTTPSConnection
object at 0x7f1a6e9194f0>: Failed to establish a new connection: [Errno
111] Connection refused'))"
}
},
{
"source": "ipahealthcheck.dogtag.ca",
"check": "DogtagCertsConnectivityCheck",
"result": "ERROR",
"uuid": "2c134180-e055-41fe-bd8e-8aa9ca4f56a6",
"when": "20250320203346Z",
"duration": "0.423802",
"kw": {
"key": "cert_show_ra",
"error": "cannot connect to
'https://mserver.example.com:443/ca/rest/certs/41': [SSL:
SSLV3_ALERT_CERTIFICATE_EXPIRED] sslv3 alert certificate expired
(_ssl.c:2633)",
"serial": "41",
"msg": "Request for certificate failed: {error}"
}
},
{
"source": "ipahealthcheck.ds.replication",
"check": "ReplicationCheck",
"result": "ERROR",
"uuid": "55b716e8-43e9-44b0-8764-4263d283dc2d",
"when": "20250320203347Z",
"duration": "0.346086",
"kw": {
"key": "DSREPLLE0003",
"items": [
"Replication",
"Agreement"
],
"msg": "The replication agreement (metofserver.example.com) under
\"dc=IPA,dc=ss,dc=lan\" is not in synchronization.\nStatus message:
error (18) can't acquire replica (incremental update transient warning.
backing off, will retry update later.)"
}
},
{
"source": "ipahealthcheck.ds.replication",
"check": "ReplicationCheck",
"result": "ERROR",
"uuid": "37bc48b0-7eca-4576-8e61-b30b1bde621b",
"when": "20250320203347Z",
"duration": "0.346109",
"kw": {
"key": "DSREPLLE0003",
"items": [
"Replication",
"Agreement"
],
"msg": "The replication agreement (catofserver.example.com) under
\"o=ipaca\" is not in synchronization.\nStatus message: error (18) can't
acquire replica (incremental update transient warning. backing off,
will retry update later.)"
}
},
{
"source": "ipahealthcheck.ipa.certs",
"check": "IPACertmongerExpirationCheck",
"result": "ERROR",
"uuid": "3170174f-6bb6-4afc-82f0-a795791036ed",
"when": "20250320203347Z",
"duration": "0.010887",
"kw": {
"key": "20240325182332",
"expiration_date": "20250217085937Z",
"msg": "Request id {key} expired on {expiration_date}"
}
},
{
"source": "ipahealthcheck.ipa.certs",
"check": "IPACertmongerExpirationCheck",
"result": "ERROR",
"uuid": "727c67e4-f647-4942-b9f4-2861ffd244a8",
"when": "20250320203347Z",
"duration": "0.013823",
"kw": {
"key": "20240325182333",
"expiration_date": "20250217085837Z",
"msg": "Request id {key} expired on {expiration_date}"
}
},
{
"source": "ipahealthcheck.ipa.certs",
"check": "IPACertmongerExpirationCheck",
"result": "ERROR",
"uuid": "83c634aa-24d0-41df-88c3-401a0ce804f4",
"when": "20250320203347Z",
"duration": "0.016737",
"kw": {
"key": "20240325182337",
"expiration_date": "20250217085847Z",
"msg": "Request id {key} expired on {expiration_date}"
}
},
{
"source": "ipahealthcheck.ipa.certs",
"check": "IPACertmongerExpirationCheck",
"result": "ERROR",
"uuid": "d8ff80a5-f947-48a2-b97c-078becf2f8f9",
"when": "20250320203347Z",
"duration": "0.019678",
"kw": {
"key": "20240325182339",
"expiration_date": "20250217085927Z",
"msg": "Request id {key} expired on {expiration_date}"
}
},
{
"source": "ipahealthcheck.ipa.certs",
"check": "IPACertfileExpirationCheck",
"result": "ERROR",
"uuid": "31b38213-3510-4a6d-b01f-4aef8f01fdfe",
"when": "20250320203347Z",
"duration": "0.059710",
"kw": {
"key": "20240325182332",
"expiration_date": "20250217085937Z",
"msg": "Request id {key} expired on {expiration_date}"
}
},
{
"source": "ipahealthcheck.ipa.certs",
"check": "IPACertfileExpirationCheck",
"result": "ERROR",
"uuid": "140abdf2-c6a6-4f5a-9c4e-1381ad9ffef2",
"when": "20250320203347Z",
"duration": "0.103873",
"kw": {
"key": "20240325182333",
"expiration_date": "20250217085837Z",
"msg": "Request id {key} expired on {expiration_date}"
}
},
{
