RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
Bug 1452340 - Ensuring common audit log correctness
Summary: Ensuring common audit log correctness
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Linux 7
Classification: Red Hat
Component: pki-core
Version: 7.4
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: rc
: ---
Assignee: Endi Sukma Dewata
QA Contact: Asha Akkiangady
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2017-05-18 18:00 UTC by Matthew Harmsen
Modified: 2020-10-04 21:25 UTC (History)
1 user (show)

Fixed In Version: pki-core-10.4.1-5.el7
Doc Type: No Doc Update
Doc Text:
undefined
Clone Of:
Environment:
Last Closed: 2017-08-01 22:52:53 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Github dogtagpki pki issues 2761 0 None None None 2020-10-04 21:25:38 UTC
Red Hat Product Errata RHBA-2017:2110 0 normal SHIPPED_LIVE pki-core bug fix and enhancement update 2017-08-01 19:36:59 UTC

Description Matthew Harmsen 2017-05-18 18:00:40 UTC
This bug is created as a clone of upstream ticket:
https://pagure.io/dogtagpki/issue/2641

This is part of ticket #2635 phase 1.

The code that generates common (not subsystem-specific) audit log need to be inspected to ensure that it includes the correct audit fields. This can be done by creating strongly-typed event class as described in the following page:

http://pki.fedoraproject.org/wiki/PKI_10.4_Audit_Log_Improvements

Comment 2 Matthew Harmsen 2017-05-18 18:03:17 UTC
The following information was provided by edewata in the Pagure issue:

This includes the following audit events:

    AUTH_SUCCESS
    AUTH_FAIL
    AUTHZ_SUCCESS
    AUTHZ_FAIL
    ROLE_ASSUME
    CONFIG_ROLE
    CONFIG_SIGNED_AUDIT
    CONFIG_TRUSTED_PUBLIC_KEY

Patches for review:

    AUTH_SUCCESS: https://review.gerrithub.io/357903
    AUTH_FAIL: https://review.gerrithub.io/357904
    AUTHZ_SUCCESS: https://review.gerrithub.io/357905
    AUTHZ_FAIL: https://review.gerrithub.io/357906
    ROLE_ASSUME: https://review.gerrithub.io/357907
    CONFIG_ROLE: https://review.gerrithub.io/358065
    CONFIG_SIGNED_AUDIT: https://review.gerrithub.io/358066
    CONFIG_TRUSTED_PUBLIC_KEY: https://review.gerrithub.io/358739

This is documented in the following page:
http://pki.fedoraproject.org/wiki/PKI_Server_Audit_Events

Comment 4 Sumedh Sidhaye 2017-06-08 04:05:55 UTC
[root@csqa4-guest01 ~]# rpm -qi pki-server
Name        : pki-server
Version     : 10.4.1
Release     : 6.el7
Architecture: noarch
Install Date: Wednesday 24 May 2017 10:52:30 PM EDT
Group       : System Environment/Base
Size        : 4650625
License     : GPLv2
Signature   : (none)
Source RPM  : pki-core-10.4.1-6.el7.src.rpm
Build Date  : Tuesday 23 May 2017 04:37:48 PM EDT
Build Host  : ppc-016.build.eng.bos.redhat.com
Relocations : (not relocatable)
Packager    : Red Hat, Inc. <http://bugzilla.redhat.com/bugzilla>
Vendor      : Red Hat, Inc.
URL         : http://pki.fedoraproject.org/
Summary     : Certificate System - PKI Server Framework

