Apple’s Worldwide Developers Conference returns June 10, 2024

Looks like no one’s replied in a while. To start the conversation again, simply ask a new question.

Server 3 / SSL Certificate / Open Directory - Problem!

We've updated from Server 2 to Server 3 / OS X 10.9.


We have an SSL certificate for server from Comodo.


Under Server 2, all worked just fine, with the SSL certificate being used to secure all services (configure via Server app).


Under Server 3, all works just fine, but Open Directory will not accept certificate - so Certificates / Settings in Server 3 app shows "Custom Configuration" for Settings - and on inspecting this it is because Open Directory set to be not secured but everything else is using SSL.


I've tried setting the Open Directory to use the SSL, but when ever I do it simply bounces back to being unsecured.


Does this matter? Presumably it should be possible (as the standard setting appears to try and set Open Directory to use the SSL certificate), but not sure whether trying to fix is simply a fools errand.


Anyone got any clues as to whether to fix or not, and if to fix, how?


Thanks in advance.

Mac mini (Late 2012), OS X Server

Posted on Nov 6, 2013 5:22 AM

Reply
116 replies

May 22, 2014 9:54 AM in response to bekman553

I don't understand.

I've just configured my server with my brand new godaddy *.domain.com certificate and it sticks just fine.

With Open Directory OFF it wouldn't stick, but as soon as I flicked on the switch for OD, I was able to go back to the Certificates tab and select my wildcard certificate.


One thing I will say...


Before I tried that, I copied the cert into keychain access along with the intermediate, then moved them down to the system tab. I had to type my username and password, but it copied fine. It took about 30 seconds for the certificate to appear in the list of available ones in server.app, but sure enough... It popped right up.


The only thing I can think maybe I did that's out of the ordinary is I clicked on the gear and chose "Show all certificates." before I selected it.

Jun 20, 2014 10:03 AM in response to Peter-Erik

Edited with update: Had the same issue with a Comodo Wildcard SSL cert. All services would accept the certificate except Open Directory. Tried importing the cert a number of different ways (through server.app, through keychain, as root, not root), also tried reinstalling and detroying/rebuilding OD, nothing would work. Purchased a Rapid SSL wildcard cert, and had the same issue until I removed and re-configured open directory. At this time the server seems happy with the rapid ssl wildcard certificate on all services (including OD). I even crossed my fingers and rebooted and everything seems to be OK still.


TLDR: Switched to RapidSSL wildcard cert and everything appears to be working.

Jun 30, 2014 12:06 AM in response to Peter-Erik

After 5 months of silence Apple Bug Reporter ask me for more information. (al those months still giving input that the updates don't solved the problem) I told Apple that I had to move on and that I can check the requested on my test server, did that and the next message was that they close the call because it was a duplicate of call 17396241. (it was a duplicate from the beginning)

Aug 17, 2014 11:37 PM in response to Gavin Lawrie

Several clients have had this issue. The most common cause is not importing the supporting certificates when importing your certificate.


My general fix is this:


1. Make sure your certificate has an organization in the subject area. Note that it should also have an organization name in the issuer area. I use startssl.com

2. Make sure that you import all the supporting certificates at the same time as you import your certificate.

3. If you failed in to include the supporting certificates then reinstall


*** Instructions to reinstall your certificate:

(Note that to export your private key from keychain access you need to start it as root)

Find your certificate and export both the private key and the certificate. Then reimport using the server app.

*** end instructions



4. Make sure your ldap server is not using ssl as this will prevent it from replacing the certificate:

Server app -> Certificates -> Custom -> Open Directory: None


in terminal:

sudo slapconfig -getldapconfig

if ssl: on then:

sudo slapconfig -setldapconfig -ssl off


Using server app, set the certificate to your certificate.


Happiness.

Aug 29, 2014 4:15 PM in response to CharlesY

Ok all. Figured this one out!!!


Open Directory requires a SSL certificate that includes a 'Code Signing extension'. See: http://www.comodo.com/e-commerce/code-signing/code-signing-certificate.php

The cheapest form of a Comodo SSL certificate does not include in the SSL Certificate, the Code Signing extension. If you purchase a SSL Certificate from any company, it must include the Code Signing extension. Some of Comodo's SSL certificates include this extension and some don't. The cheapest SSL certificate from Comodo (which I did originally purchase for $9.00 and works for everything but Open Directory) does not include it. Surprise, surprise. Other resellers may include the Code Signing extension in all of their SSL certificates but typically those SSL certificates will be more expensive. If you don't need Profile Manager to use Open Directory with a 3rd party CA, then you are just fine with the self-signed certificate that Apple's Server can create. It is all about that one time 'Not Verified' that will appear in red that a user has to ignore. If you wish for the most proper installation, you will want the complete 3rd part SSL certificate that includes the Code Signing extension.

