OK, I did them in the order you specified and the result is basically the same.

[root@utility certs]# update-ca-trust

[root@utility certs]# curl https://utility.idm.nac-issa.org
curl: (60) SSL certificate problem: self signed certificate in certificate chain
More details here: https://curl.haxx.se/docs/sslcerts.html

curl failed to verify the legitimacy of the server and therefore could not
establish a secure connection to it. To learn more about this situation and
how to fix it, please visit the web page mentioned above.

[root@utility certs]# ausearch -m AVC -ts recent
<no matches>

[root@utility certs]#  ipa-healthcheck
[
  {
    "source": "ipahealthcheck.dogtag.ca",
    "check": "DogtagCertsConnectivityCheck",
    "result": "ERROR",
    "uuid": "579597b4-d5d7-4b8c-b023-7f5bd5c39956",
    "when": "20210910151130Z",
    "duration": "0.009750",
    "kw": {
      "msg": "Request for certificate failed, cannot connect to 'https://utility.idm.nac-issa.org:443/ca/rest/certs/1': [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:897)"
    }
  },
  {
    "source": "ipahealthcheck.ipa.certs",
    "check": "IPACertDNSSAN",
    "result": "ERROR",
    "uuid": "31e97240-84bb-4185-aae1-40278d962562",
    "when": "20210910151132Z",
    "duration": "0.603675",
    "kw": {
      "key": "20210828145523",
      "hostname": "ipa-ca.idm.nac-issa.org",
      "san": [
        "utility.idm.nac-issa.org"
      ],
      "ca": "IPA",
      "profile": "caIPAserviceCert",
      "msg": "Certificate request id {key} with profile {profile} for CA {ca} does not have a DNS SAN {san} matching name {hostname}"
    }
  },
  {
    "source": "ipahealthcheck.ipa.certs",
    "check": "IPACertRevocation",
    "result": "ERROR",
    "uuid": "a92fb674-6539-42f3-8631-6c6e5ebc455b",
    "when": "20210910151134Z",
    "duration": "0.382515",
    "kw": {
      "key": "20210828145521",
      "serial": 7,
      "error": "cannot connect to 'https://utility.idm.nac-issa.org:443/ca/rest/certs/7': [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:897)",
      "msg": "Request for certificate serial number {serial} in request {key} failed: {error}"
    }
  },
  {
    "source": "ipahealthcheck.ipa.certs",
    "check": "IPACertRevocation",
    "result": "ERROR",
    "uuid": "9fbee2f1-9b1e-4bbb-8721-912b030a7efd",
    "when": "20210910151134Z",
    "duration": "0.463248",
    "kw": {
      "key": "20210828145516",
      "serial": 5,
      "error": "cannot connect to 'https://utility.idm.nac-issa.org:443/ca/rest/certs/5': [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:897)",
      "msg": "Request for certificate serial number {serial} in request {key} failed: {error}"
    }
  },
  {
    "source": "ipahealthcheck.ipa.certs",
    "check": "IPACertRevocation",
    "result": "ERROR",
    "uuid": "70652eee-0b13-4c8e-8e04-26c7591ae21f",
    "when": "20210910151134Z",
    "duration": "0.544777",
    "kw": {
      "key": "20210828145517",
      "serial": 2,
      "error": "cannot connect to 'https://utility.idm.nac-issa.org:443/ca/rest/certs/2': [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:897)",
      "msg": "Request for certificate serial number {serial} in request {key} failed: {error}"
    }
  },
  {
    "source": "ipahealthcheck.ipa.certs",
    "check": "IPACertRevocation",
    "result": "ERROR",
    "uuid": "aab128f0-a4a3-433f-b48b-b5e39ab56b33",
    "when": "20210910151134Z",
    "duration": "0.625206",
    "kw": {
      "key": "20210828145518",
      "serial": 4,
      "error": "cannot connect to 'https://utility.idm.nac-issa.org:443/ca/rest/certs/4': [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:897)",
      "msg": "Request for certificate serial number {serial} in request {key} failed: {error}"
    }
  },
  {
    "source": "ipahealthcheck.ipa.certs",
    "check": "IPACertRevocation",
    "result": "ERROR",
    "uuid": "397c0441-6960-4bf7-ac2e-22996c5f8a25",
    "when": "20210910151134Z",
    "duration": "0.705542",
    "kw": {
      "key": "20210828145519",
      "serial": 1,
      "error": "cannot connect to 'https://utility.idm.nac-issa.org:443/ca/rest/certs/1': [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:897)",
      "msg": "Request for certificate serial number {serial} in request {key} failed: {error}"
    }
  },
  {
    "source": "ipahealthcheck.ipa.certs",
    "check": "IPACertRevocation",
    "result": "ERROR",
    "uuid": "889f52ec-b924-4c14-a61a-73428cee059e",
    "when": "20210910151134Z",
    "duration": "0.784755",
    "kw": {
      "key": "20210828145520",
      "serial": 3,
      "error": "cannot connect to 'https://utility.idm.nac-issa.org:443/ca/rest/certs/3': [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:897)",
      "msg": "Request for certificate serial number {serial} in request {key} failed: {error}"
    }
  },
  {
    "source": "ipahealthcheck.ipa.certs",
    "check": "IPACertRevocation",
    "result": "ERROR",
    "uuid": "e927f472-2338-48fa-992d-601dbfde622f",
    "when": "20210910151134Z",
    "duration": "0.823731",
    "kw": {
      "key": "20210828145523",
      "serial": 9,
      "error": "cannot connect to 'https://utility.idm.nac-issa.org:443/ca/rest/certs/9': [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:897)",
      "msg": "Request for certificate serial number {serial} in request {key} failed: {error}"
    }
  },
  {
    "source": "ipahealthcheck.ipa.certs",
    "check": "IPACertRevocation",
    "result": "ERROR",
    "uuid": "7146ac2c-f251-4e0d-8501-809b3bb9dda7",
    "when": "20210910151134Z",
    "duration": "0.903579",
    "kw": {
      "key": "20210828145522",
      "serial": 8,
      "error": "cannot connect to 'https://utility.idm.nac-issa.org:443/ca/rest/certs/8': [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:897)",
      "msg": "Request for certificate serial number {serial} in request {key} failed: {error}"
    }
  },
  {
    "source": "ipahealthcheck.ipa.certs",
    "check": "IPACertRevocation",
    "result": "ERROR",
    "uuid": "e7b65e5c-16de-4a12-b8c5-3392058232a1",
    "when": "20210910151134Z",
    "duration": "0.943354",
    "kw": {
      "key": "20201123010735",
      "serial": 10,
      "error": "cannot connect to 'https://utility.idm.nac-issa.org:443/ca/rest/certs/10': [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:897)",
      "msg": "Request for certificate serial number {serial} in request {key} failed: {error}"
    }
  },
  {
    "source": "ipahealthcheck.ipa.trust",
    "check": "IPATrustCatalogCheck",
    "result": "WARNING",
    "uuid": "837da8fc-95c1-4376-b47b-ae1864b936ba",
    "when": "20210910151135Z",
    "duration": "0.006237",
    "kw": {
      "key": "S-1-5-21-1078894834-642791778-300953666",
      "error": "returned nothing",
      "msg": "Look up of {key} {error}"
    }
  }
]