Logging into the pkiconsole with valid credentials
0.http-bio-8443-exec-11 - [07/Jun/2017:23:19:31 EDT] [14] [6] [AuditEvent=ACCESS_SESSION_ESTABLISH_SUCCESS][ClientIP=10.65.206.81][ServerIP=10.12.28.205][SubjectID=][Outcome=Success] access session establish success
0.http-bio-8443-exec-14 - [07/Jun/2017:23:19:33 EDT] [14] [6] [AuditEvent=ACCESS_SESSION_ESTABLISH_SUCCESS][ClientIP=10.65.206.81][ServerIP=10.12.28.205][SubjectID=][Outcome=Success] access session establish success
0.http-bio-8443-exec-15 - [07/Jun/2017:23:19:49 EDT] [14] [6] [AuditEvent=ACCESS_SESSION_ESTABLISH_SUCCESS][ClientIP=10.65.206.81][ServerIP=10.12.28.205][SubjectID=][Outcome=Success] access session establish success
0.http-bio-8443-exec-15 - [07/Jun/2017:23:19:49 EDT] [14] [6] [AuditEvent=AUTH_SUCCESS][SubjectID=caadmin][Outcome=Success][AuthMgr=passwdUserDBAuthMgr] authentication success
0.http-bio-8443-exec-15 - [07/Jun/2017:23:19:50 EDT] [14] [6] [AuditEvent=AUTH_SUCCESS][SubjectID=caadmin][Outcome=Success][AuthMgr=passwdUserDBAuthMgr] authentication success
0.http-bio-8443-exec-15 - [07/Jun/2017:23:19:50 EDT] [14] [6] [AuditEvent=AUTHZ_SUCCESS][SubjectID=caadmin][Outcome=Success][aclResource=certServer.log.configuration][Op=read] authorization success
0.http-bio-8443-exec-15 - [07/Jun/2017:23:19:50 EDT] [14] [6] [AuditEvent=ROLE_ASSUME][SubjectID=caadmin][Outcome=Success][Role=Certificate Manager Agents, Administrators, Security Domain Administrators, Enterprise CA Administrators, Enterprise KRA Administrators, Enterprise OCSP Administrators, Enterprise TKS Administrators, Enterprise RA Administrators, Enterprise TPS Administrators] assume privileged role
0.http-bio-8443-exec-15 - [07/Jun/2017:23:19:51 EDT] [14] [6] [AuditEvent=AUTH_SUCCESS][SubjectID=caadmin][Outcome=Success][AuthMgr=passwdUserDBAuthMgr] authentication success
0.http-bio-8443-exec-15 - [07/Jun/2017:23:19:51 EDT] [14] [6] [AuditEvent=AUTHZ_SUCCESS][SubjectID=caadmin][Outcome=Success][aclResource=certServer.general.configuration][Op=read] authorization success
0.http-bio-8443-exec-15 - [07/Jun/2017:23:19:51 EDT] [14] [6] [AuditEvent=ROLE_ASSUME][SubjectID=caadmin][Outcome=Success][Role=Certificate Manager Agents, Administrators, Security Domain Administrators, Enterprise CA Administrators, Enterprise KRA Administrators, Enterprise OCSP Administrators, Enterprise TKS Administrators, Enterprise RA Administrators, Enterprise TPS Administrators] assume privileged role
0.http-bio-8443-exec-15 - [07/Jun/2017:23:19:51 EDT] [14] [6] [AuditEvent=AUTH_SUCCESS][SubjectID=caadmin][Outcome=Success][AuthMgr=passwdUserDBAuthMgr] authentication success
0.http-bio-8443-exec-15 - [07/Jun/2017:23:19:51 EDT] [14] [6] [AuditEvent=AUTHZ_SUCCESS][SubjectID=caadmin][Outcome=Success][aclResource=certServer.ca.configuration][Op=read] authorization success
0.http-bio-8443-exec-15 - [07/Jun/2017:23:19:51 EDT] [14] [6] [AuditEvent=ROLE_ASSUME][SubjectID=caadmin][Outcome=Success][Role=Certificate Manager Agents, Administrators, Security Domain Administrators, Enterprise CA Administrators, Enterprise KRA Administrators, Enterprise OCSP Administrators, Enterprise TKS Administrators, Enterprise RA Administrators, Enterprise TPS Administrators] assume privileged role
0.http-bio-8443-exec-15 - [07/Jun/2017:23:19:52 EDT] [14] [6] [AuditEvent=AUTH_SUCCESS][SubjectID=caadmin][Outcome=Success][AuthMgr=passwdUserDBAuthMgr] authentication success
0.http-bio-8443-exec-15 - [07/Jun/2017:23:19:52 EDT] [14] [6] [AuditEvent=AUTHZ_SUCCESS][SubjectID=caadmin][Outcome=Success][aclResource=certServer.general.configuration][Op=read] authorization success
0.http-bio-8443-exec-15 - [07/Jun/2017:23:19:52 EDT] [14] [6] [AuditEvent=ROLE_ASSUME][SubjectID=caadmin][Outcome=Success][Role=Certificate Manager Agents, Administrators, Security Domain Administrators, Enterprise CA Administrators, Enterprise KRA Administrators, Enterprise OCSP Administrators, Enterprise TKS Administrators, Enterprise RA Administrators, Enterprise TPS Administrators] assume privileged role


