From antoine.gatineau at infra-monkey.com Thu Mar 28 10:39:00 2024
Content-Type: multipart/mixed; boundary="===============7161636205315646802=="
MIME-Version: 1.0
From: Antoine Gatineau
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] ACME certs fail to renew
Date: Thu, 28 Mar 2024 11:38:37 +0100
Message-ID: <3ef3c740-c208-4413-b121-a74205203f7b@infra-monkey.com>
--===============7161636205315646802==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Hello,
I have a strange issue regarding acme service.
My acme certificates fail to renew. `ipa-acme-manage status`fails with =
error:
Failed to authenticate to CA REST API
The ipa-acme-manage command failed.
certbot client fails with error "Failed to renew certificate =
office.empire.lan with error: "
$ ipa cert-show 49
=C2=A0Issuing CA: ipa
=C2=A0Certificate: "The certificate content"
=C2=A0Subject: CN=3Doffice.empire.lan
=C2=A0Subject DNS name: office.empire.lan
=C2=A0Issuer: CN=3DCertificate Authority,O=3DEMPIRE.LAN
=C2=A0Not Before: Sun Dec 24 14:05:50 2023 UTC
=C2=A0Not After: Sat Mar 23 14:05:50 2024 UTC
=C2=A0Serial number: 49
=C2=A0Serial number (hex): 0x31
=C2=A0Revoked: False
So last successful renewal was on Dec 24th. Since then I have not really =
done anything appart updating.
I don't see any issue in ipaupgrade.log
I am running on centos stream 9
idm-jss.x86_64 5.5.0-1.el9
idm-jss-tomcat.x86_64 5.5.0-1.el9
idm-ldapjdk.noarch 5.5.0-1.el9
idm-pki-acme.noarch 11.5.0-1.el9
idm-pki-base.noarch 11.5.0-1.el9
idm-pki-ca.noarch 11.5.0-1.el9
idm-pki-java.noarch 11.5.0-1.el9
idm-pki-kra.noarch 11.5.0-1.el9
idm-pki-server.noarch 11.5.0-1.el9
idm-pki-tools.x86_64 11.5.0-1.el9
ipa-client.x86_64 4.11.0-9.el9
ipa-client-common.noarch 4.11.0-9.el9
ipa-common.noarch 4.11.0-9.el9
ipa-healthcheck.noarch 0.16-2.el9
ipa-healthcheck-core.noarch 0.16-2.el9
ipa-selinux.noarch 4.11.0-9.el9
ipa-server.x86_64 4.11.0-9.el9
ipa-server-common.noarch 4.11.0-9.el9
ipa-server-dns.noarch 4.11.0-9.el9
I have followed closely the update on centos stream 9
Running=C2=A0 `ipa-acme-manage status` with the -d switch gives me
ipapython.ipaldap: DEBUG: retrieving schema for SchemaCache =
url=3Dldapi://%2fvar%2frun%2fslapd-EMPIRE-LAN.socket =
conn=3D
ipaserver.masters: DEBUG: Discovery: available servers for service 'CA' =
are ipa-server-01.empire.lan, ipa-server-02.empire.lan
ipaserver.masters: DEBUG: Discovery: using ipa-server-01.empire.lan for =
'CA' service
ipapython.dogtag: DEBUG: request POST =
https://ipa-server-01.empire.lan:8443/acme/login
ipapython.dogtag: DEBUG: request body ''
ipapython.dogtag: DEBUG: response status 404
ipapython.dogtag: DEBUG: response headers Content-Type: =
text/html;charset=3Dutf-8
Content-Language: en
Content-Length: 765
Date: Thu, 28 Mar 2024 10:00:59 GMT
ipapython.dogtag: DEBUG: response body (decoded): b'HTTP Status 404 \xe2\x80\x93 Not =
Found=
HTTP =
Status 404 \xe2\x80\x93 Not Found
Type =
Status Report
Message The requested resource =
[/acme/login] is not available
Description The =
origin server did not find a current representation for the target =
resource or is not willing to disclose that one exists.
Apache Tomcat/9.0.62
'
ipapython.admintool: DEBUG:=C2=A0=C2=A0 File =
"/usr/lib/python3.9/site-packages/ipapython/admintool.py", line 180, in =
execute
=C2=A0=C2=A0=C2=A0 return_value =3D self.run()
=C2=A0 File =
"/usr/lib/python3.9/site-packages/ipaserver/install/ipa_acme_manage.py", =
line 403, in run
=C2=A0=C2=A0=C2=A0 with state as ca_api:
=C2=A0 File =
"/usr/lib/python3.9/site-packages/ipaserver/install/ipa_acme_manage.py", =
line 103, in __enter__
=C2=A0=C2=A0=C2=A0 raise errors.RemoteRetrieveError(
ipapython.admintool: DEBUG: The ipa-acme-manage command failed, =
exception: RemoteRetrieveError: Failed to authenticate to CA REST API
ipapython.admintool: ERROR: Failed to authenticate to CA REST API
ipapython.admintool: ERROR: The ipa-acme-manage command failed.
So it looks like the acme subsystem is not started. But logs for the =
acme subsystem in /var/log/pki/pki-tomcat/acme/debug.2024-03-28.log =
don't show any issue. (see attached log)
How can I go further in troubleshooting/fixing this issue?
Thanks
--===============7161636205315646802==
Content-Type: text/html
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="attachment.html"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==
--===============7161636205315646802==
Content-Type: text/plain
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="pki-acme-debug-log.txt"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--===============7161636205315646802==
Content-Type: text/plain
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="ipa-healthcheck.txt"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--===============7161636205315646802==--
From hakofo8273 at azduan.com Thu Mar 28 10:48:09 2024
Content-Type: multipart/mixed; boundary="===============8861200062527534773=="
MIME-Version: 1.0
From: D S
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] One freeipa replica install fails,
while other is going through
Date: Thu, 28 Mar 2024 10:47:57 +0000
Message-ID: <20240328104757.1603.48278@mailman01.iad2.fedoraproject.org>
--===============8861200062527534773==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Hello, =
I am trying to install 3 replicas agains the same master. Two out of 3 inst=
alls succeed, while the other one fails with =
On replica:
Connection from replica to master is OK.
Start listening on required ports for remote master check
Get credentials to log in to remote master
Check RPC connection to remote master
Execute check on remote master
ERROR: Remote master check failed with following error message(s):
an internal error has occurred
2024-03-28T09:09:28Z DEBUG Starting external process
2024-03-28T09:09:28Z DEBUG args=3D['/usr/sbin/ipa-client-install', '--unatt=
ended', '--uninstall']
2024-03-28T09:09:31Z DEBUG Process finished, return code=3D0
2024-03-28T09:09:31Z DEBUG File "/usr/lib/python3.6/site-packages/ipapyth=
on/admintool.py", line 180, in execute
return_value =3D self.run()
File "/usr/lib/python3.6/site-packages/ipapython/install/cli.py", line 34=
4, in run
return cfgr.run()
File "/usr/lib/python3.6/site-packages/ipapython/install/core.py", line 3=
58, in run
self.validate()
File "/usr/lib/python3.6/site-packages/ipapython/install/core.py", line 3=
68, in validate
for _nothing in self._validator():
File "/usr/lib/python3.6/site-packages/ipapython/install/core.py", line 4=
31, in __runner
exc_handler(exc_info)
File "/usr/lib/python3.6/site-packages/ipapython/install/core.py", line 4=
55, in _handle_validate_exception
self._handle_exception(exc_info)
File "/usr/lib/python3.6/site-packages/ipapython/install/core.py", line 4=
50, in _handle_exception
six.reraise(*exc_info)
File "/usr/lib/python3.6/site-packages/six.py", line 693, in reraise
raise value
File "/usr/lib/python3.6/site-packages/ipapython/install/core.py", line 4=
21, in __runner
step()
File "/usr/lib/python3.6/site-packages/ipapython/install/core.py", line 4=
18, in
step =3D lambda: next(self.__gen)
File "/usr/lib/python3.6/site-packages/ipapython/install/util.py", line 8=
1, in run_generator_with_yield_from
six.reraise(*exc_info)
File "/usr/lib/python3.6/site-packages/six.py", line 693, in reraise
raise value
File "/usr/lib/python3.6/site-packages/ipapython/install/util.py", line 5=
9, in run_generator_with_yield_from
value =3D gen.send(prev_value)
File "/usr/lib/python3.6/site-packages/ipapython/install/core.py", line 6=
33, in _configure
next(validator)
File "/usr/lib/python3.6/site-packages/ipapython/install/core.py", line 4=
31, in __runner
exc_handler(exc_info)
File "/usr/lib/python3.6/site-packages/ipapython/install/core.py", line 4=
55, in _handle_validate_exception
self._handle_exception(exc_info)
File "/usr/lib/python3.6/site-packages/ipapython/install/core.py", line 5=
18, in _handle_exception
self.__parent._handle_exception(exc_info)
File "/usr/lib/python3.6/site-packages/ipapython/install/core.py", line 4=
50, in _handle_exception
six.reraise(*exc_info)
File "/usr/lib/python3.6/site-packages/six.py", line 693, in reraise
raise value
File "/usr/lib/python3.6/site-packages/ipapython/install/core.py", line 5=
15, in _handle_exception
super(ComponentBase, self)._handle_exception(exc_info)
File "/usr/lib/python3.6/site-packages/ipapython/install/core.py", line 4=
50, in _handle_exception
six.reraise(*exc_info)
File "/usr/lib/python3.6/site-packages/six.py", line 693, in reraise
raise value
File "/usr/lib/python3.6/site-packages/ipapython/install/core.py", line 4=
21, in __runner
step()
File "/usr/lib/python3.6/site-packages/ipapython/install/core.py", line 4=
18, in
step =3D lambda: next(self.__gen)
File "/usr/lib/python3.6/site-packages/ipapython/install/util.py", line 8=
1, in run_generator_with_yield_from
six.reraise(*exc_info)
File "/usr/lib/python3.6/site-packages/six.py", line 693, in reraise
raise value
File "/usr/lib/python3.6/site-packages/ipapython/install/util.py", line 5=
9, in run_generator_with_yield_from
value =3D gen.send(prev_value)
File "/usr/lib/python3.6/site-packages/ipapython/install/common.py", line=
65, in _install
for unused in self._installer(self.parent):
File "/usr/lib/python3.6/site-packages/ipaserver/install/server/__init__.=
py", line 597, in main
replica_promote_check(self)
File "/usr/lib/python3.6/site-packages/ipaserver/install/server/replicain=
stall.py", line 401, in decorated
func(installer)
File "/usr/lib/python3.6/site-packages/ipaserver/install/server/replicain=
stall.py", line 423, in decorated
func(installer)
File "/usr/lib/python3.6/site-packages/ipaserver/install/server/replicain=
stall.py", line 1196, in promote_check
ca_cert_file=3Dcafile)
File "/usr/lib/python3.6/site-packages/ipaserver/install/replication.py",=
line 129, in replica_conn_check
"Connection check failed!"
2024-03-28T09:09:31Z DEBUG The ipa-replica-install command failed, exceptio=
n: ScriptError: Connection check failed!
See /var/log/ipareplica-conncheck.log for more information.
If the check results are not valid it can be skipped with --skip-conncheck =
parameter.
2024-03-28T09:09:31Z ERROR Connection check failed!
See /var/log/ipareplica-conncheck.log for more information.
If the check results are not valid it can be skipped with --skip-conncheck =
parameter.
2024-03-28T09:09:31Z ERROR The ipa-replica-install command failed. See /var=
/log/ipareplica-install.log for more information
On master:
[Thu Mar 28 09:09:27.891561 2024] [:error] [pid 22098] ipa: ERROR: non-publ=
ic: DBusException: org.freedesktop.DBus.Error.NoReply: Did not receive a re=
ply. Possible causes include: the remote application did not send a reply, =
the message bus security policy blocked the reply, the reply timeout expire=
d, or the network connection was broken.
[Thu Mar 28 09:09:27.891666 2024] [:error] [pid 22098] Traceback (most rece=
nt call last):
[Thu Mar 28 09:09:27.891683 2024] [:error] [pid 22098] File "/usr/lib/pyt=
hon2.7/site-packages/ipaserver/rpcserver.py", line 369, in wsgi_execute
[Thu Mar 28 09:09:27.891694 2024] [:error] [pid 22098] result =3D comma=
nd(*args, **options)
[Thu Mar 28 09:09:27.891705 2024] [:error] [pid 22098] File "/usr/lib/pyt=
hon2.7/site-packages/ipalib/frontend.py", line 450, in __call__
[Thu Mar 28 09:09:27.891717 2024] [:error] [pid 22098] return self.__do=
_call(*args, **options)
[Thu Mar 28 09:09:27.891727 2024] [:error] [pid 22098] File "/usr/lib/pyt=
hon2.7/site-packages/ipalib/frontend.py", line 478, in __do_call
[Thu Mar 28 09:09:27.891737 2024] [:error] [pid 22098] ret =3D self.run=
(*args, **options)
[Thu Mar 28 09:09:27.891748 2024] [:error] [pid 22098] File "/usr/lib/pyt=
hon2.7/site-packages/ipalib/frontend.py", line 800, in run
[Thu Mar 28 09:09:27.891928 2024] [:error] [pid 22098] return self.exec=
ute(*args, **options)
[Thu Mar 28 09:09:27.891951 2024] [:error] [pid 22098] File "/usr/lib/pyt=
hon2.7/site-packages/ipaserver/plugins/server.py", line 933, in execute
[Thu Mar 28 09:09:27.891962 2024] [:error] [pid 22098] ret, stdout, _st=
derr =3D server.conncheck(keys[-1])
[Thu Mar 28 09:09:27.891973 2024] [:error] [pid 22098] File "/usr/lib64/p=
ython2.7/site-packages/dbus/proxies.py", line 70, in __call__
[Thu Mar 28 09:09:27.891983 2024] [:error] [pid 22098] return self._pro=
xy_method(*args, **keywords)
[Thu Mar 28 09:09:27.891994 2024] [:error] [pid 22098] File "/usr/lib64/p=
ython2.7/site-packages/dbus/proxies.py", line 145, in __call__
[Thu Mar 28 09:09:27.892005 2024] [:error] [pid 22098] **keywords)
[Thu Mar 28 09:09:27.892016 2024] [:error] [pid 22098] File "/usr/lib64/p=
ython2.7/site-packages/dbus/connection.py", line 651, in call_blocking
[Thu Mar 28 09:09:27.892026 2024] [:error] [pid 22098] message, timeout)
[Thu Mar 28 09:09:27.892037 2024] [:error] [pid 22098] DBusException: org.f=
reedesktop.DBus.Error.NoReply: Did not receive a reply. Possible causes inc=
lude: the remote application did not send a reply, the message bus security=
policy blocked the reply, the reply timeout expired, or the network connec=
tion was broken.
[Thu Mar 28 09:09:27.892955 2024] [:error] [pid 22098] ipa: INFO: [jsonserv=
er_kerb] local_admin(a)EXAMPLE.COM: server_conncheck(u'ipamaster01.example.=
com', u'ipa-replica03.example.com', version=3Du'2.162'): InternalError
[Thu Mar 28 09:09:30.121019 2024] [:error] [pid 20997] ipa: INFO: [jsonserv=
er_kerb] host/ipa-replica03.example.com(a)EXAMPLE.COM: host_disable(u'ipa-r=
eplica03.example.com'): SUCCESS
--===============8861200062527534773==--
From riccardospurinisi at halley.it Thu Mar 28 12:25:26 2024
Content-Type: multipart/mixed; boundary="===============0063427315098321438=="
MIME-Version: 1.0
From: Richard Halley
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] problem with configuration replication in ipa server
Date: Thu, 28 Mar 2024 12:25:13 +0000
Message-ID: <20240328122513.14567.62901@mailman01.iad2.fedoraproject.org>
--===============0063427315098321438==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Hi everyone, I'm configuring the freeipa replication as follows:
1) ipa-client-install --domain=3Dpippo.internal --realm=3DPIPPO.INTERNAL -N
2) I add the client to the ipaserver host group
3) ipa-replica-install -N --setup-dns --forwarder 8.8.8.8 --forwarder 8.8.4=
.4 --forwarder 1.1.1.1 --setup-ca
After running ipa-replica-install I get the following error:
Your system may be partly configured.
Run /usr/sbin/ipa-server-install --uninstall to clean up.
ipapython.admintool: ERROR A replication agreement for this host already ex=
ists. It needs to be removed.
Run this command:
%% ipa-replica-manage del pluto.pippo.internal --force
ipapython.admintool: ERROR The ipa-replica-install command failed. See /var=
/log/ipareplica-install.log for more information
I would like to point out that I have attempted the configuration several t=
imes without success.
Before proceeding with the uninstall commands of the client and the replica=
on the replica server, I delete the replica on the server (which fails bec=
ause it does not find any replica) and then proceed with deleting the clien=
t.
In the replication log file I have the following error:
2024-03-28T12:05:10Z DEBUG The ipa-replica-install command failed, exceptio=
n: ScriptError: A replication agreement for this host already exists. It ne=
eds to be removed.
Run this command:
%% ipa-replica-manage del pluto.pippo.internal --force
2024-03-28T12:05:10Z ERROR A replication agreement for this host already ex=
ists. It needs to be removed.
Run this command:
%% ipa-replica-manage del pluto.pippo.internal --force
2024-03-28T12:05:10Z ERROR The ipa-replica-install command failed. See /var=
/log/ipareplica-install.log for more information
I can't understand where the problem is.
Could it be something dirty in LDAP?
Thank you very much
--===============0063427315098321438==--
From twest at cherryroad.com Thu Mar 28 15:01:08 2024
Content-Type: multipart/mixed; boundary="===============3778949546678663090=="
MIME-Version: 1.0
From: Travis West
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: CA Subsystem certificate
Date: Thu, 28 Mar 2024 15:00:45 +0000
Message-ID: <20240328150045.5965.72904@mailman01.iad2.fedoraproject.org>
In-Reply-To: da9a1790-7d28-5084-1366-4147f58f100d@redhat.com
--===============3778949546678663090==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
I've just found an old p12 file from 2019. I was able to extract the key f=
rom that and it does match the CA Subystem cert that expired 8 March that i=
s listed in LDAP.
So if I could somehow generate a new certificate with this and import into =
the NSS DB for /etc/pki/pki-tomcat/alias would that at least get the CA sta=
rted?
--===============3778949546678663090==--
From hakofo8273 at azduan.com Fri Mar 29 08:58:46 2024
Content-Type: multipart/mixed; boundary="===============1591921863345952834=="
MIME-Version: 1.0
From: D S
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: One freeipa replica install fails,
while other is going through
Date: Fri, 29 Mar 2024 08:58:35 +0000
Message-ID: <20240329085835.7865.627@mailman01.iad2.fedoraproject.org>
In-Reply-To: 20240328104757.1603.48278@mailman01.iad2.fedoraproject.org
--===============1591921863345952834==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Any ideas on where to look next?=20
--===============1591921863345952834==--
From raubvogel at gmail.com Fri Mar 29 11:46:23 2024
Content-Type: multipart/mixed; boundary="===============8843129287012207186=="
MIME-Version: 1.0
From: Mauricio Tavares
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: One freeipa replica install fails,
while other is going through
Date: Fri, 29 Mar 2024 07:45:07 -0400
Message-ID:
In-Reply-To: 20240329085835.7865.627@mailman01.iad2.fedoraproject.org
--===============8843129287012207186==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
On Fri, Mar 29, 2024 at 4:58=E2=80=AFAM D S via FreeIPA-users
wrote:
>
> Any ideas on where to look next?
> --
Replica-to-be log says connection check failed. Master seems to
say its replies are being ignored. Could the replica-to-be's firewall
be blocking things?
--===============8843129287012207186==--
From slekkus75 at proton.me Fri Mar 29 12:14:04 2024
Content-Type: multipart/mixed; boundary="===============1222141422725427484=="
MIME-Version: 1.0
From: slek kus
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Client install fails with: "Joining realm failed:
JSON-RPC call failed: Timeout was reached"
Date: Fri, 29 Mar 2024 12:13:31 +0000
Message-ID: <20240329121331.1761.22415@mailman01.iad2.fedoraproject.org>
--===============1222141422725427484==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Hi, not sure what might be an issue. Clients in the same network join just =
fine. =
The failing client is on another network. The following ports have been all=
owed: 53, 389, 636, 88, 464
Saw a list somewhere, mentioning 123, 80 and 443. Are these porst nessecary=
for the client/idm communication?
--===============1222141422725427484==--
From antoine.gatineau at infra-monkey.com Sun Mar 31 11:15:12 2024
Content-Type: multipart/mixed; boundary="===============8648383229911465437=="
MIME-Version: 1.0
From: Antoine Gatineau
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: Client install fails with: "Joining realm failed:
JSON-RPC call failed: Timeout was reached"
Date: Sun, 31 Mar 2024 13:14:56 +0200
Message-ID: <0774df2b-9301-4417-8c60-57de97cb4d62@infra-monkey.com>
In-Reply-To: 20240329121331.1761.22415@mailman01.iad2.fedoraproject.org
--===============8648383229911465437==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
iirc port 80 and 443 are needed. 123 is for ntp so if you don't sync =
time from the ipa servers you woudl not need that port.
https://access.redhat.com/solutions/357673
On 3/29/24 13:13, slek kus via FreeIPA-users wrote:
> Hi, not sure what might be an issue. Clients in the same network join jus=
t fine.
> The failing client is on another network. The following ports have been a=
llowed: 53, 389, 636, 88, 464
> Saw a list somewhere, mentioning 123, 80 and 443. Are these porst nesseca=
ry for the client/idm communication?
> --
> _______________________________________________
> FreeIPA-users mailing list --freeipa-users(a)lists.fedorahosted.org
> To unsubscribe send an email tofreeipa-users-leave(a)lists.fedorahosted.o=
rg
> Fedora Code of Conduct:https://docs.fedoraproject.org/en-US/project/code-=
of-conduct/
> List Guidelines:https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives:https://lists.fedorahosted.org/archives/list/freeipa-users(=
a)lists.fedorahosted.org
> Do not reply to spam, report it:https://pagure.io/fedora-infrastructure/n=
ew_issue
--===============8648383229911465437==
Content-Type: text/html
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="attachment.html"
PCFET0NUWVBFIGh0bWw+CjxodG1sPgogIDxoZWFkPgogICAgPG1ldGEgaHR0cC1lcXVpdj0iQ29u
dGVudC1UeXBlIiBjb250ZW50PSJ0ZXh0L2h0bWw7IGNoYXJzZXQ9VVRGLTgiPgogIDwvaGVhZD4K
ICA8Ym9keT4KICAgIDxwPmlpcmMgcG9ydCA4MCBhbmQgNDQzIGFyZSBuZWVkZWQuIDEyMyBpcyBm
b3IgbnRwIHNvIGlmIHlvdSBkb24ndAogICAgICBzeW5jIHRpbWUgZnJvbSB0aGUgaXBhIHNlcnZl
cnMgeW91IHdvdWRsIG5vdCBuZWVkIHRoYXQgcG9ydC48L3A+CiAgICA8cD48YSBjbGFzcz0ibW96
LXR4dC1saW5rLWZyZWV0ZXh0IiBocmVmPSJodHRwczovL2FjY2Vzcy5yZWRoYXQuY29tL3NvbHV0
aW9ucy8zNTc2NzMiPmh0dHBzOi8vYWNjZXNzLnJlZGhhdC5jb20vc29sdXRpb25zLzM1NzY3Mzwv
YT4gPGJyPgogICAgICA8YnI+CiAgICA8L3A+CiAgICA8ZGl2IGNsYXNzPSJtb3otY2l0ZS1wcmVm
aXgiPk9uIDMvMjkvMjQgMTM6MTMsIHNsZWsga3VzIHZpYQogICAgICBGcmVlSVBBLXVzZXJzIHdy
b3RlOjxicj4KICAgIDwvZGl2PgogICAgPGJsb2NrcXVvdGUgdHlwZT0iY2l0ZSIKY2l0ZT0ibWlk
OjIwMjQwMzI5MTIxMzMxLjE3NjEuMjI0MTVAbWFpbG1hbjAxLmlhZDIuZmVkb3JhcHJvamVjdC5v
cmciPgogICAgICA8cHJlIGNsYXNzPSJtb3otcXVvdGUtcHJlIiB3cmFwPSIiPkhpLCBub3Qgc3Vy
ZSB3aGF0IG1pZ2h0IGJlIGFuIGlzc3VlLiBDbGllbnRzIGluIHRoZSBzYW1lIG5ldHdvcmsgam9p
biBqdXN0IGZpbmUuIApUaGUgZmFpbGluZyBjbGllbnQgaXMgb24gYW5vdGhlciBuZXR3b3JrLiBU
aGUgZm9sbG93aW5nIHBvcnRzIGhhdmUgYmVlbiBhbGxvd2VkOiA1MywgMzg5LCA2MzYsIDg4LCA0
NjQKU2F3IGEgbGlzdCBzb21ld2hlcmUsIG1lbnRpb25pbmcgMTIzLCA4MCBhbmQgNDQzLiBBcmUg
dGhlc2UgcG9yc3QgbmVzc2VjYXJ5IGZvciB0aGUgY2xpZW50L2lkbSBjb21tdW5pY2F0aW9uPwot
LQpfX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fXwpGcmVlSVBB
LXVzZXJzIG1haWxpbmcgbGlzdCAtLSA8YSBjbGFzcz0ibW96LXR4dC1saW5rLWFiYnJldmlhdGVk
IiBocmVmPSJtYWlsdG86ZnJlZWlwYS11c2Vyc0BsaXN0cy5mZWRvcmFob3N0ZWQub3JnIj5mcmVl
aXBhLXVzZXJzQGxpc3RzLmZlZG9yYWhvc3RlZC5vcmc8L2E+ClRvIHVuc3Vic2NyaWJlIHNlbmQg
YW4gZW1haWwgdG8gPGEgY2xhc3M9Im1vei10eHQtbGluay1hYmJyZXZpYXRlZCIgaHJlZj0ibWFp
bHRvOmZyZWVpcGEtdXNlcnMtbGVhdmVAbGlzdHMuZmVkb3JhaG9zdGVkLm9yZyI+ZnJlZWlwYS11
c2Vycy1sZWF2ZUBsaXN0cy5mZWRvcmFob3N0ZWQub3JnPC9hPgpGZWRvcmEgQ29kZSBvZiBDb25k
dWN0OiA8YSBjbGFzcz0ibW96LXR4dC1saW5rLWZyZWV0ZXh0IiBocmVmPSJodHRwczovL2RvY3Mu
ZmVkb3JhcHJvamVjdC5vcmcvZW4tVVMvcHJvamVjdC9jb2RlLW9mLWNvbmR1Y3QvIj5odHRwczov
L2RvY3MuZmVkb3JhcHJvamVjdC5vcmcvZW4tVVMvcHJvamVjdC9jb2RlLW9mLWNvbmR1Y3QvPC9h
PgpMaXN0IEd1aWRlbGluZXM6IDxhIGNsYXNzPSJtb3otdHh0LWxpbmstZnJlZXRleHQiIGhyZWY9
Imh0dHBzOi8vZmVkb3JhcHJvamVjdC5vcmcvd2lraS9NYWlsaW5nX2xpc3RfZ3VpZGVsaW5lcyI+
aHR0cHM6Ly9mZWRvcmFwcm9qZWN0Lm9yZy93aWtpL01haWxpbmdfbGlzdF9ndWlkZWxpbmVzPC9h
PgpMaXN0IEFyY2hpdmVzOiA8YSBjbGFzcz0ibW96LXR4dC1saW5rLWZyZWV0ZXh0IiBocmVmPSJo
dHRwczovL2xpc3RzLmZlZG9yYWhvc3RlZC5vcmcvYXJjaGl2ZXMvbGlzdC9mcmVlaXBhLXVzZXJz
QGxpc3RzLmZlZG9yYWhvc3RlZC5vcmciPmh0dHBzOi8vbGlzdHMuZmVkb3JhaG9zdGVkLm9yZy9h
cmNoaXZlcy9saXN0L2ZyZWVpcGEtdXNlcnNAbGlzdHMuZmVkb3JhaG9zdGVkLm9yZzwvYT4KRG8g
bm90IHJlcGx5IHRvIHNwYW0sIHJlcG9ydCBpdDogPGEgY2xhc3M9Im1vei10eHQtbGluay1mcmVl
dGV4dCIgaHJlZj0iaHR0cHM6Ly9wYWd1cmUuaW8vZmVkb3JhLWluZnJhc3RydWN0dXJlL25ld19p
c3N1ZSI+aHR0cHM6Ly9wYWd1cmUuaW8vZmVkb3JhLWluZnJhc3RydWN0dXJlL25ld19pc3N1ZTwv
YT4KPC9wcmU+CiAgICA8L2Jsb2NrcXVvdGU+CiAgPC9ib2R5Pgo8L2h0bWw+Cg==
--===============8648383229911465437==--
From abokovoy at redhat.com Sun Mar 31 14:45:15 2024
Content-Type: multipart/mixed; boundary="===============7112583523669218601=="
MIME-Version: 1.0
From: Alexander Bokovoy
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: Client install fails with: "Joining realm failed:
JSON-RPC call failed: Timeout was reached"
Date: Sun, 31 Mar 2024 17:48:31 +0300
Message-ID:
In-Reply-To: 0774df2b-9301-4417-8c60-57de97cb4d62@infra-monkey.com
--===============7112583523669218601==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
On Sun, 31 Mar 2024, Antoine Gatineau via FreeIPA-users wrote:
>iirc port 80 and 443 are needed. 123 is for ntp so if you don't sync =
>time from the ipa servers you woudl not need that port.
>
>https://access.redhat.com/solutions/357673
Everything is covered in the documentation:
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/ht=
ml/installing_identity_management/preparing-the-system-for-ipa-server-insta=
llation_installing-identity-management#port-requirements-for-idm_preparing-=
the-system-for-ipa-server-installation
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/ht=
ml/installing_identity_management/preparing-the-system-for-ipa-client-insta=
llation_installing-identity-management#port-requirements-for-ipa-clients_pr=
eparing-the-system-for-ipa-client-installation
It is best to follow the documentation -- take
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9
and check the box 'Identity management' on the left side to limit amount
of books to the topics relevant to identity management. Unfortunately,
currently this documentation site does not allow pre-select the topics.
Another place to look is this old draft I never managed to turn into a
blog or documentation article myself:
https://vda.li/drafts/firewall-considerations.txt
It is still valid.
>
>On 3/29/24 13:13, slek kus via FreeIPA-users wrote:
>>Hi, not sure what might be an issue. Clients in the same network join jus=
t fine.
>>The failing client is on another network. The following ports have been a=
llowed: 53, 389, 636, 88, 464
>>Saw a list somewhere, mentioning 123, 80 and 443. Are these porst nesseca=
ry for the client/idm communication?
>>--
>>_______________________________________________
>>FreeIPA-users mailing list --freeipa-users(a)lists.fedorahosted.org
>>To unsubscribe send an email tofreeipa-users-leave(a)lists.fedorahosted.o=
rg
>>Fedora Code of Conduct:https://docs.fedoraproject.org/en-US/project/code-=
of-conduct/
>>List Guidelines:https://fedoraproject.org/wiki/Mailing_list_guidelines
>>List Archives:https://lists.fedorahosted.org/archives/list/freeipa-users(=
a)lists.fedorahosted.org
>>Do not reply to spam, report it:https://pagure.io/fedora-infrastructure/n=
ew_issue
-- =
/ Alexander Bokovoy
Sr. Principal Software Engineer
Security / Identity Management Engineering
Red Hat Limited, Finland
--===============7112583523669218601==--
From manideep.sai at onmobile.com Mon Apr 1 10:27:52 2024
Content-Type: multipart/mixed; boundary="===============3792701881326314654=="
MIME-Version: 1.0
From: Polavarapu Manideep Sai
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] IPA replica installation failed-SEVERE: Unable to
start CA engine: Selftest failed: Invalid certificate Server-Cert
cert-pki-ca: NotBefore: Mon Apr 01 03:41:49 CST 2024
Date: Mon, 01 Apr 2024 10:27:30 +0000
Message-ID:
--===============3792701881326314654==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Hi Team,
Any one faced this issue during replica installation
I have third party SSL certificate installed on master server
IPA Version:
[root(a)dir02-mex ~]# ipa --version
VERSION: 4.10.2, API_VERSION: 2.252
Certificate Expiry:
[root(a)dir02-mex ~]# certutil -L -d /etc/pki/pki-tomcat/alias/ -n 'Server-=
Cert cert-pki-ca' | egrep -i 'befor|after'
Not Before: Mon Apr 01 09:41:49 2024
Not After : Sun Mar 22 09:41:49 2026
[1/4]: Generating ipa-custodia config file
[2/4]: Generating ipa-custodia keys
[3/4]: starting ipa-custodia
[4/4]: configuring ipa-custodia to start on boot
Done configuring ipa-custodia.
Configuring certificate server (pki-tomcatd). Estimated time: 3 minutes
[1/30]: creating certificate server db
[2/30]: setting up initial replication
Starting replication, please wait until this has completed.
Update in progress, 12 seconds elapsed
Update succeeded
[3/30]: creating ACIs for admin
[4/30]: creating installation admin user
[5/30]: configuring certificate server instance
Failed to configure CA instance
See the installation logs and the following files/directories for more info=
rmation:
/var/log/pki/pki-tomcat
[error] RuntimeError: CA configuration failed.
Your system may be partly configured.
Run /usr/sbin/ipa-server-install --uninstall to clean up.
CA configuration failed.
The ipa-replica-install command failed. See /var/log/ipareplica-install.log=
for more information
Cat /var/log/ipareplica-install.log:
DEBUG: https://dir02-mexommx.ipa.com:8443 "GET / HTTP/1.1" 302 0
DEBUG: https://dir02-mexommx.ipa.com:8443 "GET /pki HTTP/1.1" 302 None
DEBUG: https://dir02-mexommx.ipa.com:8443 "GET /pki/ HTTP/1.1" 200 3500
INFO: PKI server started
INFO: Waiting for CA subsystem
DEBUG: Starting new HTTPS connection (1): dir02-mexommx.ipa.com:8443
DEBUG: https://dir02-mexommx.ipa.com:8443 "GET /ca/admin/ca/getStatus HTTP/=
1.1" 404 784
2024-04-01T09:41:34Z CRITICAL Failed to configure CA instance
2024-04-01T09:41:34Z CRITICAL See the installation logs and the following f=
iles/directories for more information:
2024-04-01T09:41:34Z CRITICAL /var/log/pki/pki-tomcat
2024-04-01T09:41:34Z DEBUG Traceback (most recent call last):
File "/usr/lib/python3.9/site-packages/ipaserver/install/service.py", lin=
e 686, in start_creation
run_step(full_msg, method)
File "/usr/lib/python3.9/site-packages/ipaserver/install/service.py", lin=
e 672, in run_step
method()
File "/usr/lib/python3.9/site-packages/ipaserver/install/cainstance.py", =
line 651, in __spawn_instance
DogtagInstance.spawn_instance(
File "/usr/lib/python3.9/site-packages/ipaserver/install/dogtaginstance.p=
y", line 227, in spawn_instance
self.handle_setup_error(e)
File "/usr/lib/python3.9/site-packages/ipaserver/install/dogtaginstance.p=
y", line 604, in handle_setup_error
raise RuntimeError(
RuntimeError: CA configuration failed.
2024-04-01T09:41:34Z DEBUG [error] RuntimeError: CA configuration failed.
2024-04-01T09:41:34Z DEBUG Removing /root/.dogtag/pki-tomcat/ca
2024-04-01T09:41:34Z DEBUG File "/usr/lib/python3.9/site-packages/ipapyth=
on/admintool.py", line 180, in execute
return_value =3D self.run()
File "/usr/lib/python3.9/site-packages/ipapython/install/cli.py", line 34=
4, in run
return cfgr.run()
File "/usr/lib/python3.9/site-packages/ipapython/install/core.py", line 3=
60, in run
return self.execute()
File "/usr/lib/python3.9/site-packages/ipapython/install/core.py", line 3=
86, in execute
for rval in self._executor():
File "/usr/lib/python3.9/site-packages/ipapython/install/core.py", line 4=
35, in __runner
exc_handler(exc_info)
File "/usr/lib/python3.9/site-packages/ipapython/install/core.py", line 4=
68, in _handle_execute_exception
self._handle_exception(exc_info)
File "/usr/lib/python3.9/site-packages/ipapython/install/core.py", line 4=
58, in _handle_exception
six.reraise(*exc_info)
File "/usr/lib/python3.9/site-packages/six.py", line 709, in reraise
raise value
File "/usr/lib/python3.9/site-packages/ipapython/install/core.py", line 4=
25, in __runner
step()
File "/usr/lib/python3.9/site-packages/ipapython/install/core.py", line 4=
19, in step_next
return next(self.__gen)
File "/usr/lib/python3.9/site-packages/ipapython/install/util.py", line 8=
1, in run_generator_with_yield_from
six.reraise(*exc_info)
File "/usr/lib/python3.9/site-packages/six.py", line 709, in reraise
raise value
File "/usr/lib/python3.9/site-packages/ipapython/install/util.py", line 5=
9, in run_generator_with_yield_from
value =3D gen.send(prev_value)
File "/usr/lib/python3.9/site-packages/ipapython/install/core.py", line 6=
63, in _configure
next(executor)
File "/usr/lib/python3.9/site-packages/ipapython/install/core.py", line 4=
35, in __runner
exc_handler(exc_info)
File "/usr/lib/python3.9/site-packages/ipapython/install/core.py", line 4=
68, in _handle_execute_exception
self._handle_exception(exc_info)
File "/usr/lib/python3.9/site-packages/ipapython/install/core.py", line 5=
26, in _handle_exception
self.__parent._handle_exception(exc_info)
File "/usr/lib/python3.9/site-packages/ipapython/install/core.py", line 4=
58, in _handle_exception
six.reraise(*exc_info)
File "/usr/lib/python3.9/site-packages/six.py", line 709, in reraise
raise value
File "/usr/lib/python3.9/site-packages/ipapython/install/core.py", line 5=
23, in _handle_exception
super(ComponentBase, self)._handle_exception(exc_info)
File "/usr/lib/python3.9/site-packages/ipapython/install/core.py", line 4=
58, in _handle_exception
six.reraise(*exc_info)
File "/usr/lib/python3.9/site-packages/six.py", line 709, in reraise
raise value
File "/usr/lib/python3.9/site-packages/ipapython/install/core.py", line 4=
25, in __runner
step()
File "/usr/lib/python3.9/site-packages/ipapython/install/core.py", line 4=
19, in step_next
return next(self.__gen)
File "/usr/lib/python3.9/site-packages/ipapython/install/util.py", line 8=
1, in run_generator_with_yield_from
six.reraise(*exc_info)
File "/usr/lib/python3.9/site-packages/six.py", line 709, in reraise
raise value
File "/usr/lib/python3.9/site-packages/ipapython/install/util.py", line 5=
9, in run_generator_with_yield_from
value =3D gen.send(prev_value)
File "/usr/lib/python3.9/site-packages/ipapython/install/common.py", line=
65, in _install
for unused in self._installer(self.parent):
File "/usr/lib/python3.9/site-packages/ipaserver/install/server/__init__.=
py", line 599, in main
replica_install(self)
File "/usr/lib/python3.9/site-packages/ipaserver/install/server/replicain=
stall.py", line 401, in decorated
func(installer)
File "/usr/lib/python3.9/site-packages/ipaserver/install/server/replicain=
stall.py", line 1345, in install
ca.install(False, config, options, custodia=3Dcustodia)
File "/usr/lib/python3.9/site-packages/ipaserver/install/ca.py", line 354=
, in install
install_step_0(standalone, replica_config, options, custodia=3Dcustodia)
File "/usr/lib/python3.9/site-packages/ipaserver/install/ca.py", line 422=
, in install_step_0
ca.configure_instance(
File "/usr/lib/python3.9/site-packages/ipaserver/install/cainstance.py", =
line 506, in configure_instance
self.start_creation(runtime=3Druntime)
File "/usr/lib/python3.9/site-packages/ipaserver/install/service.py", lin=
e 686, in start_creation
run_step(full_msg, method)
File "/usr/lib/python3.9/site-packages/ipaserver/install/service.py", lin=
e 672, in run_step
method()
File "/usr/lib/python3.9/site-packages/ipaserver/install/cainstance.py", =
line 651, in __spawn_instance
DogtagInstance.spawn_instance(
File "/usr/lib/python3.9/site-packages/ipaserver/install/dogtaginstance.p=
y", line 227, in spawn_instance
self.handle_setup_error(e)
File "/usr/lib/python3.9/site-packages/ipaserver/install/dogtaginstance.p=
y", line 604, in handle_setup_error
raise RuntimeError(
2024-04-01T09:41:34Z DEBUG The ipa-replica-install command failed, exceptio=
n: RuntimeError: CA configuration failed.
2024-04-01T09:41:34Z ERROR CA configuration failed.
2024-04-01T09:41:34Z ERROR The ipa-replica-install command failed. See /var=
/log/ipareplica-install.log for more information
Cat /var/log/pki/pki-tomcat/ca/debug.2024-04-01.log
2024-04-01 03:41:32 [main] INFO: CMSEngine: Disabling CA subsystem
2024-04-01 03:41:32 [main] SEVERE: Unable to start CA engine: Selftest fail=
ed: Invalid certificate Server-Cert cert-pki-ca: NotBefore: Mon Apr 01 03:4=
1:49 CST 2024
Selftest failed: Invalid certificate Server-Cert cert-pki-ca: NotBefore: Mo=
n Apr 01 03:41:49 CST 2024
at com.netscape.cmscore.selftests.SelfTestSubsystem.startup(SelfTes=
tSubsystem.java:1759)
at com.netscape.cmscore.apps.CMSEngine.startupSubsystems(CMSEngine.=
java:1167)
at org.dogtagpki.server.ca.CAEngine.startupSubsystems(CAEngine.java=
:972)
2024-04-01 03:41:32 [main] SEVERE: SelfTestSubsystem: selftest failed: Inva=
lid certificate Server-Cert cert-pki-ca: NotBefore: Mon Apr 01 03:41:49 CST=
2024
java.lang.Exception: Invalid certificate Server-Cert cert-pki-ca: NotBefore=
: Mon Apr 01 03:41:49 CST 2024
at com.netscape.cmscore.cert.CertUtils.verifySystemCertValidityByNi=
ckname(CertUtils.java:844)
at com.netscape.cmscore.apps.CMSEngine.verifySystemCertByTag(CMSEng=
ine.java:1895)
at com.netscape.cmscore.apps.CMSEngine.verifySystemCerts(CMSEngine.=
java:1823)
at com.netscape.cms.selftests.common.SystemCertsVerification.runSel=
fTest(SystemCertsVerification.java:211)
at com.netscape.cmscore.selftests.SelfTestSubsystem.runSelfTestsAtS=
tartup(SelfTestSubsystem.java:818)
at com.netscape.cmscore.selftests.SelfTestSubsystem.startup(SelfTes=
tSubsystem.java:1722)
at com.netscape.cmscore.apps.CMSEngine.startupSubsystems(CMSEngine.=
java:1167)
at org.dogtagpki.server.ca.CAEngine.startupSubsystems(CAEngine.java=
:972)
at com.netscape.cmscore.apps.CMSEngine.start(CMSEngine.java:1223)
at com.netscape.cmscore.apps.PKIWebListener.contextInitialized(PKIW=
ebListener.java:43)
at org.apache.catalina.core.StandardContext.listenerStart(StandardC=
ontext.java:4768)
at org.apache.catalina.core.StandardContext.startInternal(StandardC=
ontext.java:5230)
at org.apache.catalina.util.LifecycleBase.start(LifecycleBase.java:=
183)
at org.apache.catalina.core.ContainerBase.addChildInternal(Containe=
rBase.java:726)
at org.apache.catalina.core.ContainerBase.access$000(ContainerBase.=
java:129)
at org.apache.catalina.core.ContainerBase$PrivilegedAddChild.run(Co=
ntainerBase.java:149)
at org.apache.catalina.core.ContainerBase$PrivilegedAddChild.run(Co=
ntainerBase.java:139)
at java.base/java.security.AccessController.doPrivileged(AccessCont=
roller.java:318)
at org.apache.catalina.core.ContainerBase.addChild(ContainerBase.ja=
va:696)
at org.apache.catalina.core.StandardHost.addChild(StandardHost.java=
:696)
at org.apache.catalina.startup.HostConfig.deployDescriptor(HostConf=
ig.java:690)
at org.apache.catalina.startup.HostConfig$DeployDescriptor.run(Host=
Config.java:1889)
at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Ex=
ecutors.java:539)
at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:26=
4)
at org.apache.tomcat.util.threads.InlineExecutorService.execute(Inl=
ineExecutorService.java:75)
at java.base/java.util.concurrent.AbstractExecutorService.submit(Ab=
stractExecutorService.java:123)
at org.apache.catalina.startup.HostConfig.deployDescriptors(HostCon=
fig.java:583)
at org.apache.catalina.startup.HostConfig.deployApps(HostConfig.jav=
a:473)
at org.apache.catalina.startup.HostConfig.start(HostConfig.java:161=
8)
at org.apache.catalina.startup.HostConfig.lifecycleEvent(HostConfig=
.java:319)
at org.apache.catalina.util.LifecycleBase.fireLifecycleEvent(Lifecy=
cleBase.java:123)
at org.apache.catalina.util.LifecycleBase.setStateInternal(Lifecycl=
eBase.java:423)
at org.apache.catalina.util.LifecycleBase.setState(LifecycleBase.ja=
va:366)
at org.apache.catalina.core.ContainerBase.startInternal(ContainerBa=
se.java:946)
at org.apache.catalina.core.StandardHost.startInternal(StandardHost=
.java:835)
at org.apache.catalina.util.LifecycleBase.start(LifecycleBase.java:=
183)
at org.apache.catalina.core.ContainerBase$StartChild.call(Container=
Base.java:1396)
at org.apache.catalina.core.ContainerBase$StartChild.call(Container=
Base.java:1386)
at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:26=
4)
at org.apache.tomcat.util.threads.InlineExecutorService.execute(Inl=
ineExecutorService.java:75)
at java.base/java.util.concurrent.AbstractExecutorService.submit(Ab=
stractExecutorService.java:145)
at org.apache.catalina.core.ContainerBase.startInternal(ContainerBa=
se.java:919)
at org.apache.catalina.core.StandardEngine.startInternal(StandardEn=
gine.java:263)
at org.apache.catalina.util.LifecycleBase.start(LifecycleBase.java:=
183)
at org.apache.catalina.core.StandardService.startInternal(StandardS=
ervice.java:432)
at org.apache.catalina.util.LifecycleBase.start(LifecycleBase.java:=
183)
at org.apache.catalina.core.StandardServer.startInternal(StandardSe=
rver.java:927)
at org.apache.catalina.util.LifecycleBase.start(LifecycleBase.java:=
183)
at org.apache.catalina.startup.Catalina.start(Catalina.java:772)
at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(=
Native Method)
at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(N=
ativeMethodAccessorImpl.java:77)
at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invo=
ke(DelegatingMethodAccessorImpl.java:43)
at java.base/java.lang.reflect.Method.invoke(Method.java:568)
at org.apache.catalina.startup.Bootstrap.start(Bootstrap.java:345)
at org.apache.catalina.startup.Bootstrap.main(Bootstrap.java:476)
Caused by: java.security.cert.CertificateNotYetValidException: NotBefore: M=
on Apr 01 03:41:49 CST 2024
at org.mozilla.jss.netscape.security.x509.CertificateValidity.valid=
(CertificateValidity.java:302)
at org.mozilla.jss.netscape.security.x509.X509CertImpl.checkValidit=
y(X509CertImpl.java:494)
at org.mozilla.jss.netscape.security.x509.X509CertImpl.checkValidit=
y(X509CertImpl.java:466)
at com.netscape.cmscore.cert.CertUtils.verifySystemCertValidityByNi=
ckname(CertUtils.java:839)
... 54 more
2024-04-01 03:41:32 [main] SEVERE: SelfTestSubsystem: Disabling subsystem d=
ue to selftest failure: Invalid certificate Server-Cert cert-pki-ca: NotBef=
ore: Mon Apr 01 03:41:49 CST 2024
java.lang.Exception: Invalid certificate Server-Cert cert-pki-ca: NotBefore=
: Mon Apr 01 03:41:49 CST 2024
cat /var/log/pki/pki-tomcat/ca/selftests.log:
0.main - [29/Mar/2024:03:28:24 GMT-06:00] [20] [1] CAPresence: CA is prese=
nt
0.main - [29/Mar/2024:03:28:24 GMT-06:00] [20] [1] SystemCertsVerification:=
system certs verification failure: Invalid certificate Server-Cert cert-pk=
i-ca: NotBefore: Fri Mar 29 03:28:37 CST 2024
0.main - [29/Mar/2024:03:28:24 GMT-06:00] [20] [1] SelfTestSubsystem: The C=
RITICAL self test plugin called selftests.container.instance.SystemCertsVer=
ification running at startup FAILED!
0.main - [29/Mar/2024:04:03:13 GMT-06:00] [20] [1] SelfTestSubsystem: Initi=
alizing self test plugins:
0.main - [29/Mar/2024:04:03:13 GMT-06:00] [20] [1] SelfTestSubsystem: load=
ing all self test plugin logger parameters
0.main - [29/Mar/2024:04:03:13 GMT-06:00] [20] [1] SelfTestSubsystem: load=
ing all self test plugin instances
0.main - [29/Mar/2024:04:03:13 GMT-06:00] [20] [1] SelfTestSubsystem: load=
ing all self test plugin instance parameters
0.main - [29/Mar/2024:04:03:13 GMT-06:00] [20] [1] SelfTestSubsystem: load=
ing self test plugins in on-demand order
0.main - [29/Mar/2024:04:03:13 GMT-06:00] [20] [1] SelfTestSubsystem: load=
ing self test plugins in startup order
0.main - [29/Mar/2024:04:03:13 GMT-06:00] [20] [1] SelfTestSubsystem: Self =
test plugins have been successfully loaded!
0.main - [29/Mar/2024:04:03:13 GMT-06:00] [20] [1] SelfTestSubsystem: Runni=
ng self test plugins specified to be executed at startup:
0.main - [29/Mar/2024:04:03:13 GMT-06:00] [20] [1] CAPresence: CA is prese=
nt
0.main - [29/Mar/2024:04:03:13 GMT-06:00] [20] [1] SystemCertsVerification:=
system certs verification failure: Invalid certificate Server-Cert cert-pk=
i-ca: NotBefore: Fri Mar 29 04:03:27 CST 2024
0.main - [29/Mar/2024:04:03:13 GMT-06:00] [20] [1] SelfTestSubsystem: The C=
RITICAL self test plugin called selftests.container.instance.SystemCertsVer=
ification running at startup FAILED!
0.main - [01/Apr/2024:03:41:32 GMT-06:00] [20] [1] SelfTestSubsystem: Initi=
alizing self test plugins:
0.main - [01/Apr/2024:03:41:32 GMT-06:00] [20] [1] SelfTestSubsystem: load=
ing all self test plugin logger parameters
0.main - [01/Apr/2024:03:41:32 GMT-06:00] [20] [1] SelfTestSubsystem: load=
ing all self test plugin instances
0.main - [01/Apr/2024:03:41:32 GMT-06:00] [20] [1] SelfTestSubsystem: load=
ing all self test plugin instance parameters
0.main - [01/Apr/2024:03:41:32 GMT-06:00] [20] [1] SelfTestSubsystem: load=
ing self test plugins in on-demand order
0.main - [01/Apr/2024:03:41:32 GMT-06:00] [20] [1] SelfTestSubsystem: load=
ing self test plugins in startup order
0.main - [01/Apr/2024:03:41:32 GMT-06:00] [20] [1] SelfTestSubsystem: Self =
test plugins have been successfully loaded!
0.main - [01/Apr/2024:03:41:32 GMT-06:00] [20] [1] SelfTestSubsystem: Runni=
ng self test plugins specified to be executed at startup:
0.main - [01/Apr/2024:03:41:32 GMT-06:00] [20] [1] CAPresence: CA is prese=
nt
0.main - [01/Apr/2024:03:41:32 GMT-06:00] [20] [1] SystemCertsVerification:=
system certs verification failure: Invalid certificate Server-Cert cert-pk=
i-ca: NotBefore: Mon Apr 01 03:41:49 CST 2024
0.main - [01/Apr/2024:03:41:32 GMT-06:00] [20] [1] SelfTestSubsystem: The C=
RITICAL self test plugin called selftests.container.instance.SystemCertsVer=
ification running at startup FAILED!
________________________________
DISCLAIMER: The information in this message is confidential and may be lega=
lly privileged. It is intended solely for the addressee. Access to this mes=
sage by anyone else is unauthorized. If you are not the intended recipient,=
any disclosure, copying, or distribution of the message, or any action or =
omission taken by you in reliance on it, is prohibited and may be unlawful.=
Please immediately contact the sender if you have received this message in=
error. Further, this e-mail may contain viruses and all reasonable precaut=
ion to minimize the risk arising there from is taken by OnMobile. OnMobile =
is not liable for any damage sustained by you as a result of any virus in t=
his e-mail. All applicable virus checks should be carried out by you before=
opening this e-mail or any attachment thereto.
Thank you - OnMobile Global Limited.
--===============3792701881326314654==
Content-Type: text/html
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="attachment.html"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--===============3792701881326314654==--
From rcritten at redhat.com Mon Apr 1 14:47:16 2024
Content-Type: multipart/mixed; boundary="===============8526865454316647732=="
MIME-Version: 1.0
From: Rob Crittenden
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: ACME certs fail to renew
Date: Mon, 01 Apr 2024 10:46:58 -0400
Message-ID: <2e47af52-bfd8-251a-4739-5918abff075c@redhat.com>
In-Reply-To: 3ef3c740-c208-4413-b121-a74205203f7b@infra-monkey.com
--===============8526865454316647732==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Antoine Gatineau via FreeIPA-users wrote:
> Hello,
> =
> I have a strange issue regarding acme service.
> My acme certificates fail to renew. `ipa-acme-manage status`fails with
> error:
> Failed to authenticate to CA REST API
> The ipa-acme-manage command failed.
> =
> certbot client fails with error "Failed to renew certificate
> office.empire.lan with error: "
> =
> $ ipa cert-show 49
> =C2=A0Issuing CA: ipa
> =C2=A0Certificate: "The certificate content"
> =C2=A0Subject: CN=3Doffice.empire.lan
> =C2=A0Subject DNS name: office.empire.lan
> =C2=A0Issuer: CN=3DCertificate Authority,O=3DEMPIRE.LAN
> =C2=A0Not Before: Sun Dec 24 14:05:50 2023 UTC
> =C2=A0Not After: Sat Mar 23 14:05:50 2024 UTC
> =C2=A0Serial number: 49
> =C2=A0Serial number (hex): 0x31
> =C2=A0Revoked: False
> =
> So last successful renewal was on Dec 24th. Since then I have not really
> done anything appart updating.
> I don't see any issue in ipaupgrade.log
> =
> =
> I am running on centos stream 9
> idm-jss.x86_64=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0
> 5.5.0-1.el9
> idm-jss-tomcat.x86_64=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0
> 5.5.0-1.el9
> idm-ldapjdk.noarch=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0
> 5.5.0-1.el9
> idm-pki-acme.noarch=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0
> 11.5.0-1.el9
> idm-pki-base.noarch=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0
> 11.5.0-1.el9
> idm-pki-ca.noarch=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0
> 11.5.0-1.el9
> idm-pki-java.noarch=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0
> 11.5.0-1.el9
> idm-pki-kra.noarch=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0
> 11.5.0-1.el9
> idm-pki-server.noarch=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0
> 11.5.0-1.el9
> idm-pki-tools.x86_64=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0
> 11.5.0-1.el9
> ipa-client.x86_64=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0
> 4.11.0-9.el9
> ipa-client-common.noarch=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0
> 4.11.0-9.el9
> ipa-common.noarch=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0
> 4.11.0-9.el9
> ipa-healthcheck.noarch=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0
> 0.16-2.el9
> ipa-healthcheck-core.noarch=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0
> 0.16-2.el9
> ipa-selinux.noarch=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0
> 4.11.0-9.el9
> ipa-server.x86_64=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0
> 4.11.0-9.el9
> ipa-server-common.noarch=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0
> 4.11.0-9.el9
> ipa-server-dns.noarch=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0
> 4.11.0-9.el9
> =
> I have followed closely the update on centos stream 9
> =
> Running=C2=A0 `ipa-acme-manage status` with the -d switch gives me
> ipapython.ipaldap: DEBUG: retrieving schema for SchemaCache
> url=3Dldapi://%2fvar%2frun%2fslapd-EMPIRE-LAN.socket
> conn=3D
> ipaserver.masters: DEBUG: Discovery: available servers for service 'CA'
> are ipa-server-01.empire.lan, ipa-server-02.empire.lan
> ipaserver.masters: DEBUG: Discovery: using ipa-server-01.empire.lan for
> 'CA' service
> ipapython.dogtag: DEBUG: request POST
> https://ipa-server-01.empire.lan:8443/acme/login
> ipapython.dogtag: DEBUG: request body ''
> ipapython.dogtag: DEBUG: response status 404
> ipapython.dogtag: DEBUG: response headers Content-Type:
> text/html;charset=3Dutf-8
> Content-Language: en
> Content-Length: 765
> Date: Thu, 28 Mar 2024 10:00:59 GMT
> =
> =
> ipapython.dogtag: DEBUG: response body (decoded): b' lang=3D"en">HTTP Status 404 \xe2\x80\x93 Not
> FoundHTTP
> Status 404 \xe2\x80\x93 Not Found
Type
> Status Report
Message The requested resource
> [/acme/login] is not available
Description The
> origin server did not find a current representation for the target
> resource or is not willing to disclose that one exists.
class=3D"line" />Apache Tomcat/9.0.62
'
> ipapython.admintool: DEBUG:=C2=A0=C2=A0 File
> "/usr/lib/python3.9/site-packages/ipapython/admintool.py", line 180, in
> execute
> =C2=A0=C2=A0=C2=A0 return_value =3D self.run()
> =C2=A0 File
> "/usr/lib/python3.9/site-packages/ipaserver/install/ipa_acme_manage.py",
> line 403, in run
> =C2=A0=C2=A0=C2=A0 with state as ca_api:
> =C2=A0 File
> "/usr/lib/python3.9/site-packages/ipaserver/install/ipa_acme_manage.py",
> line 103, in __enter__
> =C2=A0=C2=A0=C2=A0 raise errors.RemoteRetrieveError(
> =
> ipapython.admintool: DEBUG: The ipa-acme-manage command failed,
> exception: RemoteRetrieveError: Failed to authenticate to CA REST API
> ipapython.admintool: ERROR: Failed to authenticate to CA REST API
> ipapython.admintool: ERROR: The ipa-acme-manage command failed.
> =
> =
> So it looks like the acme subsystem is not started. But logs for the
> acme subsystem in /var/log/pki/pki-tomcat/acme/debug.2024-03-28.log
> don't show any issue. (see attached log)
> =
> How can I go further in troubleshooting/fixing this issue?
I'd start by verifying that your CA is functioning. Something like ipa
cert-find.
Since you got a 404 (not found) I'd make sure that
/etc/httpd/conf.d/ipa-pki-proxy.conf contains:
...
rob
--===============8526865454316647732==--
From rcritten at redhat.com Mon Apr 1 14:54:22 2024
Content-Type: multipart/mixed; boundary="===============3491906302983359183=="
MIME-Version: 1.0
From: Rob Crittenden
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: problem with configuration replication in ipa
server
Date: Mon, 01 Apr 2024 10:54:04 -0400
Message-ID:
In-Reply-To: 20240328122513.14567.62901@mailman01.iad2.fedoraproject.org
--===============3491906302983359183==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Richard Halley via FreeIPA-users wrote:
> Hi everyone, I'm configuring the freeipa replication as follows:
> =
> 1) ipa-client-install --domain=3Dpippo.internal --realm=3DPIPPO.INTERNAL =
-N
> =
> 2) I add the client to the ipaserver host group
> =
> 3) ipa-replica-install -N --setup-dns --forwarder 8.8.8.8 --forwarder 8.8=
.4.4 --forwarder 1.1.1.1 --setup-ca
> =
> After running ipa-replica-install I get the following error:
> =
> Your system may be partly configured.
> Run /usr/sbin/ipa-server-install --uninstall to clean up.
> =
> ipapython.admintool: ERROR A replication agreement for this host already =
exists. It needs to be removed.
> Run this command:
> %% ipa-replica-manage del pluto.pippo.internal --force
> ipapython.admintool: ERROR The ipa-replica-install command failed. See /v=
ar/log/ipareplica-install.log for more information
> =
> I would like to point out that I have attempted the configuration several=
times without success.
> Before proceeding with the uninstall commands of the client and the repli=
ca on the replica server, I delete the replica on the server (which fails b=
ecause it does not find any replica) and then proceed with deleting the cli=
ent.
> =
> In the replication log file I have the following error:
> =
> 2024-03-28T12:05:10Z DEBUG The ipa-replica-install command failed, except=
ion: ScriptError: A replication agreement for this host already exists. It =
needs to be removed.
> Run this command:
> %% ipa-replica-manage del pluto.pippo.internal --force
> 2024-03-28T12:05:10Z ERROR A replication agreement for this host already =
exists. It needs to be removed.
> Run this command:
> %% ipa-replica-manage del pluto.pippo.internal --force
> 2024-03-28T12:05:10Z ERROR The ipa-replica-install command failed. See /v=
ar/log/ipareplica-install.log for more information
> =
> I can't understand where the problem is.
> Could it be something dirty in LDAP?
Yes, exactly. Try `ipa server-del pluto.pippo.internal` instead.
rob
--===============3491906302983359183==--
From rcritten at redhat.com Mon Apr 1 14:55:47 2024
Content-Type: multipart/mixed; boundary="===============6172186409228049979=="
MIME-Version: 1.0
From: Rob Crittenden
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: CA Subsystem certificate
Date: Mon, 01 Apr 2024 10:55:35 -0400
Message-ID:
In-Reply-To: 20240328150045.5965.72904@mailman01.iad2.fedoraproject.org
--===============6172186409228049979==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Travis West via FreeIPA-users wrote:
> I've just found an old p12 file from 2019. I was able to extract the key=
from that and it does match the CA Subystem cert that expired 8 March that=
is listed in LDAP.
> So if I could somehow generate a new certificate with this and import int=
o the NSS DB for /etc/pki/pki-tomcat/alias would that at least get the CA s=
tarted?
Perhaps. It will be complicated because you'll need to move time
multiple times (e.g. start in 2019, renew, move to 2021-ish, renew, move
to 2023-ish, renew).
First you need to fix your certmonger tracking or its likely to fail
again. Back in 2019 when things are running then executing
ipa-server-upgrade should repair the bad tracking.
rob
--===============6172186409228049979==--
From rcritten at redhat.com Mon Apr 1 15:03:42 2024
Content-Type: multipart/mixed; boundary="===============0931297888045915668=="
MIME-Version: 1.0
From: Rob Crittenden
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: One freeipa replica install fails,
while other is going through
Date: Mon, 01 Apr 2024 11:03:25 -0400
Message-ID: <7d210de0-7e74-0e17-ed39-c3f1534d448b@redhat.com>
In-Reply-To: 20240329085835.7865.627@mailman01.iad2.fedoraproject.org
--===============0931297888045915668==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
D S via FreeIPA-users wrote:
> Any ideas on where to look next? =
I believe you posed the same question on the freeipa-container package.
It might have helped if you'd posted here that you were using
containers, what underlying OS's were being used and the version of IPA.
Did you try pointing the 3rd replica to one of the other two?
Did you try with --skip-conncheck? The connection checking isn't always
perfect which is why the option exists.
rob
--===============0931297888045915668==--
From twest at cherryroad.com Mon Apr 1 15:11:01 2024
Content-Type: multipart/mixed; boundary="===============3150707029933349180=="
MIME-Version: 1.0
From: Travis West
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: CA Subsystem certificate
Date: Mon, 01 Apr 2024 15:10:41 +0000
Message-ID: <20240401151041.11710.80771@mailman01.iad2.fedoraproject.org>
In-Reply-To: d8211363-9aaf-fb92-34b1-ab53e1706c38@redhat.com
--===============3150707029933349180==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Over the weekend I was able to find the CA cert and matching key. So I was=
able to generate a new certificate using these have them signed correctly.=
Here is how I did that (subsystem cert as an example)
CSR gen
openssl req -new -sha256 -key subsystem.key -subj "/CN=3DCA Subsystem /O=3D=
IPA.***.NET" -out subsystem.csr
Cert gen
openssl x509 -req -in subsystem.csr -CA ca.crt -CAkey ca.key -set_serial 4=
-out subsystem.crt -days 3650 -sha256 -extfile openssl.cnf
create p12
openssl pkcs12 -export -out subsystem.p12 -inkey subsystem.key -in subsyst=
em.crt -certfile ca.crt -name subsystemCert cert-pki-ca
import p12 to NSS DB
pk12util -d . -i subsystem.p12 -n "subsystemCert cert-pki-ca"
The 'extfile' contains some of the v3 attributes
$ cat openssl.cnf
subjectKeyIdentifier=3Dhash
authorityKeyIdentifier=3Dkeyid,issuer
keyUsage =3D critical, nonRepudiation, digitalSignature
This morning I imported the auditSigningCert, subsystemCert, and ocpsSignin=
g certs to /etc/pki/pki-tomcat/alias and the trust attributes are correct.
Then I tried adding them back to certmonger for tracking, and they are now =
being tracked.
Request ID '20240401141044':
status: MONITORING
stuck: no
key pair storage: type=3DNSSDB,location=3D'/etc/pki/pki-tomcat/alia=
s',nickname=3D'subsystemCert cert-pki-ca',token=3D'NSS Certificate DB',pin =
set
certificate: type=3DNSSDB,location=3D'/etc/pki/pki-tomcat/alias',ni=
ckname=3D'subsystemCert cert-pki-ca',token=3D'NSS Certificate DB'
CA: dogtag-ipa-ca-renew-agent
issuer: CN=3DCertificate Authority,O=3DIPA.****.NET
subject: O=3D"IPA.****.NET ",CN=3D"CA Subsystem "
expires: 2034-03-30 11:10:54 UTC
key usage: digitalSignature,nonRepudiation
pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert "subsy=
stemCert cert-pki-ca"
track: yes
auto-renew: yes
Request ID '20240401141327':
status: MONITORING
stuck: no
key pair storage: type=3DNSSDB,location=3D'/etc/pki/pki-tomcat/alia=
s',nickname=3D'ocspSigningCert cert-pki-ca',token=3D'NSS Certificate DB',pi=
n set
certificate: type=3DNSSDB,location=3D'/etc/pki/pki-tomcat/alias',ni=
ckname=3D'ocspSigningCert cert-pki-ca',token=3D'NSS Certificate DB'
CA: dogtag-ipa-ca-renew-agent
issuer: CN=3DCertificate Authority,O=3DIPA.****.NET
subject: O=3D"IPA.****.NET ",CN=3D"OCSP Subsystem "
expires: 2034-03-30 10:59:25 UTC
key usage: digitalSignature,nonRepudiation
pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert "ocspS=
igningCert cert-pki-ca"
track: yes
auto-renew: yes
Request ID '20240401145826':
status: MONITORING
stuck: no
key pair storage: type=3DNSSDB,location=3D'/etc/pki/pki-tomcat/alia=
s',nickname=3D'auditSigningCert cert-pki-ca',token=3D'NSS Certificate DB',p=
in set
certificate: type=3DNSSDB,location=3D'/etc/pki/pki-tomcat/alias',ni=
ckname=3D'auditSigningCert cert-pki-ca',token=3D'NSS Certificate DB'
CA: dogtag-ipa-ca-renew-agent
issuer: CN=3DCertificate Authority,O=3DIPA.****.NET
subject: O=3D"IPA.****.NET ",CN=3D"CA Audit "
expires: 2034-03-30 11:05:14 UTC
key usage: digitalSignature,nonRepudiation
pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert "audit=
SigningCert cert-pki-ca"
track: yes
auto-renew: yes
However, after getting them tracked again, the NSS DB appears to have two c=
opies (?)