From: Rob Crittenden <rcritten@redhat.com>
Sent: Friday, September 10, 2021 9:49 AM
To: Jeremy Tourville <jeremy_tourville@hotmail.com>; FreeIPA users list <freeipa-users@lists.fedorahosted.org>
Cc: Florence Renaud <flo@redhat.com>
Subject: Re: [Freeipa-users] Re: Why is ipa-ods-exporter broken after running ipa-dns-install? (Was - Unable to start directory server after updates)
 
Jeremy Tourville wrote:
> [root@utility certs]# curl https://utility.idm.nac-issa.org/
> curl: (60) SSL certificate problem: self signed certificate in
> certificate chain
> More details here: https://curl.haxx.se/docs/sslcerts.html
>
> curl failed to verify the legitimacy of the server and therefore could not
> establish a secure connection to it. To learn more about this situation and
> how to fix it, please visit the web page mentioned above.
>
> [root@utility certs]# update-ca-trust
>
> [root@utility certs]# ausearch -m AVC -ts recent
> <no matches>
>
> [root@utility certs]# ipa-healthcheck
> -bash: ipa-healthcheck: command not found

I should have mentioned, try the curl after running update-ca-trust.

ipa-healthcheck is not installed by default, you'd need to install the
{free}ipa-healthcheck package.

