
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
- 4,428 Views
Third party cert - subscription manager
My school uses Fortigate requiring an ssl cert. i've added it to /etc/pki/ca-trust/source/anchors/ - did update-ca-trust
However, there are still issues with subscription manager - (how) can I fix this?


- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
- 4,420 Views
Also how does your school manage subscriptions? Is it done going directly to Red Hat or do they use Red Hat Satellite or Katello? If one of the latter two then you need to point it to their Satellite or Katello server. Someone at the school should know this information.
Sent from my iPhone

- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
- 4,419 Views
It is indeed just a firewall. My lab is the only one in the school with Red Hat machines and I am on my own vlan (under the overarching restrictions of the school district).
Which ports need to be open and is there a convenient subscription manager tool to check?
I can run these commands with no problem (as far as I recall - I am not at school):
curl -v -k https://subscription.rhn.redhat.com/subscription/ --cacert /etc/rhsm/ca/redhat-uep.pem
curl --key /etc/pki/consumer/key.pem --cert /etc/pki/consumer/cert.pem --cacert redhat-uep.pem https://subscription.rhn.redhat.com/subscription/users/SUBSCRIBER/owners


- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
- 4,413 Views
https://access.redhat.com/solutions/65300
https://access.redhat.com/documentation/en-us/red_hat_subscription_management/1/html-single/rhsm/ind...
Sent from my iPad

- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
- 4,412 Views
To clarify - port 443 is open. HTTPS traffic works fine - on web browsers and repos updates on other *nixes. After accepting the Fortigate cert as an authority and after using update-ca-certs
However, it fails in subscription manager - the port is open but the Fortigate is basically showing up as a MITM attack because of the ssl cert.
2019-09-18 09:09:01,885 [ERROR] rhsmd:30923:MainThread @cache.py:217 - [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:877)
2019-09-18 14:50:51,144 [ERROR] dnf:7125:MainThread @repolib.py:359 - [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:877)
ssl.SSLError: [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:877)
2019-09-18 14:50:51,347 [ERROR] dnf:7125:MainThread @cache.py:217 - [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:877)
ssl.SSLError: [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:877)
2019-09-18 15:15:49,811 [ERROR] dnf:8194:MainThread @repolib.py:359 - [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:877)
ssl.SSLError: [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:877)
2019-09-18 15:15:49,999 [ERROR] dnf:8194:MainThread @cache.py:217 - [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:877)
ssl.SSLError: [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:877)
2019-09-18 16:33:02,751 [ERROR] dnf:9616:MainThread @repolib.py:359 - [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:877)
ssl.SSLError: [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:877)
2019-09-18 16:33:03,129 [ERROR] dnf:9616:MainThread @cache.py:217 - [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:877)
ssl.SSLError: [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:877)


- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
- 4,398 Views
You can try the below steps. I assume from your original post step one is done.
Copy the CA.crt to /etc/pki/ca-trust/source/anchors/
update-ca-trust force-enable
update-ca-trust extract
You can look at the man page for update-ca-trust for more info on it.
If you still have issues you may need to install certifi, which is a python package.
You can read more here where I found the above info.
https://stackoverflow.com/questions/27835619/urllib-and-ssl-certificate-verify-failed-error
Sent from my iPhone

- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
- 4,377 Views
Thank you. I have installed certifi and will check on Monday to see if that helps.

- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
- 4,264 Views
It did not work. I'll see if I can get the district to turn off deep packet inspection for Red Hat.