# certutil -K -d .
certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key=
and Certificate Services"
Enter Password or Pin for "NSS Certificate DB":
< 0> rsa d326b4d65770485d4e0652590101cb7327be0835 caSigningCert cert=
-pki-ca
< 1> rsa f5544801e45007862e7593febbeba32c6931b100 subsystemCert cert=
-pki-ca
< 2> rsa c13cdf1ff7588fbf7b8a25f7ce3e56d5ae0450cd ocspSigningCert ce=
rt-pki-ca
< 3> rsa 99fffc1c7d251e95374aa15db210aa994c9452ef NSS Certificate DB=
:Server-Cert cert-pki-ca
< 4> rsa 75ff858e34df66b838167a31c4d4e12ef76b0044 auditSigningCert c=
ert-pki-ca
< 5> rsa 623e08407bf1fbace5146c7413e343935a987243 subsystemCert cert=
-pki-ca
< 6> rsa 2c62bcd9a61f0db2288c0e85c9c4f316793df98a ocspSigningCert ce=
rt-pki-ca
But here only shows one, with correct trust attributes
# certutil -L -d .
Certificate Nickname Trust Attribut=
es
SSL,S/MIME,JAR=
/XPI
subsystemCert cert-pki-ca u,u,u
ocspSigningCert cert-pki-ca u,u,u
caSigningCert cert-pki-ca CTu,Cu,Cu
Server-Cert cert-pki-ca u,u,u
auditSigningCert cert-pki-ca u,u,Pu
I also updated the subsystemCert in LDAP so that matches (both cert and ser=
ial)
I am still unable to get pki-tomcat to start when I run 'ipactl start' but=
if I check the service using systemctl it appears to be running
Clearly there is still something I'm missing.
--===============3150707029933349180==--
From rcritten at redhat.com Mon Apr 1 15:27:58 2024
Content-Type: multipart/mixed; boundary="===============8750061368106694558=="
MIME-Version: 1.0
From: Rob Crittenden
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: IPA replica installation failed-SEVERE: Unable to
start CA engine: Selftest failed: Invalid certificate Server-Cert
cert-pki-ca: NotBefore: Mon Apr 01 03:41:49 CST 2024
Date: Mon, 01 Apr 2024 11:27:35 -0400
Message-ID:
In-Reply-To: b966ab35ecd6491c93693475deb8e0a3@onmobile.com
--===============8750061368106694558==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Polavarapu Manideep Sai via FreeIPA-users wrote:
> Hi Team,
> =
> =C2=A0
> =
> Any one faced this issue during replica installation
> =
> =C2=A0
> =
> I have third party SSL certificate installed on master server
> =
> =C2=A0
> =
> =C2=A0
> =
> *IPA Version:*
> =
> =C2=A0
> =
> [root(a)dir02-mex ~]# ipa --version
> =
> *VERSION: 4.10.2, API_VERSION: 2.252*
> =
> =C2=A0
> =
> *=C2=A0*
> =
> *Certificate Expiry:*
> =
> =C2=A0
> =
> [root(a)dir02-mex ~]# certutil -L -d /etc/pki/pki-tomcat/alias/ -n
> 'Server-Cert cert-pki-ca' | egrep -i 'befor|after'
> =
> *=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 Not B=
efore: Mon Apr 01 09:41:49 2024*
> =
> *=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 Not A=
fter : Sun Mar 22 09:41:49 2026*
The time reported by certutil is in UTC.
The time in the error is reported in local time, CST. Central Standard
Time? The US has been in DST for a few weeks.
In CDT the cert would have been issued at 04:41:49 and with a 5hr offset
to UTC would be 09:41:49 so valid.
So I'd check your system clock and timezone.
rob
> =
> =C2=A0
> =
> =C2=A0
> =
> =C2=A0
> =
> =C2=A0 [1/4]: Generating ipa-custodia config file
> =
> =C2=A0 [2/4]: Generating ipa-custodia keys
> =
> =C2=A0 [3/4]: starting ipa-custodia
> =
> =C2=A0 [4/4]: configuring ipa-custodia to start on boot
> =
> Done configuring ipa-custodia.
> =
> Configuring certificate server (pki-tomcatd). Estimated time: 3 minutes
> =
> =C2=A0 [1/30]: creating certificate server db
> =
> =C2=A0 [2/30]: setting up initial replication
> =
> Starting replication, please wait until this has completed.
> =
> Update in progress, 12 seconds elapsed
> =
> Update succeeded
> =
> =C2=A0
> =
> =C2=A0 [3/30]: creating ACIs for admin
> =
> =C2=A0 [4/30]: creating installation admin user
> =
> =C2=A0 [5/30]: configuring certificate server instance
> =
> Failed to configure CA instance
> =
> See the installation logs and the following files/directories for more
> information:
> =
> =C2=A0 /var/log/pki/pki-tomcat
> =
> =C2=A0 [error] RuntimeError: CA configuration failed.
> =
> Your system may be partly configured.
> =
> Run /usr/sbin/ipa-server-install --uninstall to clean up.
> =
> =C2=A0
> =
> CA configuration failed.
> =
> The ipa-replica-install command failed. See
> /var/log/ipareplica-install.log for more information
> =
> =C2=A0
> =
> =C2=A0
> =
> =C2=A0
> =
> *Cat /var/log/ipareplica-install.log:*
> =
> =C2=A0
> =
> =C2=A0
> =
> DEBUG: https://dir02-mexommx.ipa.com:8443 "GET / HTTP/1.1" 302 0
> =
> DEBUG: https://dir02-mexommx.ipa.com:8443 "GET /pki HTTP/1.1" 302 None
> =
> DEBUG: https://dir02-mexommx.ipa.com:8443 "GET /pki/ HTTP/1.1" 200 3500
> =
> INFO: PKI server started
> =
> INFO: Waiting for CA subsystem
> =
> DEBUG: Starting new HTTPS connection (1): dir02-mexommx.ipa.com:8443
> =
> DEBUG: https://dir02-mexommx.ipa.com:8443 "GET /ca/admin/ca/getStatus
> HTTP/1.1" 404 784
> =
> =C2=A0
> =
> 2024-04-01T09:41:34Z CRITICAL Failed to configure CA instance
> =
> 2024-04-01T09:41:34Z CRITICAL See the installation logs and the
> following files/directories for more information:
> =
> 2024-04-01T09:41:34Z CRITICAL=C2=A0=C2=A0 /var/log/pki/pki-tomcat
> =
> 2024-04-01T09:41:34Z DEBUG Traceback (most recent call last):
> =
> =C2=A0 File "/usr/lib/python3.9/site-packages/ipaserver/install/service.p=
y",
> line 686, in start_creation
> =
> =C2=A0=C2=A0=C2=A0 run_step(full_msg, method)
> =
> =C2=A0 File "/usr/lib/python3.9/site-packages/ipaserver/install/service.p=
y",
> line 672, in run_step
> =
> =C2=A0=C2=A0=C2=A0 method()
> =
> =C2=A0 File
> "/usr/lib/python3.9/site-packages/ipaserver/install/cainstance.py", line
> 651, in __spawn_instance
> =
> =C2=A0=C2=A0=C2=A0 DogtagInstance.spawn_instance(
> =
> =C2=A0 File
> "/usr/lib/python3.9/site-packages/ipaserver/install/dogtaginstance.py",
> line 227, in spawn_instance
> =
> =C2=A0=C2=A0=C2=A0 self.handle_setup_error(e)
> =
> =C2=A0 File
> "/usr/lib/python3.9/site-packages/ipaserver/install/dogtaginstance.py",
> line 604, in handle_setup_error
> =
> =C2=A0=C2=A0=C2=A0 raise RuntimeError(
> =
> RuntimeError: CA configuration failed.
> =
> =C2=A0
> =
> 2024-04-01T09:41:34Z DEBUG=C2=A0=C2=A0 [error] RuntimeError: CA configura=
tion failed.
> =
> 2024-04-01T09:41:34Z DEBUG Removing /root/.dogtag/pki-tomcat/ca
> =
> 2024-04-01T09:41:34Z DEBUG=C2=A0=C2=A0 File
> "/usr/lib/python3.9/site-packages/ipapython/admintool.py", line 180, in
> execute
> =
> =C2=A0=C2=A0=C2=A0 return_value =3D self.run()
> =
> =C2=A0 File "/usr/lib/python3.9/site-packages/ipapython/install/cli.py", =
line
> 344, in run
> =
> =C2=A0=C2=A0=C2=A0 return cfgr.run()
> =
> =C2=A0 File "/usr/lib/python3.9/site-packages/ipapython/install/core.py",
> line 360, in run
> =
> =C2=A0=C2=A0=C2=A0 return self.execute()
> =
> =C2=A0 File "/usr/lib/python3.9/site-packages/ipapython/install/core.py",
> line 386, in execute
> =
> =C2=A0=C2=A0=C2=A0 for rval in self._executor():
> =
> =C2=A0 File "/usr/lib/python3.9/site-packages/ipapython/install/core.py",
> line 435, in __runner
> =
> =C2=A0=C2=A0=C2=A0 exc_handler(exc_info)
> =
> =C2=A0 File "/usr/lib/python3.9/site-packages/ipapython/install/core.py",
> line 468, in _handle_execute_exception
> =
> =C2=A0=C2=A0=C2=A0 self._handle_exception(exc_info)
> =
> =C2=A0 File "/usr/lib/python3.9/site-packages/ipapython/install/core.py",
> line 458, in _handle_exception
> =
> =C2=A0=C2=A0=C2=A0 six.reraise(*exc_info)
> =
> =C2=A0 File "/usr/lib/python3.9/site-packages/six.py", line 709, in rerai=
se
> =
> =C2=A0=C2=A0=C2=A0 raise value
> =
> =C2=A0 File "/usr/lib/python3.9/site-packages/ipapython/install/core.py",
> line 425, in __runner
> =
> =C2=A0=C2=A0=C2=A0 step()
> =
> =C2=A0 File "/usr/lib/python3.9/site-packages/ipapython/install/core.py",
> line 419, in step_next
> =
> =C2=A0=C2=A0=C2=A0 return next(self.__gen)
> =
> =C2=A0 File "/usr/lib/python3.9/site-packages/ipapython/install/util.py",
> line 81, in run_generator_with_yield_from
> =
> =C2=A0=C2=A0=C2=A0 six.reraise(*exc_info)
> =
> =C2=A0 File "/usr/lib/python3.9/site-packages/six.py", line 709, in rerai=
se
> =
> =C2=A0=C2=A0=C2=A0 raise value
> =
> =C2=A0 File "/usr/lib/python3.9/site-packages/ipapython/install/util.py",
> line 59, in run_generator_with_yield_from
> =
> =C2=A0 =C2=A0=C2=A0value =3D gen.send(prev_value)
> =
> =C2=A0 File "/usr/lib/python3.9/site-packages/ipapython/install/core.py",
> line 663, in _configure
> =
> =C2=A0=C2=A0=C2=A0 next(executor)
> =
> =C2=A0 File "/usr/lib/python3.9/site-packages/ipapython/install/core.py",
> line 435, in __runner
> =
> =C2=A0=C2=A0=C2=A0 exc_handler(exc_info)
> =
> =C2=A0 File "/usr/lib/python3.9/site-packages/ipapython/install/core.py",
> line 468, in _handle_execute_exception
> =
> =C2=A0=C2=A0=C2=A0 self._handle_exception(exc_info)
> =
> =C2=A0 File "/usr/lib/python3.9/site-packages/ipapython/install/core.py",
> line 526, in _handle_exception
> =
> =C2=A0=C2=A0=C2=A0 self.__parent._handle_exception(exc_info)
> =
> =C2=A0 File "/usr/lib/python3.9/site-packages/ipapython/install/core.py",
> line 458, in _handle_exception
> =
> =C2=A0=C2=A0=C2=A0 six.reraise(*exc_info)
> =
> =C2=A0 File "/usr/lib/python3.9/site-packages/six.py", line 709, in rerai=
se
> =
> =C2=A0=C2=A0=C2=A0 raise value
> =
> =C2=A0 File "/usr/lib/python3.9/site-packages/ipapython/install/core.py",
> line 523, in _handle_exception
> =
> =C2=A0=C2=A0=C2=A0 super(ComponentBase, self)._handle_exception(exc_info)
> =
> =C2=A0 File "/usr/lib/python3.9/site-packages/ipapython/install/core.py",
> line 458, in _handle_exception
> =
> =C2=A0=C2=A0=C2=A0 six.reraise(*exc_info)
> =
> =C2=A0 File "/usr/lib/python3.9/site-packages/six.py", line 709, in rerai=
se
> =
> =C2=A0=C2=A0=C2=A0 raise value
> =
> =C2=A0 File "/usr/lib/python3.9/site-packages/ipapython/install/core.py",
> line 425, in __runner
> =
> =C2=A0=C2=A0=C2=A0 step()
> =
> =C2=A0 File "/usr/lib/python3.9/site-packages/ipapython/install/core.py",
> line 419, in step_next
> =
> =C2=A0=C2=A0=C2=A0 return next(self.__gen)
> =
> =C2=A0 File "/usr/lib/python3.9/site-packages/ipapython/install/util.py",
> line 81, in run_generator_with_yield_from
> =
> =C2=A0=C2=A0=C2=A0 six.reraise(*exc_info)
> =
> =C2=A0 File "/usr/lib/python3.9/site-packages/six.py", line 709, in rerai=
se
> =
> =C2=A0=C2=A0=C2=A0 raise value
> =
> =C2=A0 File "/usr/lib/python3.9/site-packages/ipapython/install/util.py",
> line 59, in run_generator_with_yield_from
> =
> =C2=A0=C2=A0=C2=A0 value =3D gen.send(prev_value)
> =
> =C2=A0 File "/usr/lib/python3.9/site-packages/ipapython/install/common.py=
",
> line 65, in _install
> =
> =C2=A0=C2=A0=C2=A0 for unused in self._installer(self.parent):
> =
> =C2=A0 File
> "/usr/lib/python3.9/site-packages/ipaserver/install/server/__init__.py",
> line 599, in main
> =
> =C2=A0=C2=A0=C2=A0 replica_install(self)
> =
> =C2=A0 File
> "/usr/lib/python3.9/site-packages/ipaserver/install/server/replicainstall=
.py",
> line 401, in decorated
> =
> =C2=A0=C2=A0=C2=A0 func(installer)
> =
> =C2=A0 File
> "/usr/lib/python3.9/site-packages/ipaserver/install/server/replicainstall=
.py",
> line 1345, in install
> =
> =C2=A0=C2=A0=C2=A0 ca.install(False, config, options, custodia=3Dcustodia)
> =
> =C2=A0 File "/usr/lib/python3.9/site-packages/ipaserver/install/ca.py", l=
ine
> 354, in install
> =
> =C2=A0=C2=A0=C2=A0 install_step_0(standalone, replica_config, options, cu=
stodia=3Dcustodia)
> =
> =C2=A0 File "/usr/lib/python3.9/site-packages/ipaserver/install/ca.py", l=
ine
> 422, in install_step_0
> =
> =C2=A0=C2=A0=C2=A0 ca.configure_instance(
> =
> =C2=A0 File
> "/usr/lib/python3.9/site-packages/ipaserver/install/cainstance.py", line
> 506, in configure_instance
> =
> =C2=A0=C2=A0=C2=A0 self.start_creation(runtime=3Druntime)
> =
> =C2=A0 File "/usr/lib/python3.9/site-packages/ipaserver/install/service.p=
y",
> line 686, in start_creation
> =
> =C2=A0=C2=A0=C2=A0 run_step(full_msg, method)
> =
> =C2=A0 File "/usr/lib/python3.9/site-packages/ipaserver/install/service.p=
y",
> line 672, in run_step
> =
> =C2=A0=C2=A0=C2=A0 method()
> =
> =C2=A0 File
> "/usr/lib/python3.9/site-packages/ipaserver/install/cainstance.py", line
> 651, in __spawn_instance
> =
> =C2=A0=C2=A0=C2=A0 DogtagInstance.spawn_instance(
> =
> =C2=A0 File
> "/usr/lib/python3.9/site-packages/ipaserver/install/dogtaginstance.py",
> line 227, in spawn_instance
> =
> =C2=A0=C2=A0=C2=A0 self.handle_setup_error(e)
> =
> =C2=A0 File
> "/usr/lib/python3.9/site-packages/ipaserver/install/dogtaginstance.py",
> line 604, in handle_setup_error
> =
> =C2=A0=C2=A0=C2=A0 raise RuntimeError(
> =
> =C2=A0
> =
> 2024-04-01T09:41:34Z DEBUG The ipa-replica-install command failed,
> exception: RuntimeError: CA configuration failed.
> =
> 2024-04-01T09:41:34Z ERROR CA configuration failed.
> =
> 2024-04-01T09:41:34Z ERROR The ipa-replica-install command failed. See
> /var/log/ipareplica-install.log for more information
> =
> =C2=A0
> =
> =C2=A0
> =
> *Cat /var/log/pki/pki-tomcat/ca/debug.2024-04-01.log*
> =
> =C2=A0
> =
> =C2=A0
> =
> =C2=A0
> =
> 2024-04-01 03:41:32 [main] INFO: CMSEngine: Disabling CA subsystem
> =
> 2024-04-01 03:41:32 [main] SEVERE: Unable to start CA engine: Selftest
> failed: Invalid certificate Server-Cert cert-pki-ca: NotBefore: Mon Apr
> 01 03:41:49 CST 2024
> =
> Selftest failed: Invalid certificate Server-Cert cert-pki-ca: NotBefore:
> Mon Apr 01 03:41:49 CST 2024
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 at
> com.netscape.cmscore.selftests.SelfTestSubsystem.startup(SelfTestSubsyste=
m.java:1759)
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 at
> com.netscape.cmscore.apps.CMSEngine.startupSubsystems(CMSEngine.java:1167)
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 at
> org.dogtagpki.server.ca.CAEngine.startupSubsystems(CAEngine.java:972)
> =
> =C2=A0
> =
> =C2=A0
> =
> =C2=A0
> =
> 2024-04-01 03:41:32 [main] SEVERE: SelfTestSubsystem: selftest failed:
> Invalid certificate Server-Cert cert-pki-ca: NotBefore: Mon Apr 01
> 03:41:49 CST 2024
> =
> java.lang.Exception: Invalid certificate Server-Cert cert-pki-ca:
> NotBefore: Mon Apr 01 03:41:49 CST 2024
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 at
> com.netscape.cmscore.cert.CertUtils.verifySystemCertValidityByNickname(Ce=
rtUtils.java:844)
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 at
> com.netscape.cmscore.apps.CMSEngine.verifySystemCertByTag(CMSEngine.java:=
1895)
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 at
> com.netscape.cmscore.apps.CMSEngine.verifySystemCerts(CMSEngine.java:1823)
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 at
> com.netscape.cms.selftests.common.SystemCertsVerification.runSelfTest(Sys=
temCertsVerification.java:211)
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 at
> com.netscape.cmscore.selftests.SelfTestSubsystem.runSelfTestsAtStartup(Se=
lfTestSubsystem.java:818)
> =
> =C2=A0=C2=A0 =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0at
> com.netscape.cmscore.selftests.SelfTestSubsystem.startup(SelfTestSubsyste=
m.java:1722)
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 at
> com.netscape.cmscore.apps.CMSEngine.startupSubsystems(CMSEngine.java:1167)
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 at
> org.dogtagpki.server.ca.CAEngine.startupSubsystems(CAEngine.java:972)
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 at com.netscape.cmscore.apps.C=
MSEngine.start(CMSEngine.java:1223)
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 at
> com.netscape.cmscore.apps.PKIWebListener.contextInitialized(PKIWebListene=
r.java:43)
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 at
> org.apache.catalina.core.StandardContext.listenerStart(StandardContext.ja=
va:4768)
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 at
> org.apache.catalina.core.StandardContext.startInternal(StandardContext.ja=
va:5230)
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 at
> org.apache.catalina.util.LifecycleBase.start(LifecycleBase.java:183)
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 at
> org.apache.catalina.core.ContainerBase.addChildInternal(ContainerBase.jav=
a:726)
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 at
> org.apache.catalina.core.ContainerBase.access$000(ContainerBase.java:129)
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 at
> org.apache.catalina.core.ContainerBase$PrivilegedAddChild.run(ContainerBa=
se.java:149)
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 at
> org.apache.catalina.core.ContainerBase$PrivilegedAddChild.run(ContainerBa=
se.java:139)
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 at
> java.base/java.security.AccessController.doPrivileged(AccessController.ja=
va:318)
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 at
> org.apache.catalina.core.ContainerBase.addChild(ContainerBase.java:696)
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 at
> org.apache.catalina.core.StandardHost.addChild(StandardHost.java:696)
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 at
> org.apache.catalina.startup.HostConfig.deployDescriptor(HostConfig.java:6=
90)
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 at
> org.apache.catalina.startup.HostConfig$DeployDescriptor.run(HostConfig.ja=
va:1889)
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 at
> java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.j=
ava:539)
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 at
> java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 at
> org.apache.tomcat.util.threads.InlineExecutorService.execute(InlineExecut=
orService.java:75)
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 at
> java.base/java.util.concurrent.AbstractExecutorService.submit(AbstractExe=
cutorService.java:123)
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 at
> org.apache.catalina.startup.HostConfig.deployDescriptors(HostConfig.java:=
583)
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 at
> org.apache.catalina.startup.HostConfig.deployApps(HostConfig.java:473)
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 at
> org.apache.catalina.startup.HostConfig.start(HostConfig.java:1618)
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 at
> org.apache.catalina.startup.HostConfig.lifecycleEvent(HostConfig.java:319)
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 at
> org.apache.catalina.util.LifecycleBase.fireLifecycleEvent(LifecycleBase.j=
ava:123)
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 at
> org.apache.catalina.util.LifecycleBase.setStateInternal(LifecycleBase.jav=
a:423)
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 at
> org.apache.catalina.util.LifecycleBase.setState(LifecycleBase.java:366)
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 at
> org.apache.catalina.core.ContainerBase.startInternal(ContainerBase.java:9=
46)
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 at
> org.apache.catalina.core.StandardHost.startInternal(StandardHost.java:835)
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 at
> org.apache.catalina.util.LifecycleBase.start(LifecycleBase.java:183)
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 at
> org.apache.catalina.core.ContainerBase$StartChild.call(ContainerBase.java=
:1396)
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 at
> org.apache.catalina.core.ContainerBase$StartChild.call(ContainerBase.java=
:1386)
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 at
> java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 at
> org.apache.tomcat.util.threads.InlineExecutorService.execute(InlineExecut=
orService.java:75)
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 at
> java.base/java.util.concurrent.AbstractExecutorService.submit(AbstractExe=
cutorService.java:145)
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 at
> org.apache.catalina.core.ContainerBase.startInternal(ContainerBase.java:9=
19)
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 at
> org.apache.catalina.core.StandardEngine.startInternal(StandardEngine.java=
:263)
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 at
> org.apache.catalina.util.LifecycleBase.start(LifecycleBase.java:183)
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 at
> org.apache.catalina.core.StandardService.startInternal(StandardService.ja=
va:432)
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 at
> org.apache.catalina.util.LifecycleBase.start(LifecycleBase.java:183)
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 at
> org.apache.catalina.core.StandardServer.startInternal(StandardServer.java=
:927)
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 at
> org.apache.catalina.util.LifecycleBase.start(LifecycleBase.java:183)
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 at org.apache.catalina.startup=
.Catalina.start(Catalina.java:772)
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 at
> java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native
> Method)
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 at
> java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMeth=
odAccessorImpl.java:77)
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 at
> java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Delega=
tingMethodAccessorImpl.java:43)
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 at java.base/java.lang.reflect=
.Method.invoke(Method.java:568)
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 at org.apache.catalina.startup=
.Bootstrap.start(Bootstrap.java:345)
> =
> =C2=A0=C2=A0 =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0at org.apache.catalina.startup=
.Bootstrap.main(Bootstrap.java:476)
> =
> Caused by: java.security.cert.CertificateNotYetValidException:
> NotBefore: Mon Apr 01 03:41:49 CST 2024
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 at
> org.mozilla.jss.netscape.security.x509.CertificateValidity.valid(Certific=
ateValidity.java:302)
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 at
> org.mozilla.jss.netscape.security.x509.X509CertImpl.checkValidity(X509Cer=
tImpl.java:494)
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 at
> org.mozilla.jss.netscape.security.x509.X509CertImpl.checkValidity(X509Cer=
tImpl.java:466)
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 at
> com.netscape.cmscore.cert.CertUtils.verifySystemCertValidityByNickname(Ce=
rtUtils.java:839)
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 ... 54 more
> =
> =C2=A0
> =
> 2024-04-01 03:41:32 [main] SEVERE: SelfTestSubsystem: Disabling
> subsystem due to selftest failure: Invalid certificate Server-Cert
> cert-pki-ca: NotBefore: Mon Apr 01 03:41:49 CST 2024
> =
> java.lang.Exception: Invalid certificate Server-Cert cert-pki-ca:
> NotBefore: Mon Apr 01 03:41:49 CST 2024
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0
> =
> =
> =C2=A0
> =
> =C2=A0
> =
> =C2=A0
> =
> *cat /var/log/pki/pki-tomcat/ca/selftests.log:*
> =
> =C2=A0
> =
> 0.main - [29/Mar/2024:03:28:24 GMT-06:00] [20] [1] CAPresence:=C2=A0 CA is
> present
> =
> 0.main - [29/Mar/2024:03:28:24 GMT-06:00] [20] [1]
> SystemCertsVerification: system certs verification failure: Invalid
> certificate Server-Cert cert-pki-ca: NotBefore: Fri Mar 29 03:28:37 CST 2=
024
> =
> 0.main - [29/Mar/2024:03:28:24 GMT-06:00] [20] [1] SelfTestSubsystem:
> The CRITICAL self test plugin called
> selftests.container.instance.SystemCertsVerification running at startup
> FAILED!
> =
> 0.main - [29/Mar/2024:04:03:13 GMT-06:00] [20] [1] SelfTestSubsystem:
> Initializing self test plugins:
> =
> 0.main - [29/Mar/2024:04:03:13 GMT-06:00] [20] [1] SelfTestSubsystem:=C2=
=A0
> loading all self test plugin logger parameters
> =
> 0.main - [29/Mar/2024:04:03:13 GMT-06:00] [20] [1] SelfTestSubsystem:=C2=
=A0
> loading all self test plugin instances
> =
> 0.main - [29/Mar/2024:04:03:13 GMT-06:00] [20] [1] SelfTestSubsystem:=C2=
=A0
> loading all self test plugin instance parameters
> =
> 0.main - [29/Mar/2024:04:03:13 GMT-06:00] [20] [1] SelfTestSubsystem:=C2=
=A0
> loading self test plugins in on-demand order
> =
> 0.main - [29/Mar/2024:04:03:13 GMT-06:00] [20] [1] SelfTestSubsystem:=C2=
=A0
> loading self test plugins in startup order
> =
> 0.main - [29/Mar/2024:04:03:13 GMT-06:00] [20] [1] SelfTestSubsystem:
> Self test plugins have been successfully loaded!
> =
> 0.main - [29/Mar/2024:04:03:13 GMT-06:00] [20] [1] SelfTestSubsystem:
> Running self test plugins specified to be executed at startup:
> =
> 0.main - [29/Mar/2024:04:03:13 GMT-06:00] [20] [1] CAPresence:=C2=A0 CA is
> present
> =
> 0.main - [29/Mar/2024:04:03:13 GMT-06:00] [20] [1]
> SystemCertsVerification: system certs verification failure: Invalid
> certificate Server-Cert cert-pki-ca: NotBefore: Fri Mar 29 04:03:27 CST 2=
024
> =
> 0.main - [29/Mar/2024:04:03:13 GMT-06:00] [20] [1] SelfTestSubsystem:
> The CRITICAL self test plugin called
> selftests.container.instance.SystemCertsVerification running at startup
> FAILED!
> =
> 0.main - [01/Apr/2024:03:41:32 GMT-06:00] [20] [1] SelfTestSubsystem:
> Initializing self test plugins:
> =
> 0.main - [01/Apr/2024:03:41:32 GMT-06:00] [20] [1] SelfTestSubsystem:=C2=
=A0
> loading all self test plugin logger parameters
> =
> 0.main - [01/Apr/2024:03:41:32 GMT-06:00] [20] [1] SelfTestSubsystem:=C2=
=A0
> loading all self test plugin instances
> =
> 0.main - [01/Apr/2024:03:41:32 GMT-06:00] [20] [1] SelfTestSubsystem:=C2=
=A0
> loading all self test plugin instance parameters
> =
> 0.main - [01/Apr/2024:03:41:32 GMT-06:00] [20] [1] SelfTestSubsystem:=C2=
=A0
> loading self test plugins in on-demand order
> =
> 0.main - [01/Apr/2024:03:41:32 GMT-06:00] [20] [1] SelfTestSubsystem:=C2=
=A0
> loading self test plugins in startup order
> =
> 0.main - [01/Apr/2024:03:41:32 GMT-06:00] [20] [1] SelfTestSubsystem:
> Self test plugins have been successfully loaded!
> =
> 0.main - [01/Apr/2024:03:41:32 GMT-06:00] [20] [1] SelfTestSubsystem:
> Running self test plugins specified to be executed at startup:
> =
> 0.main - [01/Apr/2024:03:41:32 GMT-06:00] [20] [1] CAPresence:=C2=A0 CA is
> present
> =
> 0.main - [01/Apr/2024:03:41:32 GMT-06:00] [20] [1]
> SystemCertsVerification: system certs verification failure: Invalid
> certificate Server-Cert cert-pki-ca: NotBefore: Mon Apr 01 03:41:49 CST 2=
024
> =
> 0.main - [01/Apr/2024:03:41:32 GMT-06:00] [20] [1] SelfTestSubsystem:
> The CRITICAL self test plugin called
> selftests.container.instance.SystemCertsVerification running at startup
> FAILED!
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0
> =
> =C2=A0
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0
> =
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0
> =
> =
> ------------------------------------------------------------------------
> =
> DISCLAIMER: The information in this message is confidential and may be
> legally privileged. It is intended solely for the addressee. Access to
> this message by anyone else is unauthorized. If you are not the intended
> recipient, any disclosure, copying, or distribution of the message, or
> any action or omission taken by you in reliance on it, is prohibited and
> may be unlawful. Please immediately contact the sender if you have
> received this message in error. Further, this e-mail may contain viruses
> and all reasonable precaution to minimize the risk arising there from is
> taken by OnMobile. OnMobile is not liable for any damage sustained by
> you as a result of any virus in this e-mail. All applicable virus checks
> should be carried out by you before opening this e-mail or any
> attachment thereto.
> Thank you - OnMobile Global Limited.
> =
> --
> _______________________________________________
> FreeIPA-users mailing list -- freeipa-users(a)lists.fedorahosted.org
> To unsubscribe send an email to freeipa-users-leave(a)lists.fedorahosted.=
org
> Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code=
-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives: https://lists.fedorahosted.org/archives/list/freeipa-users=
(a)lists.fedorahosted.org
> Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/=
new_issue
>=20
--===============8750061368106694558==--
From manideep.sai at onmobile.com Mon Apr 1 18:55:31 2024
Content-Type: multipart/mixed; boundary="===============7193989110349146529=="
MIME-Version: 1.0
From: Polavarapu Manideep Sai
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: IPA replica installation failed-SEVERE: Unable to
start CA engine: Selftest failed: Invalid certificate Server-Cert
cert-pki-ca: NotBefore: Mon Apr 01 03:41:49 CST 2024
Date: Mon, 01 Apr 2024 18:55:09 +0000
Message-ID:
In-Reply-To: f8e4c281-0965-ff9d-2727-ee8f97698b78@redhat.com
--===============7193989110349146529==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Hi Rob,
Thanks for the reply, Here is the clock and time zone
[root(a)dir02-mex ~]#
[root(a)dir02-mex ~]# clock
2024-04-01 12:48:38.496030-06:00
[root(a)dir02-mex ~]#
[root(a)dir02-mex ~]#
[root(a)dir02-mex ~]#
[root(a)dir02-mex ~]# hwclock
2024-04-01 12:48:42.902341-06:00
[root(a)dir02-mex ~]#
[root(a)dir02-mex ~]#
[root(a)dir02-mex ~]# date
Mon 01 Apr 2024 12:48:12 CST
[root(a)dir02-mex ~]#
[root(a)dir02-mex ~]# timedatectl
Local time: Mon 2024-04-01 12:48:21 CST
Universal time: Mon 2024-04-01 18:48:21 UTC
RTC time: Mon 2024-04-01 18:49:02
Time zone: America/Mexico_City (CST, -0600)
System clock synchronized: no
NTP service: active
RTC in local TZ: no
[root(a)dir02-mex ~]#
[root(a)dir02-mex ~]# certutil -L -d /etc/pki/pki-tomcat/alias/ -n 'Server-=
Cert cert-pki-ca'
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 47 (0x2f)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=3DCertificate Authority,O=3DIPA.COM"
Validity:
Not Before: Mon Apr 01 09:41:49 2024
Not After : Sun Mar 22 09:41:49 2026
---------------------------------------------------------------------------=
---------------------
-----Original Message-----
From: Rob Crittenden
Sent: 01 April 2024 20:58
To: FreeIPA users list
Cc: Polavarapu Manideep Sai
Subject: Re: [Freeipa-users] IPA replica installation failed-SEVERE: Unable=
to start CA engine: Selftest failed: Invalid certificate Server-Cert cert-=
pki-ca: NotBefore: Mon Apr 01 03:41:49 CST 2024
CAUTION. This email originated from outside the organization. Please exerci=
se caution before clicking on links or attachments in case of suspicion or =
unknown senders.
Polavarapu Manideep Sai via FreeIPA-users wrote:
> Hi Team,
>
>
>
> Any one faced this issue during replica installation
>
>
>
> I have third party SSL certificate installed on master server
>
>
>
>
>
> *IPA Version:*
>
>
>
> [root(a)dir02-mex ~]# ipa --version
>
> *VERSION: 4.10.2, API_VERSION: 2.252*
>
>
>
> * *
>
> *Certificate Expiry:*
>
>
>
> [root(a)dir02-mex ~]# certutil -L -d /etc/pki/pki-tomcat/alias/ -n
> 'Server-Cert cert-pki-ca' | egrep -i 'befor|after'
>
> * Not Before: Mon Apr 01 09:41:49 2024*
>
> * Not After : Sun Mar 22 09:41:49 2026*
The time reported by certutil is in UTC.
The time in the error is reported in local time, CST. Central Standard
Time? The US has been in DST for a few weeks.
In CDT the cert would have been issued at 04:41:49 and with a 5hr offset
to UTC would be 09:41:49 so valid.
So I'd check your system clock and timezone.
rob
>
>
>
>
>
>
>
> [1/4]: Generating ipa-custodia config file
>
> [2/4]: Generating ipa-custodia keys
>
> [3/4]: starting ipa-custodia
>
> [4/4]: configuring ipa-custodia to start on boot
>
> Done configuring ipa-custodia.
>
> Configuring certificate server (pki-tomcatd). Estimated time: 3 minutes
>
> [1/30]: creating certificate server db
>
> [2/30]: setting up initial replication
>
> Starting replication, please wait until this has completed.
>
> Update in progress, 12 seconds elapsed
>
> Update succeeded
>
>
>
> [3/30]: creating ACIs for admin
>
> [4/30]: creating installation admin user
>
> [5/30]: configuring certificate server instance
>
> Failed to configure CA instance
>
> See the installation logs and the following files/directories for more
> information:
>
> /var/log/pki/pki-tomcat
>
> [error] RuntimeError: CA configuration failed.
>
> Your system may be partly configured.
>
> Run /usr/sbin/ipa-server-install --uninstall to clean up.
>
>
>
> CA configuration failed.
>
> The ipa-replica-install command failed. See
> /var/log/ipareplica-install.log for more information
>
>
>
>
>
>
>
> *Cat /var/log/ipareplica-install.log:*
>
>
>
>
>
> DEBUG: https://dir02-mexommx.ipa.com:8443 "GET / HTTP/1.1" 302 0
>
> DEBUG: https://dir02-mexommx.ipa.com:8443 "GET /pki HTTP/1.1" 302 None
>
> DEBUG: https://dir02-mexommx.ipa.com:8443 "GET /pki/ HTTP/1.1" 200 3500
>
> INFO: PKI server started
>
> INFO: Waiting for CA subsystem
>
> DEBUG: Starting new HTTPS connection (1): dir02-mexommx.ipa.com:8443
>
> DEBUG: https://dir02-mexommx.ipa.com:8443 "GET /ca/admin/ca/getStatus
> HTTP/1.1" 404 784
>
>
>
> 2024-04-01T09:41:34Z CRITICAL Failed to configure CA instance
>
> 2024-04-01T09:41:34Z CRITICAL See the installation logs and the
> following files/directories for more information:
>
> 2024-04-01T09:41:34Z CRITICAL /var/log/pki/pki-tomcat
>
> 2024-04-01T09:41:34Z DEBUG Traceback (most recent call last):
>
> File "/usr/lib/python3.9/site-packages/ipaserver/install/service.py",
> line 686, in start_creation
>
> run_step(full_msg, method)
>
> File "/usr/lib/python3.9/site-packages/ipaserver/install/service.py",
> line 672, in run_step
>
> method()
>
> File
> "/usr/lib/python3.9/site-packages/ipaserver/install/cainstance.py", line
> 651, in __spawn_instance
>
> DogtagInstance.spawn_instance(
>
> File
> "/usr/lib/python3.9/site-packages/ipaserver/install/dogtaginstance.py",
> line 227, in spawn_instance
>
> self.handle_setup_error(e)
>
> File
> "/usr/lib/python3.9/site-packages/ipaserver/install/dogtaginstance.py",
> line 604, in handle_setup_error
>
> raise RuntimeError(
>
> RuntimeError: CA configuration failed.
>
>
>
> 2024-04-01T09:41:34Z DEBUG [error] RuntimeError: CA configuration faile=
d.
>
> 2024-04-01T09:41:34Z DEBUG Removing /root/.dogtag/pki-tomcat/ca
>
> 2024-04-01T09:41:34Z DEBUG File
> "/usr/lib/python3.9/site-packages/ipapython/admintool.py", line 180, in
> execute
>
> return_value =3D self.run()
>
> File "/usr/lib/python3.9/site-packages/ipapython/install/cli.py", line
> 344, in run
>
> return cfgr.run()
>
> File "/usr/lib/python3.9/site-packages/ipapython/install/core.py",
> line 360, in run
>
> return self.execute()
>
> File "/usr/lib/python3.9/site-packages/ipapython/install/core.py",
> line 386, in execute
>
> for rval in self._executor():
>
> File "/usr/lib/python3.9/site-packages/ipapython/install/core.py",
> line 435, in __runner
>
> exc_handler(exc_info)
>
> File "/usr/lib/python3.9/site-packages/ipapython/install/core.py",
> line 468, in _handle_execute_exception
>
> self._handle_exception(exc_info)
>
> File "/usr/lib/python3.9/site-packages/ipapython/install/core.py",
> line 458, in _handle_exception
>
> six.reraise(*exc_info)
>
> File "/usr/lib/python3.9/site-packages/six.py", line 709, in reraise
>
> raise value
>
> File "/usr/lib/python3.9/site-packages/ipapython/install/core.py",
> line 425, in __runner
>
> step()
>
> File "/usr/lib/python3.9/site-packages/ipapython/install/core.py",
> line 419, in step_next
>
> return next(self.__gen)
>
> File "/usr/lib/python3.9/site-packages/ipapython/install/util.py",
> line 81, in run_generator_with_yield_from
>
> six.reraise(*exc_info)
>
> File "/usr/lib/python3.9/site-packages/six.py", line 709, in reraise
>
> raise value
>
> File "/usr/lib/python3.9/site-packages/ipapython/install/util.py",
> line 59, in run_generator_with_yield_from
>
> value =3D gen.send(prev_value)
>
> File "/usr/lib/python3.9/site-packages/ipapython/install/core.py",
> line 663, in _configure
>
> next(executor)
>
> File "/usr/lib/python3.9/site-packages/ipapython/install/core.py",
> line 435, in __runner
>
> exc_handler(exc_info)
>
> File "/usr/lib/python3.9/site-packages/ipapython/install/core.py",
> line 468, in _handle_execute_exception
>
> self._handle_exception(exc_info)
>
> File "/usr/lib/python3.9/site-packages/ipapython/install/core.py",
> line 526, in _handle_exception
>
> self.__parent._handle_exception(exc_info)
>
> File "/usr/lib/python3.9/site-packages/ipapython/install/core.py",
> line 458, in _handle_exception
>
> six.reraise(*exc_info)
>
> File "/usr/lib/python3.9/site-packages/six.py", line 709, in reraise
>
> raise value
>
> File "/usr/lib/python3.9/site-packages/ipapython/install/core.py",
> line 523, in _handle_exception
>
> super(ComponentBase, self)._handle_exception(exc_info)
>
> File "/usr/lib/python3.9/site-packages/ipapython/install/core.py",
> line 458, in _handle_exception
>
> six.reraise(*exc_info)
>
> File "/usr/lib/python3.9/site-packages/six.py", line 709, in reraise
>
> raise value
>
> File "/usr/lib/python3.9/site-packages/ipapython/install/core.py",
> line 425, in __runner
>
> step()
>
> File "/usr/lib/python3.9/site-packages/ipapython/install/core.py",
> line 419, in step_next
>
> return next(self.__gen)
>
> File "/usr/lib/python3.9/site-packages/ipapython/install/util.py",
> line 81, in run_generator_with_yield_from
>
> six.reraise(*exc_info)
>
> File "/usr/lib/python3.9/site-packages/six.py", line 709, in reraise
>
> raise value
>
> File "/usr/lib/python3.9/site-packages/ipapython/install/util.py",
> line 59, in run_generator_with_yield_from
>
> value =3D gen.send(prev_value)
>
> File "/usr/lib/python3.9/site-packages/ipapython/install/common.py",
> line 65, in _install
>
> for unused in self._installer(self.parent):
>
> File
> "/usr/lib/python3.9/site-packages/ipaserver/install/server/__init__.py",
> line 599, in main
>
> replica_install(self)
>
> File
> "/usr/lib/python3.9/site-packages/ipaserver/install/server/replicainstall=
.py",
> line 401, in decorated
>
> func(installer)
>
> File
> "/usr/lib/python3.9/site-packages/ipaserver/install/server/replicainstall=
.py",
> line 1345, in install
>
> ca.install(False, config, options, custodia=3Dcustodia)
>
> File "/usr/lib/python3.9/site-packages/ipaserver/install/ca.py", line
> 354, in install
>
> install_step_0(standalone, replica_config, options, custodia=3Dcustod=
ia)
>
> File "/usr/lib/python3.9/site-packages/ipaserver/install/ca.py", line
> 422, in install_step_0
>
> ca.configure_instance(
>
> File
> "/usr/lib/python3.9/site-packages/ipaserver/install/cainstance.py", line
> 506, in configure_instance
>
> self.start_creation(runtime=3Druntime)
>
> File "/usr/lib/python3.9/site-packages/ipaserver/install/service.py",
> line 686, in start_creation
>
> run_step(full_msg, method)
>
> File "/usr/lib/python3.9/site-packages/ipaserver/install/service.py",
> line 672, in run_step
>
> method()
>
> File
> "/usr/lib/python3.9/site-packages/ipaserver/install/cainstance.py", line
> 651, in __spawn_instance
>
> DogtagInstance.spawn_instance(
>
> File
> "/usr/lib/python3.9/site-packages/ipaserver/install/dogtaginstance.py",
> line 227, in spawn_instance
>
> self.handle_setup_error(e)
>
> File
> "/usr/lib/python3.9/site-packages/ipaserver/install/dogtaginstance.py",
> line 604, in handle_setup_error
>
> raise RuntimeError(
>
>
>
> 2024-04-01T09:41:34Z DEBUG The ipa-replica-install command failed,
> exception: RuntimeError: CA configuration failed.
>
> 2024-04-01T09:41:34Z ERROR CA configuration failed.
>
> 2024-04-01T09:41:34Z ERROR The ipa-replica-install command failed. See
> /var/log/ipareplica-install.log for more information
>
>
>
>
>
> *Cat /var/log/pki/pki-tomcat/ca/debug.2024-04-01.log*
>
>
>
>
>
>
>
> 2024-04-01 03:41:32 [main] INFO: CMSEngine: Disabling CA subsystem
>
> 2024-04-01 03:41:32 [main] SEVERE: Unable to start CA engine: Selftest
> failed: Invalid certificate Server-Cert cert-pki-ca: NotBefore: Mon Apr
> 01 03:41:49 CST 2024
>
> Selftest failed: Invalid certificate Server-Cert cert-pki-ca: NotBefore:
> Mon Apr 01 03:41:49 CST 2024
>
> at
> com.netscape.cmscore.selftests.SelfTestSubsystem.startup(SelfTestSubsyste=
m.java:1759)
>
> at
> com.netscape.cmscore.apps.CMSEngine.startupSubsystems(CMSEngine.java:1167)
>
> at
> org.dogtagpki.server.ca.CAEngine.startupSubsystems(CAEngine.java:972)
>
>
>
>
>
>
>
> 2024-04-01 03:41:32 [main] SEVERE: SelfTestSubsystem: selftest failed:
> Invalid certificate Server-Cert cert-pki-ca: NotBefore: Mon Apr 01
> 03:41:49 CST 2024
>
> java.lang.Exception: Invalid certificate Server-Cert cert-pki-ca:
> NotBefore: Mon Apr 01 03:41:49 CST 2024
>
> at
> com.netscape.cmscore.cert.CertUtils.verifySystemCertValidityByNickname(Ce=
rtUtils.java:844)
>
> at
> com.netscape.cmscore.apps.CMSEngine.verifySystemCertByTag(CMSEngine.java:=
1895)
>
> at
> com.netscape.cmscore.apps.CMSEngine.verifySystemCerts(CMSEngine.java:1823)
>
> at
> com.netscape.cms.selftests.common.SystemCertsVerification.runSelfTest(Sys=
temCertsVerification.java:211)
>
> at
> com.netscape.cmscore.selftests.SelfTestSubsystem.runSelfTestsAtStartup(Se=
lfTestSubsystem.java:818)
>
> at
> com.netscape.cmscore.selftests.SelfTestSubsystem.startup(SelfTestSubsyste=
m.java:1722)
>
> at
> com.netscape.cmscore.apps.CMSEngine.startupSubsystems(CMSEngine.java:1167)
>
> at
> org.dogtagpki.server.ca.CAEngine.startupSubsystems(CAEngine.java:972)
>
> at com.netscape.cmscore.apps.CMSEngine.start(CMSEngine.java:1223)
>
> at
> com.netscape.cmscore.apps.PKIWebListener.contextInitialized(PKIWebListene=
r.java:43)
>
> at
> org.apache.catalina.core.StandardContext.listenerStart(StandardContext.ja=
va:4768)
>
> at
> org.apache.catalina.core.StandardContext.startInternal(StandardContext.ja=
va:5230)
>
> at
> org.apache.catalina.util.LifecycleBase.start(LifecycleBase.java:183)
>
> at
> org.apache.catalina.core.ContainerBase.addChildInternal(ContainerBase.jav=
a:726)
>
> at
> org.apache.catalina.core.ContainerBase.access$000(ContainerBase.java:129)
>
> at
> org.apache.catalina.core.ContainerBase$PrivilegedAddChild.run(ContainerBa=
se.java:149)
>
> at
> org.apache.catalina.core.ContainerBase$PrivilegedAddChild.run(ContainerBa=
se.java:139)
>
> at
> java.base/java.security.AccessController.doPrivileged(AccessController.ja=
va:318)
>
> at
> org.apache.catalina.core.ContainerBase.addChild(ContainerBase.java:696)
>
> at
> org.apache.catalina.core.StandardHost.addChild(StandardHost.java:696)
>
> at
> org.apache.catalina.startup.HostConfig.deployDescriptor(HostConfig.java:6=
90)
>
> at
> org.apache.catalina.startup.HostConfig$DeployDescriptor.run(HostConfig.ja=
va:1889)
>
> at
> java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.j=
ava:539)
>
> at
> java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
>
> at
> org.apache.tomcat.util.threads.InlineExecutorService.execute(InlineExecut=
orService.java:75)
>
> at
> java.base/java.util.concurrent.AbstractExecutorService.submit(AbstractExe=
cutorService.java:123)
>
> at
> org.apache.catalina.startup.HostConfig.deployDescriptors(HostConfig.java:=
583)
>
> at
> org.apache.catalina.startup.HostConfig.deployApps(HostConfig.java:473)
>
> at
> org.apache.catalina.startup.HostConfig.start(HostConfig.java:1618)
>
> at
> org.apache.catalina.startup.HostConfig.lifecycleEvent(HostConfig.java:319)
>
> at
> org.apache.catalina.util.LifecycleBase.fireLifecycleEvent(LifecycleBase.j=
ava:123)
>
> at
> org.apache.catalina.util.LifecycleBase.setStateInternal(LifecycleBase.jav=
a:423)
>
> at
> org.apache.catalina.util.LifecycleBase.setState(LifecycleBase.java:366)
>
> at
> org.apache.catalina.core.ContainerBase.startInternal(ContainerBase.java:9=
46)
>
> at
> org.apache.catalina.core.StandardHost.startInternal(StandardHost.java:835)
>
> at
> org.apache.catalina.util.LifecycleBase.start(LifecycleBase.java:183)
>
> at
> org.apache.catalina.core.ContainerBase$StartChild.call(ContainerBase.java=
:1396)
>
> at
> org.apache.catalina.core.ContainerBase$StartChild.call(ContainerBase.java=
:1386)
>
> at
> java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
>
> at
> org.apache.tomcat.util.threads.InlineExecutorService.execute(InlineExecut=
orService.java:75)
>
> at
> java.base/java.util.concurrent.AbstractExecutorService.submit(AbstractExe=
cutorService.java:145)
>
> at
> org.apache.catalina.core.ContainerBase.startInternal(ContainerBase.java:9=
19)
>
> at
> org.apache.catalina.core.StandardEngine.startInternal(StandardEngine.java=
:263)
>
> at
> org.apache.catalina.util.LifecycleBase.start(LifecycleBase.java:183)
>
> at
> org.apache.catalina.core.StandardService.startInternal(StandardService.ja=
va:432)
>
> at
> org.apache.catalina.util.LifecycleBase.start(LifecycleBase.java:183)
>
> at
> org.apache.catalina.core.StandardServer.startInternal(StandardServer.java=
:927)
>
> at
> org.apache.catalina.util.LifecycleBase.start(LifecycleBase.java:183)
>
> at org.apache.catalina.startup.Catalina.start(Catalina.java:772)
>
> at
> java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native
> Method)
>
> at
> java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMeth=
odAccessorImpl.java:77)
>
> at
> java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Delega=
tingMethodAccessorImpl.java:43)
>
> at java.base/java.lang.reflect.Method.invoke(Method.java:568)
>
> at org.apache.catalina.startup.Bootstrap.start(Bootstrap.java:345)
>
> at org.apache.catalina.startup.Bootstrap.main(Bootstrap.java:476)
>
> Caused by: java.security.cert.CertificateNotYetValidException:
> NotBefore: Mon Apr 01 03:41:49 CST 2024
>
> at
> org.mozilla.jss.netscape.security.x509.CertificateValidity.valid(Certific=
ateValidity.java:302)
>
> at
> org.mozilla.jss.netscape.security.x509.X509CertImpl.checkValidity(X509Cer=
tImpl.java:494)
>
> at
> org.mozilla.jss.netscape.security.x509.X509CertImpl.checkValidity(X509Cer=
tImpl.java:466)
>
> at
> com.netscape.cmscore.cert.CertUtils.verifySystemCertValidityByNickname(Ce=
rtUtils.java:839)
>
> ... 54 more
>
>
>
> 2024-04-01 03:41:32 [main] SEVERE: SelfTestSubsystem: Disabling
> subsystem due to selftest failure: Invalid certificate Server-Cert
> cert-pki-ca: NotBefore: Mon Apr 01 03:41:49 CST 2024
>
> java.lang.Exception: Invalid certificate Server-Cert cert-pki-ca:
> NotBefore: Mon Apr 01 03:41:49 CST 2024
>
>
>
>
>
>
>
>
>
>
> *cat /var/log/pki/pki-tomcat/ca/selftests.log:*
>
>
>
> 0.main - [29/Mar/2024:03:28:24 GMT-06:00] [20] [1] CAPresence: CA is
> present
>
> 0.main - [29/Mar/2024:03:28:24 GMT-06:00] [20] [1]
> SystemCertsVerification: system certs verification failure: Invalid
> certificate Server-Cert cert-pki-ca: NotBefore: Fri Mar 29 03:28:37 CST 2=
024
>
> 0.main - [29/Mar/2024:03:28:24 GMT-06:00] [20] [1] SelfTestSubsystem:
> The CRITICAL self test plugin called
> selftests.container.instance.SystemCertsVerification running at startup
> FAILED!
>
> 0.main - [29/Mar/2024:04:03:13 GMT-06:00] [20] [1] SelfTestSubsystem:
> Initializing self test plugins:
>
> 0.main - [29/Mar/2024:04:03:13 GMT-06:00] [20] [1] SelfTestSubsystem:
> loading all self test plugin logger parameters
>
> 0.main - [29/Mar/2024:04:03:13 GMT-06:00] [20] [1] SelfTestSubsystem:
> loading all self test plugin instances
>
> 0.main - [29/Mar/2024:04:03:13 GMT-06:00] [20] [1] SelfTestSubsystem:
> loading all self test plugin instance parameters
>
> 0.main - [29/Mar/2024:04:03:13 GMT-06:00] [20] [1] SelfTestSubsystem:
> loading self test plugins in on-demand order
>
> 0.main - [29/Mar/2024:04:03:13 GMT-06:00] [20] [1] SelfTestSubsystem:
> loading self test plugins in startup order
>
> 0.main - [29/Mar/2024:04:03:13 GMT-06:00] [20] [1] SelfTestSubsystem:
> Self test plugins have been successfully loaded!
>
> 0.main - [29/Mar/2024:04:03:13 GMT-06:00] [20] [1] SelfTestSubsystem:
> Running self test plugins specified to be executed at startup:
>
> 0.main - [29/Mar/2024:04:03:13 GMT-06:00] [20] [1] CAPresence: CA is
> present
>
> 0.main - [29/Mar/2024:04:03:13 GMT-06:00] [20] [1]
> SystemCertsVerification: system certs verification failure: Invalid
> certificate Server-Cert cert-pki-ca: NotBefore: Fri Mar 29 04:03:27 CST 2=
024
>
> 0.main - [29/Mar/2024:04:03:13 GMT-06:00] [20] [1] SelfTestSubsystem:
> The CRITICAL self test plugin called
> selftests.container.instance.SystemCertsVerification running at startup
> FAILED!
>
> 0.main - [01/Apr/2024:03:41:32 GMT-06:00] [20] [1] SelfTestSubsystem:
> Initializing self test plugins:
>
> 0.main - [01/Apr/2024:03:41:32 GMT-06:00] [20] [1] SelfTestSubsystem:
> loading all self test plugin logger parameters
>
> 0.main - [01/Apr/2024:03:41:32 GMT-06:00] [20] [1] SelfTestSubsystem:
> loading all self test plugin instances
>
> 0.main - [01/Apr/2024:03:41:32 GMT-06:00] [20] [1] SelfTestSubsystem:
> loading all self test plugin instance parameters
>
> 0.main - [01/Apr/2024:03:41:32 GMT-06:00] [20] [1] SelfTestSubsystem:
> loading self test plugins in on-demand order
>
> 0.main - [01/Apr/2024:03:41:32 GMT-06:00] [20] [1] SelfTestSubsystem:
> loading self test plugins in startup order
>
> 0.main - [01/Apr/2024:03:41:32 GMT-06:00] [20] [1] SelfTestSubsystem:
> Self test plugins have been successfully loaded!
>
> 0.main - [01/Apr/2024:03:41:32 GMT-06:00] [20] [1] SelfTestSubsystem:
> Running self test plugins specified to be executed at startup:
>
> 0.main - [01/Apr/2024:03:41:32 GMT-06:00] [20] [1] CAPresence: CA is
> present
>
> 0.main - [01/Apr/2024:03:41:32 GMT-06:00] [20] [1]
> SystemCertsVerification: system certs verification failure: Invalid
> certificate Server-Cert cert-pki-ca: NotBefore: Mon Apr 01 03:41:49 CST 2=
024
>
> 0.main - [01/Apr/2024:03:41:32 GMT-06:00] [20] [1] SelfTestSubsystem:
> The CRITICAL self test plugin called
> selftests.container.instance.SystemCertsVerification running at startup
> FAILED!
>
>
>
>
>
>
>
>
>
>
> ------------------------------------------------------------------------
>
> DISCLAIMER: The information in this message is confidential and may be
> legally privileged. It is intended solely for the addressee. Access to
> this message by anyone else is unauthorized. If you are not the intended
> recipient, any disclosure, copying, or distribution of the message, or
> any action or omission taken by you in reliance on it, is prohibited and
> may be unlawful. Please immediately contact the sender if you have
> received this message in error. Further, this e-mail may contain viruses
> and all reasonable precaution to minimize the risk arising there from is
> taken by OnMobile. OnMobile is not liable for any damage sustained by
> you as a result of any virus in this e-mail. All applicable virus checks
> should be carried out by you before opening this e-mail or any
> attachment thereto.
> Thank you - OnMobile Global Limited.
>
> --
> _______________________________________________
> FreeIPA-users mailing list -- freeipa-users(a)lists.fedorahosted.org
> To unsubscribe send an email to freeipa-users-leave(a)lists.fedorahosted.=
org
> Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code=
-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives: https://lists.fedorahosted.org/archives/list/freeipa-users=
(a)lists.fedorahosted.org
> Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/=
new_issue
>
________________________________
DISCLAIMER: The information in this message is confidential and may be lega=
lly privileged. It is intended solely for the addressee. Access to this mes=
sage by anyone else is unauthorized. If you are not the intended recipient,=
any disclosure, copying, or distribution of the message, or any action or =
omission taken by you in reliance on it, is prohibited and may be unlawful.=
Please immediately contact the sender if you have received this message in=
error. Further, this e-mail may contain viruses and all reasonable precaut=
ion to minimize the risk arising there from is taken by OnMobile. OnMobile =
is not liable for any damage sustained by you as a result of any virus in t=
his e-mail. All applicable virus checks should be carried out by you before=
opening this e-mail or any attachment thereto.
Thank you - OnMobile Global Limited.
--===============7193989110349146529==--
From antoine.gatineau at infra-monkey.com Tue Apr 2 09:42:35 2024
Content-Type: multipart/mixed; boundary="===============0132619415277158581=="
MIME-Version: 1.0
From: Antoine Gatineau
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: ACME certs fail to renew
Date: Tue, 02 Apr 2024 11:42:18 +0200
Message-ID:
In-Reply-To: 2e47af52-bfd8-251a-4739-5918abff075c@redhat.com
--===============0132619415277158581==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Hello Rob,
Thank you for replying quickly.
As far as I could see, the apache config is good.
All the 'ipa cert-*' and 'ipa ca-*' were working properly.
This only command not working was ipa-acme-manage (and the certbot renew =
obviously).
I tried adding a replica and acme was available and working on the new =
replica which rules out the ldap content I guess.
I then reinstalled my replicas and everything is working properly now.
So fixed, but I still don't know what happened :/
Best regards
On 4/1/24 16:46, Rob Crittenden via FreeIPA-users wrote:
> Antoine Gatineau via FreeIPA-users wrote:
>> Hello,
>>
>> I have a strange issue regarding acme service.
>> My acme certificates fail to renew. `ipa-acme-manage status`fails with
>> error:
>> Failed to authenticate to CA REST API
>> The ipa-acme-manage command failed.
>>
>> certbot client fails with error "Failed to renew certificate
>> office.empire.lan with error: "
>>
>> $ ipa cert-show 49
>> =C2=A0Issuing CA: ipa
>> =C2=A0Certificate: "The certificate content"
>> =C2=A0Subject: CN=3Doffice.empire.lan
>> =C2=A0Subject DNS name: office.empire.lan
>> =C2=A0Issuer: CN=3DCertificate Authority,O=3DEMPIRE.LAN
>> =C2=A0Not Before: Sun Dec 24 14:05:50 2023 UTC
>> =C2=A0Not After: Sat Mar 23 14:05:50 2024 UTC
>> =C2=A0Serial number: 49
>> =C2=A0Serial number (hex): 0x31
>> =C2=A0Revoked: False
>>
>> So last successful renewal was on Dec 24th. Since then I have not really
>> done anything appart updating.
>> I don't see any issue in ipaupgrade.log
>>
>>
>> I am running on centos stream 9
>> idm-jss.x86_64
>> 5.5.0-1.el9
>> idm-jss-tomcat.x86_64
>> 5.5.0-1.el9
>> idm-ldapjdk.noarch
>> 5.5.0-1.el9
>> idm-pki-acme.noarch
>> 11.5.0-1.el9
>> idm-pki-base.noarch
>> 11.5.0-1.el9
>> idm-pki-ca.noarch
>> 11.5.0-1.el9
>> idm-pki-java.noarch
>> 11.5.0-1.el9
>> idm-pki-kra.noarch
>> 11.5.0-1.el9
>> idm-pki-server.noarch
>> 11.5.0-1.el9
>> idm-pki-tools.x86_64
>> 11.5.0-1.el9
>> ipa-client.x86_64
>> 4.11.0-9.el9
>> ipa-client-common.noarch
>> 4.11.0-9.el9
>> ipa-common.noarch
>> 4.11.0-9.el9
>> ipa-healthcheck.noarch
>> 0.16-2.el9
>> ipa-healthcheck-core.noarch
>> 0.16-2.el9
>> ipa-selinux.noarch
>> 4.11.0-9.el9
>> ipa-server.x86_64
>> 4.11.0-9.el9
>> ipa-server-common.noarch
>> 4.11.0-9.el9
>> ipa-server-dns.noarch
>> 4.11.0-9.el9
>>
>> I have followed closely the update on centos stream 9
>>
>> Running=C2=A0 `ipa-acme-manage status` with the -d switch gives me
>> ipapython.ipaldap: DEBUG: retrieving schema for SchemaCache
>> url=3Dldapi://%2fvar%2frun%2fslapd-EMPIRE-LAN.socket
>> conn=3D
>> ipaserver.masters: DEBUG: Discovery: available servers for service 'CA'
>> are ipa-server-01.empire.lan, ipa-server-02.empire.lan
>> ipaserver.masters: DEBUG: Discovery: using ipa-server-01.empire.lan for
>> 'CA' service
>> ipapython.dogtag: DEBUG: request POST
>> https://ipa-server-01.empire.lan:8443/acme/login
>> ipapython.dogtag: DEBUG: request body ''
>> ipapython.dogtag: DEBUG: response status 404
>> ipapython.dogtag: DEBUG: response headers Content-Type:
>> text/html;charset=3Dutf-8
>> Content-Language: en
>> Content-Length: 765
>> Date: Thu, 28 Mar 2024 10:00:59 GMT
>>
>>
>> ipapython.dogtag: DEBUG: response body (decoded): b'> lang=3D"en">HTTP Status 404 \xe2\x80\x93 Not
>> Found<=
h1>HTTP
>> Status 404 \xe2\x80\x93 Not Found
Type
>> Status Report
Message The requested resource
>> [/acme/login] is not available
Description The
>> origin server did not find a current representation for the target
>> resource or is not willing to disclose that one exists.
> class=3D"line" />Apache Tomcat/9.0.62
'
>> ipapython.admintool: DEBUG:=C2=A0=C2=A0 File
>> "/usr/lib/python3.9/site-packages/ipapython/admintool.py", line 180, in
>> execute
>> =C2=A0=C2=A0=C2=A0 return_value =3D self.run()
>> =C2=A0 File
>> "/usr/lib/python3.9/site-packages/ipaserver/install/ipa_acme_manage.py",
>> line 403, in run
>> =C2=A0=C2=A0=C2=A0 with state as ca_api:
>> =C2=A0 File
>> "/usr/lib/python3.9/site-packages/ipaserver/install/ipa_acme_manage.py",
>> line 103, in __enter__
>> =C2=A0=C2=A0=C2=A0 raise errors.RemoteRetrieveError(
>>
>> ipapython.admintool: DEBUG: The ipa-acme-manage command failed,
>> exception: RemoteRetrieveError: Failed to authenticate to CA REST API
>> ipapython.admintool: ERROR: Failed to authenticate to CA REST API
>> ipapython.admintool: ERROR: The ipa-acme-manage command failed.
>>
>>
>> So it looks like the acme subsystem is not started. But logs for the
>> acme subsystem in /var/log/pki/pki-tomcat/acme/debug.2024-03-28.log
>> don't show any issue. (see attached log)
>>
>> How can I go further in troubleshooting/fixing this issue?
> I'd start by verifying that your CA is functioning. Something like ipa
> cert-find.
>
> Since you got a 404 (not found) I'd make sure that
> /etc/httpd/conf.d/ipa-pki-proxy.conf contains:
>
>
> ...
>
> rob
> --
> _______________________________________________
> FreeIPA-users mailing list --freeipa-users(a)lists.fedorahosted.org
> To unsubscribe send an email tofreeipa-users-leave(a)lists.fedorahosted.o=
rg
> Fedora Code of Conduct:https://docs.fedoraproject.org/en-US/project/code-=
of-conduct/
> List Guidelines:https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives:https://lists.fedorahosted.org/archives/list/freeipa-users(=
a)lists.fedorahosted.org
> Do not reply to spam, report it:https://pagure.io/fedora-infrastructure/n=
ew_issue
--===============0132619415277158581==
Content-Type: text/html
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="attachment.html"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--===============0132619415277158581==--
From natxo.asenjo at gmail.com Tue Apr 2 11:53:58 2024
Content-Type: multipart/mixed; boundary="===============7684751959741233397=="
MIME-Version: 1.0
From: Natxo Asenjo
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: upgrade idm servers rhel 7 to 8 problems
Date: Tue, 02 Apr 2024 13:53:57 +0200
Message-ID:
In-Reply-To: CAHBEJzVurZhcJ0xKWxSh6ByfV1Dq_xBkYFB2tELruUQ4XA1=6Q@mail.gmail.com
--===============7684751959741233397==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
hi,
On Tue, Mar 26, 2024 at 2:47=E2=80=AFPM Natxo Asenjo wrote:
> hi,
>
> posting back to the list.
>
> Apparently the idm server cannot find a SID of a domain when trying to
> resolve the user account. It does find the user account, but there are
> sids coupled to the account correspondig to a domain wich cannot be
> resolved.
>
> It took me a while but the sid of that child domain is not the one not
> resolved.
>
> It turns out, the sid of the domain not resolving is the one of the idm
> realm itself., we have some idm groups mapped to the AD groups we allow =
in
> idm for rbac, and if I look at the ipaNTSecurityIdentifier attributes of
> the id groups, those are the not resolved groups.
>
> This is unexpected (to me at least).
>
> so we have this trust (verified on two different idm servers, same value):
>
> ipa trust-find
> ---------------
> 1 trust matched
> ---------------
> Realm name: domain.local
> Domain NetBIOS name: DOMAIN
> Domain Security Identifier: S-1-5-21-1416133915-1866970209-3316290679
> Trust type: Active Directory domain
> ----------------------------
> Number of entries returned 1
>
> but inside this idm domain, we have some idm posix groups with the
> ipantsecurityidentifier of the not resolvable domain, for instance:
> S-1-5-21-1214650608-3976977395-3073169311-101072
>
> So basically, it is not matching because of this ipantsecurityidentifier,
> I think.
>
> I do not know how to fix this at this moment, or why it has happened. Any
> ideas?
>
>
I wonder if somebody with more sssd knowlegde than me could push me in the
right direction. Is it maybe better to ask in the sssd mailing list?
