The Root CA and intermediary for our internal certificate authority is already trusted by this server and in the /etc/pki/ca-trust/source/anchors/ location.
Here is the output of the command:
- Code: Select all
echo 'DONE' | openssl s_client -showcerts -connect REMOVED_FOR_SECURITY_PURPOSES
CONNECTED(00000003)
depth=0 CN = REMOVED_FOR_SECURITY_PURPOSESm
verify error:num=66:EE certificate key too weak
verify return:1
depth=3 CN = REMOVED_FOR_SECURITY_PURPOSES
verify return:1
depth=2 DC = REMOVED_FOR_SECURITY_PURPOSES
verify return:1
depth=1 DC = REMOVED_FOR_SECURITY_PURPOSES
verify return:1
depth=0 CN = REMOVED_FOR_SECURITY_PURPOSES
verify return:1
---
Certificate chain
0 s:CN = REMOVED_FOR_SECURITY_PURPOSES
i:DC = REMOVED_FOR_SECURITY_PURPOSES
-----BEGIN CERTIFICATE-----
REMOVED_FOR_SECURITY_PURPOSES
-----END CERTIFICATE-----
1 s:DC = REMOVED_FOR_SECURITY_PURPOSES
i:DC =REMOVED_FOR_SECURITY_PURPOSES
-----BEGIN CERTIFICATE-----
REMOVED_FOR_SECURITY_PURPOSES
-----END CERTIFICATE-----
2 s:DC = REMOVED_FOR_SECURITY_PURPOSES
i:CN =REMOVED_FOR_SECURITY_PURPOSES
-----BEGIN CERTIFICATE-----
REMOVED_FOR_SECURITY_PURPOSES
-----END CERTIFICATE-----
---
Server certificate
subject=REMOVED_FOR_SECURITY_PURPOSES
issuer=REMOVED_FOR_SECURITY_PURPOSES
---
No client certificate CA names sent
Client Certificate Types: REMOVED_FOR_SECURITY_PURPOSES
Requested Signature Algorithms: REMOVED_FOR_SECURITY_PURPOSES
Shared Requested Signature Algorithms: REMOVED_FOR_SECURITY_PURPOSES
Peer signing digest: REMOVED_FOR_SECURITY_PURPOSES
Peer signature type: REMOVED_FOR_SECURITY_PURPOSES
Server Temp Key: REMOVED_FOR_SECURITY_PURPOSES
---
SSL handshake has read 5184 bytes and written 407 bytes
Verification error: EE certificate key too weak
---
New, TLSv1.2, Cipher is REMOVED_FOR_SECURITY_PURPOSES
Server public key is 1024 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
Protocol : TLSv1.2
Cipher : REMOVED_FOR_SECURITY_PURPOSES
Session-ID: REMOVED_FOR_SECURITY_PURPOSES
Session-ID-ctx:
Master-Key: REMOVED_FOR_SECURITY_PURPOSES
PSK identity: None
PSK identity hint: None
SRP username: None
Start Time: 1645034939
Timeout : 7200 (sec)
Verify return code: 66 (EE certificate key too weak)
Extended master secret: yes
---
DONE
contents of /etc/openldap/ldap.conf
- Code: Select all
#
# LDAP Defaults
#
# See ldap.conf(5) for details
# This file should be world readable but not world writable.
#BASE dc=example,dc=com
#URI ldap://ldap.example.com ldap://ldap-master.example.com:666
#SIZELIMIT 12
#TIMELIMIT 15
#DEREF never
# When no CA certificates are specified the Shared System Certificates
# are in use. In order to have these available along with the ones specified
# by #TLS_CACERTDIR one has to include them explicitly:
#TLS_CACERT /etc/pki/tls/cert.pem
# System-wide Crypto Policies provide up to date cipher suite which should
# be used unless one needs a finer grinded selection of ciphers. Hence, the
# PROFILE=SYSTEM value represents the default behavior which is in place
# when no explicit setting is used. (see openssl-ciphers(1) for more info)
#TLS_CIPHER_SUITE PROFILE=SYSTEM
# Turning this off breaks GSSAPI used with krb5 when rdns = false
SASL_NOCANON on
TLS_CACERTDIR /etc/openldap/cacerts
/etc/openldap/cacerts has symlinks to each of the files in /etc/openldap/certs.
In /etc/openldap/certs/ I see the Root and Intermediary CA certs for our environment.
As I go into the Nagios XI GUI, I go to Admin -> LDAP/AD Integration, I see all the same certificates under the Certificate Authority Management that we have on our other working Nagios XI servers. I also see the same setup for our AD integration, which works fine on the other servers.
However, those servers are RHEL 7.9 with Nagios XI 5.8.6. The new server is RHEL 8.5 with Nagios XI 5.8.7