Unable to create a successful TLS connection to the ldap masters: Difference between revisions
No edit summary |
No edit summary |
||
Line 20: | Line 20: | ||
====Deploying a certificate using the LDAP's CA==== | ====Deploying a certificate using the LDAP's CA==== | ||
a. Copy the CA from the ldap server to the other servers : | a). Copy the CA from the ldap server to the other servers : | ||
rsync -Pa /opt/zimbra/ssl/zimbra/ca/ root@otherserver.example.com:/opt/zimbra/ssl/zimbra/ca/ | rsync -Pa /opt/zimbra/ssl/zimbra/ca/ root@otherserver.example.com:/opt/zimbra/ssl/zimbra/ca/ | ||
b. Deploy this CA on the other servers : | b). Deploy this CA on the other servers : | ||
/opt/zimbra/bin/zmcertmgr deployca | /opt/zimbra/bin/zmcertmgr deployca | ||
c. Recreate and redeploy the self-signed cert on the other servers : | c). Recreate and redeploy the self-signed cert on the other servers : | ||
/opt/zimbra/bin/zmcertmgr createcrt -new -days 3650 | /opt/zimbra/bin/zmcertmgr createcrt -new -days 3650 |
Revision as of 02:46, 19 August 2017
When upgrading to 8.5x, "Unable to create a successful TLS connection to the ldap masters" comes up
Problem:
When upgrading from 7.x or 8.0.x to 8.5+, the upgrade stops with the error :
Unable to create a successful TLS connection to the ldap masters. Fix cert configuration prior to upgrading
Solution:
To fix this, any one of the following can be tried :
Using a commercial certificate
If there is a valid commercial certificate, like a wild card one, just deploying that on all the nodes will fix the error.
Deploying a certificate using the LDAP's CA
a). Copy the CA from the ldap server to the other servers :
rsync -Pa /opt/zimbra/ssl/zimbra/ca/ root@otherserver.example.com:/opt/zimbra/ssl/zimbra/ca/
b). Deploy this CA on the other servers :
/opt/zimbra/bin/zmcertmgr deployca
c). Recreate and redeploy the self-signed cert on the other servers :
/opt/zimbra/bin/zmcertmgr createcrt -new -days 3650 /opt/zimbra/bin/zmcertmgr deploycrt self
The certificates now will be created using the LDAP's newly deployed CA, so the ldap should recognize these as valid certificates now.
This would be the best way to do it if self-signed certificates are used.
Disabling all TLS connections
Run this on the ldap and proxy servers before the upgrade
su - zimbra zmlocalconfig -e ssl_allow_untrusted_certs=true zmlocalconfig -e ldap_starttls_supported=0 zmlocalconfig -e ldap_starttls_required=false zmlocalconfig -e ldap_common_require_tls=0 zmcontrol restart
After the upgrade is done, a new self-signed CA and certificate can be deployed across the environment, and then TLS can be enabled again by flipping the values for the above.
Submitted by: Shashank Tewari