{"id":6088,"date":"2022-09-28T01:41:56","date_gmt":"2022-09-28T05:41:56","guid":{"rendered":"https:\/\/microdevsys.com\/wp\/?p=6088"},"modified":"2022-09-30T13:34:48","modified_gmt":"2022-09-30T17:34:48","slug":"internal-database-error-encountered-could-not-connect-to-ldap-server-host-idmipa01-nix-mds-xyz-port-636-error-netscape-ldap-ldapexception-authentication-failed-48","status":"publish","type":"post","link":"https:\/\/microdevsys.com\/wp\/internal-database-error-encountered-could-not-connect-to-ldap-server-host-idmipa01-nix-mds-xyz-port-636-error-netscape-ldap-ldapexception-authentication-failed-48\/","title":{"rendered":"Internal Database Error encountered: Could not connect to LDAP server host idmipa01.nix.mds.xyz port 636 Error netscape.ldap.LDAPException: Authentication failed (48)"},"content":{"rendered":"<p>\n\tRestore VM&#39;s from snapshot.&nbsp; Yes, this is a new attempt at restoring some FreeIPA hosts that have been, ahem, neglected slightly to the point where things expired and don&#39;t work.&nbsp; A few unexpected reboots and FS corruption didn&#39;t help the matter either.&nbsp; Regardless, the recovery will in many ways show off the&nbsp;restoration capabilities of.FreeIPA which have certinly grew with the product.&nbsp; Once again we see the following in the debug logs:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"><strong># tail -f \/var\/log\/pki\/pki-tomcat\/ca\/debug -n 200<\/strong><br \/>\n\tCould not connect to LDAP server host idmipa01.nix.mds.xyz port 636 Error netscape.ldap.LDAPException: Authentication failed (48)<br \/>\n\tInternal Database Error encountered: Could not connect to LDAP server host idmipa01.nix.mds.xyz port 636 Error netscape.ldap.LDAPException: Authentication failed (48)<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; at com.netscape.cmscore.dbs.DBSubsystem.init(DBSubsystem.java:689)<\/span>\n<\/p>\n<p>\n\tUse <strong>idmipa01<\/strong> to fix certificates. &nbsp;Set <strong>idmipa01<\/strong> as renewal master, if not already:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<strong><span style=\"font-family:courier new,courier,monospace;\"># ipa config-mod \\<br \/>\n\t&nbsp; &nbsp; &nbsp; &#8211;ca-renewal-master-server idmipa01.nix.mds.xyz \\<br \/>\n\t&nbsp; &nbsp; &nbsp; | grep &#39;CA renewal master&#39;<\/span><\/strong>\n<\/p>\n<p>\n\tSet idmipa02 as following the renewal master (idmipa01 is designated \/ defacto master in the cluster)\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\">[ idmipa01 ]<br \/>\n\t<strong># ipa config-show | grep &#39;IPA CA renewal master&#39;<\/strong><br \/>\n\t&nbsp; IPA CA renewal master: idmipa02.nix.mds.xyz<\/span>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\">[ idmipa02 ]<br \/>\n\t<strong># ipa config-show | grep &#39;IPA CA renewal master&#39;<\/strong><br \/>\n\t&nbsp; IPA CA renewal master: idmipa02.nix.mds.xyz<\/span>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\">[ idmipa02 ]<br \/>\n\t<strong># ipa config-mod \\<br \/>\n\t&nbsp; &nbsp; &nbsp; &#8211;ca-renewal-master-server idmipa01.nix.mds.xyz \\<br \/>\n\t&nbsp; &nbsp; &nbsp; | grep &#39;CA renewal master&#39;<\/strong><\/span>\n<\/p>\n<p>\n\tOnce this is done, certs appear with expiration dates as below:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"><strong># getcert list|grep -Ei expire<\/strong><br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2022-09-12 03:14:57 UTC<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2020-10-03 20:04:58 UTC<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2022-09-12 03:13:58 UTC<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2036-11-21 07:32:02 UTC<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2022-09-12 03:13:48 UTC<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2022-09-12 03:13:47 UTC<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2022-10-05 23:00:29 UTC<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2022-10-05 23:00:59 UTC<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2023-09-26 00:54:45 UTC<\/span>\n<\/p>\n<p>\n\tStart the IPA service ignoring failures:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<strong><span style=\"font-family:courier new,courier,monospace;\"># ipactl restart &#8211;ignore-service-failure<\/span><\/strong>\n<\/p>\n<p>\n\tFollow steps on this RH blog:\n<\/p>\n<p>\n\t<a href=\"https:\/\/access.redhat.com\/solutions\/3357261\" rel=\"external nofollow\">https:\/\/access.redhat.com\/solutions\/3357261<\/a>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<strong><span style=\"font-family:courier new,courier,monospace;\"># systemctl stop ntpd<\/span><\/strong>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"># for nickname in &quot;auditSigningCert cert-pki-ca&quot; &quot;ocspSigningCert cert-pki-ca&quot; &quot;subsystemCert cert-pki-ca&quot; &quot;Server-Cert cert-pki-ca&quot;<br \/>\n\tdo<br \/>\n\t&nbsp; certdate=$(date -d &quot;`certutil -L -d \/etc\/pki\/pki-tomcat\/alias -n &quot;${nickname}&quot; | grep -i after | cut -d: -f2-`&quot; +%s )<br \/>\n\t&nbsp; echo &quot;$nickname &#8211; $certdate&quot;<br \/>\n\t&nbsp; [[ ${newdate:-99999999999} -gt &#8220;${certdate}&#8221; ]] &amp;&amp; newdate=$certdate<br \/>\n\tdone<br \/>\n\tdate &#8211;set=&quot;`date &#8211;date=@$[newdate &#8211; 86400]`&quot;<\/span>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"># systemctl restart certmonger<\/span>\n<\/p>\n<p>\n\tWe are greeted with the following since the site certificate is valid only in the future:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"><strong># getcert list|grep -Ei expire<\/strong><br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2020-10-03 20:05:47 UTC<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2020-10-03 20:04:58 UTC<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2022-09-12 03:13:58 UTC<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2036-11-21 07:32:02 UTC<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2022-09-12 03:13:48 UTC<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2022-09-12 03:13:47 UTC<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; ca-error: Server at https:\/\/idmipa01.nix.mds.xyz\/ipa\/xml failed request, will retry: -504 (libcurl failed to execute the HTTP POST transaction, explaining: &nbsp;Peer&#39;s Certificate has expired.).<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2022-10-05 23:00:29 UTC<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; ca-error: Server at https:\/\/idmipa01.nix.mds.xyz\/ipa\/xml failed request, will retry: -504 (libcurl failed to execute the HTTP POST transaction, explaining: &nbsp;Peer&#39;s Certificate has expired.).<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2022-10-05 23:00:59 UTC<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2023-09-26 00:54:45 UTC<\/span>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"><strong># openssl s_client -showcerts -connect idmipa01.nix.mds.xyz:443<\/strong><br \/>\n\tCONNECTED(00000003)<br \/>\n\tdepth=1 O = NIX.MDS.XYZ, CN = Certificate Authority<br \/>\n\tverify return:1<br \/>\n\tdepth=0 O = NIX.MDS.XYZ, CN = idmipa01.nix.mds.xyz<br \/>\n\tverify error:num=9:certificate is not yet valid<br \/>\n\tnotBefore=Oct &nbsp;4 23:00:59 2020 GMT<br \/>\n\tverify return:1<br \/>\n\tdepth=0 O = NIX.MDS.XYZ, CN = idmipa01.nix.mds.xyz<br \/>\n\tnotBefore=Oct &nbsp;4 23:00:59 2020 GMT<br \/>\n\tverify return:1<br \/>\n\t&#8212;<br \/>\n\tCertificate chain<br \/>\n\t&nbsp;0 s:\/O=NIX.MDS.XYZ\/CN=idmipa01.nix.mds.xyz<br \/>\n\t&nbsp; &nbsp;i:\/O=NIX.MDS.XYZ\/CN=Certificate Authority<\/span>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\">[ &#8230;. ]<\/span>\n<\/p>\n<p>\n\tWe notice that the date on the host was set to:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\">Fri Oct &nbsp;2 20:12:43 EDT 2020<\/span>\n<\/p>\n<p>\n\twhich is pior to the earliest date in the certificates:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"><strong># getcert list|grep -Ei expire<\/strong><br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2020-10-03 20:05:47 UTC<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2020-10-03 20:04:58 UTC<\/span>\n<\/p>\n<p>\n\tHowever, the Apache \/ HTTPD SSL Certificate is only valid after:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\">notBefore=Oct &nbsp;4 23:00:59 2020 GMT<\/span>\n<\/p>\n<p>\n\tSo we either need to update the HTTPD certificate or move the date past Oct 4th 2020. &nbsp;Let&#39;s set the date to Oct 4th:&nbsp;\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"># for nickname in &quot;auditSigningCert cert-pki-ca&quot; &quot;ocspSigningCert cert-pki-ca&quot; &quot;subsystemCert cert-pki-ca&quot; &quot;Server-Cert cert-pki-ca&quot;<br \/>\n\tdo<br \/>\n\t&nbsp; certdate=$(date -d &quot;`certutil -L -d \/etc\/pki\/pki-tomcat\/alias -n &quot;${nickname}&quot; | grep -i after | cut -d: -f2-`&quot; +%s )<br \/>\n\t&nbsp; echo &quot;$nickname &#8211; $certdate&quot;<br \/>\n\t&nbsp; [[ ${newdate:-99999999999} -gt &#8220;${certdate}&#8221; ]] &amp;&amp; newdate=$certdate<br \/>\n\tdone<br \/>\n\tdate &#8211;set=&quot;`date &#8211;date=@$[newdate + 172800]`&quot;<\/span>\n<\/p>\n<p>\n\tRestart certmonger and check status:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<strong><span style=\"font-family:courier new,courier,monospace;\"># systemctl restart certmonger<\/span><\/strong>\n<\/p>\n<p>\n\tcheck status:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<strong><span style=\"font-family:courier new,courier,monospace;\"># getcert list<\/span><\/strong>\n<\/p>\n<p>\n\tStill expired. &nbsp;Did some reading:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<a href=\"https:\/\/frasertweedale.github.io\/blog-redhat\/posts\/2019-05-24-ipa-cert-fix.html\" rel=\"external nofollow\">https:\/\/frasertweedale.github.io\/blog-redhat\/posts\/2019-05-24-ipa-cert-fix.html<\/a>\n<\/p>\n<p>\n\tand decided to try:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<strong><span style=\"font-family:courier new,courier,monospace;\"># ipa-cert-fix<\/span><\/strong>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; WARNING<\/span>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\">ipa-cert-fix is intended for recovery when expired certificates<br \/>\n\tprevent the normal operation of IPA. &nbsp;It should ONLY be used<br \/>\n\tin such scenarios, and backup of the system, especially certificates<br \/>\n\tand keys, is STRONGLY RECOMMENDED.<\/span>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<br \/>\n\t<span style=\"font-family:courier new,courier,monospace;\">The following certificates will be renewed:<\/span>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\">Dogtag ca_ocsp_signing certificate:<br \/>\n\t&nbsp; Subject: CN=OCSP Subsystem,O=NIX.MDS.XYZ<br \/>\n\t&nbsp; Serial: &nbsp;17<br \/>\n\t&nbsp; Expires: 2020-10-03 20:04:58<\/span>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\">Dogtag ca_audit_signing certificate:<br \/>\n\t&nbsp; Subject: CN=CA Audit,O=NIX.MDS.XYZ<br \/>\n\t&nbsp; Serial: &nbsp;15<br \/>\n\t&nbsp; Expires: 2020-10-03 20:05:47<\/span>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\">Enter &quot;yes&quot; to proceed: yes<br \/>\n\tProceeding.<br \/>\n\tRenewed Dogtag ca_ocsp_signing certificate:<br \/>\n\t&nbsp; Subject: CN=OCSP Subsystem,O=NIX.MDS.XYZ<br \/>\n\t&nbsp; Serial: &nbsp;31<br \/>\n\t&nbsp; Expires: 2022-09-26 00:11:14<\/span>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\">Renewed Dogtag ca_audit_signing certificate:<br \/>\n\t&nbsp; Subject: CN=CA Audit,O=NIX.MDS.XYZ<br \/>\n\t&nbsp; Serial: &nbsp;32<br \/>\n\t&nbsp; Expires: 2022-09-26 00:12:16<\/span>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\">Becoming renewal master.