Elasticsearch Shield SSL with letsencrypt failed to sign csr ERROR

545 views Asked by At

I`m trying to sign csr file to get signed certificate by letsencrypt and use it with Elasticsearch Shield.

Creating the csr file:

cd CONFIG_DIR/shield
keytool -importcert -keystore node01.jks -file letsencrypt_public.pem -alias letsencrypt
keytool -genkey -alias node01 -keystore node01.jks -keyalg RSA -keysize 2048 -validity 712 -ext san=dns:domain.com,ip:11.11.11.11
keytool -certreq -alias node01 -keystore node01.jks -file node01.csr -keyalg rsa -ext san=dns:domain.com,ip:11.11.11.11

Using letsencrypt official client:

git clone https://github.com/letsencrypt/letsencrypt
cd letsencrypt
./letsencrypt-auto --help
sudo ./letsencrypt-auto auth --csr /etc/elasticsearch/shield/node01.csr

The output:

 etc/elasticsearch/shield/node01.csr
 Checking for new version...
 Requesting root privileges to run letsencrypt...
 /home/usera/.local/share/letsencrypt/bin/letsencrypt --no-self-upgrade auth --csr /etc/elasticsearch/shield/node01.csr
 No handlers could be found for logger "letsencrypt.crypto_util"
 An unexpected error occurred:
 The server experienced an internal error :: Error creating new cert
 Please see the logfiles in /var/log/letsencrypt for more details.

The error log:

raise errors.NoInstallationError
2016-02-21 12:24:30,042:DEBUG:letsencrypt.plugins.disco:Other error:   (PluginEntryPoint#webroot): Missing parts of webroot configuration; please   set either --webroot-path and --domains, or --webroot-map. Run with  -- help webroot for examples.
2016-02-21 12:24:34,354:DEBUG:root:Received <Response [500]>. Headers: {'Content-Length': '88', 'Expires': 'Sun, 21 Feb 2016 12:24:33 GMT', 'Server': 'nginx', 'Connection': 'close', 'Pragma': 'no-cache', 'Cache-Control': 'max-age=0, no-cache, no-store', 'Date': 'Sun, 21 Feb 2016       12:24:33 GMT', 'Content-Type': 'application/problem+json', 'Replay-Nonce': 'ldZn123451Bb5D1234godjteu1VLjZ5o7eolv'}. Content: '{"type":"urn:acme:error:serverInternal","detail":"Error creating new cert","status":500}'
2016-02-21 12:24:34,354:DEBUG:acme.client:Received response <Response [500]> (headers: {'Content-Length': '88', 'Expires': 'Sun, 21 Feb 2016   12:24:33 GMT', 'Server': 'nginx', 'Connection': 'close', 'Pragma': 'no-cache', 'Cache-Control': 'max-age=0, no-cache, no-store', 'Date': 'Sun, 21   Feb 2016 12:24:33 GMT', 'Content-Type': 'application/problem+json', 'Replay-Nonce': 'ldZn123451Bb5D1234godjteu1VLjZ5ov'}):  '{"type":"urn:acme:error:serverInternal","detail":"Error creating new  cert","status":500}'
Error: urn:acme:error:serverInternal :: The server experienced an internal error :: Error creating new cert

I suppose I will shut down nginx when I got Shield to work, so what is the problem here? Why cant I sign the csr file?

1

There are 1 answers

0
AudioBubble On BEST ANSWER

The problem was that the csr generated in wrong format.

The full solution to set ssl in shield is:

a. Install letsencrypt and get public cacert.pem from letsencrypt:

    git clone https://github.com/letsencrypt/letsencrypt
    cd letsencrypt
    ./letsencrypt-auto --help
    mkdir letsencrypt/public_pem
    mv /home/ubuntu/cacert.pem letsencrypt/public_pem

b. Create a node keystore and import your CA’s certificate with Java Keytool:

    cd CONFIG_DIR/shield
    sudo keytool -importcert -keystore node01.jks -file /home/ubuntu/letsencrypt/public_pem/cacert.pem -alias letsencrypt

c. Generate a private key and certificate for the node with Java Keytool:

    sudo keytool -genkey -alias node01 -keystore node01.jks -keyalg RSA -keysize 2048 -validity 712 -ext san=dns:domain.com

    Enter keystore password:                                                  
    What is your first and last name?                                          
      [Unknown]:  domain.com                                          
    What is the name of your organizational unit?                              
      [Unknown]:  domain.com                                                   
    What is the name of your organizational?                                    
      [Unknown]:  domain                                                       
    What is the name of your City or Locality?                               
      [Unknown]:  Tel Aviv                                                     
    What is the name of your State or Province?                                
      [Unknown]:                                                               
    What is the two-letter country code for this unit?                         
      [Unknown]:  IL                                                          
    Is CN=domain.com, OU=domain.com, O=domain, L=Tel Aviv, ST=Unknown,
     C=IL correct?                                                             
      [no]:  yes

d. Create a certificate signing request (CSR):

    sudo keytool -certreq -alias node01 -keystore node01.jks -file node01.csr -keyalg rsa -ext san=dns:domain.com
    sudo openssl req -outform der -in node01.csr -out node01.der
    sudo openssl req -inform der -in node01.der -text -noout

e. Send the certificate to your CA for signing:

    cd letsencrypt
    ./letsencrypt-auto auth --csr /etc/elasticsearch/shield/node01.der

    Checking for new version...
    Requesting root privileges to run letsencrypt...
    sudo /home/ubuntu/.local/share/letsencrypt/bin/letsencrypt --no-self-upgrade auth --csr /etc/elasticsearch/shield/node01.der

    IMPORTANT NOTES:
    - Congratulations! Your certificate and chain have been saved at
    /home/ubuntu/letsencrypt/0001_chain.pem. Your cert will expire on
    2016-05-22. To obtain a new version of the certificate in the
    future, simply run Let's Encrypt again.

f. Add to jks and edit yml:

    cd CONFIG_DIR/shield
    sudo keytool -importcert -keystore node01.jks -file /home/ubuntu/letsencrypt/0001_chain.pem -alias node01
    cd ..
    sudo nano elasticsearch.yml

    shield.ssl.keystore.path:          /etc/elasticsearch/shield/node01.jks
    shield.ssl.keystore.password:      pass
    shield.transport.ssl: true
    shield.http.ssl: true
    discovery.zen.ping_timeout: 30s

g. Restart Elasticsearch (no nginx needed).