"source": "ipahealthcheck.ipa.certs",
"check": "IPACertfileExpirationCheck",
"result": "ERROR",
"uuid": "bb70dc48-0382-43a5-80c9-1303302d0332",
"when": "20250320203347Z",
"duration": "0.148327",
"kw": {
"key": "20240325182337",
"expiration_date": "20250217085847Z",
"msg": "Request id {key} expired on {expiration_date}"
}
},
{
"source": "ipahealthcheck.ipa.certs",
"check": "IPACertfileExpirationCheck",
"result": "ERROR",
"uuid": "d7c88743-8fb3-4793-b193-5e7a6a963e4b",
"when": "20250320203348Z",
"duration": "0.192067",
"kw": {
"key": "20240325182339",
"expiration_date": "20250217085927Z",
"msg": "Request id {key} expired on {expiration_date}"
}
},
{
"source": "ipahealthcheck.ipa.certs",
"check": "IPAOpenSSLChainValidation",
"result": "ERROR",
"uuid": "faab3d0d-c726-4d93-a4fd-b3f47cbee7a0",
"when": "20250320203351Z",
"duration": "0.016884",
"kw": {
"key": "/var/lib/ipa/ra-agent.pem",
"reason": "O = IPA.SS.LAN, CN = IPA RA\nerror 10 at 0 depth
lookup: certificate has expired\nerror /var/lib/ipa/ra-agent.pem:
verification failed\n",
"msg": "Certificate validation for {key} failed: {reason}"
}
},
{
"source": "ipahealthcheck.ipa.certs",
"check": "IPACertRevocation",
"result": "ERROR",
"uuid": "c962600a-5f2e-4000-995e-0d6e2c51bf6c",
"when": "20250320203351Z",
"duration": "0.438354",
"kw": {
"key": "20240325182332",
"serial": 41,
"error": "cannot connect to
'https://mserver.example.com:443/ca/rest/certs/41': [SSL:
SSLV3_ALERT_CERTIFICATE_EXPIRED] sslv3 alert certificate expired
(_ssl.c:2633)",
"msg": "Request for certificate serial number {serial} in request
{key} failed: {error}"
}
},
{
"source": "ipahealthcheck.ipa.certs",
"check": "IPACertRevocation",
"result": "ERROR",
"uuid": "524f71a3-92aa-424c-a660-f48efef17684",
"when": "20250320203351Z",
"duration": "0.513622",
"kw": {
"key": "20240325182333",
"serial": 37,
"error": "cannot connect to
'https://mserver.example.com:443/ca/rest/certs/37': [SSL:
SSLV3_ALERT_CERTIFICATE_EXPIRED] sslv3 alert certificate expired
(_ssl.c:2633)",
"msg": "Request for certificate serial number {serial} in request
{key} failed: {error}"
}
},
{
"source": "ipahealthcheck.ipa.certs",
"check": "IPACertRevocation",
"result": "ERROR",
"uuid": "c2f9fc6f-0561-45e9-aa2b-c741b893a173",
"when": "20250320203351Z",
"duration": "0.591474",
"kw": {
"key": "20240325182337",
"serial": 38,
"error": "cannot connect to
'https://mserver.example.com:443/ca/rest/certs/38': [SSL:
SSLV3_ALERT_CERTIFICATE_EXPIRED] sslv3 alert certificate expired
(_ssl.c:2633)",
"msg": "Request for certificate serial number {serial} in request
{key} failed: {error}"
}
},
{
"source": "ipahealthcheck.ipa.certs",
"check": "IPACertRevocation",
"result": "ERROR",
"uuid": "a373bde5-64bd-4cdb-9db1-4b9a565f6d60",
"when": "20250320203351Z",
"duration": "0.667891",
"kw": {
"key": "20240325182339",
"serial": 40,
"error": "cannot connect to
'https://mserver.example.com:443/ca/rest/certs/40': [SSL:
SSLV3_ALERT_CERTIFICATE_EXPIRED] sslv3 alert certificate expired
(_ssl.c:2633)",
"msg": "Request for certificate serial number {serial} in request
{key} failed: {error}"
}
},
{
"source": "ipahealthcheck.ipa.certs",
"check": "IPACertRevocation",
"result": "ERROR",
"uuid": "4adb473e-4604-4f6b-85de-aeda264b2bfd",
"when": "20250320203352Z",
"duration": "0.749218",
"kw": {
"key": "20240325182340",
"serial": 1,
"error": "cannot connect to
'https://mserver.example.com:443/ca/rest/certs/1': [SSL:
SSLV3_ALERT_CERTIFICATE_EXPIRED] sslv3 alert certificate expired
(_ssl.c:2633)",
"msg": "Request for certificate serial number {serial} in request
{key} failed: {error}"
}