rob

>
>
>
> ------------------------------------------------------------------------
> *From:* Rob Crittenden <rcritten@redhat.com>
> *Sent:* Friday, September 10, 2021 9:33 AM
> *To:* Jeremy Tourville <jeremy_tourville@hotmail.com>; FreeIPA users
> list <freeipa-users@lists.fedorahosted.org>
> *Cc:* Florence Renaud <flo@redhat.com>
> *Subject:* Re: [Freeipa-users] Re: Why is ipa-ods-exporter broken after
> running ipa-dns-install? (Was - Unable to start directory server after
> updates)
>  
> Jeremy Tourville wrote:
>> [root@utility certs]# ipa-certupdate
>> cannot connect to 'https://utility.idm.nac-issa.org/ipa/json': [SSL:
>> CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:897)
>> The ipa-certupdate command failed.
>>
>> Sort of a bad catch 22 I guess?
>
> Yeah, I was afraid of that.
>
> Let's walk through it. Try a simple command for another data point. I'm
> not sure what we'd do with this but it will exercise the system-wide
> trust as well:
>
> $ curl https://`hostname`/
>
> Rebuilding the CA trust db may help
>
> # update-ca-trust
>
> I suppose also look for AVCs in case something is way out-of-whack:
>
> # ausearch -m AVC -ts recent
>
> ipa-healthcheck may be something to try as well but you're likely to get
> a crapton of false positives since it can't talk to the web interface.
>
> rob
>
>>
>> ------------------------------------------------------------------------
>> *From:* Rob Crittenden <rcritten@redhat.com>
>> *Sent:* Friday, September 10, 2021 9:09 AM
>> *To:* Jeremy Tourville <jeremy_tourville@hotmail.com>; FreeIPA users
>> list <freeipa-users@lists.fedorahosted.org>
>> *Cc:* Florence Renaud <flo@redhat.com>
>> *Subject:* Re: [Freeipa-users] Re: Why is ipa-ods-exporter broken after
>> running ipa-dns-install? (Was - Unable to start directory server after
>> updates)
>>  
>> Jeremy Tourville wrote:
>>> Now I understand how to test the cert(s) after re-reading your comments
>>> Rob and Flo 🙂
>>>
>>> [root@utility certs]# openssl verify -verbose -show_chain -CAfile
>>> /etc/ipa/ca.crt /var/lib/ipa/certs/httpd.crt
>>> /var/lib/ipa/certs/httpd.crt: OK
>>> Chain:
>>> depth=0: O = IDM.NAC-ISSA.ORG, CN = utility.idm.nac-issa.org (untrusted)
>>> depth=1: O = IDM.NAC-ISSA.ORG, CN = Certificate Authority
>>
>> I'd try running ipa-certupdate. I have the feeling some of the
>> system-wide certificates are out-of-sync.
>>
>> rob
>>
>>>
>>>
>>> ------------------------------------------------------------------------
>>> *From:* Jeremy Tourville <jeremy_tourville@hotmail.com>
>>> *Sent:* Thursday, September 9, 2021 5:45 PM
>>> *To:* FreeIPA users list <freeipa-users@lists.fedorahosted.org>
>>> *Cc:* Florence Renaud <flo@redhat.com>; Rob Crittenden <rcritten@redhat.com>
>>> *Subject:* Re: [Freeipa-users] Re: Why is ipa-ods-exporter broken after
>>> running ipa-dns-install? (Was - Unable to start directory server after
>>> updates)
>>>  
>>> Oh wait!!! Which set of certs do I need to test against for my
>>> certificate chain?
>>> I realized I didn't include the proper path when testing.  It should be
>>> something like-
>>>
>>>  # openssl verify -verbose -show_chain -CAfile <path to root or
>>> intermediate cert> /etc/ipa/ca.crt