Accessing pkiconsole using incorrect password

0.http-bio-8443-exec-23 - [07/Jun/2017:23:22:34 EDT] [14] [6] [AuditEvent=ACCESS_SESSION_ESTABLISH_SUCCESS][ClientIP=10.65.206.81][ServerIP=10.12.28.205][SubjectID=][Outcome=Success] access session establish success
0.http-bio-8443-exec-21 - [07/Jun/2017:23:22:35 EDT] [14] [6] [AuditEvent=ACCESS_SESSION_ESTABLISH_SUCCESS][ClientIP=10.65.206.81][ServerIP=10.12.28.205][SubjectID=][Outcome=Success] access session establish success
0.http-bio-8443-exec-4 - [07/Jun/2017:23:22:47 EDT] [14] [6] [AuditEvent=ACCESS_SESSION_ESTABLISH_SUCCESS][ClientIP=10.65.206.81][ServerIP=10.12.28.205][SubjectID=][Outcome=Success] access session establish success
0.http-bio-8443-exec-4 - [07/Jun/2017:23:22:47 EDT] [14] [6] [AuditEvent=AUTH_FAIL][SubjectID=$Unidentified$][Outcome=Failure][AuthMgr=passwdUserDBAuthMgr][AttemptedCred=caadmin] authentication failure
0.http-bio-8443-exec-4 - [07/Jun/2017:23:22:47 EDT] [14] [6] [AuditEvent=AUTH_FAIL][SubjectID=$Unidentified$][Outcome=Failure][AuthMgr=passwdUserDBAuthMgr][AttemptedCred=caadmin] authentication failure


Running ca-audit-file-find command with caadmin user
pki -d /tmp/nssdb/ -c SECret.123 -n "PKI CA Administrator rhcs92-CA-ssidhaye-May25" ca-audit-file-find

0.http-bio-8443-exec-22 - [07/Jun/2017:23:44:33 EDT] [14] [6] [AuditEvent=ACCESS_SESSION_ESTABLISH_SUCCESS][ClientIP=10.12.28.205][ServerIP=10.12.28.205][SubjectID=CN=PKI Administrator,E=example,OU=rhcs92-CA-ssidhaye-May25,O=Example-rhcs92-CA-May25][Outcome=Success] access session establish success
0.http-bio-8443-exec-22 - [07/Jun/2017:23:44:33 EDT] [14] [6] [AuditEvent=AUTH_SUCCESS][SubjectID=caadmin][Outcome=Success][AuthMgr=certUserDBAuthMgr] authentication success
0.http-bio-8443-exec-22 - [07/Jun/2017:23:44:33 EDT] [14] [6] [AuditEvent=AUTHZ_SUCCESS][SubjectID=caadmin][Outcome=Success][aclResource=certServer.ca.account][Op=login][Info=AccountResource.login] authorization success
0.http-bio-8443-exec-22 - [07/Jun/2017:23:44:33 EDT] [14] [6] [AuditEvent=ACCESS_SESSION_TERMINATED][ClientIP=10.12.28.205][ServerIP=10.12.28.205][SubjectID=CN=PKI Administrator,E=example,OU=rhcs92-CA-ssidhaye-May25,O=Example-rhcs92-CA-May25][Outcome=Success][Info=CLOSE_NOTIFY] access session terminated
0.http-bio-8443-exec-17 - [07/Jun/2017:23:44:33 EDT] [14] [6] [AuditEvent=ACCESS_SESSION_ESTABLISH_SUCCESS][ClientIP=10.12.28.205][ServerIP=10.12.28.205][SubjectID=CN=PKI Administrator,E=example,OU=rhcs92-CA-ssidhaye-May25,O=Example-rhcs92-CA-May25][Outcome=Success] access session establish success
0.http-bio-8443-exec-17 - [07/Jun/2017:23:44:33 EDT] [14] [6] [AuditEvent=AUTHZ_FAIL][SubjectID=caadmin][Outcome=Failure][aclResource=certServer.log.content.signedAudit][Op=read][Info=Authorization Error] authorization failure
0.http-bio-8443-exec-17 - [07/Jun/2017:23:44:33 EDT] [14] [6] [AuditEvent=ACCESS_SESSION_TERMINATED][ClientIP=10.12.28.205][ServerIP=10.12.28.205][SubjectID=CN=PKI Administrator,E=example,OU=rhcs92-CA-ssidhaye-May25,O=Example-rhcs92-CA-May25][Outcome=Success][Info=CLOSE_NOTIFY] access session terminated


pki -d /tmp/nssdb/ -c SECret.123 -h csqa4-guest01.idm.lab.eng.rdu.redhat.com -p 8080 -n "PKI CA Administrator rhcs92-CA-ssidhaye-May25" ca-user-add testuser --fullName testuser --password SECret.123