<br \/>\n\tThe ipa-cert-fix command was successful<\/span>\n<\/p>\n<p>\n\t<br \/>\n\tWhich was apparently successful though failed to renew things:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"><strong># getcert list|grep -Ei expire<\/strong><br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2020-10-03 20:05:47 UTC *<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2020-10-03 20:04:58 UTC *<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2022-09-12 03:13:58 UTC<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2036-11-21 07:32:02 UTC<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2022-09-12 03:13:48 UTC<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2022-09-12 03:13:47 UTC<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2022-10-05 23:00:29 UTC<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2022-10-05 23:00:59 UTC<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2023-09-26 00:54:45 UTC<\/span>\n<\/p>\n<p>\n\tRestart certmonger which now captures correct dates:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"><strong># systemctl restart certmonger<br \/>\n\t#&nbsp;getcert list|grep -Ei expire<\/strong><br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2022-09-26 00:12:16 UTC *<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2022-09-26 00:11:14 UTC *<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2022-09-12 03:13:58 UTC<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2036-11-21 07:32:02 UTC<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2022-09-12 03:13:48 UTC<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2022-09-12 03:13:47 UTC<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2022-10-05 23:00:29 UTC<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2022-10-05 23:00:59 UTC<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2023-09-26 00:54:45 UTC<\/span>\n<\/p>\n<p>\n\tRestart IPA services ignoring failures in the process, while still maintaining the reset date of Oct 5th 2020 (Today is Sep 25 2022)\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"><strong># ipactl restart &#8211;ignore-service-failure<\/strong><br \/>\n\tRestarting Directory Service<br \/>\n\tRestarting krb5kdc Service<br \/>\n\tRestarting kadmin Service<br \/>\n\tRestarting named Service<br \/>\n\tRestarting httpd Service<br \/>\n\tRestarting ipa-custodia Service<br \/>\n\tRestarting ntpd Service<br \/>\n\tRestarting pki-tomcatd Service<br \/>\n\tRestarting smb Service<br \/>\n\tRestarting winbind Service<br \/>\n\tRestarting ipa-otpd Service<br \/>\n\tRestarting ipa-dnskeysyncd Service<br \/>\n\tipa: INFO: The ipactl command was successful<\/span>\n<\/p>\n<p>\n\tThis is the part where I realize the system was using the hwclcok date not the &#39;date&#39; date (facepalm):\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"><strong># date<\/strong><br \/>\n\tMon Oct &nbsp;5 20:18:46 EDT 2020<br \/>\n\t<strong># hwclock<\/strong><br \/>\n\tSun 25 Sep 2022 09:35:45 PM EDT &nbsp;-0.321095 seconds<\/span>\n<\/p>\n<p>\n\tHence why cert dates came back with 2022. &nbsp;Whatever, let&#39;s set the date back. &nbsp;It may work but let&#39;s check the UI certs. &nbsp;Copy the openssl output certificate portions from above into a file and run the following:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"><strong># cat site-cert.pem<\/strong><br \/>\n\t&#8212;&#8211;BEGIN CERTIFICATE&#8212;&#8211;<br \/>\n\tMIIEmzCCA4OgAwI&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;HIFvjW5pjp58mflhQ==<br \/>\n\t&#8212;&#8211;END CERTIFICATE&#8212;&#8211;<br \/>\n\t&nbsp;1 s:\/O=NIX.MDS.XYZ\/CN=Certificate Authority<br \/>\n\t&nbsp; &nbsp;i:\/O=NIX.MDS.XYZ\/CN=Certificate Authority<br \/>\n\t&#8212;&#8211;BEGIN CERTIFICATE&#8212;&#8211;<br \/>\n\tMIIDkDCC&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;..w0T37yu7pbxM<br \/>\n\tLGclqw==<br \/>\n\t&#8212;&#8211;END CERTIFICATE&#8212;&#8211;<\/span>\n<\/p>\n<p>\n\tCheck the site cert extracted from the above command:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"><strong># openssl x509 -enddate -startdate -noout -in site-cert.pem<\/strong><br \/>\n\tnotAfter=Oct &nbsp;5 23:00:59 2022 GMT<br \/>\n\tnotBefore=Oct &nbsp;4 23:00:59 2020 GMT<\/span>\n<\/p>\n<p>\n\tCert appears good until 2022 Oct 5th which we are not yet in. &nbsp;Let&#39;s set the date forwards a tad:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"># <strong>hwclock &#8211;set &#8211;date &quot;Fri Sep 25 21:49:00 EDT 2022&quot;; date -s &quot;Fri Sep 25 21:49:00 EDT 2022&quot;<\/strong><br \/>\n\t# <strong>systemctl restart ntpd<\/strong><br \/>\n\t# <strong>ntpdate -s 192.168.0.12<\/strong>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;# My NTP host.<\/span>\n<\/p>\n<p>\n\tNow try a status and a restart as well:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"><strong># ipactl status<\/strong><br \/>\n\tDirectory Service: RUNNING<br \/>\n\tkrb5kdc Service: RUNNING<br \/>\n\tkadmin Service: RUNNING<br \/>\n\tnamed Service: RUNNING<br \/>\n\thttpd Service: RUNNING<br \/>\n\tipa-custodia Service: RUNNING<br \/>\n\tntpd Service: RUNNING<br \/>\n\tpki-tomcatd Service: RUNNING<br \/>\n\tsmb Service: RUNNING<br \/>\n\twinbind Service: RUNNING<br \/>\n\tipa-otpd Service: RUNNING<br \/>\n\tipa-dnskeysyncd Service: RUNNING<br \/>\n\tipa: INFO: The ipactl command was successful<\/span>\n<\/p>\n<p>\n\tBut checking the certs again, seeing two more that are older then Sep 25 2022:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"><strong># getcert list|grep -Ei expire<\/strong><br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2022-09-26 00:12:16 UTC<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2022-09-26 00:11:14 UTC&nbsp;<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2022-09-12 03:13:58 UTC *<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2036-11-21 07:32:02 UTC<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2022-09-12 03:13:48 UTC *<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2022-09-12 03:13:47 UTC *<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2022-10-05 23:00:29 UTC<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2022-10-05 23:00:59 UTC<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2023-09-26 00:54:45 UTC<\/span>\n<\/p>\n<p>\n\tNeed to move the dates back again to a day prior and renew again:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"># for nickname in &quot;auditSigningCert cert-pki-ca&quot; &quot;ocspSigningCert cert-pki-ca&quot; &quot;subsystemCert cert-pki-ca&quot; &quot;Server-Cert cert-pki-ca&quot;<br \/>\n\tdo<br \/>\n\t&nbsp; certdate=$(date -d &quot;`certutil -L -d \/etc\/pki\/pki-tomcat\/alias -n &quot;${nickname}&quot; | grep -i after | cut -d: -f2-`&quot; +%s )<br \/>\n\t&nbsp; echo &quot;$nickname &#8211; $certdate&quot;<br \/>\n\t&nbsp; [[ ${newdate:-99999999999} -gt &#8220;${certdate}&#8221; ]] &amp;&amp; newdate=$certdate<br \/>\n\tdone<br \/>\n\tdate &#8211;set=&quot;`date &#8211;date=@$[newdate + 86400]`&quot;<\/span>\n<\/p>\n<p>\n\tWell that above command failed:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\">Sun Oct &nbsp;4 20:04:58 EDT 2020<\/span>\n<\/p>\n<p>\n\tThere is no certs with that date:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"># getcert list|grep -Ei expire<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2022-09-26 00:12:16 UTC<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2022-09-26 00:11:14 UTC<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2022-09-12 03:13:58 UTC<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2036-11-21 07:32:02 UTC<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2022-09-12 03:13:48 UTC<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2022-09-12 03:13:47 UTC<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2022-10-05 23:00:29 UTC<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2022-10-05 23:00:59 UTC<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2023-09-26 00:54:45 UTC<\/span>\n<\/p>\n<p>\n\tSo let&#39;s try a modified copy:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"># for nickname in &quot;auditSigningCert cert-pki-ca&quot; &quot;ocspSigningCert cert-pki-ca&quot; &quot;subsystemCert cert-pki-ca&quot; &quot;Server-Cert cert-pki-ca&quot;<br \/>\n\tdo<br \/>\n\t&nbsp; certdate=$(certutil -L -d \/etc\/pki\/pki-tomcat\/alias -n &quot;${nickname}&quot; | grep -i after)<br \/>\n\t&nbsp; echo $certdate;<br \/>\n\tdone<\/span>\n<\/p>\n<p>\n\tSomehow this script is basing this off of the current date? &nbsp;I won&#39;t reverse engineer it and set the date manually instead:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"># <strong>hwclock &#8211;set &#8211;date &quot;Fri Sep 12 01:00:00 EDT 2022&quot;; date -s &quot;Fri Sep 12 01:00:00 EDT 2022&quot;<\/strong><\/span>\n<\/p>\n<p>\n\tYou should see certificates in submitting status now:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"><strong># getcert list<\/strong><br \/>\n\tNumber of certificates and requests being tracked: 9.<br \/>\n\tRequest ID &#39;20180122053031&#39;:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; status: SUBMITTING<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; stuck: no<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; key pair storage: type=NSSDB,location=&#39;\/etc\/pki\/pki-tomcat\/alias&#39;,nickname=&#39;auditSigningCert cert-pki-ca&#39;,token=&#39;NSS Certificate DB&#39;,pin set<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; certificate: type=NSSDB,location=&#39;\/etc\/pki\/pki-tomcat\/alias&#39;,nickname=&#39;auditSigningCert cert-pki-ca&#39;,token=&#39;NSS Certificate DB&#39;<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; CA: dogtag-ipa-ca-renew-agent<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; issuer: CN=Certificate Authority,O=NIX.MDS.XYZ<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; subject: CN=CA Audit,O=NIX.MDS.XYZ<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2022-09-26 00:12:16 UTC<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; key usage: digitalSignature,nonRepudiation<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; pre-save command: \/usr\/libexec\/ipa\/certmonger\/stop_pkicad<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; post-save command: \/usr\/libexec\/ipa\/certmonger\/renew_ca_cert &quot;auditSigningCert cert-pki-ca&quot;<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; track: yes<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; auto-renew: yes<br \/>\n\tRequest ID &#39;20180122053032&#39;:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; status: MONITORING<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; stuck: no<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; key pair storage: type=NSSDB,location=&#39;\/etc\/pki\/pki-tomcat\/alias&#39;,nickname=&#39;ocspSigningCert cert-pki-ca&#39;,token=&#39;NSS Certificate DB&#39;,pin set<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; certificate: type=NSSDB,location=&#39;\/etc\/pki\/pki-tomcat\/alias&#39;,nickname=&#39;ocspSigningCert cert-pki-ca&#39;,token=&#39;NSS Certificate DB&#39;<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; CA: dogtag-ipa-ca-renew-agent<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; issuer: CN=Certificate Authority,O=NIX.MDS.XYZ<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; subject: CN=OCSP Subsystem,O=NIX.MDS.XYZ<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2022-09-26 00:11:14 UTC<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; eku: id-kp-OCSPSigning<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; pre-save command: \/usr\/libexec\/ipa\/certmonger\/stop_pkicad<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; post-save command: \/usr\/libexec\/ipa\/certmonger\/renew_ca_cert &quot;ocspSigningCert cert-pki-ca&quot;<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; track: yes<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; auto-renew: yes<br \/>\n\tRequest ID &#39;20180122053033&#39;:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; status: MONITORING<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; stuck: no<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; key pair storage: type=NSSDB,location=&#39;\/etc\/pki\/pki-tomcat\/alias&#39;,nickname=&#39;subsystemCert cert-pki-ca&#39;,token=&#39;NSS Certificate DB&#39;,pin set<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; certificate: type=NSSDB,location=&#39;\/etc\/pki\/pki-tomcat\/alias&#39;,nickname=&#39;subsystemCert cert-pki-ca&#39;,token=&#39;NSS Certificate DB&#39;<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; CA: dogtag-ipa-ca-renew-agent<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; issuer: CN=Certificate Authority,O=NIX.MDS.XYZ<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; subject: CN=CA Subsystem,O=NIX.MDS.XYZ<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2022-09-12 03:13:58 UTC<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; key usage: digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; eku: id-kp-serverAuth,id-kp-clientAuth<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; pre-save command: \/usr\/libexec\/ipa\/certmonger\/stop_pkicad<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; post-save command: \/usr\/libexec\/ipa\/certmonger\/renew_ca_cert &quot;subsystemCert cert-pki-ca&quot;<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; track: yes<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; auto-renew: yes<br \/>\n\tRequest ID &#39;20180122053034&#39;:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; status: MONITORING<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; stuck: no<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; key pair storage: type=NSSDB,location=&#39;\/etc\/pki\/pki-tomcat\/alias&#39;,nickname=&#39;caSigningCert cert-pki-ca&#39;,token=&#39;NSS Certificate DB&#39;,pin set<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; certificate: type=NSSDB,location=&#39;\/etc\/pki\/pki-tomcat\/alias&#39;,nickname=&#39;caSigningCert cert-pki-ca&#39;,token=&#39;NSS Certificate DB&#39;<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; CA: dogtag-ipa-ca-renew-agent<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; issuer: CN=Certificate Authority,O=NIX.MDS.XYZ<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; subject: CN=Certificate Authority,O=NIX.MDS.XYZ<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2036-11-21 07:32:02 UTC<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; key usage: digitalSignature,nonRepudiation,keyCertSign,cRLSign<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; pre-save command: \/usr\/libexec\/ipa\/certmonger\/stop_pkicad<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; post-save