Regards,
Natxo Asenjo
-- =
--
Groeten,
natxo
--===============7684751959741233397==
Content-Type: text/html
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="attachment.html"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--===============7684751959741233397==--
From twest at cherryroad.com Tue Apr 2 14:46:30 2024
Content-Type: multipart/mixed; boundary="===============2347200955789866149=="
MIME-Version: 1.0
From: Travis West
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: CA Subsystem certificate
Date: Tue, 02 Apr 2024 14:46:08 +0000
Message-ID: <20240402144608.27639.62976@mailman01.iad2.fedoraproject.org>
In-Reply-To: d8211363-9aaf-fb92-34b1-ab53e1706c38@redhat.com
--===============2347200955789866149==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
I noticed some issues with the newly generated certs in my previous update.=
I have again generated new certs that this time have the Subject correct.
I can delete the bad certs that contain errant Principal from /etc/pki/pki-=
tomcat/alias and import the new ones. Then update the CA Subsystem Certifi=
cate in LDAP using ldapmodify and an updatecert.ldif, as well as update the=
cert and certreq values in /etc/pki/pki-tomcat/ca/CS.cfg.
What I am unclear on is how to fix the certmonger tracking so it isn't trac=
king the certs with the errant Principal.
--===============2347200955789866149==--
From rcritten at redhat.com Tue Apr 2 15:13:44 2024
Content-Type: multipart/mixed; boundary="===============8481345720656655802=="
MIME-Version: 1.0
From: Rob Crittenden
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: ACME certs fail to renew
Date: Tue, 02 Apr 2024 11:13:31 -0400
Message-ID: <6227664c-26a4-0128-5273-895135609bda@redhat.com>
In-Reply-To: a642f913-a8d7-4b2f-b79e-13f391e5d8c2@infra-monkey.com
--===============8481345720656655802==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Antoine Gatineau via FreeIPA-users wrote:
> Hello Rob,
> =
> Thank you for replying quickly.
> =
> As far as I could see, the apache config is good.
> All the 'ipa cert-*' and 'ipa ca-*' were working properly.
> =
> This only command not working was ipa-acme-manage (and the certbot renew
> obviously).
> =
> I tried adding a replica and acme was available and working on the new
> replica which rules out the ldap content I guess.
> I then reinstalled my replicas and everything is working properly now.
> =
> So fixed, but I still don't know what happened :/
Yes, rather unsatisfying. But on the other hand I'm glad its working
again for you.
ipa-healthcheck might be something to look into. I think it would have
alerted you to the issue earlier since ipa-acme-manage was failing.
Thanks for following up.
rob
> =
> Best regards
> =
> On 4/1/24 16:46, Rob Crittenden via FreeIPA-users wrote:
>> Antoine Gatineau via FreeIPA-users wrote:
>>> Hello,
>>>
>>> I have a strange issue regarding acme service.
>>> My acme certificates fail to renew. `ipa-acme-manage status`fails with
>>> error:
>>> Failed to authenticate to CA REST API
>>> The ipa-acme-manage command failed.
>>>
>>> certbot client fails with error "Failed to renew certificate
>>> office.empire.lan with error: "
>>>
>>> $ ipa cert-show 49
>>> =C2=A0Issuing CA: ipa
>>> =C2=A0Certificate: "The certificate content"
>>> =C2=A0Subject: CN=3Doffice.empire.lan
>>> =C2=A0Subject DNS name: office.empire.lan
>>> =C2=A0Issuer: CN=3DCertificate Authority,O=3DEMPIRE.LAN
>>> =C2=A0Not Before: Sun Dec 24 14:05:50 2023 UTC
>>> =C2=A0Not After: Sat Mar 23 14:05:50 2024 UTC
>>> =C2=A0Serial number: 49
>>> =C2=A0Serial number (hex): 0x31
>>> =C2=A0Revoked: False
>>>
>>> So last successful renewal was on Dec 24th. Since then I have not really
>>> done anything appart updating.
>>> I don't see any issue in ipaupgrade.log
>>>
>>>
>>> I am running on centos stream 9
>>> idm-jss.x86_64=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0
>>> 5.5.0-1.el9
>>> idm-jss-tomcat.x86_64=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0
>>> 5.5.0-1.el9
>>> idm-ldapjdk.noarch=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0
>>> 5.5.0-1.el9
>>> idm-pki-acme.noarch=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0
>>> 11.5.0-1.el9
>>> idm-pki-base.noarch=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0
>>> 11.5.0-1.el9
>>> idm-pki-ca.noarch=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0
>>> 11.5.0-1.el9
>>> idm-pki-java.noarch=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0
>>> 11.5.0-1.el9
>>> idm-pki-kra.noarch=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0
>>> 11.5.0-1.el9
>>> idm-pki-server.noarch=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0
>>> 11.5.0-1.el9
>>> idm-pki-tools.x86_64=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0
>>> 11.5.0-1.el9
>>> ipa-client.x86_64=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0
>>> 4.11.0-9.el9
>>> ipa-client-common.noarch=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0
>>> 4.11.0-9.el9
>>> ipa-common.noarch=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0
>>> 4.11.0-9.el9
>>> ipa-healthcheck.noarch=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0
>>> 0.16-2.el9
>>> ipa-healthcheck-core.noarch=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0
>>> 0.16-2.el9
>>> ipa-selinux.noarch=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0
>>> 4.11.0-9.el9
>>> ipa-server.x86_64=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0
>>> 4.11.0-9.el9
>>> ipa-server-common.noarch=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0
>>> 4.11.0-9.el9
>>> ipa-server-dns.noarch=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0
>>> 4.11.0-9.el9
>>>
>>> I have followed closely the update on centos stream 9
>>>
>>> Running=C2=A0 `ipa-acme-manage status` with the -d switch gives me
>>> ipapython.ipaldap: DEBUG: retrieving schema for SchemaCache
>>> url=3Dldapi://%2fvar%2frun%2fslapd-EMPIRE-LAN.socket
>>> conn=3D
>>> ipaserver.masters: DEBUG: Discovery: available servers for service 'CA'
>>> are ipa-server-01.empire.lan, ipa-server-02.empire.lan
>>> ipaserver.masters: DEBUG: Discovery: using ipa-server-01.empire.lan for
>>> 'CA' service
>>> ipapython.dogtag: DEBUG: request POST
>>> https://ipa-server-01.empire.lan:8443/acme/login
>>> ipapython.dogtag: DEBUG: request body ''
>>> ipapython.dogtag: DEBUG: response status 404
>>> ipapython.dogtag: DEBUG: response headers Content-Type:
>>> text/html;charset=3Dutf-8
>>> Content-Language: en
>>> Content-Length: 765
>>> Date: Thu, 28 Mar 2024 10:00:59 GMT
>>>
>>>
>>> ipapython.dogtag: DEBUG: response body (decoded): b'>> lang=3D"en">HTTP Status 404 \xe2\x80\x93 Not
>>> Found=
HTTP
>>> Status 404 \xe2\x80\x93 Not Found
Type=
b>
>>> Status Report
Message The requested resource
>>> [/acme/login] is not available
Description The
>>> origin server did not find a current representation for the target
>>> resource or is not willing to disclose that one exists.
>> class=3D"line" />Apache Tomcat/9.0.62
'
>>> ipapython.admintool: DEBUG:=C2=A0=C2=A0 File
>>> "/usr/lib/python3.9/site-packages/ipapython/admintool.py", line 180, in
>>> execute
>>> =C2=A0=C2=A0=C2=A0 return_value =3D self.run()
>>> =C2=A0 File
>>> "/usr/lib/python3.9/site-packages/ipaserver/install/ipa_acme_manage.py",
>>> line 403, in run
>>> =C2=A0=C2=A0=C2=A0 with state as ca_api:
>>> =C2=A0 File
>>> "/usr/lib/python3.9/site-packages/ipaserver/install/ipa_acme_manage.py",
>>> line 103, in __enter__
>>> =C2=A0=C2=A0=C2=A0 raise errors.RemoteRetrieveError(
>>>
>>> ipapython.admintool: DEBUG: The ipa-acme-manage command failed,
>>> exception: RemoteRetrieveError: Failed to authenticate to CA REST API
>>> ipapython.admintool: ERROR: Failed to authenticate to CA REST API
>>> ipapython.admintool: ERROR: The ipa-acme-manage command failed.
>>>
>>>
>>> So it looks like the acme subsystem is not started. But logs for the
>>> acme subsystem in /var/log/pki/pki-tomcat/acme/debug.2024-03-28.log
>>> don't show any issue. (see attached log)
>>>
>>> How can I go further in troubleshooting/fixing this issue?
>> I'd start by verifying that your CA is functioning. Something like ipa
>> cert-find.
>>
>> Since you got a 404 (not found) I'd make sure that
>> /etc/httpd/conf.d/ipa-pki-proxy.conf contains:
>>
>>
>> ...
>>
>> rob
>> --
>> _______________________________________________
>> FreeIPA-users mailing list -- freeipa-users(a)lists.fedorahosted.org
>> To unsubscribe send an email to freeipa-users-leave(a)lists.fedorahosted=
.org
>> Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/cod=
e-of-conduct/
>> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
>> List Archives: https://lists.fedorahosted.org/archives/list/freeipa-user=
s(a)lists.fedorahosted.org
>> Do not reply to spam, report it: https://pagure.io/fedora-infrastructure=
/new_issue
> =
> --
> _______________________________________________
> FreeIPA-users mailing list -- freeipa-users(a)lists.fedorahosted.org
> To unsubscribe send an email to freeipa-users-leave(a)lists.fedorahosted.=
org
> Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code=
-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives: https://lists.fedorahosted.org/archives/list/freeipa-users=
(a)lists.fedorahosted.org
> Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/=
new_issue
>=20
--===============8481345720656655802==--
From twest at cherryroad.com Tue Apr 2 17:01:05 2024
Content-Type: multipart/mixed; boundary="===============2777939498898176192=="
MIME-Version: 1.0
From: Travis West
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: CA Subsystem certificate
Date: Tue, 02 Apr 2024 17:00:43 +0000
Message-ID: <20240402170043.24503.79818@mailman01.iad2.fedoraproject.org>
In-Reply-To: d8211363-9aaf-fb92-34b1-ab53e1706c38@redhat.com
--===============2777939498898176192==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Okay, I've sort of fixed the tracking, but there is still an issue I can't =
seem to solve. Here is the tracking now for the Audit, OCSP, and Subsystem=
certificates
Number of certificates and requests being tracked: 9.
Request ID '20190322032029':
status: MONITORING
stuck: no
key pair storage: type=3DNSSDB,location=3D'/etc/pki/pki-tomcat/alia=
s',nickname=3D'auditSigningCert cert-pki-ca',token=3D'NSS Certificate DB',p=
in set
certificate: type=3DNSSDB,location=3D'/etc/pki/pki-tomcat/alias',ni=
ckname=3D'auditSigningCert cert-pki-ca',token=3D'NSS Certificate DB'
CA: dogtag-ipa-ca-renew-agent
issuer: CN=3DCertificate Authority,O=3DIPA.****.NET
subject: O=3DIPA.****.NET,CN=3D"CA Audit "
expires: 2034-03-31 14:24:53 UTC
key usage: digitalSignature,nonRepudiation
pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert "audit=
SigningCert cert-pki-ca"
track: yes
auto-renew: yes
[root(a)ipa1-sea2 ~]# getcert list -i 20190322032030
Number of certificates and requests being tracked: 9.
Request ID '20190322032030':
status: MONITORING
stuck: no
key pair storage: type=3DNSSDB,location=3D'/etc/pki/pki-tomcat/alia=
s',nickname=3D'ocspSigningCert cert-pki-ca',token=3D'NSS Certificate DB',pi=
n set
certificate: type=3DNSSDB,location=3D'/etc/pki/pki-tomcat/alias',ni=
ckname=3D'ocspSigningCert cert-pki-ca',token=3D'NSS Certificate DB'
CA: dogtag-ipa-ca-renew-agent
issuer: CN=3DCertificate Authority,O=3DIPA.****.NET
subject: O=3DIPA.****.NET,CN=3D"OCSP Subsystem "
expires: 2034-03-31 14:15:41 UTC
key usage: digitalSignature,nonRepudiation
pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert "ocspS=
igningCert cert-pki-ca"
track: yes
auto-renew: yes
[root(a)ipa1-sea2 ~]# getcert list -i 20190322032031
Number of certificates and requests being tracked: 9.
Request ID '20190322032031':
status: MONITORING
stuck: no
key pair storage: type=3DNSSDB,location=3D'/etc/pki/pki-tomcat/alia=
s',nickname=3D'subsystemCert cert-pki-ca',token=3D'NSS Certificate DB',pin =
set
certificate: type=3DNSSDB,location=3D'/etc/pki/pki-tomcat/alias',ni=
ckname=3D'subsystemCert cert-pki-ca',token=3D'NSS Certificate DB'
CA: dogtag-ipa-ca-renew-agent
issuer: CN=3DCertificate Authority,O=3DIPA.****.NET
subject: O=3DIPA.****.NET,CN=3D"CA Subsystem "
expires: 2034-03-31 14:40:33 UTC
key usage: digitalSignature,nonRepudiation
pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert "subsy=
stemCert cert-pki-ca"
track: yes
In each of these the Subject line has the CN and O backwards. If I look at=
the certificates themselves, they have it listed correctly
# openssl pkcs12 -info -in audit.p12
MAC Iteration 2048
MAC verified OK
PKCS7 Encrypted data: pbeWithSHA1And40BitRC2-CBC, Iteration 2048
Certificate bag
Bag Attributes
localKeyID: A8 74 8A 94 58 C0 9E 28 3F 55 B9 F7 AC 9D 78 33 8E D3 C6 E3
friendlyName: auditSigningCert cert-pki-ca
subject=3D/CN=3DCA Audit /O=3DIPA.****.NET
issuer=3D/O=3DIPA.****.NET/CN=3DCertificate Authority
So I'm confused as to how the 'getcert' output has the items in Subject rev=
ersed.
--===============2777939498898176192==--
From rcritten at redhat.com Tue Apr 2 17:43:41 2024
Content-Type: multipart/mixed; boundary="===============0450599058800764293=="
MIME-Version: 1.0
From: Rob Crittenden
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: CA Subsystem certificate
Date: Tue, 02 Apr 2024 13:43:27 -0400
Message-ID: <57e61cbc-946b-1fcf-5cc0-bb403d2e2dba@redhat.com>
In-Reply-To: 20240402170043.24503.79818@mailman01.iad2.fedoraproject.org
--===============0450599058800764293==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Travis West via FreeIPA-users wrote:
> Okay, I've sort of fixed the tracking, but there is still an issue I can'=
t seem to solve. Here is the tracking now for the Audit, OCSP, and Subsyst=
em certificates
> =
> Number of certificates and requests being tracked: 9.
> Request ID '20190322032029':
> status: MONITORING
> stuck: no
> key pair storage: type=3DNSSDB,location=3D'/etc/pki/pki-tomcat/al=
ias',nickname=3D'auditSigningCert cert-pki-ca',token=3D'NSS Certificate DB'=
,pin set
> certificate: type=3DNSSDB,location=3D'/etc/pki/pki-tomcat/alias',=
nickname=3D'auditSigningCert cert-pki-ca',token=3D'NSS Certificate DB'
> CA: dogtag-ipa-ca-renew-agent
> issuer: CN=3DCertificate Authority,O=3DIPA.****.NET
> subject: O=3DIPA.****.NET,CN=3D"CA Audit "
> expires: 2034-03-31 14:24:53 UTC
> key usage: digitalSignature,nonRepudiation
> pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
> post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert "aud=
itSigningCert cert-pki-ca"
> track: yes
> auto-renew: yes
> [root(a)ipa1-sea2 ~]# getcert list -i 20190322032030
> Number of certificates and requests being tracked: 9.
> Request ID '20190322032030':
> status: MONITORING
> stuck: no
> key pair storage: type=3DNSSDB,location=3D'/etc/pki/pki-tomcat/al=
ias',nickname=3D'ocspSigningCert cert-pki-ca',token=3D'NSS Certificate DB',=
pin set
> certificate: type=3DNSSDB,location=3D'/etc/pki/pki-tomcat/alias',=
nickname=3D'ocspSigningCert cert-pki-ca',token=3D'NSS Certificate DB'
> CA: dogtag-ipa-ca-renew-agent
> issuer: CN=3DCertificate Authority,O=3DIPA.****.NET
> subject: O=3DIPA.****.NET,CN=3D"OCSP Subsystem "
> expires: 2034-03-31 14:15:41 UTC
> key usage: digitalSignature,nonRepudiation
> pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
> post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert "ocs=
pSigningCert cert-pki-ca"
> track: yes
> auto-renew: yes
> [root(a)ipa1-sea2 ~]# getcert list -i 20190322032031
> Number of certificates and requests being tracked: 9.
> Request ID '20190322032031':
> status: MONITORING
> stuck: no
> key pair storage: type=3DNSSDB,location=3D'/etc/pki/pki-tomcat/al=
ias',nickname=3D'subsystemCert cert-pki-ca',token=3D'NSS Certificate DB',pi=
n set
> certificate: type=3DNSSDB,location=3D'/etc/pki/pki-tomcat/alias',=
nickname=3D'subsystemCert cert-pki-ca',token=3D'NSS Certificate DB'
> CA: dogtag-ipa-ca-renew-agent
> issuer: CN=3DCertificate Authority,O=3DIPA.****.NET
> subject: O=3DIPA.****.NET,CN=3D"CA Subsystem "
> expires: 2034-03-31 14:40:33 UTC
> key usage: digitalSignature,nonRepudiation
> pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
> post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert "sub=
systemCert cert-pki-ca"
> track: yes
> =
> In each of these the Subject line has the CN and O backwards. If I look =
at the certificates themselves, they have it listed correctly
> =
> # openssl pkcs12 -info -in audit.p12
> MAC Iteration 2048
> MAC verified OK
> PKCS7 Encrypted data: pbeWithSHA1And40BitRC2-CBC, Iteration 2048
> Certificate bag
> Bag Attributes
> localKeyID: A8 74 8A 94 58 C0 9E 28 3F 55 B9 F7 AC 9D 78 33 8E D3 C6 =
E3
> friendlyName: auditSigningCert cert-pki-ca
> subject=3D/CN=3DCA Audit /O=3DIPA.****.NET
> issuer=3D/O=3DIPA.****.NET/CN=3DCertificate Authority
> =
> So I'm confused as to how the 'getcert' output has the items in Subject r=
eversed.
The OpenSSL and NSS libraries merely display the data differently. It's
fine.
But you still have an issue with the certificates. You have a trailing
space after at least the audit, subsystem and OCSP certs. I think you
tried to quote only that when generating the subject rather than the
entire thing.
So
O=3DIPA.****.NET,"CN=3DCA Audit "
rather than
"O=3DIPA.****.NET,CN=3DCA Audit"
Once the certificates are valid you can try running ipa-server-upgrade.
It should repair bad tracking.
But with the strange subjects I'm not sure what will happen. What I do
know is that "CA Audit " !=3D "CA Audit" in a subject.
rob
--===============0450599058800764293==--
From twest at cherryroad.com Tue Apr 2 17:49:31 2024
Content-Type: multipart/mixed; boundary="===============4794598822245335276=="
MIME-Version: 1.0
From: Travis West
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: CA Subsystem certificate
Date: Tue, 02 Apr 2024 17:49:11 +0000
Message-ID: <20240402174911.32543.79418@mailman01.iad2.fedoraproject.org>
In-Reply-To: 57e61cbc-946b-1fcf-5cc0-bb403d2e2dba@redhat.com
--===============4794598822245335276==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
This was the command I used to generate the CSRs
openssl req -new -sha256 -key subsystem.key -subj "/CN=3DCA Subsystem /O=3D=
IPA.****.NET" -out subsystem.csr
But I guess that results in the extra space. So perhaps it should be
openssl req -new -sha256 -key subsystem.key -subj "/CN=3DCA Subsystem,/O=3D=
IPA.***.NET" -out subsystem.csr (?)
Apologies for all the questions that might seem pretty basic. Just trying =
to get this figured out.
--===============4794598822245335276==--
From twest at cherryroad.com Tue Apr 2 18:50:26 2024
Content-Type: multipart/mixed; boundary="===============5841305817446791003=="
MIME-Version: 1.0
From: Travis West
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: CA Subsystem certificate
Date: Tue, 02 Apr 2024 18:50:02 +0000
Message-ID: <20240402185002.11469.96367@mailman01.iad2.fedoraproject.org>
In-Reply-To: 57e61cbc-946b-1fcf-5cc0-bb403d2e2dba@redhat.com
--===============5841305817446791003==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Okay, I've generated new certs that don't have the extra space. Once those=
were imported to the NSS DB I also updated the CS.cfg with the new cert an=
d certreq vaules for OCSP, Audit, and Subsystem.
I also did an ldapsearch for the Subsystem certificate to make sure it matc=
hes. I then tried to run ipa-server-upgrade, but it failed.
Tracking Requests:
Request ID '20190322032031':
status: MONITORING
stuck: no
key pair storage: type=3DNSSDB,location=3D'/etc/pki/pki-tomcat/alia=
s',nickname=3D'subsystemCert cert-pki-ca',token=3D'NSS Certificate DB',pin =
set
certificate: type=3DNSSDB,location=3D'/etc/pki/pki-tomcat/alias',ni=
ckname=3D'subsystemCert cert-pki-ca',token=3D'NSS Certificate DB'
CA: dogtag-ipa-ca-renew-agent
issuer: CN=3DCertificate Authority,O=3DIPA.****.NET
subject: O=3DIPA.****.NET,CN=3DCA Subsystem
expires: 2034-03-31 17:57:15 UTC
key usage: digitalSignature,nonRepudiation
pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert "subsy=
stemCert cert-pki-ca"
track: yes
auto-renew: yes
Request ID '20190322032030':
status: MONITORING
stuck: no
key pair storage: type=3DNSSDB,location=3D'/etc/pki/pki-tomcat/alia=
s',nickname=3D'ocspSigningCert cert-pki-ca',token=3D'NSS Certificate DB',pi=
n set
certificate: type=3DNSSDB,location=3D'/etc/pki/pki-tomcat/alias',ni=
ckname=3D'ocspSigningCert cert-pki-ca',token=3D'NSS Certificate DB'
CA: dogtag-ipa-ca-renew-agent
issuer: CN=3DCertificate Authority,O=3DIPA.****.NET
subject: O=3DIPA.****.NET,CN=3DOCSP Subsystem
expires: 2034-03-31 18:02:29 UTC
key usage: digitalSignature,nonRepudiation
pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert "ocspS=
igningCert cert-pki-ca"
track: yes
auto-renew: yes
Request ID '20190322032029':
status: MONITORING
stuck: no
key pair storage: type=3DNSSDB,location=3D'/etc/pki/pki-tomcat/alia=
s',nickname=3D'auditSigningCert cert-pki-ca',token=3D'NSS Certificate DB',p=
in set
certificate: type=3DNSSDB,location=3D'/etc/pki/pki-tomcat/alias',ni=
ckname=3D'auditSigningCert cert-pki-ca',token=3D'NSS Certificate DB'
CA: dogtag-ipa-ca-renew-agent
issuer: CN=3DCertificate Authority,O=3DIPA.****.NET
subject: O=3DIPA.****.NET,CN=3DCA Audit
expires: 2034-03-31 18:00:11 UTC
key usage: digitalSignature,nonRepudiation
pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert "audit=
SigningCert cert-pki-ca"
track: yes
auto-renew: yes
Subsystem in LDAP matches the NSS DB
# ldapsearch -LLL -D 'cn=3Ddirectory manager' -W -b uid=3Dpkidbuser,ou=3Dpe=
ople,o=3Dipaca userCertificate description seeAlso
Enter LDAP Password:
dn: uid=3Dpkidbuser,ou=3Dpeople,o=3Dipaca
userCertificate:: MIIDNjCCA...EyISxo3w=3D=3D
description: 2;4;CN=3DCertificate Authority,O=3DIPA.****.NET;CN=3DCA Subsys=
tem,O=3DIPA.***.NET
seeAlso: CN=3DCA Subsystem,O=3DIPA****.NET
[root(a)ipa1-sea2 log]# certutil -L -d /etc/pki/pki-tomcat/alias -n 'subsys=
temCert cert-pki-ca' -a
-----BEGIN CERTIFICATE-----
MIIDNjCCA...EyISxo3w=3D=3D
-----END CERTIFICATE-----
[root(a)ipa1-sea2 log]# certutil -L -d /etc/pki/pki-tomcat/alias -n 'subsys=
temCert cert-pki-ca' | grep Serial
Serial Number: 4 (0x4)
*note the Serial in LDAP is '4' while in NSS DB it shows as 4 (0x4) not su=
re if this is the issue.
Output of ipa-server-upgrade
# ipa-server-upgrade
Upgrading IPA:. Estimated time: 1 minute 30 seconds
[1/11]: stopping directory server
[2/11]: saving configuration
[3/11]: disabling listeners
[4/11]: enabling DS global lock
[5/11]: disabling Schema Compat
[6/11]: starting directory server
[7/11]: updating schema
[8/11]: upgrading server
[9/11]: stopping directory server
[10/11]: restoring configuration
[11/11]: starting directory server
Done.
Update complete
Upgrading IPA services
Upgrading the configuration of the IPA services
[Verifying that root certificate is published]
[Migrate CRL publish directory]
Publish directory already set to new location
[Verifying that CA proxy configuration is correct]
IPA server upgrade failed: Inspect /var/log/ipaupgrade.log and run command =
ipa-server-upgrade manually.
CA did not start in 300.0s
Output in the /var/log/pki/pki-tomcat/ca/system log while the ugprade was r=
unning
2024-04-02T18:30:11Z DEBUG response body 'Apache Tomcat/=
7.0.76 - Error report HTTP Status 500 - Sub=
system unavailable
type Ex=
ception report
message Subsystem unavailable
d=
escription The server encountered an internal error that prevented i=
t from fulfilling this requ
est.
exception
javax.ws.rs.ServiceUnavailableExcepti=
on: Subsystem unavailable\n\tcom.netscape.cms.tomcat.ProxyRealm.findSecurit=
yConstraints(ProxyRealm.java:145)\n\torg.apache.catalina.authenticator.Auth=
enticatorBase.invoke(AuthenticatorBase.java:500)\n\torg.apache.catalina.val=
ves.ErrorReportValve.invoke(ErrorReportValve.java:103)\n\torg.apache.catali=
na.valves.AccessLogValve.invoke(AccessLogValve.java:962)\n\torg.apache.cata=
lina.connector.CoyoteAdapter.service(CoyoteAdapter.java:445)\n\torg.apache.=
coyote.http11.AbstractHttp11Processor.process(AbstractHttp11Processor.java:=
1087)\n\torg.apache.coyote.AbstractProtocol$AbstractConnectionHandler.proce=
ss(AbstractProtocol.java:637)\n\torg.apache.tomcat.util.net.JIoEndpoint$Soc=
ketProcessor.run(JIoEndpoint.java:316)\n\tjava.util.concurrent.ThreadPoolEx=
ecutor.runWorker(ThreadPoolExecutor.java:1149)\n\tjava.util.concurrent.Thre=
adPoolExecutor$Worker.run(ThreadPoolExecutor.java:624)\n\torg.apache.tomcat=
.util.threads.TaskThrea
d$WrappingRunnable.run(TaskThread.java:61)\n\tjava.lang.Thread.run(Thread.=
java:748)\n
note The full stack trace of the root cau=
se is available in the Apache Tomcat/7.0.76 logs.
Apache Tomcat/7.0.76
'
2024-04-02T18:30:11Z DEBUG The CA status is: check interrupted due to error=
: Retrieving CA status failed with status 500
2024-04-02T18:30:11Z DEBUG Waiting for CA to start...
2024-04-02T18:30:12Z DEBUG request POST http://ipa1-sea2.ipa.****.net:8080/=
ca/admin/ca/getStatus
2024-04-02T18:30:12Z DEBUG request body ''
2024-04-02T18:30:12Z DEBUG response status 500
2024-04-02T18:30:12Z DEBUG response headers Server: Apache-Coyote/1.1
Content-Type: text/html;charset=3Dutf-8
Content-Language: en
Content-Length: 2208
Date: Tue, 02 Apr 2024 18:30:12 GMT
Connection: close
2024-04-02T18:30:12Z DEBUG response body 'Apache Tomcat/=
7.0.76 - Error report HTTP Status 500 - Sub=
system unavailable
type Ex=
ception report
message Subsystem unavailable
d=
escription The server encountered an internal error that prevented i=
t from fulfilling this requ
est.
exception
javax.ws.rs.ServiceUnavailableExcepti=
on: Subsystem unavailable\n\tcom.netscape.cms.tomcat.ProxyRealm.findSecurit=
yConstraints(ProxyRealm.java:145)\n\torg.apache.catalina.authenticator.Auth=
enticatorBase.invoke(AuthenticatorBase.java:500)\n\torg.apache.catalina.val=
ves.ErrorReportValve.invoke(ErrorReportValve.java:103)\n\torg.apache.catali=
na.valves.AccessLogValve.invoke(AccessLogValve.java:962)\n\torg.apache.cata=
lina.connector.CoyoteAdapter.service(CoyoteAdapter.java:445)\n\torg.apache.=
coyote.http11.AbstractHttp11Processor.process(AbstractHttp11Processor.java:=
1087)\n\torg.apache.coyote.AbstractProtocol$AbstractConnectionHandler.proce=
ss(AbstractProtocol.java:637)\n\torg.apache.tomcat.util.net.JIoEndpoint$Soc=
ketProcessor.run(JIoEndpoint.java:316)\n\tjava.util.concurrent.ThreadPoolEx=
ecutor.runWorker(ThreadPoolExecutor.java:1149)\n\tjava.util.concurrent.Thre=
adPoolExecutor$Worker.run(ThreadPoolExecutor.java:624)\n\torg.apache.tomcat=
.util.threads.TaskThrea
d$WrappingRunnable.run(TaskThread.java:61)\n\tjava.lang.Thread.run(Thread.=
java:748)\n
note The full stack trace of the root cau=
se is available in the Apache Tomcat/7.0.76 logs.
Apache Tomcat/7.0.76
'
2024-04-02T18:30:12Z DEBUG The CA status is: check interrupted due to error=
: Retrieving CA status failed with status 500
2024-04-02T18:30:12Z DEBUG Waiting for CA to start...
--===============5841305817446791003==--
From djerkg at gmail.com Tue Apr 2 19:21:28 2024
Content-Type: multipart/mixed; boundary="===============2005170388216019969=="
MIME-Version: 1.0
From: Djerk Geurts
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] CA_UNREACHABLE when requesting from Ubuntu 20.04 to
FreeIPA v4.11.1
Date: Tue, 02 Apr 2024 21:20:30 +0200
Message-ID:
--===============2005170388216019969==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Hi,
A month or so ago we upgraded from Fedora 37 to 39. I guess this is the fir=
st time I=E2=80=99m getting round to requesting a new certificate, and it=
=E2=80=99s failing from a server we use to manage several certificates for =
non-IPA client hosts.
Output of ipa-getcert list:
Request ID '20240402190326':
status: CA_UNREACHABLE
ca-error: Server at https://ipa.domain.com/ipa/xml failed request, =
will retry: 903 (RPC failed at server. an internal error has occurred).
stuck: no
key pair storage: type=3DFILE,location=3D'/etc/ssl/private/host.dom=
ain.com.key'
certificate: type=3DFILE,location=3D'/etc/ssl/certs/host.domain.com=
.crt'
CA: IPA
issuer:
subject:
expires: unknown
pre-save command:
post-save command:
track: yes
auto-renew: yes
The httpd log on the IPA server:
[Tue Apr 02 21:03:26.989287 2024] [wsgi:error] [pid 1606:tid 1957] [remote =
10.2.0.92:50078] ipa: ERROR: non-public: ValueError: Only single-valued att=
ributes are supported
[Tue Apr 02 21:03:26.989320 2024] [wsgi:error] [pid 1606:tid 1957] [remote =
10.2.0.92:50078] Traceback (most recent call last):
[Tue Apr 02 21:03:26.989326 2024] [wsgi:error] [pid 1606:tid 1957] [remote =
10.2.0.92:50078] File "/usr/lib/python3.12/site-packages/ipaserver/rpcser=
ver.py", line 417, in wsgi_execute
[Tue Apr 02 21:03:26.989330 2024] [wsgi:error] [pid 1606:tid 1957] [remote =
10.2.0.92:50078] result =3D command(*args, **options)
[Tue Apr 02 21:03:26.989333 2024] [wsgi:error] [pid 1606:tid 1957] [remote =
10.2.0.92:50078] ^^^^^^^^^^^^^^^^^^^^^^^^^
[Tue Apr 02 21:03:26.989337 2024] [wsgi:error] [pid 1606:tid 1957] [remote =
10.2.0.92:50078] File "/usr/lib/python3.12/site-packages/ipalib/frontend.=
py", line 471, in __call__
[Tue Apr 02 21:03:26.989341 2024] [wsgi:error] [pid 1606:tid 1957] [remote =
10.2.0.92:50078] return self.__do_call(*args, **options)
[Tue Apr 02 21:03:26.989345 2024] [wsgi:error] [pid 1606:tid 1957] [remote =
10.2.0.92:50078] ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[Tue Apr 02 21:03:26.989348 2024] [wsgi:error] [pid 1606:tid 1957] [remote =
10.2.0.92:50078] File "/usr/lib/python3.12/site-packages/ipalib/frontend.=
py", line 499, in __do_call
[Tue Apr 02 21:03:26.989353 2024] [wsgi:error] [pid 1606:tid 1957] [remote =
10.2.0.92:50078] ret =3D self.run(*args, **options)
[Tue Apr 02 21:03:26.989358 2024] [wsgi:error] [pid 1606:tid 1957] [remote =
10.2.0.92:50078] ^^^^^^^^^^^^^^^^^^^^^^^^^^
[Tue Apr 02 21:03:26.989371 2024] [wsgi:error] [pid 1606:tid 1957] [remote =
10.2.0.92:50078] File "/usr/lib/python3.12/site-packages/ipalib/frontend.=
py", line 816, in run
[Tue Apr 02 21:03:26.989376 2024] [wsgi:error] [pid 1606:tid 1957] [remote =
10.2.0.92:50078] return self.execute(*args, **options)
[Tue Apr 02 21:03:26.989381 2024] [wsgi:error] [pid 1606:tid 1957] [remote =
10.2.0.92:50078] ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[Tue Apr 02 21:03:26.989385 2024] [wsgi:error] [pid 1606:tid 1957] [remote =
10.2.0.92:50078] File "/usr/lib/python3.12/site-packages/ipaserver/plugin=
s/cert.py", line 716, in execute
[Tue Apr 02 21:03:26.989389 2024] [wsgi:error] [pid 1606:tid 1957] [remote =
10.2.0.92:50078] ext_san =3D csr.extensions.get_extension_for_oid(
[Tue Apr 02 21:03:26.989392 2024] [wsgi:error] [pid 1606:tid 1957] [remote =
10.2.0.92:50078] ^^^^^^^^^^^^^^
[Tue Apr 02 21:03:26.989396 2024] [wsgi:error] [pid 1606:tid 1957] [remote =
10.2.0.92:50078] ValueError: Only single-valued attributes are supported
[Tue Apr 02 21:03:26.989527 2024] [wsgi:error] [pid 1606:tid 1957] [remote =
10.2.0.92:50078] ipa: INFO: [xmlserver] host/jump.domain.com(a)DOMAIN.COM: =
cert_request(=E2=80=98MIID**********d1A=3D=3D', principal=3D'HTTP/host.doma=
in.com(a)DOMAIN.COM', add=3DTrue, version=3D'2.51'): InternalError
The requesting machine is allowed to manage both the host and the service. =
Requesting the certificate on the IPA server itself works fine. I=E2=80=99v=
e read elsewhere that this could be an incompatibility between the client a=
nd the server.
Client: Ubuntu 20.04 LTS, ipa-client: v4.8.6
Server: Fedora 39, ipa-server: v4.11.1
Thanks,
Djerk Geurts
--===============2005170388216019969==
Content-Type: text/html
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="attachment.html"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--===============2005170388216019969==--
From rcritten at redhat.com Tue Apr 2 20:29:45 2024
Content-Type: multipart/mixed; boundary="===============1476138008628651452=="
MIME-Version: 1.0
From: Rob Crittenden
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: CA_UNREACHABLE when requesting from Ubuntu 20.04
to FreeIPA v4.11.1
Date: Tue, 02 Apr 2024 16:29:16 -0400
Message-ID: <4fc2d325-c935-293a-38c2-bd2c89e20a80@redhat.com>
In-Reply-To: C00BAEEA-A8BE-4810-8516-DB1C9A058057@gmail.com
--===============1476138008628651452==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Djerk Geurts via FreeIPA-users wrote:
> Hi,
> =
> A month or so ago we upgraded from Fedora 37 to 39. I guess this is the
> first time I=E2=80=99m getting round to requesting a new certificate, and=
it=E2=80=99s
> failing from a server we use to manage several certificates for non-IPA
> client hosts.
> =
> Output of ipa-getcert list:
> =
> Request ID '20240402190326':
> =C2=A0 =C2=A0 =C2=A0 =C2=A0 status: CA_UNREACHABLE
> =C2=A0 =C2=A0 =C2=A0 =C2=A0 ca-error: Server at https://ipa.domain.com/ip=
a/xml failed
> request, will retry: 903 (RPC failed at server. =C2=A0an internal error h=
as
> occurred).
> =C2=A0 =C2=A0 =C2=A0 =C2=A0 stuck: no
> =C2=A0 =C2=A0 =C2=A0 =C2=A0 key pair storage:
> type=3DFILE,location=3D'/etc/ssl/private/host.domain.com.key'
> =C2=A0 =C2=A0 =C2=A0 =C2=A0 certificate: type=3DFILE,location=3D'/etc/ssl=
/certs/host.domain.com.crt'
> =C2=A0 =C2=A0 =C2=A0 =C2=A0 CA: IPA
> =C2=A0 =C2=A0 =C2=A0 =C2=A0 issuer:
> =C2=A0 =C2=A0 =C2=A0 =C2=A0 subject:
> =C2=A0 =C2=A0 =C2=A0 =C2=A0 expires: unknown
> =C2=A0 =C2=A0 =C2=A0 =C2=A0 pre-save command:
> =C2=A0 =C2=A0 =C2=A0 =C2=A0 post-save command:
> =C2=A0 =C2=A0 =C2=A0 =C2=A0 track: yes
> =C2=A0 =C2=A0 =C2=A0 =C2=A0 auto-renew: yes
> =
> The httpd log on the IPA server:
> =
> [Tue Apr 02 21:03:26.989287 2024] [wsgi:error] [pid 1606:tid 1957]
> [remote 10.2.0.92:50078] ipa: ERROR: non-public: ValueError: Only
> single-valued attributes are supported
> [Tue Apr 02 21:03:26.989320 2024] [wsgi:error] [pid 1606:tid 1957]
> [remote 10.2.0.92:50078] Traceback (most recent call last):
> [Tue Apr 02 21:03:26.989326 2024] [wsgi:error] [pid 1606:tid 1957]
> [remote 10.2.0.92:50078] =C2=A0 File
> "/usr/lib/python3.12/site-packages/ipaserver/rpcserver.py", line 417, in
> wsgi_execute
> [Tue Apr 02 21:03:26.989330 2024] [wsgi:error] [pid 1606:tid 1957]
> [remote 10.2.0.92:50078] =C2=A0 =C2=A0 result =3D command(*args, **option=
s)
> [Tue Apr 02 21:03:26.989333 2024] [wsgi:error] [pid 1606:tid 1957]
> [remote 10.2.0.92:50078] =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0=
^^^^^^^^^^^^^^^^^^^^^^^^^
> [Tue Apr 02 21:03:26.989337 2024] [wsgi:error] [pid 1606:tid 1957]
> [remote 10.2.0.92:50078] =C2=A0 File
> "/usr/lib/python3.12/site-packages/ipalib/frontend.py", line 471, in
> __call__
> [Tue Apr 02 21:03:26.989341 2024] [wsgi:error] [pid 1606:tid 1957]
> [remote 10.2.0.92:50078] =C2=A0 =C2=A0 return self.__do_call(*args, **opt=
ions)
> [Tue Apr 02 21:03:26.989345 2024] [wsgi:error] [pid 1606:tid 1957]
> [remote 10.2.0.92:50078] =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0^^^^^^^=
^^^^^^^^^^^^^^^^^^^^^^^^^
> [Tue Apr 02 21:03:26.989348 2024] [wsgi:error] [pid 1606:tid 1957]
> [remote 10.2.0.92:50078] =C2=A0 File
> "/usr/lib/python3.12/site-packages/ipalib/frontend.py", line 499, in
> __do_call
> [Tue Apr 02 21:03:26.989353 2024] [wsgi:error] [pid 1606:tid 1957]
> [remote 10.2.0.92:50078] =C2=A0 =C2=A0 ret =3D self.run(*args, **options)
> [Tue Apr 02 21:03:26.989358 2024] [wsgi:error] [pid 1606:tid 1957]
> [remote 10.2.0.92:50078] =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 ^^^^^^^^^^^^^=
^^^^^^^^^^^^^
> [Tue Apr 02 21:03:26.989371 2024] [wsgi:error] [pid 1606:tid 1957]
> [remote 10.2.0.92:50078] =C2=A0 File
> "/usr/lib/python3.12/site-packages/ipalib/frontend.py", line 816, in run
> [Tue Apr 02 21:03:26.989376 2024] [wsgi:error] [pid 1606:tid 1957]
> [remote 10.2.0.92:50078] =C2=A0 =C2=A0 return self.execute(*args, **optio=
ns)
> [Tue Apr 02 21:03:26.989381 2024] [wsgi:error] [pid 1606:tid 1957]
> [remote 10.2.0.92:50078] =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0^^^^^^^=
^^^^^^^^^^^^^^^^^^^^^^^
> [Tue Apr 02 21:03:26.989385 2024] [wsgi:error] [pid 1606:tid 1957]
> [remote 10.2.0.92:50078] =C2=A0 File
> "/usr/lib/python3.12/site-packages/ipaserver/plugins/cert.py", line 716,
> in execute
> [Tue Apr 02 21:03:26.989389 2024] [wsgi:error] [pid 1606:tid 1957]
> [remote 10.2.0.92:50078] =C2=A0 =C2=A0 ext_san =3D csr.extensions.get_ext=
ension_for_oid(
> [Tue Apr 02 21:03:26.989392 2024] [wsgi:error] [pid 1606:tid 1957]
> [remote 10.2.0.92:50078] =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0=
^^^^^^^^^^^^^^
> [Tue Apr 02 21:03:26.989396 2024] [wsgi:error] [pid 1606:tid 1957]
> [remote 10.2.0.92:50078] ValueError: Only single-valued attributes are
> supported
> [Tue Apr 02 21:03:26.989527 2024] [wsgi:error] [pid 1606:tid 1957]
> [remote 10.2.0.92:50078] ipa: INFO: [xmlserver]
> host/jump.domain.com(a)DOMAIN.COM: cert_request(=E2=80=98MIID**********d1=
A=3D=3D',
> principal=3D'HTTP/host.domain.com(a)DOMAIN.COM', add=3DTrue, version=3D'2=
.51'):
> InternalError
> =
> The requesting machine is allowed to manage both the host and the
> service. Requesting the certificate on the IPA server itself works fine.
> I=E2=80=99ve read elsewhere that this could be an incompatibility between=
the
> client and the server.
> =
> Client: Ubuntu 20.04 LTS, ipa-client: v4.8.6
> Server: Fedora 39, ipa-server: v4.11.1
Can we see the whole CSR? You should be able to find it in the
certmonger request file in /var/lib/certmonger/requests/
Sometimes the value matches the Request ID but not always.
It is the parsing of the CSR where it blew up, getting multiple values
where only one was expected.
rob
--===============1476138008628651452==--
From djerkg at gmail.com Tue Apr 2 21:19:26 2024
Content-Type: multipart/mixed; boundary="===============3755633632377654232=="
MIME-Version: 1.0
From: Djerk Geurts
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: CA_UNREACHABLE when requesting from Ubuntu 20.04
to FreeIPA v4.11.1
Date: Tue, 02 Apr 2024 23:18:58 +0200
Message-ID: <54F27E16-870F-446D-8C84-312C2CDE632A@gmail.com>
In-Reply-To: 4fc2d325-c935-293a-38c2-bd2c89e20a80@redhat.com
--===============3755633632377654232==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Hi Rob,
Here=E2=80=99s the content of the CSR:
-----BEGIN NEW CERTIFICATE REQUEST-----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3D=3D
-----END NEW CERTIFICATE REQUEST-----
I can=E2=80=99t see any difference between this CSR and others that worked =
before. Could it be an issue with an updated version of ipa-client or opens=
sl? I tested issuing a new certificate from a Ubuntu 22.04 host and that wo=
rked just fine. Openssl on Ubuntu 20.04 is 1.1.1f while Ubuntu 22.04 have v=
3.0.2.
The certificate ws requested with: sudo ipa-getcert request -N ${service} -=
K HTTP/${service} -k /etc/ssl/private/${service}.key -f /etc/ssl/certs/${se=
rvice}.crt -D ${service} -A $(host -t A ${service} | awk 'NF>1{print $NF}=
=E2=80=99)
Which has worked fine for us for over two years.
Thanks,
Djerk Geurts
> On 2 Apr 2024, at 22:29, Rob Crittenden wrote:
> =
> Djerk Geurts via FreeIPA-users wrote:
>> Hi,
>> =
>> A month or so ago we upgraded from Fedora 37 to 39. I guess this is the
>> first time I=E2=80=99m getting round to requesting a new certificate, an=
d it=E2=80=99s
>> failing from a server we use to manage several certificates for non-IPA
>> client hosts.
>> =
>> Output of ipa-getcert list:
>> =
>> Request ID '20240402190326':
>> status: CA_UNREACHABLE
>> ca-error: Server at https://ipa.domain.com/ipa/xml failed
>> request, will retry: 903 (RPC failed at server. an internal error has
>> occurred).
>> stuck: no
>> key pair storage:
>> type=3DFILE,location=3D'/etc/ssl/private/host.domain.com.key'
>> certificate: type=3DFILE,location=3D'/etc/ssl/certs/host.domain.=
com.crt'
>> CA: IPA
>> issuer:
>> subject:
>> expires: unknown
>> pre-save command:
>> post-save command:
>> track: yes
>> auto-renew: yes
>> =
>> The httpd log on the IPA server:
>> =
>> [Tue Apr 02 21:03:26.989287 2024] [wsgi:error] [pid 1606:tid 1957]
>> [remote 10.2.0.92:50078] ipa: ERROR: non-public: ValueError: Only
>> single-valued attributes are supported
>> [Tue Apr 02 21:03:26.989320 2024] [wsgi:error] [pid 1606:tid 1957]
>> [remote 10.2.0.92:50078] Traceback (most recent call last):
>> [Tue Apr 02 21:03:26.989326 2024] [wsgi:error] [pid 1606:tid 1957]
>> [remote 10.2.0.92:50078] File
>> "/usr/lib/python3.12/site-packages/ipaserver/rpcserver.py", line 417, in
>> wsgi_execute
>> [Tue Apr 02 21:03:26.989330 2024] [wsgi:error] [pid 1606:tid 1957]
>> [remote 10.2.0.92:50078] result =3D command(*args, **options)
>> [Tue Apr 02 21:03:26.989333 2024] [wsgi:error] [pid 1606:tid 1957]
>> [remote 10.2.0.92:50078] ^^^^^^^^^^^^^^^^^^^^^^^^^
>> [Tue Apr 02 21:03:26.989337 2024] [wsgi:error] [pid 1606:tid 1957]
>> [remote 10.2.0.92:50078] File
>> "/usr/lib/python3.12/site-packages/ipalib/frontend.py", line 471, in
>> __call__
>> [Tue Apr 02 21:03:26.989341 2024] [wsgi:error] [pid 1606:tid 1957]
>> [remote 10.2.0.92:50078] return self.__do_call(*args, **options)
>> [Tue Apr 02 21:03:26.989345 2024] [wsgi:error] [pid 1606:tid 1957]
>> [remote 10.2.0.92:50078] ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>> [Tue Apr 02 21:03:26.989348 2024] [wsgi:error] [pid 1606:tid 1957]
>> [remote 10.2.0.92:50078] File
>> "/usr/lib/python3.12/site-packages/ipalib/frontend.py", line 499, in
>> __do_call
>> [Tue Apr 02 21:03:26.989353 2024] [wsgi:error] [pid 1606:tid 1957]
>> [remote 10.2.0.92:50078] ret =3D self.run(*args, **options)
>> [Tue Apr 02 21:03:26.989358 2024] [wsgi:error] [pid 1606:tid 1957]
>> [remote 10.2.0.92:50078] ^^^^^^^^^^^^^^^^^^^^^^^^^^
>> [Tue Apr 02 21:03:26.989371 2024] [wsgi:error] [pid 1606:tid 1957]
>> [remote 10.2.0.92:50078] File
>> "/usr/lib/python3.12/site-packages/ipalib/frontend.py", line 816, in run
>> [Tue Apr 02 21:03:26.989376 2024] [wsgi:error] [pid 1606:tid 1957]
>> [remote 10.2.0.92:50078] return self.execute(*args, **options)
>> [Tue Apr 02 21:03:26.989381 2024] [wsgi:error] [pid 1606:tid 1957]
>> [remote 10.2.0.92:50078] ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>> [Tue Apr 02 21:03:26.989385 2024] [wsgi:error] [pid 1606:tid 1957]
>> [remote 10.2.0.92:50078] File
>> "/usr/lib/python3.12/site-packages/ipaserver/plugins/cert.py", line 716,
>> in execute
>> [Tue Apr 02 21:03:26.989389 2024] [wsgi:error] [pid 1606:tid 1957]
>> [remote 10.2.0.92:50078] ext_san =3D csr.extensions.get_extension_fo=
r_oid(
>> [Tue Apr 02 21:03:26.989392 2024] [wsgi:error] [pid 1606:tid 1957]
>> [remote 10.2.0.92:50078] ^^^^^^^^^^^^^^
>> [Tue Apr 02 21:03:26.989396 2024] [wsgi:error] [pid 1606:tid 1957]
>> [remote 10.2.0.92:50078] ValueError: Only single-valued attributes are
>> supported
>> [Tue Apr 02 21:03:26.989527 2024] [wsgi:error] [pid 1606:tid 1957]
>> [remote 10.2.0.92:50078] ipa: INFO: [xmlserver]
>> host/jump.domain.com(a)DOMAIN.COM: cert_request(=E2=80=98MIID**********d=
1A=3D=3D',
>> principal=3D'HTTP/host.domain.com(a)DOMAIN.COM', add=3DTrue, version=3D'=
2.51'):
>> InternalError
>> =
>> The requesting machine is allowed to manage both the host and the
>> service. Requesting the certificate on the IPA server itself works fine.
>> I=E2=80=99ve read elsewhere that this could be an incompatibility betwee=
n the
>> client and the server.
>> =
>> Client: Ubuntu 20.04 LTS, ipa-client: v4.8.6
>> Server: Fedora 39, ipa-server: v4.11.1
> =
> Can we see the whole CSR? You should be able to find it in the
> certmonger request file in /var/lib/certmonger/requests/
> Sometimes the value matches the Request ID but not always.
> =
> It is the parsing of the CSR where it blew up, getting multiple values
> where only one was expected.
> =
> rob
--===============3755633632377654232==
Content-Type: text/html
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="attachment.html"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--===============3755633632377654232==--
From flo at redhat.com Tue Apr 2 21:45:54 2024
Content-Type: multipart/mixed; boundary="===============4798691185936436901=="
MIME-Version: 1.0
From: Florence Blanc-Renaud
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: CA Subsystem certificate
Date: Tue, 02 Apr 2024 23:45:26 +0200
Message-ID:
In-Reply-To: 20240402185002.11469.96367@mailman01.iad2.fedoraproject.org
--===============4798691185936436901==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Hi,
On Tue, Apr 2, 2024 at 8:50=E2=80=AFPM Travis West via FreeIPA-users <
freeipa-users(a)lists.fedorahosted.org> wrote:
> Okay, I've generated new certs that don't have the extra space. Once
> those were imported to the NSS DB I also updated the CS.cfg with the new
> cert and certreq vaules for OCSP, Audit, and Subsystem.
> I also did an ldapsearch for the Subsystem certificate to make sure it
> matches. I then tried to run ipa-server-upgrade, but it failed.
>
> Tracking Requests:
>
> Request ID '20190322032031':
> status: MONITORING
> stuck: no
> key pair storage:
> type=3DNSSDB,location=3D'/etc/pki/pki-tomcat/alias',nickname=3D'subsystem=
Cert
> cert-pki-ca',token=3D'NSS Certificate DB',pin set
> certificate:
> type=3DNSSDB,location=3D'/etc/pki/pki-tomcat/alias',nickname=3D'subsystem=
Cert
> cert-pki-ca',token=3D'NSS Certificate DB'
> CA: dogtag-ipa-ca-renew-agent
> issuer: CN=3DCertificate Authority,O=3DIPA.****.NET
> subject: O=3DIPA.****.NET,CN=3DCA Subsystem
>
As Rob wrote, it's not a problem that getcert list, OpenssL and NSS
libraries show the subject in a DN order (RFC2253) or DN reverse order, but
I find it suspect that issuer and subject have picked inconsistent order.
In my f35 instance, getcert list shows the following:
issuer: CN=3DCertificate Authority,O=3DIPA.TEST
subject: CN=3DCA Subsystem,O=3DIPA.TEST
flo
expires: 2034-03-31 17:57:15 UTC
> key usage: digitalSignature,nonRepudiation
> pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
> post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert
> "subsystemCert cert-pki-ca"
> track: yes
> auto-renew: yes
>
> Request ID '20190322032030':
> status: MONITORING
> stuck: no
> key pair storage:
> type=3DNSSDB,location=3D'/etc/pki/pki-tomcat/alias',nickname=3D'ocspSigni=
ngCert
> cert-pki-ca',token=3D'NSS Certificate DB',pin set
> certificate:
> type=3DNSSDB,location=3D'/etc/pki/pki-tomcat/alias',nickname=3D'ocspSigni=
ngCert
> cert-pki-ca',token=3D'NSS Certificate DB'
> CA: dogtag-ipa-ca-renew-agent
> issuer: CN=3DCertificate Authority,O=3DIPA.****.NET
> subject: O=3DIPA.****.NET,CN=3DOCSP Subsystem
> expires: 2034-03-31 18:02:29 UTC
> key usage: digitalSignature,nonRepudiation
> pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
> post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert
> "ocspSigningCert cert-pki-ca"
> track: yes
> auto-renew: yes
>
> Request ID '20190322032029':
> status: MONITORING
> stuck: no
> key pair storage:
> type=3DNSSDB,location=3D'/etc/pki/pki-tomcat/alias',nickname=3D'auditSign=
ingCert
> cert-pki-ca',token=3D'NSS Certificate DB',pin set
> certificate:
> type=3DNSSDB,location=3D'/etc/pki/pki-tomcat/alias',nickname=3D'auditSign=
ingCert
> cert-pki-ca',token=3D'NSS Certificate DB'
> CA: dogtag-ipa-ca-renew-agent
> issuer: CN=3DCertificate Authority,O=3DIPA.****.NET
> subject: O=3DIPA.****.NET,CN=3DCA Audit
> expires: 2034-03-31 18:00:11 UTC
> key usage: digitalSignature,nonRepudiation
> pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
> post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert
> "auditSigningCert cert-pki-ca"
> track: yes
> auto-renew: yes
>
> Subsystem in LDAP matches the NSS DB
>
> # ldapsearch -LLL -D 'cn=3Ddirectory manager' -W -b
> uid=3Dpkidbuser,ou=3Dpeople,o=3Dipaca userCertificate description seeAlso
> Enter LDAP Password:
> dn: uid=3Dpkidbuser,ou=3Dpeople,o=3Dipaca
> userCertificate:: MIIDNjCCA...EyISxo3w=3D=3D
> description: 2;4;CN=3DCertificate Authority,O=3DIPA.****.NET;CN=3DCA
> Subsystem,O=3DIPA.***.NET
> seeAlso: CN=3DCA Subsystem,O=3DIPA****.NET
>
> [root(a)ipa1-sea2 log]# certutil -L -d /etc/pki/pki-tomcat/alias -n
> 'subsystemCert cert-pki-ca' -a
> -----BEGIN CERTIFICATE-----
> MIIDNjCCA...EyISxo3w=3D=3D
> -----END CERTIFICATE-----
> [root(a)ipa1-sea2 log]# certutil -L -d /etc/pki/pki-tomcat/alias -n
> 'subsystemCert cert-pki-ca' | grep Serial
> Serial Number: 4 (0x4)
>
> *note the Serial in LDAP is '4' while in NSS DB it shows as 4 (0x4) not
> sure if this is the issue.
>
> Output of ipa-server-upgrade
>
> # ipa-server-upgrade
> Upgrading IPA:. Estimated time: 1 minute 30 seconds
> [1/11]: stopping directory server
> [2/11]: saving configuration
> [3/11]: disabling listeners
> [4/11]: enabling DS global lock
> [5/11]: disabling Schema Compat
> [6/11]: starting directory server
> [7/11]: updating schema
> [8/11]: upgrading server
> [9/11]: stopping directory server
> [10/11]: restoring configuration
> [11/11]: starting directory server
> Done.
> Update complete
> Upgrading IPA services
> Upgrading the configuration of the IPA services
> [Verifying that root certificate is published]
> [Migrate CRL publish directory]
> Publish directory already set to new location
> [Verifying that CA proxy configuration is correct]
> IPA server upgrade failed: Inspect /var/log/ipaupgrade.log and run command
> ipa-server-upgrade manually.
> CA did not start in 300.0s
>
> Output in the /var/log/pki/pki-tomcat/ca/system log while the ugprade was
> running
>
> 2024-04-02T18:30:11Z DEBUG response body 'Apache
> Tomcat/7.0.76 - Error report
> HTTP Status 500 - Subsystem unavailable
noshade=3D"noshade">type Exception report
message
> Subsystem unavailable
description The server
> encountered an internal error that prevented it from fulfilling this requ
> est.
exception
javax.ws.rs.ServiceUnavailableExcep=
tion:
> Subsystem
> unavailable\n\tcom.netscape.cms.tomcat.ProxyRealm.findSecurityConstraints=
(ProxyRealm.java:145)\n\torg.apache.catalina.authenticator.AuthenticatorBas=
e.invoke(AuthenticatorBase.java:500)\n\torg.apache.catalina.valves.ErrorRep=
ortValve.invoke(ErrorReportValve.java:103)\n\torg.apache.catalina.valves.Ac=
cessLogValve.invoke(AccessLogValve.java:962)\n\torg.apache.catalina.connect=
or.CoyoteAdapter.service(CoyoteAdapter.java:445)\n\torg.apache.coyote.http1=
1.AbstractHttp11Processor.process(AbstractHttp11Processor.java:1087)\n\torg=
.apache.coyote.AbstractProtocol$AbstractConnectionHandler.process(AbstractP=
rotocol.java:637)\n\torg.apache.tomcat.util.net.JIoEndpoint$SocketProcessor=
.run(JIoEndpoint.java:316)\n\tjava.util.concurrent.ThreadPoolExecutor.runWo=
rker(ThreadPoolExecutor.java:1149)\n\tjava.util.concurrent.ThreadPoolExecut=
or$Worker.run(ThreadPoolExecutor.java:624)\n\torg.apache.tomcat.util.thread=
s.TaskThrea
> d$WrappingRunnable.run(TaskThread.java:61)\n\tjava.lang.Thread.run(Threa=
d.java:748)\n
note
> The full stack trace of the root cause is available in the Apache
> Tomcat/7.0.76 logs.
Apache
> Tomcat/7.0.76
'
> 2024-04-02T18:30:11Z DEBUG The CA status is: check interrupted due to
> error: Retrieving CA status failed with status 500
> 2024-04-02T18:30:11Z DEBUG Waiting for CA to start...
> 2024-04-02T18:30:12Z DEBUG request POST http://ipa1-sea2.ipa.
> ****.net:8080/ca/admin/ca/getStatus
> 2024-04-02T18:30:12Z DEBUG request body ''
> 2024-04-02T18:30:12Z DEBUG response status 500
> 2024-04-02T18:30:12Z DEBUG response headers Server: Apache-Coyote/1.1
> Content-Type: text/html;charset=3Dutf-8
> Content-Language: en
> Content-Length: 2208
> Date: Tue, 02 Apr 2024 18:30:12 GMT
> Connection: close
>
> 2024-04-02T18:30:12Z DEBUG response body 'Apache
> Tomcat/7.0.76 - Error report
> HTTP Status 500 - Subsystem unavailable
noshade=3D"noshade">type Exception report
message
> Subsystem unavailable
description The server
> encountered an internal error that prevented it from fulfilling this requ
> est.
exception
javax.ws.rs.ServiceUnavailableExcep=
tion:
> Subsystem
> unavailable\n\tcom.netscape.cms.tomcat.ProxyRealm.findSecurityConstraints=
(ProxyRealm.java:145)\n\torg.apache.catalina.authenticator.AuthenticatorBas=
e.invoke(AuthenticatorBase.java:500)\n\torg.apache.catalina.valves.ErrorRep=
ortValve.invoke(ErrorReportValve.java:103)\n\torg.apache.catalina.valves.Ac=
cessLogValve.invoke(AccessLogValve.java:962)\n\torg.apache.catalina.connect=
or.CoyoteAdapter.service(CoyoteAdapter.java:445)\n\torg.apache.coyote.http1=
1.AbstractHttp11Processor.process(AbstractHttp11Processor.java:1087)\n\torg=
.apache.coyote.AbstractProtocol$AbstractConnectionHandler.process(AbstractP=
rotocol.java:637)\n\torg.apache.tomcat.util.net.JIoEndpoint$SocketProcessor=
.run(JIoEndpoint.java:316)\n\tjava.util.concurrent.ThreadPoolExecutor.runWo=
rker(ThreadPoolExecutor.java:1149)\n\tjava.util.concurrent.ThreadPoolExecut=
or$Worker.run(ThreadPoolExecutor.java:624)\n\torg.apache.tomcat.util.thread=
s.TaskThrea
> d$WrappingRunnable.run(TaskThread.java:61)\n\tjava.lang.Thread.run(Threa=
d.java:748)\n
note
> The full stack trace of the root cause is available in the Apache
> Tomcat/7.0.76 logs.
Apache
> Tomcat/7.0.76
'
> 2024-04-02T18:30:12Z DEBUG The CA status is: check interrupted due to
> error: Retrieving CA status failed with status 500
> 2024-04-02T18:30:12Z DEBUG Waiting for CA to start...
>
> --
> _______________________________________________
> FreeIPA-users mailing list -- freeipa-users(a)lists.fedorahosted.org
> To unsubscribe send an email to freeipa-users-leave(a)lists.fedorahosted.=
org
> Fedora Code of Conduct:
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives:
> https://lists.fedorahosted.org/archives/list/freeipa-users(a)lists.fedora=
hosted.org
> Do not reply to spam, report it:
> https://pagure.io/fedora-infrastructure/new_issue
>
--===============4798691185936436901==
Content-Type: text/html
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="attachment.html"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--===============4798691185936436901==--
From rcritten at redhat.com Tue Apr 2 22:28:04 2024
Content-Type: multipart/mixed; boundary="===============9141945912818245001=="
MIME-Version: 1.0
From: Rob Crittenden
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: CA_UNREACHABLE when requesting from Ubuntu 20.04
to FreeIPA v4.11.1
Date: Tue, 02 Apr 2024 18:27:43 -0400
Message-ID: <62ee831c-9f80-2e7d-d7c3-8caf0ab39e87@redhat.com>
In-Reply-To: 54F27E16-870F-446D-8C84-312C2CDE632A@gmail.com
--===============9141945912818245001==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
I can reproduce the issue with your CSR but I don't know yet what
python-cryptography doesn't like about it.
Older versions of python-cryptography yield different errors but the
issue is still elusive. I'm looking at the ASN1 encoding.
What version of certmonger is installed on the machine that made the
request?
rob
Djerk Geurts via FreeIPA-users wrote:
> Hi Rob,
> =
> =
> I can=E2=80=99t see any difference between this CSR and others that worked
> before. Could it be an issue with an updated version of ipa-client or
> openssl? I tested issuing a new certificate from a Ubuntu 22.04 host and
> that worked just fine. Openssl on Ubuntu 20.04 is 1.1.1f while Ubuntu
> 22.04 have v3.0.2.
> =
> The certificate ws requested with:=C2=A0sudo ipa-getcert request -N
> ${service} -K HTTP/${service} -k /etc/ssl/private/${service}.key -f
> /etc/ssl/certs/${service}.crt -D ${service} -A $(host -t A ${service} |
> awk 'NF>1{print $NF}=E2=80=99)
> =
> Which has worked fine for us for over two years.
> =
> Thanks,
> Djerk Geurts
> =
>> On 2 Apr 2024, at 22:29, Rob Crittenden wrote:
>>
>> Djerk Geurts via FreeIPA-users wrote:
>>> Hi,
>>>
>>> A month or so ago we upgraded from Fedora 37 to 39. I guess this is the
>>> first time I=E2=80=99m getting round to requesting a new certificate, a=
nd it=E2=80=99s
>>> failing from a server we use to manage several certificates for non-IPA
>>> client hosts.
>>>
>>> Output of ipa-getcert list:
>>>
>>> Request ID '20240402190326':
>>> =C2=A0 =C2=A0 =C2=A0 =C2=A0=C2=A0status: CA_UNREACHABLE
>>> =C2=A0 =C2=A0 =C2=A0 =C2=A0=C2=A0ca-error: Server at https://ipa.domain=
.com/ipa/xml failed
>>> request, will retry: 903 (RPC failed at server. =C2=A0an internal error=
has
>>> occurred).
