Thanks very much Gavin for all your help. All is working as it should.
-Ivan
Gavin Henry wrote:
> ----- "Ivan Ordonez" <iordonez(a)nature.berkeley.edu> wrote:
>
>
>> Few more questions Gavin.
>>
>> Our primary domain controller certificate is also expiring next month.
>> What is the best way to handle this? Does the certificate and keys on
>> the backup domain controller has any connection to the certs and keys
>> of the primary domain controller and the other backup domain
>> controller?
>>
>
> Other than being signed by the Certificate Authority, none. As long as
> you use the same FQDN for the certs as before and the CA doesn't change,
> then all is good.
>
>
>> I would be relieve to hear that I can make brand new certificate and
>> keys for each machine and they have no connection with each other.
>>
>> Thanks for all your help.
>>
>> -Ivan
>>
>>
>> ghenry(a)OpenLDAP.org wrote:
>>
>> ----- "Ivan Ordonez" <iordonez(a)nature.berkeley.edu> wrote:
>>
>> Looking at the debug log, it is expired. It puzzle me because the
>> certs on the other two machine are working correctly. Check their
>> expiry dates with:
>>
>> openssl x509 -in /usr/local/etc/openldap/ldap-slave_cert.pem -text
>>
>> Since this is the case (certificate expires), is it safe to create a
>> new one for this machine? Of course, then sign it with the cacert,
>> something like:
>>
>> ./CA.sh -newreq
>> ./CA.sh -sign
>>
>
>