0.http-bio-8443-exec-11 - [07/Jun/2017:23:49:07 EDT] [14] [6] [AuditEvent=ACCESS_SESSION_ESTABLISH_SUCCESS][ClientIP=10.12.28.205][ServerIP=10.12.28.205][SubjectID=CN=PKI Administrator,E=example,OU=rhcs92-CA-ssidhaye-May25,O=Example-rhcs92-CA-May25][Outcome=Success] access session establish success
0.http-bio-8443-exec-11 - [07/Jun/2017:23:49:07 EDT] [14] [6] [AuditEvent=AUTH_SUCCESS][SubjectID=caadmin][Outcome=Success][AuthMgr=certUserDBAuthMgr] authentication success
0.http-bio-8443-exec-11 - [07/Jun/2017:23:49:07 EDT] [14] [6] [AuditEvent=AUTHZ_SUCCESS][SubjectID=caadmin][Outcome=Success][aclResource=certServer.ca.account][Op=login][Info=AccountResource.login] authorization success
0.http-bio-8443-exec-11 - [07/Jun/2017:23:49:07 EDT] [14] [6] [AuditEvent=ACCESS_SESSION_TERMINATED][ClientIP=10.12.28.205][ServerIP=10.12.28.205][SubjectID=CN=PKI Administrator,E=example,OU=rhcs92-CA-ssidhaye-May25,O=Example-rhcs92-CA-May25][Outcome=Success][Info=CLOSE_NOTIFY] access session terminated
0.http-bio-8443-exec-25 - [07/Jun/2017:23:49:07 EDT] [14] [6] [AuditEvent=ACCESS_SESSION_ESTABLISH_SUCCESS][ClientIP=10.12.28.205][ServerIP=10.12.28.205][SubjectID=CN=PKI Administrator,E=example,OU=rhcs92-CA-ssidhaye-May25,O=Example-rhcs92-CA-May25][Outcome=Success] access session establish success
0.http-bio-8443-exec-25 - [07/Jun/2017:23:49:07 EDT] [14] [6] [AuditEvent=AUTHZ_SUCCESS][SubjectID=caadmin][Outcome=Success][aclResource=certServer.ca.users][Op=execute][Info=UserResource.addUser] authorization success
0.http-bio-8443-exec-25 - [07/Jun/2017:23:49:07 EDT] [14] [6] [AuditEvent=CONFIG_ROLE][SubjectID=caadmin][Outcome=Success][ParamNameValPairs=Scope;;users+Operation;;OP_ADD+Resource;;testuser+password;;********+phone;;<null>+fullname;;testuser+state;;<null>+userType;;<null>+email;;<null>] role configuration parameter(s) change
0.http-bio-8443-exec-25 - [07/Jun/2017:23:49:07 EDT] [14] [6] [AuditEvent=ACCESS_SESSION_TERMINATED][ClientIP=10.12.28.205][ServerIP=10.12.28.205][SubjectID=CN=PKI Administrator,E=example,OU=rhcs92-CA-ssidhaye-May25,O=Example-rhcs92-CA-May25][Outcome=Success][Info=CLOSE_NOTIFY] access session terminated
0.http-bio-8443-exec-6 - [07/Jun/2017:23:49:07 EDT] [14] [6] [AuditEvent=ACCESS_SESSION_ESTABLISH_SUCCESS][ClientIP=10.12.28.205][ServerIP=10.12.28.205][SubjectID=CN=PKI Administrator,E=example,OU=rhcs92-CA-ssidhaye-May25,O=Example-rhcs92-CA-May25][Outcome=Success] access session establish success
0.http-bio-8443-exec-6 - [07/Jun/2017:23:49:07 EDT] [14] [6] [AuditEvent=AUTHZ_SUCCESS][SubjectID=caadmin][Outcome=Success][aclResource=certServer.ca.account][Op=logout][Info=AccountResource.logout] authorization success
0.http-bio-8443-exec-6 - [07/Jun/2017:23:49:07 EDT] [14] [6] [AuditEvent=ACCESS_SESSION_TERMINATED][ClientIP=10.12.28.205][ServerIP=10.12.28.205][SubjectID=CN=PKI Administrator,E=example,OU=rhcs92-CA-ssidhaye-May25,O=Example-rhcs92-CA-May25][Outcome=Success][Info=CLOSE_NOTIFY] access session terminated


