Hello:
I noted the following Nagios XI support forum thread -
https://support.nagios.com/forum/viewto ... 16&t=56138 - so am providing the following:
"
--2019-10-29 07:45:55--
https://localhost/nagiosxi/includes/components/ccm/
Resolving localhost (localhost)... 127.0.0.1
Connecting to localhost (localhost)|127.0.0.1|:443... connected.
ERROR: cannot verify localhost's certificate, issued by '/C=US/ST=MI/L=Ann Arbor/O=Internet2/OU=InCommon/CN=InCommon RSA Server CA':
Unable to locally verify the issuer's authority.
ERROR: no certificate subject alternative name matches
requested host name 'localhost'.
To connect to localhost insecurely, use `--no-check-certificate'.
"
Where's this local cert located and how do I reissue?
I have restarted the Nagios XI server and got the following:
"
==> /var/log/httpd/error_log <==
[Tue Oct 29 08:14:48.093808 2019] [suexec:notice] [pid 14057] AH01232: suEXEC mechanism enabled (wrapper: /usr/sbin/suexec)
[Tue Oct 29 08:14:48.094984 2019] [ssl:warn] [pid 14057] AH02292: Init: Name-based SSL virtual hosts only work for clients with TLS server name indication support (RFC 4366)
[Tue Oct 29 08:14:48.128414 2019] [lbmethod_heartbeat:notice] [pid 14057] AH02282: No slotmem from mod_heartmonitor
[Tue Oct 29 08:14:48.129533 2019] [ssl:warn] [pid 14057] AH02292: Init: Name-based SSL virtual hosts only work for clients with TLS server name indication support (RFC 4366)
[Tue Oct 29 08:14:48.179779 2019] [mpm_prefork:notice] [pid 14057] AH00163: Apache/2.4.6 () OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/5.4.16 mod_wsgi/3.4 Python/2.7.5 configured -- resuming normal operations
[Tue Oct 29 08:14:48.179809 2019] [core:notice] [pid 14057] AH00094: Command line: '/usr/sbin/httpd -D FOREGROUND'
[Tue Oct 29 08:15:03.929821 2019] [:error] [pid 14062] [client
<MY_PC_IP>:50683] PHP Warning: Invalid argument supplied for foreach() in /usr/local/nagiosxi/html/includes/components/nagiosim/nagiosim.inc.php on line 491, referer: https://
<NAGIOSXI_WEBSITE_DNS_NAME>/nagiosxi/index.php?
"
Lastly:
"
ldap_url_parse_ext(ldap://localhost/)
ldap_init: trying /etc/openldap/ldap.conf
ldap_init: using /etc/openldap/ldap.conf
ldap_init: HOME env is NULL
ldap_init: LDAPCONF env is NULL
ldap_init: LDAPRC env is NULL
ldap_create
ldap_extended_operation_s
ldap_extended_operation
ldap_send_initial_request
ldap_new_connection 1 1 0
ldap_int_open_connection
ldap_connect_to_host: TCP
<OUR_AD_SERVER>:389
ldap_new_socket: 22
ldap_prepare_socket: 22
ldap_connect_to_host: Trying
<OUR_AD_SERVER'S_IP>:389
ldap_pvt_connect: fd: 22 tm: -1 async: 0
attempting to connect:
connect success
ldap_open_defconn: successful
ldap_send_server_request
ldap_result ld 0x56279d636f30 msgid 1
wait4msg ld 0x56279d636f30 msgid 1 (infinite timeout)
wait4msg continue ld 0x56279d636f30 msgid 1 all 1
** ld 0x56279d636f30 Connections:
* host:
<OUR_AD_SERVER> port: 389 (default)
refcnt: 2 status: Connected
last used: Tue Oct 29 08:21:36 2019
** ld 0x56279d636f30 Outstanding Requests:
* msgid 1, origid 1, status InProgress
outstanding referrals 0, parent count 0
ld 0x56279d636f30 request count 1 (abandoned 0)
** ld 0x56279d636f30 Response Queue:
Empty
ld 0x56279d636f30 response count 0
ldap_chkResponseList ld 0x56279d636f30 msgid 1 all 1
ldap_chkResponseList returns ld 0x56279d636f30 NULL
ldap_int_select
read1msg: ld 0x56279d636f30 msgid 1 all 1
read1msg: ld 0x56279d636f30 msgid 1 message type extended-result
read1msg: ld 0x56279d636f30 0 new referrals
read1msg: mark request completed, ld 0x56279d636f30 msgid 1
request done: ld 0x56279d636f30 msgid 1
res_errno: 0, res_error: <>, res_matched: <>
ldap_free_request (origid 1, msgid 1)
ldap_parse_extended_result
ldap_parse_result
ldap_msgfree
TLSMC: MozNSS compatibility interception begins.
