Bug 813382 - Document how to start services with expired certificates
Summary: Document how to start services with expired certificates
Alias: None
Product: Red Hat Enterprise Linux 6
Classification: Red Hat
Component: doc-Identity_Management_Guide
Version: 6.3
Hardware: Unspecified
OS: Unspecified
Target Milestone: rc
: ---
Assignee: Deon Ballard
QA Contact: ecs-bugs
Depends On:
TreeView+ depends on / blocked
Reported: 2012-04-17 15:39 UTC by Dmitri Pal
Modified: 2012-06-26 15:02 UTC (History)
4 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Last Closed: 2012-06-26 15:02:20 UTC
Target Upstream Version:

Attachments (Terms of Use)

Description Dmitri Pal 2012-04-17 15:39:02 UTC
This bug is created as a clone of upstream ticket:

We should document how to start the basic IPA services when the SSL certificates have expired so one can run in a degraded mode while the underlying problems are resolved.

In mod_nss set EnforceValidCerts to no and restart httpd

In 389-ds set nsslapd-validate-cert to warn in dse.ldif

Doing these should allow all Apache, Kerberos, named and 389-ds-base to come up so at least users can log in. Client services (e.g. sudo) that require SSL will still fail due to the expired server certificates.

Comment 7 John Skeoch 2012-06-25 23:24:42 UTC
Verified the fix of comment#5 in:




Change the mod_nss configuration for the Apache server to not enforce valid certificates, in the NSSEnforceValidCerts parameter. If this parameter is not already in the file, then add it.
Set the value to off.

[root@ipaserver ~]# vim /etc/httpd/conf.d/nss.conf

NSSEnforceValidCerts off

Note You need to log in before you can comment on or make changes to this bug.