<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic VSC 6.0 SSL Cert replacement in VMware Solutions Discussions</title>
    <link>https://community.netapp.com/t5/VMware-Solutions-Discussions/VSC-6-0-SSL-Cert-replacement/m-p/119496#M8634</link>
    <description>&lt;P&gt;Not sure where to file a case on this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There are no clear instructions on how to replace the self-signed SSL certificates in VSC, with CA-signed ones.&amp;nbsp; I'm using VSC for vSphere 6.2P1, with a Linux-based VCSA and ESXi versions 6.0U2.&amp;nbsp; Also, cDOT NAS datastores, running 8.2.4P2.&lt;BR /&gt;&lt;BR /&gt;The VSC manual, &lt;A href="https://library.netapp.com/ecm/ecm_get_file/ECMLP2371569" target="_blank"&gt;https://library.netapp.com/ecm/ecm_get_file/ECMLP2371569&lt;/A&gt; , page 49, says that the certificate must be signed with SHA1.&lt;BR /&gt;With SHA1 being deprecated, this is a bug that VSC should be addressing SOON.&lt;BR /&gt;&lt;BR /&gt;If you use &lt;A href="https://kb.netapp.com/support/index?page=content&amp;amp;id=1013807," target="_blank"&gt;https://kb.netapp.com/support/index?page=content&amp;amp;id=1013807,&lt;/A&gt; from the 4.x era, it describes a process which somewhat works.&amp;nbsp; At least, I am able to follow it and add certs and get VSC to boot again.&amp;nbsp; However, it doesn't mention the SHA1 limitation, because of its age.&lt;BR /&gt;&lt;BR /&gt;There's also &lt;A href="https://kb.netapp.com/support/index?page=content&amp;amp;id=1014445," target="_blank"&gt;https://kb.netapp.com/support/index?page=content&amp;amp;id=1014445,&lt;/A&gt; which does not mention age of software.&amp;nbsp; It follows a vastly different process.&amp;nbsp; This seems unnecessary at best, but confusing.&lt;BR /&gt;&lt;BR /&gt;Having installed the CA certificate, VSC SEEMS to work, SHA1 and all.&amp;nbsp; However, it's a lurking problem.&lt;BR /&gt;VSC can send mail about issues.&amp;nbsp; Those emails end in a note that says:&lt;BR /&gt;&amp;nbsp; You can view the log entries at https://[fe80:0:0:0:0:5efe:a16:879%net3]:8043/smvi/logViewer?id=backup_All-VMs_20160519212800.&lt;BR /&gt;&lt;BR /&gt;1) I'm not sure why, but it's giving an IPv6 address.&amp;nbsp; Is there a place to change this?&amp;nbsp; I have to manually rewrite it to a hostname based on my own knowledge of the windows box's name.&lt;BR /&gt;2) The SSL cert on port 8043 is NOT the replaced one, it's a self-signed one.&amp;nbsp; Even if VSC is willing to accept talking over insecure connections from plugin to software, web browsers aren't happy with them.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;So, summarizing:&lt;BR /&gt;1) VSC uses SHA1 certs.&amp;nbsp; This is a bug.&lt;BR /&gt;2) VSC has no clear documentation of how to replace SSL certs for port 8143 with CA-signed ones in the 6.x world; the 4.x instructions APPEAR to work, but, this is a guess.&lt;BR /&gt;3) VSC has no documentation of how to replace SSL certs for port 8043 with CA-signed ones in the 6.x world.&lt;BR /&gt;4) SMVI mails have an IPv6 hostname, but no clear way to change it.&lt;BR /&gt;&lt;BR /&gt;Anyone run into this?&lt;/P&gt;</description>
    <pubDate>Wed, 04 Jun 2025 20:51:19 GMT</pubDate>
    <dc:creator>FULLSTEAM</dc:creator>
    <dc:date>2025-06-04T20:51:19Z</dc:date>
    <item>
      <title>VSC 6.0 SSL Cert replacement</title>
