Guest User

ldap keys

a guest
Jan 15th, 2013
130
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.60 KB | None | 0 0
  1. [root@ldap slapd-ldap]# pk12util -d . -o server2.p12 -n directory-Server-Cert-2
  2. Enter Password or Pin for "NSS Certificate DB":
  3. Enter Password or Pin for "NSS Certificate DB":
  4. Enter password for PKCS12 file:
  5. Re-enter password:
  6. pk12util: PKCS12 EXPORT SUCCESSFUL
  7. [root@ldap slapd-ldap]# certutil -L -d . -n "CA certificate" -a > cacert.asc
  8.  
  9.  
  10. [root@ldap02 slapd-ldap02]# pk12util -d . -i server2.p12
  11. Enter Password or Pin for "NSS Certificate DB":
  12. Enter password for PKCS12 file:
  13. pk12util: PKCS12 IMPORT SUCCESSFUL
  14. [root@ldap02 slapd-ldap02]# certutil -A -d . -n "CA certificate" -t "CT,," -a -i cacert.asc
  15. [root@ldap02 slapd-ldap02]# service dirsrv restart
  16.  
  17. [root@ldap02 slapd-ldap02]# service dirsrv restart
  18. Shutting down dirsrv:
  19. ldap02... [ OK ]
  20. Starting dirsrv:
  21. ldap02...Enter PIN for Internal (Software) Token:
  22. [15/Jan/2013:15:39:54 -0800] - SSL alert: CERT_VerifyCertificateNow: verify certificate failed for cert directory-Server-Cert-2 of family cn=RSA,cn=encryption,cn=config (Netscape Portable Runtime error -8182 - Peer's certificate has an invalid signature.)
  23. [ OK ]
  24. [root@ldap02 slapd-ldap02]#
  25.  
  26.  
  27. On the Primary
  28.  
  29. [15/Jan/2013:15:40:41 -0800] conn=13 fd=65 slot=65 connection from 10.2.3.69 to 10.2.2.128
  30. [15/Jan/2013:15:40:41 -0800] conn=13 op=0 EXT oid="1.3.6.1.4.1.1466.20037" name="startTLS"
  31. [15/Jan/2013:15:40:41 -0800] conn=13 op=0 RESULT err=0 tag=120 nentries=0 etime=0
  32. [15/Jan/2013:15:40:41 -0800] conn=13 op=-1 fd=65 closed - SSL peer cannot verify your certificate
Advertisement
Add Comment
Please, Sign In to add comment