Enable auditing
pki -d /tmp/nssdb/ -c SECret.123 -h csqa4-guest01.idm.lab.eng.rdu.redhat.com -p 8080 -n "PKI CA Administrator rhcs92-CA-ssidhaye-May25" ca-audit-mod --action enable
0.http-bio-8443-exec-21 - [07/Jun/2017:23:52:14 EDT] [14] [6] [AuditEvent=ACCESS_SESSION_ESTABLISH_SUCCESS][ClientIP=10.12.28.205][ServerIP=10.12.28.205][SubjectID=CN=PKI Administrator,E=example,OU=rhcs92-CA-ssidhaye-May25,O=Example-rhcs92-CA-May25][Outcome=Success] access session establish success
0.http-bio-8443-exec-21 - [07/Jun/2017:23:52:14 EDT] [14] [6] [AuditEvent=AUTH_SUCCESS][SubjectID=caadmin][Outcome=Success][AuthMgr=certUserDBAuthMgr] authentication success
0.http-bio-8443-exec-21 - [07/Jun/2017:23:52:14 EDT] [14] [6] [AuditEvent=AUTHZ_SUCCESS][SubjectID=caadmin][Outcome=Success][aclResource=certServer.ca.account][Op=login][Info=AccountResource.login] authorization success
0.http-bio-8443-exec-21 - [07/Jun/2017:23:52:14 EDT] [14] [6] [AuditEvent=ACCESS_SESSION_TERMINATED][ClientIP=10.12.28.205][ServerIP=10.12.28.205][SubjectID=CN=PKI Administrator,E=example,OU=rhcs92-CA-ssidhaye-May25,O=Example-rhcs92-CA-May25][Outcome=Success][Info=CLOSE_NOTIFY] access session terminated
0.http-bio-8443-exec-8 - [07/Jun/2017:23:52:14 EDT] [14] [6] [AuditEvent=ACCESS_SESSION_ESTABLISH_SUCCESS][ClientIP=10.12.28.205][ServerIP=10.12.28.205][SubjectID=CN=PKI Administrator,E=example,OU=rhcs92-CA-ssidhaye-May25,O=Example-rhcs92-CA-May25][Outcome=Success] access session establish success
0.http-bio-8443-exec-8 - [07/Jun/2017:23:52:14 EDT] [14] [6] [AuditEvent=AUTHZ_SUCCESS][SubjectID=caadmin][Outcome=Success][aclResource=certServer.log.configuration][Op=modify][Info=AuditResource.changeAuditStatus] authorization success
0.http-bio-8443-exec-8 - [07/Jun/2017:23:52:14 EDT] [14] [6] [AuditEvent=CONFIG_SIGNED_AUDIT][SubjectID=caadmin][Outcome=Success][ParamNameValPairs=+Action;;enable] signed audit configuration parameter(s) change
0.http-bio-8443-exec-8 - [07/Jun/2017:23:52:14 EDT] [14] [6] [AuditEvent=ACCESS_SESSION_TERMINATED][ClientIP=10.12.28.205][ServerIP=10.12.28.205][SubjectID=CN=PKI Administrator,E=example,OU=rhcs92-CA-ssidhaye-May25,O=Example-rhcs92-CA-May25][Outcome=Success][Info=CLOSE_NOTIFY] access session terminated
0.http-bio-8443-exec-5 - [07/Jun/2017:23:52:14 EDT] [14] [6] [AuditEvent=ACCESS_SESSION_ESTABLISH_SUCCESS][ClientIP=10.12.28.205][ServerIP=10.12.28.205][SubjectID=CN=PKI Administrator,E=example,OU=rhcs92-CA-ssidhaye-May25,O=Example-rhcs92-CA-May25][Outcome=Success] access session establish success
0.http-bio-8443-exec-5 - [07/Jun/2017:23:52:14 EDT] [14] [6] [AuditEvent=AUTHZ_SUCCESS][SubjectID=caadmin][Outcome=Success][aclResource=certServer.ca.account][Op=logout][Info=AccountResource.logout] authorization success
0.http-bio-8443-exec-5 - [07/Jun/2017:23:52:14 EDT] [14] [6] [AuditEvent=ACCESS_SESSION_TERMINATED][ClientIP=10.12.28.205][ServerIP=10.12.28.205][SubjectID=CN=PKI Administrator,E=example,OU=rhcs92-CA-ssidhaye-May25,O=Example-rhcs92-CA-May25][Outcome=Success][Info=CLOSE_NOTIFY] access session terminated


