How to determine if any certificates used by the OMS
1.Run the command below to check the status of the OMS and gather its details for hostnames and ports and SLB/virtual hostname details
Login to OMS server
$export ORACLE_HOME=<%MIDDLEWARE_HOME%>
Example:
$export ORACLE_HOME= /data2/app/oracle/middleware
[oem@ccuine25 middleware]$ cd $ORACLE_HOME/bin
[oem@ccuine25 bin]$ ./emctl status oms -details
Oracle Enterprise Manager Cloud Control 13c Release 5
Copyright (c) 1996, 2021 Oracle Corporation. All rights reserved.
Enter Enterprise Manager Root (SYSMAN) Password :
Console Server Host : ccuine25.xyz.co.in
HTTP Console Port : 7788
HTTPS Console Port : 7803
HTTP Upload Port : 4889
HTTPS Upload Port : 4903
EM Instance Home : /data2/app/oracle/gc_inst/em/EMGC_OMS1
OMS Log Directory Location : /data2/app/oracle/gc_inst/em/EMGC_OMS1/sysman/log
OMS is not configured with SLB or virtual hostname
Agent Upload is locked.
OMS Console is locked.
Active CA ID: 1
Console URL: https://ccuine25.xyz.co.in:7803/em
Upload URL: https://ccuine25.xyz.co.in:4903/empbs/upload
WLS Domain Information
Domain Name : GCDomain
Admin Server Host : ccuine25.xyz.co.in
Admin Server HTTPS Port: 7102
Admin Server is RUNNING
Oracle Management Server Information
Managed Server Instance Name: EMGC_OMS1
Oracle Management Server Instance Host: ccuine25.xyz.co.in
WebTier is Up
Oracle Management Server is Up
JVMD Engine is Up
2. If the OMS is running, then the certificates used by the OMS can be checked using any of the below procedures.
2a. Verifying with “emctl secdiag” command.
In Issuer field, if it is showing the OMS hostname and the certificate validity is 10 years, then it is Domo certificate.
To verify,
[oem@ccuine25 bin]$ ./emctl secdiag openurl -url https://ccuine25.xyz.co.in:4903/empbs/upload
Oracle Enterprise Manager Cloud Control 13c Release 5
Copyright (c) 1996, 2021 Oracle Corporation. All rights reserved.
Log file: /tmp/OpenPage_2021_12_06_13_23_497868447601063284563.log
Opening page: https://ccuine25.xyz.co.in:4903/empbs/upload
Using non-validating trust manager; all certificates will be blindly accepted.
Proxy server is not set
Using protocol: TLSv1
Negotiated protocol: TLSv1
Getting the certificate chain
Details of cert# 1 in chain:
Subject: CN=ccuine25.xyz.co.in
Issuer: CN=ccuine25.xyz.co.in, C=US, ST=CA, L=EnterpriseManager on ccuine25.xyz.co.in, OU=EnterpriseManager on ccuine25.xyz.co.in, O=EnterpriseManager on ccuine25.xyz.co.in
Valid from: Fri Nov 26 12:23:32 IST 2021
Valid till: Tue Nov 25 12:23:32 IST 2031
Serial#: -1562215274281161665
Public key: Sun RSA public key, 1024 bits
params: null
modulus: 115776305526868774367344434524839482517685951325472324400167322766776075414308990760886761862848426323857328397387316124782891769368223780434083793913289701480931965560434252568637538653810794338946757805777495146784750664597087203172476664248076937258722119323874400428320431663792757454380232885358450306227
public exponent: 65537
Signature algorithm: SHA512withRSA
Details of cert# 2 in chain:
Subject: CN=ccuine25.xyz.co.in, C=US, ST=CA, L=EnterpriseManager on ccuine25.xyz.co.in, OU=EnterpriseManager on ccuine25.xyz.co.in, O=EnterpriseManager on ccuine25.xyz.co.in
Issuer: CN=ccuine25.xyz.co.in, C=US, ST=CA, L=EnterpriseManager on ccuine25.xyz.co.in, OU=EnterpriseManager on ccuine25.xyz.co.in, O=EnterpriseManager on ccuine25.xyz.co.in
Valid from: Fri Nov 26 12:23:32 IST 2021
Valid till: Tue Nov 25 12:23:32 IST 2031
Serial#: 28927599574933379200
Public key: Sun RSA public key, 1024 bits
params: null
modulus: 137261211539843504670622418187766808702599679284971506435071556027263289359546098536039368340742298948567040033910861434050027205919002583115809760212060733257289863786523160874210003867026089884047769780727525741437911092772616647738894839923266126650810544284334240152637157515395133646710028090924769802959
public exponent: 65537
Signature algorithm: SHA512withRSA
Following headers are present in the response:
Date : Mon, 06 Dec 2021 07:53:50 GMT
X-ORACLE-DMS-RID : 0:1:1
Content-Length : 305
X-Content-Type-Options : nosniff
X-XSS-Protection : 1; mode=block
X-ORACLE-DMS-ECID : 6e4738a3-125a-4155-99a6-cf6ce1401fe0-00000002
X-ORCL-EMOA : true
Content-Type : text/html
Response saved at :
/tmp/ccuine25.xyz.co.in_4903_2021_12_06_13_23_507464916505254990497.html
In the above output we can see the hostname of OMS server and certificates’validy is of 10 years. This confirms OMS server uses a demo certificate.
