-
Story
-
Resolution: Unresolved
-
Major
-
None
-
ipa-4.13.1-1.el10
-
Low
-
rhel-idm-ipa
-
ssg_idm
-
22
-
24
-
0
-
QE ack, Dev ack
-
False
-
False
-
-
Yes
-
None
-
Pass
-
Automated
-
Enhancement
-
-
Proposed
-
Unspecified
-
Unspecified
-
Unspecified
-
None
As a system administrator, I would like a command to retrieve CA certificates from a working IPA server, so I don't need to manually installing CA certificates.
So far, ipa-certupdate queries the CA using https like:
# ipa-certupdate -v ... ipalib.rpc: DEBUG: trying https://server0.example.com/ipa/json ipalib.rpc: DEBUG: New HTTP connection (server0.example.com) ... ipalib.rpc: DEBUG: [try 1]: Forwarding 'ca_find/1' to json server 'https://server0.example.com/ipa/session/json'
However, when local CA certificates expired, the validation failed
Connection to https://server0.example.com/ipa/json failed with [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:897) Connection to https://server1.example.com/ipa/json failed with [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:897)
Thus we need a command or ipa-certupdate option to retrieve the CA certificates similar to
kinit -k
ldapsearch -Y gssapi -H ldap://server0.example.com -b 'cn=caSigningCert cert-pki-ca,cn=ca_renewal,cn=ipa,cn=etc,dc=example,dc=com'
- is depended on by
-
RHEL-149514 ipa-certupdate should handle the case when certificates /etc/ipa/ca.crt are expired or missing
-
- Closed
-
- links to
-
RHSA-2025:154934
ipa security update