},
{
"source": "ipahealthcheck.ipa.certs",
"check": "IPACertRevocation",
"result": "ERROR",
"uuid": "3cd2e311-a4cc-47a1-86fa-c80ae7c35535",
"when": "20250320203352Z",
"duration": "0.826249",
"kw": {
"key": "20240325182341",
"serial": 805175299,
"error": "cannot connect to
'https://mserver.example.com:443/ca/rest/certs/805175299': [SSL:
SSLV3_ALERT_CERTIFICATE_EXPIRED] sslv3 alert certificate expired
(_ssl.c:2633)",
"msg": "Request for certificate serial number {serial} in request
{key} failed: {error}"
}
},
{
"source": "ipahealthcheck.ipa.certs",
"check": "IPACertRevocation",
"result": "ERROR",
"uuid": "3355e9e4-e18d-48b5-9a1f-018ea8a02018",
"when": "20250320203352Z",
"duration": "0.865347",
"kw": {
"key": "20240325182024",
"serial": 805175298,
"error": "cannot connect to
'https://mserver.example.com:443/ca/rest/certs/805175298': [SSL:
SSLV3_ALERT_CERTIFICATE_EXPIRED] sslv3 alert certificate expired
(_ssl.c:2633)",
"msg": "Request for certificate serial number {serial} in request
{key} failed: {error}"
}
},
{
"source": "ipahealthcheck.ipa.certs",
"check": "IPACertRevocation",
"result": "ERROR",
"uuid": "43779b90-74cd-4db1-a1b2-19b30f1400ac",
"when": "20250320203352Z",
"duration": "0.947838",
"kw": {
"key": "20240325182004",
"serial": 805175297,
"error": "cannot connect to
'https://mserver.example.com:443/ca/rest/certs/805175297': [SSL:
SSLV3_ALERT_CERTIFICATE_EXPIRED] sslv3 alert certificate expired
(_ssl.c:2633)",
"msg": "Request for certificate serial number {serial} in request
{key} failed: {error}"
}
},
{
"source": "ipahealthcheck.ipa.certs",
"check": "IPACertRevocation",
"result": "ERROR",
"uuid": "76a26aa3-c56f-4984-8abc-c5113d25f2e2",
"when": "20250320203352Z",
"duration": "0.992108",
"kw": {
"key": "20240325182408",
"serial": 268304393,
"error": "cannot connect to
'https://mserver.example.com:443/ca/rest/certs/268304393': [SSL:
SSLV3_ALERT_CERTIFICATE_EXPIRED] sslv3 alert certificate expired
(_ssl.c:2633)",
"msg": "Request for certificate serial number {serial} in request
{key} failed: {error}"
}
}
]
===================================================================================
*[root@mserver]# ipactl -d status*
[...]
ipa-custodia Service: RUNNING
ipa: DEBUG: request POST
http://mserver.example.com:8080/ca/admin/ca/getStatus
ipa: DEBUG: request body ''
ipa: DEBUG: httplib request failed:
Traceback (most recent call last):
File "/usr/lib/python3.9/site-packages/ipapython/dogtag.py", line
271, in _httplib_request
conn.request(method, path, body=request_body, headers=headers)
File "/usr/lib64/python3.9/http/client.py", line 1285, in request
self._send_request(method, url, body, headers, encode_chunked)
File "/usr/lib64/python3.9/http/client.py", line 1331, in _send_request
self.endheaders(body, encode_chunked=encode_chunked)
File "/usr/lib64/python3.9/http/client.py", line 1280, in endheaders
self._send_output(message_body, encode_chunked=encode_chunked)
File "/usr/lib64/python3.9/http/client.py", line 1040, in _send_output
self.send(msg)
File "/usr/lib64/python3.9/http/client.py", line 980, in send
self.connect()
File "/usr/lib64/python3.9/http/client.py", line 946, in connect
self.sock = self._create_connection(
File "/usr/lib64/python3.9/socket.py", line 844, in create_connection
raise err
File "/usr/lib64/python3.9/socket.py", line 832, in create_connection
sock.connect(sa)
ConnectionRefusedError: [Errno 111] Connection refused
ipa: DEBUG: Failed to check CA status: cannot connect to
'http://mserver.example.com:8080/ca/admin/ca/getStatus': [Errno 111]
Connection refused
pki-tomcatd Service: STOPPED
[...]
