Thursday, April 7, 2016

[389-users] Re: admin and Directory Manager accounts cannot log into 389-console

Hello Mr. Brown,
the problem is still not resolved.

I ran, as you suggested:
root@wsf-LabLDAP:/etc/openldap/cacerts> certutil -L -d /etc/dirsrv/slapd-E2WAN/ -n wsf-LabCA.lab.aero.org -a > wsf-LabCA.lab.aero.org.pem

Then I ran the cacertdir_hash command (not realizing I needed to provide a directory, I have never heard of the command), in the following manner:
root@wsf-LabLDAP:/etc/openldap/cacerts> cacertdir_rehash /etc/openldap/cacerts/

I confirmed the link is in place:
root@wsf-LabLDAP:/etc/openldap/cacerts> ls -l
total 8
lrwxrwxrwx. 1 root root 25 Apr 7 07:04 415ee41f.0 -> authconfig_downloaded.pem
lrwxrwxrwx. 1 root root 26 Apr 7 07:04 415ee41f.1 -> wsf-LabCA.lab.aero.org.pem
-rw-r--r--. 1 root root 1501 Apr 5 16:54 authconfig_downloaded.pem
-rw-r--r--. 1 root root 1523 Apr 7 07:03 wsf-LabCA.lab.aero.org.pem

and Re-executed the ldapsearch command from before:
root@wsf-LabLDAP:/etc/openldap/cacerts> ldapsearch -d 5 -x -L -b 'dc=lab,dc=aero,dc=org'
ldap_create
ldap_sasl_bind
ldap_send_initial_request
ldap_new_connection 1 1 0
ldap_int_open_connection
ldap_connect_to_host: TCP wsf-LabLDAP.lab.aero.org:636
ldap_new_socket: 3
ldap_prepare_socket: 3
ldap_connect_to_host: Trying 192.168.2.243:636
ldap_pvt_connect: fd: 3 tm: -1 async: 0
attempting to connect:
connect success
TLS: certdb config: configDir='/etc/openldap/cacerts' tokenDescription='ldap(0)' certPrefix='' keyPrefix='' flags=readOnly
TLS: cannot open certdb '/etc/openldap/cacerts', error -8018:Unknown PKCS #11 error.
TLS: loaded CA certificate file /etc/openldap/cacerts/415ee41f.0 from CA certificate directory /etc/openldap/cacerts.
TLS: skipping 'authconfig_downloaded.pem' - filename does not have expected format (certificate hash with numeric suffix)
TLS: skipping 'wsf-LabCA.lab.aero.org.pem' - filename does not have expected format (certificate hash with numeric suffix)
TLS: loaded CA certificate file /etc/openldap/cacerts/415ee41f.1 from CA certificate directory /etc/openldap/cacerts.
TLS: certificate [CN=wsf-LabLDAP.lab.aero.org,OU=Aerospace,O=Aerospace,L=Chantilly,ST=Virginia,C=US] is not valid - error -8181:Peer's Certificate has expired..
TLS: error: connect - force handshake failure: errno 0 - moznss error -8157
TLS: can't connect: TLS error -8157:Certificate extension not found..
ldap_err2string
ldap_sasl_bind(SIMPLE): Can't contact LDAP server (-1)


My CA cert is not expired, but my wsf-LabLDAP certificate WAS expired. I renewed the certificate (using the original CSR for wsf-LabLDAP) and I did copy it over to the
wsf-LabLDAP server into the same place as the original .crt file; which is /etc/pki/CA.
root@wsf-LabLDAP:/etc/pki/CA/certs> ls -l
total 20
-rw-r--r--. 1 root root 1501 Mar 24 2014 wsf-LabCA.crt
-rw-r--r--. 1 root root 4693 Apr 1 13:40 wsf-LabLDAP-AdminServer.crt
-rw-r--r--. 1 root root 4694 Apr 1 13:40 wsf-LabLDAP.crt

What I don't know how to do is get (is it called the?) certdb file for 389-ds updated with the new certificates you see listed above. Considering when I installed them in the first place I use the 389-console to make those exact updates.

If RedHat/CentOS uses /etc/openldap/cacerts as the location to store the authconfig-gtk downloaded file from the CA it was pointed at, how does it get it into the appropriate database? automatically?
--
389 users mailing list
389-users@%(host_name)s
http://lists.fedoraproject.org/admin/lists/389-users@lists.fedoraproject.org

No comments:

Post a Comment