command: \/usr\/libexec\/ipa\/certmonger\/renew_ca_cert &quot;caSigningCert cert-pki-ca&quot;<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; track: yes<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; auto-renew: yes<br \/>\n\tRequest ID &#39;20180122053035&#39;:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; status: SUBMITTING<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; stuck: no<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; key pair storage: type=FILE,location=&#39;\/var\/lib\/ipa\/ra-agent.key&#39;<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; certificate: type=FILE,location=&#39;\/var\/lib\/ipa\/ra-agent.pem&#39;<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; CA: dogtag-ipa-ca-renew-agent<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; issuer: CN=Certificate Authority,O=NIX.MDS.XYZ<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; subject: CN=IPA RA,O=NIX.MDS.XYZ<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2022-09-12 03:13:48 UTC<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; key usage: digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; eku: id-kp-serverAuth,id-kp-clientAuth<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; pre-save command: \/usr\/libexec\/ipa\/certmonger\/renew_ra_cert_pre<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; post-save command: \/usr\/libexec\/ipa\/certmonger\/renew_ra_cert<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; track: yes<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; auto-renew: yes<br \/>\n\tRequest ID &#39;20180122053036&#39;:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; status: MONITORING<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; stuck: no<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; key pair storage: type=NSSDB,location=&#39;\/etc\/pki\/pki-tomcat\/alias&#39;,nickname=&#39;Server-Cert cert-pki-ca&#39;,token=&#39;NSS Certificate DB&#39;,pin set<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; certificate: type=NSSDB,location=&#39;\/etc\/pki\/pki-tomcat\/alias&#39;,nickname=&#39;Server-Cert cert-pki-ca&#39;,token=&#39;NSS Certificate DB&#39;<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; CA: dogtag-ipa-ca-renew-agent<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; issuer: CN=Certificate Authority,O=NIX.MDS.XYZ<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; subject: CN=idmipa01.nix.mds.xyz,O=NIX.MDS.XYZ<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2022-09-12 03:13:47 UTC<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; key usage: digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; eku: id-kp-serverAuth,id-kp-clientAuth<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; pre-save command: \/usr\/libexec\/ipa\/certmonger\/stop_pkicad<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; post-save command: \/usr\/libexec\/ipa\/certmonger\/renew_ca_cert &quot;Server-Cert cert-pki-ca&quot;<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; track: yes<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; auto-renew: yes<br \/>\n\tRequest ID &#39;20180122053037&#39;:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; status: SUBMITTING<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; stuck: no<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; key pair storage: type=NSSDB,location=&#39;\/etc\/dirsrv\/slapd-NIX-MDS-XYZ&#39;,nickname=&#39;Server-Cert&#39;,token=&#39;NSS Certificate DB&#39;,pinfile=&#39;\/etc\/dirsrv\/slapd-NIX-MDS-XYZ\/pwdfile.txt&#39;<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; certificate: type=NSSDB,location=&#39;\/etc\/dirsrv\/slapd-NIX-MDS-XYZ&#39;,nickname=&#39;Server-Cert&#39;,token=&#39;NSS Certificate DB&#39;<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; CA: IPA<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; issuer: CN=Certificate Authority,O=NIX.MDS.XYZ<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; subject: CN=idmipa01.nix.mds.xyz,O=NIX.MDS.XYZ<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2022-10-05 23:00:29 UTC<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; principal name: ldap\/idmipa01.nix.mds.xyz@NIX.MDS.XYZ<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; key usage: digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; eku: id-kp-serverAuth,id-kp-clientAuth<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; pre-save command:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; post-save command: \/usr\/libexec\/ipa\/certmonger\/restart_dirsrv NIX-MDS-XYZ<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; track: yes<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; auto-renew: yes<br \/>\n\tRequest ID &#39;20180122053042&#39;:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; status: SUBMITTING<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; stuck: no<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; key pair storage: type=NSSDB,location=&#39;\/etc\/httpd\/alias&#39;,nickname=&#39;Server-Cert&#39;,token=&#39;NSS Certificate DB&#39;,pinfile=&#39;\/etc\/httpd\/alias\/pwdfile.txt&#39;<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; certificate: type=NSSDB,location=&#39;\/etc\/httpd\/alias&#39;,nickname=&#39;Server-Cert&#39;,token=&#39;NSS Certificate DB&#39;<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; CA: IPA<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; issuer: CN=Certificate Authority,O=NIX.MDS.XYZ<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; subject: CN=idmipa01.nix.mds.xyz,O=NIX.MDS.XYZ<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2022-10-05 23:00:59 UTC<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; principal name: HTTP\/idmipa01.nix.mds.xyz@NIX.MDS.XYZ<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; key usage: digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; eku: id-kp-serverAuth,id-kp-clientAuth<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; pre-save command:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; post-save command: \/usr\/libexec\/ipa\/certmonger\/restart_httpd<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; track: yes<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; auto-renew: yes<br \/>\n\tRequest ID &#39;20180122053135&#39;:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; status: MONITORING<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; stuck: no<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; key pair storage: type=FILE,location=&#39;\/var\/kerberos\/krb5kdc\/kdc.key&#39;<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; certificate: type=FILE,location=&#39;\/var\/kerberos\/krb5kdc\/kdc.crt&#39;<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; CA: SelfSign<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; issuer: CN=idmipa01.nix.mds.xyz,O=NIX.MDS.XYZ<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; subject: CN=idmipa01.nix.mds.xyz,O=NIX.MDS.XYZ<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2023-09-26 00:54:45 UTC<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; principal name: krbtgt\/NIX.MDS.XYZ@NIX.MDS.XYZ<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; certificate template\/profile: KDCs_PKINIT_Certs<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; pre-save command:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; post-save command: \/usr\/libexec\/ipa\/certmonger\/renew_kdc_cert<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; track: yes<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; auto-renew: yes<\/span>\n<\/p>\n<p>\n\tWait a bit and check again if they were successfully processed. &nbsp;Or not:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\">ca-error: Server at https:\/\/idmipa01.nix.mds.xyz\/ipa\/xml failed request, will retry: 907 (RPC failed at server. &nbsp;cannot connect to &#39;https:\/\/idmipa01.nix.mds.xyz:443\/ca\/rest\/account\/login&#39;: [SSL: SSL_HANDSHAKE_FAILURE] ssl handshake failure (_ssl.c:1826)).<\/span>\n<\/p>\n<p>\n\tLet&#39;s try the following command again:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"># ipa-cert-fix -v<\/span>\n<\/p>\n<p>\n\tBut we get this instead:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\">INFO: Restoring previous LDAP configuration<br \/>\n\tERROR: Unable to find CSR for sslserver cert<\/span>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\">ipapython.admintool: DEBUG: &nbsp; File &quot;\/usr\/lib\/python2.7\/site-packages\/ipapython\/admintool.py&quot;, line 178, in execute<br \/>\n\t&nbsp; &nbsp; return_value = self.run()<br \/>\n\t&nbsp; File &quot;\/usr\/lib\/python2.7\/site-packages\/ipaserver\/install\/ipa_cert_fix.py&quot;, line 128, in run<br \/>\n\t&nbsp; &nbsp; replicate_dogtag_certs(subject_base, ca_subject_dn, certs)<br \/>\n\t&nbsp; File &quot;\/usr\/lib\/python2.7\/site-packages\/ipaserver\/install\/ipa_cert_fix.py&quot;, line 251, in replicate_dogtag_certs<br \/>\n\t&nbsp; &nbsp; cert = x509.load_certificate_from_file(cert_path)<br \/>\n\t&nbsp; File &quot;\/usr\/lib\/python2.7\/site-packages\/ipalib\/x509.py&quot;, line 425, in load_certificate_from_file<br \/>\n\t&nbsp; &nbsp; with open(filename, mode=&#39;rb&#39;) as f:<\/span>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\">ipapython.admintool: DEBUG: The ipa-cert-fix command failed, exception: IOError: [Errno 2] No such file or directory: &#39;\/etc\/pki\/pki-tomcat\/certs\/sslserver.crt&#39;<br \/>\n\tipapython.admintool: ERROR: [Errno 2] No such file or directory: &#39;\/etc\/pki\/pki-tomcat\/certs\/sslserver.crt&#39;<br \/>\n\tipapython.admintool: ERROR: The ipa-cert-fix command failed.<\/span>\n<\/p>\n<p>\n\t<br \/>\n\tAnd we fix with this article:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<a href=\"https:\/\/access.redhat.com\/solutions\/4852721\" rel=\"external nofollow\"><span style=\"font-family:courier new,courier,monospace;\">https:\/\/access.redhat.com\/solutions\/4852721<\/span><\/a>\n<\/p>\n<p>\n\tFollowing the document steps, convert the cert accordingly:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"><strong># grep -A 19 csr \/var\/lib\/certmonger\/requests\/20180122053033<\/strong><br \/>\n\tcsr=&#8212;&#8211;BEGIN NEW CERTIFICATE REQUEST&#8212;&#8211;<br \/>\n\t&nbsp;MIIDJTCCAg&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;X1cWBn+CU=<br \/>\n\t&nbsp;&#8212;&#8211;END NEW CERTIFICATE REQUEST&#8212;&#8211;<br \/>\n\tspkac=MIICQDCCASgwgg&#8230;&#8230;&#8230;&#8230;&#8230;.p78JfKV2\/VHxXJTULg==<br \/>\n\t<strong>#&nbsp;vi 1.txt<\/strong><\/span>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"><strong>#&nbsp;cat 1.txt<\/strong><br \/>\n\tca.subsystem.certreq=MIIDJTCCAg0CAQA&#8230;&#8230;&#8230;&#8230;&#8230;.45oAX1cWBn+CU=<\/span>\n<\/p>\n<p>\n\tMake backups of anything you modify, whether or not you have snapshots. (Snapshots will cause you to restart from the beginning of this article \ud83d\ude1b )\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"># cp -ip \/etc\/pki\/pki-tomcat\/ca\/CS.cfg \/etc\/pki\/pki-tomcat\/ca\/CS.cfg-backup01<\/span>\n<\/p>\n<p>\n\tConfirm if the line exists:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"># grep -Ei ca.subsystem.certreq \/etc\/pki\/pki-tomcat\/ca\/CS.cfg<br \/>\n\t#&nbsp;<\/span>\n<\/p>\n<p>\n\tIt should not otherwise you wouldn&#39;t get the above error:\n<\/p>\n<p>\n\tAdd the ca.subsystem.certreq= below the ca.subsystem.cert= line in \/etc\/pki\/pki-tomcat\/ca\/CS.cfg:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"># grep -Ei ca.subsystem.certreq \/etc\/pki\/pki-tomcat\/ca\/CS.cfg<br \/>\n\tca.subsystem.certreq=MIIDJTCCAg0CAQ&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;..X1cWBn+CU=<\/span>\n<\/p>\n<p>\n\tLet&#39;s try the command again:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"># ipa-cert-fix<\/span>\n<\/p>\n<p>\n\tBut no luck:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"># ipa-cert-fix<br \/>\n\t[ &#8230;.. ]<br \/>\n\tEnter &quot;yes&quot; to proceed: yes<br \/>\n\tProceeding.<br \/>\n\t[Errno 2] No such file or directory: &#39;\/etc\/pki\/pki-tomcat\/certs\/sslserver.crt&#39;<br \/>\n\tThe ipa-cert-fix command failed.<\/span>\n<\/p>\n<p>\n\tLet&#39;s move the dates back again, manually:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"># hwclock &#8211;set &#8211;date &quot;Fri Sep 12 01:00:00 EDT 2022&quot;; date -s &quot;Fri Sep 12 01:00:00 EDT 2022&quot;<\/span>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"># ipa-cert-fix<br \/>\n\t[ &#8230;.. ]<br \/>\n\tEnter &quot;yes&quot; to proceed: yes<br \/>\n\tProceeding.<br \/>\n\tCommand &#39;pki-server cert-fix &#8211;ldapi-socket \/var\/run\/slapd-NIX-MDS-XYZ.socket &#8211;agent-uid ipara &#8211;cert sslserver &#8211;cert subsystem &#8211;cert ca_ocsp_signing &#8211;cert ca_audit_signing &#8211;extra-cert 25&#39; returned non-zero exit status 1<br \/>\n\tThe ipa-cert-fix command failed.