While Apple's Server prior to Version 3 may have allowed a SSL certificate without the Code Signing extension for Open Directory, it would have been an error on Apple's part. The code signing extension provides a check on the code of the Profile file that the user downloads after the Profile Manager created it. Understandably, an admin would want to ensure that the Profile that a user is installing has not been modified. Thus this extension of the SSL certificate is necessary. Only Open Directory makes use of this SSL extension, thus only the Open Directory service will not be happy with a SSL certificate that does not include this extension. There are many other extensions that a SSL certificate might include, but it is only the Code Signing extension that is important in this situation. The other services of Apple's Server do not deal with the code of anything. They just authenticate the 'who', not the 'what'.

Aug 30, 2014 12:44 PM in response to Gavin Lawrie

I've had this problem for a long time, until today.


Anyway, today, I decided to completely replace my certificates. This is fairly easy for me: I run my own PKI under Open BSD.


I replaced Mavericks server certificate, and had the same problem with Open Directory as always. I then realised I'd forgotten to update my certificate revocation list (CRL). I did so, and when back to Server, and, lo, Open Directory accepted the certificate!


I don't expect this will cure most people's problems, but I do think it's another thing to check. If you're ultimately using a third party issued certificate, as many will, it may be worth checking with the certificate issuer how, and if, they maintain their CRLs.

Aug 31, 2014 4:09 PM in response to RAmeeti0

Hi


Just got this disappointing response from Comodo technical support - I filed a support ticket referencing the comments from RAmeeti0 above.

Hi Gavin,


Thank you for contacting Comodo


Sorry it is not possible to get SSL certificate with Code Signing extension.


Should have any queries do not hesitate to write to us.


To serve you better in the near future, Kindly provide your valuable feedback to feedback@comodo.com


Regards

Technical Support


--

Comodo Technical Support



Ticket Details

---------------------------------

Ticket ID: HDF-351-63455

Department: Certificates

Type: Issue

Status: Awaiting Reply

Priority: Medium


Helpdesk: https://support.comodo.com/index.php?

Looks like Comodo is simply not interested in providing certificates for OS X Server. 😟


I'm going to see if I can get a refund on our current certificate - on basis that it is not fit for purpose.


Can anyone recommend a Cert provider that does actually provide certificates that work with OS X Server?

Aug 31, 2014 4:34 PM in response to Gavin Lawrie

If you use the link that I provided for Comodo, you will get to their page that specifically addresses their SSL that include the code signing. Do use the link for an understanding of Comodo & this type of certificate. Code Signing is not really all that special but it is distinctly not available it the cheapest forms of SSL certificates. Every major SSL provider will sell an SSL certificate with Code Signing, including Comodo, but it will not be the cheapest certificate that they sell.

Aug 31, 2014 4:49 PM in response to RAmeeti0

Hi - Thanks for the clarification. I did use the link, and saw the page about code-signing certificates. That's what inspired me to write to comodo and ask them how I might obtain a certificate solution that worked in OS X - I imagined when I wrote they would write back and say I'd have to buy some other kind of certificate, and / or charge a fee. But actually they wrote back and said they won't do support it. Maybe their code-signing certificates are not useful for normal SSL use? Or don't support some of the validation features that their SSL certificates do?


And for the record, we're using the Comodo SSL UCC Certificate, as even though we don't use any MS software, the multi-domain name options for this type of certificate suited our needs better than multiple certificates or generic wild-card ones. Not sure whether this is what you call the "cheapest certificate they sell" - but it wasn't the cheapest on offer when we bought it.

Aug 31, 2014 5:19 PM in response to Gavin Lawrie

The most basic of SSL certificates will give you a lock and a https in the browsers address bar (If that SSL provider has a chain of authority that that browser recognizes.)


Some SSL certificates have extensions that allow for greater features and the require additional checks by the SSL provider beyond the secure transmission that a basic SSL certificate allows. In the address bar for this thread, you will likely see 'Apple Inc. [US]' just after the lock. That is due to an extension within the SSL certificate. A business such as a bank etc, will want to purchase this type of SSL to show that it has been verified to exactly who it is so that the user can be assured that they are not on an impostor site. When a user wishes to receive a file from the SSL certificate owner, the user probably wants to know that the certificate has not been changed along the way. That is the Code Signing extension that Profile Manager needs when it provides a piece of 'code' within the download or attachment. Do send that link to the Comodo customer service rep as they are definitely capable of providing the proper type of SSL certificate.

Sep 4, 2014 6:48 AM in response to RAmeeti0

Some more information from Comodo about the issue with SSL certs on OS X Server. I am not sure I understand it, but it seems to be suggesting that they cannot provide the code-signing extension to a certificate intended for use on a server. Is this correct?

On 4 Sep 2014, at 14:27, Comodo Support <premiumsupport@comodo.com> wrote:

In regards to SSL certificates, a SSL certificate would have either Client Authentication or Server Authentication and only include both of these EKUs (enhanced key usages). These are the only two EKUs which we issue all SSL certificates with.


The Enhanced Key Usage of Code Signing would only be used for certificates which are used to sign an application or an application executable. The only type of certificate which we offer with the EKU of Code Signing is the code signing certificate. If there are specific EKUs or Key Usages required by OpenDirectory or revisions, there should be specific documentation.

Server 3 / SSL Certificate / Open Directory - Problem!

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple ID.