tlsmc_intercept_initialization: INFO: entry options follow:
tlsmc_intercept_initialization: INFO: cacertdir = `/etc/openldap/cacerts'
tlsmc_intercept_initialization: INFO: certfile = `(null)'
tlsmc_intercept_initialization: INFO: keyfile = `(null)'
tlsmc_convert: INFO: trying to open NSS DB with CACertDir = `/etc/openldap/cacerts'.
tlsmc_open_nssdb: INFO: trying to initialize moznss using security dir `/etc/openldap/cacerts` prefix ``.
tlsmc_open_nssdb: WARN: could not initialize MozNSS context - error -8015.
tlsmc_convert: INFO: cannot open the NSS DB, expecting PEM configuration is present.
tlsmc_intercept_initialization: INFO: altered options follow:
tlsmc_intercept_initialization: INFO: cacertdir = `/etc/openldap/cacerts'
tlsmc_intercept_initialization: INFO: certfile = `(null)'
tlsmc_intercept_initialization: INFO: keyfile = `(null)'
tlsmc_intercept_initialization: INFO: successfully intercepted TLS initialization. Continuing with OpenSSL only.
TLSMC: MozNSS compatibility interception ends.
TLS trace: SSL_connect:before/connect initialization
TLS trace: SSL_connect:SSLv2/v3 write client hello A
TLS trace: SSL_connect:SSLv3 read server hello A
TLS certificate verification: depth: 2, err: 0, subject: /DC=net/DC=
<2nd_DNS>/CN=
<ROOT_CERT>, issuer: /DC=net/DC=
<2nd_DNS>/CN=
<ROOT_CERT>
TLS certificate verification: depth: 1, err: 0, subject: /DC=net/DC=
<2nd_DNS>/CN=
<ROOT_CERT>, issuer: /DC=net/DC=
<2nd_DNS>/CN=
<ROOT_CERT>
TLS certificate verification: depth: 0, err: 0, subject: , issuer: /DC=net/DC=
<2nd_DNS>/CN=
<ROOT_CERT>
TLS trace: SSL_connect:SSLv3 read server certificate A
TLS trace: SSL_connect:SSLv3 read server key exchange A
TLS trace: SSL_connect:SSLv3 read server certificate request A
TLS trace: SSL_connect:SSLv3 read server done A
TLS trace: SSL_connect:SSLv3 write client certificate A
TLS trace: SSL_connect:SSLv3 write client key exchange A
TLS trace: SSL_connect:SSLv3 write change cipher spec A
TLS trace: SSL_connect:SSLv3 write finished A
TLS trace: SSL_connect:SSLv3 flush data
TLS trace: SSL_connect:SSLv3 read finished A
ldap_bind_s
ldap_simple_bind_s
ldap_sasl_bind_s
ldap_sasl_bind
ldap_send_initial_request
ldap_send_server_request
ldap_result ld 0x56279d636f30 msgid 2
wait4msg ld 0x56279d636f30 msgid 2 (infinite timeout)
wait4msg continue ld 0x56279d636f30 msgid 2 all 1
** ld 0x56279d636f30 Connections:
* host:
<OUR_AD_SERVER> port: 389 (default)
refcnt: 2 status: Connected
last used: Tue Oct 29 08:21:37 2019
** ld 0x56279d636f30 Outstanding Requests:
* msgid 2, origid 2, status InProgress
outstanding referrals 0, parent count 0
ld 0x56279d636f30 request count 1 (abandoned 0)
** ld 0x56279d636f30 Response Queue:
Empty
ld 0x56279d636f30 response count 0
ldap_chkResponseList ld 0x56279d636f30 msgid 2 all 1
ldap_chkResponseList returns ld 0x56279d636f30 NULL
ldap_int_select
read1msg: ld 0x56279d636f30 msgid 2 all 1
read1msg: ld 0x56279d636f30 msgid 2 message type bind
read1msg: ld 0x56279d636f30 0 new referrals
read1msg: mark request completed, ld 0x56279d636f30 msgid 2
request done: ld 0x56279d636f30 msgid 2
res_errno: 49, res_error: <80090308: LdapErr: DSID-0C09042F, comment: AcceptSecurityContext error, data 52e, v2580>, res_matched: <>
ldap_free_request (origid 2, msgid 2)
ldap_parse_result
ldap_msgfree
ldap_err2string
"
Thank you.