<\/span>\n<\/p>\n<p>\n\tdid not work. &nbsp;So moving slightly ahead:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"># hwclock &#8211;set &#8211;date &quot;Fri Sep 13 01:00:00 EDT 2022&quot;; date -s &quot;Fri Sep 13 01:00:00 EDT 2022&quot;<\/span>\n<\/p>\n<p>\n\tresults in absolutely nothing. &nbsp;So trying with a different date:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"># hwclock &#8211;set &#8211;date &quot;Fri Sep 11 04:00:00 EDT 2022&quot;; date -s &quot;Fri Sep 11 04:00:00 EDT 2022&quot;<br \/>\n\tSun Sep 11 04:00:00 EDT 2022<\/span>\n<\/p>\n<p>\n\tResulted in a successfully started host:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"><strong># ipactl restart &#8211;ignore-service-failure<\/strong><br \/>\n\tRestarting Directory Service<br \/>\n\tRestarting krb5kdc Service<br \/>\n\tRestarting kadmin Service<br \/>\n\tRestarting named Service<br \/>\n\tRestarting httpd Service<br \/>\n\tRestarting ipa-custodia Service<br \/>\n\tRestarting ntpd Service<br \/>\n\tRestarting pki-tomcatd Service<br \/>\n\tRestarting smb Service<br \/>\n\tRestarting winbind Service<br \/>\n\tRestarting ipa-otpd Service<br \/>\n\tRestarting ipa-dnskeysyncd Service<br \/>\n\tipa: INFO: The ipactl command was successful<\/span>\n<\/p>\n<p>\n\tHmm, ok we&#39;re on to something here. &nbsp;Now that the services started fully, let&#39;s use the following:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"># ipa-cert-fix<\/span>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; WARNING<\/span>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\">ipa-cert-fix is intended for recovery when expired certificates<br \/>\n\tprevent the normal operation of IPA. &nbsp;It should ONLY be used<br \/>\n\tin such scenarios, and backup of the system, especially certificates<br \/>\n\tand keys, is STRONGLY RECOMMENDED.<\/span>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<br \/>\n\t<span style=\"font-family:courier new,courier,monospace;\">The following certificates will be renewed:<\/span>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\">Dogtag sslserver certificate:<br \/>\n\t&nbsp; Subject: CN=idmipa01.nix.mds.xyz,O=NIX.MDS.XYZ<br \/>\n\t&nbsp; Serial: &nbsp;22<br \/>\n\t&nbsp; Expires: 2022-09-12 03:13:47<\/span>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\">Dogtag subsystem certificate:<br \/>\n\t&nbsp; Subject: CN=CA Subsystem,O=NIX.MDS.XYZ<br \/>\n\t&nbsp; Serial: &nbsp;26<br \/>\n\t&nbsp; Expires: 2022-09-12 03:13:58<\/span>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\">IPA IPA RA certificate:<br \/>\n\t&nbsp; Subject: CN=IPA RA,O=NIX.MDS.XYZ<br \/>\n\t&nbsp; Serial: &nbsp;25<br \/>\n\t&nbsp; Expires: 2022-09-12 03:13:48<\/span>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\">Enter &quot;yes&quot; to proceed: yes<br \/>\n\tProceeding.<br \/>\n\tCommand &#39;pki-server cert-fix &#8211;ldapi-socket \/var\/run\/slapd-NIX-MDS-XYZ.socket &#8211;agent-uid ipara &#8211;cert sslserver &#8211;cert subsystem &#8211;extra-cert 25&#39; returned non-zero exit status 1<br \/>\n\tThe ipa-cert-fix command failed.<\/span>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\">#&nbsp;pki-server cert-fix &#8211;ldapi-socket \/var\/run\/slapd-NIX-MDS-XYZ.socket &#8211;agent-uid ipara &#8211;cert sslserver &#8211;cert subsystem &#8211;extra-cert 25<br \/>\n\tINFO: Loading password config: \/etc\/pki\/pki-tomcat\/password.conf<br \/>\n\tINFO: Fixing the following system certs: [&#8216;sslserver&#8217;, &#8216;subsystem&#8217;]<br \/>\n\tINFO: Renewing the following additional certs: [&#8217;25&#8217;]<br \/>\n\tSASL\/EXTERNAL authentication started<br \/>\n\tSASL username: gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth<br \/>\n\tSASL SSF: 0<br \/>\n\tINFO: Stopping the instance to proceed with system cert renewal<br \/>\n\tINFO: Configuring LDAP password authentication<br \/>\n\tINFO: Setting pkidbuser password via ldappasswd<br \/>\n\tSASL\/EXTERNAL authentication started<br \/>\n\tSASL username: gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth<br \/>\n\tSASL SSF: 0<br \/>\n\tINFO: Selftests disabled for subsystems: ca<br \/>\n\tINFO: Resetting password for uid=ipara,ou=people,o=ipaca<br \/>\n\tSASL\/EXTERNAL authentication started<br \/>\n\tSASL username: gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth<br \/>\n\tSASL SSF: 0<br \/>\n\tINFO: Creating a temporary sslserver cert<br \/>\n\tINFO: Getting sslserver cert info for ca<br \/>\n\tINFO: Trying to create a new temp cert for sslserver.<br \/>\n\tINFO: Generate temp SSL certificate<br \/>\n\tINFO: Getting sslserver cert info for ca<br \/>\n\tINFO: Selftests enabled for subsystems: ca<br \/>\n\tINFO: Restoring previous LDAP configuration<br \/>\n\t<strong><span style=\"color:#FF0000;\">ERROR: Unable to find CSR for sslserver cert<\/span><\/strong><\/span>\n<\/p>\n<p>\n\tLooks like it expects more CSR&#39;s. &nbsp;In this case:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\">Request ID &#39;20180122053036&#39;:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; certificate: type=NSSDB,location=&#39;\/etc\/pki\/pki-tomcat\/alias&#39;,nickname=&#39;Server-Cert cert-pki-ca&#39;,token=&#39;NSS Certificate DB&#39;<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2022-09-12 03:13:47 UTC<\/span>\n<\/p>\n<p>\n\tDoesn&#39;t have a CSR, so we add one`:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"><strong># cat \/var\/lib\/certmonger\/requests\/20180122053036<\/strong><br \/>\n\tcsr=&#8212;&#8211;BEGIN NEW CERTIFICATE REQUEST&#8212;&#8211;<br \/>\n\t&nbsp;MIIDIzCCAgsCA&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;xQ\/FFfh<\/span>\n<\/p>\n<p>\n\tThen convert it to the following one liner in the scrxipt with nickname ca.sslserver.certreq in this case:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\">ca.sslserver.certreq=MIIDIzCCAgsCA&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;5XsHg07A8<\/span>\n<\/p>\n<p>\n\tBut, alas, I had a copy in another cert:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\">csr=&#8212;&#8211;BEGIN NEW CERTIFICATE REQUEST&#8212;&#8211;<br \/>\n\t&nbsp;MIIDIzCC&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;..kxQ\/FFfh<br \/>\n\t&nbsp;&#8212;&#8211;END NEW CERTIFICATE REQUEST&#8212;&#8211;<\/span>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"><strong># grep certreq \/etc\/pki\/pki-tomcat\/ca\/CS.cfg<\/strong><br \/>\n\tca.sslserver.certreq=MIIDIzCCAgsCA&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;..V5XsHg07A8<\/span>\n<\/p>\n<p>\n\tNOTE the missing FFfh characters in the CSR vs what I typed in the CS.cfg. &nbsp;Hence got this:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"><strong># ipa-cert-fix -v<\/strong><br \/>\n\t[ &#8230;&#8230;&#8230;&#8230;&#8230; ]<br \/>\n\tSASL SSF: 0<br \/>\n\tINFO: Creating a temporary sslserver cert<br \/>\n\tINFO: Getting sslserver cert info for ca<br \/>\n\tINFO: Trying to create a new temp cert for sslserver.<br \/>\n\tINFO: Generate temp SSL certificate<br \/>\n\tINFO: Getting sslserver cert info for ca<br \/>\n\tINFO: CSR for sslserver has been written to \/tmp\/tmpYQSMJk\/sslserver.csr<br \/>\n\tINFO: Getting signing cert info for ca<br \/>\n\tINFO: CA cert written to \/tmp\/tmpYQSMJk\/ca_certificate.crt<br \/>\n\tINFO: AKI: 0x1F737CF691BC6D8F93ACA3599FB6DBAB35AED71D<br \/>\n\tINFO: Selftests enabled for subsystems: ca<br \/>\n\tINFO: Restoring previous LDAP configuration<br \/>\n\tERROR: Failed to generate CA-signed temp SSL certificate. RC: 255<\/span>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\">ipapython.admintool: DEBUG: &nbsp; File &quot;\/usr\/lib\/python2.7\/site-packages\/ipapython\/admintool.py&quot;, line 178, in execute<br \/>\n\t&nbsp; &nbsp; return_value = self.run()<br \/>\n\t&nbsp; File &quot;\/usr\/lib\/python2.7\/site-packages\/ipaserver\/install\/ipa_cert_fix.py&quot;, line 117, in run<br \/>\n\t&nbsp; &nbsp; run_cert_fix(certs, extra_certs)<br \/>\n\t&nbsp; File &quot;\/usr\/lib\/python2.7\/site-packages\/ipaserver\/install\/ipa_cert_fix.py&quot;, line 245, in run_cert_fix<br \/>\n\t&nbsp; &nbsp; ipautil.run(cmd, raiseonerr=True)<br \/>\n\t&nbsp; File &quot;\/usr\/lib\/python2.7\/site-packages\/ipapython\/ipautil.py&quot;, line 563, in run<br \/>\n\t&nbsp; &nbsp; raise CalledProcessError(p.returncode, arg_string, str(output))<\/span>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\">ipapython.admintool: DEBUG: The ipa-cert-fix command failed, exception: CalledProcessError: Command &#39;pki-server cert-fix &#8211;ldapi-socket \/var\/run\/slapd-NIX-MDS-XYZ.socket &#8211;agent-uid ipara &#8211;cert sslserver &#8211;cert subsystem &#8211;extra-cert 25&#39; returned non-zero exit status 1<br \/>\n\t<strong><span style=\"color:#FF0000;\">ipapython.admintool: ERROR: Command &#39;pki-server cert-fix &#8211;ldapi-socket \/var\/run\/slapd-NIX-MDS-XYZ.socket &#8211;agent-uid ipara &#8211;cert sslserver &#8211;cert subsystem &#8211;extra-cert 25&#39; returned non-zero exit status 1<br \/>\n\tipapython.admintool: ERROR: The ipa-cert-fix command failed.<\/span><\/strong><\/span>\n<\/p>\n<p>\n\tEditing and ensuring it&#39;s correct this time, using a one liner to properly set it up:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"><strong># grep -A 19 csr \/var\/lib\/certmonger\/requests\/20180122053036|grep -v spkac|grep -v &quot;-&quot;|tr &#39;\\n&#39; &#39; &#39;|sed -e &quot;s\/ \/\/g&quot;<\/strong><br \/>\n\tMIIDIzCCAgs&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;.zHkxQ\/FFfh<\/span>\n<\/p>\n<p>\n\tseams to have allowed IPA to restart properly:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"># ipa-cert-fix -v<br \/>\n\t[ &#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;.. ]<br \/>\n\tINFO: Starting the instance with renewed certs<\/span>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\">Renewed Dogtag sslserver certificate:<br \/>\n\t&nbsp; Subject: CN=idmipa01.nix.mds.xyz,O=NIX.MDS.XYZ<br \/>\n\t&nbsp; Serial: &nbsp;34<br \/>\n\t&nbsp; Expires: 2024-08-31 09:03:43<\/span>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\">Renewed Dogtag subsystem certificate:<br \/>\n\t&nbsp; Subject: CN=CA Subsystem,O=NIX.MDS.XYZ<br \/>\n\t&nbsp; Serial: &nbsp;35<br \/>\n\t&nbsp; Expires: 2024-08-31 09:03:43<\/span>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\">Renewed IPA IPA RA certificate:<br \/>\n\t&nbsp; Subject: CN=IPA RA,O=NIX.MDS.XYZ<br \/>\n\t&nbsp; Serial: &nbsp;36<br \/>\n\t&nbsp; Expires: 2024-08-31 09:03:44<\/span>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\">ipalib.backend: DEBUG: Created connection context.ldap2_139668384537744<br \/>\n\tipalib.backend: DEBUG: Destroyed connection context.ldap2_139668384537744<br \/>\n\tBecoming renewal master.<br \/>\n\tipalib.install.sysrestore: DEBUG: Loading StateFile from &#39;\/var\/lib\/ipa\/sysrestore\/sysrestore.state&#39;<br \/>\n\tipalib.install.sysrestore: DEBUG: Loading Index file from &#39;\/var\/lib\/ipa\/sysrestore\/sysrestore.index&#39;<br \/>\n\tipapython.ipautil: DEBUG: Starting external process<br \/>\n\tipapython.ipautil: DEBUG: args=ipactl restart<br \/>\n\tipapython.ipautil: DEBUG: Process finished, return code=0<br \/>\n\tipapython.ipautil: DEBUG: stdout=Restarting Directory Service<br \/>\n\tRestarting krb5kdc Service<br \/>\n\tRestarting kadmin Service<br \/>\n\tRestarting named Service<br \/>\n\tRestarting httpd Service<br \/>\n\tRestarting ipa-custodia Service<br \/>\n\tRestarting ntpd Service<br \/>\n\tRestarting pki-tomcatd Service<br \/>\n\tRestarting smb Service<br \/>\n\tRestarting winbind Service<br \/>\n\tRestarting ipa-otpd Service<br \/>\n\tRestarting ipa-dnskeysyncd Service<\/span>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\">ipapython.ipautil: DEBUG: stderr=ipa: INFO: The ipactl command was successful<\/span>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\">ipapython.admintool: INFO: The ipa-cert-fix command was successful<\/span>\n<\/p>\n<p>\n\tyet no change to the certs above. &nbsp;Trying the renew option now:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"># ipa-cacert-manage renew<\/span>\n<\/p>\n<p>\n\tFollowing this page:\n<\/p>\n<p>\n\t<a href=\"https:\/\/floblanc.wordpress.com\/2016\/12\/19\/troubleshooting-certmonger-issues-with-freeipa\/\" rel=\"external nofollow\">https:\/\/floblanc.wordpress.com\/2016\/12\/19\/troubleshooting-certmonger-issues-with-freeipa\/<\/a>\n<\/p>\n<p>\n\tran the following:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<strong><span style=\"font-family:courier new,courier,monospace;\"># getcert modify-ca -c dogtag-ipa-ca-renew-agent -e &#39;\/usr\/libexec\/certmonger\/dogtag-ipa-ca-renew-agent-submit -vv&#39;<\/span><\/strong>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\">java.lang.Exception: Certutils.verifySystemCertValidityByNickname: &nbsp;faliled: nickname: ocspSigningCert cert-pki-cacause: java.lang.Exception: Certutils.verifySystemCertValidityByNickname: &nbsp;failed: nickname: ocspSigningCert cert-pki-ca<\/span>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\">[11\/Sep\/2022:23:10:10][localhost-startStop-1]: SignedAuditLogger: event SELFTESTS_EXECUTION<br \/>\n\t[11\/Sep\/2022:23:10:10][localhost-startStop-1]: SelfTestSubsystem: Shutting down server due to selftest failure: Certutils.verifySystemCertValidityByNickname: &nbsp;faliled: nickname: ocspSigningCert cert-pki-cacause: java.lang.Exception: Certutils.verifySystemCertValidityByNickname: &nbsp;failed: nickname: ocspSigningCert cert-pki-ca<br \/>\n\tjava.lang.Exception: Certutils.verifySystemCertValidityByNickname: &nbsp;faliled: nickname: ocspSigningCert cert-pki-cacause: java.lang.Exception: Certutils.verifySystemCertValidityByNickname: &nbsp;failed: nickname: ocspSigningCert cert-pki-ca<\/span>\n<\/p>\n<p>\n\tThe below errors could have been when IPA services were stopped while the ipactl restart command was executed:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\">Request ID &#39;20180122053035&#39;:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; status: CA_UNREACHABLE<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; <span style=\"color:#FF0000;\">ca-error: Error 7 connecting to http:\/\/idmipa01.nix.mds.xyz:8080\/ca\/ee\/ca\/profileSubmit: Couldn&#39;t connect to server.