>>> =C2=A0 =C2=A0 =C2=A0 =C2=A0=C2=A0stuck: no
>>> =C2=A0 =C2=A0 =C2=A0 =C2=A0=C2=A0key pair storage:
>>> type=3DFILE,location=3D'/etc/ssl/private/host.domain.com.key'
>>> =C2=A0 =C2=A0 =C2=A0 =C2=A0=C2=A0certificate:
>>> type=3DFILE,location=3D'/etc/ssl/certs/host.domain.com.crt'
>>> =C2=A0 =C2=A0 =C2=A0 =C2=A0=C2=A0CA: IPA
>>> =C2=A0 =C2=A0 =C2=A0 =C2=A0=C2=A0issuer:
>>> =C2=A0 =C2=A0 =C2=A0 =C2=A0=C2=A0subject:
>>> =C2=A0 =C2=A0 =C2=A0 =C2=A0=C2=A0expires: unknown
>>> =C2=A0 =C2=A0 =C2=A0 =C2=A0=C2=A0pre-save command:
>>> =C2=A0 =C2=A0 =C2=A0 =C2=A0=C2=A0post-save command:
>>> =C2=A0 =C2=A0 =C2=A0 =C2=A0=C2=A0track: yes
>>> =C2=A0 =C2=A0 =C2=A0 =C2=A0=C2=A0auto-renew: yes
>>>
>>> The httpd log on the IPA server:
>>>
>>> [Tue Apr 02 21:03:26.989287 2024] [wsgi:error] [pid 1606:tid 1957]
>>> [remote 10.2.0.92:50078] ipa: ERROR: non-public: ValueError: Only
>>> single-valued attributes are supported
>>> [Tue Apr 02 21:03:26.989320 2024] [wsgi:error] [pid 1606:tid 1957]
>>> [remote 10.2.0.92:50078] Traceback (most recent call last):
>>> [Tue Apr 02 21:03:26.989326 2024] [wsgi:error] [pid 1606:tid 1957]
>>> [remote 10.2.0.92:50078] =C2=A0 File
>>> "/usr/lib/python3.12/site-packages/ipaserver/rpcserver.py", line 417, in
>>> wsgi_execute
>>> [Tue Apr 02 21:03:26.989330 2024] [wsgi:error] [pid 1606:tid 1957]
>>> [remote 10.2.0.92:50078] =C2=A0 =C2=A0 result =3D command(*args, **opti=
ons)
>>> [Tue Apr 02 21:03:26.989333 2024] [wsgi:error] [pid 1606:tid 1957]
>>> [remote 10.2.0.92:50078] =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0^^^^^^^^^^^^^^^^^^^^^^^^^
>>> [Tue Apr 02 21:03:26.989337 2024] [wsgi:error] [pid 1606:tid 1957]
>>> [remote 10.2.0.92:50078] =C2=A0 File
>>> "/usr/lib/python3.12/site-packages/ipalib/frontend.py", line 471, in
>>> __call__
>>> [Tue Apr 02 21:03:26.989341 2024] [wsgi:error] [pid 1606:tid 1957]
>>> [remote 10.2.0.92:50078] =C2=A0 =C2=A0 return self.__do_call(*args, **o=
ptions)
>>> [Tue Apr 02 21:03:26.989345 2024] [wsgi:error] [pid 1606:tid 1957]
>>> [remote 10.2.0.92:50078] =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0^^^^^=
^^^^^^^^^^^^^^^^^^^^^^^^^^^
>>> [Tue Apr 02 21:03:26.989348 2024] [wsgi:error] [pid 1606:tid 1957]
>>> [remote 10.2.0.92:50078] =C2=A0 File
>>> "/usr/lib/python3.12/site-packages/ipalib/frontend.py", line 499, in
>>> __do_call
>>> [Tue Apr 02 21:03:26.989353 2024] [wsgi:error] [pid 1606:tid 1957]
>>> [remote 10.2.0.92:50078] =C2=A0 =C2=A0 ret =3D self.run(*args, **option=
s)
>>> [Tue Apr 02 21:03:26.989358 2024] [wsgi:error] [pid 1606:tid 1957]
>>> [remote 10.2.0.92:50078] =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 ^^^^^^^^^^^=
^^^^^^^^^^^^^^^
>>> [Tue Apr 02 21:03:26.989371 2024] [wsgi:error] [pid 1606:tid 1957]
>>> [remote 10.2.0.92:50078] =C2=A0 File
>>> "/usr/lib/python3.12/site-packages/ipalib/frontend.py", line 816, in run
>>> [Tue Apr 02 21:03:26.989376 2024] [wsgi:error] [pid 1606:tid 1957]
>>> [remote 10.2.0.92:50078] =C2=A0 =C2=A0 return self.execute(*args, **opt=
ions)
>>> [Tue Apr 02 21:03:26.989381 2024] [wsgi:error] [pid 1606:tid 1957]
>>> [remote 10.2.0.92:50078] =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0^^^^^=
^^^^^^^^^^^^^^^^^^^^^^^^^
>>> [Tue Apr 02 21:03:26.989385 2024] [wsgi:error] [pid 1606:tid 1957]
>>> [remote 10.2.0.92:50078] =C2=A0 File
>>> "/usr/lib/python3.12/site-packages/ipaserver/plugins/cert.py", line 716,
>>> in execute
>>> [Tue Apr 02 21:03:26.989389 2024] [wsgi:error] [pid 1606:tid 1957]
>>> [remote 10.2.0.92:50078] =C2=A0 =C2=A0 ext_san =3D
>>> csr.extensions.get_extension_for_oid(
>>> [Tue Apr 02 21:03:26.989392 2024] [wsgi:error] [pid 1606:tid 1957]
>>> [remote 10.2.0.92:50078] =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 ^^^^^^^^^^^^^^
>>> [Tue Apr 02 21:03:26.989396 2024] [wsgi:error] [pid 1606:tid 1957]
>>> [remote 10.2.0.92:50078] ValueError: Only single-valued attributes are
>>> supported
>>> [Tue Apr 02 21:03:26.989527 2024] [wsgi:error] [pid 1606:tid 1957]
>>> [remote 10.2.0.92:50078] ipa: INFO: [xmlserver]
>>> host/jump.domain.com(a)DOMAIN.COM: cert_request(=E2=80=98MIID**********=
d1A=3D=3D',
>>> principal=3D'HTTP/host.domain.com(a)DOMAIN.COM', add=3DTrue, version=3D=
'2.51'):
>>> InternalError
>>>
>>> The requesting machine is allowed to manage both the host and the
>>> service. Requesting the certificate on the IPA server itself works fine.
>>> I=E2=80=99ve read elsewhere that this could be an incompatibility betwe=
en the
>>> client and the server.
>>>
>>> Client: Ubuntu 20.04 LTS, ipa-client: v4.8.6
>>> Server: Fedora 39, ipa-server: v4.11.1
>>
>> Can we see the whole CSR? You should be able to find it in the
>> certmonger request file in /var/lib/certmonger/requests/
>> Sometimes the value matches the Request ID but not always.
>>
>> It is the parsing of the CSR where it blew up, getting multiple values
>> where only one was expected.
>>
>> rob
> =
> =
> --
> _______________________________________________
> FreeIPA-users mailing list -- freeipa-users(a)lists.fedorahosted.org
> To unsubscribe send an email to freeipa-users-leave(a)lists.fedorahosted.=
org
> Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code=
-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives: https://lists.fedorahosted.org/archives/list/freeipa-users=
(a)lists.fedorahosted.org
> Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/=
new_issue
>=20
--===============9141945912818245001==--
From twest at cherryroad.com Wed Apr 3 03:23:49 2024
Content-Type: multipart/mixed; boundary="===============4128324371830386572=="
MIME-Version: 1.0
From: Travis West
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: CA Subsystem certificate
Date: Wed, 03 Apr 2024 03:23:27 +0000
Message-ID: <20240403032327.21964.27303@mailman01.iad2.fedoraproject.org>
In-Reply-To: CAFDg7JzCXND87O5PFoeMC2Ua_ROKg5b4eY8H-kj+_ApP7a5wHw@mail.gmail.com
--===============4128324371830386572==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
> Hi,
> =
> On Tue, Apr 2, 2024 at 8:50=E2=80=AFPM Travis West via FreeIPA-users <
> freeipa-users(a)lists.fedorahosted.org> wrote:
> =
> As Rob wrote, it's not a problem that getcert list, OpenssL and NSS
> libraries show the subject in a DN order (RFC2253) or DN reverse order, b=
ut
> I find it suspect that issuer and subject have picked inconsistent order.
> In my f35 instance, getcert list shows the following:
> issuer: CN=3DCertificate Authority,O=3DIPA.TEST
> subject: CN=3DCA Subsystem,O=3DIPA.TEST
> =
I'm not sure I follow. My getcert list output looks like that, except the =
CN and O are reversed in the Subject line
issuer: CN=3DCertificate Authority,O=3DIPA.****.NET
subject: O=3DIPA.****.NET,CN=3DOCSP Subsystem
issuer: CN=3DCertificate Authority,O=3DIPA.****.NET
subject: O=3DIPA.****.NET,CN=3DCA Subsystem
issuer: CN=3DCertificate Authority,O=3DIPA.****.NET
subject: O=3DIPA.****.NET,CN=3DCA Audit
--===============4128324371830386572==--
From djerkg at gmail.com Wed Apr 3 07:30:12 2024
Content-Type: multipart/mixed; boundary="===============9032177438007512768=="
MIME-Version: 1.0
From: Djerk Geurts
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: CA_UNREACHABLE when requesting from Ubuntu 20.04
to FreeIPA v4.11.1
Date: Wed, 03 Apr 2024 09:29:45 +0200
Message-ID:
In-Reply-To: 62ee831c-9f80-2e7d-d7c3-8caf0ab39e87@redhat.com
--===============9032177438007512768==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Ubuntu 20.04: Certmonger v0.79.9 << fails
Ubuntu 22.04: Certmonger v0.79.14 << works
> On 3 Apr 2024, at 00:27, Rob Crittenden wrote:
> =
> I can reproduce the issue with your CSR but I don't know yet what
> python-cryptography doesn't like about it.
> =
> Older versions of python-cryptography yield different errors but the
> issue is still elusive. I'm looking at the ASN1 encoding.
> =
> What version of certmonger is installed on the machine that made the
> request?
> =
> rob
> =
> Djerk Geurts via FreeIPA-users wrote:
>> Hi Rob,
>> =
>> =
>> I can=E2=80=99t see any difference between this CSR and others that work=
ed
>> before. Could it be an issue with an updated version of ipa-client or
>> openssl? I tested issuing a new certificate from a Ubuntu 22.04 host and
>> that worked just fine. Openssl on Ubuntu 20.04 is 1.1.1f while Ubuntu
>> 22.04 have v3.0.2.
>> =
>> The certificate ws requested with: sudo ipa-getcert request -N
>> ${service} -K HTTP/${service} -k /etc/ssl/private/${service}.key -f
>> /etc/ssl/certs/${service}.crt -D ${service} -A $(host -t A ${service} |
>> awk 'NF>1{print $NF}=E2=80=99)
>> =
>> Which has worked fine for us for over two years.
>> =
>> Thanks,
>> Djerk Geurts
>> =
>>> On 2 Apr 2024, at 22:29, Rob Crittenden wrote:
>>> =
>>> Djerk Geurts via FreeIPA-users wrote:
>>>> Hi,
>>>> =
>>>> A month or so ago we upgraded from Fedora 37 to 39. I guess this is the
>>>> first time I=E2=80=99m getting round to requesting a new certificate, =
and it=E2=80=99s
>>>> failing from a server we use to manage several certificates for non-IPA
>>>> client hosts.
>>>> =
>>>> Output of ipa-getcert list:
>>>> =
>>>> Request ID '20240402190326':
>>>> status: CA_UNREACHABLE
>>>> ca-error: Server at https://ipa.domain.com/ipa/xml failed
>>>> request, will retry: 903 (RPC failed at server. an internal error has
>>>> occurred).
>>>> stuck: no
>>>> key pair storage:
>>>> type=3DFILE,location=3D'/etc/ssl/private/host.domain.com.key'
>>>> certificate:
>>>> type=3DFILE,location=3D'/etc/ssl/certs/host.domain.com.crt'
>>>> CA: IPA
>>>> issuer:
>>>> subject:
>>>> expires: unknown
>>>> pre-save command:
>>>> post-save command:
>>>> track: yes
>>>> auto-renew: yes
>>>> =
>>>> The httpd log on the IPA server:
>>>> =
>>>> [Tue Apr 02 21:03:26.989287 2024] [wsgi:error] [pid 1606:tid 1957]
>>>> [remote 10.2.0.92:50078] ipa: ERROR: non-public: ValueError: Only
>>>> single-valued attributes are supported
>>>> [Tue Apr 02 21:03:26.989320 2024] [wsgi:error] [pid 1606:tid 1957]
>>>> [remote 10.2.0.92:50078] Traceback (most recent call last):
>>>> [Tue Apr 02 21:03:26.989326 2024] [wsgi:error] [pid 1606:tid 1957]
>>>> [remote 10.2.0.92:50078] File
>>>> "/usr/lib/python3.12/site-packages/ipaserver/rpcserver.py", line 417, =
in
>>>> wsgi_execute
>>>> [Tue Apr 02 21:03:26.989330 2024] [wsgi:error] [pid 1606:tid 1957]
>>>> [remote 10.2.0.92:50078] result =3D command(*args, **options)
>>>> [Tue Apr 02 21:03:26.989333 2024] [wsgi:error] [pid 1606:tid 1957]
>>>> [remote 10.2.0.92:50078] ^^^^^^^^^^^^^^^^^^^^^^^^^
>>>> [Tue Apr 02 21:03:26.989337 2024] [wsgi:error] [pid 1606:tid 1957]
>>>> [remote 10.2.0.92:50078] File
>>>> "/usr/lib/python3.12/site-packages/ipalib/frontend.py", line 471, in
>>>> __call__
>>>> [Tue Apr 02 21:03:26.989341 2024] [wsgi:error] [pid 1606:tid 1957]
>>>> [remote 10.2.0.92:50078] return self.__do_call(*args, **options)
>>>> [Tue Apr 02 21:03:26.989345 2024] [wsgi:error] [pid 1606:tid 1957]
>>>> [remote 10.2.0.92:50078] ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>>>> [Tue Apr 02 21:03:26.989348 2024] [wsgi:error] [pid 1606:tid 1957]
>>>> [remote 10.2.0.92:50078] File
>>>> "/usr/lib/python3.12/site-packages/ipalib/frontend.py", line 499, in
>>>> __do_call
>>>> [Tue Apr 02 21:03:26.989353 2024] [wsgi:error] [pid 1606:tid 1957]
>>>> [remote 10.2.0.92:50078] ret =3D self.run(*args, **options)
>>>> [Tue Apr 02 21:03:26.989358 2024] [wsgi:error] [pid 1606:tid 1957]
>>>> [remote 10.2.0.92:50078] ^^^^^^^^^^^^^^^^^^^^^^^^^^
>>>> [Tue Apr 02 21:03:26.989371 2024] [wsgi:error] [pid 1606:tid 1957]
>>>> [remote 10.2.0.92:50078] File
>>>> "/usr/lib/python3.12/site-packages/ipalib/frontend.py", line 816, in r=
un
>>>> [Tue Apr 02 21:03:26.989376 2024] [wsgi:error] [pid 1606:tid 1957]
>>>> [remote 10.2.0.92:50078] return self.execute(*args, **options)
>>>> [Tue Apr 02 21:03:26.989381 2024] [wsgi:error] [pid 1606:tid 1957]
>>>> [remote 10.2.0.92:50078] ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>>>> [Tue Apr 02 21:03:26.989385 2024] [wsgi:error] [pid 1606:tid 1957]
>>>> [remote 10.2.0.92:50078] File
>>>> "/usr/lib/python3.12/site-packages/ipaserver/plugins/cert.py", line 71=
6,
>>>> in execute
>>>> [Tue Apr 02 21:03:26.989389 2024] [wsgi:error] [pid 1606:tid 1957]
>>>> [remote 10.2.0.92:50078] ext_san =3D
>>>> csr.extensions.get_extension_for_oid(
>>>> [Tue Apr 02 21:03:26.989392 2024] [wsgi:error] [pid 1606:tid 1957]
>>>> [remote 10.2.0.92:50078] ^^^^^^^^^^^^^^
>>>> [Tue Apr 02 21:03:26.989396 2024] [wsgi:error] [pid 1606:tid 1957]
>>>> [remote 10.2.0.92:50078] ValueError: Only single-valued attributes are
>>>> supported
>>>> [Tue Apr 02 21:03:26.989527 2024] [wsgi:error] [pid 1606:tid 1957]
>>>> [remote 10.2.0.92:50078] ipa: INFO: [xmlserver]
>>>> host/jump.domain.com(a)DOMAIN.COM: cert_request(=E2=80=98MIID*********=
*d1A=3D=3D',
>>>> principal=3D'HTTP/host.domain.com(a)DOMAIN.COM', add=3DTrue, version=
=3D'2.51'):
>>>> InternalError
>>>> =
>>>> The requesting machine is allowed to manage both the host and the
>>>> service. Requesting the certificate on the IPA server itself works fin=
e.
>>>> I=E2=80=99ve read elsewhere that this could be an incompatibility betw=
een the
>>>> client and the server.
>>>> =
>>>> Client: Ubuntu 20.04 LTS, ipa-client: v4.8.6
>>>> Server: Fedora 39, ipa-server: v4.11.1
>>> =
>>> Can we see the whole CSR? You should be able to find it in the
>>> certmonger request file in /var/lib/certmonger/requests/
>>> Sometimes the value matches the Request ID but not always.
>>> =
>>> It is the parsing of the CSR where it blew up, getting multiple values
>>> where only one was expected.
>>> =
>>> rob
>> =
>> =
>> --
>> _______________________________________________
>> FreeIPA-users mailing list -- freeipa-users(a)lists.fedorahosted.org
>> To unsubscribe send an email to freeipa-users-leave(a)lists.fedorahosted=
.org
>> Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/cod=
e-of-conduct/
>> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
>> List Archives: https://lists.fedorahosted.org/archives/list/freeipa-user=
s(a)lists.fedorahosted.org
>> Do not reply to spam, report it: https://pagure.io/fedora-infrastructure=
/new_issue
>> =
>=20
--===============9032177438007512768==--
From flo at redhat.com Wed Apr 3 11:00:56 2024
Content-Type: multipart/mixed; boundary="===============0332809820129392350=="
MIME-Version: 1.0
From: Florence Blanc-Renaud
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: CA Subsystem certificate
Date: Wed, 03 Apr 2024 13:00:29 +0200
Message-ID:
In-Reply-To: 20240403032327.21964.27303@mailman01.iad2.fedoraproject.org
--===============0332809820129392350==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
On Wed, Apr 3, 2024 at 5:24=E2=80=AFAM Travis West via FreeIPA-users <
freeipa-users(a)lists.fedorahosted.org> wrote:
> > Hi,
> >
> > On Tue, Apr 2, 2024 at 8:50=E2=80=AFPM Travis West via FreeIPA-users <
> > freeipa-users(a)lists.fedorahosted.org> wrote:
> >
> > As Rob wrote, it's not a problem that getcert list, OpenssL and NSS
> > libraries show the subject in a DN order (RFC2253) or DN reverse order,
> but
> > I find it suspect that issuer and subject have picked inconsistent orde=
r.
> > In my f35 instance, getcert list shows the following:
> > issuer: CN=3DCertificate Authority,O=3DIPA.TEST
> > subject: CN=3DCA Subsystem,O=3DIPA.TEST
> >
>
> I'm not sure I follow. My getcert list output looks like that, except the
> CN and O are reversed in the Subject line
>
That's exactly my point. I would expect subject and issuer to display the
components in the same order (ending with O=3DIPA.****.NET). The subject was
provided to openssl req command, you can try to provide it in the reverse
order.
flo
>
> issuer: CN=3DCertificate Authority,O=3DIPA.****.NET
> subject: O=3DIPA.****.NET,CN=3DOCSP Subsystem
>
> issuer: CN=3DCertificate Authority,O=3DIPA.****.NET
> subject: O=3DIPA.****.NET,CN=3DCA Subsystem
>
> issuer: CN=3DCertificate Authority,O=3DIPA.****.NET
> subject: O=3DIPA.****.NET,CN=3DCA Audit
> --
> _______________________________________________
> FreeIPA-users mailing list -- freeipa-users(a)lists.fedorahosted.org
> To unsubscribe send an email to freeipa-users-leave(a)lists.fedorahosted.=
org
> Fedora Code of Conduct:
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives:
> https://lists.fedorahosted.org/archives/list/freeipa-users(a)lists.fedora=
hosted.org
> Do not reply to spam, report it:
> https://pagure.io/fedora-infrastructure/new_issue
>
--===============0332809820129392350==
Content-Type: text/html
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="attachment.html"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--===============0332809820129392350==--
From twest at cherryroad.com Wed Apr 3 11:09:45 2024
Content-Type: multipart/mixed; boundary="===============2935393760000884417=="
MIME-Version: 1.0
From: Travis West
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: CA Subsystem certificate
Date: Wed, 03 Apr 2024 11:09:24 +0000
Message-ID: <20240403110924.4294.19567@mailman01.iad2.fedoraproject.org>
In-Reply-To: CAFDg7JwyS=pu6S3otZVDygQrz7Wpkf=x8cNegQPm4tx7njB66Q@mail.gmail.com
--===============2935393760000884417==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
> On Wed, Apr 3, 2024 at 5:24=E2=80=AFAM Travis West via FreeIPA-users <
> freeipa-users(a)lists.fedorahosted.org> wrote:
> =
> That's exactly my point. I would expect subject and issuer to display the
> components in the same order (ending with O=3DIPA.****.NET). The subject =
was
> provided to openssl req command, you can try to provide it in the reverse
> order.
If I look at the p12 file I created from the it has them listed in the corr=
ect order for Subject, but the Issuer line is reversed from what getcert sh=
ows
subject=3D/CN=3DOCSP Subsystem/O=3DIPA.****.NET
issuer=3D/O=3DIPA.****.NET/CN=3DCertificate Authority
subject=3D/CN=3DCA Subsystem/O=3DIPA.****.NET
issuer=3D/O=3DIPA.****.NET/CN=3DCertificate Authority
subject=3D/CN=3DCA Audit/O=3DIPA.****.NET
issuer=3D/O=3DIPA.****.NET/CN=3DCertificate Authority
The CSR was created using this command
openssl req -new -sha256 -key ocsp.key -subj "/CN=3DOCSP Subsystem /O=3DIPA=
.SUPERB.NET" -out ocsp.csr
The certificate was requested using this command
x509 -req -in ocsp.csr -CA ca.crt -CAkey ca.key -set_serial 2 -out ocsp.crt=
-days 3650 -sha256
So you're saying in that CSR req to swap CN and O for that -subj flag?
--===============2935393760000884417==--
From twest at cherryroad.com Wed Apr 3 12:24:44 2024
Content-Type: multipart/mixed; boundary="===============8456551214670551905=="
MIME-Version: 1.0
From: Travis West
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: CA Subsystem certificate
Date: Wed, 03 Apr 2024 12:24:20 +0000
Message-ID: <20240403122420.16941.71601@mailman01.iad2.fedoraproject.org>
In-Reply-To: CAFDg7JwyS=pu6S3otZVDygQrz7Wpkf=x8cNegQPm4tx7njB66Q@mail.gmail.com
--===============8456551214670551905==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Swapping the O and CN in the req did the trick for the getcert list output
Request ID '20190322032031':
status: MONITORING
stuck: no
key pair storage: type=3DNSSDB,location=3D'/etc/pki/pki-tomcat/alia=
s',nickname=3D'subsystemCert cert-pki-ca',token=3D'NSS Certificate DB',pin =
set
certificate: type=3DNSSDB,location=3D'/etc/pki/pki-tomcat/alias',ni=
ckname=3D'subsystemCert cert-pki-ca',token=3D'NSS Certificate DB'
CA: dogtag-ipa-ca-renew-agent
issuer: CN=3DCertificate Authority,O=3DIPA.****.NET
subject: CN=3DCA Subsystem,O=3DIPA.****.NET
expires: 2034-04-01 11:35:47 UTC
key usage: digitalSignature,nonRepudiation
pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert "subsy=
stemCert cert-pki-ca"
track: yes
auto-renew: yes
Request ID '20190322032030':
status: MONITORING
stuck: no
key pair storage: type=3DNSSDB,location=3D'/etc/pki/pki-tomcat/alia=
s',nickname=3D'ocspSigningCert cert-pki-ca',token=3D'NSS Certificate DB',pi=
n set
certificate: type=3DNSSDB,location=3D'/etc/pki/pki-tomcat/alias',ni=
ckname=3D'ocspSigningCert cert-pki-ca',token=3D'NSS Certificate DB'
CA: dogtag-ipa-ca-renew-agent
issuer: CN=3DCertificate Authority,O=3DIPA.****.NET
subject: CN=3DOCSP Subsystem,O=3DIPA.****.NET
expires: 2034-04-01 11:32:48 UTC
key usage: digitalSignature,nonRepudiation
pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert "ocspS=
igningCert cert-pki-ca"
track: yes
auto-renew: yes
Request ID '20190322032029':
status: MONITORING
stuck: no
key pair storage: type=3DNSSDB,location=3D'/etc/pki/pki-tomcat/alia=
s',nickname=3D'auditSigningCert cert-pki-ca',token=3D'NSS Certificate DB',p=
in set
certificate: type=3DNSSDB,location=3D'/etc/pki/pki-tomcat/alias',ni=
ckname=3D'auditSigningCert cert-pki-ca',token=3D'NSS Certificate DB'
CA: dogtag-ipa-ca-renew-agent
issuer: CN=3DCertificate Authority,O=3DIPA.****.NET
subject: CN=3DCA Audit,O=3DIPA.****.NET
expires: 2034-04-01 11:38:26 UTC
key usage: digitalSignature,nonRepudiation
pre-save command: /usr/libexec/ipa/certmonger/stop_pkicad
post-save command: /usr/libexec/ipa/certmonger/renew_ca_cert "audit=
SigningCert cert-pki-ca"
track: yes
auto-renew: yes
I then updated LDAP with the new CA Subsystem cert, so that and the serial =
for it match
# ldapsearch -LLL -D 'cn=3Ddirectory manager' -W -b uid=3Dpkidbuser,ou=3Dpe=
ople,o=3Dipaca userCertificate description seeAlso
Enter LDAP Password:
dn: uid=3Dpkidbuser,ou=3Dpeople,o=3Dipaca
userCertificate:: MIIDNj....RXOm8Q=3D=3D
description: 2;4;CN=3DCertificate Authority,O=3DIPA.****.NET;CN=3DCA Subsys=
tem,O=3DIPA.****.NET
seeAlso: CN=3DCA Subsystem,O=3DIPA.****.NET
# certutil -L -d /etc/pki/pki-tomcat/alias -n 'subsystemCert cert-pki-ca' -a
-----BEGIN CERTIFICATE-----
MIIDNj....RXOm8Q=3D=3D
-----END CERTIFICATE-----
# certutil -L -d /etc/pki/pki-tomcat/alias -n 'subsystemCert cert-pki-ca' |=
grep Serial
Serial Number: 4 (0x4)
After this I tried an 'ipactl restart --ignore-service-failures' but pki-t=
omcat still failed to start. So I tried manually stopping that service us=
ing systemctl stop pki-tomcatd(a)pki-tomcat.service then issuing an 'ipactl=
start --ignore-service-failures.
This time all services seem to have started
# ipactl start --ignore-service-failures
Starting Directory Service
Starting krb5kdc Service
Starting kadmin Service
Starting named Service
Starting httpd Service
Starting ipa-custodia Service
Starting pki-tomcatd Service
Starting ipa-otpd Service
Starting ipa-dnskeysyncd Service
ipa: INFO: The ipactl command was successful
If I login to the UI I can now browse to Authentication > Certificates, whe=
re as before I got an error when going here.
So far so good. Now, I've got 5 other servers in this cluster, all denoted=
as Master, with this server set as the CA Renewal Master. Do I need to re=
peat the certificate import steps on the other 5 servers or is there a way =
to replicate over the new certificates to the other hosts?
--===============8456551214670551905==--
From twest at cherryroad.com Wed Apr 3 12:46:04 2024
Content-Type: multipart/mixed; boundary="===============7459351233215846445=="
MIME-Version: 1.0
From: Travis West
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: CA Subsystem certificate
Date: Wed, 03 Apr 2024 12:45:53 +0000
Message-ID: <20240403124553.20581.98833@mailman01.iad2.fedoraproject.org>
In-Reply-To: 20240403122420.16941.71601@mailman01.iad2.fedoraproject.org
--===============7459351233215846445==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Spoke too soon. If I try to get a new certificate on an enrolled host I ge=
t this
status: CA_UNREACHABLE
ca-error: Server at https://ipa1-sea2.ipa.****.net/ipa/xml failed request, =
will retry: 907 (RPC failed at server. cannot connect to 'https://ipa1-sea=
2.ipa.****.net:443/ca/rest/account/login': [SSL: SSL_HANDSHAKE_FAILURE] ssl=
handshake failure (_ssl.c:1822)).
This reflected in the UI if I go to Authentication > Certificates > Certifi=
cate Authorities where I see the same error.
The IPA server listed there is the one where all services started via ipact=
l start in my previous update.
--===============7459351233215846445==--
From rcritten at redhat.com Wed Apr 3 14:11:36 2024
Content-Type: multipart/mixed; boundary="===============0771660938312810294=="
MIME-Version: 1.0
From: Rob Crittenden
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: CA_UNREACHABLE when requesting from Ubuntu 20.04
to FreeIPA v4.11.1
Date: Wed, 03 Apr 2024 10:11:05 -0400
Message-ID:
In-Reply-To: BDEA1E29-511F-4274-AEDC-6EAD7D4660F4@gmail.com
--===============0771660938312810294==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
There was a bug in the DER encoding that certmonger used when generating
the CSR. python-cryptography allowed it for a while, then complained
loudly about it and now no longer accepts it. Upgrading certmonger is
the proper fix.
rob
Djerk Geurts wrote:
> Ubuntu 20.04: Certmonger v0.79.9 << fails
> Ubuntu 22.04: Certmonger v0.79.14 << works
> =
>> On 3 Apr 2024, at 00:27, Rob Crittenden wrote:
>>
>> I can reproduce the issue with your CSR but I don't know yet what
>> python-cryptography doesn't like about it.
>>
>> Older versions of python-cryptography yield different errors but the
>> issue is still elusive. I'm looking at the ASN1 encoding.
>>
>> What version of certmonger is installed on the machine that made the
>> request?
>>
>> rob
>>
>> Djerk Geurts via FreeIPA-users wrote:
>>> Hi Rob,
>>>
>>>
>>> I can=E2=80=99t see any difference between this CSR and others that wor=
ked
>>> before. Could it be an issue with an updated version of ipa-client or
>>> openssl? I tested issuing a new certificate from a Ubuntu 22.04 host and
>>> that worked just fine. Openssl on Ubuntu 20.04 is 1.1.1f while Ubuntu
>>> 22.04 have v3.0.2.
>>>
>>> The certificate ws requested with: sudo ipa-getcert request -N
>>> ${service} -K HTTP/${service} -k /etc/ssl/private/${service}.key -f
>>> /etc/ssl/certs/${service}.crt -D ${service} -A $(host -t A ${service} |
>>> awk 'NF>1{print $NF}=E2=80=99)
>>>
>>> Which has worked fine for us for over two years.
>>>
>>> Thanks,
>>> Djerk Geurts
>>>
>>>> On 2 Apr 2024, at 22:29, Rob Crittenden wrote:
>>>>
>>>> Djerk Geurts via FreeIPA-users wrote:
>>>>> Hi,
>>>>>
>>>>> A month or so ago we upgraded from Fedora 37 to 39. I guess this is t=
he
>>>>> first time I=E2=80=99m getting round to requesting a new certificate,=
and it=E2=80=99s
>>>>> failing from a server we use to manage several certificates for non-I=
PA
>>>>> client hosts.
>>>>>
>>>>> Output of ipa-getcert list:
>>>>>
>>>>> Request ID '20240402190326':
>>>>> status: CA_UNREACHABLE
>>>>> ca-error: Server at https://ipa.domain.com/ipa/xml failed
>>>>> request, will retry: 903 (RPC failed at server. an internal error has
>>>>> occurred).
>>>>> stuck: no
>>>>> key pair storage:
>>>>> type=3DFILE,location=3D'/etc/ssl/private/host.domain.com.key'
>>>>> certificate:
>>>>> type=3DFILE,location=3D'/etc/ssl/certs/host.domain.com.crt'
>>>>> CA: IPA
>>>>> issuer:
>>>>> subject:
>>>>> expires: unknown
>>>>> pre-save command:
>>>>> post-save command:
>>>>> track: yes
>>>>> auto-renew: yes
>>>>>
>>>>> The httpd log on the IPA server:
>>>>>
>>>>> [Tue Apr 02 21:03:26.989287 2024] [wsgi:error] [pid 1606:tid 1957]
>>>>> [remote 10.2.0.92:50078] ipa: ERROR: non-public: ValueError: Only
>>>>> single-valued attributes are supported
>>>>> [Tue Apr 02 21:03:26.989320 2024] [wsgi:error] [pid 1606:tid 1957]
>>>>> [remote 10.2.0.92:50078] Traceback (most recent call last):
>>>>> [Tue Apr 02 21:03:26.989326 2024] [wsgi:error] [pid 1606:tid 1957]
>>>>> [remote 10.2.0.92:50078] File
>>>>> "/usr/lib/python3.12/site-packages/ipaserver/rpcserver.py", line 417,=
in
>>>>> wsgi_execute
>>>>> [Tue Apr 02 21:03:26.989330 2024] [wsgi:error] [pid 1606:tid 1957]
>>>>> [remote 10.2.0.92:50078] result =3D command(*args, **options)
>>>>> [Tue Apr 02 21:03:26.989333 2024] [wsgi:error] [pid 1606:tid 1957]
>>>>> [remote 10.2.0.92:50078] ^^^^^^^^^^^^^^^^^^^^^^^^^
>>>>> [Tue Apr 02 21:03:26.989337 2024] [wsgi:error] [pid 1606:tid 1957]
>>>>> [remote 10.2.0.92:50078] File
>>>>> "/usr/lib/python3.12/site-packages/ipalib/frontend.py", line 471, in
>>>>> __call__
>>>>> [Tue Apr 02 21:03:26.989341 2024] [wsgi:error] [pid 1606:tid 1957]
>>>>> [remote 10.2.0.92:50078] return self.__do_call(*args, **options)
>>>>> [Tue Apr 02 21:03:26.989345 2024] [wsgi:error] [pid 1606:tid 1957]
>>>>> [remote 10.2.0.92:50078] ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>>>>> [Tue Apr 02 21:03:26.989348 2024] [wsgi:error] [pid 1606:tid 1957]
>>>>> [remote 10.2.0.92:50078] File
>>>>> "/usr/lib/python3.12/site-packages/ipalib/frontend.py", line 499, in
>>>>> __do_call
>>>>> [Tue Apr 02 21:03:26.989353 2024] [wsgi:error] [pid 1606:tid 1957]
>>>>> [remote 10.2.0.92:50078] ret =3D self.run(*args, **options)
>>>>> [Tue Apr 02 21:03:26.989358 2024] [wsgi:error] [pid 1606:tid 1957]
>>>>> [remote 10.2.0.92:50078] ^^^^^^^^^^^^^^^^^^^^^^^^^^
>>>>> [Tue Apr 02 21:03:26.989371 2024] [wsgi:error] [pid 1606:tid 1957]
>>>>> [remote 10.2.0.92:50078] File
>>>>> "/usr/lib/python3.12/site-packages/ipalib/frontend.py", line 816, in =
run
>>>>> [Tue Apr 02 21:03:26.989376 2024] [wsgi:error] [pid 1606:tid 1957]
>>>>> [remote 10.2.0.92:50078] return self.execute(*args, **options)
>>>>> [Tue Apr 02 21:03:26.989381 2024] [wsgi:error] [pid 1606:tid 1957]
>>>>> [remote 10.2.0.92:50078] ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>>>>> [Tue Apr 02 21:03:26.989385 2024] [wsgi:error] [pid 1606:tid 1957]
>>>>> [remote 10.2.0.92:50078] File
>>>>> "/usr/lib/python3.12/site-packages/ipaserver/plugins/cert.py", line 7=
16,
>>>>> in execute
>>>>> [Tue Apr 02 21:03:26.989389 2024] [wsgi:error] [pid 1606:tid 1957]
>>>>> [remote 10.2.0.92:50078] ext_san =3D
>>>>> csr.extensions.get_extension_for_oid(
>>>>> [Tue Apr 02 21:03:26.989392 2024] [wsgi:error] [pid 1606:tid 1957]
>>>>> [remote 10.2.0.92:50078] ^^^^^^^^^^^^^^
>>>>> [Tue Apr 02 21:03:26.989396 2024] [wsgi:error] [pid 1606:tid 1957]
>>>>> [remote 10.2.0.92:50078] ValueError: Only single-valued attributes are
>>>>> supported
>>>>> [Tue Apr 02 21:03:26.989527 2024] [wsgi:error] [pid 1606:tid 1957]
>>>>> [remote 10.2.0.92:50078] ipa: INFO: [xmlserver]
>>>>> host/jump.domain.com(a)DOMAIN.COM: cert_request(=E2=80=98MIID********=
**d1A=3D=3D',
>>>>> principal=3D'HTTP/host.domain.com(a)DOMAIN.COM', add=3DTrue, version=
=3D'2.51'):
>>>>> InternalError
>>>>>
>>>>> The requesting machine is allowed to manage both the host and the
>>>>> service. Requesting the certificate on the IPA server itself works fi=
ne.
>>>>> I=E2=80=99ve read elsewhere that this could be an incompatibility bet=
ween the
>>>>> client and the server.
>>>>>
>>>>> Client: Ubuntu 20.04 LTS, ipa-client: v4.8.6
>>>>> Server: Fedora 39, ipa-server: v4.11.1
>>>>
>>>> Can we see the whole CSR? You should be able to find it in the
>>>> certmonger request file in /var/lib/certmonger/requests/
>>>> Sometimes the value matches the Request ID but not always.
>>>>
>>>> It is the parsing of the CSR where it blew up, getting multiple values
>>>> where only one was expected.
>>>>
>>>> rob
>>>
>>>
>>> --
>>> _______________________________________________
>>> FreeIPA-users mailing list -- freeipa-users(a)lists.fedorahosted.org
>>> To unsubscribe send an email to freeipa-users-leave(a)lists.fedorahoste=
d.org
>>> Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/co=
de-of-conduct/
>>> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
>>> List Archives: https://lists.fedorahosted.org/archives/list/freeipa-use=
rs(a)lists.fedorahosted.org
>>> Do not reply to spam, report it: https://pagure.io/fedora-infrastructur=
e/new_issue
>>>
>>
>=20
--===============0771660938312810294==--
From djerkg at gmail.com Wed Apr 3 14:23:26 2024
Content-Type: multipart/mixed; boundary="===============2369302547836916933=="
MIME-Version: 1.0
From: Djerk Geurts
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: CA_UNREACHABLE when requesting from Ubuntu 20.04
to FreeIPA v4.11.1
Date: Wed, 03 Apr 2024 16:21:58 +0200
Message-ID:
In-Reply-To: cb300428-9beb-efc7-7b12-7ffc0f64062a@redhat.com
--===============2369302547836916933==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Not sure how long we=E2=80=99ll need to wait for a fix in Ubuntu 20.04, so =
we=E2=80=99re uplifting our jumphosts to Ubuntu 22.04. We were going to wai=
t so we could go from 20.04 to 24.04, but alas=E2=80=A6
Thank you for your time!
> On 3 Apr 2024, at 16:11, Rob Crittenden wrote:
> =
> There was a bug in the DER encoding that certmonger used when generating
> the CSR. python-cryptography allowed it for a while, then complained
> loudly about it and now no longer accepts it. Upgrading certmonger is
> the proper fix.
> =
> rob
> =
> Djerk Geurts wrote:
>> Ubuntu 20.04: Certmonger v0.79.9 << fails
>> Ubuntu 22.04: Certmonger v0.79.14 << works
>> =
>>> On 3 Apr 2024, at 00:27, Rob Crittenden wrote:
>>> =
>>> I can reproduce the issue with your CSR but I don't know yet what
>>> python-cryptography doesn't like about it.
>>> =
>>> Older versions of python-cryptography yield different errors but the
>>> issue is still elusive. I'm looking at the ASN1 encoding.
>>> =
>>> What version of certmonger is installed on the machine that made the
>>> request?
>>> =
>>> rob
>>> =
>>> Djerk Geurts via FreeIPA-users wrote:
>>>> Hi Rob,
>>>> =
>>>> =
>>>> I can=E2=80=99t see any difference between this CSR and others that wo=
rked
>>>> before. Could it be an issue with an updated version of ipa-client or
>>>> openssl? I tested issuing a new certificate from a Ubuntu 22.04 host a=
nd
>>>> that worked just fine. Openssl on Ubuntu 20.04 is 1.1.1f while Ubuntu
>>>> 22.04 have v3.0.2.
>>>> =
>>>> The certificate ws requested with: sudo ipa-getcert request -N
>>>> ${service} -K HTTP/${service} -k /etc/ssl/private/${service}.key -f
>>>> /etc/ssl/certs/${service}.crt -D ${service} -A $(host -t A ${service} |
>>>> awk 'NF>1{print $NF}=E2=80=99)
>>>> =
>>>> Which has worked fine for us for over two years.
>>>> =
>>>> Thanks,
>>>> Djerk Geurts
>>>> =
>>>>> On 2 Apr 2024, at 22:29, Rob Crittenden wrote:
>>>>> =
>>>>> Djerk Geurts via FreeIPA-users wrote:
>>>>>> Hi,
>>>>>> =
>>>>>> A month or so ago we upgraded from Fedora 37 to 39. I guess this is =
the
>>>>>> first time I=E2=80=99m getting round to requesting a new certificate=
, and it=E2=80=99s
>>>>>> failing from a server we use to manage several certificates for non-=
IPA
>>>>>> client hosts.
>>>>>> =
>>>>>> Output of ipa-getcert list:
>>>>>> =
>>>>>> Request ID '20240402190326':
>>>>>> status: CA_UNREACHABLE
>>>>>> ca-error: Server at https://ipa.domain.com/ipa/xml failed
>>>>>> request, will retry: 903 (RPC failed at server. an internal error h=
as
>>>>>> occurred).
>>>>>> stuck: no
>>>>>> key pair storage:
>>>>>> type=3DFILE,location=3D'/etc/ssl/private/host.domain.com.key'
>>>>>> certificate:
>>>>>> type=3DFILE,location=3D'/etc/ssl/certs/host.domain.com.crt'
>>>>>> CA: IPA
>>>>>> issuer:
>>>>>> subject:
>>>>>> expires: unknown
>>>>>> pre-save command:
>>>>>> post-save command:
>>>>>> track: yes
>>>>>> auto-renew: yes
>>>>>> =
>>>>>> The httpd log on the IPA server:
>>>>>> =
>>>>>> [Tue Apr 02 21:03:26.989287 2024] [wsgi:error] [pid 1606:tid 1957]
>>>>>> [remote 10.2.0.92:50078] ipa: ERROR: non-public: ValueError: Only
>>>>>> single-valued attributes are supported
>>>>>> [Tue Apr 02 21:03:26.989320 2024] [wsgi:error] [pid 1606:tid 1957]
>>>>>> [remote 10.2.0.92:50078] Traceback (most recent call last):
>>>>>> [Tue Apr 02 21:03:26.989326 2024] [wsgi:error] [pid 1606:tid 1957]
>>>>>> [remote 10.2.0.92:50078] File
>>>>>> "/usr/lib/python3.12/site-packages/ipaserver/rpcserver.py", line 417=
, in
>>>>>> wsgi_execute
>>>>>> [Tue Apr 02 21:03:26.989330 2024] [wsgi:error] [pid 1606:tid 1957]
>>>>>> [remote 10.2.0.92:50078] result =3D command(*args, **options)
>>>>>> [Tue Apr 02 21:03:26.989333 2024] [wsgi:error] [pid 1606:tid 1957]
>>>>>> [remote 10.2.0.92:50078] ^^^^^^^^^^^^^^^^^^^^^^^^^
>>>>>> [Tue Apr 02 21:03:26.989337 2024] [wsgi:error] [pid 1606:tid 1957]
>>>>>> [remote 10.2.0.92:50078] File
>>>>>> "/usr/lib/python3.12/site-packages/ipalib/frontend.py", line 471, in
>>>>>> __call__
>>>>>> [Tue Apr 02 21:03:26.989341 2024] [wsgi:error] [pid 1606:tid 1957]
>>>>>> [remote 10.2.0.92:50078] return self.__do_call(*args, **options)
>>>>>> [Tue Apr 02 21:03:26.989345 2024] [wsgi:error] [pid 1606:tid 1957]
>>>>>> [remote 10.2.0.92:50078] ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>>>>>> [Tue Apr 02 21:03:26.989348 2024] [wsgi:error] [pid 1606:tid 1957]
>>>>>> [remote 10.2.0.92:50078] File
>>>>>> "/usr/lib/python3.12/site-packages/ipalib/frontend.py", line 499, in
>>>>>> __do_call
>>>>>> [Tue Apr 02 21:03:26.989353 2024] [wsgi:error] [pid 1606:tid 1957]
>>>>>> [remote 10.2.0.92:50078] ret =3D self.run(*args, **options)
>>>>>> [Tue Apr 02 21:03:26.989358 2024] [wsgi:error] [pid 1606:tid 1957]
>>>>>> [remote 10.2.0.92:50078] ^^^^^^^^^^^^^^^^^^^^^^^^^^
>>>>>> [Tue Apr 02 21:03:26.989371 2024] [wsgi:error] [pid 1606:tid 1957]
>>>>>> [remote 10.2.0.92:50078] File
>>>>>> "/usr/lib/python3.12/site-packages/ipalib/frontend.py", line 816, in=
run
>>>>>> [Tue Apr 02 21:03:26.989376 2024] [wsgi:error] [pid 1606:tid 1957]
>>>>>> [remote 10.2.0.92:50078] return self.execute(*args, **options)
>>>>>> [Tue Apr 02 21:03:26.989381 2024] [wsgi:error] [pid 1606:tid 1957]
>>>>>> [remote 10.2.0.92:50078] ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>>>>>> [Tue Apr 02 21:03:26.989385 2024] [wsgi:error] [pid 1606:tid 1957]
>>>>>> [remote 10.2.0.92:50078] File
>>>>>> "/usr/lib/python3.12/site-packages/ipaserver/plugins/cert.py", line =
716,
>>>>>> in execute
>>>>>> [Tue Apr 02 21:03:26.989389 2024] [wsgi:error] [pid 1606:tid 1957]
>>>>>> [remote 10.2.0.92:50078] ext_san =3D
>>>>>> csr.extensions.get_extension_for_oid(
>>>>>> [Tue Apr 02 21:03:26.989392 2024] [wsgi:error] [pid 1606:tid 1957]
>>>>>> [remote 10.2.0.92:50078] ^^^^^^^^^^^^^^
>>>>>> [Tue Apr 02 21:03:26.989396 2024] [wsgi:error] [pid 1606:tid 1957]
>>>>>> [remote 10.2.0.92:50078] ValueError: Only single-valued attributes a=
re
>>>>>> supported
>>>>>> [Tue Apr 02 21:03:26.989527 2024] [wsgi:error] [pid 1606:tid 1957]
>>>>>> [remote 10.2.0.92:50078] ipa: INFO: [xmlserver]
>>>>>> host/jump.domain.com(a)DOMAIN.COM: cert_request(=E2=80=98MIID*******=
***d1A=3D=3D',
>>>>>> principal=3D'HTTP/host.domain.com(a)DOMAIN.COM', add=3DTrue, version=
=3D'2.51'):
>>>>>> InternalError
>>>>>> =
>>>>>> The requesting machine is allowed to manage both the host and the
>>>>>> service. Requesting the certificate on the IPA server itself works f=
ine.
>>>>>> I=E2=80=99ve read elsewhere that this could be an incompatibility be=
tween the
>>>>>> client and the server.
>>>>>> =
>>>>>> Client: Ubuntu 20.04 LTS, ipa-client: v4.8.6
>>>>>> Server: Fedora 39, ipa-server: v4.11.1
>>>>> =
>>>>> Can we see the whole CSR? You should be able to find it in the
>>>>> certmonger request file in /var/lib/certmonger/requests/
>>>>> Sometimes the value matches the Request ID but not always.
>>>>> =
>>>>> It is the parsing of the CSR where it blew up, getting multiple values
>>>>> where only one was expected.
>>>>> =
>>>>> rob
>>>> =
>>>> =
>>>> --
>>>> _______________________________________________
>>>> FreeIPA-users mailing list -- freeipa-users(a)lists.fedorahosted.org
>>>> To unsubscribe send an email to freeipa-users-leave(a)lists.fedorahost=
ed.org
>>>> Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/c=
ode-of-conduct/
>>>> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
>>>> List Archives: https://lists.fedorahosted.org/archives/list/freeipa-us=
ers(a)lists.fedorahosted.org
>>>> Do not reply to spam, report it: https://pagure.io/fedora-infrastructu=
re/new_issue
>>>> =
>>> =
>> =
>=20
--===============2369302547836916933==--
From slekkus75 at proton.me Wed Apr 3 15:02:15 2024
Content-Type: multipart/mixed; boundary="===============8582548634546483539=="
MIME-Version: 1.0
From: slek kus
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: Client install fails with: "Joining realm failed:
JSON-RPC call failed: Timeout was reached"
Date: Wed, 03 Apr 2024 15:02:02 +0000
Message-ID: <20240403150202.11983.18124@mailman01.iad2.fedoraproject.org>
In-Reply-To: Zgl3v6k178mF8Rfe@redhat.com
--===============8582548634546483539==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Thanks for the links.. Wasn't sure what was mandatory and what not. Alle wo=
rks now.=20
--===============8582548634546483539==--
From cheimes at redhat.com Wed Apr 3 15:04:30 2024
Content-Type: multipart/mixed; boundary="===============2876812734178443756=="
MIME-Version: 1.0
From: Christian Heimes
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: CA_UNREACHABLE when requesting from Ubuntu 20.04
to FreeIPA v4.11.1
Date: Wed, 03 Apr 2024 17:04:14 +0200
Message-ID:
In-Reply-To: BA583821-26AF-4719-80C3-5D6B6DC43650@gmail.com
--===============2876812734178443756==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
On 03/04/2024 16.21, Djerk Geurts via FreeIPA-users wrote:
> Not sure how long we=E2=80=99ll need to wait for a fix in Ubuntu 20.04, s=
o we=E2=80=99re uplifting our jumphosts to Ubuntu 22.04. We were going to w=
ait so we could go from 20.04 to 24.04, but alas=E2=80=A6
>
> Thank you for your time!
I'm the downstream maintainer of python-cryptography in RHEL and Fedora. =
I found the problem in October 2021 and reported it to upstream. The =
PyCA cryptography ticket =
https://github.com/pyca/cryptography/issues/6368 has more information =
and links to FreeIPA and Certmonger tickets.
Timeline: cryptography 35.0 was release on 2021-09-29. The problem was =
detected by our tests and reported by me on 2021-10-04. I also wrote a =
fix the same day. Certmonger release 0.79.15 fixed CSR generation and =
was released 24h later. Cryptography added a temporary workaround =
shortly after and removed the workaround in April 2022.
If Ubuntu hasn't fixed the problem as of today, then they probably have =
missed the bug. We don't have control about the Debian/Ubuntu downstream =
channel. The Debian maintainer Timo Aaltonen is responsive and addresses =
problems fast. Could you please open an Ubuntu bug on Launchpad and ping =
him?
Christian
-- =
Christian Heimes
Principal Software Engineer, Identity Management and Platform Security
Red Hat GmbH, https://de.redhat.com/ , Registered seat: Grasbrunn,
Commercial register: Amtsgericht Muenchen, HRB 153243,
Managing Directors: Charles Cachera, Brian Klemm, Laurie Krebs, Michael O'N=
eill
--===============2876812734178443756==--
From rcritten at redhat.com Wed Apr 3 15:12:06 2024
Content-Type: multipart/mixed; boundary="===============7712256837167952596=="
MIME-Version: 1.0
From: Rob Crittenden
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: CA Subsystem certificate
Date: Wed, 03 Apr 2024 11:11:49 -0400
Message-ID: <88497baf-aca3-3c21-6cd7-5f8ca8447c57@redhat.com>
In-Reply-To: 20240403124553.20581.98833@mailman01.iad2.fedoraproject.org
--===============7712256837167952596==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Travis West via FreeIPA-users wrote:
> Spoke too soon. If I try to get a new certificate on an enrolled host I =
get this
> =
> status: CA_UNREACHABLE
> ca-error: Server at https://ipa1-sea2.ipa.****.net/ipa/xml failed request=
, will retry: 907 (RPC failed at server. cannot connect to 'https://ipa1-s=
ea2.ipa.****.net:443/ca/rest/account/login': [SSL: SSL_HANDSHAKE_FAILURE] s=
sl handshake failure (_ssl.c:1822)).
> =
> This reflected in the UI if I go to Authentication > Certificates > Certi=
ficate Authorities where I see the same error.
> =
> The IPA server listed there is the one where all services started via ipa=
ctl start in my previous update.
I think you need to take a look at fresh logs to see what failed. It may
point to why.
I assume you went back in time to 2019 and then leaped forward 2 years
at a pop, renewing as you went, and now it's present day?
rob
--===============7712256837167952596==--
From twest at cherryroad.com Wed Apr 3 15:37:28 2024
Content-Type: multipart/mixed; boundary="===============8758749576261233723=="
MIME-Version: 1.0
From: Travis West
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: CA Subsystem certificate
Date: Wed, 03 Apr 2024 15:37:07 +0000
Message-ID: <20240403153707.18451.42346@mailman01.iad2.fedoraproject.org>
In-Reply-To: 88497baf-aca3-3c21-6cd7-5f8ca8447c57@redhat.com
--===============8758749576261233723==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
No I didn't go back in time, I generated new certificates and imported them=
to NSS DB after deleting the ones that contained Principles that had other=
hosts listed.
I then updated the CS.cfg with the cert and certreq values, and made sure t=
he CA Subsystem cert in NSS DB matched what is in LDAP.
I'm not sure what logs to look at. /etc/pki/pki-tomcat/ca/selftest has no =
errors /etc/pki/pki-tomcat/ca/system has the last error from before I got i=
pa to fully start. The debug log has a lot of information, but nothing tha=
t looks like an error.
I've got no expired certs
# getcert list | grep expires
expires: 2025-01-26 11:37:18 UTC
expires: 2025-01-26 11:37:04 UTC
expires: 2026-03-12 13:24:44 UTC
expires: 2034-04-01 11:38:26 UTC
expires: 2034-04-01 11:32:48 UTC
expires: 2034-04-01 11:35:47 UTC
expires: 2037-03-21 04:43:44 UTC
expires: 2024-12-24 11:37:06 UTC
expires: 2025-01-26 11:41:35 UTC
Trust attributes all look correct in /etc/pki/pki-tomcat/alias
# certutil -L -d .
Certificate Nickname Trust Attribut=
es
SSL,S/MIME,JAR=
/XPI
subsystemCert cert-pki-ca u,u,u
ocspSigningCert cert-pki-ca u,u,u
caSigningCert cert-pki-ca CTu,Cu,Cu
Server-Cert cert-pki-ca u,u,u
auditSigningCert cert-pki-ca u,u,Pu
Certmonger tracking shows correct now with the Subject having the CN and O =
in the correct order.
--===============8758749576261233723==--
From natxo.asenjo at gmail.com Wed Apr 3 16:06:37 2024
Content-Type: multipart/mixed; boundary="===============0538678951794157927=="
MIME-Version: 1.0
From: Natxo Asenjo
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: upgrade idm servers rhel 7 to 8 problems
Date: Wed, 03 Apr 2024 18:05:12 +0200
Message-ID:
In-Reply-To: CAHBEJzU1iiHHKxMC_BteGhn+P1tZf5dBzQU99PwRTwZV9KXt5A@mail.gmail.com
--===============0538678951794157927==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
anybody?
On Tue, Apr 2, 2024 at 1:53=E2=80=AFPM Natxo Asenjo wrote:
> hi,
>
>
>
> On Tue, Mar 26, 2024 at 2:47=E2=80=AFPM Natxo Asenjo
> wrote:
>
>> hi,
>>
>> posting back to the list.
>>
>> Apparently the idm server cannot find a SID of a domain when trying to
>> resolve the user account. It does find the user account, but there are
>> sids coupled to the account correspondig to a domain wich cannot be
>> resolved.
>>
>> It took me a while but the sid of that child domain is not the one not
>> resolved.
>>
>> It turns out, the sid of the domain not resolving is the one of the idm
>> realm itself., we have some idm groups mapped to the AD groups we allow=
in
>> idm for rbac, and if I look at the ipaNTSecurityIdentifier attributes of
>> the id groups, those are the not resolved groups.
>>
>> This is unexpected (to me at least).
>>
>> so we have this trust (verified on two different idm servers, same value=
):
>>
>> ipa trust-find
>> ---------------
>> 1 trust matched
>> ---------------
>> Realm name: domain.local
>> Domain NetBIOS name: DOMAIN
>> Domain Security Identifier: S-1-5-21-1416133915-1866970209-3316290679
>> Trust type: Active Directory domain
>> ----------------------------
>> Number of entries returned 1
>>
>> but inside this idm domain, we have some idm posix groups with the
>> ipantsecurityidentifier of the not resolvable domain, for instance:
>> S-1-5-21-1214650608-3976977395-3073169311-101072
>>
>> So basically, it is not matching because of this ipantsecurityidentifier,
>> I think.
>>
>> I do not know how to fix this at this moment, or why it has happened. Any
>> ideas?
>>
>>
>
> I wonder if somebody with more sssd knowlegde than me could push me in the
> right direction. Is it maybe better to ask in the sssd mailing list?
>
> Regards,
>
> Natxo Asenjo
>
> --
> --
> Groeten,
> natxo
>
-- =
--
Groeten,
natxo
--===============0538678951794157927==
Content-Type: text/html
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="attachment.html"
PGRpdiBkaXI9Imx0ciI+YW55Ym9keT88YnI+PC9kaXY+PGJyPjxkaXYgY2xhc3M9ImdtYWlsX3F1
b3RlIj48ZGl2IGRpcj0ibHRyIiBjbGFzcz0iZ21haWxfYXR0ciI+T24gVHVlLCBBcHIgMiwgMjAy
NCBhdCAxOjUz4oCvUE0gTmF0eG8gQXNlbmpvICZsdDs8YSBocmVmPSJtYWlsdG86bmF0eG8uYXNl
bmpvQGdtYWlsLmNvbSI+bmF0eG8uYXNlbmpvQGdtYWlsLmNvbTwvYT4mZ3Q7IHdyb3RlOjxicj48
L2Rpdj48YmxvY2txdW90ZSBjbGFzcz0iZ21haWxfcXVvdGUiIHN0eWxlPSJtYXJnaW46MHB4IDBw
eCAwcHggMC44ZXg7Ym9yZGVyLWxlZnQ6MXB4IHNvbGlkIHJnYigyMDQsMjA0LDIwNCk7cGFkZGlu
Zy1sZWZ0OjFleCI+PGRpdiBkaXI9Imx0ciI+PGRpdiBkaXI9Imx0ciI+PGRpdj5oaSw8L2Rpdj48
ZGl2Pjxicj48L2Rpdj48ZGl2Pjxicj48L2Rpdj48L2Rpdj48YnI+PGRpdiBjbGFzcz0iZ21haWxf
cXVvdGUiPjxkaXYgZGlyPSJsdHIiIGNsYXNzPSJnbWFpbF9hdHRyIj5PbiBUdWUsIE1hciAyNiwg
MjAyNCBhdCAyOjQ34oCvUE0gTmF0eG8gQXNlbmpvICZsdDs8YSBocmVmPSJtYWlsdG86bmF0eG8u
YXNlbmpvQGdtYWlsLmNvbSIgdGFyZ2V0PSJfYmxhbmsiPm5hdHhvLmFzZW5qb0BnbWFpbC5jb208
L2E+Jmd0OyB3cm90ZTo8YnI+PC9kaXY+PGJsb2NrcXVvdGUgY2xhc3M9ImdtYWlsX3F1b3RlIiBz
dHlsZT0ibWFyZ2luOjBweCAwcHggMHB4IDAuOGV4O2JvcmRlci1sZWZ0OjFweCBzb2xpZCByZ2Io
MjA0LDIwNCwyMDQpO3BhZGRpbmctbGVmdDoxZXgiPjxkaXYgZGlyPSJsdHIiPjxkaXY+aGksPC9k
aXY+PGRpdj48YnI+PC9kaXY+PGRpdj5wb3N0aW5nIGJhY2sgdG8gdGhlIGxpc3QuPC9kaXY+PGRp
dj48YnI+PC9kaXY+PGRpdj5BcHBhcmVudGx5IHRoZSBpZG0gc2VydmVyIGNhbm5vdCBmaW5kIGEg
U0lEIG9mIGEgZG9tYWluIHdoZW4gdHJ5aW5nIHRvIHJlc29sdmUgdGhlIHVzZXIgYWNjb3VudC4g
SXQgZG9lcyBmaW5kIHRoZSB1c2VyIGFjY291bnQsIGJ1dMKgIHRoZXJlIGFyZSBzaWRzIGNvdXBs
ZWQgdG8gdGhlIGFjY291bnQgY29ycmVzcG9uZGlnIHRvIGEgZG9tYWluIHdpY2ggY2Fubm90IGJl
IHJlc29sdmVkLjwvZGl2PjxkaXY+PGJyPjwvZGl2PjxkaXY+SXQgdG9vayBtZSBhIHdoaWxlIGJ1
dCB0aGUgc2lkIG9mIHRoYXQgY2hpbGQgZG9tYWluIGlzIG5vdCB0aGUgb25lIG5vdCByZXNvbHZl
ZC48L2Rpdj48ZGl2Pjxicj48L2Rpdj48ZGl2Pkl0IHR1cm5zIG91dCwgdGhlIHNpZCBvZiB0aGUg
ZG9tYWluIG5vdCByZXNvbHZpbmcgaXMgdGhlIG9uZSBvZiB0aGUgaWRtIHJlYWxtIGl0c2VsZi4s
IHdlIGhhdmXCoCBzb21lIGlkbSBncm91cHMgbWFwcGVkIHRvIHRoZSBBRCBncm91cHMgd2UgYWxs
b3cgaW4gaWRtIGZvciByYmFjLCBhbmQgaWYgSSBsb29rIGF0IHRoZSBpcGFOVFNlY3VyaXR5SWRl
bnRpZmllciBhdHRyaWJ1dGVzIG9mIHRoZSBpZCBncm91cHMsIHRob3NlIGFyZSB0aGUgbm90IHJl
c29sdmVkIGdyb3Vwcy48L2Rpdj48ZGl2Pjxicj48L2Rpdj48ZGl2PlRoaXMgaXMgdW5leHBlY3Rl
ZCAodG8gbWUgYXQgbGVhc3QpLiA8YnI+PC9kaXY+PGRpdj48YnI+PC9kaXY+PGRpdj5zbyB3ZSBo
YXZlIHRoaXMgdHJ1c3QgKHZlcmlmaWVkIG9uIHR3byBkaWZmZXJlbnQgaWRtIHNlcnZlcnMsIHNh
bWUgdmFsdWUpOjwvZGl2PjxkaXY+PGJyPjwvZGl2PjxkaXY+wqBpcGEgdHJ1c3QtZmluZDxicj4t
LS0tLS0tLS0tLS0tLS08YnI+MSB0cnVzdCBtYXRjaGVkPGJyPi0tLS0tLS0tLS0tLS0tLTxicj7C
oCBSZWFsbSBuYW1lOiBkb21haW4ubG9jYWw8YnI+wqAgRG9tYWluIE5ldEJJT1MgbmFtZTogRE9N
QUlOPGJyPsKgIERvbWFpbiBTZWN1cml0eSBJZGVudGlmaWVyOiBTLTEtNS0yMS0xNDE2MTMzOTE1
LTE4NjY5NzAyMDktMzMxNjI5MDY3OTxicj7CoCBUcnVzdCB0eXBlOiBBY3RpdmUgRGlyZWN0b3J5
IGRvbWFpbjxicj4tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tPGJyPk51bWJlciBvZiBlbnRy
aWVzIHJldHVybmVkIDE8L2Rpdj48ZGl2Pjxicj48L2Rpdj48ZGl2PmJ1dCBpbnNpZGUgdGhpcyBp
ZG0gZG9tYWluLCB3ZSBoYXZlIHNvbWUgaWRtIHBvc2l4IGdyb3VwcyB3aXRoIHRoZSBpcGFudHNl
Y3VyaXR5aWRlbnRpZmllciBvZiB0aGUgbm90IHJlc29sdmFibGUgZG9tYWluLCBmb3IgaW5zdGFu
Y2U6IFMtMS01LTIxLTEyMTQ2NTA2MDgtMzk3Njk3NzM5NS0zMDczMTY5MzExLTEwMTA3MjwvZGl2
PjxkaXY+PGJyPjwvZGl2PjxkaXY+U28gYmFzaWNhbGx5LCBpdCBpcyBub3QgbWF0Y2hpbmcgYmVj
YXVzZSBvZiB0aGlzIGlwYW50c2VjdXJpdHlpZGVudGlmaWVyLCBJIHRoaW5rLiA8YnI+PC9kaXY+
PGRpdj48YnI+PC9kaXY+PGRpdj5JIGRvIG5vdCBrbm93IGhvdyB0byBmaXggdGhpcyBhdCB0aGlz
IG1vbWVudCwgb3Igd2h5IGl0IGhhcyBoYXBwZW5lZC4gQW55IGlkZWFzPzxicj48L2Rpdj48ZGl2
Pjxicj48L2Rpdj48L2Rpdj4KPC9ibG9ja3F1b3RlPjwvZGl2PjxkaXY+PGJyPjwvZGl2PjxkaXY+
PGJyPjwvZGl2PjxkaXY+SSB3b25kZXIgaWYgc29tZWJvZHkgd2l0aCBtb3JlIHNzc2Qga25vd2xl
Z2RlIHRoYW4gbWUgY291bGQgcHVzaCBtZSBpbiB0aGUgcmlnaHQgZGlyZWN0aW9uLiBJcyBpdCBt
YXliZSBiZXR0ZXIgdG8gYXNrIGluIHRoZSBzc3NkIG1haWxpbmcgbGlzdD88L2Rpdj48ZGl2Pjxi
cj48L2Rpdj48ZGl2PlJlZ2FyZHMsPC9kaXY+PGRpdj48YnI+PC9kaXY+PGRpdj5OYXR4byBBc2Vu
am88YnI+PC9kaXY+PGJyPjxzcGFuIGNsYXNzPSJnbWFpbF9zaWduYXR1cmVfcHJlZml4Ij4tLSA8
L3NwYW4+PGJyPjxkaXYgZGlyPSJsdHIiIGNsYXNzPSJnbWFpbF9zaWduYXR1cmUiPi0tPGJyPkdy
b2V0ZW4sPGJyPm5hdHhvPC9kaXY+PC9kaXY+CjwvYmxvY2txdW90ZT48L2Rpdj48YnIgY2xlYXI9
ImFsbCI+PGJyPjxzcGFuIGNsYXNzPSJnbWFpbF9zaWduYXR1cmVfcHJlZml4Ij4tLSA8L3NwYW4+
PGJyPjxkaXYgZGlyPSJsdHIiIGNsYXNzPSJnbWFpbF9zaWduYXR1cmUiPi0tPGJyPkdyb2V0ZW4s
PGJyPm5hdHhvPC9kaXY+Cg==
--===============0538678951794157927==--
From twest at cherryroad.com Wed Apr 3 16:41:29 2024
Content-Type: multipart/mixed; boundary="===============0352983792269791353=="
MIME-Version: 1.0
From: Travis West
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: CA Subsystem certificate
Date: Wed, 03 Apr 2024 16:41:07 +0000
Message-ID: <20240403164107.31901.31039@mailman01.iad2.fedoraproject.org>
In-Reply-To: 88497baf-aca3-3c21-6cd7-5f8ca8447c57@redhat.com
--===============0352983792269791353==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
In the apache error log I found this that is generated when, in the UI, I t=
ry to access Authentication > Certificates > Certificate Authorities.
[Wed Apr 03 16:33:28.439180 2024] [:error] [pid 19048] ipa: INFO: [jsonserv=
er_session] twest(a)IPA.****.NET: cert_find(None, version=3Du'2.230'): SUCC=
ESS
[Wed Apr 03 16:33:30.661528 2024] [:warn] [pid 19601] [client IP.ADD.RE.SS:=
61691] failed to set perms (3140) on file (/var/run/ipa/ccaches/twest(a)IPA=
.****.NET)!, referer: https://ipa1-sea2.ipa.****.net/ipa/ui/
[Wed Apr 03 16:33:30.720054 2024] [:error] [pid 19047] ipa: INFO: [jsonserv=
er_session] twest(a)IPA.****.NET: ca_find(u'', sizelimit=3D0, version=3Du'2=
.230', pkey_only=3DTrue): SUCCESS
[Wed Apr 03 16:33:30.731584 2024] [:warn] [pid 19601] [client IP.ADD.RE.SS:=
61691] failed to set perms (3140) on file (/var/run/ipa/ccaches/twest(a)IPA=
.****.NET)!, referer: https://ipa1-sea2.ipa.****.net/ipa/ui/
[Wed Apr 03 16:33:30.831428 2024] [:error] [pid 19055] Bad remote server ce=
rtificate: -8179
[Wed Apr 03 16:33:30.831479 2024] [:error] [pid 19055] SSL Library Error: -=
8179 Certificate is signed by an unknown issuer
[Wed Apr 03 16:33:30.831557 2024] [:error] [pid 19055] Re-negotiation hands=
hake failed: Not accepted by client!?