2b. We can also verify using “openssl ” command
In Issuer field with i:, if it is showing the OMS hostname and the certificate then it is Domo certificate.
[oem@ccuine25 bin]$ openssl s_client -connect ccuine25.xyz.co.in:4903
CONNECTED(00000003)
depth=1 O = EnterpriseManager on ccuine25.xyz.co.in, OU = EnterpriseManager on ccuine25.xyz.co.in, L = EnterpriseManager on ccuine25.xyz.co.in, ST = CA, C = US, CN = ccuine25.xyz.co.in
verify error:num=19:self signed certificate in certificate chain
—
Certificate chain
0 s:/CN=ccuine25.xyz.co.in
i:/O=EnterpriseManager on ccuine25.xyz.co.in/OU=EnterpriseManager on ccuine25.xyz.co.in/L=EnterpriseManager on ccuine25.xyz.co.in/ST=CA/C=US/CN=ccuine25.xyz.co.in
1 s:/O=EnterpriseManager on ccuine25.xyz.co.in/OU=EnterpriseManager on ccuine25.xyz.co.in/L=EnterpriseManager on ccuine25.xyz.co.in/ST=CA/C=US/CN=ccuine25.xyz.co.in
i:/O=EnterpriseManager on ccuine25.xyz.co.in/OU=EnterpriseManager on ccuine25.xyz.co.in/L=EnterpriseManager on ccuine25.xyz.co.in/ST=CA/C=US/CN=ccuine25.xyz.co.in
—
Server certificate
—–BEGIN CERTIFICATE—–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—–END CERTIFICATE—–
subject=/CN=ccuine25.xyz.co.in
issuer=/O=EnterpriseManager on ccuine25.xyz.co.in/OU=EnterpriseManager on ccuine25.xyz.co.in/L=EnterpriseManager on ccuine25.xyz.co.in/ST=CA/C=US/CN=ccuine25.xyz.co.in
—
No client certificate CA names sent
Peer signing digest: SHA384
Server Temp Key: ECDH, P-256, 256 bits
—
SSL handshake has read 1957 bytes and written 415 bytes
—
New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES256-GCM-SHA384
Server public key is 1024 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
Protocol : TLSv1.2
Cipher : ECDHE-RSA-AES256-GCM-SHA384
Session-ID: CD135D17211057A2A2C8D090D6A539295AD8A463A48048ABF4102D16032F7C3D
Session-ID-ctx:
Master-Key: 77B489903B3E69A8ED19AC202FDB96F77905B85FB22EE76386CE9A6C46EC925427E453F2FED2B07889B833A294EBECF6
Key-Arg : None
Krb5 Principal: None
PSK identity: None
PSK identity hint: None
Start Time: 1638777708
Timeout : 300 (sec)
Verify return code: 19 (self signed certificate in certificate chain)
—
closed
2c. Verifying the existing certificates are using SAN or not.
If there is no SAN certificate below command will not return any results.
[oem@ccuine25 bin]$ openssl s_client -connect ccuine25.xyz.co.in:4903 </dev/null 2>/dev/null | openssl x509 -noout -text | grep DNS
If SAN certificates in use below command will return results like.
$ openssl s_client -connect <OMS_HOSTNAME>.<DOMAIN_NAME>:4903 </dev/null 2>/dev/null | openssl x509 -noout -text | grep DNS
DNS:<OMS_HOSTNAME>.<DOMAIN_NAME>, DNS:<OMS_HOSTNAME2>.<DOMAIN_NAME>, DNS:<SLBOMS_HOSTNAME>.<DOMAIN_NAME>
3. If the OMS is not running, you can check the certificates used by the OMS by reading the contents of the wallet used by the OMS.
If the Trusted certificate Subject is shows OMS hostname then it is Domo certificate.
export OMS_INST= /data2/app/oracle/gc_inst
cd $ORACLE_HOME/oracle_common/bin
[oem@ccuine25 bin]$./orapki wallet display -wallet $OMS_INST/user_projects/domains/GCDomain/config/fmwconfig/components/OHS/ohs1/keystores/upload/ -summary
Oracle PKI Tool : Version 12.2.1.4.0
Copyright (c) 2004, 2019, Oracle and/or its affiliates. All rights reserved.
Requested Certificates:
User Certificates:
Subject: CN=ccuine25.xyz.co.in
Trusted Certificates:
Subject: CN=ccuine25.xyz.co.in,C=US,ST=CA,L=EnterpriseManager on ccuine25.xyz.co.in,OU=EnterpriseManager on ccuine25.xyz.co.in,O=EnterpriseManager on ccuine25.xyz.co.in


Leave a Reply