<\/span><br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; stuck: no<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; key pair storage: type=FILE,location=&#39;\/var\/lib\/ipa\/ra-agent.key&#39;<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; certificate: type=FILE,location=&#39;\/var\/lib\/ipa\/ra-agent.pem&#39;<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; CA: dogtag-ipa-ca-renew-agent<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; issuer: CN=Certificate Authority,O=NIX.MDS.XYZ<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; subject: CN=IPA RA,O=NIX.MDS.XYZ<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2022-09-12 03:13:48 UTC<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; key usage: digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; eku: id-kp-serverAuth,id-kp-clientAuth<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; pre-save command: \/usr\/libexec\/ipa\/certmonger\/renew_ra_cert_pre<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; post-save command: \/usr\/libexec\/ipa\/certmonger\/renew_ra_cert<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; track: yes<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; auto-renew: yes<br \/>\n\tRequest ID &#39;20180122053036&#39;:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; status: CA_UNREACHABLE<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; <span style=\"color:#FF0000;\">ca-error: Error 7 connecting to http:\/\/idmipa01.nix.mds.xyz:8080\/ca\/ee\/ca\/profileSubmit: Couldn&#39;t connect to server.<\/span><br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; stuck: no<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; key pair storage: type=NSSDB,location=&#39;\/etc\/pki\/pki-tomcat\/alias&#39;,nickname=&#39;Server-Cert cert-pki-ca&#39;,token=&#39;NSS Certificate DB&#39;,pin set<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; certificate: type=NSSDB,location=&#39;\/etc\/pki\/pki-tomcat\/alias&#39;,nickname=&#39;Server-Cert cert-pki-ca&#39;,token=&#39;NSS Certificate DB&#39;<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; CA: dogtag-ipa-ca-renew-agent<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; issuer: CN=Certificate Authority,O=NIX.MDS.XYZ<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; subject: CN=idmipa01.nix.mds.xyz,O=NIX.MDS.XYZ<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2022-09-12 03:13:47 UTC<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; key usage: digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; eku: id-kp-serverAuth,id-kp-clientAuth<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; pre-save command: \/usr\/libexec\/ipa\/certmonger\/stop_pkicad<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; post-save command: \/usr\/libexec\/ipa\/certmonger\/renew_ca_cert &quot;Server-Cert cert-pki-ca&quot;<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; track: yes<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; auto-renew: yes<\/span>\n<\/p>\n<p>\n\tTried resubmitting manually, perhaps the service was offline when it attempted upon ipactl restart execution:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"><strong># getcert resubmit -i 20180122053036<\/strong><br \/>\n\tResubmitting &quot;20180122053036&quot; to &quot;dogtag-ipa-ca-renew-agent&quot;.<\/span>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"><strong># getcert resubmit -i 20180122053035<\/strong><br \/>\n\tResubmitting &quot;20180122053035&quot; to &quot;dogtag-ipa-ca-renew-agent&quot;.<\/span>\n<\/p>\n<p>\n\tAnd this time those two certs are ok:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\">Request ID &#39;20180122053035&#39;:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp;<strong><span style=\"color:#008000;\"> status: MONITORING<\/span><\/strong><br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; stuck: no<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; key pair storage: type=FILE,location=&#39;\/var\/lib\/ipa\/ra-agent.key&#39;<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; certificate: type=FILE,location=&#39;\/var\/lib\/ipa\/ra-agent.pem&#39;<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; CA: dogtag-ipa-ca-renew-agent<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; issuer: CN=Certificate Authority,O=NIX.MDS.XYZ<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; subject: CN=IPA RA,O=NIX.MDS.XYZ<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2024-08-31 09:03:44 UTC<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; key usage: digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; eku: id-kp-serverAuth,id-kp-clientAuth<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; pre-save command: \/usr\/libexec\/ipa\/certmonger\/renew_ra_cert_pre<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; post-save command: \/usr\/libexec\/ipa\/certmonger\/renew_ra_cert<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; track: yes<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; auto-renew: yes<br \/>\n\tRequest ID &#39;20180122053036&#39;:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; <strong><span style=\"color:#008000;\">status: MONITORING<\/span><\/strong><br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; stuck: no<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; key pair storage: type=NSSDB,location=&#39;\/etc\/pki\/pki-tomcat\/alias&#39;,nickname=&#39;Server-Cert cert-pki-ca&#39;,token=&#39;NSS Certificate DB&#39;,pin set<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; certificate: type=NSSDB,location=&#39;\/etc\/pki\/pki-tomcat\/alias&#39;,nickname=&#39;Server-Cert cert-pki-ca&#39;,token=&#39;NSS Certificate DB&#39;<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; CA: dogtag-ipa-ca-renew-agent<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; issuer: CN=Certificate Authority,O=NIX.MDS.XYZ<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; subject: CN=idmipa01.nix.mds.xyz,O=NIX.MDS.XYZ<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2024-08-31 09:03:43 UTC<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; key usage: digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; eku: id-kp-serverAuth,id-kp-clientAuth<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; pre-save command: \/usr\/libexec\/ipa\/certmonger\/stop_pkicad<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; post-save command: \/usr\/libexec\/ipa\/certmonger\/renew_ca_cert &quot;Server-Cert cert-pki-ca&quot;<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; track: yes<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; auto-renew: yes<\/span>\n<\/p>\n<p>\n\tThis moves us forward to the last two:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\">Request ID &#39;20180122053037&#39;:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; <span style=\"color:#FF0000;\"><strong>status: CA_UNREACHABLE<\/strong><\/span><br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; <span style=\"color:#FF0000;\">ca-error: Server at https:\/\/idmipa01.nix.mds.xyz\/ipa\/xml failed request, will retry: 907 (RPC failed at server. &nbsp;cannot connect to &#39;https:\/\/idmipa01.nix.mds.xyz:443\/ca\/rest\/account\/login&#39;: [SSL: SSL_HANDSHAKE_FAILURE] ssl handshake failure (_ssl.c:1826)).<\/span><br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; stuck: no<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; key pair storage: type=NSSDB,location=&#39;\/etc\/dirsrv\/slapd-NIX-MDS-XYZ&#39;,nickname=&#39;Server-Cert&#39;,token=&#39;NSS Certificate DB&#39;,pinfile=&#39;\/etc\/dirsrv\/slapd-NIX-MDS-XYZ\/pwdfile.txt&#39;<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; certificate: type=NSSDB,location=&#39;\/etc\/dirsrv\/slapd-NIX-MDS-XYZ&#39;,nickname=&#39;Server-Cert&#39;,token=&#39;NSS Certificate DB&#39;<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; CA: IPA<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; issuer: CN=Certificate Authority,O=NIX.MDS.XYZ<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; subject: CN=idmipa01.nix.mds.xyz,O=NIX.MDS.XYZ<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2022-10-05 23:00:29 UTC<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; principal name: ldap\/idmipa01.nix.mds.xyz@NIX.MDS.XYZ<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; key usage: digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; eku: id-kp-serverAuth,id-kp-clientAuth<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; pre-save command:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; post-save command: \/usr\/libexec\/ipa\/certmonger\/restart_dirsrv NIX-MDS-XYZ<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; track: yes<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; auto-renew: yes<br \/>\n\tRequest ID &#39;20180122053042&#39;:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; <strong><span style=\"color:#FF0000;\">status: CA_UNREACHABLE<\/span><\/strong><br \/>\n\t<span style=\"color:#FF0000;\">&nbsp; &nbsp; &nbsp; &nbsp; ca-error: Server at https:\/\/idmipa01.nix.mds.xyz\/ipa\/xml failed request, will retry: 907 (RPC failed at server. &nbsp;cannot connect to &#39;https:\/\/idmipa01.nix.mds.xyz:443\/ca\/rest\/account\/login&#39;: [SSL: SSL_HANDSHAKE_FAILURE] ssl handshake failure (_ssl.c:1826)).<\/span><br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; stuck: no<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; key pair storage: type=NSSDB,location=&#39;\/etc\/httpd\/alias&#39;,nickname=&#39;Server-Cert&#39;,token=&#39;NSS Certificate DB&#39;,pinfile=&#39;\/etc\/httpd\/alias\/pwdfile.txt&#39;<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; certificate: type=NSSDB,location=&#39;\/etc\/httpd\/alias&#39;,nickname=&#39;Server-Cert&#39;,token=&#39;NSS Certificate DB&#39;<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; CA: IPA<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; issuer: CN=Certificate Authority,O=NIX.MDS.XYZ<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; subject: CN=idmipa01.nix.mds.xyz,O=NIX.MDS.XYZ<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2022-10-05 23:00:59 UTC<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; principal name: HTTP\/idmipa01.nix.mds.xyz@NIX.MDS.XYZ<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; key usage: digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; eku: id-kp-serverAuth,id-kp-clientAuth<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; pre-save command:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; post-save command: \/usr\/libexec\/ipa\/certmonger\/restart_httpd<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; track: yes<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; auto-renew: yes<br \/>\n\tRequest ID &#39;20180122053135&#39;:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; status: MONITORING<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; stuck: no<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; key pair storage: type=FILE,location=&#39;\/var\/kerberos\/krb5kdc\/kdc.key&#39;<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; certificate: type=FILE,location=&#39;\/var\/kerberos\/krb5kdc\/kdc.crt&#39;<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; CA: SelfSign<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; issuer: CN=idmipa01.nix.mds.xyz,O=NIX.MDS.XYZ<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; subject: CN=idmipa01.nix.mds.xyz,O=NIX.MDS.XYZ<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2023-09-26 00:54:45 UTC<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; principal name: krbtgt\/NIX.MDS.XYZ@NIX.MDS.XYZ<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; certificate template\/profile: KDCs_PKINIT_Certs<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; pre-save command:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; post-save command: \/usr\/libexec\/ipa\/certmonger\/renew_kdc_cert<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; track: yes<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; auto-renew: yes<\/span>\n<\/p>\n<p>\n\tLet&#39;s repeat the resubmission for these 2 as well. &nbsp;This time the error changed:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\">Request ID &#39;20180122053037&#39;:<br \/>\n\t<span style=\"color:#FF0000;\">&nbsp; &nbsp; &nbsp; &nbsp; <strong>status: CA_UNREACHABLE<\/strong><br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; ca-error: Server at https:\/\/idmipa01.nix.mds.xyz\/ipa\/xml failed request, will retry: 4016 (RPC failed at server. &nbsp;Failed to authenticate to CA REST API).