ECS: Kunne ikke overføre CA-signeret Management SSL-certifikat
Summary: Kan ikke uploade certifikat på grund af forkert certifikatformat.
This article applies to
This article does not apply to
This article is not tied to any specific product.
Not all product versions are identified in this article.
Symptoms
BEMÆRK: Det anbefales, at ECS: Data- og administrations-SSL-certifikatværktøj bruges til at uploade administrationscertifikater til ECS
Modtaget 400 fejl ved upload af et SSL-certifikat.
Kommando:
# curl -svk -H "$TOKEN" -H "Content-type: application/xml" -H "X-EMC-REST-CLIENT: TRUE" -X PUT -d "`cat /home/admin/vcssl/server_nopass.key``cat /home/admin/vcssl/cert.cer`" https://xxx.xxx.xxx.xxx:4443/vdc/keystoreEksempel:
< HTTP/1.1 400 Bad Request
< Date: Wed, 27 Sep 2017 12:21:57 GMT
< Content-Type: application/xml
< Content-Length: 337
< Connection: keep-alive
* HTTP error before end of send, stop sending
<
<?xml version="1.0" encoding="UTF-8" standalone="yes"?><error><code>1013</code><description>Bad request body</description><details>javax.xml.bind.UnmarshalException
- with linked exception:
* Closing connection 0
* SSLv3, TLS alert, Client hello (1):
[org.apache.xerces.impl.io.MalformedByteSequenceException: Invalid byte 1 of 1-byte UTF-8 sequence.]</details><retryable>false</retryable></error>Cause
- Det certifikat, der hedder cert.cer, er i dette tilfælde binært format, ikke PEM, der forårsager problemet.
# file <PATH_TO_SERVER_KEY> <PATH_TO_CERTIFICATE>
Eksempel:
/home/admin/vcssl # file server_nopass.key cert.cer server_nopass.key: PEM RSA private key cert.cer: data
- Bekræft, at certifikatet svarer til det format, der er genereret af servernøglen.
# openssl x509 -in <PATH_TO_CERTIFICATE> -noout -modulus | openssl sha256 # openssl rsa -in <PATH_TO_SERVER_KEY> -noout -modulus | openssl sha256
Eksempel: (De to værdier skal stemme overens for at være et gyldigt par)
admin@node1:~> openssl x509 -in server.crt -noout -modulus | openssl sha256 (stdin)= a7263a89f0d8aa48cc4de0c76e3ccfe0c2e4fb585ab1f39bf8c82e3c39459bb3 admin@node1:~> openssl rsa -in server_nopass.key -noout -modulus | openssl sha256 (stdin)= a7263a89f0d8aa48cc4de0c76e3ccfe0c2e4fb585ab1f39bf8c82e3c39459bb3
Resolution
- Skift certifikatet fra DER-format til PEM-format, og prøv derefter uploadkommandoen igen for at løse problemet.
# openssl x509 -in cert.cer -inform der -outform pem -out cert.pem
- Upload det nyligt omformaterede certifikat.
# curl -svk -H "$TOKEN" -H "Content-type: application/xml" -H "X-EMC-REST-CLIENT: TRUE" -X PUT -d "<rotate_keycertchain><key_and_certificate><private_key>`cat /home/admin/vcssl/server_nopass.key`</private_key><certificate_chain>`cat /home/admin/vcssl/cert.pem`</certificate_chain></key_and_certificate></rotate_keycertchain>" https://`hostname -i`:4443/vdc/keystore
Dataadgangscertifikatkommando:
# curl -svk -H "$TOKEN" -H "Content-type: application/xml" -H "X-EMC-REST-CLIENT: TRUE" -X PUT -d "<rotate_keycertchain><key_and_certificate><private_key>`cat key.pem`</private_key><certificate_chain>`cat cert.cert`</certificate_chain></key_and_certificate></rotate_keycertchain>" https://`hostname -i`:4443/object-cert/keystore
Eksempel:
* Hostname was NOT found in DNS cache
* Trying x.x.x.x...
* Connected to x.x.x.x (x.x.x.x) port 4443 (#0)
* successfully set certificate verify locations:
* CAfile: none
CApath: /etc/ssl/certs/
* SSLv3, TLS handshake, Client hello (1):
* SSLv3, TLS handshake, Server hello (2):
* SSLv3, TLS handshake, CERT (11):
* SSLv3, TLS handshake, Server key exchange (12):
* SSLv3, TLS handshake, Server finished (14):
* SSLv3, TLS handshake, Client key exchange (16):
* SSLv3, TLS change cipher, Client hello (1):
* SSLv3, TLS handshake, Finished (20):
* SSLv3, TLS change cipher, Client hello (1):
* SSLv3, TLS handshake, Finished (20):
* SSL connection using TLSv1.0 / ECDHE-RSA-AES256-SHA
* Server certificate:
* subject: CN=localhost
* start date: 2017-06-14 19:58:44 GMT
* expire date: 2027-06-12 19:58:44 GMT
* issuer: CN=localhost
* SSL certificate verify result: self signed certificate (18), continuing anyway.
> PUT /vdc/keystore HTTP/1.1
> User-Agent: curl/7.37.0
> Host: x.x.x.x:4443
> Accept: */*
< HTTP/1.1 200 OK
< Date: Sat, 30 Sep 2017 00:59:15 GMT
< Content-Type: application/xml
< Content-Length: 1308
< Connection: keep-aliveAffected Products
ECS ApplianceProducts
ECS ApplianceArticle Properties
Article Number: 000057338
Article Type: Solution
Last Modified: 11 Feb 2024
Version: 5
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.