Isilon: Error 18 at 0 depth lookup during Encrypted SyncIQ configuration
Summary: Receiving an Error 18 at 0 depth message when validating the certificate signing request for the source or target cluster
Acest articol se aplică pentru
Acest articol nu se aplică pentru
Acest articol nu este legat de un produs specific.
Acest articol nu acoperă toate versiunile de produs existente.
Symptoms
While setting up Encrypted SyncIQ, you receive the following message during the csr validation step:
# openssl verify -CAfile ca.pem source.pem source.pem: C = US, ST = CA, L = xxxx, O = xxxx, OU = PS, CN = xxxx, emailAddress = xxx@xxx.com error 18 at 0 depth lookup:self signed certificate OK
Cause
This indicates that at 0 depth (that is the top of the signer tree), it discovered a self-signed certificate, but this certificate was not trusted. Since OpenSSL cannot verify any of the signers of the certificate, it cannot verify the certificate. Since this is a fatal problem, it produces the above error.
The most common cause:
You answered the question identically for the Common Name used in CA self-signed .csr and the current .csr you have generated.
The most common cause:
You answered the question identically for the Common Name used in CA self-signed .csr and the current .csr you have generated.
Resolution
When running openssl req -new -newkey there must be some variation between the Common name field when generating the CA certificate versus the source/target certificates. The following field cannot be identical between .csr's:
Common Name (e.g. server FQDN or YOUR name) []:
Produse afectate
Isilon, Isilon Scale-out NAS, Isilon SyncIQProprietăți articol
Article Number: 000196764
Article Type: Solution
Ultima modificare: 06 Jan 2026
Version: 6
Găsiți răspunsuri la întrebările dvs. de la alți utilizatori Dell
Servicii de asistență
Verificați dacă dispozitivul dvs. este acoperit de serviciile de asistență.