>>> # openssl verify -verbose -show_chain -CAfile <path to root or
>>> intermediate cert> /var/lib/ipa/certs/httpd.crt
>>>
>>> This would give you output (presuming you are using the correct set of
>>> certs)
>>>  /etc/ipa/ca.crt: OK
>>> /var/lib/ipa/certs/httpd.crt: OK
>>>
>>> Which path contains the intermediate or root CA certs I need to test
>>> against?
>>>
>>> [root@utility ~]# ls -la | find / -name *.crt
>>> /etc/pki/ca-trust/extracted/openssl/ca-bundle.trust.crt
>>> /etc/pki/ca-trust/source/ca-bundle.legacy.crt
>>> /etc/pki/tls/certs/ca-bundle.crt
>>> /etc/pki/tls/certs/ca-bundle.trust.crt
>>> /etc/pki/tls/certs/localhost.crt
>>> /etc/pki/pki-tomcat/alias/ca.crt
>>> /etc/ipa/ca.crt
>>> /etc/dirsrv/ssca/ca.crt
>>> /etc/dirsrv/slapd-IDM-NAC-ISSA-ORG/Server-Cert.crt
>>> /etc/dirsrv/slapd-IDM-NAC-ISSA-ORG/ca.crt
>>> /var/lib/ipa/certs/httpd.crt
>>> /var/kerberos/krb5kdc/kdc.crt
>>> /usr/share/pki/ca-trust-legacy/ca-bundle.legacy.default.crt
>>> /usr/share/pki/ca-trust-legacy/ca-bundle.legacy.disable.crt
>>> /usr/share/ipa/html/ca.crt
>>>
>>>
>>> ------------------------------------------------------------------------
>>> *From:* Jeremy Tourville <jeremy_tourville@hotmail.com>
>>> *Sent:* Thursday, September 9, 2021 3:13 PM
>>> *To:* FreeIPA users list <freeipa-users@lists.fedorahosted.org>
>>> *Cc:* Florence Renaud <flo@redhat.com>; Rob Crittenden <rcritten@redhat.com>
>>> *Subject:* Re: [Freeipa-users] Re: Why is ipa-ods-exporter broken after
>>> running ipa-dns-install? (Was - Unable to start directory server after
>>> updates)
>>>  
>>>>>>It isn't complaining that the certificate isn't valid, it's complaining
>>> that it isn't trusted.
>>>  Thanksfor pointing out my mistake.  I'm wearing some egg on my face.  I
>>> was thinking about it wrong at the time of my reply.
>>>
>>> I attempted to verify trust-
>>> [root@utility ipa]# openssl verify -verbose -show_chain -CAfile
>>> /etc/ipa/ca.crt
>>> ^C
>>> [root@utility ipa]# openssl verify -verbose -show_chain -CAfile
>>> /var/lib/ipa/certs/httpd.crt
>>> ^C
>>>
>>> As you can see, no output, so yeah, they are not trusted.
>>>
>>>>>Where did httpd.crt come from/what issuer?
>>> I recall not using a 3rd party CA.  The certs were just self-signed when
>>> the ipa server was initially built.  I never did replace the certs as it
>>> wasn't required for our situation.
>>>
>>> Next steps I guess would be to generate some new certs?  Thoughts?
>>>
>>> ------------------------------------------------------------------------
>>> *From:* Rob Crittenden <rcritten@redhat.com>
>>> *Sent:* Thursday, September 9, 2021 12:53 PM
>>> *To:* FreeIPA users list <freeipa-users@lists.fedorahosted.org>
>>> *Cc:* Florence Renaud <flo@redhat.com>; Jeremy Tourville
>>> <jeremy_tourville@hotmail.com>
>>> *Subject:* Re: [Freeipa-users] Re: Why is ipa-ods-exporter broken after
>>> running ipa-dns-install? (Was - Unable to start directory server after
>>> updates)
>>>  
>>> Jeremy Tourville via FreeIPA-users wrote:
>>>> /var/lib/ipa/certs/httpd.crt
>>>> looks valid and has a 3 year validity date starting from Nov 23, 2020
>>>>
>>>> /etc/ipa/ca.crt
>>>> looks valid and has a 20 year validity date starting from Nov 23, 2020
>>>
