cloudstack-dev mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From France <mailingli...@isg.si>
Subject Re: Urgent. Importing certificate to CS 4.3.1 using GUI
Date Thu, 25 Sep 2014 13:52:26 GMT
There is a bug in ACS 4.3.1 GUI.
The before mentioned process did not work with Firefox 32.0.2, while it worked on latest Chrome.
Because the problem is on the browser side, it did not reach management server logs at all.
I have done everything correct. Even a couple of times. ;-)

Hopefully this mail will help someone in the future. I would also advise to update the documentation
on the issue.

Do you want me to open a bug report for this? I am a little reluctant to do so, because some
of the bug reports i made previously just sit there for years to come.

FYI also got contacted off the mailing list by Steve Roles from ShapeBlue who kindly offered
to sell annual 24/7 support to help me sort this issue.
Too bad they did not want to provide help/support for this one incident, which which they
"have come across" already. They could get payed well for telling me to use another browser.
:-)
While i appreciate what ShapeBlue does for ACS, they could easily just have told us publicly
on the mailing list to use a different browser.

Many thanks to anyone else who actually tried to help on the issue. Realhostip.com migration
is now officially complete.

Regards,
F.

On 25 Sep 2014, at 14:54, France <mailinglists@isg.si> wrote:

> I have created new key and csr. Signed it, converted key to pkcs8 format without encryption
and added in ACS GUI with *.domain.tld and again with domain.tld. I did copy paste the crt
and key with and without -----BEGIN CERTIFICATE—— tags. Nothing works. I have the same
GUI error message as before. Management-log shows no errors or even logs regarding certificate
manipulation. I have not created CA key and certs again. I have confirmed certificate before
importing to ACS using: openssl x509 -in private/vse.somedomain.tls.crt -noout -text (result
below).
> 
> Maybe i could just insert new certs straight into the database, destroy console proxy
and see what happens.
> Any more ideas?
> 
> Also there is a bug in 4.3 documentation, because it says one must enter *.domain.tld
while you say, it should be just domain.tld
> 
> “
> In the Update SSL Certificate screen of the CloudStack UI, paste the following:
> 
> 	• The certificate you’ve just generated.
> 	• The private key you’ve just generated.
> 	• The desired domain name, prefixed with *.; for example, *.consoleproxy.company.com
> “
> 
> ////
> [root@mc1 private]# openssl x509 -in vse.somedomain.si.crt -noout -text
> Certificate:
>    Data:
>        Version: 3 (0x2)
>        Serial Number: 4097 (0x1001)
>    Signature Algorithm: sha256WithRSAEncryption
>        Issuer: C=SI, ST=Slovenia, L=Ljubljana, O=XXX d.o.o., OU=IT department, CN=optimus.si/emailAddress=sistem@XXXB.si
>        Validity
>            Not Before: Sep 25 12:25:32 2014 GMT
>            Not After : Jun  3 12:25:32 2028 GMT
>        Subject: C=SI, ST=Slovenia, O=XXX d.o.o., OU=IT department, CN=*.somedomain.si/emailAddress=sistem@XXXB.si
>        Subject Public Key Info:
>            Public Key Algorithm: rsaEncryption
>                Public-Key: (2048 bit)
>                Modulus:
>                    00:a8:50:02:21:7a:49:b1:48:07:96:21:87:69:1d:
>                    94:6f:d8:4f:0b:31:f4:8f:6f:e4:b2:78:94:38:d4:
>                    72:92:5b:d5:43:73:aa:e4:33:48:31:11:5a:62:7e:
>                    95:2b:e1:78:11:81:f0:ef:1a:0d:d0:52:90:47:2b:
>                    fd:ab:0d:89:57:fa:ee:6b:3b:d1:24:c9:a9:6d:d6:
>                    fb:0f:14:e3:72:63:a7:75:3d:3e:f5:57:45:09:7e:
>                    83:18:f1:77:c9:3a:1e:de:6f:cd:43:0f:84:11:08:
>                    05:3b:da:ed:3e:a6:65:7c:e9:3f:3b:b9:73:b3:87:
>                    b6:a2:14:af:fd:3e:a9:6f:0f:e4:fb:4d:91:70:d6:
>                    9a:78:b8:00:2e:f0:ad:24:07:01:64:b8:1f:ce:62:
>                    f6:83:e3:fb:45:b9:3e:a1:c3:e6:de:87:d9:37:d3:
>                    28:cf:20:6c:f9:78:5f:24:64:fb:d4:dd:79:90:87:
>                    69:36:ad:83:3d:bd:ab:fd:aa:1d:6a:a6:b8:d5:8a:
>                    f9:d6:e4:f0:db:9a:81:d4:41:e9:19:bf:a5:e8:fb:
>                    d9:f5:e2:50:3c:4d:01:6d:3d:96:26:59:76:70:99:
>                    8c:2e:c0:cf:dd:09:3b:fb:6f:8d:43:29:0c:7e:8a:
>                    5c:8d:49:f4:9a:96:ba:54:72:44:d8:fa:aa:64:71:
>                    27:21
>                Exponent: 65537 (0x10001)
>        X509v3 extensions:
>            X509v3 Basic Constraints: 
>                CA:FALSE
>            X509v3 Key Usage: 
>                Digital Signature, Non Repudiation, Key Encipherment
>            Netscape Comment: 
>                OpenSSL Generated Certificate
>            X509v3 Subject Key Identifier: 
>                13:B4:E9:B7:EA:67:BC:00:BA:20:F9:9D:AB:02:14:0D:22:B4:F7:5B
>            X509v3 Authority Key Identifier: 
>                keyid:B9:4F:AC:D0:CA:A4:32:E0:A0:49:48:8D:D4:C9:6A:6D:6F:6C:8F:42
> 
>    Signature Algorithm: sha256WithRSAEncryption
>         a9:f2:77:c2:10:9b:87:f4:44:9c:57:52:1b:dc:70:a7:e2:bf:
>         97:8d:bb:3d:bc:b7:a9:90:55:75:43:47:ac:bf:6f:2a:5e:90:
>         b1:5b:8c:41:e7:5a:51:2a:f7:db:2e:6a:37:e5:6e:18:3a:88:
>         ae:10:42:1e:97:4c:75:e9:8a:51:37:8f:e9:99:bc:40:46:18:
>         85:18:ce:6f:03:24:c7:b3:43:f2:53:51:34:36:70:d8:3b:84:
>         09:70:91:13:51:a9:b7:30:e4:d3:f7:1a:34:f4:6b:25:b7:46:
>         a1:dd:b7:eb:19:b3:03:be:b5:3d:12:b7:ee:a9:47:26:17:89:
>         ef:06:9e:90:b4:78:5d:d9:52:1c:b4:0d:14:f2:37:64:9a:d8:
>         4d:89:95:1e:c0:6b:14:93:e8:ea:91:84:69:c5:22:1f:d2:82:
>         54:bd:fe:06:f8:ea:f3:66:a1:27:41:72:88:25:78:eb:2b:1b:
>         73:fb:98:0f:00:58:b0:43:22:5b:3b:ea:89:b5:4f:3e:2a:ed:
>         92:5f:48:37:39:ec:39:6c:b5:73:d3:0d:9c:ff:3b:37:92:5b:
>         c6:ef:64:65:7a:99:1a:be:09:0e:bb:62:1b:9f:9e:ad:5d:cf:
>         32:8c:81:42:c2:d9:11:65:64:8d:ce:5e:f5:b4:77:66:74:eb:
>         10:d5:7e:58:d7:ba:70:fe:96:4b:94:f5:66:5c:af:57:ae:e0:
>         ad:72:7a:ef:04:80:7e:4b:6d:ee:13:e2:de:20:94:4e:bb:7b:
>         a6:87:0f:92:d8:c4:01:9b:50:fd:b4:0b:60:b2:93:91:32:ce:
>         31:f9:b7:4f:a0:72:71:a1:87:b4:02:ff:5b:49:c1:2f:a1:6d:
>         13:98:c1:81:9c:33:f6:61:b9:f9:47:7b:7b:2a:b2:e0:7b:21:
>         4b:67:c0:23:04:b7:08:e5:7d:a3:44:b5:a5:aa:ce:03:be:93:
>         cb:78:fe:2d:e5:a7:61:20:03:b2:a1:ac:92:41:54:c0:25:b5:
>         32:c6:c5:83:49:7a:cd:a8:16:4e:80:f2:05:9c:47:17:74:1f:
>         55:63:f2:9c:e3:fa:48:cb:93:40:8f:63:7b:69:2f:2a:22:4e:
>         0e:44:1b:52:3e:70:fb:65:43:be:a2:0a:04:5e:70:cf:d7:fe:
>         d5:66:0a:19:81:d5:bf:54:ce:fd:25:cc:d8:f6:cc:be:e8:a9:
>         e1:a9:38:ef:81:80:2e:61:52:fb:0a:0c:e5:21:e1:7a:c8:3f:
>         8e:6a:9a:ab:a6:72:81:54:43:08:65:b8:62:00:08:c8:c2:f6:
>         88:82:7e:fb:07:22:67:09:c0:1a:fb:d9:69:17:2a:d8:be:01:
>         7e:e5:ee:3d:1b:f1:bf:3f
> ////
> 
> 
> Tnx and regards,
> F.
> 
> 
> On 25 Sep 2014, at 13:48, France <mailinglists@isg.si> wrote:
> 
>> Tnx Amogh,
>> 
>> i have checked management-server.log and no new entries or errors regarding certificate
operation are written at the time when i get "Failed to update SSL Certificate." error message.
I tried it a couple of times. I also used somedomain.tld in the GUI. Certificate is for *.somedomain.tld.
>> I will go thru whole create CA and certificate process again and retry.
>> There must be some simple mistake in my process somewhere. Lack of errors in logs,
is also strange. :-/
>> 
>> Regards,
>> F.
>> 
>> On 24 Sep 2014, at 21:10, Amogh Vasekar <amogh.vasekar@citrix.com> wrote:
>> 
>>> Hi,
>>> 
>>> Couple of things :
>>> 
>>> 1. The error will be logged to the cloudstack management server log file
>>> (management-server.log) and would really help to know what it is.
>>> 2. While uploading the certificate, the domain_suffix should be
>>> somedomain.tld and not *.somedomain.tld (the asterisk is only for global
>>> config so that cloudstack can distinguish between HTTP and HTTPS modes)
>>> 
>>> Thanks
>>> Amogh
>>> 
>>> On 9/24/14 7:40 AM, "France" <mailinglists@isg.si> wrote:
>>> 
>>>> Hi guys,
>>>> 
>>>> i want to migrate away from realhostip.com. I have set up DNS service in
>>>> no time, but am having problems importing certificates to ACS 3.4.1.
>>>> 
>>>> I created my own CA like this:
>>>> 
>>>> cd /etc/pki/CA
>>>> touch index.txt
>>>> echo 1000 > serial
>>>> openssl genrsa -aes256 -out /etc/pki/CA/private/ca.key.pem 4096
>>>> chmod 400 /etc/pki/CA/private/ca.key.pem
>>>> nano -w /etc/pki/tls/openssl.cnf
>>>> openssl req -new -x509 -days 63650 -key /etc/pki/CA/private/ca.key.pem
>>>> -sha256 -extensions v3_ca -out /etc/pki/CA/certs/ca.cert.pem
>>>> 
>>>> 
>>>> Signed my own keys and converted them to pkcs8 format like this:
>>>> 
>>>> cd /etc/pki/CA
>>>> openssl genrsa -out private/vse.somedomain.tld.key.pem 4096
>>>> chmod 400 private/vse.somedomain.tld.key.pem
>>>> openssl req -sha256 -new -key private/vse.somedomain.tld.key.pem  -out
>>>> certs/vse.somedomain.tld.csr.pem
>>>> openssl ca -keyfile private/ca.key.pem -cert certs/ca.cert.pem
>>>> -extensions usr_cert -notext -md sha256 -days 63649 -in
>>>> certs/vse.somedomain.tld.csr.pem -out certs/vse.somedomain.tld.cert.pem
>>>> openssl pkcs8 -topk8 -in private/vse.somedomain.tld.key.pem -out
>>>> private/vse.somedomain.tld.key.encrypted.pkcs8
>>>> openssl pkcs8 -in private/vse.somedomain.tld.key.encrypted.pkcs8 -out
>>>> private/vse.somedomain.tld.key.pkcs8
>>>> chmod 400 private/vse.somedomain.tld.key.encrypted.pkcs8
>>>> chmod 400 private/vse.somedomain.tld.key.pkcs8
>>>> 
>>>> 
>>>> 
>>>> But when trying to import it via GUI: infrastructure -> SSL Certificate:
>>>> Certificate from vse.somedomain.tld.cert.pem
>>>> PKCS8 from private/vse.somedomain.tld.key.pkcs8
>>>> DNS domain suffix to: *.somedomain.tld
>>>> 
>>>> But it fails with:
>>>> "Failed to update SSL Certificate."
>>>> 
>>>> Please help me upload the new certificate.
>>>> Catalina.out shows no error. I have no idea what else to check.
>>>> 
>>>> Thank you.
>>>> F.
>>>> 
>>>> 
>>> 
>> 
> 


Mime
  • Unnamed multipart/alternative (inline, None, 0 bytes)
View raw message