      <link>https://community.netapp.com/t5/VMware-Solutions-Discussions/VSC-6-0-SSL-Cert-replacement/m-p/119496#M8634</link>
      <description>&lt;P&gt;Not sure where to file a case on this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There are no clear instructions on how to replace the self-signed SSL certificates in VSC, with CA-signed ones.&amp;nbsp; I'm using VSC for vSphere 6.2P1, with a Linux-based VCSA and ESXi versions 6.0U2.&amp;nbsp; Also, cDOT NAS datastores, running 8.2.4P2.&lt;BR /&gt;&lt;BR /&gt;The VSC manual, &lt;A href="https://library.netapp.com/ecm/ecm_get_file/ECMLP2371569" target="_blank"&gt;https://library.netapp.com/ecm/ecm_get_file/ECMLP2371569&lt;/A&gt; , page 49, says that the certificate must be signed with SHA1.&lt;BR /&gt;With SHA1 being deprecated, this is a bug that VSC should be addressing SOON.&lt;BR /&gt;&lt;BR /&gt;If you use &lt;A href="https://kb.netapp.com/support/index?page=content&amp;amp;id=1013807," target="_blank"&gt;https://kb.netapp.com/support/index?page=content&amp;amp;id=1013807,&lt;/A&gt; from the 4.x era, it describes a process which somewhat works.&amp;nbsp; At least, I am able to follow it and add certs and get VSC to boot again.&amp;nbsp; However, it doesn't mention the SHA1 limitation, because of its age.&lt;BR /&gt;&lt;BR /&gt;There's also &lt;A href="https://kb.netapp.com/support/index?page=content&amp;amp;id=1014445," target="_blank"&gt;https://kb.netapp.com/support/index?page=content&amp;amp;id=1014445,&lt;/A&gt; which does not mention age of software.&amp;nbsp; It follows a vastly different process.&amp;nbsp; This seems unnecessary at best, but confusing.&lt;BR /&gt;&lt;BR /&gt;Having installed the CA certificate, VSC SEEMS to work, SHA1 and all.&amp;nbsp; However, it's a lurking problem.&lt;BR /&gt;VSC can send mail about issues.&amp;nbsp; Those emails end in a note that says:&lt;BR /&gt;&amp;nbsp; You can view the log entries at https://[fe80:0:0:0:0:5efe:a16:879%net3]:8043/smvi/logViewer?id=backup_All-VMs_20160519212800.&lt;BR /&gt;&lt;BR /&gt;1) I'm not sure why, but it's giving an IPv6 address.&amp;nbsp; Is there a place to change this?&amp;nbsp; I have to manually rewrite it to a hostname based on my own knowledge of the windows box's name.&lt;BR /&gt;2) The SSL cert on port 8043 is NOT the replaced one, it's a self-signed one.&amp;nbsp; Even if VSC is willing to accept talking over insecure connections from plugin to software, web browsers aren't happy with them.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;So, summarizing:&lt;BR /&gt;1) VSC uses SHA1 certs.&amp;nbsp; This is a bug.&lt;BR /&gt;2) VSC has no clear documentation of how to replace SSL certs for port 8143 with CA-signed ones in the 6.x world; the 4.x instructions APPEAR to work, but, this is a guess.&lt;BR /&gt;3) VSC has no documentation of how to replace SSL certs for port 8043 with CA-signed ones in the 6.x world.&lt;BR /&gt;4) SMVI mails have an IPv6 hostname, but no clear way to change it.&lt;BR /&gt;&lt;BR /&gt;Anyone run into this?&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jun 2025 20:51:19 GMT</pubDate>
      <guid>https://community.netapp.com/t5/VMware-Solutions-Discussions/VSC-6-0-SSL-Cert-replacement/m-p/119496#M8634</guid>
      <dc:creator>FULLSTEAM</dc:creator>
      <dc:date>2025-06-04T20:51:19Z</dc:date>
    </item>
  </channel>
</rss>