[Wed Apr 03 16:33:30.831672 2024] [:error] [pid 19055] SSL Library Error: -=
12116 Unknown
[Wed Apr 03 16:33:30.832809 2024] [:error] [pid 19048] ipa: INFO: twest(a)I=
PA.****.NET: batch: ca_show(u'ipa'): NetworkError
[Wed Apr 03 16:33:30.833300 2024] [:error] [pid 19048] ipa: INFO: [jsonserv=
er_session] twest(a)IPA.****.NET: batch(({u'params': ([u'ipa'], {}), u'meth=
od': u'ca_show'},), version=3Du'2.230'): SUCCESS
but no indication of which certificate it is complaining about. I thought =
maybe the IPA RA cert, but that is definitely signed by this CA and doesn't=
expires on 2026.
The certs I generated and imported to /etc/pki/pki-tomcat/alias are also si=
gned by the CA.
--===============0352983792269791353==--
From rcritten at redhat.com Wed Apr 3 17:40:57 2024
Content-Type: multipart/mixed; boundary="===============6894659227725814313=="
MIME-Version: 1.0
From: Rob Crittenden
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: CA Subsystem certificate
Date: Wed, 03 Apr 2024 13:40:44 -0400
Message-ID: <9bed06e1-2084-d4f8-225f-0ecc95d23edc@redhat.com>
In-Reply-To: 20240403164107.31901.31039@mailman01.iad2.fedoraproject.org
--===============6894659227725814313==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Travis West via FreeIPA-users wrote:
> In the apache error log I found this that is generated when, in the UI, I=
try to access Authentication > Certificates > Certificate Authorities.
> =
> [Wed Apr 03 16:33:28.439180 2024] [:error] [pid 19048] ipa: INFO: [jsonse=
rver_session] twest(a)IPA.****.NET: cert_find(None, version=3Du'2.230'): SU=
CCESS
> [Wed Apr 03 16:33:30.661528 2024] [:warn] [pid 19601] [client IP.ADD.RE.S=
S:61691] failed to set perms (3140) on file (/var/run/ipa/ccaches/twest(a)I=
PA.****.NET)!, referer: https://ipa1-sea2.ipa.****.net/ipa/ui/
> [Wed Apr 03 16:33:30.720054 2024] [:error] [pid 19047] ipa: INFO: [jsonse=
rver_session] twest(a)IPA.****.NET: ca_find(u'', sizelimit=3D0, version=3Du=
'2.230', pkey_only=3DTrue): SUCCESS
> [Wed Apr 03 16:33:30.731584 2024] [:warn] [pid 19601] [client IP.ADD.RE.S=
S:61691] failed to set perms (3140) on file (/var/run/ipa/ccaches/twest(a)I=
PA.****.NET)!, referer: https://ipa1-sea2.ipa.****.net/ipa/ui/
> [Wed Apr 03 16:33:30.831428 2024] [:error] [pid 19055] Bad remote server =
certificate: -8179
> [Wed Apr 03 16:33:30.831479 2024] [:error] [pid 19055] SSL Library Error:=
-8179 Certificate is signed by an unknown issuer
> [Wed Apr 03 16:33:30.831557 2024] [:error] [pid 19055] Re-negotiation han=
dshake failed: Not accepted by client!?
> [Wed Apr 03 16:33:30.831672 2024] [:error] [pid 19055] SSL Library Error:=
-12116 Unknown
> [Wed Apr 03 16:33:30.832809 2024] [:error] [pid 19048] ipa: INFO: twest(a=
)IPA.****.NET: batch: ca_show(u'ipa'): NetworkError
> [Wed Apr 03 16:33:30.833300 2024] [:error] [pid 19048] ipa: INFO: [jsonse=
rver_session] twest(a)IPA.****.NET: batch(({u'params': ([u'ipa'], {}), u'me=
thod': u'ca_show'},), version=3Du'2.230'): SUCCESS
> =
> but no indication of which certificate it is complaining about. I though=
t maybe the IPA RA cert, but that is definitely signed by this CA and doesn=
't expires on 2026.
> The certs I generated and imported to /etc/pki/pki-tomcat/alias are also =
signed by the CA.
Apache, via the IPA API, is acting as the client in this case. So Apache
doesn't trust the CA certificate (unlikely), or the Server-Cert cert-pki-ca.
You can validate it directly with:
# certutil -V -u V -d /etc/pki/pki-tomcat/alias -n 'Server-Cert
cert-pki-ca' -e -f /etc/pki/pki-tomcat/alias/pwdfile.txt
Also, given the subject issues you ran into I guess I'd also verify that
the ASN.1 is correct in the issued certificates. This will be easier
since you have them as PEM files already:
# openssl asn1parse -inform pem -in /path/to/cert.pem
In the output you should see each component of the issuer and subject
broken out like:
...
37:d=3D5 hl=3D2 l=3D 3 prim: OBJECT :organizationName
42:d=3D5 hl=3D2 l=3D 12 prim: UTF8STRING :EXAMPLE.TEST
56:d=3D3 hl=3D2 l=3D 30 cons: SET
58:d=3D4 hl=3D2 l=3D 28 cons: SEQUENCE
60:d=3D5 hl=3D2 l=3D 3 prim: OBJECT :commonName
65:d=3D5 hl=3D2 l=3D 21 prim: UTF8STRING :Certificate Authority
88:d=3D2 hl=3D2 l=3D 30 cons: SEQUENCE
90:d=3D3 hl=3D2 l=3D 13 prim: UTCTIME :240221205457Z
105:d=3D3 hl=3D2 l=3D 13 prim: UTCTIME :260221205457Z
120:d=3D2 hl=3D2 l=3D 50 cons: SEQUENCE
122:d=3D3 hl=3D2 l=3D 21 cons: SET
124:d=3D4 hl=3D2 l=3D 19 cons: SEQUENCE
126:d=3D5 hl=3D2 l=3D 3 prim: OBJECT :organizationName
131:d=3D5 hl=3D2 l=3D 12 prim: UTF8STRING :EXAMPLE.TEST
145:d=3D3 hl=3D2 l=3D 25 cons: SET
147:d=3D4 hl=3D2 l=3D 23 cons: SEQUENCE
149:d=3D5 hl=3D2 l=3D 3 prim: OBJECT :commonName
154:d=3D5 hl=3D2 l=3D 16 prim: UTF8STRING :ipa.example.test
...
And finally, and this might be kinda nutty, but you can use certmonger
to force issue a new certificate using the resubmit command. I'd
snapshot things but that could be a way to get freshly issued certs that
might play more nicely with others.
rob
--===============6894659227725814313==--
From twest at cherryroad.com Wed Apr 3 18:05:49 2024
Content-Type: multipart/mixed; boundary="===============8457569091665490348=="
MIME-Version: 1.0
From: Travis West
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: CA Subsystem certificate
Date: Wed, 03 Apr 2024 18:05:35 +0000
Message-ID: <20240403180535.15891.48136@mailman01.iad2.fedoraproject.org>
In-Reply-To: 9bed06e1-2084-d4f8-225f-0ecc95d23edc@redhat.com
--===============8457569091665490348==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Here is the output of validation
# certutil -V -u V -d /etc/pki/pki-tomcat/alias -n 'Server-Cert cert-pki-ca=
' -e -f /etc/pki/pki-tomcat/alias/pwdfile.txt
certutil: certificate is valid
And for the asn.1 of the Audit, OCSP, Subsystem, and RA certs
$ openssl asn1parse -inform pem -in audit.crt
37:d=3D5 hl=3D2 l=3D 3 prim: OBJECT :organizationName
42:d=3D5 hl=3D2 l=3D 14 prim: UTF8STRING :IPA.****.NET
58:d=3D3 hl=3D2 l=3D 30 cons: SET
60:d=3D4 hl=3D2 l=3D 28 cons: SEQUENCE
62:d=3D5 hl=3D2 l=3D 3 prim: OBJECT :commonName
67:d=3D5 hl=3D2 l=3D 21 prim: UTF8STRING :Certificate Authority
90:d=3D2 hl=3D2 l=3D 30 cons: SEQUENCE
92:d=3D3 hl=3D2 l=3D 13 prim: UTCTIME :240403113826Z
107:d=3D3 hl=3D2 l=3D 13 prim: UTCTIME :340401113826Z
122:d=3D2 hl=3D2 l=3D 44 cons: SEQUENCE
124:d=3D3 hl=3D2 l=3D 23 cons: SET
126:d=3D4 hl=3D2 l=3D 21 cons: SEQUENCE
128:d=3D5 hl=3D2 l=3D 3 prim: OBJECT :organizationName
133:d=3D5 hl=3D2 l=3D 14 prim: UTF8STRING :IPA.****.NET
149:d=3D3 hl=3D2 l=3D 17 cons: SET
151:d=3D4 hl=3D2 l=3D 15 cons: SEQUENCE
153:d=3D5 hl=3D2 l=3D 3 prim: OBJECT :commonName
158:d=3D5 hl=3D2 l=3D 8 prim: UTF8STRING :CA Audit
=
$ openssl asn1parse -inform pem -in subsystem.crt
37:d=3D5 hl=3D2 l=3D 3 prim: OBJECT :organizationName
42:d=3D5 hl=3D2 l=3D 14 prim: UTF8STRING :IPA.****.NET
58:d=3D3 hl=3D2 l=3D 30 cons: SET
60:d=3D4 hl=3D2 l=3D 28 cons: SEQUENCE
62:d=3D5 hl=3D2 l=3D 3 prim: OBJECT :commonName
67:d=3D5 hl=3D2 l=3D 21 prim: UTF8STRING :Certificate Authority
90:d=3D2 hl=3D2 l=3D 30 cons: SEQUENCE
92:d=3D3 hl=3D2 l=3D 13 prim: UTCTIME :240403113547Z
107:d=3D3 hl=3D2 l=3D 13 prim: UTCTIME :340401113547Z
122:d=3D2 hl=3D2 l=3D 48 cons: SEQUENCE
124:d=3D3 hl=3D2 l=3D 23 cons: SET
126:d=3D4 hl=3D2 l=3D 21 cons: SEQUENCE
128:d=3D5 hl=3D2 l=3D 3 prim: OBJECT :organizationName
133:d=3D5 hl=3D2 l=3D 14 prim: UTF8STRING :IPA.****.NET
149:d=3D3 hl=3D2 l=3D 21 cons: SET
151:d=3D4 hl=3D2 l=3D 19 cons: SEQUENCE
153:d=3D5 hl=3D2 l=3D 3 prim: OBJECT :commonName
158:d=3D5 hl=3D2 l=3D 12 prim: UTF8STRING :CA Subsystem
=
$ openssl asn1parse -inform pem -in ocsp.crt
37:d=3D5 hl=3D2 l=3D 3 prim: OBJECT :organizationName
42:d=3D5 hl=3D2 l=3D 14 prim: UTF8STRING :IPA.****.NET
58:d=3D3 hl=3D2 l=3D 30 cons: SET
60:d=3D4 hl=3D2 l=3D 28 cons: SEQUENCE
62:d=3D5 hl=3D2 l=3D 3 prim: OBJECT :commonName
67:d=3D5 hl=3D2 l=3D 21 prim: UTF8STRING :Certificate Authority
90:d=3D2 hl=3D2 l=3D 30 cons: SEQUENCE
92:d=3D3 hl=3D2 l=3D 13 prim: UTCTIME :240403113248Z
107:d=3D3 hl=3D2 l=3D 13 prim: UTCTIME :340401113248Z
122:d=3D2 hl=3D2 l=3D 50 cons: SEQUENCE
124:d=3D3 hl=3D2 l=3D 23 cons: SET
126:d=3D4 hl=3D2 l=3D 21 cons: SEQUENCE
128:d=3D5 hl=3D2 l=3D 3 prim: OBJECT :organizationName
133:d=3D5 hl=3D2 l=3D 14 prim: UTF8STRING :IPA.****.NET
149:d=3D3 hl=3D2 l=3D 23 cons: SET
151:d=3D4 hl=3D2 l=3D 21 cons: SEQUENCE
153:d=3D5 hl=3D2 l=3D 3 prim: OBJECT :commonName
158:d=3D5 hl=3D2 l=3D 14 prim: UTF8STRING :OCSP Subsystem
$ openssl asn1parse -inform pem -in ra-agent.pem
37:d=3D5 hl=3D2 l=3D 3 prim: OBJECT :organizationName
42:d=3D5 hl=3D2 l=3D 14 prim: UTF8STRING :IPA.****.NET
58:d=3D3 hl=3D2 l=3D 30 cons: SET
60:d=3D4 hl=3D2 l=3D 28 cons: SEQUENCE
62:d=3D5 hl=3D2 l=3D 3 prim: OBJECT :commonName
67:d=3D5 hl=3D2 l=3D 21 prim: UTF8STRING :Certificate Authority
90:d=3D2 hl=3D2 l=3D 30 cons: SEQUENCE
92:d=3D3 hl=3D2 l=3D 13 prim: UTCTIME :240322132444Z
107:d=3D3 hl=3D2 l=3D 13 prim: UTCTIME :260312132444Z
122:d=3D2 hl=3D2 l=3D 42 cons: SEQUENCE
124:d=3D3 hl=3D2 l=3D 23 cons: SET
126:d=3D4 hl=3D2 l=3D 21 cons: SEQUENCE
128:d=3D5 hl=3D2 l=3D 3 prim: OBJECT :organizationName
133:d=3D5 hl=3D2 l=3D 14 prim: UTF8STRING :IPA.****.NET
149:d=3D3 hl=3D2 l=3D 15 cons: SET
151:d=3D4 hl=3D2 l=3D 13 cons: SEQUENCE
153:d=3D5 hl=3D2 l=3D 3 prim: OBJECT :commonName
158:d=3D5 hl=3D2 l=3D 6 prim: PRINTABLESTRING :IPA RA
I tried a resubmit on the ra-agent cert with getcert and this was the result
Request ID '20190322032004':
status: CA_UNREACHABLE
ca-error: Error 35 connecting to https://ipa1-sea2.ipa.****.net:844=
3/ca/agent/ca/profileReview: SSL connect error.
stuck: no
--===============8457569091665490348==--
From net.ricky at gmail.com Thu Apr 4 11:24:47 2024
Content-Type: multipart/mixed; boundary="===============5079749790102827758=="
MIME-Version: 1.0
From: Riccardo Rotondo
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: How to prevent non-admin users of FreeIPA from
reading the list of users in the web interface?
Date: Thu, 04 Apr 2024 11:24:36 +0000
Message-ID: <20240404112436.23044.55248@mailman01.iad2.fedoraproject.org>
In-Reply-To: ZgFKibyuLyE8WCyf@redhat.com
--===============5079749790102827758==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Hi Alexander, =
Thank you Alexander, this solution probably fits our needs. =
My only problem now is the I configured freeipa with docker, and in that im=
age developer didn't include the Fedora Account System plugin for IPA so in=
the log I found: =
ERROR in middleware: Uncaught IPA exception: Unknown option: fasgroup
I'll check with them if I can add this plug in post installation. =
Regards, =
Riccardo
--===============5079749790102827758==--
From cheimes at redhat.com Thu Apr 4 11:33:00 2024
Content-Type: multipart/mixed; boundary="===============8833835835129061386=="
MIME-Version: 1.0
From: Christian Heimes
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: How to prevent non-admin users of FreeIPA from
reading the list of users in the web interface?
Date: Thu, 04 Apr 2024 13:32:42 +0200
Message-ID: <02091964-3991-47fc-ac66-6dab4d5ab793@redhat.com>
In-Reply-To: 20240404112436.23044.55248@mailman01.iad2.fedoraproject.org
--===============8833835835129061386==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
On 04/04/2024 13.24, Riccardo Rotondo via FreeIPA-users wrote:
> Hi Alexander,
> =
> Thank you Alexander, this solution probably fits our needs.
> My only problem now is the I configured freeipa with docker, and in that =
image developer didn't include the Fedora Account System plugin for IPA so =
in the log I found:
> =
> ERROR in middleware: Uncaught IPA exception: Unknown option: fasgroup
> =
> I'll check with them if I can add this plug in post installation.
You can add the plugin to an existing installation. For a normal =
installation of FreeIPA, `dnf install freeipa-fas` just works. The =
package runs ipa-server-upgrade and restarts ipa.service in the =
posttrans scriplet.
It appears that does not work for containers. You need to figure out how =
to run ipa-server-upgrade while the container is running.
-- =
Christian Heimes
Principal Software Engineer, Identity Management and Platform Security
Red Hat GmbH, https://de.redhat.com/ , Registered seat: Grasbrunn,
Commercial register: Amtsgericht Muenchen, HRB 153243,
Managing Directors: Charles Cachera, Brian Klemm, Laurie Krebs, Michael =
O'Neill
--===============8833835835129061386==--
From abokovoy at redhat.com Thu Apr 4 11:35:35 2024
Content-Type: multipart/mixed; boundary="===============7411437056610086291=="
MIME-Version: 1.0
From: Alexander Bokovoy
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: How to prevent non-admin users of FreeIPA from
reading the list of users in the web interface?
Date: Thu, 04 Apr 2024 14:35:16 +0300
Message-ID:
In-Reply-To: 20240404112436.23044.55248@mailman01.iad2.fedoraproject.org
--===============7411437056610086291==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
On =D0=A7=D1=86=D0=B2, 04 =D0=BA=D1=80=D0=B0 2024, Riccardo Rotondo via Fre=
eIPA-users wrote:
>Hi Alexander,
>
>Thank you Alexander, this solution probably fits our needs.
>My only problem now is the I configured freeipa with docker, and in
>that image developer didn't include the Fedora Account System plugin
>for IPA so in the log I found:
>
>ERROR in middleware: Uncaught IPA exception: Unknown option: fasgroup
>
>I'll check with them if I can add this plug in post installation.
I'd say you need to build your own image on top of
freeipa/freeipa-container. I'd rather do that by cloning git repo and
extending =
RUN yum -y install --setopt=3Dinstall_weak_deps=3DFalse ipa-server ipa-serv=
er-dns ipa-server-trust-ad patch ipa-healthcheck ipa-client-epn && yum clea=
n all
in one of the Dockerfile.* for your target. Or you can derive from
freeipa-container image and explicitly add that in your own Dockerfile.
-- =
/ Alexander Bokovoy
Sr. Principal Software Engineer
Security / Identity Management Engineering
Red Hat Limited, Finland
--===============7411437056610086291==--
From twest at cherryroad.com Thu Apr 4 11:50:26 2024
Content-Type: multipart/mixed; boundary="===============5620967703570922824=="
MIME-Version: 1.0
From: Travis West
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: CA Subsystem certificate
Date: Thu, 04 Apr 2024 11:50:04 +0000
Message-ID: <20240404115004.27812.24569@mailman01.iad2.fedoraproject.org>
In-Reply-To: 9bed06e1-2084-d4f8-225f-0ecc95d23edc@redhat.com
--===============5620967703570922824==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
This morning I tried running ipa-server-upgrade to see if that would help. =
It ultimately failed, but in a different spot and with a different error:
2024-04-04T11:36:42Z DEBUG The CA status is: running
2024-04-04T11:36:42Z INFO [Ensuring CA is using LDAPProfileSubsystem]
2024-04-04T11:36:42Z INFO [Migrating certificate profiles to LDAP]
2024-04-04T11:36:42Z DEBUG Created connection context.ldap2_140461768893264
2024-04-04T11:36:42Z DEBUG flushing ldapi://%2fvar%2frun%2fslapd-IPA-****-N=
ET.socket from SchemaCache
2024-04-04T11:36:42Z DEBUG retrieving schema for SchemaCache url=3Dldapi://=
%2fvar%2frun%2fslapd-IPA-****-NET.socket conn=3D
2024-04-04T11:36:42Z DEBUG Destroyed connection context.ldap2_1404617688932=
64
2024-04-04T11:36:42Z DEBUG request GET https://ipa1-sea2.ipa.****.net:8443/=
ca/rest/account/login
2024-04-04T11:36:42Z DEBUG request body ''
2024-04-04T11:36:42Z DEBUG httplib request failed:
Traceback (most recent call last):
File "/usr/lib/python2.7/site-packages/ipapython/dogtag.py", line 220, in=
_httplib_request
conn.request(method, uri, body=3Drequest_body, headers=3Dheaders)
File "/usr/lib64/python2.7/httplib.py", line 1041, in request
self._send_request(method, url, body, headers)
File "/usr/lib64/python2.7/httplib.py", line 1075, in _send_request
self.endheaders(body)
File "/usr/lib64/python2.7/httplib.py", line 1037, in endheaders
self._send_output(message_body)
File "/usr/lib64/python2.7/httplib.py", line 881, in _send_output
self.send(msg)
File "/usr/lib64/python2.7/httplib.py", line 843, in send
self.connect()
File "/usr/lib64/python2.7/httplib.py", line 1260, in connect
server_hostname=3Dsni_hostname)
File "/usr/lib64/python2.7/ssl.py", line 348, in wrap_socket
_context=3Dself)
File "/usr/lib64/python2.7/ssl.py", line 609, in __init__
self.do_handshake()
File "/usr/lib64/python2.7/ssl.py", line 831, in do_handshake
self._sslobj.do_handshake()
SSLError: [SSL: TLSV1_ALERT_UNKNOWN_CA] tlsv1 alert unknown ca (_ssl.c:618)
2024-04-04T11:36:42Z ERROR IPA server upgrade failed: Inspect /var/log/ipau=
pgrade.log and run command ipa-server-upgrade manually.
2024-04-04T11:36:42Z DEBUG File "/usr/lib/python2.7/site-packages/ipapyth=
on/admintool.py", line 178, in execute
return_value =3D self.run()
File "/usr/lib/python2.7/site-packages/ipaserver/install/ipa_server_upgra=
de.py", line 54, in run
server.upgrade()
File "/usr/lib/python2.7/site-packages/ipaserver/install/server/upgrade.p=
y", line 2085, in upgrade
upgrade_configuration()
File "/usr/lib/python2.7/site-packages/ipaserver/install/server/upgrade.p=
y", line 1952, in upgrade_configuration
ca_enable_ldap_profile_subsystem(ca)
File "/usr/lib/python2.7/site-packages/ipaserver/install/server/upgrade.p=
y", line 396, in ca_enable_ldap_profile_subsystem
cainstance.migrate_profiles_to_ldap()
File "/usr/lib/python2.7/site-packages/ipaserver/install/cainstance.py", =
line 1814, in migrate_profiles_to_ldap
_create_dogtag_profile(profile_id, profile_data, overwrite=3DFalse)
File "/usr/lib/python2.7/site-packages/ipaserver/install/cainstance.py", =
line 1820, in _create_dogtag_profile
with api.Backend.ra_certprofile as profile_api:
File "/usr/lib/python2.7/site-packages/ipaserver/plugins/dogtag.py", line=
1298, in __enter__
method=3D'GET'
File "/usr/lib/python2.7/site-packages/ipapython/dogtag.py", line 167, in=
https_request
method=3Dmethod, headers=3Dheaders)
File "/usr/lib/python2.7/site-packages/ipapython/dogtag.py", line 229, in=
_httplib_request
raise NetworkError(uri=3Duri, error=3Dstr(e))
2024-04-04T11:36:42Z DEBUG The ipa-server-upgrade command failed, exception=
: NetworkError: cannot connect to 'https://ipa1-sea2.ipa.****.net:8443/ca/r=
est/account/login': [SSL: TLSV1_ALERT_UNKNOWN_CA] tlsv1 alert unknown ca (_=
ssl.c:618)
2024-04-04T11:36:42Z ERROR Unexpected error - see /var/log/ipaupgrade.log f=
or details:
Again with the 'unknown ca' message. I've confirmed that the ca.crt is the=
same that is listed as the caSigngingCert in /etc/pki/pki-tomcat/alias and=
is the one found at /etc/ipa/ca.crt.
I believe my output of asn.1 for each certificate also shows all the certif=
icates signed by the CA, so I'm not sure what certificate it's complaining =
about coming from an unknown CA.
--===============5620967703570922824==--
From twest at cherryroad.com Thu Apr 4 14:28:11 2024
Content-Type: multipart/mixed; boundary="===============6765852593746840700=="
MIME-Version: 1.0
From: Travis West
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: CA Subsystem certificate
Date: Thu, 04 Apr 2024 14:27:47 +0000
Message-ID: <20240404142747.27192.77018@mailman01.iad2.fedoraproject.org>
In-Reply-To: 9bed06e1-2084-d4f8-225f-0ecc95d23edc@redhat.com
--===============6765852593746840700==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Rob,
I installed the ipa-healthcheck that you got to work on CentOS 7, and run i=
t. Got a couple of errors regarding the RA Agent cert:
[
{
"source": "ipahealthcheck.ipa.certs",
"kw": {
"msg": "Certificate validation for /var/lib/ipa/ra-agent.pem failed: =
",
"reason": "",
"key": "/var/lib/ipa/ra-agent.pem"
},
"uuid": "a855346c-4998-4415-a819-ce83048e174e",
"duration": "0.100214",
"when": "20240404141916Z",
"check": "IPAOpenSSLChainValidation",
"result": "ERROR"
},
{
"source": "ipahealthcheck.ipa.certs",
"kw": {
"msg": "RA agent not found in LDAP"
},
"uuid": "b6efdb6c-ca33-4421-bdc5-c449e7d64591",
"duration": "0.027569",
"when": "20240404141916Z",
"check": "IPARAAgent",
"result": "ERROR"
}
That first error, I'm not sure about what kind of validation it's performin=
g. In my asn.1 output earlier I did include the ra-agent.pem and it looks =
like it's correctly signed.
As far as the "RA agent not found in LDAP", it looks to me like it is, and =
it matches the cert in /var/lib/ipa/ra-agent.pem
# ldapsearch -D "cn=3Ddirectory manager" -W -b uid=3Dipara,ou=3Dpeople,o=3D=
ipaca
Enter LDAP Password:
# extended LDIF
#
# LDAPv3
# base with scope subtree
# filter: (objectclass=3D*)
# requesting: ALL
#
# ipara, people, ipaca
dn: uid=3Dipara,ou=3Dpeople,o=3Dipaca
description: 2;7;CN=3DCertificate Authority,O=3DIPA.****.NET;CN=3DIPA RA,O=
=3DIPA.****.NET
userCertificate:: MIID6j...ssifAg=3D=3D
uid: ipara
sn: ipara
usertype: agentType
userstate: 1
objectClass: cmsuser
objectClass: top
objectClass: organizationalPerson
objectClass: inetOrgPerson
objectClass: person
cn: ipara
# search result
search: 2
result: 0 Success
# numResponses: 2
# numEntries: 1
# cat ra-agent.pem
-----BEGIN CERTIFICATE-----
MIID6j...ssifAg=3D=3D
-----END CERTIFICATE-----
--===============6765852593746840700==--
From rcritten at redhat.com Thu Apr 4 15:00:58 2024
Content-Type: multipart/mixed; boundary="===============2395213925785423771=="
MIME-Version: 1.0
From: Rob Crittenden
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: CA Subsystem certificate
Date: Thu, 04 Apr 2024 11:00:39 -0400
Message-ID:
In-Reply-To: 20240404142747.27192.77018@mailman01.iad2.fedoraproject.org
--===============2395213925785423771==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Travis West via FreeIPA-users wrote:
> Rob,
> =
> I installed the ipa-healthcheck that you got to work on CentOS 7, and run=
it. Got a couple of errors regarding the RA Agent cert:
> =
> [
> {
> "source": "ipahealthcheck.ipa.certs",
> "kw": {
> "msg": "Certificate validation for /var/lib/ipa/ra-agent.pem failed=
: ",
> "reason": "",
> "key": "/var/lib/ipa/ra-agent.pem"
> },
> "uuid": "a855346c-4998-4415-a819-ce83048e174e",
> "duration": "0.100214",
> "when": "20240404141916Z",
> "check": "IPAOpenSSLChainValidation",
> "result": "ERROR"
> },
> {
> "source": "ipahealthcheck.ipa.certs",
> "kw": {
> "msg": "RA agent not found in LDAP"
> },
> "uuid": "b6efdb6c-ca33-4421-bdc5-c449e7d64591",
> "duration": "0.027569",
> "when": "20240404141916Z",
> "check": "IPARAAgent",
> "result": "ERROR"
> }
It runs: openssl verify -verbose -show_chain -CAfile /etc/ipa/ca.crt
/var/lib/ipa/ra-agent.pem
> That first error, I'm not sure about what kind of validation it's perform=
ing. In my asn.1 output earlier I did include the ra-agent.pem and it look=
s like it's correctly signed.
> As far as the "RA agent not found in LDAP", it looks to me like it is, an=
d it matches the cert in /var/lib/ipa/ra-agent.pem
> =
> # ldapsearch -D "cn=3Ddirectory manager" -W -b uid=3Dipara,ou=3Dpeople,o=
=3Dipaca
> Enter LDAP Password:
> # extended LDIF
> #
> # LDAPv3
> # base with scope subtree
> # filter: (objectclass=3D*)
> # requesting: ALL
> #
> =
> # ipara, people, ipaca
> dn: uid=3Dipara,ou=3Dpeople,o=3Dipaca
> description: 2;7;CN=3DCertificate Authority,O=3DIPA.****.NET;CN=3DIPA RA,=
O=3DIPA.****.NET
> userCertificate:: MIID6j...ssifAg=3D=3D
> uid: ipara
> sn: ipara
> usertype: agentType
> userstate: 1
> objectClass: cmsuser
> objectClass: top
> objectClass: organizationalPerson
> objectClass: inetOrgPerson
> objectClass: person
> cn: ipara
> =
> # search result
> search: 2
> result: 0 Success
> =
> # numResponses: 2
> # numEntries: 1
> =
> # cat ra-agent.pem
> -----BEGIN CERTIFICATE-----
> MIID6j...ssifAg=3D=3D
> -----END CERTIFICATE-----
Watch the 389-ds access log (buffer) while healthcheck runs. You should
see the failed search and the reason may be enlightening (or not).
You can also add --debug to the command and may be that will help.
rob
--===============2395213925785423771==--
From abokovoy at redhat.com Thu Apr 4 15:21:13 2024
Content-Type: multipart/mixed; boundary="===============1289647115932934240=="
MIME-Version: 1.0
From: Alexander Bokovoy
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: upgrade idm servers rhel 7 to 8 problems
Date: Thu, 04 Apr 2024 18:20:50 +0300
Message-ID:
In-Reply-To: CAHBEJzU1iiHHKxMC_BteGhn+P1tZf5dBzQU99PwRTwZV9KXt5A@mail.gmail.com
--===============1289647115932934240==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
On =D0=90=D1=9E=D1=82, 02 =D0=BA=D1=80=D0=B0 2024, Natxo Asenjo wrote:
>hi,
>
>
>
>On Tue, Mar 26, 2024 at 2:47=E2=80=AFPM Natxo Asenjo wrote:
>
>> hi,
>>
>> posting back to the list.
>>
>> Apparently the idm server cannot find a SID of a domain when trying to
>> resolve the user account. It does find the user account, but there are
>> sids coupled to the account correspondig to a domain wich cannot be
>> resolved.
>>
>> It took me a while but the sid of that child domain is not the one not
>> resolved.
>>
>> It turns out, the sid of the domain not resolving is the one of the idm
>> realm itself., we have some idm groups mapped to the AD groups we allow=
in
>> idm for rbac, and if I look at the ipaNTSecurityIdentifier attributes of
>> the id groups, those are the not resolved groups.
>>
>> This is unexpected (to me at least).
>>
>> so we have this trust (verified on two different idm servers, same value=
):
>>
>> ipa trust-find
>> ---------------
>> 1 trust matched
>> ---------------
>> Realm name: domain.local
>> Domain NetBIOS name: DOMAIN
>> Domain Security Identifier: S-1-5-21-1416133915-1866970209-3316290679
>> Trust type: Active Directory domain
>> ----------------------------
>> Number of entries returned 1
>>
>> but inside this idm domain, we have some idm posix groups with the
>> ipantsecurityidentifier of the not resolvable domain, for instance:
>> S-1-5-21-1214650608-3976977395-3073169311-101072
>>
>> So basically, it is not matching because of this ipantsecurityidentifier,
>> I think.
>>
>> I do not know how to fix this at this moment, or why it has happened. Any
>> ideas?
>>
>>
>
>I wonder if somebody with more sssd knowlegde than me could push me in the
>right direction. Is it maybe better to ask in the sssd mailing list?
No idea why is that. Is the SID of IPA domain
S-1-5-21-1214650608-3976977395-3073169311? If not, please replace SIDs
of the IPA groups that have S-1-5-21-1214650608-3976977395-3073169311 in
their ipaNTSecurityIdentifier by the proper IPA domain SID. You probably
need to construct an LDIF file that does this modification.
>
>Regards,
>
>Natxo Asenjo
>
>-- =
>--
>Groeten,
>natxo
-- =
/ Alexander Bokovoy
Sr. Principal Software Engineer
Security / Identity Management Engineering
Red Hat Limited, Finland
--===============1289647115932934240==--
From twest at cherryroad.com Thu Apr 4 15:26:50 2024
Content-Type: multipart/mixed; boundary="===============6884811754516232225=="
MIME-Version: 1.0
From: Travis West
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: CA Subsystem certificate
Date: Thu, 04 Apr 2024 15:26:31 +0000
Message-ID: <20240404152631.7903.82642@mailman01.iad2.fedoraproject.org>
In-Reply-To: b0d61789-312c-e1cb-f1fd-34a72827e0bc@redhat.com
--===============6884811754516232225==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
If I run that command manually it doesn't appear to do anything except outp=
ut 'recognized usages"
If I try it without the -show_chain flag I get
# openssl verify -verbose -CAfile /etc/ipa/ca.crt /var/lib/ipa/ra-agent.pem
/var/lib/ipa/ra-agent.pem: O =3D IPA.****.NET, CN =3D IPA RA
error 20 at 0 depth lookup:unable to get local issuer certificate
The only information in the access log while healthcheck is running is a nu=
mber of these
[04/Apr/2024:15:09:46 +0000] "POST https://ipa1-sea2.ipa.****.net:443/ca/ag=
ent/ca/displayBySerial HTTP/1.1" 403 229
But those coincide with the healthcheck checking other certificates managed=
by certmonger where the error shown by healthcheck is
[SSL: SSL_HANDSHAKE_FAILURE] ssl handshake failure (_ssl.c:1822)",
--===============6884811754516232225==--
From sam at robots.org.uk Thu Apr 4 17:07:10 2024
Content-Type: multipart/mixed; boundary="===============0134138707863028239=="
MIME-Version: 1.0
From: Sam Morris
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Can CA system certificates be rekeyed?
Date: Thu, 04 Apr 2024 18:06:41 +0100
Message-ID: <3c3e1989-28a5-423c-958e-3abb267ea484@robots.org.uk>
--===============0134138707863028239==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Hi folks
I make use of certmonger's key_use_count to ensure that I don't use the =
same private key more than once when issuing service certificates. I was =
wondering what would happen if this was set on a FreeIPA server. Having =
done a bit of reading I think this looks like a Very Bad Idea, but I was =
wondering if someone could confirm the following:
1. It's fine to rekey the KDC/dirsrv/httpd service certificates - =
there's nothing particularly special about them.
2. The Dogtag-related certificates are renewed on the CA renewal master, =
and stashed into the directory in entries under =
cn=3Dca_renewal,cn=3Dipa,cn=3Detc,$SUFFIX so that the other servers can =
retrieve them; but the private keys aren't stashed in the directory, so =
transporting the new keys to the other servers would be a manual process.
3. One of these certificates is the CA certificate which you would never =
want to re-key because that would cause absolute mayhem.
4. There's no way to have certmonger re-key the service certificates =
(from the "IPA" CA) when renewing, but not the system certificates (from =
the "dogtag-ipa-ca-renew-agent" CA); so setting key_use_count is a =
really bad idea, never do it on a FreeIPA server.
Cheers,
-- =
Sam Morris
PGP: rsa4096/CAAA AA1A CA69 A83A 892B 1855 D20B 4202 5CDA 27B9
--===============0134138707863028239==--
From twest at cherryroad.com Thu Apr 4 17:44:21 2024
Content-Type: multipart/mixed; boundary="===============5627248411507019430=="
MIME-Version: 1.0
From: Travis West
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: CA Subsystem certificate
Date: Thu, 04 Apr 2024 17:43:58 +0000
Message-ID: <20240404174358.4041.11134@mailman01.iad2.fedoraproject.org>
In-Reply-To: b0d61789-312c-e1cb-f1fd-34a72827e0bc@redhat.com
--===============5627248411507019430==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
I spun up a new server and did a fresh install of IPA. On that server if I=
run the command I get a better result
# openssl verify -verbose -show_chain -CAfile /etc/ipa/ca.crt /var/lib/ipa/=
ra-agent.pem =
/var/lib/ipa/ra-agent.pem: OK
Chain:
depth=3D0: O =3D AUTH.****.NET, CN =3D IPA RA (untrusted)
depth=3D1: O =3D AUTH.****.NET, CN =3D Certificate Authority
So I must be missing something with the RA cert. It's definitely in LDAP. =
I've read that it should also be present in /etc/httpd/alias/ NSS DB, but =
that directory is empty on the fresh install so I cannot confirm.
The ASN.1 appears to be correct on the ra-agent.pem when I check
$ openssl asn1parse -inform pem -in ra-agent.pem
37:d=3D5 hl=3D2 l=3D 3 prim: OBJECT :organizationName
42:d=3D5 hl=3D2 l=3D 14 prim: UTF8STRING :IPA.****.NET
58:d=3D3 hl=3D2 l=3D 30 cons: SET
60:d=3D4 hl=3D2 l=3D 28 cons: SEQUENCE
62:d=3D5 hl=3D2 l=3D 3 prim: OBJECT :commonName
67:d=3D5 hl=3D2 l=3D 21 prim: UTF8STRING :Certificate Authority
90:d=3D2 hl=3D2 l=3D 30 cons: SEQUENCE
92:d=3D3 hl=3D2 l=3D 13 prim: UTCTIME :240322132444Z
107:d=3D3 hl=3D2 l=3D 13 prim: UTCTIME :260312132444Z
122:d=3D2 hl=3D2 l=3D 42 cons: SEQUENCE
124:d=3D3 hl=3D2 l=3D 23 cons: SET
126:d=3D4 hl=3D2 l=3D 21 cons: SEQUENCE
128:d=3D5 hl=3D2 l=3D 3 prim: OBJECT :organizationName
133:d=3D5 hl=3D2 l=3D 14 prim: UTF8STRING :IPA.****.NET
149:d=3D3 hl=3D2 l=3D 15 cons: SET
151:d=3D4 hl=3D2 l=3D 13 cons: SEQUENCE
153:d=3D5 hl=3D2 l=3D 3 prim: OBJECT :commonName
158:d=3D5 hl=3D2 l=3D 6 prim: PRINTABLESTRING :IPA RA
This was another cert that had an incorrect Principle attached and was rege=
nerated. I may have messed up something there, but I'm not sure what.
I do have a copy of the ra-agent.pem (and matching key) with the correct Pr=
inciple from 2019. I can put this in place on the broken server, but even =
with rolling the time back I'm not sure it will get renewed.
--===============5627248411507019430==--
From smilehce.heo at samsung.com Fri Apr 5 07:43:34 2024
Content-Type: multipart/mixed; boundary="===============7721932329001268274=="
MIME-Version: 1.0
From: Heo Paul
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Possible to split a toplogy to 2 topologies?
Date: Fri, 05 Apr 2024 07:43:22 +0000
Message-ID: <20240405074322.3753.11915@mailman01.iad2.fedoraproject.org>
--===============7721932329001268274==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Hi. I installed ipa-core servers in a toplogy and the version of those are =
4.9.3.
A topology : 1 <--> 2 <--> 3 <--> 4 <--> 5 <--> 6
And I'd like to disconnect agreements between 3 and 4 replicas, I expect th=
at there should be 2 seperate topologies like the below.
A topology : 1 <--> 2 <--> 3 =
B topology : 4 <--> 5 <--> 6
But when I try to execute the following commands, but those all fails due t=
o "ipa: ERROR: Server is unwilling to perform: Removal of Segment disconnec=
ts topology.Deletion not allowed."
- ipa-topologysegment-del =
- ldapdelete cn=3Dxx3.com-to-xx4.com,cn=3Dca,cn=3Dtopology,cn=3Dipa,cn=3De=
tc,dc=3Dsamsungsre,dc=3Dcom
And I also did "ipa-replica-manage del" command but some issues also occurr=
ed.
Could you guide me to disconnect replications between non-leaf replicas?
--===============7721932329001268274==--
From twest at cherryroad.com Fri Apr 5 12:43:28 2024
Content-Type: multipart/mixed; boundary="===============4163444333289306919=="
MIME-Version: 1.0
From: Travis West
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: CA Subsystem certificate
Date: Fri, 05 Apr 2024 12:43:05 +0000
Message-ID: <20240405124305.23569.80746@mailman01.iad2.fedoraproject.org>
In-Reply-To: b0d61789-312c-e1cb-f1fd-34a72827e0bc@redhat.com
--===============4163444333289306919==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
This morning I thought I had found what I was missing, import the new RA ce=
rt to ~/.dogtag/nssdb, which I've done and now all the places I know about =
the RA cert matches.
# certutil -L -d /root/.dogtag/nssdb
Certificate Nickname Trust Attribut=
es
SSL,S/MIME,JAR=
/XPI
Certificate Authority - IPA.****.NET CT,C,C
IPA RA - IPA.****.NET u,u,u
# certutil -L -d /root/.dogtag/nssdb -n "IPA RA - IPA.****.NET" -a
-----BEGIN CERTIFICATE-----
MIID6jCC...ssifAg=3D=3D
-----END CERTIFICATE-----
# certutil -L -d /root/.dogtag/nssdb -n "IPA RA - IPA.****.NET" | grep Seri=
al
Serial Number: 7 (0x7)
# ldapsearch -D "cn=3Ddirectory manager" -W -b uid=3Dipara,ou=3Dpeople,o=3D=
ipaca
Enter LDAP Password:
# extended LDIF
#
# LDAPv3
# base with scope subtree
# filter: (objectclass=3D*)
# requesting: ALL
#
# ipara, people, ipaca
dn: uid=3Dipara,ou=3Dpeople,o=3Dipaca
description: 2;7;CN=3DCertificate Authority,O=3DIPA.****.NET;CN=3DIPA RA,O=
=3DIPA.****.NET
userCertificate:: MIID6jCC...ssifAg=3D=3D
uid: ipara
sn: ipara
usertype: agentType
userstate: 1
objectClass: cmsuser
objectClass: top
objectClass: organizationalPerson
objectClass: inetOrgPerson
objectClass: person
cn: ipara
# search result
search: 2
result: 0 Success
# numResponses: 2
# numEntries: 1
# cat /var/lib/ipa/ra-agent.pem
-----BEGIN CERTIFICATE-----
MIID6jCC...ssifAg=3D=3D
-----END CERTIFICATE-----
but the openssl verify command with the -show_chain flag still seems to fail
]# openssl verify -verbose -show_chain -CAfile /etc/ipa/ca.crt /var/lib/ipa=
/ra-agent.pem
usage: verify [-verbose] [-CApath path] [-CAfile file] [-trusted_first] [-p=
urpose purpose] [-crl_check] [-no_alt_chains] [-attime timestamp] [-engine =
e] cert1 cert2 ...
recognized usages:
sslclient SSL client
sslserver SSL server
nssslserver Netscape SSL server
smimesign S/MIME signing
smimeencrypt S/MIME encryption
crlsign CRL signing
any Any Purpose
ocsphelper OCSP helper
timestampsign Time Stamp signing
--===============4163444333289306919==--
From rcritten at redhat.com Fri Apr 5 12:43:43 2024
Content-Type: multipart/mixed; boundary="===============8864096267214349602=="
MIME-Version: 1.0
From: Rob Crittenden
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: Possible to split a toplogy to 2 topologies?
Date: Fri, 05 Apr 2024 08:43:26 -0400
Message-ID:
In-Reply-To: 20240405074322.3753.11915@mailman01.iad2.fedoraproject.org
--===============8864096267214349602==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Heo Paul via FreeIPA-users wrote:
> Hi. I installed ipa-core servers in a toplogy and the version of those ar=
e 4.9.3.
> =
> A topology : 1 <--> 2 <--> 3 <--> 4 <--> 5 <--> 6
> =
> And I'd like to disconnect agreements between 3 and 4 replicas, I expect =
that there should be 2 seperate topologies like the below.
> =
> A topology : 1 <--> 2 <--> 3 =
> B topology : 4 <--> 5 <--> 6
> =
> But when I try to execute the following commands, but those all fails due=
to "ipa: ERROR: Server is unwilling to perform: Removal of Segment disconn=
ects topology.Deletion not allowed."
> - ipa-topologysegment-del =
> - ldapdelete cn=3Dxx3.com-to-xx4.com,cn=3Dca,cn=3Dtopology,cn=3Dipa,cn=
=3Detc,dc=3Dsamsungsre,dc=3Dcom
> =
> And I also did "ipa-replica-manage del" command but some issues also occu=
rred.
> =
> Could you guide me to disconnect replications between non-leaf replicas?
Why do you want to split this? It will mean that both claim to be the
same topology but will no longer replicate. As you can see IPA works
hard to prevent this.
rob
--===============8864096267214349602==--
From cheimes at redhat.com Fri Apr 5 14:06:21 2024
Content-Type: multipart/mixed; boundary="===============1911221450474201302=="
MIME-Version: 1.0
From: Christian Heimes
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: Possible to split a toplogy to 2 topologies?
Date: Fri, 05 Apr 2024 16:05:57 +0200
Message-ID:
In-Reply-To: 20240405074322.3753.11915@mailman01.iad2.fedoraproject.org
--===============1911221450474201302==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
On 05/04/2024 09.43, Heo Paul via FreeIPA-users wrote:
> Hi. I installed ipa-core servers in a toplogy and the version of those ar=
e 4.9.3.
>
> A topology : 1 <--> 2 <--> 3 <--> 4 <--> 5 <--> 6
For the record, that is a problematic topology with no fault tolerance =
and slow replication. Each server should have at least two, better three =
replication agreements. I recommend that you aim for a topology mesh =
with maximum two hops between each server.
Christian
-- =
Christian Heimes
Principal Software Engineer, Identity Management and Platform Security
Red Hat GmbH, https://de.redhat.com/ , Registered seat: Grasbrunn,
Commercial register: Amtsgericht Muenchen, HRB 153243,
Managing Directors: Charles Cachera, Brian Klemm, Laurie Krebs, Michael O'N=
eill
--===============1911221450474201302==--
From twest at cherryroad.com Fri Apr 5 14:44:44 2024
Content-Type: multipart/mixed; boundary="===============7667102303924039729=="
MIME-Version: 1.0
From: Travis West
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: CA Subsystem certificate
Date: Fri, 05 Apr 2024 14:44:23 +0000
Message-ID: <20240405144423.15717.2479@mailman01.iad2.fedoraproject.org>
In-Reply-To: b0d61789-312c-e1cb-f1fd-34a72827e0bc@redhat.com
--===============7667102303924039729==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
The problem was definitely the ra-agent.pem. I generated a new one and imp=
orted it to ~/.dogtag/nssdb, LDAP and placed the pem and key in /var/lib/ip=
a/
Now I can verify the certificate with the openssl verify command. Addition=
ally the error in the UI is gone and running an 'ipa cert-show 1' works and=
doesn't return the error I was seeing.
The last piece here is replicating the new certificates to other 5 hosts in=
the cluster. Is there a method to do that or should I import the new cert=
s manually on the other hosts?
--===============7667102303924039729==--
From daniel.e.white at nasa.gov Fri Apr 5 16:05:24 2024
Content-Type: multipart/mixed; boundary="===============9195363181717033948=="
MIME-Version: 1.0
From: White, Daniel E. (GSFC-770.0)[AEGIS]
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Old documentation about FreeIPA plus FreeRADIUS
Date: Fri, 05 Apr 2024 16:04:48 +0000
Message-ID: <3DE67258-26B5-47F7-B2E4-8A6E7F18E7CF@contoso.com>
--===============9195363181717033948==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
https://www.freeipa.org/page/Using_FreeIPA_and_FreeRadius_as_a_RADIUS_based=
_software_token_OTP_system_with_CentOS/RedHat_7
It says:
PLEASE NOTE that this set-up uses unencrypted passwords between the client =
and the authentication server, i.e. password will be trasmitted as CLEAR TE=
XT, consider this with respect to your environment.
Would using LDAPS in the RADIUS configuration files fix this ?
--===============9195363181717033948==
Content-Type: text/html
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="attachment.html"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--===============9195363181717033948==--
From rcritten at redhat.com Fri Apr 5 16:47:51 2024
Content-Type: multipart/mixed; boundary="===============6628233357395464038=="
MIME-Version: 1.0
From: Rob Crittenden
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: CA Subsystem certificate
Date: Fri, 05 Apr 2024 12:47:26 -0400
Message-ID: <5f9263b3-ebbe-60f4-6fba-26dca0ad0b98@redhat.com>
In-Reply-To: 20240405144423.15717.2479@mailman01.iad2.fedoraproject.org
--===============6628233357395464038==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Travis West via FreeIPA-users wrote:
> The problem was definitely the ra-agent.pem. I generated a new one and i=
mported it to ~/.dogtag/nssdb, LDAP and placed the pem and key in /var/lib/=
ipa/
> =
> Now I can verify the certificate with the openssl verify command. Additi=
onally the error in the UI is gone and running an 'ipa cert-show 1' works a=
nd doesn't return the error I was seeing.
> =
> The last piece here is replicating the new certificates to other 5 hosts =
in the cluster. Is there a method to do that or should I import the new ce=
rts manually on the other hosts?
If you put the certificates into
cn=3D,cn=3Dca_renewal,cn=3Dipa,cn=3Detc,$SUFFIX then the other se=
rvers
will pick them up assuming that replication is working.
rob
--===============6628233357395464038==--
From twest at cherryroad.com Fri Apr 5 17:06:49 2024
Content-Type: multipart/mixed; boundary="===============0021661001689496412=="
MIME-Version: 1.0
From: Travis West
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: CA Subsystem certificate
Date: Fri, 05 Apr 2024 17:06:27 +0000
Message-ID: <20240405170627.8912.80982@mailman01.iad2.fedoraproject.org>
In-Reply-To: 5f9263b3-ebbe-60f4-6fba-26dca0ad0b98@redhat.com
--===============0021661001689496412==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Thanks Rob! New certs are all replicated and all IPA services are started =
on all 6 servers.
I can perform 'ipa cert-show 1' on all 6 and get the expected result.
As a sanity check I did run the ipa-healthcheck on all 6 servers. One of t=
hem came back fine, the other 5 returned
[
{
"source": "ipahealthcheck.ipa.dna",
"kw": {
"msg": "No DNA range defined. If no masters define a range then users=
and groups cannot be created.",
"range_start": 0,
"next_start": 0,
"next_max": 0,
"range_max": 0
},
"uuid": "70636197-0b3e-4424-b509-1aa7f8be084d",
"duration": "0.706384",
"when": "20240405170045Z",
"check": "IPADNARangeCheck",
"result": "WARNING"
}
]
Now it's just a WARNING, and since the one didn't return it (they're all de=
noted as MASTER) maybe it's okay?
--===============0021661001689496412==--
From rcritten at redhat.com Fri Apr 5 17:38:21 2024
Content-Type: multipart/mixed; boundary="===============5860768893881052062=="
MIME-Version: 1.0
From: Rob Crittenden
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: CA Subsystem certificate
Date: Fri, 05 Apr 2024 13:38:05 -0400
Message-ID:
In-Reply-To: 20240405170627.8912.80982@mailman01.iad2.fedoraproject.org
--===============5860768893881052062==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Travis West via FreeIPA-users wrote:
> Thanks Rob! New certs are all replicated and all IPA services are starte=
d on all 6 servers.
> I can perform 'ipa cert-show 1' on all 6 and get the expected result.
> =
> As a sanity check I did run the ipa-healthcheck on all 6 servers. One of=
them came back fine, the other 5 returned
> =
> [
> {
> "source": "ipahealthcheck.ipa.dna",
> "kw": {
> "msg": "No DNA range defined. If no masters define a range then use=
rs and groups cannot be created.",
> "range_start": 0,
> "next_start": 0,
> "next_max": 0,
> "range_max": 0
> },
> "uuid": "70636197-0b3e-4424-b509-1aa7f8be084d",
> "duration": "0.706384",
> "when": "20240405170045Z",
> "check": "IPADNARangeCheck",
> "result": "WARNING"
> }
> ]
> =
> Now it's just a WARNING, and since the one didn't return it (they're all =
denoted as MASTER) maybe it's okay?
It just means that when you add users or groups you do it against the
same IPA server. If you do it on others then it will split the range
between them as needed. Not a bad thing but it gets complex if you add
and remove a lot of servers, particularly older ones. I made changes a
few years ago to try to capture ranges that would otherwise be lost but
it's sort of a best effort kind of thing.
The purpose if this is to ensure that at least one server has a range.
Currently healthcheck only validates the server it is running on and
doesn't do much cluster-wide checking.
rob
--===============5860768893881052062==--
From twest at cherryroad.com Fri Apr 5 17:45:52 2024
Content-Type: multipart/mixed; boundary="===============9061026692420371255=="
MIME-Version: 1.0
From: Travis West
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: CA Subsystem certificate
Date: Fri, 05 Apr 2024 17:45:31 +0000
Message-ID: <20240405174531.16260.75916@mailman01.iad2.fedoraproject.org>
In-Reply-To: f1bdb9e0-4904-9f6b-3b61-af14d8e1c219@redhat.com
--===============9061026692420371255==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Alright, so 'ipa idrange-find' returns the same values on all 6 servers.
However, ldapsearch -x -D 'cn=3DDirectory Manager' -W -b 'cn=3DPosix IDs,cn=
=3DDistributed Numeric Assignment Plugin,cn=3Dplugins,cn=3Dconfig'
returns different results on 1 (the one where I don't get that warning with=
the healthcheck) The other 5 return
dnaMagicRegen: -1
dnaMaxValue: 1100
dnaNextValue: 1101
dnaScope: dc=3Dipa,dc=3Dsuperb,dc=3Dnet
dnaSharedCfgDN: cn=3Dposix-ids,cn=3Ddna,cn=3Dipa,cn=3Detc,dc=3Dipa,dc=3Dsup=
erb,dc=3Dnet
dnaThreshold: 500
dnaType: uidNumber
dnaType: gidNumber
objectClass: top
objectClass: extensibleObject
Which seems to match your blog post from 2015 about this.
Since I cannot be sure which IPA server will be used when enrolling new hos=
ts, would it be best to try to fix this? I suppose the same can be said fo=
r when new users are added. If done manually I can be sure it will be don=
e on the same host, but we have an internal system that also creates the us=
er in IPA and I think that would just use whichever one is closest.
--===============9061026692420371255==--
From twest at cherryroad.com Fri Apr 5 17:47:59 2024
Content-Type: multipart/mixed; boundary="===============7104534402651829077=="
MIME-Version: 1.0
From: Travis West
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: CA Subsystem certificate
Date: Fri, 05 Apr 2024 17:47:50 +0000
Message-ID: <20240405174750.16904.32388@mailman01.iad2.fedoraproject.org>
In-Reply-To: f1bdb9e0-4904-9f6b-3b61-af14d8e1c219@redhat.com
--===============7104534402651829077==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
I tried adding a test user on one of the servers that returned that warning=
and the new user didn't appear on the others.
So maybe replication is broken.
--===============7104534402651829077==--
From twest at cherryroad.com Fri Apr 5 18:44:46 2024
Content-Type: multipart/mixed; boundary="===============3198028164042219620=="
MIME-Version: 1.0
From: Travis West
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: CA Subsystem certificate
Date: Fri, 05 Apr 2024 18:44:24 +0000
Message-ID: <20240405184424.26245.43434@mailman01.iad2.fedoraproject.org>
In-Reply-To: f1bdb9e0-4904-9f6b-3b61-af14d8e1c219@redhat.com
--===============3198028164042219620==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
I take that back. Replication is working on 4/6 servers.
If I add a user on any of those 4 it shows up on the other 3. The 2 outlie=
rs don't seem to pick up the new user. If I check the 2 outliers I get this
Error (18) Replication error acquiring replica: Incremental update transien=
t error. Backing off, will retry update later. (transient error)
Which seems to be saying that it's just delayed, which can sometimes happen=
in an MMR setup. I will recheck these 2 later to see if they eventually p=
ick up the new test user I've created and that is present on 4 of them.
--===============3198028164042219620==--
From hgcoin at gmail.com Sun Apr 7 13:21:00 2024
Content-Type: multipart/mixed; boundary="===============8804765862503956718=="
MIME-Version: 1.0
From: Harry G Coin
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] 'ipk11id length should not be 0' -- 'restart counter
at 811' how to correct?
Date: Sun, 07 Apr 2024 08:20:45 -0500
Message-ID: <403fe776-242b-4b7f-b801-c8840cc99fa4@gmail.com>
--===============8804765862503956718==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
What's the correct way to correct the cause of this error message?=C2=A0 =
There is no guidance online I can find.=C2=A0 I first saw it a few years ag=
o, =
it's back. ipa-ods-exporter emits this assertion, then quits.
ipk11id length should not be 0
This system hosts the dnssec master db. There is one replica.=C2=A0 That's =
it.
Apr 07 08:12:08 registry1.1.quietfountain.com systemd[1]: =
ipa-ods-exporter.service: Scheduled restart job, restart counter is at 811.
Apr 07 08:12:08 registry1.1.quietfountain.com systemd[1]: Stopped IPA =
OpenDNSSEC Signer replacement.
Apr 07 08:12:08 registry1.1.quietfountain.com systemd[1]: =
ipa-ods-exporter.service: Consumed 2.876s CPU time.
Apr 07 08:12:08 registry1.1.quietfountain.com systemd[1]: Started IPA =
OpenDNSSEC Signer replacement.
Apr 07 08:12:09 registry1.1.quietfountain.com ipa-ods-exporter[857534]: =
ipa-ods-exporter: INFO=C2=A0=C2=A0=C2=A0=C2=A0 To increase debugging set de=
bug=3DTrue in =
dns.conf See default.conf(5) for details
Apr 07 08:12:10 registry1.1.quietfountain.com python3[857534]: GSSAPI =
client step 1
Apr 07 08:12:10 registry1.1.quietfountain.com python3[857534]: GSSAPI =
client step 1
Apr 07 08:12:10 registry1.1.quietfountain.com python3[857534]: GSSAPI =
client step 1
Apr 07 08:12:10 registry1.1.quietfountain.com python3[857534]: =
Configuration.cpp(96): Missing log.level in configuration. Using default =
value: INFO
Apr 07 08:12:10 registry1.1.quietfountain.com python3[857534]: =
Configuration.cpp(96): Missing slots.mechanisms in configuration. Using =
default value: ALL
Apr 07 08:12:10 registry1.1.quietfountain.com python3[857534]: =
Configuration.cpp(124): Missing slots.removable in configuration. Using =
default value: false
Apr 07 08:12:11 registry1.1.quietfountain.com ipa-ods-exporter[857534]: =
Traceback (most recent call last):
Apr 07 08:12:11 registry1.1.quietfountain.com =
ipa-ods-exporter[857534]:=C2=A0=C2=A0 File "/usr/libexec/ipa/ipa-ods-export=
er", =
line 718, in
Apr 07 08:12:11 registry1.1.quietfountain.com ipa-ods-exporter[857534]: =
ldap2master_replica_keys_sync(ldapkeydb, localhsm)
Apr 07 08:12:11 registry1.1.quietfountain.com =
ipa-ods-exporter[857534]:=C2=A0=C2=A0 File "/usr/libexec/ipa/ipa-ods-export=
er", =
line 295, in ldap2master_replica_keys_sync
Apr 07 08:12:11 registry1.1.quietfountain.com ipa-ods-exporter[857534]: =
hex_set(localhsm.replica_pubkeys_wrap))
Apr 07 08:12:11 registry1.1.quietfountain.com =
ipa-ods-exporter[857534]:=C2=A0=C2=A0 File =
"/usr/lib/python3.9/site-packages/ipaserver/dnssec/localhsm.py", line =
130, in replica_pubkeys_wrap
Apr 07 08:12:11 registry1.1.quietfountain.com ipa-ods-exporter[857534]: =
self.find_keys(objclass=3D_ipap11helper.KEY_CLASS_PUBLIC_KEY,
Apr 07 08:12:11 registry1.1.quietfountain.com =
ipa-ods-exporter[857534]:=C2=A0=C2=A0 File =
"/usr/lib/python3.9/site-packages/ipaserver/dnssec/localhsm.py", line =
114, in find_keys
Apr 07 08:12:11 registry1.1.quietfountain.com =
ipa-ods-exporter[857534]:=C2=A0=C2=A0=C2=A0=C2=A0 key =3D Key(self.p11, h)
Apr 07 08:12:11 registry1.1.quietfountain.com =
ipa-ods-exporter[857534]:=C2=A0=C2=A0 File =
"/usr/lib/python3.9/site-packages/ipaserver/dnssec/localhsm.py", line =
38, in __init__
Apr 07 08:12:11 registry1.1.quietfountain.com =
ipa-ods-exporter[857534]:=C2=A0=C2=A0=C2=A0=C2=A0 assert len(cka_id) !=3D 0=
, 'ipk11id length =
should not be 0'
Apr 07 08:12:11 registry1.1.quietfountain.com ipa-ods-exporter[857534]: =
AssertionError: ipk11id length should not be 0
Apr 07 08:12:11 registry1.1.quietfountain.com systemd[1]: =
ipa-ods-exporter.service: Main process exited, code=3Dexited, status=3D1/FA=
ILURE
Apr 07 08:12:11 registry1.1.quietfountain.com systemd[1]: =
ipa-ods-exporter.service: Failed with result 'exit-code'.
Apr 07 08:12:11 registry1.1.quietfountain.com systemd[1]: =
ipa-ods-exporter.service: Consumed 2.938s CPU time.
on
[root(a)registry1 ~]# dnf info ipa-server
Last metadata expiration check: 3:19:38 ago on Sun 07 Apr 2024 04:55:29 =
AM CDT.
Installed Packages
Name =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0: ipa-server
Version =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0: 4.10.2
Release =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0: 8.el9_3.alma.1
Architecture : x86_64
Size =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0: 1.1 M
Source =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0: ipa-4.10.2-8.el9_3.alma.1.src.=
rpm
Repository =C2=A0=C2=A0: @System
From repo =C2=A0=C2=A0=C2=A0: appstream
Summary =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0: The IPA authentication server
5.14.0-362.24.1.el9_3.x86_64 #1 SMP PREEMPT_DYNAMIC Wed Mar 20 04:52:13 =
EDT 2024 x86_64 x86_64 x86_64 GNU/Linux
p11 tools has one entry that has no id, no label, RSA of 0 byte length, =
with also the 'wrap' flag.=C2=A0 There's no obvious way to track that back =
to =
a file-- if that's event the right path to explore.
It's pretty much dead until this is solved.
--===============8804765862503956718==
Content-Type: text/html
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="attachment.html"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--===============8804765862503956718==--
From wdh at dds.nl Wed Apr 10 09:34:30 2024
Content-Type: multipart/mixed; boundary="===============1991240808166781822=="
MIME-Version: 1.0
From: Winfried de Heiden
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Extra objectClass for new IPA group
Date: Wed, 10 Apr 2024 11:34:11 +0200
Message-ID: <55fadd1d-aded-4ea0-9c8f-aa5fd9f904bb@dds.nl>
--===============1991240808166781822==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Hi all,
Following documentation as provided on:
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/ht=
ml/linux_domain_identity_authentication_and_policy_guide/adding-custom-objc=
lasses-groups#doc-wrapper =
adding an extra objectClass (groupOfUniqueNames in this case) to newly =
created groups turned out to be easy.
It seems we depend of this objectClass and its attribute "uniqueMember" =
because of existing applications. Adding the latter attribute will only =
work from the CLI. (ipa group-mod dummy3 =
--addattr=3DuniqueMember=3Duid=3Dsomeuser,cn=3Dusers,cn=3Daccounts,dc=3Dexa=
mple,dc=3Dcom)
OK, this seems to work well, but the objectClass will be added to ALL =
newly created groups since the objectClass is added to the defaults.=C2=A0 =
Now, let's say I want to add an extra objectClass to only one new =
created group; how would that be possible? The command "ipa group-add" =
command does not provide such an option, does it?
FYI, I'm running/testing IPA version: 4.11.0 on RHEL 9.4 Beta :)
The new attributes will not be visible in de webUI, only using the CLI =
(or good-old Apache Directory Studio of ldapsearch). Correct?
-- =
email handtekening priv=C3=A9 Met vriendelijke groet,
Winfried de Heiden
wdh(a)dds.nl
--===============1991240808166781822==
Content-Type: text/html
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="attachment.html"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--===============1991240808166781822==
Content-Type: image/jpeg
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="CrWSOZRro0lgUl3W.jpg"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--===============1991240808166781822==--
From rcritten at redhat.com Wed Apr 10 15:13:17 2024
Content-Type: multipart/mixed; boundary="===============3474676102824840688=="
MIME-Version: 1.0
From: Rob Crittenden
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: Extra objectClass for new IPA group
Date: Wed, 10 Apr 2024 11:13:00 -0400
Message-ID: <16bd9a7a-f054-753f-3f09-f907d310a1c8@redhat.com>
In-Reply-To: 55fadd1d-aded-4ea0-9c8f-aa5fd9f904bb@dds.nl
--===============3474676102824840688==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Winfried de Heiden via FreeIPA-users wrote:
> Hi all,
> =
> Following documentation as provided on:
> =
> https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/=
html/linux_domain_identity_authentication_and_policy_guide/adding-custom-ob=
jclasses-groups#doc-wrapper=C2=A0
> =
> adding an extra objectClass (groupOfUniqueNames in this case) to newly
> created groups turned out to be easy.
> =
> It seems we depend of this objectClass and its attribute "uniqueMember"
> because of existing applications. Adding the latter attribute will only
> work from the CLI. (ipa group-mod dummy3
> --addattr=3DuniqueMember=3Duid=3Dsomeuser,cn=3Dusers,cn=3Daccounts,dc=3De=
xample,dc=3Dcom)
Let me guess, vSphere?
You can try https://www.freeipa.org/page/HowTo/vsphere5_integration but
it's very old. I can't guarantee it will work.
It has the benefit that rather than manually modifying your entries the
extra attributes are calculated on the fly.
rob
> =
> OK, this seems to work well, but the objectClass will be added to ALL
> newly created groups since the objectClass is added to the defaults.=C2=
=A0
> Now, let's say I want to add an extra objectClass to only one new
> created group; how would that be possible? The command "ipa group-add"
> command does not provide such an option, does it?
> =
> FYI, I'm running/testing IPA version: 4.11.0 on RHEL 9.4 Beta :)
> =
> The new attributes will not be visible in de webUI, only using the CLI
> (or good-old Apache Directory Studio of ldapsearch). Correct?
> =
> -- =
> email handtekening priv=C3=A9 Met vriendelijke groet,
> =
> Winfried de Heiden
> wdh(a)dds.nl
> =
> =
> --
> _______________________________________________
> FreeIPA-users mailing list -- freeipa-users(a)lists.fedorahosted.org
> To unsubscribe send an email to freeipa-users-leave(a)lists.fedorahosted.=
org
> Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code=
-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives: https://lists.fedorahosted.org/archives/list/freeipa-users=
(a)lists.fedorahosted.org
> Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/=
new_issue
>=20
--===============3474676102824840688==--
From orion at nwra.com Wed Apr 10 22:34:01 2024
Content-Type: multipart/mixed; boundary="===============8164727226344116697=="
MIME-Version: 1.0
From: Orion Poplawski
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Cannot retrieve CRL from new EL9 IPA replica
Date: Wed, 10 Apr 2024 16:33:20 -0600
Message-ID:
--===============8164727226344116697==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
I've just added an EL9 IPA replica into our domain. I seems to generally be
working fine, but trying to download the MasterCRL.bin fails:
=3D=3D> /var/log/httpd/access_log <=3D=3D
10.20.0.37 - - [10/Apr/2024:14:13:17 -0700] "GET /ipa/crl/MasterCRL.bin
HTTP/1.1" 301 293 "-" "curl/7.76.1"
=3D=3D> /var/log/httpd/error_log <=3D=3D
[Wed Apr 10 14:14:17.830119 2024] [proxy_ajp:error] [pid 28001:tid 28040]
(70007)The timeout specified has expired: AH01030: ajp_ilink_receive() can't
receive header
[Wed Apr 10 14:14:17.830249 2024] [proxy_ajp:error] [pid 28001:tid 28040]
[client 10.20.0.37:35124] AH00992: ajp_read_header: ajp_ilink_receive failed
[Wed Apr 10 14:14:17.830261 2024] [proxy_ajp:error] [pid 28001:tid 28040]
(70007)The timeout specified has expired: [client 10.20.0.37:35124] AH00878:
read response failed from [::1]:8009 (localhost:8009)
=3D=3D> /var/log/httpd/access_log <=3D=3D
10.20.0.37 - - [10/Apr/2024:14:13:17 -0700] "GET
/ca/ee/ca/getCRL?op=3DgetCRL&crlIssuingPoint=3DMasterCRL HTTP/1.1" 500 527 =
"-"
"curl/7.76.1"
I'm not sure where else to look for logs.