>>> It isn't complaining that the certificate isn't valid, it's complaining
>>> that it isn't trusted. You also need to look at the signer and ensure
>>> that the system trusts it globally. Where did httpd.crt come from/what
>>> issuer?
>>>
>>> You might try running:
>>>
>>> openssl verify -verbose -show_chain -CAfile /etc/ipa/ca.crt
>>> /var/lib/ipa/certs/httpd.crt
>>>
>>> See the default.conf(5) man page for a description of default.conf,
>>> server.conf, etc. In this case server is a context so the configuration
>>> only applies there.
>>>
>>> rob
>>>
>>>>
>>>>
>>>> ------------------------------------------------------------------------
>>>> *From:* Florence Renaud <flo@redhat.com>
>>>> *Sent:* Tuesday, September 7, 2021 11:38 AM
>>>> *To:* Jeremy Tourville <jeremy_tourville@hotmail.com>
>>>> *Cc:* FreeIPA users list <freeipa-users@lists.fedorahosted.org>
>>>> *Subject:* Re: [Freeipa-users] Re: Why is ipa-ods-exporter broken after
>>>> running ipa-dns-install? (Was - Unable to start directory server after
>>>> updates)
>>>>  
>>>> Hi Jeremy,
>>>>
>>>> to enable debugging you can simply create /etc/ipa/server.conf if the
>>>> file does not exist:
>>>> # cat /etc/ipa/server.conf
>>>> [global]
>>>> debug=True
>>>> # systemctl restart httpd
>>>>
>>>> The HTTPd certificate is stored in /var/lib/ipa/certs/httpd.crt, you can
>>>> examine its content with
>>>> # openssl x509 -noout -text -in /var/lib/ipa/certs/httpd.crt
>>>> If the IPA deployment includes an embedded CA, the CA that issued the
>>>> httpd cert is stored in /etc/ipa/ca.crt and can also be checked with
>>>> openssl command.
>>>>
>>>> flo
>>>>
>>>> On Tue, Sep 7, 2021 at 6:09 PM Jeremy Tourville
>>>> <jeremy_tourville@hotmail.com <mailto:jeremy_tourville@hotmail.com>> wrote:
>>>>
>>>>     I think I see the issue but I am unsure what to do to fix it.  See
>>>>     below.
>>>>
>>>>     To answer your question, yes I did accept the security exception.
>>>>
>>>>     Also, I don't see a server.conf file at /etc/ipa so that I may
>>>>     enable debugging.  What can you suggest for this issue?
>>>>
>>>>
>>>>     [root@utility ~]# ipactl status
>>>>     Directory Service: RUNNING
>>>>     krb5kdc Service: RUNNING
>>>>     kadmin Service: RUNNING
>>>>     named Service: RUNNING
>>>>     httpd Service: RUNNING
>>>>     ipa-custodia Service: RUNNING
>>>>     pki-tomcatd Service: RUNNING
>>>>     smb Service: RUNNING
>>>>     winbind Service: RUNNING
>>>>     ipa-otpd Service: RUNNING
>>>>     ipa-ods-exporter Service: STOPPED
>>>>     ods-enforcerd Service: RUNNING
>>>>     ipa-dnskeysyncd Service: RUNNING
>>>>     ipa: INFO: The ipactl command was successful
>>>>
>>>>     [root@utility ~]# kinit admin
>>>>     Password for admin@IDM.NAC-ISSA.ORG <mailto:admin@IDM.NAC-ISSA.ORG>:
>>>>
>>>>     [root@utility ~]# klist
>>>>     Ticket cache: KCM:0:43616
>>>>     Default principal: admin@IDM.NAC-ISSA.ORG
>>>>     <mailto:admin@IDM.NAC-ISSA.ORG>
>>>>
>>>>     Valid starting       Expires              Service principal
>>>>     09/07/2021 10:59:23  09/08/2021 10:09:04
>>>>      krbtgt/IDM.NAC-ISSA.ORG@IDM.NAC-ISSA.ORG
>>>>     <mailto:IDM.NAC-ISSA.ORG@IDM.NAC-ISSA.ORG>
>>>>
>>>>     [root@utility ~]# ipa config-show
