Note: This bug is displayed in read-only format because the product is no longer active in Red Hat Bugzilla.
RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.

Bug 1819656

Summary: Failed to install ipa-server due to RuntimeError: Certificate issuance failed
Product: Red Hat Enterprise Linux 7 Reporter: Lukas Slebodnik <lslebodn>
Component: ipaAssignee: Florence Blanc-Renaud <frenaud>
Status: CLOSED DUPLICATE QA Contact: ipa-qe <ipa-qe>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: 7.9CC: abokovoy, edewata, ftweedal, rcritten, tscherf
Target Milestone: rc   
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2020-04-01 12:19:22 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Lukas Slebodnik 2020-04-01 09:28:19 UTC
Description of problem:
Installation fails on RHEL-7.9-20200331.n.0

Version-Release number of selected component (if applicable):
pki-base-10.5.18-1.el7.noarch
ipa-server-4.6.6-12.el7.x86_64

How reproducible:
Deterministic

Steps to Reproduce:
1. install ipa-server with CA

Actual results:
Configuring ipa-custodia
  [1/5]: Making sure custodia container exists
  [2/5]: Generating ipa-custodia config file
  [3/5]: Generating ipa-custodia keys
  [4/5]: starting ipa-custodia 
  [5/5]: configuring ipa-custodia to start on boot
Done configuring ipa-custodia.
Configuring certificate server (pki-tomcatd). Estimated time: 3 minutes
  [1/29]: configuring certificate server instance
  [2/29]: reindex attributes
  [3/29]: exporting Dogtag certificate store pin
  [4/29]: stopping certificate server instance to update CS.cfg
  [5/29]: backing up CS.cfg
  [6/29]: disabling nonces
  [7/29]: set up CRL publishing
  [8/29]: enable PKIX certificate path discovery and validation
  [9/29]: starting certificate server instance
  [10/29]: configure certmonger for renewals
  [11/29]: requesting RA certificate from CA

MARK-LWD-LOOP -- 2020-03-31 16:46:13 --
  [error] RuntimeError: Certificate issuance failed (CA_REJECTED: Server at "https://ibm-x3250m4-16.testrelm.test:8443/ca/agent/ca//profileProcess" replied: 1: Property Error - Invalid Property signingAlg)
ipapython.admintool: ERROR    Certificate issuance failed (CA_REJECTED: Server at "https://ibm-x3250m4-16.testrelm.test:8443/ca/agent/ca//profileProcess" replied: 1: Property Error - Invalid Property signingAlg)
ipapython.admintool: ERROR    The ipa-server-install command failed. See /var/log/ipaserver-install.log for more information

Expected results:
ipa server installed without any problem

Additional info:
Might be caused by upgrade of pki-base-10.5.17-6.el7.noarch -> pki-base-10.5.18-1.el7.noarch
But maybe some changes need to be done on ipa server as well

Comment 2 Lukas Slebodnik 2020-04-01 09:34:55 UTC
Tail of /var/log/pki/pki-tomcat/ca/debug 

