Hello,
I have an environment with about a dozen or so SLES 12 SP1 and SP2 servers that are all getting patches off a local SMT server. All of the servers have been working fine, but after updating one SP1 server, upon reboot, it no longer will trust the certificate used on the SMT server. Any time I try and patch it or use SUSEConnect I get:
SSL verification failed: self signed certificate in certificate chain
Certificate issuer: /C=US/CN=YaST Default CA (sles-smt3)/emailAddress=postmaster@sles-smt3
Certificate subject: /C=US/CN=YaST Default CA (sles-smt3)/emailAddress=postmaster@sles-smt3
SUSEConnect error: OpenSSL::SSL::SSLError: SSL_connect returned=1 errno=0 state=error: certificate verify failed
I took the cert and put in /etc/pki/trust/anchors and ran update-ca-certificates, but it still errors out. I also checked /var/lib/ca-certificates/ca-bundle.pem and the certificate is indeed in that file.
All the other servers work just fine, it’s just this single SLES 12 SP1 server refuses to trust it and I am baffled as to why.
If you look at that time, it is in the future! I’m not sure how the heck that happened. So I tried to delete it, I got an error:
Successfully delete registration locally : SCC_275061e5d1e44175b253e9e3848c7429
Failed to delete registration for id malformed JSON string, neither array, object, number, string or atom, at character offset 0 (before “(end of string)”) at /usr/lib/perl5/vendor_perl/5.18.2/SMT/SCCAPI.pm line 510.
I tried to then register the problem server, but I still get the same error about the cert.
Well it is gone from the list of registrations now. When I did the smt-delete-registration, even though it produced an error, it wiped it out.
If I look at the /etc/zypp/credentials.d dir, I see the file for the SMT server, but that username value is gone from the list of registrations now. I wonder if I should clear out the credential files maybe?
Which log may lend a clue?
I may resort to just bringing this box up to SP2 using the ISO and then see if I can get it to re-register maybe.
I think I made an interesting discovery. I was using openssl to test connectivity to the SMT server, and I noticed this when I launched the command:
WARNING: can’t open config file: /FIPS/1.0.2k/Linux_x86_64/ssl/openssl.cnf
This server has NetIQ eDirectory 9 on it. I’m wondering if eDir messed with the SSL configuration on the server? I’m wondering now if that is the whole problem, it cannot find openssl.cnf and therefore cannot find the trusted root file maybe???
What about the system BIOS date and time? Are you setting
system/hardware time to UTC? BIOS Battery failing(?)
–
Cheers Malcolm °¿° SUSE Knowledge Partner (Linux Counter #276890)
openSUSE Leap 42.2|GNOME 3.20.2|4.4.73-18.17-default
If you find this post helpful and are logged into the web interface,
please show your appreciation and click on the star below… Thanks!
–
Cheers Malcolm °¿° SUSE Knowledge Partner (Linux Counter #276890)
openSUSE Leap 42.2|GNOME 3.20.2|4.4.73-18.17-default
If you find this post helpful and are logged into the web interface,
please show your appreciation and click on the star below… Thanks!
Hi
Sounds like a bug report for eDirectory may be needed… SP2 is
running 1.0.2j
–
Cheers Malcolm °¿° SUSE Knowledge Partner (Linux Counter #276890)
openSUSE Leap 42.2|GNOME 3.20.2|4.4.73-18.17-default
If you find this post helpful and are logged into the web interface,
please show your appreciation and click on the star below… Thanks!