<\/span><br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; stuck: no<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; key pair storage: type=NSSDB,location=&#39;\/etc\/dirsrv\/slapd-NIX-MDS-XYZ&#39;,nickname=&#39;Server-Cert&#39;,token=&#39;NSS Certificate DB&#39;,pinfile=&#39;\/etc\/dirsrv\/slapd-NIX-MDS-XYZ\/pwdfile.txt&#39;<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; certificate: type=NSSDB,location=&#39;\/etc\/dirsrv\/slapd-NIX-MDS-XYZ&#39;,nickname=&#39;Server-Cert&#39;,token=&#39;NSS Certificate DB&#39;<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; CA: IPA<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; issuer: CN=Certificate Authority,O=NIX.MDS.XYZ<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; subject: CN=idmipa01.nix.mds.xyz,O=NIX.MDS.XYZ<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2022-10-05 23:00:29 UTC<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; principal name: ldap\/idmipa01.nix.mds.xyz@NIX.MDS.XYZ<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; key usage: digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; eku: id-kp-serverAuth,id-kp-clientAuth<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; pre-save command:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; post-save command: \/usr\/libexec\/ipa\/certmonger\/restart_dirsrv NIX-MDS-XYZ<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; track: yes<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; auto-renew: yes<br \/>\n\tRequest ID &#39;20180122053042&#39;:<br \/>\n\t<span style=\"color:#FF0000;\">&nbsp; &nbsp; &nbsp; &nbsp; <strong>status: CA_UNREACHABLE<\/strong><br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; ca-error: Server at https:\/\/idmipa01.nix.mds.xyz\/ipa\/xml failed request, will retry: 4016 (RPC failed at server. &nbsp;Failed to authenticate to CA REST API).<\/span><br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; stuck: no<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; key pair storage: type=NSSDB,location=&#39;\/etc\/httpd\/alias&#39;,nickname=&#39;Server-Cert&#39;,token=&#39;NSS Certificate DB&#39;,pinfile=&#39;\/etc\/httpd\/alias\/pwdfile.txt&#39;<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; certificate: type=NSSDB,location=&#39;\/etc\/httpd\/alias&#39;,nickname=&#39;Server-Cert&#39;,token=&#39;NSS Certificate DB&#39;<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; CA: IPA<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; issuer: CN=Certificate Authority,O=NIX.MDS.XYZ<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; subject: CN=idmipa01.nix.mds.xyz,O=NIX.MDS.XYZ<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2022-10-05 23:00:59 UTC<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; principal name: HTTP\/idmipa01.nix.mds.xyz@NIX.MDS.XYZ<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; key usage: digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; eku: id-kp-serverAuth,id-kp-clientAuth<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; pre-save command:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; post-save command: \/usr\/libexec\/ipa\/certmonger\/restart_httpd<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; track: yes<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; auto-renew: yes<\/span>\n<\/p>\n<p>\n\tReading, this could help:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\">https:\/\/floblanc.wordpress.com\/2016\/12\/19\/troubleshooting-certmonger-issues-with-freeipa\/<\/span>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"><strong># ipa-certupdate<\/strong><br \/>\n\ttrying https:\/\/idmipa01.nix.mds.xyz\/ipa\/session\/json<br \/>\n\t[try 1]: Forwarding &#39;ca_is_enabled\/1&#39; to json server &#39;https:\/\/idmipa01.nix.mds.xyz\/ipa\/session\/json&#39;<br \/>\n\t[try 1]: Forwarding &#39;ca_find\/1&#39; to json server &#39;https:\/\/idmipa01.nix.mds.xyz\/ipa\/session\/json&#39;<br \/>\n\tSystemwide CA database updated.<br \/>\n\tSystemwide CA database updated.<br \/>\n\tThe ipa-certupdate command was successful<\/span>\n<\/p>\n<p>\n\tIt appears to have done something. &nbsp;Let&#39;s check what that is:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\">Request ID &#39;20180122053037&#39;:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; status: CA_UNREACHABLE<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; ca-error: Server at https:\/\/idmipa01.nix.mds.xyz\/ipa\/xml failed request, will retry: 4016 (RPC failed at server. &nbsp;Failed to authenticate to CA REST API).<\/span>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\">Request ID &#39;20180122053042&#39;:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; status: CA_UNREACHABLE<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; ca-error: Server at https:\/\/idmipa01.nix.mds.xyz\/ipa\/xml failed request, will retry: 4016 (RPC failed at server. &nbsp;Failed to authenticate to CA REST API).<\/span>\n<\/p>\n<p>\n\tnot much. &nbsp;Hmm. &nbsp;Running a manual resubmit appears to have done something:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"><strong># getcert resubmit -i 20180122053042<\/strong><br \/>\n\tResubmitting &quot;20180122053042&quot; to &quot;IPA&quot;.<\/span>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"><strong>#&nbsp;getcert resubmit -i 20180122053037<\/strong><br \/>\n\tResubmitting &quot;20180122053037&quot; to &quot;IPA&quot;.<\/span>\n<\/p>\n<p>\n\tNew dates are posted for the certs, which looks promising:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\">Request ID &#39;20180122053037&#39;:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; status: POST_SAVED_CERT<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; stuck: no<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; key pair storage: type=NSSDB,location=&#39;\/etc\/dirsrv\/slapd-NIX-MDS-XYZ&#39;,nickname=&#39;Server-Cert&#39;,token=&#39;NSS Certificate DB&#39;,pinfile=&#39;\/etc\/dirsrv\/slapd-NIX-MDS-XYZ\/pwdfile.txt&#39;<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; certificate: type=NSSDB,location=&#39;\/etc\/dirsrv\/slapd-NIX-MDS-XYZ&#39;,nickname=&#39;Server-Cert&#39;,token=&#39;NSS Certificate DB&#39;<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; CA: IPA<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; issuer: CN=Certificate Authority,O=NIX.MDS.XYZ<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; subject: CN=idmipa01.nix.mds.xyz,O=NIX.MDS.XYZ<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2024-09-26 05:16:52 UTC<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; principal name: ldap\/idmipa01.nix.mds.xyz@NIX.MDS.XYZ<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; key usage: digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; eku: id-kp-serverAuth,id-kp-clientAuth<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; pre-save command:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; post-save command: \/usr\/libexec\/ipa\/certmonger\/restart_dirsrv NIX-MDS-XYZ<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; track: yes<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; auto-renew: yes<br \/>\n\tRequest ID &#39;20180122053042&#39;:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; status: MONITORING<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; stuck: no<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; key pair storage: type=NSSDB,location=&#39;\/etc\/httpd\/alias&#39;,nickname=&#39;Server-Cert&#39;,token=&#39;NSS Certificate DB&#39;,pinfile=&#39;\/etc\/httpd\/alias\/pwdfile.txt&#39;<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; certificate: type=NSSDB,location=&#39;\/etc\/httpd\/alias&#39;,nickname=&#39;Server-Cert&#39;,token=&#39;NSS Certificate DB&#39;<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; CA: IPA<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; issuer: CN=Certificate Authority,O=NIX.MDS.XYZ<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; subject: CN=idmipa01.nix.mds.xyz,O=NIX.MDS.XYZ<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2024-09-26 05:16:38 UTC<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; principal name: HTTP\/idmipa01.nix.mds.xyz@NIX.MDS.XYZ<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; key usage: digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; eku: id-kp-serverAuth,id-kp-clientAuth<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; pre-save command:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; post-save command: \/usr\/libexec\/ipa\/certmonger\/restart_httpd<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; track: yes<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; auto-renew: yes<\/span>\n<\/p>\n<p>\n\tLet&#39;s check the final result but before that, let&#39;s check the date. &nbsp;It seems odd that it picked 09-26 above but I don&#39;t care as long as it works properly:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"><strong># date<\/strong><br \/>\n\tMon Sep 26 01:18:19 EDT 2022<\/span>\n<\/p>\n<p>\n\tSeems ipactl restart or start did the date change hence the date of 09-26. &nbsp;Let&#39;s check the certs now:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"><strong># getcert list|grep -Ei &quot;Request ID|status:|stuck:|expires&quot;<\/strong><br \/>\n\tRequest ID &#39;20180122053031&#39;:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; status: MONITORING<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; stuck: no<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2024-09-15 05:15:58 UTC<br \/>\n\tRequest ID &#39;20180122053032&#39;:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; status: MONITORING<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; stuck: no<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2024-09-15 05:09:34 UTC<br \/>\n\tRequest ID &#39;20180122053033&#39;:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; status: MONITORING<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; stuck: no<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2024-09-15 05:14:47 UTC<br \/>\n\tRequest ID &#39;20180122053034&#39;:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; status: MONITORING<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; stuck: no<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2042-09-11 09:07:22 UTC<br \/>\n\tRequest ID &#39;20180122053035&#39;:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; status: MONITORING<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; stuck: no<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2024-08-31 09:03:44 UTC<br \/>\n\tRequest ID &#39;20180122053036&#39;:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; status: MONITORING<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; stuck: no<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2024-08-31 09:03:43 UTC<br \/>\n\tRequest ID &#39;20180122053037&#39;:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; status: MONITORING<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; stuck: no<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2024-09-26 05:16:52 UTC<br \/>\n\tRequest ID &#39;20180122053042&#39;:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; status: MONITORING<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; stuck: no<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2024-09-26 05:16:38 UTC<br \/>\n\tRequest ID &#39;20180122053135&#39;:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; status: MONITORING<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; stuck: no<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2023-09-26 00:54:45 UTC<\/span>\n<\/p>\n<p>\n\tAnd we are done. &nbsp;Seems our certs are all renewed now and our IDMIPA host is back to a working state. &nbsp;At least <strong>idmipa01<\/strong> is! &nbsp;Let&#39;s fix the replica:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"><strong>[idmipa01] # ipa-replica-manage list -v<\/strong><br \/>\n\tidmipa01.nix.mds.xyz: master<br \/>\n\tidmipa02.nix.mds.xyz: master<\/span>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"><strong>[idmipa02 ] # ipa-replica-manage list -v<br \/>\n\tidmipa02.nix.mds.xyz<\/strong><br \/>\n\tidmipa01.nix.mds.xyz: replica<br \/>\n\t&nbsp; last update status: Error (18) Replication error acquiring replica: Incremental update transient warning. &nbsp;Backing off, will retry update later. (transient warning)<br \/>\n\t&nbsp; last update ended: 1970-01-01 00:00:00+00:00<\/span>\n<\/p>\n<p>\n\tusing this command:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<strong><span style=\"font-family:courier new,courier,monospace;\"># ipa-replica-manage re-initialize &#8211;from idmipa01.nix.mds.xyz<\/span><\/strong>\n<\/p>\n<p>\n\tBut alas, no, it&#39;s master\/master setup:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"><strong># ipa-replica-manage re-initialize &#8211;from idmipa02.nix.mds.xyz<\/strong><br \/>\n\t&#39;idmipa02.nix.mds.xyz&#39; has no replication agreement for &#39;idmipa02.nix.mds.xyz&#39;<\/span>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"><strong>[idmipa01]<\/strong><br \/>\n\t# sha256sum \/var\/lib\/ipa\/replica-info-idmipa02.nix.mds.xyz.gpg<br \/>\n\t14553b94d6fad6350ce1cf2896c757657d638c8a08b250d13eac6bbacf5d3383 &nbsp;\/var\/lib\/ipa\/replica-info-idmipa02.nix.mds.xyz.gpg<\/span>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"><strong>[ idmipa02 ]<\/strong><br \/>\n\tsha256sum \/var\/lib\/ipa\/replica-info-idmipa02.nix.mds.xyz.gpg<br \/>\n\t14553b94d6fad6350ce1cf2896c757657d638c8a08b250d13eac6bbacf5d3383 &nbsp;\/var\/lib\/ipa\/replica-info-idmipa02.nix.mds.xyz.gpg<\/span>\n<\/p>\n<p>\n\tReissue the following:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"><strong># ipa-replica-install &#8211;setup-ca &#8211;setup-dns &#8211;forwarder=192.168.0.224 \/var\/lib\/ipa\/replica-info-idmipa02.nix.mds.xyz.gpg<\/strong><br \/>\n\tYour system may be partly configured.