[31/Mar/2020:16:49:10][http-bio-8443-exec-12]: In LdapBoundConnFactory::getConn()
[31/Mar/2020:16:49:10][http-bio-8443-exec-12]: masterConn is connected: true
[31/Mar/2020:16:49:10][http-bio-8443-exec-12]: getConn: conn is connected true
[31/Mar/2020:16:49:10][http-bio-8443-exec-12]: getConn: mNumConns now 2
[31/Mar/2020:16:49:10][http-bio-8443-exec-12]: returnConn: mNumConns now 3
[31/Mar/2020:16:49:10][http-bio-8443-exec-12]: AAclAuthz.checkPermission(certServer.ca.request.profile, approve)
[31/Mar/2020:16:49:10][http-bio-8443-exec-12]: checkAllowEntries(): expressions: group="Certificate Manager Agents"
[31/Mar/2020:16:49:10][http-bio-8443-exec-12]: evaluating expressions: group="Certificate Manager Agents"
[31/Mar/2020:16:49:10][http-bio-8443-exec-12]: GroupAccessEvaluator: evaluate: uid=admin value="Certificate Manager Agents"
[31/Mar/2020:16:49:10][http-bio-8443-exec-12]: GroupAccessEvaluator: evaluate: no groups in authToken
[31/Mar/2020:16:49:10][http-bio-8443-exec-12]: In LdapBoundConnFactory::getConn()
[31/Mar/2020:16:49:10][http-bio-8443-exec-12]: masterConn is connected: true
[31/Mar/2020:16:49:10][http-bio-8443-exec-12]: getConn: conn is connected true
[31/Mar/2020:16:49:10][http-bio-8443-exec-12]: getConn: mNumConns now 2
[31/Mar/2020:16:49:10][http-bio-8443-exec-12]: returnConn: mNumConns now 3
[31/Mar/2020:16:49:10][http-bio-8443-exec-12]: UGSubsystem.isMemberOf() using new lookup code
[31/Mar/2020:16:49:10][http-bio-8443-exec-12]: In LdapBoundConnFactory::getConn()
[31/Mar/2020:16:49:10][http-bio-8443-exec-12]: masterConn is connected: true
[31/Mar/2020:16:49:10][http-bio-8443-exec-12]: getConn: conn is connected true
[31/Mar/2020:16:49:10][http-bio-8443-exec-12]: getConn: mNumConns now 2
[31/Mar/2020:16:49:10][http-bio-8443-exec-12]: authorization search base: cn=Certificate Manager Agents,ou=groups,o=ipaca
[31/Mar/2020:16:49:10][http-bio-8443-exec-12]: authorization search filter: (uniquemember=uid=admin,ou=People,o=ipaca)
[31/Mar/2020:16:49:10][http-bio-8443-exec-12]: authorization result: true
[31/Mar/2020:16:49:10][http-bio-8443-exec-12]: returnConn: mNumConns now 3
[31/Mar/2020:16:49:10][http-bio-8443-exec-12]: evaluated expression: group="Certificate Manager Agents" to be true
[31/Mar/2020:16:49:10][http-bio-8443-exec-12]: DirAclAuthz: authorization passed
[31/Mar/2020:16:49:10][http-bio-8443-exec-12]: SignedAuditLogger: event AUTHZ
[31/Mar/2020:16:49:10][http-bio-8443-exec-12]: SignedAuditLogger: event ROLE_ASSUME
[31/Mar/2020:16:49:10][http-bio-8443-exec-12]: RequestProcessor: processRequest: start serving
[31/Mar/2020:16:49:10][http-bio-8443-exec-12]: RequestProcessor: requestId=27
[31/Mar/2020:16:49:10][http-bio-8443-exec-12]: Setting AUTH_TOKEN-userid=admin
[31/Mar/2020:16:49:10][http-bio-8443-exec-12]: Setting AUTH_TOKEN-user=uid=admin,ou=People,o=ipaca
[31/Mar/2020:16:49:10][http-bio-8443-exec-12]: Setting AUTH_TOKEN-sslClientCert(0)=null
[31/Mar/2020:16:49:10][http-bio-8443-exec-12]: Setting AUTH_TOKEN-uid=admin
[31/Mar/2020:16:49:10][http-bio-8443-exec-12]: Setting AUTH_TOKEN-userdn=uid=admin,ou=People,o=ipaca
[31/Mar/2020:16:49:10][http-bio-8443-exec-12]: Setting AUTH_TOKEN-authTime=1585687750192
[31/Mar/2020:16:49:10][http-bio-8443-exec-12]: Setting AUTH_TOKEN-authMgrInstName=certUserDBAuthMgr
[31/Mar/2020:16:49:10][http-bio-8443-exec-12]: RequestProcessor: profileId=caServerCert
[31/Mar/2020:16:49:10][http-bio-8443-exec-12]: UserSubjectNameDefault: setValue: name = name
[31/Mar/2020:16:49:10][http-bio-8443-exec-12]: UserSubjectNameDefault: setValue: value = CN=IPA RA,O=TESTRELM.TEST
[31/Mar/2020:16:49:10][http-bio-8443-exec-12]: UserSubjectNameDefault: getX500Name: use system encoding: false
[31/Mar/2020:16:49:10][http-bio-8443-exec-12]: UserSubjectNameDefault: getX500Name: subjectDN exists in CSR. 
[31/Mar/2020:16:49:10][http-bio-8443-exec-12]: UserSubjectNameDefault: getX500Name: new Subject DN has same string representation as current value; retaining current value.
[31/Mar/2020:16:49:10][http-bio-8443-exec-12]: UserSubjectNameDefault: setValue: setting name=CN=IPA RA,O=TESTRELM.TEST
[31/Mar/2020:16:49:10][http-bio-8443-exec-12]: parseRecords: Record0
[31/Mar/2020:16:49:10][http-bio-8443-exec-12]: SigningAlgDefault: setValue java.security.NoSuchAlgorithmException: unrecognized algorithm name: SHA256withRSA 
[31/Mar/2020:16:49:10][http-bio-8443-exec-12]: ProfileProcessServlet: execution error Invalid Property signingAlg
[31/Mar/2020:16:49:10][http-bio-8443-exec-12]: CMSServlet: curDate=Tue Mar 31 16:49:10 EDT 2020 id=caProfileProcess time=51
[31/Mar/2020:16:49:10][http-bio-8443-exec-9]: SignedAuditLogger: event ACCESS_SESSION_TERMINATED
[31/Mar/2020:16:49:10][http-bio-8443-exec-12]: SignedAuditLogger: event ACCESS_SESSION_TERMINATED

Comment 3 Alexander Bokovoy 2020-04-01 09:51:42 UTC
Fraser, Endi, could you please look at this? SHA256withRSA is the default signing in Dogtag.

Comment 4 Florence Blanc-Renaud 2020-04-01 12:19:22 UTC
I can confirm that installation fails with pki-server 10.5.18-1.el7, but is successful with the more recent nightly build 10.5.18-2.el7. Closing as WORKSFORME.

Comment 5 Lukas Slebodnik 2020-04-01 12:24:57 UTC
There is just a single change between 10.5.18-1 and 10.5.8-2.

* Mon Mar 30 2020 Dogtag Team <pki-devel> 10.5.18-2
- Bugzilla Bug #1710109 - add RSA PSS support - fix IPA installer (jmagne)

Maybe it can be closed as a duplicate instead of works for me

Comment 6 Florence Blanc-Renaud 2020-04-01 12:30:22 UTC
Hi Lukas, thanks for the pointer, I updated the Close reason.

*** This bug has been marked as a duplicate of bug 1710109 ***