TIA,
Orion
-- =
Orion Poplawski
he/him/his - surely the least important thing about me
Manager of IT Systems 720-772-5637
NWRA, Boulder/CoRA Office FAX: 303-415-9702
3380 Mitchell Lane orion(a)nwra.com
Boulder, CO 80301 https://www.nwra.com/
--===============8164727226344116697==
Content-Type: application/pkcs7-signature
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"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--===============8164727226344116697==--
From bo.langgaard.lind at gmail.com Thu Apr 11 09:15:13 2024
Content-Type: multipart/mixed; boundary="===============0776682702867456909=="
MIME-Version: 1.0
From: Bo Lind
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] httpd uses 2x100% CPU
Date: Thu, 11 Apr 2024 09:15:01 +0000
Message-ID: <20240411091501.19374.32160@mailman01.iad2.fedoraproject.org>
--===============0776682702867456909==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
I just went to check on one of my replicas, and noticed that the IPA web se=
rver seems to use a lot of CPU:
>From htop:
PID USER PRI NI VIRT RES SHR S CPU%=E2=96=BDMEM% TIME+ =
Command
507664 ipaapi 20 0 1353M 459M 16656 S 100.8 0.2 24h15:19 (wsgi:ip=
a) -DFOREGROUND
507984 ipaapi 20 0 1353M 459M 16656 R 100.8 0.2 24h15:12 (wsgi:ip=
a) -DFOREGROUND
>From top:
PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMM=
AND =
507664 ipaapi 20 0 1385892 470580 16656 S 100.0 0.2 1456:06 httpd
I checked /var/log/httpd/access_log and error_log, but there was nothing ou=
t of the ordinary.
I have not yet restarted the service/machine, as it's in production.
Any ideas?
--===============0776682702867456909==--
From wdh at dds.nl Thu Apr 11 09:58:14 2024
Content-Type: multipart/mixed; boundary="===============7929516368166767436=="
MIME-Version: 1.0
From: Winfried de Heiden
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: Extra objectClass for new IPA group
Date: Thu, 11 Apr 2024 11:57:58 +0200
Message-ID: <2d708a8c-43ae-4cbd-a226-e278f6d74244@dds.nl>
In-Reply-To: 16bd9a7a-f054-753f-3f09-f907d310a1c8@redhat.com
--===============7929516368166767436==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
hi all,
Nice tip, but no: not Vsphere although it might usefull later; so thanks
We need it for several self-build applications.
email handtekening priv=C3=A9 Met vriendelijke groet,
Winfried de Heiden
wdh(a)dds.nl
Op 10-04-2024 om 17:13 schreef Rob Crittenden:
> Winfried de Heiden via FreeIPA-users wrote:
>> Hi all,
>>
>> Following documentation as provided on:
>>
>> https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7=
/html/linux_domain_identity_authentication_and_policy_guide/adding-custom-o=
bjclasses-groups#doc-wrapper =
>>
>> adding an extra objectClass (groupOfUniqueNames in this case) to newly
>> created groups turned out to be easy.
>>
>> It seems we depend of this objectClass and its attribute "uniqueMember"
>> because of existing applications. Adding the latter attribute will only
>> work from the CLI. (ipa group-mod dummy3
>> --addattr=3DuniqueMember=3Duid=3Dsomeuser,cn=3Dusers,cn=3Daccounts,dc=3D=
example,dc=3Dcom)
> Let me guess, vSphere?
>
> You can tryhttps://www.freeipa.org/page/HowTo/vsphere5_integration but
> it's very old. I can't guarantee it will work.
>
> It has the benefit that rather than manually modifying your entries the
> extra attributes are calculated on the fly.
>
> rob
>
>
>> OK, this seems to work well, but the objectClass will be added to ALL
>> newly created groups since the objectClass is added to the defaults.
>> Now, let's say I want to add an extra objectClass to only one new
>> created group; how would that be possible? The command "ipa group-add"
>> command does not provide such an option, does it?
>>
>> FYI, I'm running/testing IPA version: 4.11.0 on RHEL 9.4 Beta :)
>>
>> The new attributes will not be visible in de webUI, only using the CLI
>> (or good-old Apache Directory Studio of ldapsearch). Correct?
>>
>> -- =
>> email handtekening priv=C3=A9 Met vriendelijke groet,
>>
>> Winfried de Heiden
>> wdh(a)dds.nl
>>
>>
>> --
>> _______________________________________________
>> FreeIPA-users mailing list --freeipa-users(a)lists.fedorahosted.org
>> To unsubscribe send an email tofreeipa-users-leave(a)lists.fedorahosted.=
org
>> Fedora Code of Conduct:https://docs.fedoraproject.org/en-US/project/code=
-of-conduct/
>> List Guidelines:https://fedoraproject.org/wiki/Mailing_list_guidelines
>> List Archives:https://lists.fedorahosted.org/archives/list/freeipa-users=
(a)lists.fedorahosted.org
>> Do not reply to spam, report it:https://pagure.io/fedora-infrastructure/=
new_issue
>>
--===============7929516368166767436==
Content-Type: text/html
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="attachment.html"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--===============7929516368166767436==
Content-Type: image/jpeg
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="z9UqMrGxLCilZG0D.jpg"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--===============7929516368166767436==--
From sam at robots.org.uk Thu Apr 11 14:24:11 2024
Content-Type: multipart/mixed; boundary="===============1734229441309970215=="
MIME-Version: 1.0
From: Sam Morris
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: "Credential cache is empty" error preventing
certmonger from renewing a host's certificate
Date: Thu, 11 Apr 2024 15:23:24 +0100
Message-ID:
In-Reply-To: e027b8c6-2b74-ad7d-81a4-ed89ebc24f85@robots.org.uk
--===============1734229441309970215==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
On 21/06/2023 09:02, Sam Morris via FreeIPA-users wrote:
> On 20/06/2023 15:34, Sam Morris via FreeIPA-users wrote:
>> I've got an IPA client on which certmonger is unable to renew a
>> certificate.
>>
>> Here are the log messages from certmonger...
>>
>> =C2=A0=C2=A0=C2=A0=C2=A0 2023-06-20 08:24:49 [622035] Certificate submis=
sion attempt =
>> complete.
>> =C2=A0=C2=A0=C2=A0=C2=A0 2023-06-20 08:24:49 [622035] Child status =3D 2.
>> =C2=A0=C2=A0=C2=A0=C2=A0 2023-06-20 08:24:49 [622035] Child output:
>> =C2=A0=C2=A0=C2=A0=C2=A0 "Server at https://ipa5.ipa.example.com/ipa/jso=
n denied our =
>> request, giving up: 2100 (Insufficient access: SASL(-1): generic =
>> failure: GSSAPI Error: Unspecified GSS failure.=C2=A0 Minor code may =
>> provide more information (Credential cache is >
>> =C2=A0=C2=A0=C2=A0=C2=A0 "
>> =C2=A0=C2=A0=C2=A0=C2=A0 2023-06-20 08:24:49 [622035] Server at =
>> https://ipa5.ipa.example.com/ipa/json denied our request, giving up: =
>> 2100 (Insufficient access: SASL(-1): generic failure: GSSAPI Error: =
>> Unspecified GSS failure.=C2=A0 Minor code may provide more infor>
>>
> Today I restarted certmonger (in order to increase its debug level) and =
> the newly-started instance immediately resubmitted its request and was =
> issued with a new certificate. So I guess the problem was on the client =
> after all.
(Posting to complete the thread)
With hindsight this must be the same issue I reported a couple of months =
later, =
, =
which was ultimately fixed in .
-- =
Sam Morris
PGP: rsa4096/CAAA AA1A CA69 A83A 892B 1855 D20B 4202 5CDA 27B9
--===============1734229441309970215==--
From flo at redhat.com Thu Apr 11 15:03:57 2024
Content-Type: multipart/mixed; boundary="===============7283073431009824792=="
MIME-Version: 1.0
From: Florence Blanc-Renaud
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: Cannot retrieve CRL from new EL9 IPA replica
Date: Thu, 11 Apr 2024 17:03:29 +0200
Message-ID:
In-Reply-To: a1675df1-e47b-4f36-8e1a-cf3adc9518cb@nwra.com
--===============7283073431009824792==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Hi,
On Thu, Apr 11, 2024 at 12:34=E2=80=AFAM Orion Poplawski via FreeIPA-users <
freeipa-users(a)lists.fedorahosted.org> wrote:
> I've just added an EL9 IPA replica into our domain. I seems to generally
> be
> working fine, but trying to download the MasterCRL.bin fails:
>
> =3D=3D> /var/log/httpd/access_log <=3D=3D
> 10.20.0.37 - - [10/Apr/2024:14:13:17 -0700] "GET /ipa/crl/MasterCRL.bin
> HTTP/1.1" 301 293 "-" "curl/7.76.1"
>
> =3D=3D> /var/log/httpd/error_log <=3D=3D
> [Wed Apr 10 14:14:17.830119 2024] [proxy_ajp:error] [pid 28001:tid 28040]
> (70007)The timeout specified has expired: AH01030: ajp_ilink_receive()
> can't
> receive header
> [Wed Apr 10 14:14:17.830249 2024] [proxy_ajp:error] [pid 28001:tid 28040]
> [client 10.20.0.37:35124] AH00992: ajp_read_header: ajp_ilink_receive
> failed
> [Wed Apr 10 14:14:17.830261 2024] [proxy_ajp:error] [pid 28001:tid 28040]
> (70007)The timeout specified has expired: [client 10.20.0.37:35124]
> AH00878:
> read response failed from [::1]:8009 (localhost:8009)
>
> =3D=3D> /var/log/httpd/access_log <=3D=3D
> 10.20.0.37 - - [10/Apr/2024:14:13:17 -0700] "GET
> /ca/ee/ca/getCRL?op=3DgetCRL&crlIssuingPoint=3DMasterCRL HTTP/1.1" 500 52=
7 "-"
> "curl/7.76.1"
>
> I'm not sure where else to look for logs.
>
If you are requesting the MasterCRL.bin file on a replica that is not the
CRL generation master, the URL is transferred to the local CA server at
http://replica.ipa.test/ca/ee/ca/getCRL?op=3DgetCRL&crlIssuingPoint=3DMaste=
rCRL
(this is configured in /etc/httpd/conf.d/ipa-pki-proxy.conf).
Then the calls to /ca/ee/ca/getCRL are handled by an AJP connector
(LocationMatch defined in /etc/httpd/conf.d/ipa-pki-proxy.conf using
ajp://localhost:8009). The AJP connector is defined
in /etc/pki/pki-tomcat/server.xml and should be using the loopback address.
There can be issues if your /etc/hosts does not contain the following lines:
127.0.0.1 localhost localhost.localdomain localhost4
localhost4.localdomain4
::1 localhost localhost.localdomain localhost6
localhost6.localdomain6
You can have a look
in /var/log/pki/pki-tomcat/localhost_access_log.$DATE.txt and check if the
request really reached the PKI server. Then check logs
in /var/log/pki/pki-tomcat/ca/debug.$DATE.log
HTH,
flo
> TIA,
> Orion
>
> --
> Orion Poplawski
> he/him/his - surely the least important thing about me
> Manager of IT Systems 720-772-5637
> NWRA, Boulder/CoRA Office FAX: 303-415-9702
> 3380 Mitchell Lane orion(a)nwra.com
> Boulder, CO 80301 https://www.nwra.com/
> --
> _______________________________________________
> FreeIPA-users mailing list -- freeipa-users(a)lists.fedorahosted.org
> To unsubscribe send an email to freeipa-users-leave(a)lists.fedorahosted.=
org
> Fedora Code of Conduct:
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives:
> https://lists.fedorahosted.org/archives/list/freeipa-users(a)lists.fedora=
hosted.org
> Do not reply to spam, report it:
> https://pagure.io/fedora-infrastructure/new_issue
>
--===============7283073431009824792==
Content-Type: text/html
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="attachment.html"
PGRpdiBkaXI9Imx0ciI+PGRpdiBkaXI9Imx0ciI+PGRpdiBjbGFzcz0iZ21haWxfZGVmYXVsdCIg
c3R5bGU9ImZvbnQtZmFtaWx5OmFyaWFsLHNhbnMtc2VyaWYiPkhpLDwvZGl2PjwvZGl2Pjxicj48
ZGl2IGNsYXNzPSJnbWFpbF9xdW90ZSI+PGRpdiBkaXI9Imx0ciIgY2xhc3M9ImdtYWlsX2F0dHIi
Pk9uIFRodSwgQXByIDExLCAyMDI0IGF0IDEyOjM04oCvQU0gT3Jpb24gUG9wbGF3c2tpIHZpYSBG
cmVlSVBBLXVzZXJzICZsdDs8YSBocmVmPSJtYWlsdG86ZnJlZWlwYS11c2Vyc0BsaXN0cy5mZWRv
cmFob3N0ZWQub3JnIj5mcmVlaXBhLXVzZXJzQGxpc3RzLmZlZG9yYWhvc3RlZC5vcmc8L2E+Jmd0
OyB3cm90ZTo8YnI+PC9kaXY+PGJsb2NrcXVvdGUgY2xhc3M9ImdtYWlsX3F1b3RlIiBzdHlsZT0i
bWFyZ2luOjBweCAwcHggMHB4IDAuOGV4O2JvcmRlci1sZWZ0OjFweCBzb2xpZCByZ2IoMjA0LDIw
NCwyMDQpO3BhZGRpbmctbGVmdDoxZXgiPkkmIzM5O3ZlIGp1c3QgYWRkZWQgYW4gRUw5IElQQSBy
ZXBsaWNhIGludG8gb3VyIGRvbWFpbi7CoCBJIHNlZW1zIHRvIGdlbmVyYWxseSBiZTxicj4Kd29y
a2luZyBmaW5lLCBidXQgdHJ5aW5nIHRvIGRvd25sb2FkIHRoZSBNYXN0ZXJDUkwuYmluIGZhaWxz
Ojxicj4KPGJyPgo9PSZndDsgL3Zhci9sb2cvaHR0cGQvYWNjZXNzX2xvZyAmbHQ7PT08YnI+CjEw
LjIwLjAuMzcgLSAtIFsxMC9BcHIvMjAyNDoxNDoxMzoxNyAtMDcwMF0gJnF1b3Q7R0VUIC9pcGEv
Y3JsL01hc3RlckNSTC5iaW48YnI+CkhUVFAvMS4xJnF1b3Q7IDMwMSAyOTMgJnF1b3Q7LSZxdW90
OyAmcXVvdDtjdXJsLzcuNzYuMSZxdW90Ozxicj4KPGJyPgo9PSZndDsgL3Zhci9sb2cvaHR0cGQv
ZXJyb3JfbG9nICZsdDs9PTxicj4KW1dlZCBBcHIgMTAgMTQ6MTQ6MTcuODMwMTE5IDIwMjRdIFtw
cm94eV9hanA6ZXJyb3JdIFtwaWQgMjgwMDE6dGlkIDI4MDQwXTxicj4KKDcwMDA3KVRoZSB0aW1l
b3V0IHNwZWNpZmllZCBoYXMgZXhwaXJlZDogQUgwMTAzMDogYWpwX2lsaW5rX3JlY2VpdmUoKSBj
YW4mIzM5O3Q8YnI+CnJlY2VpdmUgaGVhZGVyPGJyPgpbV2VkIEFwciAxMCAxNDoxNDoxNy44MzAy
NDkgMjAyNF0gW3Byb3h5X2FqcDplcnJvcl0gW3BpZCAyODAwMTp0aWQgMjgwNDBdPGJyPgpbY2xp
ZW50IDxhIGhyZWY9Imh0dHA6Ly8xMC4yMC4wLjM3OjM1MTI0IiByZWw9Im5vcmVmZXJyZXIiIHRh
cmdldD0iX2JsYW5rIj4xMC4yMC4wLjM3OjM1MTI0PC9hPl0gQUgwMDk5MjogYWpwX3JlYWRfaGVh
ZGVyOiBhanBfaWxpbmtfcmVjZWl2ZSBmYWlsZWQ8YnI+CltXZWQgQXByIDEwIDE0OjE0OjE3Ljgz
MDI2MSAyMDI0XSBbcHJveHlfYWpwOmVycm9yXSBbcGlkIDI4MDAxOnRpZCAyODA0MF08YnI+Cig3
MDAwNylUaGUgdGltZW91dCBzcGVjaWZpZWQgaGFzIGV4cGlyZWQ6IFtjbGllbnQgPGEgaHJlZj0i
aHR0cDovLzEwLjIwLjAuMzc6MzUxMjQiIHJlbD0ibm9yZWZlcnJlciIgdGFyZ2V0PSJfYmxhbmsi
PjEwLjIwLjAuMzc6MzUxMjQ8L2E+XSBBSDAwODc4Ojxicj4KcmVhZCByZXNwb25zZSBmYWlsZWQg
ZnJvbSBbOjoxXTo4MDA5IChsb2NhbGhvc3Q6ODAwOSk8YnI+Cjxicj4KPT0mZ3Q7IC92YXIvbG9n
L2h0dHBkL2FjY2Vzc19sb2cgJmx0Oz09PGJyPgoxMC4yMC4wLjM3IC0gLSBbMTAvQXByLzIwMjQ6
MTQ6MTM6MTcgLTA3MDBdICZxdW90O0dFVDxicj4KL2NhL2VlL2NhL2dldENSTD9vcD1nZXRDUkwm
YW1wO2NybElzc3VpbmdQb2ludD1NYXN0ZXJDUkwgSFRUUC8xLjEmcXVvdDsgNTAwIDUyNyAmcXVv
dDstJnF1b3Q7PGJyPgomcXVvdDtjdXJsLzcuNzYuMSZxdW90Ozxicj4KPGJyPgpJJiMzOTttIG5v
dCBzdXJlIHdoZXJlIGVsc2UgdG8gbG9vayBmb3IgbG9ncy48YnI+PC9ibG9ja3F1b3RlPjxkaXY+
PGJyPjwvZGl2PjxkaXYgY2xhc3M9ImdtYWlsX2RlZmF1bHQiIHN0eWxlPSJmb250LWZhbWlseTph
cmlhbCxzYW5zLXNlcmlmIj5JZiB5b3UgYXJlIHJlcXVlc3RpbmcgdGhlIE1hc3RlckNSTC5iaW4g
ZmlsZSBvbiBhIHJlcGxpY2EgdGhhdCBpcyBub3QgdGhlIENSTCBnZW5lcmF0aW9uIG1hc3Rlciwg
dGhlIFVSTCBpcyB0cmFuc2ZlcnJlZCB0byB0aGUgbG9jYWwgQ0Egc2VydmVyIGF0wqA8YSBocmVm
PSJodHRwOi8vcmVwbGljYS5pcGEudGVzdC9jYS9lZS9jYS9nZXRDUkw/b3A9Z2V0Q1JMJmFtcDtj
cmxJc3N1aW5nUG9pbnQ9TWFzdGVyQ1JMIj5odHRwOi8vcmVwbGljYS5pcGEudGVzdC9jYS9lZS9j
YS9nZXRDUkw/b3A9Z2V0Q1JMJmFtcDtjcmxJc3N1aW5nUG9pbnQ9TWFzdGVyQ1JMPC9hPiAodGhp
cyBpcyBjb25maWd1cmVkIGluwqAvZXRjL2h0dHBkL2NvbmYuZC9pcGEtcGtpLXByb3h5LmNvbmYp
LjwvZGl2PjxkaXYgY2xhc3M9ImdtYWlsX2RlZmF1bHQiIHN0eWxlPSJmb250LWZhbWlseTphcmlh
bCxzYW5zLXNlcmlmIj48YnI+PC9kaXY+PGRpdiBjbGFzcz0iZ21haWxfZGVmYXVsdCIgc3R5bGU9
ImZvbnQtZmFtaWx5OmFyaWFsLHNhbnMtc2VyaWYiPlRoZW4gdGhlIGNhbGxzIHRvIC9jYS9lZS9j
YS9nZXRDUkwgYXJlIGhhbmRsZWQgYnkgYW4gQUpQIGNvbm5lY3RvciAoTG9jYXRpb25NYXRjaCBk
ZWZpbmVkIGluwqAvZXRjL2h0dHBkL2NvbmYuZC9pcGEtcGtpLXByb3h5LmNvbmYgdXNpbmcgYWpw
Oi8vbG9jYWxob3N0OjgwMDkpLiBUaGUgQUpQIGNvbm5lY3RvciBpcyBkZWZpbmVkIGluwqAvZXRj
L3BraS9wa2ktdG9tY2F0L3NlcnZlci54bWwgYW5kIHNob3VsZCBiZSB1c2luZ8KgdGhlIGxvb3Bi
YWNrIGFkZHJlc3MuIFRoZXJlIGNhbiBiZSBpc3N1ZXMgaWYgeW91ciAvZXRjL2hvc3RzIGRvZXMg
bm90IGNvbnRhaW4gdGhlIGZvbGxvd2luZyBsaW5lczo8L2Rpdj48ZGl2IGNsYXNzPSJnbWFpbF9k
ZWZhdWx0IiBzdHlsZT0iZm9udC1mYW1pbHk6YXJpYWwsc2Fucy1zZXJpZiI+MTI3LjAuMC4xIMKg
IGxvY2FsaG9zdCBsb2NhbGhvc3QubG9jYWxkb21haW4gbG9jYWxob3N0NCBsb2NhbGhvc3Q0Lmxv
Y2FsZG9tYWluNDxicj46OjEgwqAgwqAgwqAgwqAgbG9jYWxob3N0IGxvY2FsaG9zdC5sb2NhbGRv
bWFpbiBsb2NhbGhvc3Q2IGxvY2FsaG9zdDYubG9jYWxkb21haW42PGJyPjxicj48L2Rpdj48ZGl2
IGNsYXNzPSJnbWFpbF9kZWZhdWx0IiBzdHlsZT0iZm9udC1mYW1pbHk6YXJpYWwsc2Fucy1zZXJp
ZiI+WW91IGNhbiBoYXZlIGEgbG9vayBpbsKgL3Zhci9sb2cvcGtpL3BraS10b21jYXQvbG9jYWxo
b3N0X2FjY2Vzc19sb2cuJERBVEUudHh0IGFuZCBjaGVjayBpZiB0aGUgcmVxdWVzdCByZWFsbHkg
cmVhY2hlZCB0aGUgUEtJIHNlcnZlci4gVGhlbiBjaGVjayBsb2dzIGluwqAvdmFyL2xvZy9wa2kv
cGtpLXRvbWNhdC9jYS9kZWJ1Zy4kREFURS5sb2c8L2Rpdj48ZGl2IGNsYXNzPSJnbWFpbF9kZWZh
dWx0IiBzdHlsZT0iZm9udC1mYW1pbHk6YXJpYWwsc2Fucy1zZXJpZiI+PGJyPjwvZGl2PjxkaXYg
Y2xhc3M9ImdtYWlsX2RlZmF1bHQiIHN0eWxlPSJmb250LWZhbWlseTphcmlhbCxzYW5zLXNlcmlm
Ij5IVEgsPC9kaXY+PGRpdiBjbGFzcz0iZ21haWxfZGVmYXVsdCIgc3R5bGU9ImZvbnQtZmFtaWx5
OmFyaWFsLHNhbnMtc2VyaWYiPmZsbzwvZGl2PjxkaXYgY2xhc3M9ImdtYWlsX2RlZmF1bHQiIHN0
eWxlPSJmb250LWZhbWlseTphcmlhbCxzYW5zLXNlcmlmIj48YnI+PC9kaXY+PGJsb2NrcXVvdGUg
Y2xhc3M9ImdtYWlsX3F1b3RlIiBzdHlsZT0ibWFyZ2luOjBweCAwcHggMHB4IDAuOGV4O2JvcmRl
ci1sZWZ0OjFweCBzb2xpZCByZ2IoMjA0LDIwNCwyMDQpO3BhZGRpbmctbGVmdDoxZXgiPgo8YnI+
ClRJQSw8YnI+CsKgIE9yaW9uPGJyPgo8YnI+Ci0tIDxicj4KT3Jpb24gUG9wbGF3c2tpPGJyPgpo
ZS9oaW0vaGlzwqAgLSBzdXJlbHkgdGhlIGxlYXN0IGltcG9ydGFudCB0aGluZyBhYm91dCBtZTxi
cj4KTWFuYWdlciBvZiBJVCBTeXN0ZW1zwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAg
NzIwLTc3Mi01NjM3PGJyPgpOV1JBLCBCb3VsZGVyL0NvUkEgT2ZmaWNlwqAgwqAgwqAgwqAgwqAg
wqAgwqBGQVg6IDMwMy00MTUtOTcwMjxicj4KMzM4MCBNaXRjaGVsbCBMYW5lwqAgwqAgwqAgwqAg
wqAgwqAgwqAgwqAgwqAgwqAgwqAgwqA8YSBocmVmPSJtYWlsdG86b3Jpb25AbndyYS5jb20iIHRh
cmdldD0iX2JsYW5rIj5vcmlvbkBud3JhLmNvbTwvYT48YnI+CkJvdWxkZXIsIENPIDgwMzAxwqAg
wqAgwqAgwqAgwqAgwqAgwqAgwqAgwqA8YSBocmVmPSJodHRwczovL3d3dy5ud3JhLmNvbS8iIHJl
bD0ibm9yZWZlcnJlciIgdGFyZ2V0PSJfYmxhbmsiPmh0dHBzOi8vd3d3Lm53cmEuY29tLzwvYT48
YnI+Ci0tPGJyPgpfX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
Xzxicj4KRnJlZUlQQS11c2VycyBtYWlsaW5nIGxpc3QgLS0gPGEgaHJlZj0ibWFpbHRvOmZyZWVp
cGEtdXNlcnNAbGlzdHMuZmVkb3JhaG9zdGVkLm9yZyIgdGFyZ2V0PSJfYmxhbmsiPmZyZWVpcGEt
dXNlcnNAbGlzdHMuZmVkb3JhaG9zdGVkLm9yZzwvYT48YnI+ClRvIHVuc3Vic2NyaWJlIHNlbmQg
YW4gZW1haWwgdG8gPGEgaHJlZj0ibWFpbHRvOmZyZWVpcGEtdXNlcnMtbGVhdmVAbGlzdHMuZmVk
b3JhaG9zdGVkLm9yZyIgdGFyZ2V0PSJfYmxhbmsiPmZyZWVpcGEtdXNlcnMtbGVhdmVAbGlzdHMu
ZmVkb3JhaG9zdGVkLm9yZzwvYT48YnI+CkZlZG9yYSBDb2RlIG9mIENvbmR1Y3Q6IDxhIGhyZWY9
Imh0dHBzOi8vZG9jcy5mZWRvcmFwcm9qZWN0Lm9yZy9lbi1VUy9wcm9qZWN0L2NvZGUtb2YtY29u
ZHVjdC8iIHJlbD0ibm9yZWZlcnJlciIgdGFyZ2V0PSJfYmxhbmsiPmh0dHBzOi8vZG9jcy5mZWRv
cmFwcm9qZWN0Lm9yZy9lbi1VUy9wcm9qZWN0L2NvZGUtb2YtY29uZHVjdC88L2E+PGJyPgpMaXN0
IEd1aWRlbGluZXM6IDxhIGhyZWY9Imh0dHBzOi8vZmVkb3JhcHJvamVjdC5vcmcvd2lraS9NYWls
aW5nX2xpc3RfZ3VpZGVsaW5lcyIgcmVsPSJub3JlZmVycmVyIiB0YXJnZXQ9Il9ibGFuayI+aHR0
cHM6Ly9mZWRvcmFwcm9qZWN0Lm9yZy93aWtpL01haWxpbmdfbGlzdF9ndWlkZWxpbmVzPC9hPjxi
cj4KTGlzdCBBcmNoaXZlczogPGEgaHJlZj0iaHR0cHM6Ly9saXN0cy5mZWRvcmFob3N0ZWQub3Jn
L2FyY2hpdmVzL2xpc3QvZnJlZWlwYS11c2Vyc0BsaXN0cy5mZWRvcmFob3N0ZWQub3JnIiByZWw9
Im5vcmVmZXJyZXIiIHRhcmdldD0iX2JsYW5rIj5odHRwczovL2xpc3RzLmZlZG9yYWhvc3RlZC5v
cmcvYXJjaGl2ZXMvbGlzdC9mcmVlaXBhLXVzZXJzQGxpc3RzLmZlZG9yYWhvc3RlZC5vcmc8L2E+
PGJyPgpEbyBub3QgcmVwbHkgdG8gc3BhbSwgcmVwb3J0IGl0OiA8YSBocmVmPSJodHRwczovL3Bh
Z3VyZS5pby9mZWRvcmEtaW5mcmFzdHJ1Y3R1cmUvbmV3X2lzc3VlIiByZWw9Im5vcmVmZXJyZXIi
IHRhcmdldD0iX2JsYW5rIj5odHRwczovL3BhZ3VyZS5pby9mZWRvcmEtaW5mcmFzdHJ1Y3R1cmUv
bmV3X2lzc3VlPC9hPjxicj4KPC9ibG9ja3F1b3RlPjwvZGl2PjwvZGl2Pgo=
--===============7283073431009824792==--
From rcritten at redhat.com Thu Apr 11 15:48:37 2024
Content-Type: multipart/mixed; boundary="===============3381513398903433460=="
MIME-Version: 1.0
From: Rob Crittenden
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: httpd uses 2x100% CPU
Date: Thu, 11 Apr 2024 11:48:22 -0400
Message-ID: <49098ec9-1069-a7cd-0c7e-9414fedfb3ac@redhat.com>
In-Reply-To: 20240411091501.19374.32160@mailman01.iad2.fedoraproject.org
--===============3381513398903433460==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Bo Lind via FreeIPA-users wrote:
> I just went to check on one of my replicas, and noticed that the IPA web =
server seems to use a lot of CPU:
> =
> From htop:
> PID USER PRI NI VIRT RES SHR S CPU%=E2=96=BDMEM% TIME+=
Command
> 507664 ipaapi 20 0 1353M 459M 16656 S 100.8 0.2 24h15:19 (wsgi:=
ipa) -DFOREGROUND
> 507984 ipaapi 20 0 1353M 459M 16656 R 100.8 0.2 24h15:12 (wsgi:=
ipa) -DFOREGROUND
> =
> From top:
> PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ CO=
MMAND =
> 507664 ipaapi 20 0 1385892 470580 16656 S 100.0 0.2 1456:06 ht=
tpd
> =
> I checked /var/log/httpd/access_log and error_log, but there was nothing =
out of the ordinary.
> =
> I have not yet restarted the service/machine, as it's in production.
> =
> Any ideas?
You said you looked at the logs but not what you looked at. Is the
server being hammered with requests?
strace would be a brute force way of seeing what it is doing but it
might not be easy to find from what I expect to be gigantic output what
is going on.
rob
--===============3381513398903433460==--
From orion at nwra.com Thu Apr 11 16:02:22 2024
Content-Type: multipart/mixed; boundary="===============8384887239569975922=="
MIME-Version: 1.0
From: Orion Poplawski
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: Cannot retrieve CRL from new EL9 IPA replica
Date: Thu, 11 Apr 2024 10:02:00 -0600
Message-ID: <9fc297f6-d0bb-4f58-8db0-9db92111be14@nwra.com>
In-Reply-To: CAFDg7JxxqCfV70BL-BWp9mvbso2sesMwLg_ZPOEZCUcOGUsHiA@mail.gmail.com
--===============8384887239569975922==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
On 4/11/24 09:03, Florence Blanc-Renaud wrote:
> Hi,
> =
> On Thu, Apr 11, 2024 at 12:34=E2=80=AFAM Orion Poplawski via FreeIPA-users
> > wrote:
> =
> I've just added an EL9 IPA replica into our domain.=C2=A0 I seems to =
generally be
> working fine, but trying to download the MasterCRL.bin fails:
> =
> =3D=3D> /var/log/httpd/access_log <=3D=3D
> 10.20.0.37 - - [10/Apr/2024:14:13:17 -0700] "GET /ipa/crl/MasterCRL.b=
in
> HTTP/1.1" 301 293 "-" "curl/7.76.1"
> =
> =3D=3D> /var/log/httpd/error_log <=3D=3D
> [Wed Apr 10 14:14:17.830119 2024] [proxy_ajp:error] [pid 28001:tid 28=
040]
> (70007)The timeout specified has expired: AH01030: ajp_ilink_receive(=
) can't
> receive header
> [Wed Apr 10 14:14:17.830249 2024] [proxy_ajp:error] [pid 28001:tid 28=
040]
> [client 10.20.0.37:35124 ] AH00992:
> ajp_read_header: ajp_ilink_receive failed
> [Wed Apr 10 14:14:17.830261 2024] [proxy_ajp:error] [pid 28001:tid 28=
040]
> (70007)The timeout specified has expired: [client 10.20.0.37:35124
> ] AH00878:
> read response failed from [::1]:8009 (localhost:8009)
> =
> =3D=3D> /var/log/httpd/access_log <=3D=3D
> 10.20.0.37 - - [10/Apr/2024:14:13:17 -0700] "GET
> /ca/ee/ca/getCRL?op=3DgetCRL&crlIssuingPoint=3DMasterCRL HTTP/1.1" 50=
0 527 "-"
> "curl/7.76.1"
> =
> I'm not sure where else to look for logs.
> =
> =
> If you are requesting the MasterCRL.bin file on a replica that is not the=
CRL
> generation master, the URL is transferred to the local CA server
> at=C2=A0http://replica.ipa.test/ca/ee/ca/getCRL?op=3DgetCRL&crlIssuingPoi=
nt=3DMasterCRL
>
> (this is configured in=C2=A0/etc/httpd/conf.d/ipa-pki-proxy.conf).
> =
> Then the calls to /ca/ee/ca/getCRL are handled by an AJP connector
> (LocationMatch defined in=C2=A0/etc/httpd/conf.d/ipa-pki-proxy.conf using
> ajp://localhost:8009). The AJP connector is defined
> in=C2=A0/etc/pki/pki-tomcat/server.xml and should be using=C2=A0the loopb=
ack address.
> There can be issues if your /etc/hosts does not contain the following lin=
es:
> 127.0.0.1 =C2=A0 localhost localhost.localdomain localhost4 localhost4.lo=
caldomain4
> ::1 =C2=A0 =C2=A0 =C2=A0 =C2=A0 localhost localhost.localdomain localhost=
6 localhost6.localdomain6
> =
> You can have a look in=C2=A0/var/log/pki/pki-tomcat/localhost_access_log.=
$DATE.txt
> and check if the request really reached the PKI server. Then check logs
> in=C2=A0/var/log/pki/pki-tomcat/ca/debug.$DATE.log
The machine in question is not the CRL generator. We are getting redirected
to /ca/ee/ca/getCRL?op=3DgetCRL&crlIssuingPoint=3DMasterCRL on that machine=
. But
it is that request that is timing out.
Looks like the tomcat server may be hosed:
Apr 05 00:01:00 server[5758]: java.util.logging.ErrorManager: 1: FileHandler
is closed or not yet initialized, unable to log [2024-04-05 00:01:00 [Timer=
-0]
INFO: SessionTimer: checking security domain sessions
Apr 05 00:01:00 server[5758]: ]
Apr 05 00:01:02 server[5758]: java.util.logging.ErrorManager: 1: FileHandler
is closed or not yet initialized, unable to log [2024-04-05 00:01:02
[pool-1-thread-1] SEVERE: Unable to run maintenance task: access denied
("java.io.FilePermission" "/var/lib/pki/pki-tomcat/logs/acme" "read")
Apr 05 00:01:02 server[5758]: java.security.AccessControlException: access
denied ("java.io.FilePermission" "/var/lib/pki/pki-tomcat/logs/acme" "read")
Apr 05 00:01:02 server[5758]: at
java.base/java.security.AccessControlContext.checkPermission(AccessControlC=
ontext.java:485)
Apr 06 00:01:13 server[16841]: java.util.logging.ErrorManager: 1: FileHandl=
er
is closed or not yet initialized, unable to log [2024-04-06 00:01:13
[pool-1-thread-1] SEVERE: Unable to run maintenance task: access denied
("java.io.FilePermission" "/var/lib/pki/pki-tomcat/logs/acme" "read")
Apr 06 00:01:13 server[16841]: java.security.AccessControlException: access
denied ("java.io.FilePermission" "/var/lib/pki/pki-tomcat/logs/acme" "read")
Apr 06 00:01:13 server[16841]: at
java.base/java.security.AccessControlContext.checkPermis
Apr 06 00:01:14 server[16841]: java.util.logging.ErrorManager: 1: FileHandl=
er
is closed or not yet initialized, unable to log [2024-04-06 00:01:14
[KeyStatusUpdateTask] WARNING: Repository: Unable to check next range: acce=
ss
denied ("java.io.FilePermission" "/var/lib/pki/pki-tomcat/logs/kra" "read")
Apr 06 00:01:14 server[16841]: java.security.AccessControlException: access
denied ("java.io.FilePermission" "/var/lib/pki/pki-tomcat/logs/kra" "read")
Apr 06 00:01:14 server[16841]: at
java.base/java.security.AccessControlContext.checkPermission(AccessControlC=
ontext.java:485)
Apr 06 00:01:14 server[16841]: at
java.base/java.security.AccessController.checkPermission(AccessController.j=
ava:1068)
And that's where logging ends.
Rebooted and everything is fine now. We had some IO lockups on that machine
and I guess that put things into a bad state.
Thanks for the pointers.
-- =
Orion Poplawski
he/him/his - surely the least important thing about me
Manager of IT Systems 720-772-5637
NWRA, Boulder/CoRA Office FAX: 303-415-9702
3380 Mitchell Lane orion(a)nwra.com
Boulder, CO 80301 https://www.nwra.com/
--===============8384887239569975922==
Content-Type: application/pkcs7-signature
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"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--===============8384887239569975922==--
From flo at redhat.com Fri Apr 12 14:07:07 2024
Content-Type: multipart/mixed; boundary="===============3396695578579038944=="
MIME-Version: 1.0
From: Florence Blanc-Renaud
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: Cannot retrieve CRL from new EL9 IPA replica
Date: Fri, 12 Apr 2024 16:06:30 +0200
Message-ID:
In-Reply-To: 9fc297f6-d0bb-4f58-8db0-9db92111be14@nwra.com
--===============3396695578579038944==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Hi,
On Thu, Apr 11, 2024 at 6:02=E2=80=AFPM Orion Poplawski =
wrote:
> On 4/11/24 09:03, Florence Blanc-Renaud wrote:
> > Hi,
> >
> > On Thu, Apr 11, 2024 at 12:34=E2=80=AFAM Orion Poplawski via FreeIPA-us=
ers
> > > > wrote:
> >
> > I've just added an EL9 IPA replica into our domain. I seems to
> generally be
> > working fine, but trying to download the MasterCRL.bin fails:
> >
> > =3D=3D> /var/log/httpd/access_log <=3D=3D
> > 10.20.0.37 - - [10/Apr/2024:14:13:17 -0700] "GET
> /ipa/crl/MasterCRL.bin
> > HTTP/1.1" 301 293 "-" "curl/7.76.1"
> >
> > =3D=3D> /var/log/httpd/error_log <=3D=3D
> > [Wed Apr 10 14:14:17.830119 2024] [proxy_ajp:error] [pid 28001:tid
> 28040]
> > (70007)The timeout specified has expired: AH01030:
> ajp_ilink_receive() can't
> > receive header
> > [Wed Apr 10 14:14:17.830249 2024] [proxy_ajp:error] [pid 28001:tid
> 28040]
> > [client 10.20.0.37:35124 ] AH00992:
> > ajp_read_header: ajp_ilink_receive failed
> > [Wed Apr 10 14:14:17.830261 2024] [proxy_ajp:error] [pid 28001:tid
> 28040]
> > (70007)The timeout specified has expired: [client 10.20.0.37:35124
> > ] AH00878:
> > read response failed from [::1]:8009 (localhost:8009)
> >
> > =3D=3D> /var/log/httpd/access_log <=3D=3D
> > 10.20.0.37 - - [10/Apr/2024:14:13:17 -0700] "GET
> > /ca/ee/ca/getCRL?op=3DgetCRL&crlIssuingPoint=3DMasterCRL HTTP/1.1" =
500
> 527 "-"
> > "curl/7.76.1"
> >
> > I'm not sure where else to look for logs.
> >
> >
> > If you are requesting the MasterCRL.bin file on a replica that is not
> the CRL
> > generation master, the URL is transferred to the local CA server
> > at
> http://replica.ipa.test/ca/ee/ca/getCRL?op=3DgetCRL&crlIssuingPoint=3DMas=
terCRL
> > <
> http://replica.ipa.test/ca/ee/ca/getCRL?op=3DgetCRL&crlIssuingPoint=3DMas=
terCRL
> >
> > (this is configured in /etc/httpd/conf.d/ipa-pki-proxy.conf).
> >
> > Then the calls to /ca/ee/ca/getCRL are handled by an AJP connector
> > (LocationMatch defined in /etc/httpd/conf.d/ipa-pki-proxy.conf using
> > ajp://localhost:8009). The AJP connector is defined
> > in /etc/pki/pki-tomcat/server.xml and should be using the loopback
> address.
> > There can be issues if your /etc/hosts does not contain the following
> lines:
> > 127.0.0.1 localhost localhost.localdomain localhost4
> localhost4.localdomain4
> > ::1 localhost localhost.localdomain localhost6
> localhost6.localdomain6
> >
> > You can have a look
> in /var/log/pki/pki-tomcat/localhost_access_log.$DATE.txt
> > and check if the request really reached the PKI server. Then check logs
> > in /var/log/pki/pki-tomcat/ca/debug.$DATE.log
>
> The machine in question is not the CRL generator. We are getting
> redirected
> to /ca/ee/ca/getCRL?op=3DgetCRL&crlIssuingPoint=3DMasterCRL on that machi=
ne.
> But
> it is that request that is timing out.
>
> Looks like the tomcat server may be hosed:
>
> Apr 05 00:01:00 server[5758]: java.util.logging.ErrorManager: 1:
> FileHandler
> is closed or not yet initialized, unable to log [2024-04-05 00:01:00
> [Timer-0]
> INFO: SessionTimer: checking security domain sessions
> Apr 05 00:01:00 server[5758]: ]
> Apr 05 00:01:02 server[5758]: java.util.logging.ErrorManager: 1:
> FileHandler
> is closed or not yet initialized, unable to log [2024-04-05 00:01:02
> [pool-1-thread-1] SEVERE: Unable to run maintenance task: access denied
> ("java.io.FilePermission" "/var/lib/pki/pki-tomcat/logs/acme" "read")
> Apr 05 00:01:02 server[5758]: java.security.AccessControlException: access
> denied ("java.io.FilePermission" "/var/lib/pki/pki-tomcat/logs/acme"
> "read")
> Apr 05 00:01:02 server[5758]: at
>
> java.base/java.security.AccessControlContext.checkPermission(AccessContro=
lContext.java:485)
>
> Apr 06 00:01:13 server[16841]: java.util.logging.ErrorManager: 1:
> FileHandler
> is closed or not yet initialized, unable to log [2024-04-06 00:01:13
> [pool-1-thread-1] SEVERE: Unable to run maintenance task: access denied
> ("java.io.FilePermission" "/var/lib/pki/pki-tomcat/logs/acme" "read")
> Apr 06 00:01:13 server[16841]: java.security.AccessControlException: acce=
ss
> denied ("java.io.FilePermission" "/var/lib/pki/pki-tomcat/logs/acme"
> "read")
> Apr 06 00:01:13 server[16841]: at
> java.base/java.security.AccessControlContext.checkPermis
>
> Apr 06 00:01:14 server[16841]: java.util.logging.ErrorManager: 1:
> FileHandler
> is closed or not yet initialized, unable to log [2024-04-06 00:01:14
> [KeyStatusUpdateTask] WARNING: Repository: Unable to check next range:
> access
> denied ("java.io.FilePermission" "/var/lib/pki/pki-tomcat/logs/kra" "read=
")
> Apr 06 00:01:14 server[16841]: java.security.AccessControlException: acce=
ss
> denied ("java.io.FilePermission" "/var/lib/pki/pki-tomcat/logs/kra" "read=
")
> Apr 06 00:01:14 server[16841]: at
>
> java.base/java.security.AccessControlContext.checkPermission(AccessContro=
lContext.java:485)
> Apr 06 00:01:14 server[16841]: at
>
> java.base/java.security.AccessController.checkPermission(AccessController=
.java:1068)
>
> Based on your logs and the 00:01:xx timestamp, I believe you are hitting
this issue:
https://github.com/dogtagpki/pki/issues/4703
After the logs are rotated, pki often has problems accessing its log files.
Can you add your problem to the above ticket? It will help prioritize the
problem.
Thanks,
flo
> And that's where logging ends.
>
> Rebooted and everything is fine now. We had some IO lockups on that
> machine
> and I guess that put things into a bad state.
>
> Thanks for the pointers.
>
>
> --
> Orion Poplawski
> he/him/his - surely the least important thing about me
> Manager of IT Systems 720-772-5637
> NWRA, Boulder/CoRA Office FAX: 303-415-9702
> 3380 Mitchell Lane orion(a)nwra.com
> Boulder, CO 80301 https://www.nwra.com/
>
>
--===============3396695578579038944==
Content-Type: text/html
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="attachment.html"
PGRpdiBkaXI9Imx0ciI+PGRpdiBkaXI9Imx0ciI+PGRpdiBjbGFzcz0iZ21haWxfZGVmYXVsdCIg
c3R5bGU9ImZvbnQtZmFtaWx5OmFyaWFsLHNhbnMtc2VyaWYiPkhpLDwvZGl2PjwvZGl2Pjxicj48
ZGl2IGNsYXNzPSJnbWFpbF9xdW90ZSI+PGRpdiBkaXI9Imx0ciIgY2xhc3M9ImdtYWlsX2F0dHIi
Pk9uIFRodSwgQXByIDExLCAyMDI0IGF0IDY6MDLigK9QTSBPcmlvbiBQb3BsYXdza2kgJmx0Ozxh
IGhyZWY9Im1haWx0bzpvcmlvbkBud3JhLmNvbSI+b3Jpb25AbndyYS5jb208L2E+Jmd0OyB3cm90
ZTo8YnI+PC9kaXY+PGJsb2NrcXVvdGUgY2xhc3M9ImdtYWlsX3F1b3RlIiBzdHlsZT0ibWFyZ2lu
OjBweCAwcHggMHB4IDAuOGV4O2JvcmRlci1sZWZ0OjFweCBzb2xpZCByZ2IoMjA0LDIwNCwyMDQp
O3BhZGRpbmctbGVmdDoxZXgiPk9uIDQvMTEvMjQgMDk6MDMsIEZsb3JlbmNlIEJsYW5jLVJlbmF1
ZCB3cm90ZTo8YnI+CiZndDsgSGksPGJyPgomZ3Q7IDxicj4KJmd0OyBPbiBUaHUsIEFwciAxMSwg
MjAyNCBhdCAxMjozNOKAr0FNIE9yaW9uIFBvcGxhd3NraSB2aWEgRnJlZUlQQS11c2Vyczxicj4K
Jmd0OyAmbHQ7PGEgaHJlZj0ibWFpbHRvOmZyZWVpcGEtdXNlcnNAbGlzdHMuZmVkb3JhaG9zdGVk
Lm9yZyIgdGFyZ2V0PSJfYmxhbmsiPmZyZWVpcGEtdXNlcnNAbGlzdHMuZmVkb3JhaG9zdGVkLm9y
ZzwvYT48YnI+CiZndDsgJmx0O21haWx0bzo8YSBocmVmPSJtYWlsdG86ZnJlZWlwYS11c2Vyc0Bs
aXN0cy5mZWRvcmFob3N0ZWQub3JnIiB0YXJnZXQ9Il9ibGFuayI+ZnJlZWlwYS11c2Vyc0BsaXN0
cy5mZWRvcmFob3N0ZWQub3JnPC9hPiZndDsmZ3Q7IHdyb3RlOjxicj4KJmd0OyA8YnI+CiZndDvC
oCDCoCDCoEkmIzM5O3ZlIGp1c3QgYWRkZWQgYW4gRUw5IElQQSByZXBsaWNhIGludG8gb3VyIGRv
bWFpbi7CoCBJIHNlZW1zIHRvIGdlbmVyYWxseSBiZTxicj4KJmd0O8KgIMKgIMKgd29ya2luZyBm
aW5lLCBidXQgdHJ5aW5nIHRvIGRvd25sb2FkIHRoZSBNYXN0ZXJDUkwuYmluIGZhaWxzOjxicj4K
Jmd0OyA8YnI+CiZndDvCoCDCoCDCoD09Jmd0OyAvdmFyL2xvZy9odHRwZC9hY2Nlc3NfbG9nICZs
dDs9PTxicj4KJmd0O8KgIMKgIMKgMTAuMjAuMC4zNyAtIC0gWzEwL0Fwci8yMDI0OjE0OjEzOjE3
IC0wNzAwXSAmcXVvdDtHRVQgL2lwYS9jcmwvTWFzdGVyQ1JMLmJpbjxicj4KJmd0O8KgIMKgIMKg
SFRUUC8xLjEmcXVvdDsgMzAxIDI5MyAmcXVvdDstJnF1b3Q7ICZxdW90O2N1cmwvNy43Ni4xJnF1
b3Q7PGJyPgomZ3Q7IDxicj4KJmd0O8KgIMKgIMKgPT0mZ3Q7IC92YXIvbG9nL2h0dHBkL2Vycm9y
X2xvZyAmbHQ7PT08YnI+CiZndDvCoCDCoCDCoFtXZWQgQXByIDEwIDE0OjE0OjE3LjgzMDExOSAy
MDI0XSBbcHJveHlfYWpwOmVycm9yXSBbcGlkIDI4MDAxOnRpZCAyODA0MF08YnI+CiZndDvCoCDC
oCDCoCg3MDAwNylUaGUgdGltZW91dCBzcGVjaWZpZWQgaGFzIGV4cGlyZWQ6IEFIMDEwMzA6IGFq
cF9pbGlua19yZWNlaXZlKCkgY2FuJiMzOTt0PGJyPgomZ3Q7wqAgwqAgwqByZWNlaXZlIGhlYWRl
cjxicj4KJmd0O8KgIMKgIMKgW1dlZCBBcHIgMTAgMTQ6MTQ6MTcuODMwMjQ5IDIwMjRdIFtwcm94
eV9hanA6ZXJyb3JdIFtwaWQgMjgwMDE6dGlkIDI4MDQwXTxicj4KJmd0O8KgIMKgIMKgW2NsaWVu
dCA8YSBocmVmPSJodHRwOi8vMTAuMjAuMC4zNzozNTEyNCIgcmVsPSJub3JlZmVycmVyIiB0YXJn
ZXQ9Il9ibGFuayI+MTAuMjAuMC4zNzozNTEyNDwvYT4gJmx0OzxhIGhyZWY9Imh0dHA6Ly8xMC4y
MC4wLjM3OjM1MTI0IiByZWw9Im5vcmVmZXJyZXIiIHRhcmdldD0iX2JsYW5rIj5odHRwOi8vMTAu
MjAuMC4zNzozNTEyNDwvYT4mZ3Q7XSBBSDAwOTkyOjxicj4KJmd0O8KgIMKgIMKgYWpwX3JlYWRf
aGVhZGVyOiBhanBfaWxpbmtfcmVjZWl2ZSBmYWlsZWQ8YnI+CiZndDvCoCDCoCDCoFtXZWQgQXBy
IDEwIDE0OjE0OjE3LjgzMDI2MSAyMDI0XSBbcHJveHlfYWpwOmVycm9yXSBbcGlkIDI4MDAxOnRp
ZCAyODA0MF08YnI+CiZndDvCoCDCoCDCoCg3MDAwNylUaGUgdGltZW91dCBzcGVjaWZpZWQgaGFz
IGV4cGlyZWQ6IFtjbGllbnQgPGEgaHJlZj0iaHR0cDovLzEwLjIwLjAuMzc6MzUxMjQiIHJlbD0i
bm9yZWZlcnJlciIgdGFyZ2V0PSJfYmxhbmsiPjEwLjIwLjAuMzc6MzUxMjQ8L2E+PGJyPgomZ3Q7
wqAgwqAgwqAmbHQ7PGEgaHJlZj0iaHR0cDovLzEwLjIwLjAuMzc6MzUxMjQiIHJlbD0ibm9yZWZl
cnJlciIgdGFyZ2V0PSJfYmxhbmsiPmh0dHA6Ly8xMC4yMC4wLjM3OjM1MTI0PC9hPiZndDtdIEFI
MDA4Nzg6PGJyPgomZ3Q7wqAgwqAgwqByZWFkIHJlc3BvbnNlIGZhaWxlZCBmcm9tIFs6OjFdOjgw
MDkgKGxvY2FsaG9zdDo4MDA5KTxicj4KJmd0OyA8YnI+CiZndDvCoCDCoCDCoD09Jmd0OyAvdmFy
L2xvZy9odHRwZC9hY2Nlc3NfbG9nICZsdDs9PTxicj4KJmd0O8KgIMKgIMKgMTAuMjAuMC4zNyAt
IC0gWzEwL0Fwci8yMDI0OjE0OjEzOjE3IC0wNzAwXSAmcXVvdDtHRVQ8YnI+CiZndDvCoCDCoCDC
oC9jYS9lZS9jYS9nZXRDUkw/b3A9Z2V0Q1JMJmFtcDtjcmxJc3N1aW5nUG9pbnQ9TWFzdGVyQ1JM
IEhUVFAvMS4xJnF1b3Q7IDUwMCA1MjcgJnF1b3Q7LSZxdW90Ozxicj4KJmd0O8KgIMKgIMKgJnF1
b3Q7Y3VybC83Ljc2LjEmcXVvdDs8YnI+CiZndDsgPGJyPgomZ3Q7wqAgwqAgwqBJJiMzOTttIG5v
dCBzdXJlIHdoZXJlIGVsc2UgdG8gbG9vayBmb3IgbG9ncy48YnI+CiZndDsgPGJyPgomZ3Q7IDxi
cj4KJmd0OyBJZiB5b3UgYXJlIHJlcXVlc3RpbmcgdGhlIE1hc3RlckNSTC5iaW4gZmlsZSBvbiBh
IHJlcGxpY2EgdGhhdCBpcyBub3QgdGhlIENSTDxicj4KJmd0OyBnZW5lcmF0aW9uIG1hc3Rlciwg
dGhlIFVSTCBpcyB0cmFuc2ZlcnJlZCB0byB0aGUgbG9jYWwgQ0Egc2VydmVyPGJyPgomZ3Q7IGF0
wqA8YSBocmVmPSJodHRwOi8vcmVwbGljYS5pcGEudGVzdC9jYS9lZS9jYS9nZXRDUkw/b3A9Z2V0
Q1JMJmFtcDtjcmxJc3N1aW5nUG9pbnQ9TWFzdGVyQ1JMIiByZWw9Im5vcmVmZXJyZXIiIHRhcmdl
dD0iX2JsYW5rIj5odHRwOi8vcmVwbGljYS5pcGEudGVzdC9jYS9lZS9jYS9nZXRDUkw/b3A9Z2V0
Q1JMJmFtcDtjcmxJc3N1aW5nUG9pbnQ9TWFzdGVyQ1JMPC9hPjxicj4KJmd0OyAmbHQ7PGEgaHJl
Zj0iaHR0cDovL3JlcGxpY2EuaXBhLnRlc3QvY2EvZWUvY2EvZ2V0Q1JMP29wPWdldENSTCZhbXA7
Y3JsSXNzdWluZ1BvaW50PU1hc3RlckNSTCIgcmVsPSJub3JlZmVycmVyIiB0YXJnZXQ9Il9ibGFu
ayI+aHR0cDovL3JlcGxpY2EuaXBhLnRlc3QvY2EvZWUvY2EvZ2V0Q1JMP29wPWdldENSTCZhbXA7
Y3JsSXNzdWluZ1BvaW50PU1hc3RlckNSTDwvYT4mZ3Q7PGJyPgomZ3Q7ICh0aGlzIGlzIGNvbmZp
Z3VyZWQgaW7CoC9ldGMvaHR0cGQvY29uZi5kL2lwYS1wa2ktcHJveHkuY29uZikuPGJyPgomZ3Q7
IDxicj4KJmd0OyBUaGVuIHRoZSBjYWxscyB0byAvY2EvZWUvY2EvZ2V0Q1JMIGFyZSBoYW5kbGVk
IGJ5IGFuIEFKUCBjb25uZWN0b3I8YnI+CiZndDsgKExvY2F0aW9uTWF0Y2ggZGVmaW5lZCBpbsKg
L2V0Yy9odHRwZC9jb25mLmQvaXBhLXBraS1wcm94eS5jb25mIHVzaW5nPGJyPgomZ3Q7IGFqcDov
L2xvY2FsaG9zdDo4MDA5KS4gVGhlIEFKUCBjb25uZWN0b3IgaXMgZGVmaW5lZDxicj4KJmd0OyBp
bsKgL2V0Yy9wa2kvcGtpLXRvbWNhdC9zZXJ2ZXIueG1sIGFuZCBzaG91bGQgYmUgdXNpbmfCoHRo
ZSBsb29wYmFjayBhZGRyZXNzLjxicj4KJmd0OyBUaGVyZSBjYW4gYmUgaXNzdWVzIGlmIHlvdXIg
L2V0Yy9ob3N0cyBkb2VzIG5vdCBjb250YWluIHRoZSBmb2xsb3dpbmcgbGluZXM6PGJyPgomZ3Q7
IDEyNy4wLjAuMSDCoCBsb2NhbGhvc3QgbG9jYWxob3N0LmxvY2FsZG9tYWluIGxvY2FsaG9zdDQg
bG9jYWxob3N0NC5sb2NhbGRvbWFpbjQ8YnI+CiZndDsgOjoxIMKgIMKgIMKgIMKgIGxvY2FsaG9z
dCBsb2NhbGhvc3QubG9jYWxkb21haW4gbG9jYWxob3N0NiBsb2NhbGhvc3Q2LmxvY2FsZG9tYWlu
Njxicj4KJmd0OyA8YnI+CiZndDsgWW91IGNhbiBoYXZlIGEgbG9vayBpbsKgL3Zhci9sb2cvcGtp
L3BraS10b21jYXQvbG9jYWxob3N0X2FjY2Vzc19sb2cuJERBVEUudHh0PGJyPgomZ3Q7IGFuZCBj
aGVjayBpZiB0aGUgcmVxdWVzdCByZWFsbHkgcmVhY2hlZCB0aGUgUEtJIHNlcnZlci4gVGhlbiBj
aGVjayBsb2dzPGJyPgomZ3Q7IGluwqAvdmFyL2xvZy9wa2kvcGtpLXRvbWNhdC9jYS9kZWJ1Zy4k
REFURS5sb2c8YnI+Cjxicj4KVGhlIG1hY2hpbmUgaW4gcXVlc3Rpb24gaXMgbm90IHRoZSBDUkwg
Z2VuZXJhdG9yLsKgIFdlIGFyZSBnZXR0aW5nIHJlZGlyZWN0ZWQ8YnI+CnRvIC9jYS9lZS9jYS9n
ZXRDUkw/b3A9Z2V0Q1JMJmFtcDtjcmxJc3N1aW5nUG9pbnQ9TWFzdGVyQ1JMIG9uIHRoYXQgbWFj
aGluZS7CoCBCdXQ8YnI+Cml0IGlzIHRoYXQgcmVxdWVzdCB0aGF0IGlzIHRpbWluZyBvdXQuPGJy
Pgo8YnI+Ckxvb2tzIGxpa2UgdGhlIHRvbWNhdCBzZXJ2ZXIgbWF5IGJlIGhvc2VkOjxicj4KPGJy
PgpBcHIgMDUgMDA6MDE6MDAgc2VydmVyWzU3NThdOiBqYXZhLnV0aWwubG9nZ2luZy5FcnJvck1h
bmFnZXI6IDE6IEZpbGVIYW5kbGVyPGJyPgppcyBjbG9zZWQgb3Igbm90IHlldCBpbml0aWFsaXpl
ZCwgdW5hYmxlIHRvIGxvZyBbMjAyNC0wNC0wNSAwMDowMTowMCBbVGltZXItMF08YnI+CklORk86
IFNlc3Npb25UaW1lcjogY2hlY2tpbmcgc2VjdXJpdHkgZG9tYWluIHNlc3Npb25zPGJyPgpBcHIg
MDUgMDA6MDE6MDAgc2VydmVyWzU3NThdOiBdPGJyPgpBcHIgMDUgMDA6MDE6MDIgc2VydmVyWzU3
NThdOiBqYXZhLnV0aWwubG9nZ2luZy5FcnJvck1hbmFnZXI6IDE6IEZpbGVIYW5kbGVyPGJyPgpp
cyBjbG9zZWQgb3Igbm90IHlldCBpbml0aWFsaXplZCwgdW5hYmxlIHRvIGxvZyBbMjAyNC0wNC0w
NSAwMDowMTowMjxicj4KW3Bvb2wtMS10aHJlYWQtMV0gU0VWRVJFOiBVbmFibGUgdG8gcnVuIG1h
aW50ZW5hbmNlIHRhc2s6IGFjY2VzcyBkZW5pZWQ8YnI+CigmcXVvdDtqYXZhLmlvLkZpbGVQZXJt
aXNzaW9uJnF1b3Q7ICZxdW90Oy92YXIvbGliL3BraS9wa2ktdG9tY2F0L2xvZ3MvYWNtZSZxdW90
OyAmcXVvdDtyZWFkJnF1b3Q7KTxicj4KQXByIDA1IDAwOjAxOjAyIHNlcnZlcls1NzU4XTogamF2
YS5zZWN1cml0eS5BY2Nlc3NDb250cm9sRXhjZXB0aW9uOiBhY2Nlc3M8YnI+CmRlbmllZCAoJnF1
b3Q7amF2YS5pby5GaWxlUGVybWlzc2lvbiZxdW90OyAmcXVvdDsvdmFyL2xpYi9wa2kvcGtpLXRv
bWNhdC9sb2dzL2FjbWUmcXVvdDsgJnF1b3Q7cmVhZCZxdW90Oyk8YnI+CkFwciAwNSAwMDowMTow
MiBzZXJ2ZXJbNTc1OF06wqAgwqAgwqAgwqAgwqBhdDxicj4KamF2YS5iYXNlL2phdmEuc2VjdXJp
dHkuQWNjZXNzQ29udHJvbENvbnRleHQuY2hlY2tQZXJtaXNzaW9uKEFjY2Vzc0NvbnRyb2xDb250
ZXh0LmphdmE6NDg1KTxicj4KPGJyPgpBcHIgMDYgMDA6MDE6MTMgc2VydmVyWzE2ODQxXTogamF2
YS51dGlsLmxvZ2dpbmcuRXJyb3JNYW5hZ2VyOiAxOiBGaWxlSGFuZGxlcjxicj4KaXMgY2xvc2Vk
IG9yIG5vdCB5ZXQgaW5pdGlhbGl6ZWQsIHVuYWJsZSB0byBsb2cgWzIwMjQtMDQtMDYgMDA6MDE6
MTM8YnI+Cltwb29sLTEtdGhyZWFkLTFdIFNFVkVSRTogVW5hYmxlIHRvIHJ1biBtYWludGVuYW5j
ZSB0YXNrOiBhY2Nlc3MgZGVuaWVkPGJyPgooJnF1b3Q7amF2YS5pby5GaWxlUGVybWlzc2lvbiZx
dW90OyAmcXVvdDsvdmFyL2xpYi9wa2kvcGtpLXRvbWNhdC9sb2dzL2FjbWUmcXVvdDsgJnF1b3Q7
cmVhZCZxdW90Oyk8YnI+CkFwciAwNiAwMDowMToxMyBzZXJ2ZXJbMTY4NDFdOiBqYXZhLnNlY3Vy
aXR5LkFjY2Vzc0NvbnRyb2xFeGNlcHRpb246IGFjY2Vzczxicj4KZGVuaWVkICgmcXVvdDtqYXZh
LmlvLkZpbGVQZXJtaXNzaW9uJnF1b3Q7ICZxdW90Oy92YXIvbGliL3BraS9wa2ktdG9tY2F0L2xv
Z3MvYWNtZSZxdW90OyAmcXVvdDtyZWFkJnF1b3Q7KTxicj4KQXByIDA2IDAwOjAxOjEzIHNlcnZl
clsxNjg0MV06wqAgwqAgwqAgwqAgwqBhdDxicj4KamF2YS5iYXNlL2phdmEuc2VjdXJpdHkuQWNj
ZXNzQ29udHJvbENvbnRleHQuY2hlY2tQZXJtaXM8YnI+Cjxicj4KQXByIDA2IDAwOjAxOjE0IHNl
cnZlclsxNjg0MV06IGphdmEudXRpbC5sb2dnaW5nLkVycm9yTWFuYWdlcjogMTogRmlsZUhhbmRs
ZXI8YnI+CmlzIGNsb3NlZCBvciBub3QgeWV0IGluaXRpYWxpemVkLCB1bmFibGUgdG8gbG9nIFsy
MDI0LTA0LTA2IDAwOjAxOjE0PGJyPgpbS2V5U3RhdHVzVXBkYXRlVGFza10gV0FSTklORzogUmVw
b3NpdG9yeTogVW5hYmxlIHRvIGNoZWNrIG5leHQgcmFuZ2U6IGFjY2Vzczxicj4KZGVuaWVkICgm
cXVvdDtqYXZhLmlvLkZpbGVQZXJtaXNzaW9uJnF1b3Q7ICZxdW90Oy92YXIvbGliL3BraS9wa2kt
dG9tY2F0L2xvZ3Mva3JhJnF1b3Q7ICZxdW90O3JlYWQmcXVvdDspPGJyPgpBcHIgMDYgMDA6MDE6
MTQgc2VydmVyWzE2ODQxXTogamF2YS5zZWN1cml0eS5BY2Nlc3NDb250cm9sRXhjZXB0aW9uOiBh
Y2Nlc3M8YnI+CmRlbmllZCAoJnF1b3Q7amF2YS5pby5GaWxlUGVybWlzc2lvbiZxdW90OyAmcXVv
dDsvdmFyL2xpYi9wa2kvcGtpLXRvbWNhdC9sb2dzL2tyYSZxdW90OyAmcXVvdDtyZWFkJnF1b3Q7
KTxicj4KQXByIDA2IDAwOjAxOjE0IHNlcnZlclsxNjg0MV06wqAgwqAgwqAgwqAgwqBhdDxicj4K
amF2YS5iYXNlL2phdmEuc2VjdXJpdHkuQWNjZXNzQ29udHJvbENvbnRleHQuY2hlY2tQZXJtaXNz
aW9uKEFjY2Vzc0NvbnRyb2xDb250ZXh0LmphdmE6NDg1KTxicj4KQXByIDA2IDAwOjAxOjE0IHNl
cnZlclsxNjg0MV06wqAgwqAgwqAgwqAgwqBhdDxicj4KamF2YS5iYXNlL2phdmEuc2VjdXJpdHku
QWNjZXNzQ29udHJvbGxlci5jaGVja1Blcm1pc3Npb24oQWNjZXNzQ29udHJvbGxlci5qYXZhOjEw
NjgpPGJyPgo8YnI+PC9ibG9ja3F1b3RlPjxkaXY+PHNwYW4gY2xhc3M9ImdtYWlsX2RlZmF1bHQi
IHN0eWxlPSJmb250LWZhbWlseTphcmlhbCxzYW5zLXNlcmlmIj48L3NwYW4+PC9kaXY+PGRpdj48
c3BhbiBjbGFzcz0iZ21haWxfZGVmYXVsdCIgc3R5bGU9ImZvbnQtZmFtaWx5OmFyaWFsLHNhbnMt
c2VyaWYiPkJhc2VkIG9uIHlvdXIgbG9ncyBhbmQgdGhlIDAwOjAxOnh4IHRpbWVzdGFtcCwgSSBi
ZWxpZXZlIHlvdSBhcmUgaGl0dGluZyB0aGlzIGlzc3VlOjwvc3Bhbj48L2Rpdj48ZGl2PjxzcGFu
IGNsYXNzPSJnbWFpbF9kZWZhdWx0IiBzdHlsZT0iZm9udC1mYW1pbHk6YXJpYWwsc2Fucy1zZXJp
ZiI+PGEgaHJlZj0iaHR0cHM6Ly9naXRodWIuY29tL2RvZ3RhZ3BraS9wa2kvaXNzdWVzLzQ3MDMi
Pmh0dHBzOi8vZ2l0aHViLmNvbS9kb2d0YWdwa2kvcGtpL2lzc3Vlcy80NzAzPC9hPsKgPGJyPjwv
c3Bhbj48L2Rpdj48ZGl2PjxzcGFuIGNsYXNzPSJnbWFpbF9kZWZhdWx0IiBzdHlsZT0iZm9udC1m
YW1pbHk6YXJpYWwsc2Fucy1zZXJpZiI+PGJyPjwvc3Bhbj48L2Rpdj48ZGl2PjxkaXYgY2xhc3M9
ImdtYWlsX2RlZmF1bHQiIHN0eWxlPSJmb250LWZhbWlseTphcmlhbCxzYW5zLXNlcmlmIj5BZnRl
ciB0aGUgbG9ncyBhcmUgcm90YXRlZCwgcGtpIG9mdGVuIGhhc8KgcHJvYmxlbXMgYWNjZXNzaW5n
IGl0cyBsb2cgZmlsZXMuIENhbiB5b3UgYWRkIHlvdXIgcHJvYmxlbSB0byB0aGUgYWJvdmUgdGlj
a2V0PyBJdCB3aWxsIGhlbHAgcHJpb3JpdGl6ZSB0aGUgcHJvYmxlbS48L2Rpdj48ZGl2IGNsYXNz
PSJnbWFpbF9kZWZhdWx0IiBzdHlsZT0iZm9udC1mYW1pbHk6YXJpYWwsc2Fucy1zZXJpZiI+PGJy
PjwvZGl2PjxkaXYgY2xhc3M9ImdtYWlsX2RlZmF1bHQiIHN0eWxlPSJmb250LWZhbWlseTphcmlh
bCxzYW5zLXNlcmlmIj5UaGFua3MsPC9kaXY+PGRpdiBjbGFzcz0iZ21haWxfZGVmYXVsdCIgc3R5
bGU9ImZvbnQtZmFtaWx5OmFyaWFsLHNhbnMtc2VyaWYiPmZsbzwvZGl2Pjxicj48L2Rpdj48Ymxv
Y2txdW90ZSBjbGFzcz0iZ21haWxfcXVvdGUiIHN0eWxlPSJtYXJnaW46MHB4IDBweCAwcHggMC44
ZXg7Ym9yZGVyLWxlZnQ6MXB4IHNvbGlkIHJnYigyMDQsMjA0LDIwNCk7cGFkZGluZy1sZWZ0OjFl
eCI+Cjxicj4KQW5kIHRoYXQmIzM5O3Mgd2hlcmUgbG9nZ2luZyBlbmRzLjxicj4KPGJyPgpSZWJv
b3RlZCBhbmQgZXZlcnl0aGluZyBpcyBmaW5lIG5vdy7CoCBXZSBoYWQgc29tZSBJTyBsb2NrdXBz
IG9uIHRoYXQgbWFjaGluZTxicj4KYW5kIEkgZ3Vlc3MgdGhhdCBwdXQgdGhpbmdzIGludG8gYSBi
YWQgc3RhdGUuPGJyPgo8YnI+ClRoYW5rcyBmb3IgdGhlIHBvaW50ZXJzLjxicj4KPGJyPgo8YnI+
Ci0tIDxicj4KT3Jpb24gUG9wbGF3c2tpPGJyPgpoZS9oaW0vaGlzwqAgLSBzdXJlbHkgdGhlIGxl
YXN0IGltcG9ydGFudCB0aGluZyBhYm91dCBtZTxicj4KTWFuYWdlciBvZiBJVCBTeXN0ZW1zwqAg
wqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgNzIwLTc3Mi01NjM3PGJyPgpOV1JBLCBCb3Vs
ZGVyL0NvUkEgT2ZmaWNlwqAgwqAgwqAgwqAgwqAgwqAgwqBGQVg6IDMwMy00MTUtOTcwMjxicj4K
MzM4MCBNaXRjaGVsbCBMYW5lwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqA8YSBo
cmVmPSJtYWlsdG86b3Jpb25AbndyYS5jb20iIHRhcmdldD0iX2JsYW5rIj5vcmlvbkBud3JhLmNv
bTwvYT48YnI+CkJvdWxkZXIsIENPIDgwMzAxwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqAgwqA8YSBo
cmVmPSJodHRwczovL3d3dy5ud3JhLmNvbS8iIHJlbD0ibm9yZWZlcnJlciIgdGFyZ2V0PSJfYmxh
bmsiPmh0dHBzOi8vd3d3Lm53cmEuY29tLzwvYT48YnI+Cjxicj4KPC9ibG9ja3F1b3RlPjwvZGl2
PjwvZGl2Pgo=
--===============3396695578579038944==--
From craigawilson at gmail.com Fri Apr 12 16:46:19 2024
Content-Type: multipart/mixed; boundary="===============5883636696220306325=="
MIME-Version: 1.0
From: C Wilson
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] ipaclient-install.log certutil: Could not find cert:
Date: Fri, 12 Apr 2024 16:46:06 +0000
Message-ID: <20240412164606.10693.39062@mailman01.iad2.fedoraproject.org>
--===============5883636696220306325==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Hello
I'm trying to roll out a new IPA server for our development environment and=
have nicely automated the server installation process with Ansible but whe=
n I've come to rolling out the clients I'm hitting this problem. =
When running ipa-client-install:
ipa-client-install -N --fixed-primary --server server.domain.local --realm =
DOMAIN.LOCAL --domain DOMAIN.local --principal admin --password 'adminpassw=
ord' -U
I get the following error:
Please make sure the following ports are opened in the firewall settings:
TCP: 80, 88, 389
UDP: 88 (at least one of TCP/UDP ports 88 has to be open)
Also note that following ports are necessary for ipa-client working properl=
y after enrollment:
TCP: 464
UDP: 464, 123 (if NTP enabled)
Installation failed. Rolling back changes.
