<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Error opening CA Certificate ca.pem in Security</title>
    <link>https://community.splunk.com/t5/Security/Error-opening-CA-Certificate-ca-pem/m-p/178512#M5301</link>
    <description>&lt;P&gt;,&lt;STRONG&gt;Problem generating Certificate because phassphrase was in blank  (CentOs)&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;I had a problem with my certificate because I left passphrase in blank, so then I could not generate another certificate or open the current one  &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;

&lt;P&gt;I tried deleting the cakey.pem from your $dir/CA/private&lt;/P&gt;

&lt;P&gt;First at all check your openssl.cnf  in CentOs is in /etc/pki/tls/openssl.cnf.  Check the value dir=xxxxxxx&lt;BR /&gt;
Enter in that path (example: /etc/pki/tls/openssl.cnf)  and check $dir&lt;/P&gt;

&lt;P&gt;Enter in $dir  (example: /etc/pki/CA) and find /private&lt;BR /&gt;
Deletes the key file cakey.pem&lt;/P&gt;

&lt;P&gt;Now, everything should going back to normally.&lt;/P&gt;

&lt;P&gt;Try to generate your Certificate again (example: $/etc/pki/tls/misc/CA -newca)  and That's it!!!&lt;/P&gt;

&lt;P&gt;Good luck and I hope this post will be helpful!&lt;/P&gt;</description>
    <pubDate>Wed, 18 Mar 2015 17:56:28 GMT</pubDate>
    <dc:creator>aileencita</dc:creator>
    <dc:date>2015-03-18T17:56:28Z</dc:date>
    <item>
      <title>Error opening CA Certificate ca.pem</title>
      <link>https://community.splunk.com/t5/Security/Error-opening-CA-Certificate-ca-pem/m-p/178507#M5296</link>
      <description>&lt;P&gt;I just downloaded a new 6.1 copy of Splunk for FreeBSD. After a wget download and running (tar zxvf splunk-6.1.1-207789-freebsd-7.3-amd64.tgz), I felt I was ready to start Splunk. So I ran ( /opt/splunk/bin/splunk start) and this happened &amp;lt; SEE BELOW &amp;gt;.&lt;/P&gt;

&lt;P&gt;Any ideas of what might be going on with the ca.pem file issue? I recently upgraded openssl to v1.0.1g. Could that be causing me issues? Or is there some step I've overlooked during the install?&lt;/P&gt;

&lt;P&gt;Thanks,&lt;/P&gt;

&lt;P&gt;Splunk&amp;gt; Like an F-18, bro.&lt;/P&gt;

&lt;P&gt;Checking prerequisites...&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;    Checking http port [8000]: open

    Checking mgmt port [8089]: open

    Checking configuration...  Done.

    Checking critical directories...        Done

    Checking indexes...

            Validated: _audit _blocksignature _internal _introspection _thefishbucket history main summary

    Done
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;New certs have been generated in '/opt/splunk/etc/auth'.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;    Checking filesystem compatibility...  Done

    Checking conf files for problems...

    Done
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;All preliminary checks passed.&lt;/P&gt;

&lt;P&gt;Starting splunk server daemon (splunkd)...&lt;/P&gt;

&lt;P&gt;Done&lt;/P&gt;

&lt;P&gt;Starting splunkweb...  Generating certs for splunkweb server&lt;/P&gt;

&lt;P&gt;Generating a 1024 bit RSA private key&lt;/P&gt;

&lt;P&gt;.....++++++&lt;/P&gt;

&lt;P&gt;...........................++++++&lt;/P&gt;

&lt;P&gt;writing new private key to 'privKeySecure.pem'&lt;/P&gt;

&lt;HR /&gt;

&lt;P&gt;Signature ok&lt;/P&gt;

&lt;P&gt;subject=/CN=DOMAIN.NAME/O=SplunkUser&lt;/P&gt;

&lt;P&gt;Error opening CA Certificate ca.pem&lt;/P&gt;

&lt;P&gt;34377709224:error:02001002:system library:fopen:No such file or &lt;BR /&gt;
directory:bss_file.c:398:fopen('ca.pem','r')&lt;/P&gt;

&lt;P&gt;34377709224:error:20074002:BIO routines:FILE_CTRL:system lib:bss_file.c:400:&lt;/P&gt;

&lt;P&gt;unable to load certificate&lt;/P&gt;

&lt;P&gt;Command failed (ret=1), exiting.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 16:43:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Error-opening-CA-Certificate-ca-pem/m-p/178507#M5296</guid>
      <dc:creator>albyva</dc:creator>
      <dc:date>2020-09-28T16:43:27Z</dc:date>
    </item>
    <item>
      <title>Re: Error opening CA Certificate ca.pem</title>
      <link>https://community.splunk.com/t5/Security/Error-opening-CA-Certificate-ca-pem/m-p/178508#M5297</link>
      <description>&lt;P&gt;To Update, it looks like I've narrowed the issue to (openssl).&lt;/P&gt;

&lt;P&gt;root@:/opt/splunk # /usr/bin/openssl req -new -key FILENAME.pem -out FILENAME.csr&lt;BR /&gt;
Error opening Private Key FILENAME.pem&lt;BR /&gt;
34381428392:error:02001002:system library:fopen:No such file or directory:bss_file.c:398:fopen('FILENAME.pem','r')&lt;BR /&gt;
34381428392:error:20074002:BIO routines:FILE_CTRL:system lib:bss_file.c:400:&lt;BR /&gt;
unable to load Private Key&lt;/P&gt;