<br \/>\n\tRun \/usr\/sbin\/ipa-server-install &#8211;uninstall to clean up.<\/span>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\">ipapython.admintool: ERROR &nbsp; &nbsp;IPA server is already configured on this system.<br \/>\n\tIf you want to reinstall the IPA server, please uninstall it first using &#39;ipa-server-install &#8211;uninstall&#39;.<br \/>\n\tipapython.admintool: ERROR &nbsp; &nbsp;The ipa-replica-install command failed. See \/var\/log\/ipareplica-install.log for more information<\/span>\n<\/p>\n<p>\n\tHowever, it complained. Let&#39;s try to find another way. &nbsp;So rebooted instead to see if that will work. &nbsp;Nothing happened, apparently, though I did not fully check. &nbsp;However, running the following worked well:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\">[ idmipa02 ]<\/span>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"><strong># ipa-replica-manage re-initialize &#8211;from idmipa01.nix.mds.xyz<\/strong><br \/>\n\t<span style=\"color:#008000;\">Directory Manager password:<\/span><\/span>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"color:#008000;\"><span style=\"font-family:courier new,courier,monospace;\">Update in progress, 4 seconds elapsed<br \/>\n\tUpdate succeeded<\/span><\/span>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"><strong>#&nbsp;getcert list|grep -Ei &quot;Request ID|status:|stuck:|expires&quot;<\/strong><br \/>\n\tRequest ID &#39;20180122053638&#39;:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; status: MONITORING<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; stuck: no<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2024-09-15 05:15:58 UTC<br \/>\n\tRequest ID &#39;20180122053639&#39;:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; status: MONITORING<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; stuck: no<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2024-09-15 05:09:34 UTC<br \/>\n\tRequest ID &#39;20180122053640&#39;:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; status: MONITORING<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; stuck: no<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2024-09-15 05:14:47 UTC<br \/>\n\tRequest ID &#39;20180122053641&#39;:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; status: MONITORING<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; stuck: no<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2036-11-21 07:32:02 UTC<br \/>\n\tRequest ID &#39;20180122053642&#39;:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; status: MONITORING<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; stuck: no<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2024-08-31 09:03:44 UTC<br \/>\n\tRequest ID &#39;20180122053643&#39;:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; status: NEED_TO_SUBMIT<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; stuck: no<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2022-08-27 17:23:10 UTC<br \/>\n\tRequest ID &#39;20180122053644&#39;:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; status: CA_UNREACHABLE<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; stuck: no<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2022-09-29 17:22:58 UTC<br \/>\n\tRequest ID &#39;20180122053649&#39;:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; status: CA_UNREACHABLE<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; stuck: no<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2022-09-29 17:22:45 UTC<br \/>\n\tRequest ID &#39;20180122053742&#39;:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; status: MONITORING<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; stuck: no<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2023-09-26 00:54:54 UTC<\/span>\n<\/p>\n<p>\n\tAnd a full restart went perfectly well:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"><strong># ipactl restart<\/strong><br \/>\n\tRestarting Directory Service<br \/>\n\tRestarting krb5kdc Service<br \/>\n\tRestarting kadmin Service<br \/>\n\tRestarting named Service<br \/>\n\tRestarting httpd Service<br \/>\n\tRestarting ipa-custodia Service<br \/>\n\tRestarting ntpd Service<br \/>\n\tRestarting pki-tomcatd Service<br \/>\n\tRestarting smb Service<br \/>\n\tRestarting winbind Service<br \/>\n\tRestarting ipa-otpd Service<br \/>\n\tRestarting ipa-dnskeysyncd Service<br \/>\n\tipa: INFO: The ipactl command was successful<\/span>\n<\/p>\n<p>\n\tBut giving the above a few moments, certs still didn&#39;t update after some time. &nbsp;Trying to run the following:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"><strong># ipa-certupdate<\/strong><\/span>\n<\/p>\n<p>\n\tThis got me further but one is still unreachable with error:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"><strong># getcert list|grep -Ei &quot;Request ID|status:|stuck:|expires&quot;<\/strong><br \/>\n\tRequest ID &#39;20180122053638&#39;:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; status: MONITORING<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; stuck: no<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2024-09-15 05:15:58 UTC<br \/>\n\tRequest ID &#39;20180122053639&#39;:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; status: MONITORING<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; stuck: no<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2024-09-15 05:09:34 UTC<br \/>\n\tRequest ID &#39;20180122053640&#39;:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; status: MONITORING<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; stuck: no<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2024-09-15 05:14:47 UTC<br \/>\n\tRequest ID &#39;20180122053641&#39;:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; status: MONITORING<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; stuck: no<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2042-09-11 09:07:22 UTC<br \/>\n\tRequest ID &#39;20180122053642&#39;:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; status: MONITORING<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; stuck: no<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2024-08-31 09:03:44 UTC<br \/>\n\t<span style=\"color:#FF0000;\">Request ID &#39;20180122053643&#39;:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; status: CA_UNREACHABLE<\/span><br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; stuck: no<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2022-08-27 17:23:10 UTC<br \/>\n\tRequest ID &#39;20180122053644&#39;:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; status: MONITORING<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; stuck: no<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2024-09-27 23:42:10 UTC<br \/>\n\tRequest ID &#39;20180122053649&#39;:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; status: MONITORING<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; stuck: no<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2024-09-27 23:41:58 UTC<br \/>\n\tRequest ID &#39;20180122053742&#39;:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; status: MONITORING<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; stuck: no<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2023-09-26 00:54:54 UTC<\/span>\n<\/p>\n<p>\n\tA more detailed look from getcert list :\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\">Request ID &#39;20180122053643&#39;:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; status: CA_UNREACHABLE<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; ca-error: Error 60 connecting to https:\/\/idmipa02.nix.mds.xyz:8443\/ca\/agent\/ca\/profileReview: Peer certificate cannot be authenticated with given CA certificates.<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; stuck: no<\/span>\n<\/p>\n<p>\n\tResubmit did nothing:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<strong><span style=\"font-family:courier new,courier,monospace;\"># getcert resubmit -i 20180122053643<\/span><\/strong>\n<\/p>\n<p>\n\tChecking the CA we receive:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"><strong># ipa ca-show ipa &nbsp;-v<\/strong><br \/>\n\tUsage: ipa [global-options] ca-show NAME [options]<\/span>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"><strong># ipa ca-show ipa<\/strong><br \/>\n\tipa: ERROR: Failed to authenticate to CA REST API<\/span>\n<\/p>\n<p>\n\tDigging into the getcert list and \/var\/log\/pki\/pki-tomcat\/ca\/debug logs further, we get the following messages:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"><strong># getcert list<\/strong><br \/>\n\tca-error: Error 60 connecting to https:\/\/idmipa02.nix.mds.xyz:8443\/ca\/agent\/ca\/profileReview: Peer certificate cannot be authenticated with given CA certificates.<\/span>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<strong><span style=\"font-family:courier new,courier,monospace;\"># \/var\/log\/pki\/pki-tomcat\/ca\/debug<\/span><\/strong>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\">[28\/Sep\/2022:00:59:32][localhost-startStop-1]: CertUtils: verifySystemCertsByTag() failed: java.lang.Exception: Certutils.verifySystemCertValidityByNickname: &nbsp;faliled: nickname: Server-Cert cert-pki-cacause: java.lang.Exception: Certutils.verifySystemCertValidityByNickname: &nbsp;failed: nickname: Server-Cert cert-pki-ca<br \/>\n\t[28\/Sep\/2022:00:59:32][localhost-startStop-1]: SignedAuditLogger: event CIMC_CERT_VERIFICATION<br \/>\n\t[28\/Sep\/2022:00:59:32][localhost-startStop-1]: SignedAuditLogger: event CIMC_CERT_VERIFICATION<br \/>\n\tjava.lang.Exception: Certutils.verifySystemCertValidityByNickname: &nbsp;faliled: nickname: Server-Cert cert-pki-cacause: java.lang.Exception: Certutils.verifySystemCertValidityByNickname: &nbsp;failed: nickname: Server-Cert cert-pki-ca<\/span>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\">[28\/Sep\/2022:00:59:32][localhost-startStop-1]: SelfTestSubsystem: Shutting down server due to selftest failure: Certutils.verifySystemCertValidityByNickname: &nbsp;faliled: nickname: Server-Cert cert-pki-cacause: java.lang.Exception: Certutils.verifySystemCertValidityByNickname: &nbsp;failed: nickname: Server-Cert cert-pki-ca<br \/>\n\tjava.lang.Exception: Certutils.verifySystemCertValidityByNickname: &nbsp;faliled: nickname: Server-Cert cert-pki-cacause: java.lang.Exception: Certutils.verifySystemCertValidityByNickname: &nbsp;failed: nickname: Server-Cert cert-pki-ca<\/span>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\">[28\/Sep\/2022:00:59:33][http-bio-8080-exec-1]: Failed to read product version String. java.io.FileNotFoundException: \/usr\/share\/pki\/CS_SERVER_VERSION (No such file or directory)<\/span>\n<\/p>\n<p>\n\tWhich gives us a lead, but nothing came of that error in reading and searching. &nbsp;Then paid more attention and see this:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\">Request ID &#39;20180122053643&#39;:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; status: CA_UNREACHABLE<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; stuck: no<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2022-08-27 17:23:10 UTC<\/span>&nbsp; &nbsp; &nbsp; &nbsp;&nbsp;\n<\/p>\n<p>\n\tCert&#39;s expired. &nbsp;Time to roll back the clock:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"><strong># ipactl restart<\/strong><br \/>\n\tRestarting Directory Service<br \/>\n\tRestarting krb5kdc Service<br \/>\n\tRestarting kadmin Service<br \/>\n\tRestarting named Service<br \/>\n\tRestarting httpd Service<br \/>\n\tFailed to restart httpd Service<br \/>\n\tShutting down<br \/>\n\tHint: You can use &#8211;ignore-service-failure option for forced start in case that a non-critical service failed<br \/>\n\tAborting ipactl<\/span>\n<\/p>\n<p>\n\tbut nope this fails. &nbsp;Let&#39;s try the fix command:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<strong><span style=\"font-family:courier new,courier,monospace;\"># ipa-cert-fix<\/span><\/strong>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; WARNING<\/span>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\">ipa-cert-fix is intended for recovery when expired certificates<br \/>\n\tprevent the normal operation of IPA. &nbsp;It should ONLY be used<br \/>\n\tin such scenarios, and backup of the system, especially certificates<br \/>\n\tand keys, is STRONGLY RECOMMENDED.