Disabling client Kerberos and LDAP configurations
nscd daemon is not installed, skip configuration
nslcd daemon is not installed, skip configuration
Client uninstall complete.
Kerberos authentication failed: kinit: Cannot contact any KDC for realm 'DO=
MAIN.LOCAL' while getting initial credentials
I've disabled the firewall on both systems, DNS resolves the server name. I=
can nmap and telnet to the ports listed so I don't think it's a networking=
issue. The ipa server appears to be running fine:
[root(a)server tmp]# service ipa status
Redirecting to /bin/systemctl status ipa.service
=E2=97=8F ipa.service - Identity, Policy, Audit
Loaded: loaded (/usr/lib/systemd/system/ipa.service; enabled; preset: =
disabled)
Active: active (exited) since Wed 2024-04-10 15:49:49 UTC; 2 days ago
Main PID: 18336 (code=3Dexited, status=3D0/SUCCESS)
CPU: 1.610s
Apr 10 15:49:48 server ipactl[18336]: Assuming stale, cleaning and proceedi=
ng
Apr 10 15:49:49 server ipactl[18336]: ipa: INFO: The ipactl command was suc=
cessful
Apr 10 15:49:49 server ipactl[18336]: Starting Directory Service
Apr 10 15:49:49 server ipactl[18336]: Starting krb5kdc Service
Apr 10 15:49:49 server ipactl[18336]: Starting kadmin Service
Apr 10 15:49:49 server ipactl[18336]: Starting httpd Service
Apr 10 15:49:49 server ipactl[18336]: Starting ipa-custodia Service
Apr 10 15:49:49 server ipactl[18336]: Starting pki-tomcatd Service
Apr 10 15:49:49 server ipactl[18336]: Starting ipa-otpd Service
Apr 10 15:49:49 server systemd[1]: Finished Identity, Policy, Audit.
Looking at the ipaclient-install.log there are lines that are semi interest=
ing but I can't see how to progress from here to resolve the issue:
2024-04-12T16:25:51Z DEBUG stderr=3Dkinit: Cannot contact any KDC for realm=
'DOMAIN.LOCAL' while getting initial credentials
2024-04-12T16:25:51Z ERROR Installation failed. Rolling back changes.
2024-04-12T16:25:52Z DEBUG stderr=3D
2024-04-12T16:25:52Z DEBUG stderr=3Dcertutil: Could not find cert: IPA Mach=
ine Certificate - virt01.domain.local
: PR_FILE_NOT_FOUND_ERROR: File not found
but if I run `kinit admin(a)server.domain.local` it authenticates. =
I seem to be at a dead end, How do I troubleshoot this further?=20
--===============5883636696220306325==--
From rcritten at redhat.com Fri Apr 12 17:21:07 2024
Content-Type: multipart/mixed; boundary="===============1728410126576464603=="
MIME-Version: 1.0
From: Rob Crittenden
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: ipaclient-install.log certutil: Could not find
cert:
Date: Fri, 12 Apr 2024 13:20:52 -0400
Message-ID:
In-Reply-To: 20240412164606.10693.39062@mailman01.iad2.fedoraproject.org
--===============1728410126576464603==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
C Wilson via FreeIPA-users wrote:
> Hello
> =
> I'm trying to roll out a new IPA server for our development environment a=
nd have nicely automated the server installation process with Ansible but w=
hen I've come to rolling out the clients I'm hitting this problem. =
> =
> When running ipa-client-install:
> ipa-client-install -N --fixed-primary --server server.domain.local --real=
m DOMAIN.LOCAL --domain DOMAIN.local --principal admin --password 'adminpas=
sword' -U
> =
> I get the following error:
> Please make sure the following ports are opened in the firewall settings:
> TCP: 80, 88, 389
> UDP: 88 (at least one of TCP/UDP ports 88 has to be open)
> Also note that following ports are necessary for ipa-client working prope=
rly after enrollment:
> TCP: 464
> UDP: 464, 123 (if NTP enabled)
> Installation failed. Rolling back changes.
> Disabling client Kerberos and LDAP configurations
> nscd daemon is not installed, skip configuration
> nslcd daemon is not installed, skip configuration
> Client uninstall complete.
> Kerberos authentication failed: kinit: Cannot contact any KDC for realm '=
DOMAIN.LOCAL' while getting initial credentials
> =
> =
> I've disabled the firewall on both systems, DNS resolves the server name.=
I can nmap and telnet to the ports listed so I don't think it's a networki=
ng issue. The ipa server appears to be running fine:
> =
> [root(a)server tmp]# service ipa status
> Redirecting to /bin/systemctl status ipa.service
> =E2=97=8F ipa.service - Identity, Policy, Audit
> Loaded: loaded (/usr/lib/systemd/system/ipa.service; enabled; preset=
: disabled)
> Active: active (exited) since Wed 2024-04-10 15:49:49 UTC; 2 days ago
> Main PID: 18336 (code=3Dexited, status=3D0/SUCCESS)
> CPU: 1.610s
> =
> Apr 10 15:49:48 server ipactl[18336]: Assuming stale, cleaning and procee=
ding
> Apr 10 15:49:49 server ipactl[18336]: ipa: INFO: The ipactl command was s=
uccessful
> Apr 10 15:49:49 server ipactl[18336]: Starting Directory Service
> Apr 10 15:49:49 server ipactl[18336]: Starting krb5kdc Service
> Apr 10 15:49:49 server ipactl[18336]: Starting kadmin Service
> Apr 10 15:49:49 server ipactl[18336]: Starting httpd Service
> Apr 10 15:49:49 server ipactl[18336]: Starting ipa-custodia Service
> Apr 10 15:49:49 server ipactl[18336]: Starting pki-tomcatd Service
> Apr 10 15:49:49 server ipactl[18336]: Starting ipa-otpd Service
> Apr 10 15:49:49 server systemd[1]: Finished Identity, Policy, Audit.
> =
> =
> Looking at the ipaclient-install.log there are lines that are semi intere=
sting but I can't see how to progress from here to resolve the issue:
> =
> 2024-04-12T16:25:51Z DEBUG stderr=3Dkinit: Cannot contact any KDC for rea=
lm 'DOMAIN.LOCAL' while getting initial credentials
> 2024-04-12T16:25:51Z ERROR Installation failed. Rolling back changes.
> 2024-04-12T16:25:52Z DEBUG stderr=3D
> 2024-04-12T16:25:52Z DEBUG stderr=3Dcertutil: Could not find cert: IPA Ma=
chine Certificate - virt01.domain.local
> : PR_FILE_NOT_FOUND_ERROR: File not found
> =
> =
> but if I run `kinit admin(a)server.domain.local` it authenticates. =
The cert error is a red herring. It is looking to see if there is one
that needs to be cleaned up (there isn't).
Do you already have krb5.conf configured? Otherwise I don't know how the
KDC is contacted.
You can find the temporary krb5.conf that is used by the installer in
the log. You can put that into a file and try something like:
KRB5_CONFIG=3D/tmp/krb.conf KRB5_TRACE=3D/dev/stderr kinit admin
This should fail since this is doing the same thing as
ipa-client-install. The output may help identify what it's doing.
rob
--===============1728410126576464603==--
From cheimes at redhat.com Fri Apr 12 18:06:56 2024
Content-Type: multipart/mixed; boundary="===============5591961028950902754=="
MIME-Version: 1.0
From: Christian Heimes
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: ipaclient-install.log certutil: Could not find
cert:
Date: Fri, 12 Apr 2024 20:06:35 +0200
Message-ID: <06864355-734a-4668-af0f-b34e515c3936@redhat.com>
In-Reply-To: 20240412164606.10693.39062@mailman01.iad2.fedoraproject.org
--===============5591961028950902754==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
On 12/04/2024 18.46, C Wilson via FreeIPA-users wrote:
> Hello
>
> I'm trying to roll out a new IPA server for our development environment a=
nd have nicely automated the server installation process with Ansible but w=
hen I've come to rolling out the clients I'm hitting this problem.
>
> When running ipa-client-install:
> ipa-client-install -N --fixed-primary --server server.domain.local --real=
m DOMAIN.LOCAL --domain DOMAIN.local --principal admin --password 'adminpas=
sword' -U
I recommend against use of .local TLD for an IPA installation. The =
.local addresses are reserved for link-local networks, mDNS and =
zeroconf. Host lookups for .local behave differently and may result in =
surprising behavior.
Instead use one of the recommended TLDs from =
https://www.rfc-editor.org/rfc/rfc6762#appendix-G or =
https://www.rfc-editor.org/rfc/rfc2606.html .
Christian
-- =
Christian Heimes
Principal Software Engineer, Identity Management and Platform Security
Red Hat GmbH, https://de.redhat.com/ , Registered seat: Grasbrunn,
Commercial register: Amtsgericht Muenchen, HRB 153243,
Managing Directors: Charles Cachera, Brian Klemm, Laurie Krebs, Michael O'N=
eill
--===============5591961028950902754==--
From basile.pinsard at gmail.com Fri Apr 12 20:52:10 2024
Content-Type: multipart/mixed; boundary="===============8868600681727047957=="
MIME-Version: 1.0
From: Basile Pinsard
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] pki-tomcat won't start + expired certificates
Date: Fri, 12 Apr 2024 20:51:53 +0000
Message-ID: <20240412205153.31731.16457@mailman01.iad2.fedoraproject.org>
--===============8868600681727047957==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Hi freeipa experts.
I have been using freeipa for the past 5 years running in a docker containe=
r, no replicas.
currently on VERSION: 4.9.6, API_VERSION: 2.245
I have the following issue, not sure what caused this: pki-tomcat service i=
s not starting, and it is no longer possible to login through the web-ui.
Auth through ldap (some websites) and through sssd on linux servers is stil=
l working, kerberos tickets are generated when logging with password or whe=
n running kinit, so critical operations are still possible.
The messages in `systemctl status pki-tomcatd(a)pki-tomcat.service` are
```
Apr 12 13:50:33 ipa.domain.com ipa-pki-wait-running[17869]: ipa-pki-wait-ru=
nning: Request failed unexpectedly, 404 Client Error: for url: http://ipa.=
domain.com:8080/ca/admin/ca/getStatus
Apr 12 13:50:34 ipa.domain.com systemd[1]: pki-tomcatd(a)pki-tomcat.service=
: start-post operation timed out. Terminating.
Apr 12 13:50:34 ipa.domain.com systemd[1]: pki-tomcatd(a)pki-tomcat.service=
: Control process exited, code=3Dkilled, status=3D15/TERM
Apr 12 13:50:34 ipa.domain.com systemd[1]: pki-tomcatd(a)pki-tomcat.service=
: Failed with result 'timeout'.
Apr 12 13:50:34 ipa.domain.com systemd[1]: Failed to start PKI Tomcat Serve=
r pki-tomcat.
```
journalctl give other errors (filtered what seems relevant).
```
Apr 12 13:49:05 ipa.domain.com server[17868]: WARNING: Problem with JAR fil=
e [/usr/share/pki/server/common/lib/commons-collections.jar], exists: [fals=
e], canRead: [false]
Apr 12 13:49:07 ipa.domain.com java[17868]: usr/lib/api/apiutil.c Could not=
open /run/lock/opencryptoki/LCK..APIlock
Apr 12 13:49:18 ipa.domain.com server[17868]: SEVERE: Context [/acme] start=
up failed due to previous errors
```
`/var/log/pki/pki-tomcat/pki/debug.2024-04-12.log`
contains the following errors =
```
2024-04-12 15:01:12 [main] SEVERE: Exception initializing random number gen=
erator using provider [Mozilla-JSS]
java.security.NoSuchProviderException: no such provider: Mozilla-JSS
at java.base/sun.security.jca.GetInstance.getService(GetInstance.ja=
va:83)
at java.base/sun.security.jca.GetInstance.getInstance(GetInstance.j=
ava:206)
....
```
`/var/log/pki/pki-tomcat/ca/debug.2024-04-12.log`
contains the following type of errors
```
2024-04-12 00:17:37 [main] SEVERE: Unable to start CA engine: Property inst=
anceRoot missing value
Property instanceRoot missing value
at com.netscape.cmscore.base.PropConfigStore.getString(PropConfigSt=
ore.java:297)
at com.netscape.cmscore.apps.EngineConfig.getInstanceDir(EngineConf=
ig.java:55)
at com.netscape.cmscore.apps.CMSEngine.loadConfig(CMSEngine.java:23=
3)
at com.netscape.cmscore.apps.CMSEngine.start(CMSEngine.java:1025)
....
2024-04-12 17:49:21 [main] SEVERE: Exception sending context initialized ev=
ent to listener instance of class [org.dogtagpki.server.ca.CAEngine]
java.lang.RuntimeException: Unable to start CA engine: Property instanceRoo=
t missing value
at com.netscape.cmscore.apps.CMSEngine.contextInitialized(CMSEngine=
.java:1672)
at org.apache.catalina.core.StandardContext.listenerStart(StandardC=
ontext.java:4768)
at org.apache.catalina.core.StandardContext.startInternal(StandardC=
ontext.java:5230)
```
`getcert list` reports all entries except the caCACert as expired.
I tried pretty much everything I could find on the internet (though most of=
the threads I found were never resolved).
Tried ipa-cert-fix.
Tried ipa-restoring a backup in a new container, same problem occurs.
My guess is that an upgrade years back did break the certificate auto-renew=
al and went undetected, and now everything is expired it's failing.
=
If you have any ideas of what to check/try I would be very grateful as I am=
losing my sanity here.
Also, I am a bit scared of breaking what is currently working (ldap+sssd) a=
nd critical to our operations, so if anything can be tested on a copy of th=
e data in a container that would be great. =
Thanks!
--===============8868600681727047957==--
From sam at robots.org.uk Sat Apr 13 16:06:58 2024
Content-Type: multipart/mixed; boundary="===============2241049064748292685=="
MIME-Version: 1.0
From: Sam Morris
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Assertion failure in dns_name_fromtext prevents
named-pkcs11 from starting
Date: Sat, 13 Apr 2024 17:06:25 +0100
Message-ID: <4a0e0cc5e97968e071eb04d7a61fb81d8921b504.camel@robots.org.uk>
--===============2241049064748292685==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
I've got two RHEL 8 servers where named-pkcs11 aborts with an assertion fai=
lure after upgrading bind to version 32:9.11.36-11.el8_9.1.
```
Apr 13 15:54:50 named-pkcs11[372364]: zone localhost/IN: loaded serial 0 =
Apr 13 15:54:50 named-pkcs11[372364]: zone localhost.localdomain/IN: loaded=
serial 0 =
Apr 13 15:54:50 named-pkcs11[372364]: zone 1.0.0.127.in-addr.arpa/IN: loade=
d serial 0 =
Apr 13 15:54:50 named-pkcs11[372364]: zone 1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.=
0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.ip6.arpa/IN: loaded serial 0 =
Apr 13 15:54:50 named-pkcs11[372364]: all zones loaded =
Apr 13 15:54:50 named-pkcs11[372364]: running =
Apr 13 15:54:50 named-pkcs11[372364]: ../../../lib/dns-pkcs11/name.c:1116: =
REQUIRE((target !=3D ((void *)0) && (__builtin_expect(((target) !=3D ((void=
*)0)), 1) && __builtin_ex> =
Apr 13 15:54:50 systemd[1]: named-pkcs11.service: New main PID 372364 does =
not belong to service, and PID file is not owned by root. Refusing. =
Apr 13 15:54:50 named-pkcs11[372364]: #0 0x563c05be4d14 in ?? =
Apr 13 15:54:50 systemd[1]: named-pkcs11.service: New main PID 372364 does =
not belong to service, and PID file is not owned by root. Refusing. =
Apr 13 15:54:50 named-pkcs11[372364]: #1 0x7fb179f28fe0 in ?? =
Apr 13 15:54:50 named-pkcs11[372364]: #2 0x7fb17a23b7b2 in ?? =
Apr 13 15:54:50 named-pkcs11[372364]: #3 0x7fb1687e4156 in ?? =
Apr 13 15:54:50 named-pkcs11[372364]: #4 0x7fb1687e45e1 in ?? =
Apr 13 15:54:50 named-pkcs11[372364]: #5 0x7fb1687e5e60 in ?? =
Apr 13 15:54:50 named-pkcs11[372364]: #6 0x7fb1687e6214 in ?? =
Apr 13 15:54:50 named-pkcs11[372364]: #7 0x7fb1687ef3e0 in ?? =
Apr 13 15:54:50 named-pkcs11[372364]: #8 0x7fb179f50904 in ?? =
Apr 13 15:54:50 named-pkcs11[372364]: #9 0x7fb179f5158f in ?? =
Apr 13 15:54:50 named-pkcs11[372364]: #10 0x7fb17733e1ca in ?? =
Apr 13 15:54:50 named-pkcs11[372364]: #11 0x7fb176c42e73 in ?? =
Apr 13 15:54:50 named-pkcs11[372364]: exiting (due to assertion failure)
```
Downgrading to 9.11.36-11.el8_9.x86_64 fixes the problem.
Here's the stack trace from 'coredumpctl info named-pkcs11':
```
Stack trace of thread 325662:
#0 0x00007f0575081acf raise (libc.so.6)
#1 0x00007f0575054ea5 abort (libc.so.6)
#2 0x0000557c3cbecd2a assertion_failed.cold.5 (named-pkcs11)
#3 0x00007f0578352fe0 isc_assertion_failed (libisc-pkcs11.so.1107)
#4 0x00007f05786657b2 dns_name_fromtext (libdns-pkcs11.so.1115)
#5 0x00007f056e20b156 empty_zone_search_next (ldap.so)
#6 0x00007f056e20b5e1 empty_zone_handle_conflicts (ldap.so)
#7 0x00007f056e20ce60 fwd_configure_zone (ldap.so)
#8 0x00007f056e20d214 fwd_reconfig_global (ldap.so)
#9 0x00007f056e2163e0 update_serverconfig (ldap.so)
#10 0x00007f057837a904 dispatch (libisc-pkcs11.so.1107)
#11 0x00007f057837b58f run_normal (libisc-pkcs11.so.1107)
#12 0x00007f05757681ca start_thread (libpthread.so.0)
#13 0x00007f057506ce73 __clone (libc.so.6)
```
I can open a Jira, attach coredumps, etc. next week if needed.
```
-- =
Sam Morris
```
--===============2241049064748292685==--
From louis at fazant.net Sat Apr 13 17:03:32 2024
Content-Type: multipart/mixed; boundary="===============6816373218248076573=="
MIME-Version: 1.0
From: Louis Lagendijk
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: Assertion failure in dns_name_fromtext prevents
named-pkcs11 from starting
Date: Sat, 13 Apr 2024 19:03:10 +0200
Message-ID: <058085ea86cd140c9b94d7dc325bcdc1030bd23c.camel@fazant.net>
In-Reply-To: 4a0e0cc5e97968e071eb04d7a61fb81d8921b504.camel@robots.org.uk
--===============6816373218248076573==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
On Sat, 2024-04-13 at 17:06 +0100, Sam Morris via FreeIPA-users wrote:
> I've got two RHEL 8 servers where named-pkcs11 aborts with an assertion
> failure after upgrading bind to version 32:9.11.36-11.el8_9.1.
> =
> ```
> Apr 13 15:54:50 named-pkcs11[372364]: zone localhost/IN: loaded serial
> 0=C2=A0 =
> Apr 13 15:54:50 named-pkcs11[372364]: zone localhost.localdomain/IN:
> loaded serial 0=C2=A0 =
> Apr 13 15:54:50 named-pkcs11[372364]: zone 1.0.0.127.in-addr.arpa/IN:
> loaded serial 0=C2=A0 =
> Apr 13 15:54:50 named-pkcs11[372364]: zone
> 1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.ip6.arp
> a/IN: loaded serial 0=C2=A0 =
> Apr 13 15:54:50 named-pkcs11[372364]: all zones loaded=C2=A0 =
> Apr 13 15:54:50 named-pkcs11[372364]: running=C2=A0 =
> Apr 13 15:54:50 named-pkcs11[372364]: ../../../lib/dns-
> pkcs11/name.c:1116: REQUIRE((target !=3D ((void *)0) &&
> (__builtin_expect(((target) !=3D ((void *)0)), 1) && __builtin_ex>=C2=A0 =
> Apr 13 15:54:50 systemd[1]: named-pkcs11.service: New main PID 372364
> does not belong to service, and PID file is not owned by root.
> Refusing.=C2=A0 =
> Apr 13 15:54:50 named-pkcs11[372364]: #0 0x563c05be4d14 in ??=C2=A0 =
> Apr 13 15:54:50 systemd[1]: named-pkcs11.service: New main PID 372364
> does not belong to service, and PID file is not owned by root.
> Refusing.=C2=A0 =
> Apr 13 15:54:50 named-pkcs11[372364]: #1 0x7fb179f28fe0 in ??=C2=A0 =
> Apr 13 15:54:50 named-pkcs11[372364]: #2 0x7fb17a23b7b2 in ??=C2=A0 =
> Apr 13 15:54:50 named-pkcs11[372364]: #3 0x7fb1687e4156 in ??=C2=A0 =
> Apr 13 15:54:50 named-pkcs11[372364]: #4 0x7fb1687e45e1 in ??=C2=A0 =
> Apr 13 15:54:50 named-pkcs11[372364]: #5 0x7fb1687e5e60 in ??=C2=A0 =
> Apr 13 15:54:50 named-pkcs11[372364]: #6 0x7fb1687e6214 in ??=C2=A0 =
> Apr 13 15:54:50 named-pkcs11[372364]: #7 0x7fb1687ef3e0 in ??=C2=A0 =
> Apr 13 15:54:50 named-pkcs11[372364]: #8 0x7fb179f50904 in ??=C2=A0 =
> Apr 13 15:54:50 named-pkcs11[372364]: #9 0x7fb179f5158f in ??=C2=A0 =
> Apr 13 15:54:50 named-pkcs11[372364]: #10 0x7fb17733e1ca in ??=C2=A0 =
> Apr 13 15:54:50 named-pkcs11[372364]: #11 0x7fb176c42e73 in ??=C2=A0 =
> Apr 13 15:54:50 named-pkcs11[372364]: exiting (due to assertion
> failure)
> ```
> =
> Downgrading to 9.11.36-11.el8_9.x86_64 fixes the problem.
> =
I had the same yesterday, so I rolled back the VMs to before the last
update. When I tried again today I had no problems anymore. I guess due
to the fact that the update installed an updated bind-dyndb-ldap. This
has the following in the changelog:
* Thu Mar 28 2024 Rafael Jeffman - 11.6-5
- Rebuild due to Bind ABI changes (CVE 2023-50387).
Resolves: RHEL-28847
BR, Louis
--===============6816373218248076573==--
From sam at robots.org.uk Sat Apr 13 18:42:36 2024
Content-Type: multipart/mixed; boundary="===============4174610263238883901=="
MIME-Version: 1.0
From: Sam Morris
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: Assertion failure in dns_name_fromtext prevents
named-pkcs11 from starting
Date: Sat, 13 Apr 2024 19:42:00 +0100
Message-ID: <5f5bf5b659f212c5860d797358ff32933c3a4597.camel@robots.org.uk>
In-Reply-To: 058085ea86cd140c9b94d7dc325bcdc1030bd23c.camel@fazant.net
--===============4174610263238883901==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
On Sat, 2024-04-13 at 19:03 +0200, Louis Lagendijk via FreeIPA-users
wrote:
> =
> I had the same yesterday, so I rolled back the VMs to before the=C2=A0
> last
> update. When I tried again today I had no problems anymore. I guess
> due
> to the fact that the update installed an updated bind-dyndb-ldap.
> This
> has the following in the changelog:
> * Thu Mar 28 2024 Rafael Jeffman - 11.6-5
> - Rebuild due to Bind ABI changes (CVE 2023-50387).
> =C2=A0 Resolves: RHEL-28847
Thanks, you're quite correct. On these servers I have dnf-automatic set
to apply security updates only, so bind-dyndb-ldap didn't get pulled
in. Upgrading that package fixed things.
> BR, Louis
-- =
Sam Morris
--===============4174610263238883901==--
From jdoe53851 at gmail.com Mon Apr 15 07:02:57 2024
Content-Type: multipart/mixed; boundary="===============3363101401336636409=="
MIME-Version: 1.0
From: John Doe
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] IPA Replica can't authenticate users
Date: Mon, 15 Apr 2024 09:01:26 +0200
Message-ID:
--===============3363101401336636409==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
I'm playing around with IPA trying to figure out how to set it up to be
redundant. The problem is that the IPA Replica isn't able to authenticate
AD users if IPA Master is down.
My setup;
One Windows Server set up with Active Direcory Domain Services, Active
Directory Certificate Services and DNS server hosting the ad.labnet.org
domain and the Root CA.
Two Linux servers setup in the labnet.org domain. Both using the Windows
Server DNS server.
The first one is setup as a IPA Master server hosting the domain
ipa.labnet.org and act as a subordinate CA server. It was setup with the
following commands;
sudo ipa-server-install --external-ca --external-ca-type=3Dms-cs
sudo ipa-server-install --external-cert-file=3D/home/$USER/ipa.cer
--external-cert-file=3D/home/$USER/certnew.cer
kinit admin
sudo ipa-adtrust-install
sudo ipa trust-add --type=3Dad ad.labnet.org --admin Administrator
--password --two-way=3Dtrue
The second one is setup as a IPA Replica also hosting the domain
ipa.labnet.org It has been setup with the following commands;
sudo ipa-client-install --mkhomedir
sudo ipa-replica-install
sudo ipa-ca-install
kinit admin
sudo ipa-adtrust-install
sudo ipa trust-add --type=3Dad ad.labnet.org --admin Administrator
--password --two-way=3Dtrue
All needed DNS records have been created in the DNS server on the Windows
server. At least I hope so.
IPA Healthceck on both IPA servers don't complain about anything missing.
sudo ipa-healthcheck --output-type human
One IPA Client also setup in the labnet.org domain and using the Windows
server DNS, was setup with the following command;
sudo ipa-client-install --domain=3Dipa.labnet.org --mkhomedir
Testing authentication on the IPA Client as a user in the ad.labnet.org
works out like this;
Both IPA Servers up works OK
Only IPA Master up works OK
Only IPA Replica up doesn't work.
After this check with IPA Healthcheck on the IPA Replica now comes back
with this;
WARNING: ipahealthcheck.ipa.trust.IPATrustCatalogCheck.{}: Look up of ID {}
for ad.labnet.org returned nothing
ERROR: ipahealthcheck.ipa.trust.IPATrustCatalogCheck.AD Global Catalog: AD
Global Catalog not found in /usr/sbin/sssctl 'domain-status' output: Active
servers:
IPA: lab003.labnet.org
ERROR: ipahealthcheck.ipa.trust.IPATrustCatalogCheck.AD Domain Controller:
AD Domain Controller not found in /usr/sbin/sssctl 'domain-status' output:
Active servers:
IPA: lab003.labnet.org
Can anyone suggest what I have done wrong or missed? As far as I can tell
there are no commands that let me write to the GLobal Catalog?
Thanks!
--===============3363101401336636409==
Content-Type: text/html
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="attachment.html"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--===============3363101401336636409==--
From flo at redhat.com Mon Apr 15 07:35:56 2024
Content-Type: multipart/mixed; boundary="===============8635841853851141744=="
MIME-Version: 1.0
From: Florence Blanc-Renaud
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: IPA Replica can't authenticate users
Date: Mon, 15 Apr 2024 09:35:27 +0200
Message-ID:
In-Reply-To: CAAzbKPmaa2gpRGZ1cHxSXR5Erq8L0W62t0gZ7Bbfkpht+Qvh5Q@mail.gmail.com
--===============8635841853851141744==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Hi,
On Mon, Apr 15, 2024 at 9:03=E2=80=AFAM John Doe via FreeIPA-users <
freeipa-users(a)lists.fedorahosted.org> wrote:
> I'm playing around with IPA trying to figure out how to set it up to be
> redundant. The problem is that the IPA Replica isn't able to authenticate
> AD users if IPA Master is down.
> My setup;
> One Windows Server set up with Active Direcory Domain Services, Active
> Directory Certificate Services and DNS server hosting the ad.labnet.org
> domain and the Root CA.
>
> Two Linux servers setup in the labnet.org domain. Both using the Windows
> Server DNS server.
> The first one is setup as a IPA Master server hosting the domain
> ipa.labnet.org and act as a subordinate CA server. It was setup with the
> following commands;
> sudo ipa-server-install --external-ca --external-ca-type=3Dms-cs
> sudo ipa-server-install --external-cert-file=3D/home/$USER/ipa.cer
> --external-cert-file=3D/home/$USER/certnew.cer
> kinit admin
> sudo ipa-adtrust-install
> sudo ipa trust-add --type=3Dad ad.labnet.org --admin Administrator
> --password --two-way=3Dtrue
>
> The second one is setup as a IPA Replica also hosting the domain
> ipa.labnet.org It has been setup with the following commands;
> sudo ipa-client-install --mkhomedir
> sudo ipa-replica-install
> sudo ipa-ca-install
> kinit admin
> sudo ipa-adtrust-install
> sudo ipa trust-add --type=3Dad ad.labnet.org --admin Administrator
> --password --two-way=3Dtrue
>
The above command (ipa trust-add) probably exited on error as the trust was
already established. Please read Trust controllers and Trust Agents
to
understand how the replica should be setup in order to be able to resolve
AD users and groups. With your set of commands, both master and replica are
configured as AD Trust Controllers and should be able to resolve users and
groups, but there is no need to run twice the trust-add part.
>
> All needed DNS records have been created in the DNS server on the Windows
> server. At least I hope so.
> IPA Healthceck on both IPA servers don't complain about anything missing.
> sudo ipa-healthcheck --output-type human
>
> One IPA Client also setup in the labnet.org domain and using the Windows
> server DNS, was setup with the following command;
> sudo ipa-client-install --domain=3Dipa.labnet.org --mkhomedir
>
> Testing authentication on the IPA Client as a user in the ad.labnet.org
> works out like this;
> Both IPA Servers up works OK
> Only IPA Master up works OK
> Only IPA Replica up doesn't work.
>
Did you test authentication on the IPA replica?
Is your master a DNS server for ipa.labnet.org Is the replica a DNS server
for ipa.labnet.org
flo
>
> After this check with IPA Healthcheck on the IPA Replica now comes back
> with this;
> WARNING: ipahealthcheck.ipa.trust.IPATrustCatalogCheck.{}: Look up of ID
> {} for ad.labnet.org returned nothing
> ERROR: ipahealthcheck.ipa.trust.IPATrustCatalogCheck.AD Global Catalog:
> AD Global Catalog not found in /usr/sbin/sssctl 'domain-status' output:
> Active servers:
> IPA: lab003.labnet.org
> ERROR: ipahealthcheck.ipa.trust.IPATrustCatalogCheck.AD Domain
> Controller: AD Domain Controller not found in /usr/sbin/sssctl
> 'domain-status' output: Active servers:
> IPA: lab003.labnet.org
>
> Can anyone suggest what I have done wrong or missed? As far as I can tell
> there are no commands that let me write to the GLobal Catalog?
> Thanks!
> --
> _______________________________________________
> FreeIPA-users mailing list -- freeipa-users(a)lists.fedorahosted.org
> To unsubscribe send an email to freeipa-users-leave(a)lists.fedorahosted.=
org
> Fedora Code of Conduct:
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives:
> https://lists.fedorahosted.org/archives/list/freeipa-users(a)lists.fedora=
hosted.org
> Do not reply to spam, report it:
> https://pagure.io/fedora-infrastructure/new_issue
>
--===============8635841853851141744==
Content-Type: text/html
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="attachment.html"
PGRpdiBkaXI9Imx0ciI+PGRpdiBkaXI9Imx0ciI+PGRpdiBjbGFzcz0iZ21haWxfZGVmYXVsdCIg
c3R5bGU9ImZvbnQtZmFtaWx5OmFyaWFsLHNhbnMtc2VyaWYiPkhpLDwvZGl2PjwvZGl2Pjxicj48
ZGl2IGNsYXNzPSJnbWFpbF9xdW90ZSI+PGRpdiBkaXI9Imx0ciIgY2xhc3M9ImdtYWlsX2F0dHIi
Pk9uIE1vbiwgQXByIDE1LCAyMDI0IGF0IDk6MDPigK9BTSBKb2huIERvZSB2aWEgRnJlZUlQQS11
c2VycyAmbHQ7PGEgaHJlZj0ibWFpbHRvOmZyZWVpcGEtdXNlcnNAbGlzdHMuZmVkb3JhaG9zdGVk
Lm9yZyI+ZnJlZWlwYS11c2Vyc0BsaXN0cy5mZWRvcmFob3N0ZWQub3JnPC9hPiZndDsgd3JvdGU6
PGJyPjwvZGl2PjxibG9ja3F1b3RlIGNsYXNzPSJnbWFpbF9xdW90ZSIgc3R5bGU9Im1hcmdpbjow
cHggMHB4IDBweCAwLjhleDtib3JkZXItbGVmdDoxcHggc29saWQgcmdiKDIwNCwyMDQsMjA0KTtw
YWRkaW5nLWxlZnQ6MWV4Ij48ZGl2IGRpcj0ibHRyIj5JJiMzOTttIHBsYXlpbmcgYXJvdW5kIHdp
dGggSVBBIHRyeWluZyB0byBmaWd1cmUgb3V0IGhvdyB0byBzZXQgaXQgdXAgdG8gYmUgcmVkdW5k
YW50LiBUaGUgcHJvYmxlbSBpcyB0aGF0IHRoZSBJUEEgUmVwbGljYSBpc24mIzM5O3QgYWJsZSB0
byBhdXRoZW50aWNhdGUgQUQgdXNlcnMgaWYgSVBBIE1hc3RlciBpcyBkb3duLjxicj5NeSBzZXR1
cDs8ZGl2Pk9uZSBXaW5kb3dzIFNlcnZlciBzZXQgdXAgd2l0aCBBY3RpdmUgRGlyZWNvcnnCoERv
bWFpbiBTZXJ2aWNlcywgQWN0aXZlIERpcmVjdG9yeSBDZXJ0aWZpY2F0ZSBTZXJ2aWNlcyBhbmQg
RE5TIHNlcnZlciBob3N0aW5nIHRoZSA8YSBocmVmPSJodHRwOi8vYWQubGFibmV0Lm9yZyIgdGFy
Z2V0PSJfYmxhbmsiPmFkLmxhYm5ldC5vcmc8L2E+IGRvbWFpbiBhbmQgdGhlIFJvb3QgQ0EuPGJy
Pjxicj5Ud28gTGludXggc2VydmVycyBzZXR1cCBpbiB0aGUgPGEgaHJlZj0iaHR0cDovL2xhYm5l
dC5vcmciIHRhcmdldD0iX2JsYW5rIj5sYWJuZXQub3JnPC9hPiBkb21haW4uIEJvdGggdXNpbmcg
dGhlIFdpbmRvd3MgU2VydmVyIEROUyBzZXJ2ZXIuPGJyPlRoZSBmaXJzdCBvbmUgaXMgc2V0dXAg
YXMgYSBJUEEgTWFzdGVyIHNlcnZlciBob3N0aW5nIHRoZSBkb21haW4gPGEgaHJlZj0iaHR0cDov
L2lwYS5sYWJuZXQub3JnIiB0YXJnZXQ9Il9ibGFuayI+aXBhLmxhYm5ldC5vcmc8L2E+IGFuZCBh
Y3QgYXMgYSBzdWJvcmRpbmF0ZSBDQSBzZXJ2ZXIuIEl0IHdhcyBzZXR1cMKgd2l0aCB0aGUgZm9s
bG93aW5nIGNvbW1hbmRzOzwvZGl2PjxkaXY+wqAgc3VkbyBpcGEtc2VydmVyLWluc3RhbGwgLS1l
eHRlcm5hbC1jYSAtLWV4dGVybmFsLWNhLXR5cGU9bXMtY3M8YnI+PC9kaXY+PGRpdj7CoCBzdWRv
IGlwYS1zZXJ2ZXItaW5zdGFsbCAtLWV4dGVybmFsLWNlcnQtZmlsZT0vaG9tZS8kVVNFUi9pcGEu
Y2VyIC0tZXh0ZXJuYWwtY2VydC1maWxlPS9ob21lLyRVU0VSL2NlcnRuZXcuY2VyPGJyPjwvZGl2
PjxkaXY+wqAga2luaXQgYWRtaW48L2Rpdj48ZGl2PsKgIHN1ZG8gaXBhLWFkdHJ1c3QtaW5zdGFs
bDxicj48L2Rpdj48ZGl2PsKgIHN1ZG8gaXBhIHRydXN0LWFkZCAtLXR5cGU9YWQgPGEgaHJlZj0i
aHR0cDovL2FkLmxhYm5ldC5vcmciIHRhcmdldD0iX2JsYW5rIj5hZC5sYWJuZXQub3JnPC9hPiAt
LWFkbWluIEFkbWluaXN0cmF0b3IgLS1wYXNzd29yZCAtLXR3by13YXk9dHJ1ZTxicj48L2Rpdj48
ZGl2Pjxicj48L2Rpdj48ZGl2PlRoZSBzZWNvbmQgb25lIGlzIHNldHVwIGFzIGEgSVBBIFJlcGxp
Y2EgYWxzbyBob3N0aW5nIHRoZSBkb21haW4gPGEgaHJlZj0iaHR0cDovL2lwYS5sYWJuZXQub3Jn
IiB0YXJnZXQ9Il9ibGFuayI+aXBhLmxhYm5ldC5vcmc8L2E+IEl0IGhhcyBiZWVuIHNldHVwIHdp
dGggdGhlIGZvbGxvd2luZyBjb21tYW5kczs8L2Rpdj48ZGl2PsKgIHN1ZG8gaXBhLWNsaWVudC1p
bnN0YWxsIC0tbWtob21lZGlyPGJyPjwvZGl2PjxkaXY+wqAgc3VkbyBpcGEtcmVwbGljYS1pbnN0
YWxsPC9kaXY+PGRpdj7CoCBzdWRvIGlwYS1jYS1pbnN0YWxsPGJyPjwvZGl2PjxkaXY+wqAga2lu
aXQgYWRtaW48YnI+PC9kaXY+PGRpdj7CoCBzdWRvIGlwYS1hZHRydXN0LWluc3RhbGw8YnI+PC9k
aXY+PGRpdj7CoCBzdWRvIGlwYSB0cnVzdC1hZGQgLS10eXBlPWFkIDxhIGhyZWY9Imh0dHA6Ly9h
ZC5sYWJuZXQub3JnIiB0YXJnZXQ9Il9ibGFuayI+YWQubGFibmV0Lm9yZzwvYT4gLS1hZG1pbiBB
ZG1pbmlzdHJhdG9yIC0tcGFzc3dvcmQgLS10d28td2F5PXRydWU8YnI+PC9kaXY+PC9kaXY+PC9i
bG9ja3F1b3RlPjxkaXY+PHNwYW4gY2xhc3M9ImdtYWlsX2RlZmF1bHQiIHN0eWxlPSJmb250LWZh
bWlseTphcmlhbCxzYW5zLXNlcmlmIj5UaGUgYWJvdmUgY29tbWFuZCAoaXBhIHRydXN0LWFkZCkg
cHJvYmFibHkgZXhpdGVkIG9uIGVycm9yIGFzIHRoZSB0cnVzdCB3YXMgYWxyZWFkeSBlc3RhYmxp
c2hlZC4gUGxlYXNlIHJlYWQgPGEgaHJlZj0iaHR0cHM6Ly9hY2Nlc3MucmVkaGF0LmNvbS9kb2N1
bWVudGF0aW9uL2VuLXVzL3JlZF9oYXRfZW50ZXJwcmlzZV9saW51eC85L2h0bWwvcGxhbm5pbmdf
aWRlbnRpdHlfbWFuYWdlbWVudC9wbGFubmluZy1hLWNyb3NzLWZvcmVzdC10cnVzdC1iZXR3ZWVu
LWlkbS1hbmQtYWRfcGxhbm5pbmctaWRlbnRpdHktbWFuYWdlbWVudCN0cnVzdC1jb250cm9sbGVy
cy1hbmQtdHJ1c3QtYWdlbnRzX3BsYW5uaW5nLWEtY3Jvc3MtZm9yZXN0LXRydXN0LWJldHdlZW4t
aWRtLWFuZC1hZCI+VHJ1c3QgY29udHJvbGxlcnMgYW5kIFRydXN0IEFnZW50czwvYT7CoHRvIHVu
ZGVyc3RhbmQgaG93IHRoZSByZXBsaWNhIHNob3VsZCBiZSBzZXR1cCBpbiBvcmRlciB0byBiZSBh
YmxlIHRvIHJlc29sdmUgQUQgdXNlcnMgYW5kIGdyb3Vwcy4gV2l0aCB5b3VyIHNldCBvZiBjb21t
YW5kcywgYm90aCBtYXN0ZXIgYW5kIHJlcGxpY2EgYXJlIGNvbmZpZ3VyZWQgYXMgQUQgVHJ1c3Qg
Q29udHJvbGxlcnMgYW5kIHNob3VsZCBiZSBhYmxlIHRvIHJlc29sdmUgdXNlcnMgYW5kIGdyb3Vw
cywgYnV0IHRoZXJlIGlzIG5vIG5lZWQgdG8gcnVuIHR3aWNlIHRoZSB0cnVzdC1hZGQgcGFydC48
L3NwYW4+PC9kaXY+PGRpdj7CoDwvZGl2PjxibG9ja3F1b3RlIGNsYXNzPSJnbWFpbF9xdW90ZSIg
c3R5bGU9Im1hcmdpbjowcHggMHB4IDBweCAwLjhleDtib3JkZXItbGVmdDoxcHggc29saWQgcmdi
KDIwNCwyMDQsMjA0KTtwYWRkaW5nLWxlZnQ6MWV4Ij48ZGl2IGRpcj0ibHRyIj48ZGl2PjwvZGl2
PjxkaXY+PGJyPjwvZGl2PjxkaXY+QWxsIG5lZWRlZCBETlMgcmVjb3JkcyBoYXZlIGJlZW4gY3Jl
YXRlZCBpbiB0aGUgRE5TIHNlcnZlciBvbiB0aGUgV2luZG93cyBzZXJ2ZXIuIEF0IGxlYXN0IEkg
aG9wZSBzby48L2Rpdj48ZGl2PklQQSBIZWFsdGhjZWNrIG9uIGJvdGggSVBBIHNlcnZlcnMgZG9u
JiMzOTt0IGNvbXBsYWluIGFib3V0IGFueXRoaW5nIG1pc3NpbmcuPGJyPsKgIHN1ZG8gaXBhLWhl
YWx0aGNoZWNrIC0tb3V0cHV0LXR5cGUgaHVtYW48YnI+PC9kaXY+PGRpdj48YnI+PC9kaXY+PGRp
dj5PbmUgSVBBIENsaWVudCBhbHNvIHNldHVwIGluIHRoZSA8YSBocmVmPSJodHRwOi8vbGFibmV0
Lm9yZyIgdGFyZ2V0PSJfYmxhbmsiPmxhYm5ldC5vcmc8L2E+IGRvbWFpbiBhbmQgdXNpbmcgdGhl
IFdpbmRvd3Mgc2VydmVyIEROUywgd2FzIHNldHVwIHdpdGggdGhlIGZvbGxvd2luZyBjb21tYW5k
OzwvZGl2PjxkaXY+c3VkbyBpcGEtY2xpZW50LWluc3RhbGwgLS1kb21haW49PGEgaHJlZj0iaHR0
cDovL2lwYS5sYWJuZXQub3JnIiB0YXJnZXQ9Il9ibGFuayI+aXBhLmxhYm5ldC5vcmc8L2E+IC0t
bWtob21lZGlyPGJyPjwvZGl2PjxkaXY+PGJyPjwvZGl2PjxkaXY+VGVzdGluZyBhdXRoZW50aWNh
dGlvbiBvbiB0aGUgSVBBIENsaWVudCBhcyBhIHVzZXIgaW4gdGhlIDxhIGhyZWY9Imh0dHA6Ly9h
ZC5sYWJuZXQub3JnIiB0YXJnZXQ9Il9ibGFuayI+YWQubGFibmV0Lm9yZzwvYT4gd29ya3PCoCBv
dXQgbGlrZSB0aGlzOzwvZGl2PjxkaXY+Qm90aCBJUEEgU2VydmVycyB1cCB3b3JrcyBPSzwvZGl2
PjxkaXY+T25seSBJUEEgTWFzdGVyIHVwIHdvcmtzIE9LPC9kaXY+PGRpdj5Pbmx5IElQQSBSZXBs
aWNhIHVwIGRvZXNuJiMzOTt0IHdvcmsuPC9kaXY+PC9kaXY+PC9ibG9ja3F1b3RlPjxkaXY+PHNw
YW4gY2xhc3M9ImdtYWlsX2RlZmF1bHQiIHN0eWxlPSJmb250LWZhbWlseTphcmlhbCxzYW5zLXNl
cmlmIj5EaWQgeW91IHRlc3QgYXV0aGVudGljYXRpb24gb24gdGhlIElQQSByZXBsaWNhP8KgPC9z
cGFuPjwvZGl2PjxkaXYgY2xhc3M9ImdtYWlsX2RlZmF1bHQiIHN0eWxlPSJmb250LWZhbWlseTph
cmlhbCxzYW5zLXNlcmlmIj5JcyB5b3VyIG1hc3RlciBhIEROUyBzZXJ2ZXIgZm9yIDxhIGhyZWY9
Imh0dHA6Ly9pcGEubGFibmV0Lm9yZyI+aXBhLmxhYm5ldC5vcmc8L2E+PyBJcyB0aGUgcmVwbGlj
YSBhIEROUyBzZXJ2ZXIgZm9yIDxhIGhyZWY9Imh0dHA6Ly9pcGEubGFibmV0Lm9yZyI+aXBhLmxh
Ym5ldC5vcmc8L2E+PzwvZGl2PjxkaXYgY2xhc3M9ImdtYWlsX2RlZmF1bHQiIHN0eWxlPSJmb250
LWZhbWlseTphcmlhbCxzYW5zLXNlcmlmIj48YnI+PC9kaXY+PGRpdiBjbGFzcz0iZ21haWxfZGVm
YXVsdCIgc3R5bGU9ImZvbnQtZmFtaWx5OmFyaWFsLHNhbnMtc2VyaWYiPmZsbzwvZGl2PjxibG9j
a3F1b3RlIGNsYXNzPSJnbWFpbF9xdW90ZSIgc3R5bGU9Im1hcmdpbjowcHggMHB4IDBweCAwLjhl
eDtib3JkZXItbGVmdDoxcHggc29saWQgcmdiKDIwNCwyMDQsMjA0KTtwYWRkaW5nLWxlZnQ6MWV4
Ij48ZGl2IGRpcj0ibHRyIj48ZGl2Pjxicj48L2Rpdj48ZGl2PkFmdGVyIHRoaXMgY2hlY2sgd2l0
aCBJUEEgSGVhbHRoY2hlY2sgb24gdGhlIElQQSBSZXBsaWNhIG5vdyBjb21lcyBiYWNrIHdpdGgg
dGhpczs8L2Rpdj48ZGl2PjxzcGFuIHN0eWxlPSJmb250LWZhbWlseTptb25vc3BhY2UiPjxzcGFu
IHN0eWxlPSJjb2xvcjpyZ2IoMCwwLDApIj5XQVJOSU5HOiBpcGFoZWFsdGhjaGVjay5pcGEudHJ1
c3QuSVBBVHJ1c3RDYXRhbG9nQ2hlY2sue306IExvb2sgdXAgb2YgSUQge30gZm9yIDxhIGhyZWY9
Imh0dHA6Ly9hZC5sYWJuZXQub3JnIiB0YXJnZXQ9Il9ibGFuayI+YWQubGFibmV0Lm9yZzwvYT4g
cmV0dXJuZWQgbm90aGluZwo8L3NwYW4+PGJyPkVSUk9SOiA8YSBocmVmPSJodHRwOi8vaXBhaGVh
bHRoY2hlY2suaXBhLnRydXN0LklQQVRydXN0Q2F0YWxvZ0NoZWNrLkFEIiB0YXJnZXQ9Il9ibGFu
ayI+aXBhaGVhbHRoY2hlY2suaXBhLnRydXN0LklQQVRydXN0Q2F0YWxvZ0NoZWNrLkFEPC9hPiBH
bG9iYWwgQ2F0YWxvZzogQUQgR2xvYmFsIENhdGFsb2cgbm90IGZvdW5kIGluIC91c3Ivc2Jpbi9z
c3NjdGwgJiMzOTtkb21haW4tc3RhdHVzJiMzOTsgb3V0cHV0OiBBY3RpdmUgc2VydmVyczoKPGJy
PklQQTogPGEgaHJlZj0iaHR0cDovL2xhYjAwMy5sYWJuZXQub3JnIiB0YXJnZXQ9Il9ibGFuayI+
bGFiMDAzLmxhYm5ldC5vcmc8L2E+Cjxicj5FUlJPUjogPGEgaHJlZj0iaHR0cDovL2lwYWhlYWx0
aGNoZWNrLmlwYS50cnVzdC5JUEFUcnVzdENhdGFsb2dDaGVjay5BRCIgdGFyZ2V0PSJfYmxhbmsi
PmlwYWhlYWx0aGNoZWNrLmlwYS50cnVzdC5JUEFUcnVzdENhdGFsb2dDaGVjay5BRDwvYT4gRG9t
YWluIENvbnRyb2xsZXI6IEFEIERvbWFpbiBDb250cm9sbGVyIG5vdCBmb3VuZCBpbiAvdXNyL3Ni
aW4vc3NzY3RsICYjMzk7ZG9tYWluLXN0YXR1cyYjMzk7IG91dHB1dDogQWN0aXZlIHNlcnZlcnM6
Cjxicj5JUEE6IDxhIGhyZWY9Imh0dHA6Ly9sYWIwMDMubGFibmV0Lm9yZyIgdGFyZ2V0PSJfYmxh
bmsiPmxhYjAwMy5sYWJuZXQub3JnPC9hPjxicj4KPGJyPjwvc3Bhbj48L2Rpdj48ZGl2PkNhbiBh
bnlvbmUgc3VnZ2VzdCB3aGF0IEkgaGF2ZSBkb25lIHdyb25nIG9yIG1pc3NlZD8gQXMgZmFyIGFz
IEkgY2FuIHRlbGwgdGhlcmUgYXJlIG5vIGNvbW1hbmRzIHRoYXQgbGV0IG1lIHdyaXRlIHRvIHRo
ZSBHTG9iYWwgQ2F0YWxvZz88L2Rpdj48ZGl2PlRoYW5rcyE8L2Rpdj48L2Rpdj4KLS08YnI+Cl9f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fPGJyPgpGcmVlSVBB
LXVzZXJzIG1haWxpbmcgbGlzdCAtLSA8YSBocmVmPSJtYWlsdG86ZnJlZWlwYS11c2Vyc0BsaXN0
cy5mZWRvcmFob3N0ZWQub3JnIiB0YXJnZXQ9Il9ibGFuayI+ZnJlZWlwYS11c2Vyc0BsaXN0cy5m
ZWRvcmFob3N0ZWQub3JnPC9hPjxicj4KVG8gdW5zdWJzY3JpYmUgc2VuZCBhbiBlbWFpbCB0byA8
YSBocmVmPSJtYWlsdG86ZnJlZWlwYS11c2Vycy1sZWF2ZUBsaXN0cy5mZWRvcmFob3N0ZWQub3Jn
IiB0YXJnZXQ9Il9ibGFuayI+ZnJlZWlwYS11c2Vycy1sZWF2ZUBsaXN0cy5mZWRvcmFob3N0ZWQu
b3JnPC9hPjxicj4KRmVkb3JhIENvZGUgb2YgQ29uZHVjdDogPGEgaHJlZj0iaHR0cHM6Ly9kb2Nz
LmZlZG9yYXByb2plY3Qub3JnL2VuLVVTL3Byb2plY3QvY29kZS1vZi1jb25kdWN0LyIgcmVsPSJu
b3JlZmVycmVyIiB0YXJnZXQ9Il9ibGFuayI+aHR0cHM6Ly9kb2NzLmZlZG9yYXByb2plY3Qub3Jn
L2VuLVVTL3Byb2plY3QvY29kZS1vZi1jb25kdWN0LzwvYT48YnI+Ckxpc3QgR3VpZGVsaW5lczog
PGEgaHJlZj0iaHR0cHM6Ly9mZWRvcmFwcm9qZWN0Lm9yZy93aWtpL01haWxpbmdfbGlzdF9ndWlk
ZWxpbmVzIiByZWw9Im5vcmVmZXJyZXIiIHRhcmdldD0iX2JsYW5rIj5odHRwczovL2ZlZG9yYXBy
b2plY3Qub3JnL3dpa2kvTWFpbGluZ19saXN0X2d1aWRlbGluZXM8L2E+PGJyPgpMaXN0IEFyY2hp
dmVzOiA8YSBocmVmPSJodHRwczovL2xpc3RzLmZlZG9yYWhvc3RlZC5vcmcvYXJjaGl2ZXMvbGlz
dC9mcmVlaXBhLXVzZXJzQGxpc3RzLmZlZG9yYWhvc3RlZC5vcmciIHJlbD0ibm9yZWZlcnJlciIg
dGFyZ2V0PSJfYmxhbmsiPmh0dHBzOi8vbGlzdHMuZmVkb3JhaG9zdGVkLm9yZy9hcmNoaXZlcy9s
aXN0L2ZyZWVpcGEtdXNlcnNAbGlzdHMuZmVkb3JhaG9zdGVkLm9yZzwvYT48YnI+CkRvIG5vdCBy
ZXBseSB0byBzcGFtLCByZXBvcnQgaXQ6IDxhIGhyZWY9Imh0dHBzOi8vcGFndXJlLmlvL2ZlZG9y
YS1pbmZyYXN0cnVjdHVyZS9uZXdfaXNzdWUiIHJlbD0ibm9yZWZlcnJlciIgdGFyZ2V0PSJfYmxh
bmsiPmh0dHBzOi8vcGFndXJlLmlvL2ZlZG9yYS1pbmZyYXN0cnVjdHVyZS9uZXdfaXNzdWU8L2E+
PGJyPgo8L2Jsb2NrcXVvdGU+PC9kaXY+PC9kaXY+Cg==
--===============8635841853851141744==--
From flo at redhat.com Mon Apr 15 07:50:04 2024
Content-Type: multipart/mixed; boundary="===============7741650297753641263=="
MIME-Version: 1.0
From: Florence Blanc-Renaud
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: pki-tomcat won't start + expired certificates
Date: Mon, 15 Apr 2024 09:49:38 +0200
Message-ID:
In-Reply-To: 20240412205153.31731.16457@mailman01.iad2.fedoraproject.org
--===============7741650297753641263==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Hi,
On Fri, Apr 12, 2024 at 10:52=E2=80=AFPM Basile Pinsard via FreeIPA-users <
freeipa-users(a)lists.fedorahosted.org> wrote:
> Hi freeipa experts.
>
> I have been using freeipa for the past 5 years running in a docker
> container, no replicas.
> currently on VERSION: 4.9.6, API_VERSION: 2.245
>
> I have the following issue, not sure what caused this: pki-tomcat service
> is not starting, and it is no longer possible to login through the web-ui.
> Auth through ldap (some websites) and through sssd on linux servers is
> still working, kerberos tickets are generated when logging with password =
or
> when running kinit, so critical operations are still possible.
>
> The messages in `systemctl status pki-tomcatd(a)pki-tomcat.service` are
> ```
> Apr 12 13:50:33 ipa.domain.com ipa-pki-wait-running[17869]:
> ipa-pki-wait-running: Request failed unexpectedly, 404 Client Error: for
> url: http://ipa.domain.com:8080/ca/admin/ca/getStatus
> Apr 12 13:50:34 ipa.domain.com systemd[1]: pki-tomcatd(a)pki-tomcat.servi=
ce:
> start-post operation timed out. Terminating.
> Apr 12 13:50:34 ipa.domain.com systemd[1]: pki-tomcatd(a)pki-tomcat.servi=
ce:
> Control process exited, code=3Dkilled, status=3D15/TERM
> Apr 12 13:50:34 ipa.domain.com systemd[1]: pki-tomcatd(a)pki-tomcat.servi=
ce:
> Failed with result 'timeout'.
> Apr 12 13:50:34 ipa.domain.com systemd[1]: Failed to start PKI Tomcat
> Server pki-tomcat.
> ```
>
> journalctl give other errors (filtered what seems relevant).
> ```
> Apr 12 13:49:05 ipa.domain.com server[17868]: WARNING: Problem with JAR
> file [/usr/share/pki/server/common/lib/commons-collections.jar], exists:
> [false], canRead: [false]
> Apr 12 13:49:07 ipa.domain.com java[17868]: usr/lib/api/apiutil.c Could
> not open /run/lock/opencryptoki/LCK..APIlock
>
The above error was a known issue in selinux, should have been fixed in
RHEL 8.5 (Bug 1894132
- SELinux prevents 2 programs from accessing
/run/lock/opencryptoki/LCK..APIlock).
What are your exact versions of ipa, pki and selinux-policy? On which OS is
your server running?
flo
Apr 12 13:49:18 ipa.domain.com server[17868]: SEVERE: Context [/acme]
> startup failed due to previous errors
>
> ```
>
>
> `/var/log/pki/pki-tomcat/pki/debug.2024-04-12.log`
> contains the following errors
> ```
> 2024-04-12 15:01:12 [main] SEVERE: Exception initializing random number
> generator using provider [Mozilla-JSS]
> java.security.NoSuchProviderException: no such provider: Mozilla-JSS
> at
> java.base/sun.security.jca.GetInstance.getService(GetInstance.java:83)
> at
> java.base/sun.security.jca.GetInstance.getInstance(GetInstance.java:206)
> ....
> ```
>
> `/var/log/pki/pki-tomcat/ca/debug.2024-04-12.log`
> contains the following type of errors
>
> ```
> 2024-04-12 00:17:37 [main] SEVERE: Unable to start CA engine: Property
> instanceRoot missing value
> Property instanceRoot missing value
> at
> com.netscape.cmscore.base.PropConfigStore.getString(PropConfigStore.java:=
297)
> at
> com.netscape.cmscore.apps.EngineConfig.getInstanceDir(EngineConfig.java:5=
5)
> at
> com.netscape.cmscore.apps.CMSEngine.loadConfig(CMSEngine.java:233)
> at com.netscape.cmscore.apps.CMSEngine.start(CMSEngine.java:1025)
> ....
>
> 2024-04-12 17:49:21 [main] SEVERE: Exception sending context initialized
> event to listener instance of class [org.dogtagpki.server.ca.CAEngine]
> java.lang.RuntimeException: Unable to start CA engine: Property
> instanceRoot missing value
> at
> com.netscape.cmscore.apps.CMSEngine.contextInitialized(CMSEngine.java:167=
2)
> at
> org.apache.catalina.core.StandardContext.listenerStart(StandardContext.ja=
va:4768)
> at
> org.apache.catalina.core.StandardContext.startInternal(StandardContext.ja=
va:5230)
> ```
>
> `getcert list` reports all entries except the caCACert as expired.
>
> I tried pretty much everything I could find on the internet (though most
> of the threads I found were never resolved).
> Tried ipa-cert-fix.
> Tried ipa-restoring a backup in a new container, same problem occurs.
>
> My guess is that an upgrade years back did break the certificate
> auto-renewal and went undetected, and now everything is expired it's
> failing.
>
> If you have any ideas of what to check/try I would be very grateful as I
> am losing my sanity here.
> Also, I am a bit scared of breaking what is currently working (ldap+sssd)
> and critical to our operations, so if anything can be tested on a copy of
> the data in a container that would be great.
>
> Thanks!
> --
> _______________________________________________
> FreeIPA-users mailing list -- freeipa-users(a)lists.fedorahosted.org
> To unsubscribe send an email to freeipa-users-leave(a)lists.fedorahosted.=
org
> Fedora Code of Conduct:
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives:
> https://lists.fedorahosted.org/archives/list/freeipa-users(a)lists.fedora=
hosted.org
> Do not reply to spam, report it:
> https://pagure.io/fedora-infrastructure/new_issue
>
--===============7741650297753641263==
Content-Type: text/html
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="attachment.html"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--===============7741650297753641263==--
From jdoe53851 at gmail.com Mon Apr 15 08:12:08 2024
Content-Type: multipart/mixed; boundary="===============2814612615412466363=="
MIME-Version: 1.0
From: John Doe
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: IPA Replica can't authenticate users
Date: Mon, 15 Apr 2024 10:10:29 +0200
Message-ID:
In-Reply-To: CAFDg7JwPdCwXiuZMZ_Tc97uNx5JqOuxp2k98c1c61-zcWxB4_g@mail.gmail.com
--===============2814612615412466363==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Den m=C3=A5n 15 apr. 2024 kl 09:35 skrev Florence Blanc-Renaud :
> Hi,
>
> On Mon, Apr 15, 2024 at 9:03=E2=80=AFAM John Doe via FreeIPA-users <
> freeipa-users(a)lists.fedorahosted.org> wrote:
>
>> I'm playing around with IPA trying to figure out how to set it up to be
>> redundant. The problem is that the IPA Replica isn't able to authenticate
>> AD users if IPA Master is down.
