Hide Forgot
Description of problem: When used in a non-renewing mode (getcert was used with the -R flag), after certmonger notifies the administrator that the certificate is no longer valid, Version-Release number of selected component (if applicable): certmonger-0.56 How reproducible: Always Steps to Reproduce: 1. Set your system clock back to 2004. 2. Stop IPA. 3. Run "getcert start-tracking -d /etc/httpd/alias -n ipaCert -p /etc/httpd/alias/pwdfile.txt -R". 4. Stop certmonger. 5. Set your clock ahead to 2007. 6. Start certmonger. Actual results: 7. Watch /var/log/messages start filling up. Expected results: 7. Watch one message land in /var/log/messages, and observe that another doesn't get logged for either 24 hours or until the service is restarted, whichever comes first.
This request was not resolved in time for the current release. Red Hat invites you to ask your support representative to propose this request, if still desired, for consideration in the next release of Red Hat Enterprise Linux.
This request was erroneously removed from consideration in Red Hat Enterprise Linux 6.4, which is currently under development. This request will be evaluated for inclusion in Red Hat Enterprise Linux 6.4.
(In reply to comment #0) > Description of problem: > When used in a non-renewing mode (getcert was used with the -R flag), after > certmonger notifies the administrator that the certificate is no longer > valid, it immediately checks again, and notifies the administrator again. This sequence of events repeats indefinitely.
Verified. Certmonger version: ================== [root@dhcp201-215 ~]# rpm -q certmonger certmonger-0.61-1.el6.x86_64 [root@dhcp201-215 ~]# Beaker automation log extract: =============================== :: [ PASS ] :: Certmonger service started successfully :: [ PASS ] :: Creating tmp directory :: [ PASS ] :: Changing SELinux context of tmp directory :: [ PASS ] :: Certificate generated with not-renewing option -R :: [ PASS ] :: Running 'sleep 2' :: [ PASS ] :: Running 'getcert list > /tmp/tmp.y44QxHtlIy/list.txt' :: [ PASS ] :: Running 'cat /tmp/tmp.y44QxHtlIy/list.txt' :: [ PASS ] :: File '/tmp/tmp.y44QxHtlIy/list.txt' should contain 'status: MONITORING' :: [ PASS ] :: File '/tmp/tmp.y44QxHtlIy/list.txt' should contain 'auto-renew: no' :: [ PASS ] :: Certmonger service stopped successfully :: [ PASS ] :: Changing system date to 3 year ahead :: [ PASS ] :: clearing /var/log/messages :: [ PASS ] :: Certmonger service started successfully :: [ PASS ] :: Running 'cat /var/log/messages' :: [ PASS ] :: File '/var/log/messages' should contain 'certmonger: Certificate named "certtest" in token "NSS Certificate DB" in database "/tmp/tmp.y44QxHtlIy" is no longer valid.' :: [ PASS ] :: clearing /var/log/messages :: [ PASS ] :: File '/var/log/messages' should not contain 'certmonger: Certificate named "certtest" in token "NSS Certificate DB" in database "/tmp/tmp.y44QxHtlIy" is no longer valid.' :: [ PASS ] :: clearing /var/log/messages :: [ PASS ] :: Certmonger service restarted successfully :: [ PASS ] :: Running 'cat /var/log/messages' :: [ PASS ] :: File '/var/log/messages' should contain 'certmonger: Certificate named "certtest" in token "NSS Certificate DB" in database "/tmp/tmp.y44QxHtlIy" is no longer valid.' :: [ PASS ] :: Chaning system date to current time :: [ PASS ] :: Running 'selfsign-getcert stop-tracking -d /tmp/tmp.y44QxHtlIy -n certtest' :: [ PASS ] :: Running 'rm -rf /tmp/tmp.y44QxHtlIy' :: [ LOG ] :: Duration: 25s :: [ LOG ] :: Assertions: 24 good, 0 bad :: [ PASS ] :: RESULT: Test
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. http://rhn.redhat.com/errata/RHBA-2013-0320.html