===================================================================================
*[root@mserver ~]# getcert list*
Number of certificates and requests being tracked: 9.
Request ID '20240325182004':
status: MONITORING
stuck: no
key pair storage:
type=NSSDB,location='/etc/dirsrv/slapd-IPA-SS-LAN',nickname='Server-Cert',token='NSS
Certificate DB',pinfile='/etc/dirsrv/slapd-IPA-SS-LAN/pwdfile.txt'
certificate:
type=NSSDB,location='/etc/dirsrv/slapd-IPA-SS-LAN',nickname='Server-Cert',token='NSS
Certificate DB'
CA: IPA
issuer: CN=Certificate Authority,O=IPA.SS.LAN
subject: CN=mserver.example.com,O=IPA.SS.LAN
issued: 2024-03-25 20:20:06 EET
expires: 2026-03-26 20:20:06 EET
dns: mserver.example.com
principal name: ldap/[email protected]
key usage:
digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment
eku: id-kp-serverAuth,id-kp-clientAuth
profile: caIPAserviceCert
pre-save command:
post-save command: /usr/libexec/ipa/certmonger/restart_dirsrv
IPA-SS-LAN
track: yes
auto-renew: yes
Request ID '20240325182024':
status: MONITORING
stuck: no
key pair storage:
type=FILE,location='/var/lib/ipa/private/httpd.key',pinfile='/var/lib/ipa/passwds/mserver.example.com-443-RSA'
certificate: type=FILE,location='/var/lib/ipa/certs/httpd.crt'
CA: IPA
issuer: CN=Certificate Authority,O=IPA.SS.LAN
subject: CN=mserver.example.com,O=IPA.SS.LAN
issued: 2024-03-25 20:20:25 EET
expires: 2026-03-26 20:20:25 EET
dns: mserver.example.com,ipa-ca.IPA.SS.LAN
principal name: HTTP/[email protected]
key usage:
digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment
eku: id-kp-serverAuth,id-kp-clientAuth
profile: caIPAserviceCert
pre-save command:
post-save command: /usr/libexec/ipa/certmonger/restart_httpd
track: yes
auto-renew: yes
Request ID '20240325182332':
status: CA_WORKING
stuck: no
key pair storage: type=FILE,location='/var/lib/ipa/ra-agent.key'
certificate: type=FILE,location='/var/lib/ipa/ra-agent.pem'
CA: dogtag-ipa-ca-renew-agent
issuer: CN=Certificate Authority,O=IPA.SS.LAN
subject: CN=IPA RA,O=IPA.SS.LAN
issued: 2023-02-28 10:59:37 EET
expires: 2025-02-17 10:59:37 EET
key usage:
digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment
eku: id-kp-serverAuth,id-kp-clientAuth
profile: caSubsystemCert
pre-save command: /usr/libexec/ipa/certmonger/renew_ra_cert_pre
post-save command: /usr/libexec/ipa/certmonger/renew_ra_cert
track: yes
auto-renew: yes
Request ID '20240325182333':
status: CA_WORKING
stuck: no
key pair storage:
type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='auditSigningCert
cert-pki-ca',token='NSS Certificate DB',pin set
certificate:
type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='auditSigningCert
cert-pki-ca',token='NSS Certificate DB'
CA: dogtag-ipa-ca-renew-agent
issuer: CN=Certificate Authority,O=IPA.SS.LAN
subject: CN=CA Audit,O=IPA.SS.LAN
issued: 2023-02-28 10:58:37 EET
expires: 2025-02-17 10:58:37 EET
key usage: digitalSignature,nonRepudiation
profile: caSignedLogCert
pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert
"auditSigningCert cert-pki-ca"
track: yes
auto-renew: yes
Request ID '20240325182337':
status: CA_WORKING
stuck: no
key pair storage:
type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='ocspSigningCert
cert-pki-ca',token='NSS Certificate DB',pin set
certificate:
type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='ocspSigningCert
cert-pki-ca',token='NSS Certificate DB'
CA: dogtag-ipa-ca-renew-agent
issuer: CN=Certificate Authority,O=IPA.SS.LAN
subject: CN=OCSP Subsystem,O=IPA.SS.LAN
issued: 2023-02-28 10:58:47 EET