>>>>     ipa: ERROR: cannot connect to
>>>>     'https://utility.idm.nac-issa.org/ipa/json': [SSL:
>>>>     CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:897)
>>>>
>>>>
>>>>     ------------------------------------------------------------------------
>>>>     *From:* Florence Renaud <flo@redhat.com <mailto:flo@redhat.com>>
>>>>     *Sent:* Tuesday, September 7, 2021 10:47 AM
>>>>     *To:* FreeIPA users list <freeipa-users@lists.fedorahosted.org
>>>>     <mailto:freeipa-users@lists.fedorahosted.org>>
>>>>     *Cc:* Jeremy Tourville <jeremy_tourville@hotmail.com
>>>>     <mailto:jeremy_tourville@hotmail.com>>
>>>>     *Subject:* Re: [Freeipa-users] Re: Why is ipa-ods-exporter broken
>>>>     after running ipa-dns-install? (Was - Unable to start directory
>>>>     server after updates)
>>>>      
>>>>     Hi Jeremy,
>>>>     Did you accept the security exception displayed by the browser (I'm
>>>>     trying to eliminate obvious issues)?
>>>>     If nothing is displayed, can you check if ipa command-line is
>>>>     working as expected (for instance do "kinit admin; ipa config-show")?
>>>>     You may want to enable debug logs (add debug=True to the [global]
>>>>     section of /etc/ipa/server.conf and restart httpd service), retry
>>>>     WebUI authentication and check the generated logs in
>>>>     /var/log/http/error_log
>>>>
>>>>     flo
>>>>
>>>>     On Tue, Sep 7, 2021 at 2:01 PM Jeremy Tourville via FreeIPA-users
>>>>     <freeipa-users@lists.fedorahosted.org
>>>>     <mailto:freeipa-users@lists.fedorahosted.org>> wrote:
>>>>
>>>>         OK,
>>>>         Why don't I see anything on the initial login page?
>>>>         All I see is the URL and the fact that the certificate is not
>>>>         trusted.  The certificate is not expired yet.  Not until Nov 2021.
>>>>         The login in page is mostly solid white with no login or
>>>>         password field.
>>>>         _______________________________________________
>>>>         FreeIPA-users mailing list --
>>>>         freeipa-users@lists.fedorahosted.org
>>>>         <mailto:freeipa-users@lists.fedorahosted.org>
>>>>         To unsubscribe send an email to
>>>>         freeipa-users-leave@lists.fedorahosted.org
>>>>         <mailto:freeipa-users-leave@lists.fedorahosted.org>
>>>>         Fedora Code of Conduct:
>>>>         https://docs.fedoraproject.org/en-US/project/code-of-conduct/
>>>>         List Guidelines:
>>>>         https://fedoraproject.org/wiki/Mailing_list_guidelines
>>>>         List Archives:
>>>>         https://lists.fedorahosted.org/archives/list/freeipa-users@lists.fedorahosted.org
>>>>         Do not reply to spam on the list, report it:
>>>>         https://pagure.io/fedora-infrastructure
>>>>
>>>>
>>>> _______________________________________________
>>>> FreeIPA-users mailing list -- freeipa-users@lists.fedorahosted.org
>>>> To unsubscribe send an email to freeipa-users-leave@lists.fedorahosted.org
>>>> Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
>>>> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
>>>> List Archives: https://lists.fedorahosted.org/archives/list/freeipa-users@lists.fedorahosted.org
>>>> Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure
>>>>
>>>
>>
>