<\/span>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<br \/>\n\t<span style=\"font-family:courier new,courier,monospace;\">The following certificates will be renewed:<\/span>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\">Dogtag sslserver certificate:<br \/>\n\t&nbsp; Subject: CN=idmipa02.nix.mds.xyz,O=NIX.MDS.XYZ<br \/>\n\t&nbsp; Serial: &nbsp;268369924<br \/>\n\t&nbsp; Expires: 2022-08-27 17:23:10<\/span>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\">Enter &quot;yes&quot; to proceed: yes<br \/>\n\tProceeding.<br \/>\n\tCommand &#39;pki-server cert-fix &#8211;ldapi-socket \/var\/run\/slapd-NIX-MDS-XYZ.socket &#8211;agent-uid ipara &#8211;cert sslserver&#39; returned non-zero exit status 1<br \/>\n\tThe ipa-cert-fix command failed.<\/span>\n<\/p>\n<p>\n\tGetting the typical CSR error:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"><strong># pki-server cert-fix &#8211;ldapi-socket \/var\/run\/slapd-NIX-MDS-XYZ.socket &#8211;agent-uid ipara &#8211;cert sslserver<\/strong><br \/>\n\tINFO: Loading password config: \/etc\/pki\/pki-tomcat\/password.conf<br \/>\n\tINFO: Fixing the following system certs: [&#8216;sslserver&#8217;]<br \/>\n\tINFO: Renewing the following additional certs: []<br \/>\n\tSASL\/EXTERNAL authentication started<br \/>\n\tSASL username: gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth<br \/>\n\tSASL SSF: 0<br \/>\n\tINFO: Stopping the instance to proceed with system cert renewal<br \/>\n\tINFO: Configuring LDAP password authentication<br \/>\n\tINFO: Setting pkidbuser password via ldappasswd<br \/>\n\tSASL\/EXTERNAL authentication started<br \/>\n\tSASL username: gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth<br \/>\n\tSASL SSF: 0<br \/>\n\tINFO: Selftests disabled for subsystems: ca<br \/>\n\tINFO: Resetting password for uid=ipara,ou=people,o=ipaca<br \/>\n\tSASL\/EXTERNAL authentication started<br \/>\n\tSASL username: gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth<br \/>\n\tSASL SSF: 0<br \/>\n\tINFO: Creating a temporary sslserver cert<br \/>\n\tINFO: Getting sslserver cert info for ca<br \/>\n\tINFO: Trying to create a new temp cert for sslserver.<br \/>\n\tINFO: Generate temp SSL certificate<br \/>\n\tINFO: Getting sslserver cert info for ca<br \/>\n\tINFO: Selftests enabled for subsystems: ca<br \/>\n\tINFO: Restoring previous LDAP configuration<br \/>\n\tERROR: Unable to find CSR for sslserver cert<\/span>\n<\/p>\n<p>\n\tLet&#39;s get the CSR:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"><strong># grep -Ei &quot;csr=&quot; -A19 \/var\/lib\/certmonger\/requests\/20180122053643 | grep -Evi &quot;CATE REQ&quot; | tr -d &#39;[:space:]&#39;<\/strong><br \/>\n\tMIIDNzCCA&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;.4gpgJAb+hM=<\/span>\n<\/p>\n<p>\n\tCheck that you added the entry correctly:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"># ca.sslserver.certreq=MIIDNzCCAh8&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;.gpgJAb+hM=<\/span>\n<\/p>\n<p>\n\tTry the IPA fix once more. &nbsp;This time we have success:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<strong><span style=\"font-family:courier new,courier,monospace;\"># ipa-cert-fix<\/span><\/strong>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; WARNING<\/span>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\">ipa-cert-fix is intended for recovery when expired certificates<br \/>\n\tprevent the normal operation of IPA. &nbsp;It should ONLY be used<br \/>\n\tin such scenarios, and backup of the system, especially certificates<br \/>\n\tand keys, is STRONGLY RECOMMENDED.<\/span>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<br \/>\n\t<span style=\"font-family:courier new,courier,monospace;\">The following certificates will be renewed:<\/span>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\">Dogtag sslserver certificate:<br \/>\n\t&nbsp; Subject: CN=idmipa02.nix.mds.xyz,O=NIX.MDS.XYZ<br \/>\n\t&nbsp; Serial: &nbsp;268369924<br \/>\n\t&nbsp; Expires: 2022-08-27 17:23:10<\/span>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\">Enter &quot;yes&quot; to proceed: yes<br \/>\n\tProceeding.<br \/>\n\tRenewed Dogtag sslserver certificate:<br \/>\n\t&nbsp; Subject: CN=idmipa02.nix.mds.xyz,O=NIX.MDS.XYZ<br \/>\n\t&nbsp; Serial: &nbsp;268369929<br \/>\n\t&nbsp; Expires: 2024-09-17 05:32:43<\/span>\n<\/p>\n<p>\n\tThe ipa-cert-fix command was successful, apparently.&nbsp; Restarting services to confirm:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"><strong>[idmipa02] # ipactl status<\/strong><br \/>\n\tDirectory Service: RUNNING<br \/>\n\tkrb5kdc Service: RUNNING<br \/>\n\tkadmin Service: RUNNING<br \/>\n\tnamed Service: RUNNING<br \/>\n\thttpd Service: RUNNING<br \/>\n\tipa-custodia Service: RUNNING<br \/>\n\tntpd Service: RUNNING<br \/>\n\tpki-tomcatd Service: RUNNING<br \/>\n\tsmb Service: RUNNING<br \/>\n\twinbind Service: RUNNING<br \/>\n\tipa-otpd Service: RUNNING<br \/>\n\tipa-dnskeysyncd Service: RUNNING<br \/>\n\tipa: INFO: The ipactl command was successful<\/span>\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\"><strong>[idmipa02] # getcert list|grep -Ei &quot;Request ID|status:|stuck:|expires&quot;<\/strong><br \/>\n\tRequest ID &#39;20180122053638&#39;:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; status: MONITORING<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; stuck: no<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2024-09-15 05:15:58 UTC<br \/>\n\tRequest ID &#39;20180122053639&#39;:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; status: MONITORING<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; stuck: no<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2024-09-15 05:09:34 UTC<br \/>\n\tRequest ID &#39;20180122053640&#39;:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; status: MONITORING<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; stuck: no<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2024-09-15 05:14:47 UTC<br \/>\n\tRequest ID &#39;20180122053641&#39;:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; status: MONITORING<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; stuck: no<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2042-09-11 09:07:22 UTC<br \/>\n\tRequest ID &#39;20180122053642&#39;:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; status: MONITORING<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; stuck: no<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2024-08-31 09:03:44 UTC<br \/>\n\tRequest ID &#39;20180122053643&#39;:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; status: MONITORING<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; stuck: no<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2024-09-15 05:46:41 UTC<br \/>\n\tRequest ID &#39;20180122053644&#39;:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; status: MONITORING<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; stuck: no<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2024-09-27 23:42:10 UTC<br \/>\n\tRequest ID &#39;20180122053649&#39;:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; status: MONITORING<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; stuck: no<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2024-09-27 23:41:58 UTC<br \/>\n\tRequest ID &#39;20180122053742&#39;:<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; status: MONITORING<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; stuck: no<br \/>\n\t&nbsp; &nbsp; &nbsp; &nbsp; expires: 2023-09-26 00:54:54 UTC<\/span>\n<\/p>\n<p>\n\tAnd just to be sure:\n<\/p>\n<p style=\"margin-left: 40px;\">\n\t<span style=\"font-family:courier new,courier,monospace;\">[idmipa01]<br \/>\n\tipa config-show | grep &#39;IPA CA renewal master&#39;<br \/>\n\t&nbsp; IPA CA renewal master: idmipa01.nix.mds.xyz<br \/>\n\t&nbsp;&nbsp;<br \/>\n\t[idmipa02]<br \/>\n\tipa config-show | grep &#39;IPA CA renewal master&#39;<br \/>\n\t&nbsp; IPA CA renewal master: idmipa01.nix.mds.xyz<\/span>&nbsp;\n<\/p>\n<p>\n\tHope this helps someone!\n<\/p>\n<p>\n\tCheers,<br \/>\n\tTom\n<\/p>\n<p>\n\t<strong>REFERENCES:<\/strong><br \/>\n\t<a href=\"https:\/\/lists.fedoraproject.org\/archives\/list\/freeipa-users@lists.fedorahosted.org\/thread\/JYQU7PJGY4QV7C6S34Q7VOAAGU7FGLWF\/\" rel=\"external nofollow\">https:\/\/lists.fedoraproject.org\/archives\/list\/freeipa-users@lists.fedorahosted.org\/thread\/JYQU7PJGY4QV7C6S34Q7VOAAGU7FGLWF\/<\/a><br \/>\n\t<a href=\"https:\/\/floblanc.wordpress.com\/2017\/09\/11\/troubleshooting-freeipa-pki-tomcatd-fails-to-start\/\" rel=\"external nofollow\">https:\/\/floblanc.wordpress.com\/2017\/09\/11\/troubleshooting-freeipa-pki-tomcatd-fails-to-start\/<\/a><br \/>\n\t<a href=\"https:\/\/access.redhat.com\/solutions\/3081821\" rel=\"external nofollow\">https:\/\/access.redhat.com\/solutions\/3081821<\/a><br \/>\n\t<a href=\"https:\/\/access.redhat.com\/articles\/4062581\" rel=\"external nofollow\">https:\/\/access.redhat.com\/articles\/4062581<\/a><br \/>\n\t<a href=\"https:\/\/access.redhat.com\/solutions\/3357261\" rel=\"external nofollow\">https:\/\/access.redhat.com\/solutions\/3357261<\/a><br \/>\n\t<a href=\"https:\/\/rcritten.wordpress.com\/2017\/09\/20\/peer-certificate-cannot-be-authenticated-with-given-ca-certificates\/\" rel=\"external nofollow\">https:\/\/rcritten.wordpress.com\/2017\/09\/20\/peer-certificate-cannot-be-authenticated-with-given-ca-certificates\/<\/a><br \/>\n\t<a href=\"https:\/\/lists.fedorahosted.org\/archives\/list\/freeipa-users@lists.fedorahosted.org\/thread\/XSMWWPJU2VRUIGE6SRAHYAJF7BYBCNOE\/\" rel=\"external nofollow\">https:\/\/lists.fedorahosted.org\/archives\/list\/freeipa-users@lists.fedorahosted.org\/thread\/XSMWWPJU2VRUIGE6SRAHYAJF7BYBCNOE\/<\/a><br \/>\n\t<a href=\"https:\/\/frasertweedale.github.io\/blog-redhat\/posts\/2019-05-24-ipa-cert-fix.html\" rel=\"external nofollow\">https:\/\/frasertweedale.github.io\/blog-redhat\/posts\/2019-05-24-ipa-cert-fix.html<\/a><br \/>\n\t<a href=\"https:\/\/lists.fedorahosted.org\/archives\/list\/freeipa-users@lists.fedorahosted.org\/thread\/P73XKHFUJ75VHOJWK2A6ZTLZQ7I2IYE6\/\" rel=\"external nofollow\">https:\/\/lists.fedorahosted.org\/archives\/list\/freeipa-users@lists.fedorahosted.org\/thread\/P73XKHFUJ75VHOJWK2A6ZTLZQ7I2IYE6\/<\/a><br \/>\n\t<a href=\"https:\/\/floblanc.wordpress.com\/2016\/12\/19\/troubleshooting-certmonger-issues-with-freeipa\/\" rel=\"external nofollow\">https:\/\/floblanc.wordpress.com\/2016\/12\/19\/troubleshooting-certmonger-issues-with-freeipa\/<\/a><br \/>\n\t<a href=\"https:\/\/access.redhat.com\/solutions\/4908451\" rel=\"external nofollow\">https:\/\/access.redhat.com\/solutions\/4908451<\/a><br \/>\n\t<a href=\"https:\/\/access.redhat.com\/solutions\/4852721\" rel=\"external nofollow\">https:\/\/access.redhat.com\/solutions\/4852721<\/a><br \/>\n\t<a href=\"https:\/\/floblanc.wordpress.com\/2016\/12\/19\/troubleshooting-certmonger-issues-with-freeipa\/\" rel=\"external nofollow\">https:\/\/floblanc.wordpress.com\/2016\/12\/19\/troubleshooting-certmonger-issues-with-freeipa\/<\/a><br \/>\n\t<a href=\"https:\/\/floblanc.wordpress.com\/2016\/12\/19\/troubleshooting-certmonger-issues-with-freeipa\/\" rel=\"external nofollow\">https:\/\/floblanc.wordpress.com\/2016\/12\/19\/troubleshooting-certmonger-issues-with-freeipa\/<\/a><br \/>\n\t<a href=\"https:\/\/serverfault.com\/questions\/709470\/date-and-hwclock-not-in-sync-why\" rel=\"external nofollow\">https:\/\/serverfault.com\/questions\/709470\/date-and-hwclock-not-in-sync-why<\/a><\/p>\n\n    <div class=\"xs_social_share_widget xs_share_url after_content \t\tmain_content  wslu-style-1 wslu-share-box-shaped wslu-fill-colored wslu-none wslu-share-horizontal wslu-theme-font-no wslu-main_content\">\n\n\t\t\n        <ul>\n\t\t\t        <\/ul>\n    <\/div> \n","protected":false},"excerpt":{"rendered":"<p>Restore VM&#39;s from snapshot.&nbsp; Yes, this is a new attempt at restoring some FreeIPA hosts that have been, ahem, neglected slightly to the point where things expired and don&#39;t work.&nbsp; A few unexpected reboots and FS corruption didn&#39;t help the matter either.&nbsp; Regardless, the recovery will in many ways show off the&nbsp;restoration capabilities of.FreeIPA which [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[3],"tags":[],"class_list":["post-6088","post","type-post","status-publish","format-standard","hentry","category-unix-linux-admin-stuff"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/microdevsys.com\/wp\/wp-json\/wp\/v2\/posts\/6088","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/microdevsys.com\/wp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/microdevsys.com\/wp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/microdevsys.com\/wp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/microdevsys.com\/wp\/wp-json\/wp\/v2\/comments?post=6088"}],"version-history":[{"count":4,"href":"https:\/\/microdevsys.com\/wp\/wp-json\/wp\/v2\/posts\/6088\/revisions"}],"predecessor-version":[{"id":6092,"href":"https:\/\/microdevsys.com\/wp\/wp-json\/wp\/v2\/posts\/6088\/revisions\/6092"}],"wp:attachment":[{"href":"https:\/\/microdevsys.com\/wp\/wp-json\/wp\/v2\/media?parent=6088"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/microdevsys.com\/wp\/wp-json\/wp\/v2\/categories?post=6088"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/microdevsys.com\/wp\/wp-json\/wp\/v2\/tags?post=6088"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}