expires: 2025-02-17 10:58:47 EET
eku: id-kp-OCSPSigning
profile: caOCSPCert
pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert
"ocspSigningCert cert-pki-ca"
track: yes
auto-renew: yes
Request ID '20240325182339':
status: CA_WORKING
stuck: no
key pair storage:
type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='subsystemCert
cert-pki-ca',token='NSS Certificate DB',pin set
certificate:
type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='subsystemCert
cert-pki-ca',token='NSS Certificate DB'
CA: dogtag-ipa-ca-renew-agent
issuer: CN=Certificate Authority,O=IPA.SS.LAN
subject: CN=CA Subsystem,O=IPA.SS.LAN
issued: 2023-02-28 10:59:27 EET
expires: 2025-02-17 10:59:27 EET
key usage:
digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment
eku: id-kp-serverAuth,id-kp-clientAuth
profile: caSubsystemCert
pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert
"subsystemCert cert-pki-ca"
track: yes
auto-renew: yes
Request ID '20240325182340':
status: MONITORING
stuck: no
key pair storage:
type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='caSigningCert
cert-pki-ca',token='NSS Certificate DB',pin set
certificate:
type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='caSigningCert
cert-pki-ca',token='NSS Certificate DB'
CA: dogtag-ipa-ca-renew-agent
issuer: CN=Certificate Authority,O=IPA.SS.LAN
subject: CN=Certificate Authority,O=IPA.SS.LAN
issued: 2017-06-20 18:03:50 EEST
expires: 2037-06-20 18:03:50 EEST
key usage: digitalSignature,nonRepudiation,keyCertSign,cRLSign
profile: caCACert
pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert
"caSigningCert cert-pki-ca"
track: yes
auto-renew: yes
Request ID '20240325182341':
status: MONITORING
stuck: no
key pair storage:
type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='Server-Cert
cert-pki-ca',token='NSS Certificate DB',pin set
certificate:
type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='Server-Cert
cert-pki-ca',token='NSS Certificate DB'
CA: dogtag-ipa-ca-renew-agent
issuer: CN=Certificate Authority,O=IPA.SS.LAN
subject: CN=mserver.example.com,O=IPA.SS.LAN
issued: 2024-03-25 20:22:48 EET
expires: 2026-03-15 20:22:48 EET
key usage:
digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment
eku: id-kp-serverAuth,id-kp-clientAuth,id-kp-emailProtection
profile: caServerCert
pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert
"Server-Cert cert-pki-ca"
track: yes
auto-renew: yes
Request ID '20240325182408':
status: MONITORING
stuck: no
key pair storage:
type=FILE,location='/var/kerberos/krb5kdc/kdc.key'
certificate: type=FILE,location='/var/kerberos/krb5kdc/kdc.crt'
CA: IPA
issuer: CN=Certificate Authority,O=IPA.SS.LAN
subject: CN=mserver.example.com,O=IPA.SS.LAN
issued: 2024-03-25 20:24:13 EET
expires: 2026-03-26 20:24:13 EET
dns: mserver.example.com
principal name: krbtgt/[email protected]
key usage:
digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment
eku: id-kp-serverAuth,id-pkinit-KPKdc
profile: KDCs_PKINIT_Certs
pre-save command:
post-save command: /usr/libexec/ipa/certmonger/renew_kdc_cert
track: yes
auto-renew: yes
===================================================================================
Thanks in advance,
Petros
--
_______________________________________________
FreeIPA-users mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Fedora Code of Conduct:
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives:
https://lists.fedorahosted.org/archives/list/[email protected]
Do not reply to spam, report it:
https://pagure.io/fedora-infrastructure/new_issue