Adding a Tursted CA Certificate Chain via pkiconsole
0.http-bio-8443-exec-6 - [07/Jun/2017:23:59:28 EDT] [14] [6] [AuditEvent=CIMC_CERT_VERIFICATION][SubjectID=caadmin][Outcome=Failure][CertNickName=] CIMC certificate verification
0.http-bio-8443-exec-6 - [07/Jun/2017:23:59:28 EDT] [14] [6] [AuditEvent=CONFIG_TRUSTED_PUBLIC_KEY][SubjectID=caadmin][Outcome=Success][ParamNameValPairs=Scope;;installCert+Operation;;OP_MODIFY+Resource;;trustedCACert+pkcs10;;-----BEGIN CERTIFICATE-----
MIID2zCCAsOgAwIBAgIBATANBgkqhkiG9w0BAQsFADBcMSQwIgYDVQQKDBtleGFt
cGxlLmNvbSBTZWN1cml0eSBEb21haW4xEzARBgNVBAsMCnBraS10b21jYXQxHzAd
BgNVBAMMFkNBIFNpZ25pbmcgQ2VydGlmaWNhdGUwHhcNMTcwNjAxMDMyMTQ0WhcN
MzcwNjAxMDMyMTQ0WjBcMSQwIgYDVQQKDBtleGFtcGxlLmNvbSBTZWN1cml0eSBE
b21haW4xEzARBgNVBAsMCnBraS10b21jYXQxHzAdBgNVBAMMFkNBIFNpZ25pbmcg
Q2VydGlmaWNhdGUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC8G/3c
k9ww3EEiajf6fm19czp3pEIzyzrhiaM0eKhUPZTDnKVhQr8qjLYhL27p/r/aUhJZ
uVUge3loyPIKN3bWDwn6ff6DGzWEBHqaLzyMqXdhBTBww8iITUhlzEYkCn3hvCcM
cm9HJ4cR1ZsVTeMapOxBYmXZSJn5XLhBxrYUy76sSMclpTYqZh8by+hpuXqU8m0P
I4q0ewRr2TDP+Ior4MYr3evef5jqsGJoMRIPK+DyV1rYeIgBnz2YCCN/eBiO7jk+
bpJRbOqjSuVaTKcqnNW2cCKzmzWeIjdDKmwXXAw+FSEkKu03yICr90D+3BBn9NeN
+4NbYDyidKfZBPSVAgMBAAGjgacwgaQwHwYDVR0jBBgwFoAU/0D5mzwZCVputfWs
wS+AFr/Eb2owDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAcYwHQYDVR0O
BBYEFP9A+Zs8GQlabrX1rMEvgBa/xG9qMEEGCCsGAQUFBwEBBDUwMzAxBggrBgEF
BQcwAYYlaHR0cDovL3BraTEwLmV4YW1wbGUuY29tOjgwODAvY2Evb2NzcDANBgkq
hkiG9w0BAQsFAAOCAQEATaN/bO1JmNMx2ZQBKRfkfcw8TFQczDb6CrUQUCEeoAq+
50En9W7L3KvDIMhVhJ15Rm285knyfCg/QNIY18R2sDZhv/iB1b8rB7ip5N5S95ar
0/MF+B1sDGPK8im9yeGZnjrNOGX1TxAbXXxbjg1q/fCJDHgIyxuJ/K0B1RagpYoX
UZhIAlWikVzRo9jbFbrMCEnf80/0rPy2ZJnaIiOFTNB/R9MFWniw+Ft1yxg3pc5L
5731V/Fl9V3xTe/tDVOsmKaJNjKE6LDNT4YqRd7YSujD+I2nsWoQctg9TjM47+GH
WlWPpLhobK0YSSAtGetXTlGpq8W4mJvJa6EYYWewfw==
-----END CERTIFICATE-----+nickname;;<null>+pathname;;<null>+serverRoot;;<null>+serverID;;instanceID] certificate database configuration
0.http-bio-8443-exec-25 - [07/Jun/2017:23:59:33 EDT] [14] [6] [AuditEvent=ACCESS_SESSION_TERMINATED][ClientIP=10.65.206.81][ServerIP=10.12.28.205][SubjectID=][Outcome=Success][Info=CLOSE_NOTIFY] access session terminated

Comment 5 errata-xmlrpc 2017-08-01 22:52:53 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2017:2110


Note You need to log in before you can comment on or make changes to this bug.