&lt;P&gt;I also found this helpful link with another having a similar issue:  &lt;A href="http://answers.splunk.com/answers/44718/splunkweb-certificates-issue" target="_blank"&gt;http://answers.splunk.com/answers/44718/splunkweb-certificates-issue&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 16:43:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Error-opening-CA-Certificate-ca-pem/m-p/178508#M5297</guid>
      <dc:creator>albyva</dc:creator>
      <dc:date>2020-09-28T16:43:30Z</dc:date>
    </item>
    <item>
      <title>Re: Error opening CA Certificate ca.pem</title>
      <link>https://community.splunk.com/t5/Security/Error-opening-CA-Certificate-ca-pem/m-p/178509#M5298</link>
      <description>&lt;P&gt;For some reason, your startup didn't create the ca.pem on first-time run. You might try running &lt;CODE&gt;/opt/splunk/bin/splunk cmd genRootCA.sh&lt;/CODE&gt; and see if it will create the file again.&lt;/P&gt;</description>
      <pubDate>Tue, 27 May 2014 01:25:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Error-opening-CA-Certificate-ca-pem/m-p/178509#M5298</guid>
      <dc:creator>gkanapathy</dc:creator>
      <dc:date>2014-05-27T01:25:12Z</dc:date>
    </item>
    <item>
      <title>Re: Error opening CA Certificate ca.pem</title>
      <link>https://community.splunk.com/t5/Security/Error-opening-CA-Certificate-ca-pem/m-p/178510#M5299</link>
      <description>&lt;P&gt;It looks like running genRootCA.sh solved my Certificate issues. Thanks. Although it appears splunkweb is failing to kick in. I'll troubleshoot that issue and see if I need to open a new Question.&lt;/P&gt;

&lt;P&gt;Thanks.&lt;/P&gt;

&lt;P&gt;.&lt;BR /&gt;
.&lt;BR /&gt;
.&lt;BR /&gt;
New certs have been generated in '/opt/splunk/etc/auth'.&lt;BR /&gt;
        Checking filesystem compatibility...  Done&lt;BR /&gt;
        Checking conf files for problems...&lt;BR /&gt;
        Done&lt;BR /&gt;
All preliminary checks passed.&lt;/P&gt;

&lt;P&gt;Starting splunk server daemon (splunkd)...&lt;BR /&gt;
Done&lt;/P&gt;

&lt;P&gt;Starting splunkweb...  Error starting splunkweb.&lt;/P&gt;</description>
      <pubDate>Tue, 27 May 2014 13:10:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Error-opening-CA-Certificate-ca-pem/m-p/178510#M5299</guid>
      <dc:creator>albyva</dc:creator>
      <dc:date>2014-05-27T13:10:47Z</dc:date>
    </item>
    <item>
      <title>Re: Error opening CA Certificate ca.pem</title>
      <link>https://community.splunk.com/t5/Security/Error-opening-CA-Certificate-ca-pem/m-p/178511#M5300</link>
      <description>&lt;P&gt;You can try &lt;CODE&gt;./splunk createssl web-cert&lt;/CODE&gt; to get the splunkweb certificate. If that doesn't work, it may be because the hashed password for the certificate in &lt;CODE&gt;/opt/splunk/etc/system/local/server.conf&lt;/CODE&gt; in &lt;CODE&gt;sslKeysFilePassword&lt;/CODE&gt; is now wrong after the regeneration. You can replace that with plaintext &lt;CODE&gt;password&lt;/CODE&gt; (that's the default password, you can change it with openssl) and Splunk will re-hash it.&lt;/P&gt;</description>
      <pubDate>Tue, 27 May 2014 15:37:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Error-opening-CA-Certificate-ca-pem/m-p/178511#M5300</guid>
      <dc:creator>gkanapathy</dc:creator>
      <dc:date>2014-05-27T15:37:21Z</dc:date>
    </item>
    <item>
      <title>Re: Error opening CA Certificate ca.pem</title>
      <link>https://community.splunk.com/t5/Security/Error-opening-CA-Certificate-ca-pem/m-p/178512#M5301</link>
      <description>&lt;P&gt;,&lt;STRONG&gt;Problem generating Certificate because phassphrase was in blank  (CentOs)&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;I had a problem with my certificate because I left passphrase in blank, so then I could not generate another certificate or open the current one  &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;

&lt;P&gt;I tried deleting the cakey.pem from your $dir/CA/private&lt;/P&gt;

&lt;P&gt;First at all check your openssl.cnf  in CentOs is in /etc/pki/tls/openssl.cnf.  Check the value dir=xxxxxxx&lt;BR /&gt;
Enter in that path (example: /etc/pki/tls/openssl.cnf)  and check $dir&lt;/P&gt;

&lt;P&gt;Enter in $dir  (example: /etc/pki/CA) and find /private&lt;BR /&gt;
Deletes the key file cakey.pem&lt;/P&gt;

&lt;P&gt;Now, everything should going back to normally.&lt;/P&gt;

&lt;P&gt;Try to generate your Certificate again (example: $/etc/pki/tls/misc/CA -newca)  and That's it!!!&lt;/P&gt;

&lt;P&gt;Good luck and I hope this post will be helpful!&lt;/P&gt;</description>
      <pubDate>Wed, 18 Mar 2015 17:56:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Error-opening-CA-Certificate-ca-pem/m-p/178512#M5301</guid>
      <dc:creator>aileencita</dc:creator>
      <dc:date>2015-03-18T17:56:28Z</dc:date>
    </item>
  </channel>
</rss>

