Re: [389-users] SSL Cert Issue

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



John Mancuso wrote:
> That's what it was! thanks. Unfortunately going across subdomains was a no go :
>
> -12276 (Unable to communicate securely with peer: requested domain
> name does not match the server's certificate.
>
> I tried to generate a self signed wildcard (cn=*.mycompany.com) but no
> luck there. Thanks anyways!
>   
Use SubjectAltName instead of wildcards - 
http://directory.fedoraproject.org/wiki/Howto:SSL#Using_Subject_Alt_Name
> On Thu, Sep 9, 2010 at 9:02 AM, Rob Crittenden <rcritten@xxxxxxxxxx> wrote:
>   
>> John Mancuso wrote:
>>     
>>> I followed the exact procedure below numerous times with the same
>>> frustrating error:
>>>
>>>
>>> http://www.redhat.com/docs/manuals/dir-server/ag/8.0/Managing_SSL-Using_certutil.html#certutil-procedure
>>>
>>> !481 $ openssl verify cacert_core.asc
>>> cacert_core.asc: /DC=tv/DC=freewheel/CN=CA cert
>>> error 18 at 0 depth lookup:self signed certificate
>>> OK
>>>
>>> !482 $ openssl verify cacert_PEKdev020.asc
>>> cacert_PEKdev020.asc: /DC=tv/DC=freewheel/CN=CA cert
>>> error 18 at 0 depth lookup:self signed certificate
>>> OK
>>>
>>> !474 $ certutil -V -u V -d . -n "Core CA certificate"
>>> certutil: certificate is valid
>>>
>>> !476 $ certutil -V -u V -d . -n "Core Server-Cert"
>>> certutil: certificate is valid
>>>
>>> I also imported the consumers CA cert into the supplier ... this is
>>> correct? I tried only importing the suppliers CA cert before with the
>>> same issue (trying everything here!)
>>>
>>> This looks strange though (why the duplicate cert):
>>>
>>> !478 $ certutil -d . -L
>>>
>>> Certificate Nickname                                         Trust
>>> Attributes
>>>
>>>  SSL,S/MIME,JAR/XPI
>>> Core Server-Cert                                             u,u,u
>>> Core CA certificate                                          CTu,u,u
>>> Core CA certificate                                          CT,,
>>>
>>>       
>> Ok, I think I know what you're seeing. Did you do the same procedure on both
>> the master and the replica?
>>
>> If you did then you created two separate CAs that know nothing about each
>> other and don't trust one another.
>>
>> You probably just want one CA in this case so I'd just pick either the
>> master or replica and issue another server certificate from it:
>>
>> certutil -S -n "Replica-Cert" -s "cn=FQDN" -c "CA certificate" -t "u,u,u" -m
>> 1001 -v 120 -d . -k rsa -g 1024 -f /tmp/pwdfile
>>
>> Then use pk12util to create a PKCS#12 file containing the cert and private
>> key:
>>
>> pk12util -o replica.p12 -d . -n Replica-Cert
>>
>> Ship this over to the replica and import it with:
>>
>> pk12util -i replica.p12 -d .
>>
>> The CA cert should be included in the PKCS#12 file but if it isn't you'll
>> need to grab it from the master and install it on the replica.
>>
>> rob
>>
>>     
>>> On Wed, Sep 8, 2010 at 10:49 PM, Rob Crittenden<rcritten@xxxxxxxxxx>
>>>  wrote:
>>>       
>>>> John Mancuso wrote:
>>>>         
>>>>> Two questions:
>>>>>
>>>>> 1. I have generated self-signed ssl/ca certs trying both the
>>>>> "certutil" method from the redhat doc and also the standard "openssl
>>>>> x509 req -new" method. After installing the certs and enabling secure
>>>>> ldaps replication both result in
>>>>>
>>>>> slapi_ldap_bind - Error: could not send bind request for id
>>>>> [cn=replication manager,cn=config] mech [SIMPLE]: error 81 (Can't
>>>>> contact LDAP server) -8172 (Peer's certificate issuer has been marked
>>>>> as not trusted by the user.) 11 (Resource temporarily unavailable)
>>>>>
>>>>> Is there a known issue with self-signed certs?
>>>>>           
>>>> No, they work fine. Did you add the CA certificate that signed the server
>>>> certificate as well?
>>>>
>>>> You can verify that the certificate is ok on the server with:
>>>>
>>>> certutil -V -u V -d /etc/dirsrv/slapd-<YOUR_INSTANCE>
>>>>
>>>> You are probably just missing the CA certificate. If you have it in PEM
>>>> format you can add it via the command-line with:
>>>>
>>>> certutil -A -d /etc/dirsrv/slapd-<YOUR_INSTANCE>  -n 'Your CA' -t CT,,
>>>> -a<
>>>> /path/to/ca.pem
>>>>
>>>> The 'Your CA' here is the nickname of the CA certificate. It is how it
>>>> will
>>>> appear in the DS console and using certutil -L. Pick something meaningful
>>>> to
>>>> you.
>>>>
>>>>         
>>>>> 2. If there is an issue with the above, we may end up purchasing a
>>>>> wildcard cert for replicating across subdomains. I know in the HTML
>>>>> world some web browsers complain about ssl wildcard certs across
>>>>> subdomains. Any possible issues with this approach?
>>>>>
>>>>> ldaps://supplier_ldap.mycompany.com---->
>>>>>  ldaps://consumer_ldap.dev.mycompany.com
>>>>>           
>>>> A wildcard cert will work but its probably overkill to buy one just for
>>>> this
>>>> purpose. self-signed certificates will work fine.
>>>>
>>>> rob
>>>>
>>>>         
>>> --
>>> 389 users mailing list
>>> 389-users@xxxxxxxxxxxxxxxxxxxxxxx
>>> https://admin.fedoraproject.org/mailman/listinfo/389-users
>>>       
>>     
> --
> 389 users mailing list
> 389-users@xxxxxxxxxxxxxxxxxxxxxxx
> https://admin.fedoraproject.org/mailman/listinfo/389-users
>   

--
389 users mailing list
389-users@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/389-users


[Index of Archives]     [Fedora Directory Users]     [Fedora Directory Devel]     [Fedora Announce]     [Fedora Legacy Announce]     [Kernel]     [Fedora Legacy]     [Share Photos]     [Fedora Desktop]     [PAM]     [Red Hat Watch]     [Red Hat Development]     [Big List of Linux Books]     [Gimp]     [Yosemite News]

  Powered by Linux