>> My setup;
>> One Windows Server set up with Active Direcory Domain Services, Active
>> Directory Certificate Services and DNS server hosting the ad.labnet.org
>> domain and the Root CA.
>>
>> Two Linux servers setup in the labnet.org domain. Both using the Windows
>> Server DNS server.
>> The first one is setup as a IPA Master server hosting the domain
>> ipa.labnet.org and act as a subordinate CA server. It was setup with the
>> following commands;
>> sudo ipa-server-install --external-ca --external-ca-type=3Dms-cs
>> sudo ipa-server-install --external-cert-file=3D/home/$USER/ipa.cer
>> --external-cert-file=3D/home/$USER/certnew.cer
>> kinit admin
>> sudo ipa-adtrust-install
>> sudo ipa trust-add --type=3Dad ad.labnet.org --admin Administrator
>> --password --two-way=3Dtrue
>>
>> The second one is setup as a IPA Replica also hosting the domain
>> ipa.labnet.org It has been setup with the following commands;
>> sudo ipa-client-install --mkhomedir
>> sudo ipa-replica-install
>> sudo ipa-ca-install
>> kinit admin
>> sudo ipa-adtrust-install
>> sudo ipa trust-add --type=3Dad ad.labnet.org --admin Administrator
>> --password --two-way=3Dtrue
>>
> The above command (ipa trust-add) probably exited on error as the trust
> was already established. Please read Trust controllers and Trust Agents
> to
> understand how the replica should be setup in order to be able to resolve
> AD users and groups. With your set of commands, both master and replica a=
re
> configured as AD Trust Controllers and should be able to resolve users and
> groups, but there is no need to run twice the trust-add part.
>
They both show up in IPA Admin GUI as being both Trust Controllers and
Trust Agents. I read that at least two trust controllers should be
configured per IdM deployment.
Thanks I will check the document again.
> All needed DNS records have been created in the DNS server on the Windows
>> server. At least I hope so.
>> IPA Healthceck on both IPA servers don't complain about anything missing.
>> sudo ipa-healthcheck --output-type human
>>
>> One IPA Client also setup in the labnet.org domain and using the Windows
>> server DNS, was setup with the following command;
>> sudo ipa-client-install --domain=3Dipa.labnet.org --mkhomedir
>>
>> Testing authentication on the IPA Client as a user in the ad.labnet.org
>> works out like this;
>> Both IPA Servers up works OK
>> Only IPA Master up works OK
>> Only IPA Replica up doesn't work.
>>
> Did you test authentication on the IPA replica?
> Is your master a DNS server for ipa.labnet.org? Is the replica a DNS
> server for ipa.labnet.org?
>
> I may have missed that, but just tried it out now. No I'm not able to
authenticate as an AD user on the IPA Replica :-(
No only the Windows DNS server is a DNS server, hosting all the domains
labnet.org, ad.labnet.org and ipa.labnet.org
Thanks!
flo
>
>>
>> After this check with IPA Healthcheck on the IPA Replica now comes back
>> with this;
>> WARNING: ipahealthcheck.ipa.trust.IPATrustCatalogCheck.{}: Look up of ID
>> {} for ad.labnet.org returned nothing
>> ERROR: ipahealthcheck.ipa.trust.IPATrustCatalogCheck.AD Global Catalog:
>> AD Global Catalog not found in /usr/sbin/sssctl 'domain-status' output:
>> Active servers:
>> IPA: lab003.labnet.org
>> ERROR: ipahealthcheck.ipa.trust.IPATrustCatalogCheck.AD Domain
>> Controller: AD Domain Controller not found in /usr/sbin/sssctl
>> 'domain-status' output: Active servers:
>> IPA: lab003.labnet.org
>>
>> Can anyone suggest what I have done wrong or missed? As far as I can tell
>> there are no commands that let me write to the GLobal Catalog?
>> Thanks!
>> --
>> _______________________________________________
>> FreeIPA-users mailing list -- freeipa-users(a)lists.fedorahosted.org
>> To unsubscribe send an email to
>> freeipa-users-leave(a)lists.fedorahosted.org
>> Fedora Code of Conduct:
>> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
>> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
>> List Archives:
>> https://lists.fedorahosted.org/archives/list/freeipa-users(a)lists.fedor=
ahosted.org
>> Do not reply to spam, report it:
>> https://pagure.io/fedora-infrastructure/new_issue
>>
>
--===============2814612615412466363==
Content-Type: text/html
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="attachment.html"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--===============2814612615412466363==--
From basile.pinsard at gmail.com Mon Apr 15 16:22:29 2024
Content-Type: multipart/mixed; boundary="===============8574104654190072512=="
MIME-Version: 1.0
From: Basile Pinsard
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: pki-tomcat won't start + expired certificates
Date: Mon, 15 Apr 2024 16:22:15 +0000
Message-ID: <20240415162215.18160.12528@mailman01.iad2.fedoraproject.org>
In-Reply-To: CAFDg7JzTM-ySshy+mE4s+_W0QPTz77EyciUfvaNs309=W1X7nw@mail.gmail.com
--===============8574104654190072512==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Bonjour Florence,
Thanks for your help.
I am using the docker image `freeipa/freeipa-server:fedora-34-4.9.6`, I gue=
ss the dependencies are correct as this is all bundled in the container, (t=
hough there might exists config mismatched if ipa upgrades failed container=
s updates).
Se-linux is disabled on host and in the container.
I made progress by fixing the missing instanceRoot parameter in the config =
file. =
Now I think I am stuck in a deadlock, because of letsencrypt certificates u=
sed for httpd/ldap (installed with ipa-cacert-manage) .
The certificated managed by freeipa is expired, but the letsencrypt one hav=
e renewed and there is no overlap of their period of validity.
- If I set back the date to when the freeipa certs are valid, pki connectio=
n to the ldap fails, as the letsencrypt one is not yet valid.
error is `SEVERE: Unable to create socket: org.mozilla.jss.ssl.SSLSocketExc=
eption: org.mozilla.jss.ssl.SSLSocketException: SSL_ForceHandshake failed: =
(-8181) Peer's Certificate has expired.` I think the message says expired =
for not-yet-valid certs too. =
- If I use the current time, it is not possible to start the pki-server as =
the certs are expired. ( at least that's my guess, error is :`netscape.ldap=
.LDAPException: Authentication failed (48)` not much more details)
I was thinking about trying to:
- set the date to when the freeipa managed certs were still valid.
- manually generate a certificate/key from the CA (not sure how exactly, th=
ough)
- copy these certificate and key in the httpd and ldap config folder at the=
right place.
- try to spin-up the pki-tomcat, hoping that it works.
- then hope that it auto-renews certs or manually trigger the renewal.
- move the date back to today, maybe by increments that cover the certs val=
idity, and trigger certs renewal at each increment.
Would that make sense?
Do you see any more sensible/simpler way?
Many thanks!
Basile
--===============8574104654190072512==--
From net.ricky at gmail.com Tue Apr 16 13:48:26 2024
Content-Type: multipart/mixed; boundary="===============6111009032924763760=="
MIME-Version: 1.0
From: Riccardo Rotondo
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: How to prevent non-admin users of FreeIPA from
reading the list of users in the web interface?
Date: Tue, 16 Apr 2024 13:48:14 +0000
Message-ID: <20240416134814.5138.7345@mailman01.iad2.fedoraproject.org>
In-Reply-To: Zg6QdAsDNTiAa9p2@redhat.com
--===============6111009032924763760==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Hi Christian and Alexander, =
considering I'm still in the initial phase of the project I customised the =
Dockerfile to install the needed package. =
For those interested here is the fork with the branch: =
https://github.com/rrotondo/freeipa-container/tree/add-ipa-fas
with a custom version for Almalinux-9.
Thank you again for your support.
Regards,
Riccardo
--===============6111009032924763760==--
From menshutin at gmail.com Tue Apr 16 16:01:09 2024
Content-Type: multipart/mixed; boundary="===============3993257438262000988=="
MIME-Version: 1.0
From: Anton Menshutin
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] windows client auth not working
Date: Tue, 16 Apr 2024 16:00:57 +0000
Message-ID: <20240416160057.1173.31199@mailman01.iad2.fedoraproject.org>
--===============3993257438262000988==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Hello, list.
I have installed freeipa server 4.10.2-8 under RockyLinux and would like to=
setup windows clients to join freeipa domain.
I followed the guide https://www.freeipa.org/page/Windows_authentication_ag=
ainst_FreeIPA.
When I enter user credentials for the first time windows asks to change pas=
sword, after password is changed it does not login.
After that every attempt results in the "wrong user or password" message. =
Looking at kerberos log it seems that password is correct but windows does =
not let the user in for some reason. In audit log it says that login was re=
fused with some error that does not explain anything.
Time is in sync as well as timezone.
There are a lot of posts saying that this should work but I don't have any =
clues where to look. Any ideas what might be wrong?
--===============3993257438262000988==--
From abokovoy at redhat.com Tue Apr 16 16:28:07 2024
Content-Type: multipart/mixed; boundary="===============8167443972786235411=="
MIME-Version: 1.0
From: Alexander Bokovoy
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: windows client auth not working
Date: Tue, 16 Apr 2024 19:27:17 +0300
Message-ID:
In-Reply-To: 20240416160057.1173.31199@mailman01.iad2.fedoraproject.org
--===============8167443972786235411==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
On =D0=90=D1=9E=D1=82, 16 =D0=BA=D1=80=D0=B0 2024, Anton Menshutin via Free=
IPA-users wrote:
>Hello, list.
>I have installed freeipa server 4.10.2-8 under RockyLinux and would
>like to setup windows clients to join freeipa domain. I followed the
>guide
>https://www.freeipa.org/page/Windows_authentication_against_FreeIPA.
This is a hack and is not supported at all. It is explicitly stated on
that page:
--------------------------------------------
Note also that the described configuration is not supported by FreeIPA
development team and also is not supported by Red Hat Enterprise Linux
Identity Management product. A work on making possible to login to
Windows machines already enrolled into a trusted Active Directory forest
is ongoing and is not available yet in any released FreeIPA version.
--------------------------------------------
>When I enter user credentials for the first time windows asks to change
>password, after password is changed it does not login.
>
>After that every attempt results in the "wrong user or password"
>message. Looking at kerberos log it seems that password is correct but
>windows does not let the user in for some reason. In audit log it says
>that login was refused with some error that does not explain anything.
>Time is in sync as well as timezone.
>
>There are a lot of posts saying that this should work but I don't have
>any clues where to look. Any ideas what might be wrong?
Joining Windows clients to IPA domain is not supported. These
configurations may or may not work for some people. There are no plans
to enable this use case at all.
-- =
/ Alexander Bokovoy
Sr. Principal Software Engineer
Security / Identity Management Engineering
Red Hat Limited, Finland
--===============8167443972786235411==--
From slekkus75 at proton.me Thu Apr 18 15:05:04 2024
Content-Type: multipart/mixed; boundary="===============5436425095021542620=="
MIME-Version: 1.0
From: slek kus
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] sudo hbac rule resfues to work for AD users (one way
trust).
Date: Thu, 18 Apr 2024 15:04:52 +0000
Message-ID: <20240418150452.26037.4245@mailman01.iad2.fedoraproject.org>
--===============5436425095021542620==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Hi, I posted a similair issue a while ago. then sudo rules magically starte=
d working after enabling and disabeling the "allow_all" rule.
This time, I cannot get any sudo command working, while a hbac testing is O=
K. I can even see in the log of the client that "allow_all" permits the sud=
o-i.
Issue is on all clients. There is no poblem with ssh/login for the AD users.
```
[admin(a)idm1 ~]$ ipa hbactest --user user1(a)INFRA.REDACTED.SERVICES --hos=
t host01.redacted.services --service sudo-i
--------------------
Access granted: True
--------------------
Matched rules: allow_all
Matched rules: infra-mgmt_clients_hg
< ... >
```
```
user1(a)INFRA.REDACTED.SERVICES@host01:~$ sudo -i
[sudo] password for user1(a)INFRA.REDACTED.SERVICES:
user1(a)INFRA.REDACTED.SERVICES is not allowed to run sudo on host01.
```
Enabling debugging:
sssd_domain.log
https://pastebin.com/mFGUEnse
sssd_sudo.log
https://pastebin.com/3d3ETTNh
Also enabled debug in /etc/sudo.conf. =
In this debug data there is no mention or trace about sss or the user. =
Configuration files seem OK. sssd.conf, krb5.conf, nssswithc.conf. =
--===============5436425095021542620==--
From flo at redhat.com Fri Apr 19 08:12:29 2024
Content-Type: multipart/mixed; boundary="===============0412814332714450940=="
MIME-Version: 1.0
From: Florence Blanc-Renaud
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: pki-tomcat won't start + expired certificates
Date: Fri, 19 Apr 2024 10:11:51 +0200
Message-ID:
In-Reply-To: 20240415162215.18160.12528@mailman01.iad2.fedoraproject.org
--===============0412814332714450940==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Hi,
On Mon, Apr 15, 2024 at 6:22=E2=80=AFPM Basile Pinsard via FreeIPA-users <
freeipa-users(a)lists.fedorahosted.org> wrote:
> Bonjour Florence,
> Thanks for your help.
>
> I am using the docker image `freeipa/freeipa-server:fedora-34-4.9.6`, I
> guess the dependencies are correct as this is all bundled in the containe=
r,
> (though there might exists config mismatched if ipa upgrades failed
> containers updates).
> Se-linux is disabled on host and in the container.
>
> I made progress by fixing the missing instanceRoot parameter in the config
> file.
>
> Now I think I am stuck in a deadlock, because of letsencrypt certificates
> used for httpd/ldap (installed with ipa-cacert-manage) .
>
> The certificated managed by freeipa is expired, but the letsencrypt one
> have renewed and there is no overlap of their period of validity.
>
> - If I set back the date to when the freeipa certs are valid, pki
> connection to the ldap fails, as the letsencrypt one is not yet valid.
> error is `SEVERE: Unable to create socket:
> org.mozilla.jss.ssl.SSLSocketException:
> org.mozilla.jss.ssl.SSLSocketException: SSL_ForceHandshake failed: (-8181)
> Peer's Certificate has expired.` I think the message says expired for
> not-yet-valid certs too.
>
> - If I use the current time, it is not possible to start the pki-server as
> the certs are expired. ( at least that's my guess, error is
> :`netscape.ldap.LDAPException: Authentication failed (48)` not much more
> details)
>
> I was thinking about trying to:
> - set the date to when the freeipa managed certs were still valid.
> - manually generate a certificate/key from the CA (not sure how exactly,
> though)
> - copy these certificate and key in the httpd and ldap config folder at
> the right place.
>
If you have a backup of the previous http/ldap certs you can put them back
in place.
> - try to spin-up the pki-tomcat, hoping that it works.
> - then hope that it auto-renews certs or manually trigger the renewal.
> - move the date back to today, maybe by increments that cover the certs
> validity, and trigger certs renewal at each increment.
>
> Would that make sense?
> Do you see any more sensible/simpler way?
>
> You mentioned that you already tried ipa-cert-fix, what was the output?
flo
Many thanks!
>
> Basile
> --
> _______________________________________________
> FreeIPA-users mailing list -- freeipa-users(a)lists.fedorahosted.org
> To unsubscribe send an email to freeipa-users-leave(a)lists.fedorahosted.=
org
> Fedora Code of Conduct:
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives:
> https://lists.fedorahosted.org/archives/list/freeipa-users(a)lists.fedora=
hosted.org
> Do not reply to spam, report it:
> https://pagure.io/fedora-infrastructure/new_issue
>
--===============0412814332714450940==
Content-Type: text/html
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="attachment.html"
PGRpdiBkaXI9Imx0ciI+PGRpdiBkaXI9Imx0ciI+PGRpdiBjbGFzcz0iZ21haWxfZGVmYXVsdCIg
c3R5bGU9ImZvbnQtZmFtaWx5OmFyaWFsLHNhbnMtc2VyaWYiPkhpLDwvZGl2PjwvZGl2Pjxicj48
ZGl2IGNsYXNzPSJnbWFpbF9xdW90ZSI+PGRpdiBkaXI9Imx0ciIgY2xhc3M9ImdtYWlsX2F0dHIi
Pk9uIE1vbiwgQXByIDE1LCAyMDI0IGF0IDY6MjLigK9QTSBCYXNpbGUgUGluc2FyZCB2aWEgRnJl
ZUlQQS11c2VycyAmbHQ7PGEgaHJlZj0ibWFpbHRvOmZyZWVpcGEtdXNlcnNAbGlzdHMuZmVkb3Jh
aG9zdGVkLm9yZyI+ZnJlZWlwYS11c2Vyc0BsaXN0cy5mZWRvcmFob3N0ZWQub3JnPC9hPiZndDsg
d3JvdGU6PGJyPjwvZGl2PjxibG9ja3F1b3RlIGNsYXNzPSJnbWFpbF9xdW90ZSIgc3R5bGU9Im1h
cmdpbjowcHggMHB4IDBweCAwLjhleDtib3JkZXItbGVmdDoxcHggc29saWQgcmdiKDIwNCwyMDQs
MjA0KTtwYWRkaW5nLWxlZnQ6MWV4Ij5Cb25qb3VyIEZsb3JlbmNlLDxicj4KVGhhbmtzIGZvciB5
b3VyIGhlbHAuPGJyPgo8YnI+CkkgYW0gdXNpbmcgdGhlIGRvY2tlciBpbWFnZSBgZnJlZWlwYS9m
cmVlaXBhLXNlcnZlcjpmZWRvcmEtMzQtNC45LjZgLCBJIGd1ZXNzIHRoZSBkZXBlbmRlbmNpZXMg
YXJlIGNvcnJlY3QgYXMgdGhpcyBpcyBhbGwgYnVuZGxlZCBpbiB0aGUgY29udGFpbmVyLCAodGhv
dWdoIHRoZXJlIG1pZ2h0IGV4aXN0cyBjb25maWcgbWlzbWF0Y2hlZCBpZiBpcGEgdXBncmFkZXMg
ZmFpbGVkIGNvbnRhaW5lcnMgdXBkYXRlcykuPGJyPgpTZS1saW51eCBpcyBkaXNhYmxlZCBvbiBo
b3N0IGFuZCBpbiB0aGUgY29udGFpbmVyLjxicj4KPGJyPgpJIG1hZGUgcHJvZ3Jlc3MgYnkgZml4
aW5nIHRoZSBtaXNzaW5nIGluc3RhbmNlUm9vdCBwYXJhbWV0ZXIgaW4gdGhlIGNvbmZpZyBmaWxl
LiA8YnI+Cjxicj4KTm93IEkgdGhpbmsgSSBhbSBzdHVjayBpbiBhIGRlYWRsb2NrLCBiZWNhdXNl
IG9mIGxldHNlbmNyeXB0IGNlcnRpZmljYXRlcyB1c2VkIGZvciBodHRwZC9sZGFwIChpbnN0YWxs
ZWQgd2l0aCBpcGEtY2FjZXJ0LW1hbmFnZSkgLjxicj4KPGJyPgpUaGUgY2VydGlmaWNhdGVkIG1h
bmFnZWQgYnkgZnJlZWlwYSBpcyBleHBpcmVkLCBidXQgdGhlIGxldHNlbmNyeXB0IG9uZSBoYXZl
IHJlbmV3ZWQgYW5kIHRoZXJlIGlzIG5vIG92ZXJsYXAgb2YgdGhlaXIgcGVyaW9kIG9mIHZhbGlk
aXR5Ljxicj4KPGJyPgotIElmIEkgc2V0IGJhY2sgdGhlIGRhdGUgdG8gd2hlbiB0aGUgZnJlZWlw
YSBjZXJ0cyBhcmUgdmFsaWQsIHBraSBjb25uZWN0aW9uIHRvIHRoZSBsZGFwIGZhaWxzLCBhcyB0
aGUgbGV0c2VuY3J5cHQgb25lIGlzIG5vdCB5ZXQgdmFsaWQuPGJyPgplcnJvciBpcyBgU0VWRVJF
OiBVbmFibGUgdG8gY3JlYXRlIHNvY2tldDogb3JnLm1vemlsbGEuanNzLnNzbC5TU0xTb2NrZXRF
eGNlcHRpb246IG9yZy5tb3ppbGxhLmpzcy5zc2wuU1NMU29ja2V0RXhjZXB0aW9uOiBTU0xfRm9y
Y2VIYW5kc2hha2UgZmFpbGVkOiAoLTgxODEpIFBlZXImIzM5O3MgQ2VydGlmaWNhdGUgaGFzIGV4
cGlyZWQuYMKgIEkgdGhpbmsgdGhlIG1lc3NhZ2Ugc2F5cyBleHBpcmVkIGZvciBub3QteWV0LXZh
bGlkIGNlcnRzIHRvby7CoCA8YnI+Cjxicj4KLSBJZiBJIHVzZSB0aGUgY3VycmVudCB0aW1lLCBp
dCBpcyBub3QgcG9zc2libGUgdG8gc3RhcnQgdGhlIHBraS1zZXJ2ZXIgYXMgdGhlIGNlcnRzIGFy
ZSBleHBpcmVkLiAoIGF0IGxlYXN0IHRoYXQmIzM5O3MgbXkgZ3Vlc3MsIGVycm9yIGlzIDpgbmV0
c2NhcGUubGRhcC5MREFQRXhjZXB0aW9uOiBBdXRoZW50aWNhdGlvbiBmYWlsZWQgKDQ4KWAgbm90
IG11Y2ggbW9yZSBkZXRhaWxzKTxicj4KPGJyPgpJIHdhcyB0aGlua2luZyBhYm91dCB0cnlpbmcg
dG86PGJyPgotIHNldCB0aGUgZGF0ZSB0byB3aGVuIHRoZSBmcmVlaXBhIG1hbmFnZWQgY2VydHMg
d2VyZSBzdGlsbCB2YWxpZC48YnI+Ci0gbWFudWFsbHkgZ2VuZXJhdGUgYSBjZXJ0aWZpY2F0ZS9r
ZXkgZnJvbSB0aGUgQ0EgKG5vdCBzdXJlIGhvdyBleGFjdGx5LCB0aG91Z2gpPGJyPgotIGNvcHkg
dGhlc2UgY2VydGlmaWNhdGUgYW5kIGtleSBpbiB0aGUgaHR0cGQgYW5kIGxkYXAgY29uZmlnIGZv
bGRlciBhdCB0aGUgcmlnaHQgcGxhY2UuPGJyPjwvYmxvY2txdW90ZT48ZGl2PjxzcGFuIGNsYXNz
PSJnbWFpbF9kZWZhdWx0IiBzdHlsZT0iZm9udC1mYW1pbHk6YXJpYWwsc2Fucy1zZXJpZiI+SWYg
eW91IGhhdmUgYSBiYWNrdXAgb2YgdGhlIHByZXZpb3VzIGh0dHAvbGRhcCBjZXJ0cyB5b3UgY2Fu
IHB1dCB0aGVtIGJhY2sgaW4gcGxhY2UuPC9zcGFuPsKgPC9kaXY+PGJsb2NrcXVvdGUgY2xhc3M9
ImdtYWlsX3F1b3RlIiBzdHlsZT0ibWFyZ2luOjBweCAwcHggMHB4IDAuOGV4O2JvcmRlci1sZWZ0
OjFweCBzb2xpZCByZ2IoMjA0LDIwNCwyMDQpO3BhZGRpbmctbGVmdDoxZXgiPgotIHRyeSB0byBz
cGluLXVwIHRoZSBwa2ktdG9tY2F0LCBob3BpbmcgdGhhdCBpdCB3b3Jrcy48YnI+Ci0gdGhlbiBo
b3BlIHRoYXQgaXQgYXV0by1yZW5ld3MgY2VydHMgb3IgbWFudWFsbHkgdHJpZ2dlciB0aGUgcmVu
ZXdhbC48YnI+Ci0gbW92ZSB0aGUgZGF0ZSBiYWNrIHRvIHRvZGF5LCBtYXliZSBieSBpbmNyZW1l
bnRzIHRoYXQgY292ZXIgdGhlIGNlcnRzIHZhbGlkaXR5LCBhbmQgdHJpZ2dlciBjZXJ0cyByZW5l
d2FsIGF0IGVhY2ggaW5jcmVtZW50Ljxicj4KPGJyPgpXb3VsZCB0aGF0IG1ha2Ugc2Vuc2U/PGJy
PgpEbyB5b3Ugc2VlIGFueSBtb3JlIHNlbnNpYmxlL3NpbXBsZXIgd2F5Pzxicj4KPGJyPjwvYmxv
Y2txdW90ZT48ZGl2PjxzcGFuIGNsYXNzPSJnbWFpbF9kZWZhdWx0IiBzdHlsZT0iZm9udC1mYW1p
bHk6YXJpYWwsc2Fucy1zZXJpZiI+WW91IG1lbnRpb25lZCB0aGF0IHlvdSBhbHJlYWR5IHRyaWVk
IGlwYS1jZXJ0LWZpeCwgd2hhdCB3YXMgdGhlIG91dHB1dD/CoDwvc3Bhbj48L2Rpdj48ZGl2IGNs
YXNzPSJnbWFpbF9kZWZhdWx0IiBzdHlsZT0iZm9udC1mYW1pbHk6YXJpYWwsc2Fucy1zZXJpZiI+
ZmxvPC9kaXY+PGRpdiBjbGFzcz0iZ21haWxfZGVmYXVsdCIgc3R5bGU9ImZvbnQtZmFtaWx5OmFy
aWFsLHNhbnMtc2VyaWYiPjxicj48L2Rpdj48YmxvY2txdW90ZSBjbGFzcz0iZ21haWxfcXVvdGUi
IHN0eWxlPSJtYXJnaW46MHB4IDBweCAwcHggMC44ZXg7Ym9yZGVyLWxlZnQ6MXB4IHNvbGlkIHJn
YigyMDQsMjA0LDIwNCk7cGFkZGluZy1sZWZ0OjFleCI+Ck1hbnkgdGhhbmtzITxicj4KPGJyPgpC
YXNpbGU8YnI+Ci0tPGJyPgpfX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fX19fXzxicj4KRnJlZUlQQS11c2VycyBtYWlsaW5nIGxpc3QgLS0gPGEgaHJlZj0ibWFpbHRv
OmZyZWVpcGEtdXNlcnNAbGlzdHMuZmVkb3JhaG9zdGVkLm9yZyIgdGFyZ2V0PSJfYmxhbmsiPmZy
ZWVpcGEtdXNlcnNAbGlzdHMuZmVkb3JhaG9zdGVkLm9yZzwvYT48YnI+ClRvIHVuc3Vic2NyaWJl
IHNlbmQgYW4gZW1haWwgdG8gPGEgaHJlZj0ibWFpbHRvOmZyZWVpcGEtdXNlcnMtbGVhdmVAbGlz
dHMuZmVkb3JhaG9zdGVkLm9yZyIgdGFyZ2V0PSJfYmxhbmsiPmZyZWVpcGEtdXNlcnMtbGVhdmVA
bGlzdHMuZmVkb3JhaG9zdGVkLm9yZzwvYT48YnI+CkZlZG9yYSBDb2RlIG9mIENvbmR1Y3Q6IDxh
IGhyZWY9Imh0dHBzOi8vZG9jcy5mZWRvcmFwcm9qZWN0Lm9yZy9lbi1VUy9wcm9qZWN0L2NvZGUt
b2YtY29uZHVjdC8iIHJlbD0ibm9yZWZlcnJlciIgdGFyZ2V0PSJfYmxhbmsiPmh0dHBzOi8vZG9j
cy5mZWRvcmFwcm9qZWN0Lm9yZy9lbi1VUy9wcm9qZWN0L2NvZGUtb2YtY29uZHVjdC88L2E+PGJy
PgpMaXN0IEd1aWRlbGluZXM6IDxhIGhyZWY9Imh0dHBzOi8vZmVkb3JhcHJvamVjdC5vcmcvd2lr
aS9NYWlsaW5nX2xpc3RfZ3VpZGVsaW5lcyIgcmVsPSJub3JlZmVycmVyIiB0YXJnZXQ9Il9ibGFu
ayI+aHR0cHM6Ly9mZWRvcmFwcm9qZWN0Lm9yZy93aWtpL01haWxpbmdfbGlzdF9ndWlkZWxpbmVz
PC9hPjxicj4KTGlzdCBBcmNoaXZlczogPGEgaHJlZj0iaHR0cHM6Ly9saXN0cy5mZWRvcmFob3N0
ZWQub3JnL2FyY2hpdmVzL2xpc3QvZnJlZWlwYS11c2Vyc0BsaXN0cy5mZWRvcmFob3N0ZWQub3Jn
IiByZWw9Im5vcmVmZXJyZXIiIHRhcmdldD0iX2JsYW5rIj5odHRwczovL2xpc3RzLmZlZG9yYWhv
c3RlZC5vcmcvYXJjaGl2ZXMvbGlzdC9mcmVlaXBhLXVzZXJzQGxpc3RzLmZlZG9yYWhvc3RlZC5v
cmc8L2E+PGJyPgpEbyBub3QgcmVwbHkgdG8gc3BhbSwgcmVwb3J0IGl0OiA8YSBocmVmPSJodHRw
czovL3BhZ3VyZS5pby9mZWRvcmEtaW5mcmFzdHJ1Y3R1cmUvbmV3X2lzc3VlIiByZWw9Im5vcmVm
ZXJyZXIiIHRhcmdldD0iX2JsYW5rIj5odHRwczovL3BhZ3VyZS5pby9mZWRvcmEtaW5mcmFzdHJ1
Y3R1cmUvbmV3X2lzc3VlPC9hPjxicj4KPC9ibG9ja3F1b3RlPjwvZGl2PjwvZGl2Pgo=
--===============0412814332714450940==--
From slekkus75 at proton.me Fri Apr 19 08:16:24 2024
Content-Type: multipart/mixed; boundary="===============6751520807382460032=="
MIME-Version: 1.0
From: slek kus
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: sudo hbac rule resfues to work for AD users (one
way trust).
Date: Fri, 19 Apr 2024 08:16:08 +0000
Message-ID: <20240419081608.3327.83666@mailman01.iad2.fedoraproject.org>
In-Reply-To: 20240418150452.26037.4245@mailman01.iad2.fedoraproject.org
--===============6751520807382460032==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Issue might have started after enabling compat mode to allow LDAP authentic=
ation for AD users.
Found this: https://microdevsys.com/wp/user-is-not-allowed-to-run-sudo-on-s=
erver-this-incident-will-be-reported/
Went to disable the plugin, but greeted for the directory manager's passwor=
d. I do not recall to have set this during FreeIPA installation.
--===============6751520807382460032==--
From flo at redhat.com Fri Apr 19 08:26:22 2024
Content-Type: multipart/mixed; boundary="===============6799959363220103788=="
MIME-Version: 1.0
From: Florence Blanc-Renaud
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: IPA Replica can't authenticate users
Date: Fri, 19 Apr 2024 10:25:42 +0200
Message-ID:
In-Reply-To: CAAzbKPmGFELVDM0nLUV_yCgAB-vs-zBhVC0LtnwssaRWJaFUhA@mail.gmail.com
--===============6799959363220103788==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Hi,
On Mon, Apr 15, 2024 at 10:10=E2=80=AFAM John Doe w=
rote:
>
>
> Den m=C3=A5n 15 apr. 2024 kl 09:35 skrev Florence Blanc-Renaud >:
>
>> Hi,
>>
>> On Mon, Apr 15, 2024 at 9:03=E2=80=AFAM John Doe via FreeIPA-users <
>> freeipa-users(a)lists.fedorahosted.org> wrote:
>>
>>> I'm playing around with IPA trying to figure out how to set it up to be
>>> redundant. The problem is that the IPA Replica isn't able to authentica=
te
>>> AD users if IPA Master is down.
>>> My setup;
>>> One Windows Server set up with Active Direcory Domain Services, Active
>>> Directory Certificate Services and DNS server hosting the ad.labnet.org
>>> domain and the Root CA.
>>>
>>> Two Linux servers setup in the labnet.org domain. Both using the
>>> Windows Server DNS server.
>>> The first one is setup as a IPA Master server hosting the domain
>>> ipa.labnet.org and act as a subordinate CA server. It was setup with
>>> the following commands;
>>> sudo ipa-server-install --external-ca --external-ca-type=3Dms-cs
>>> sudo ipa-server-install --external-cert-file=3D/home/$USER/ipa.cer
>>> --external-cert-file=3D/home/$USER/certnew.cer
>>> kinit admin
>>> sudo ipa-adtrust-install
>>> sudo ipa trust-add --type=3Dad ad.labnet.org --admin Administrator
>>> --password --two-way=3Dtrue
>>>
>>> The second one is setup as a IPA Replica also hosting the domain
>>> ipa.labnet.org It has been setup with the following commands;
>>> sudo ipa-client-install --mkhomedir
>>> sudo ipa-replica-install
>>> sudo ipa-ca-install
>>> kinit admin
>>> sudo ipa-adtrust-install
>>> sudo ipa trust-add --type=3Dad ad.labnet.org --admin Administrator
>>> --password --two-way=3Dtrue
>>>
>> The above command (ipa trust-add) probably exited on error as the trust
>> was already established. Please read Trust controllers and Trust Agents
>> to
>> understand how the replica should be setup in order to be able to resolve
>> AD users and groups. With your set of commands, both master and replica =
are
>> configured as AD Trust Controllers and should be able to resolve users a=
nd
>> groups, but there is no need to run twice the trust-add part.
>>
>
> They both show up in IPA Admin GUI as being both Trust Controllers and
> Trust Agents. I read that at least two trust controllers should be
> configured per IdM deployment.
> Thanks I will check the document again.
>
>
>> All needed DNS records have been created in the DNS server on the Windows
>>> server. At least I hope so.
>>> IPA Healthceck on both IPA servers don't complain about anything missin=
g.
>>> sudo ipa-healthcheck --output-type human
>>>
>>> One IPA Client also setup in the labnet.org domain and using the
>>> Windows server DNS, was setup with the following command;
>>> sudo ipa-client-install --domain=3Dipa.labnet.org --mkhomedir
>>>
>>> Testing authentication on the IPA Client as a user in the ad.labnet.org
>>> works out like this;
>>> Both IPA Servers up works OK
>>> Only IPA Master up works OK
>>> Only IPA Replica up doesn't work.
>>>
>> Did you test authentication on the IPA replica?
>> Is your master a DNS server for ipa.labnet.org Is the replica a DNS
>> server for ipa.labnet.org
>>
>> I may have missed that, but just tried it out now. No I'm not able to
> authenticate as an AD user on the IPA Replica :-(
>
You can enable debug level in the replica: add debug_level=3D9 in all the
sections in /etc/sssd/sssd.conf, restart sssd with systemctl restart sssd
and clean the cache. Then retry authentication of an AD user on the replica
and gather the logs from /var/log/sssd/*. We may be able to help with the
logs. Do not forget to remove the debug_level when you're done.
If authentication works on the master but not on the replica, it is often
related to DNS or firewall issues between the trust controller and the AD
domain controller.
You can refer to
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/ht=
ml/planning_identity_management/planning-a-cross-forest-trust-between-idm-a=
nd-ad_planning-identity-management#guidelines-for-setting-up-dns-for-an-idm=
-ad-trust_planning-a-cross-forest-trust-between-idm-and-ad
and
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/ht=
ml/installing_trust_between_idm_and_ad/configuring-dns-and-realm-settings-f=
or-a-trust_installing-trust-between-idm-and-ad#doc-wrapper
flo
No only the Windows DNS server is a DNS server, hosting all the domains
> labnet.org, ad.labnet.org and ipa.labnet.org
>
> Thanks!
>
> flo
>>
>>>
>>> After this check with IPA Healthcheck on the IPA Replica now comes back
>>> with this;
>>> WARNING: ipahealthcheck.ipa.trust.IPATrustCatalogCheck.{}: Look up of ID
>>> {} for ad.labnet.org returned nothing
>>> ERROR: ipahealthcheck.ipa.trust.IPATrustCatalogCheck.AD Global Catalog:
>>> AD Global Catalog not found in /usr/sbin/sssctl 'domain-status' output:
>>> Active servers:
>>> IPA: lab003.labnet.org
>>> ERROR: ipahealthcheck.ipa.trust.IPATrustCatalogCheck.AD Domain
>>> Controller: AD Domain Controller not found in /usr/sbin/sssctl
>>> 'domain-status' output: Active servers:
>>> IPA: lab003.labnet.org
>>>
>>> Can anyone suggest what I have done wrong or missed? As far as I can
>>> tell there are no commands that let me write to the GLobal Catalog?
>>> Thanks!
>>> --
>>> _______________________________________________
>>> FreeIPA-users mailing list -- freeipa-users(a)lists.fedorahosted.org
>>> To unsubscribe send an email to
>>> freeipa-users-leave(a)lists.fedorahosted.org
>>> Fedora Code of Conduct:
>>> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
>>> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
>>> List Archives:
>>> https://lists.fedorahosted.org/archives/list/freeipa-users(a)lists.fedo=
rahosted.org
>>> Do not reply to spam, report it:
>>> https://pagure.io/fedora-infrastructure/new_issue
>>>
>>
--===============6799959363220103788==
Content-Type: text/html
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="attachment.html"
PGRpdiBkaXI9Imx0ciI+PGRpdiBkaXI9Imx0ciI+PGRpdiBjbGFzcz0iZ21haWxfZGVmYXVsdCIg
c3R5bGU9ImZvbnQtZmFtaWx5OmFyaWFsLHNhbnMtc2VyaWYiPkhpLDwvZGl2PjwvZGl2Pjxicj48
ZGl2IGNsYXNzPSJnbWFpbF9xdW90ZSI+PGRpdiBkaXI9Imx0ciIgY2xhc3M9ImdtYWlsX2F0dHIi
Pk9uIE1vbiwgQXByIDE1LCAyMDI0IGF0IDEwOjEw4oCvQU0gSm9obiBEb2UgJmx0OzxhIGhyZWY9
Im1haWx0bzpqZG9lNTM4NTFAZ21haWwuY29tIj5qZG9lNTM4NTFAZ21haWwuY29tPC9hPiZndDsg
d3JvdGU6PGJyPjwvZGl2PjxibG9ja3F1b3RlIGNsYXNzPSJnbWFpbF9xdW90ZSIgc3R5bGU9Im1h
cmdpbjowcHggMHB4IDBweCAwLjhleDtib3JkZXItbGVmdDoxcHggc29saWQgcmdiKDIwNCwyMDQs
MjA0KTtwYWRkaW5nLWxlZnQ6MWV4Ij48ZGl2IGRpcj0ibHRyIj48ZGl2IGRpcj0ibHRyIj48YnI+
PC9kaXY+PGJyPjxkaXYgY2xhc3M9ImdtYWlsX3F1b3RlIj48ZGl2IGRpcj0ibHRyIiBjbGFzcz0i
Z21haWxfYXR0ciI+RGVuIG3DpW4gMTUgYXByLiAyMDI0IGtsIDA5OjM1IHNrcmV2IEZsb3JlbmNl
IEJsYW5jLVJlbmF1ZCAmbHQ7PGEgaHJlZj0ibWFpbHRvOmZsb0ByZWRoYXQuY29tIiB0YXJnZXQ9
Il9ibGFuayI+ZmxvQHJlZGhhdC5jb208L2E+Jmd0Ozo8YnI+PC9kaXY+PGJsb2NrcXVvdGUgY2xh
c3M9ImdtYWlsX3F1b3RlIiBzdHlsZT0ibWFyZ2luOjBweCAwcHggMHB4IDAuOGV4O2JvcmRlci1s
ZWZ0OjFweCBzb2xpZCByZ2IoMjA0LDIwNCwyMDQpO3BhZGRpbmctbGVmdDoxZXgiPjxkaXYgZGly
PSJsdHIiPjxkaXYgZGlyPSJsdHIiPjxkaXYgc3R5bGU9ImZvbnQtZmFtaWx5OmFyaWFsLHNhbnMt
c2VyaWYiPkhpLDwvZGl2PjwvZGl2Pjxicj48ZGl2IGNsYXNzPSJnbWFpbF9xdW90ZSI+PGRpdiBk
aXI9Imx0ciIgY2xhc3M9ImdtYWlsX2F0dHIiPk9uIE1vbiwgQXByIDE1LCAyMDI0IGF0IDk6MDPi
gK9BTSBKb2huIERvZSB2aWEgRnJlZUlQQS11c2VycyAmbHQ7PGEgaHJlZj0ibWFpbHRvOmZyZWVp
cGEtdXNlcnNAbGlzdHMuZmVkb3JhaG9zdGVkLm9yZyIgdGFyZ2V0PSJfYmxhbmsiPmZyZWVpcGEt
dXNlcnNAbGlzdHMuZmVkb3JhaG9zdGVkLm9yZzwvYT4mZ3Q7IHdyb3RlOjxicj48L2Rpdj48Ymxv
Y2txdW90ZSBjbGFzcz0iZ21haWxfcXVvdGUiIHN0eWxlPSJtYXJnaW46MHB4IDBweCAwcHggMC44
ZXg7Ym9yZGVyLWxlZnQ6MXB4IHNvbGlkIHJnYigyMDQsMjA0LDIwNCk7cGFkZGluZy1sZWZ0OjFl
eCI+PGRpdiBkaXI9Imx0ciI+SSYjMzk7bSBwbGF5aW5nIGFyb3VuZCB3aXRoIElQQSB0cnlpbmcg
dG8gZmlndXJlIG91dCBob3cgdG8gc2V0IGl0IHVwIHRvIGJlIHJlZHVuZGFudC4gVGhlIHByb2Js
ZW0gaXMgdGhhdCB0aGUgSVBBIFJlcGxpY2EgaXNuJiMzOTt0IGFibGUgdG8gYXV0aGVudGljYXRl
IEFEIHVzZXJzIGlmIElQQSBNYXN0ZXIgaXMgZG93bi48YnI+TXkgc2V0dXA7PGRpdj5PbmUgV2lu
ZG93cyBTZXJ2ZXIgc2V0IHVwIHdpdGggQWN0aXZlIERpcmVjb3J5wqBEb21haW4gU2VydmljZXMs
IEFjdGl2ZSBEaXJlY3RvcnkgQ2VydGlmaWNhdGUgU2VydmljZXMgYW5kIEROUyBzZXJ2ZXIgaG9z
dGluZyB0aGUgPGEgaHJlZj0iaHR0cDovL2FkLmxhYm5ldC5vcmciIHRhcmdldD0iX2JsYW5rIj5h
ZC5sYWJuZXQub3JnPC9hPiBkb21haW4gYW5kIHRoZSBSb290IENBLjxicj48YnI+VHdvIExpbnV4
IHNlcnZlcnMgc2V0dXAgaW4gdGhlIDxhIGhyZWY9Imh0dHA6Ly9sYWJuZXQub3JnIiB0YXJnZXQ9
Il9ibGFuayI+bGFibmV0Lm9yZzwvYT4gZG9tYWluLiBCb3RoIHVzaW5nIHRoZSBXaW5kb3dzIFNl
cnZlciBETlMgc2VydmVyLjxicj5UaGUgZmlyc3Qgb25lIGlzIHNldHVwIGFzIGEgSVBBIE1hc3Rl
ciBzZXJ2ZXIgaG9zdGluZyB0aGUgZG9tYWluIDxhIGhyZWY9Imh0dHA6Ly9pcGEubGFibmV0Lm9y
ZyIgdGFyZ2V0PSJfYmxhbmsiPmlwYS5sYWJuZXQub3JnPC9hPiBhbmQgYWN0IGFzIGEgc3Vib3Jk
aW5hdGUgQ0Egc2VydmVyLiBJdCB3YXMgc2V0dXDCoHdpdGggdGhlIGZvbGxvd2luZyBjb21tYW5k
czs8L2Rpdj48ZGl2PsKgIHN1ZG8gaXBhLXNlcnZlci1pbnN0YWxsIC0tZXh0ZXJuYWwtY2EgLS1l
eHRlcm5hbC1jYS10eXBlPW1zLWNzPGJyPjwvZGl2PjxkaXY+wqAgc3VkbyBpcGEtc2VydmVyLWlu
c3RhbGwgLS1leHRlcm5hbC1jZXJ0LWZpbGU9L2hvbWUvJFVTRVIvaXBhLmNlciAtLWV4dGVybmFs
LWNlcnQtZmlsZT0vaG9tZS8kVVNFUi9jZXJ0bmV3LmNlcjxicj48L2Rpdj48ZGl2PsKgIGtpbml0
IGFkbWluPC9kaXY+PGRpdj7CoCBzdWRvIGlwYS1hZHRydXN0LWluc3RhbGw8YnI+PC9kaXY+PGRp
dj7CoCBzdWRvIGlwYSB0cnVzdC1hZGQgLS10eXBlPWFkIDxhIGhyZWY9Imh0dHA6Ly9hZC5sYWJu
ZXQub3JnIiB0YXJnZXQ9Il9ibGFuayI+YWQubGFibmV0Lm9yZzwvYT4gLS1hZG1pbiBBZG1pbmlz
dHJhdG9yIC0tcGFzc3dvcmQgLS10d28td2F5PXRydWU8YnI+PC9kaXY+PGRpdj48YnI+PC9kaXY+
PGRpdj5UaGUgc2Vjb25kIG9uZSBpcyBzZXR1cCBhcyBhIElQQSBSZXBsaWNhIGFsc28gaG9zdGlu
ZyB0aGUgZG9tYWluIDxhIGhyZWY9Imh0dHA6Ly9pcGEubGFibmV0Lm9yZyIgdGFyZ2V0PSJfYmxh
bmsiPmlwYS5sYWJuZXQub3JnPC9hPiBJdCBoYXMgYmVlbiBzZXR1cCB3aXRoIHRoZSBmb2xsb3dp
bmcgY29tbWFuZHM7PC9kaXY+PGRpdj7CoCBzdWRvIGlwYS1jbGllbnQtaW5zdGFsbCAtLW1raG9t
ZWRpcjxicj48L2Rpdj48ZGl2PsKgIHN1ZG8gaXBhLXJlcGxpY2EtaW5zdGFsbDwvZGl2PjxkaXY+
wqAgc3VkbyBpcGEtY2EtaW5zdGFsbDxicj48L2Rpdj48ZGl2PsKgIGtpbml0IGFkbWluPGJyPjwv
ZGl2PjxkaXY+wqAgc3VkbyBpcGEtYWR0cnVzdC1pbnN0YWxsPGJyPjwvZGl2PjxkaXY+wqAgc3Vk
byBpcGEgdHJ1c3QtYWRkIC0tdHlwZT1hZCA8YSBocmVmPSJodHRwOi8vYWQubGFibmV0Lm9yZyIg
dGFyZ2V0PSJfYmxhbmsiPmFkLmxhYm5ldC5vcmc8L2E+IC0tYWRtaW4gQWRtaW5pc3RyYXRvciAt
LXBhc3N3b3JkIC0tdHdvLXdheT10cnVlPGJyPjwvZGl2PjwvZGl2PjwvYmxvY2txdW90ZT48ZGl2
PjxzcGFuIGNsYXNzPSJnbWFpbF9kZWZhdWx0IiBzdHlsZT0iZm9udC1mYW1pbHk6YXJpYWwsc2Fu
cy1zZXJpZiI+VGhlIGFib3ZlIGNvbW1hbmQgKGlwYSB0cnVzdC1hZGQpIHByb2JhYmx5IGV4aXRl
ZCBvbiBlcnJvciBhcyB0aGUgdHJ1c3Qgd2FzIGFscmVhZHkgZXN0YWJsaXNoZWQuIFBsZWFzZSBy
ZWFkIDxhIGhyZWY9Imh0dHBzOi8vYWNjZXNzLnJlZGhhdC5jb20vZG9jdW1lbnRhdGlvbi9lbi11
cy9yZWRfaGF0X2VudGVycHJpc2VfbGludXgvOS9odG1sL3BsYW5uaW5nX2lkZW50aXR5X21hbmFn
ZW1lbnQvcGxhbm5pbmctYS1jcm9zcy1mb3Jlc3QtdHJ1c3QtYmV0d2Vlbi1pZG0tYW5kLWFkX3Bs
YW5uaW5nLWlkZW50aXR5LW1hbmFnZW1lbnQjdHJ1c3QtY29udHJvbGxlcnMtYW5kLXRydXN0LWFn
ZW50c19wbGFubmluZy1hLWNyb3NzLWZvcmVzdC10cnVzdC1iZXR3ZWVuLWlkbS1hbmQtYWQiIHRh
cmdldD0iX2JsYW5rIj5UcnVzdCBjb250cm9sbGVycyBhbmQgVHJ1c3QgQWdlbnRzPC9hPsKgdG8g
dW5kZXJzdGFuZCBob3cgdGhlIHJlcGxpY2Egc2hvdWxkIGJlIHNldHVwIGluIG9yZGVyIHRvIGJl
IGFibGUgdG8gcmVzb2x2ZSBBRCB1c2VycyBhbmQgZ3JvdXBzLiBXaXRoIHlvdXIgc2V0IG9mIGNv
bW1hbmRzLCBib3RoIG1hc3RlciBhbmQgcmVwbGljYSBhcmUgY29uZmlndXJlZCBhcyBBRCBUcnVz
dCBDb250cm9sbGVycyBhbmQgc2hvdWxkIGJlIGFibGUgdG8gcmVzb2x2ZSB1c2VycyBhbmQgZ3Jv
dXBzLCBidXQgdGhlcmUgaXMgbm8gbmVlZCB0byBydW4gdHdpY2UgdGhlIHRydXN0LWFkZCBwYXJ0
Ljwvc3Bhbj48L2Rpdj48L2Rpdj48L2Rpdj48L2Jsb2NrcXVvdGU+PGRpdj48YnI+PC9kaXY+PGRp
dj5UaGV5IGJvdGggc2hvdyB1cCBpbiBJUEEgQWRtaW4gR1VJIGFzIGJlaW5nIGJvdGggVHJ1c3Qg
Q29udHJvbGxlcnMgYW5kIFRydXN0IEFnZW50cy4gSSByZWFkIHRoYXQgYXQgbGVhc3QgdHdvIHRy
dXN0IGNvbnRyb2xsZXJzIHNob3VsZCBiZSBjb25maWd1cmVkIHBlciBJZE0gZGVwbG95bWVudC48
YnI+VGhhbmtzIEkgd2lsbCBjaGVjayB0aGUgZG9jdW1lbnQgYWdhaW4uPC9kaXY+PGRpdj7CoDwv
ZGl2PjxibG9ja3F1b3RlIGNsYXNzPSJnbWFpbF9xdW90ZSIgc3R5bGU9Im1hcmdpbjowcHggMHB4
IDBweCAwLjhleDtib3JkZXItbGVmdDoxcHggc29saWQgcmdiKDIwNCwyMDQsMjA0KTtwYWRkaW5n
LWxlZnQ6MWV4Ij48ZGl2IGRpcj0ibHRyIj48ZGl2IGNsYXNzPSJnbWFpbF9xdW90ZSI+PGJsb2Nr
cXVvdGUgY2xhc3M9ImdtYWlsX3F1b3RlIiBzdHlsZT0ibWFyZ2luOjBweCAwcHggMHB4IDAuOGV4
O2JvcmRlci1sZWZ0OjFweCBzb2xpZCByZ2IoMjA0LDIwNCwyMDQpO3BhZGRpbmctbGVmdDoxZXgi
PjxkaXYgZGlyPSJsdHIiPjxkaXY+QWxsIG5lZWRlZCBETlMgcmVjb3JkcyBoYXZlIGJlZW4gY3Jl
YXRlZCBpbiB0aGUgRE5TIHNlcnZlciBvbiB0aGUgV2luZG93cyBzZXJ2ZXIuIEF0IGxlYXN0IEkg
aG9wZSBzby48L2Rpdj48ZGl2PklQQSBIZWFsdGhjZWNrIG9uIGJvdGggSVBBIHNlcnZlcnMgZG9u
JiMzOTt0IGNvbXBsYWluIGFib3V0IGFueXRoaW5nIG1pc3NpbmcuPGJyPsKgIHN1ZG8gaXBhLWhl
YWx0aGNoZWNrIC0tb3V0cHV0LXR5cGUgaHVtYW48YnI+PC9kaXY+PGRpdj48YnI+PC9kaXY+PGRp
dj5PbmUgSVBBIENsaWVudCBhbHNvIHNldHVwIGluIHRoZSA8YSBocmVmPSJodHRwOi8vbGFibmV0
Lm9yZyIgdGFyZ2V0PSJfYmxhbmsiPmxhYm5ldC5vcmc8L2E+IGRvbWFpbiBhbmQgdXNpbmcgdGhl
IFdpbmRvd3Mgc2VydmVyIEROUywgd2FzIHNldHVwIHdpdGggdGhlIGZvbGxvd2luZyBjb21tYW5k
OzwvZGl2PjxkaXY+c3VkbyBpcGEtY2xpZW50LWluc3RhbGwgLS1kb21haW49PGEgaHJlZj0iaHR0
cDovL2lwYS5sYWJuZXQub3JnIiB0YXJnZXQ9Il9ibGFuayI+aXBhLmxhYm5ldC5vcmc8L2E+IC0t
bWtob21lZGlyPGJyPjwvZGl2PjxkaXY+PGJyPjwvZGl2PjxkaXY+VGVzdGluZyBhdXRoZW50aWNh
dGlvbiBvbiB0aGUgSVBBIENsaWVudCBhcyBhIHVzZXIgaW4gdGhlIDxhIGhyZWY9Imh0dHA6Ly9h
ZC5sYWJuZXQub3JnIiB0YXJnZXQ9Il9ibGFuayI+YWQubGFibmV0Lm9yZzwvYT4gd29ya3PCoCBv
dXQgbGlrZSB0aGlzOzwvZGl2PjxkaXY+Qm90aCBJUEEgU2VydmVycyB1cCB3b3JrcyBPSzwvZGl2
PjxkaXY+T25seSBJUEEgTWFzdGVyIHVwIHdvcmtzIE9LPC9kaXY+PGRpdj5Pbmx5IElQQSBSZXBs
aWNhIHVwIGRvZXNuJiMzOTt0IHdvcmsuPC9kaXY+PC9kaXY+PC9ibG9ja3F1b3RlPjxkaXY+PHNw
YW4gY2xhc3M9ImdtYWlsX2RlZmF1bHQiIHN0eWxlPSJmb250LWZhbWlseTphcmlhbCxzYW5zLXNl
cmlmIj5EaWQgeW91IHRlc3QgYXV0aGVudGljYXRpb24gb24gdGhlIElQQSByZXBsaWNhP8KgPC9z
cGFuPjwvZGl2PjxkaXYgc3R5bGU9ImZvbnQtZmFtaWx5OmFyaWFsLHNhbnMtc2VyaWYiPklzIHlv
dXIgbWFzdGVyIGEgRE5TIHNlcnZlciBmb3IgPGEgaHJlZj0iaHR0cDovL2lwYS5sYWJuZXQub3Jn
IiB0YXJnZXQ9Il9ibGFuayI+aXBhLmxhYm5ldC5vcmc8L2E+PyBJcyB0aGUgcmVwbGljYSBhIERO
UyBzZXJ2ZXIgZm9yIDxhIGhyZWY9Imh0dHA6Ly9pcGEubGFibmV0Lm9yZyIgdGFyZ2V0PSJfYmxh
bmsiPmlwYS5sYWJuZXQub3JnPC9hPj88L2Rpdj48ZGl2IHN0eWxlPSJmb250LWZhbWlseTphcmlh
bCxzYW5zLXNlcmlmIj48YnI+PC9kaXY+PC9kaXY+PC9kaXY+PC9ibG9ja3F1b3RlPjxkaXY+SSBt
YXkgaGF2ZSBtaXNzZWQgdGhhdCwgYnV0IGp1c3QgdHJpZWQgaXQgb3V0IG5vdy4gTm8gSSYjMzk7
bSBub3QgYWJsZSB0byBhdXRoZW50aWNhdGUgYXMgYW4gQUQgdXNlciBvbiB0aGUgSVBBIFJlcGxp
Y2EgOi0owqA8L2Rpdj48L2Rpdj48L2Rpdj48L2Jsb2NrcXVvdGU+PGRpdj48c3BhbiBjbGFzcz0i
Z21haWxfZGVmYXVsdCIgc3R5bGU9ImZvbnQtZmFtaWx5OmFyaWFsLHNhbnMtc2VyaWYiPllvdSBj
YW4gZW5hYmxlIGRlYnVnIGxldmVsIGluIHRoZSByZXBsaWNhOiBhZGQgZGVidWdfbGV2ZWw9OSBp
biBhbGwgdGhlIHNlY3Rpb25zIGluIC9ldGMvc3NzZC9zc3NkLmNvbmYsIHJlc3RhcnQgc3NzZCB3
aXRoIHN5c3RlbWN0bCByZXN0YXJ0IHNzc2QgYW5kIGNsZWFuIHRoZSBjYWNoZS4gVGhlbiByZXRy
eSBhdXRoZW50aWNhdGlvbiBvZiBhbiBBRCB1c2VyIG9uIHRoZSByZXBsaWNhIGFuZCBnYXRoZXIg
dGhlIGxvZ3MgZnJvbSAvdmFyL2xvZy9zc3NkLyouIFdlIG1heSBiZSBhYmxlIHRvIGhlbHAgd2l0
aCB0aGUgbG9ncy4gRG8gbm90IGZvcmdldCB0byByZW1vdmUgdGhlIGRlYnVnX2xldmVsIHdoZW4g
eW91JiMzOTtyZSBkb25lLjwvc3Bhbj48L2Rpdj48ZGl2Pjxicj48L2Rpdj48ZGl2IGNsYXNzPSJn
bWFpbF9kZWZhdWx0IiBzdHlsZT0iZm9udC1mYW1pbHk6YXJpYWwsc2Fucy1zZXJpZiI+SWYgYXV0
aGVudGljYXRpb24gd29ya3Mgb24gdGhlIG1hc3RlciBidXQgbm90IG9uIHRoZSByZXBsaWNhLCBp
dCBpcyBvZnRlbiByZWxhdGVkIHRvIEROUyBvciBmaXJld2FsbCBpc3N1ZXMgYmV0d2VlbiB0aGUg
dHJ1c3QgY29udHJvbGxlciBhbmQgdGhlIEFEIGRvbWFpbiBjb250cm9sbGVyLjwvZGl2PjxkaXYg
Y2xhc3M9ImdtYWlsX2RlZmF1bHQiIHN0eWxlPSJmb250LWZhbWlseTphcmlhbCxzYW5zLXNlcmlm
Ij5Zb3UgY2FuIHJlZmVyIHRvwqA8YSBocmVmPSJodHRwczovL2FjY2Vzcy5yZWRoYXQuY29tL2Rv
Y3VtZW50YXRpb24vZW4tdXMvcmVkX2hhdF9lbnRlcnByaXNlX2xpbnV4LzkvaHRtbC9wbGFubmlu
Z19pZGVudGl0eV9tYW5hZ2VtZW50L3BsYW5uaW5nLWEtY3Jvc3MtZm9yZXN0LXRydXN0LWJldHdl
ZW4taWRtLWFuZC1hZF9wbGFubmluZy1pZGVudGl0eS1tYW5hZ2VtZW50I2d1aWRlbGluZXMtZm9y
LXNldHRpbmctdXAtZG5zLWZvci1hbi1pZG0tYWQtdHJ1c3RfcGxhbm5pbmctYS1jcm9zcy1mb3Jl
c3QtdHJ1c3QtYmV0d2Vlbi1pZG0tYW5kLWFkIj5odHRwczovL2FjY2Vzcy5yZWRoYXQuY29tL2Rv
Y3VtZW50YXRpb24vZW4tdXMvcmVkX2hhdF9lbnRlcnByaXNlX2xpbnV4LzkvaHRtbC9wbGFubmlu
Z19pZGVudGl0eV9tYW5hZ2VtZW50L3BsYW5uaW5nLWEtY3Jvc3MtZm9yZXN0LXRydXN0LWJldHdl
ZW4taWRtLWFuZC1hZF9wbGFubmluZy1pZGVudGl0eS1tYW5hZ2VtZW50I2d1aWRlbGluZXMtZm9y
LXNldHRpbmctdXAtZG5zLWZvci1hbi1pZG0tYWQtdHJ1c3RfcGxhbm5pbmctYS1jcm9zcy1mb3Jl
c3QtdHJ1c3QtYmV0d2Vlbi1pZG0tYW5kLWFkPC9hPjwvZGl2PjxkaXYgY2xhc3M9ImdtYWlsX2Rl
ZmF1bHQiIHN0eWxlPSJmb250LWZhbWlseTphcmlhbCxzYW5zLXNlcmlmIj5hbmQ8L2Rpdj48ZGl2
IGNsYXNzPSJnbWFpbF9kZWZhdWx0IiBzdHlsZT0iZm9udC1mYW1pbHk6YXJpYWwsc2Fucy1zZXJp
ZiI+PGEgaHJlZj0iaHR0cHM6Ly9hY2Nlc3MucmVkaGF0LmNvbS9kb2N1bWVudGF0aW9uL2VuLXVz
L3JlZF9oYXRfZW50ZXJwcmlzZV9saW51eC85L2h0bWwvaW5zdGFsbGluZ190cnVzdF9iZXR3ZWVu
X2lkbV9hbmRfYWQvY29uZmlndXJpbmctZG5zLWFuZC1yZWFsbS1zZXR0aW5ncy1mb3ItYS10cnVz
dF9pbnN0YWxsaW5nLXRydXN0LWJldHdlZW4taWRtLWFuZC1hZCNkb2Mtd3JhcHBlciI+aHR0cHM6
Ly9hY2Nlc3MucmVkaGF0LmNvbS9kb2N1bWVudGF0aW9uL2VuLXVzL3JlZF9oYXRfZW50ZXJwcmlz
ZV9saW51eC85L2h0bWwvaW5zdGFsbGluZ190cnVzdF9iZXR3ZWVuX2lkbV9hbmRfYWQvY29uZmln
dXJpbmctZG5zLWFuZC1yZWFsbS1zZXR0aW5ncy1mb3ItYS10cnVzdF9pbnN0YWxsaW5nLXRydXN0
LWJldHdlZW4taWRtLWFuZC1hZCNkb2Mtd3JhcHBlcjwvYT48YnI+PC9kaXY+PGRpdiBjbGFzcz0i
Z21haWxfZGVmYXVsdCIgc3R5bGU9ImZvbnQtZmFtaWx5OmFyaWFsLHNhbnMtc2VyaWYiPjxicj48
L2Rpdj48ZGl2IGNsYXNzPSJnbWFpbF9kZWZhdWx0IiBzdHlsZT0iZm9udC1mYW1pbHk6YXJpYWws
c2Fucy1zZXJpZiI+ZmxvPC9kaXY+PGRpdiBjbGFzcz0iZ21haWxfZGVmYXVsdCIgc3R5bGU9ImZv
bnQtZmFtaWx5OmFyaWFsLHNhbnMtc2VyaWYiPjxicj48L2Rpdj48ZGl2IGNsYXNzPSJnbWFpbF9k
ZWZhdWx0IiBzdHlsZT0iZm9udC1mYW1pbHk6YXJpYWwsc2Fucy1zZXJpZiI+PGJyPjwvZGl2Pjxi
bG9ja3F1b3RlIGNsYXNzPSJnbWFpbF9xdW90ZSIgc3R5bGU9Im1hcmdpbjowcHggMHB4IDBweCAw
LjhleDtib3JkZXItbGVmdDoxcHggc29saWQgcmdiKDIwNCwyMDQsMjA0KTtwYWRkaW5nLWxlZnQ6
MWV4Ij48ZGl2IGRpcj0ibHRyIj48ZGl2IGNsYXNzPSJnbWFpbF9xdW90ZSI+PGRpdj5ObyBvbmx5
IHRoZSBXaW5kb3dzIEROUyBzZXJ2ZXIgaXMgYSBETlMgc2VydmVyLCBob3N0aW5nIGFsbCB0aGUg
ZG9tYWlucyA8YSBocmVmPSJodHRwOi8vbGFibmV0Lm9yZyIgdGFyZ2V0PSJfYmxhbmsiPmxhYm5l
dC5vcmc8L2E+LCA8YSBocmVmPSJodHRwOi8vYWQubGFibmV0Lm9yZyIgdGFyZ2V0PSJfYmxhbmsi
PmFkLmxhYm5ldC5vcmc8L2E+IGFuZCA8YSBocmVmPSJodHRwOi8vaXBhLmxhYm5ldC5vcmciIHRh
cmdldD0iX2JsYW5rIj5pcGEubGFibmV0Lm9yZzwvYT48L2Rpdj48ZGl2Pjxicj48L2Rpdj48ZGl2
PlRoYW5rcyE8L2Rpdj48ZGl2Pjxicj48L2Rpdj48YmxvY2txdW90ZSBjbGFzcz0iZ21haWxfcXVv
dGUiIHN0eWxlPSJtYXJnaW46MHB4IDBweCAwcHggMC44ZXg7Ym9yZGVyLWxlZnQ6MXB4IHNvbGlk
IHJnYigyMDQsMjA0LDIwNCk7cGFkZGluZy1sZWZ0OjFleCI+PGRpdiBkaXI9Imx0ciI+PGRpdiBj
bGFzcz0iZ21haWxfcXVvdGUiPjxkaXYgc3R5bGU9ImZvbnQtZmFtaWx5OmFyaWFsLHNhbnMtc2Vy
aWYiPjwvZGl2PjxkaXYgc3R5bGU9ImZvbnQtZmFtaWx5OmFyaWFsLHNhbnMtc2VyaWYiPmZsbzwv
ZGl2PjxibG9ja3F1b3RlIGNsYXNzPSJnbWFpbF9xdW90ZSIgc3R5bGU9Im1hcmdpbjowcHggMHB4
IDBweCAwLjhleDtib3JkZXItbGVmdDoxcHggc29saWQgcmdiKDIwNCwyMDQsMjA0KTtwYWRkaW5n
LWxlZnQ6MWV4Ij48ZGl2IGRpcj0ibHRyIj48ZGl2Pjxicj48L2Rpdj48ZGl2PkFmdGVyIHRoaXMg
Y2hlY2sgd2l0aCBJUEEgSGVhbHRoY2hlY2sgb24gdGhlIElQQSBSZXBsaWNhIG5vdyBjb21lcyBi
YWNrIHdpdGggdGhpczs8L2Rpdj48ZGl2PjxzcGFuIHN0eWxlPSJmb250LWZhbWlseTptb25vc3Bh
Y2UiPjxzcGFuIHN0eWxlPSJjb2xvcjpyZ2IoMCwwLDApIj5XQVJOSU5HOiBpcGFoZWFsdGhjaGVj
ay5pcGEudHJ1c3QuSVBBVHJ1c3RDYXRhbG9nQ2hlY2sue306IExvb2sgdXAgb2YgSUQge30gZm9y
IDxhIGhyZWY9Imh0dHA6Ly9hZC5sYWJuZXQub3JnIiB0YXJnZXQ9Il9ibGFuayI+YWQubGFibmV0
Lm9yZzwvYT4gcmV0dXJuZWQgbm90aGluZwo8L3NwYW4+PGJyPkVSUk9SOiA8YSBocmVmPSJodHRw
Oi8vaXBhaGVhbHRoY2hlY2suaXBhLnRydXN0LklQQVRydXN0Q2F0YWxvZ0NoZWNrLkFEIiB0YXJn
ZXQ9Il9ibGFuayI+aXBhaGVhbHRoY2hlY2suaXBhLnRydXN0LklQQVRydXN0Q2F0YWxvZ0NoZWNr
LkFEPC9hPiBHbG9iYWwgQ2F0YWxvZzogQUQgR2xvYmFsIENhdGFsb2cgbm90IGZvdW5kIGluIC91
c3Ivc2Jpbi9zc3NjdGwgJiMzOTtkb21haW4tc3RhdHVzJiMzOTsgb3V0cHV0OiBBY3RpdmUgc2Vy
dmVyczoKPGJyPklQQTogPGEgaHJlZj0iaHR0cDovL2xhYjAwMy5sYWJuZXQub3JnIiB0YXJnZXQ9
Il9ibGFuayI+bGFiMDAzLmxhYm5ldC5vcmc8L2E+Cjxicj5FUlJPUjogPGEgaHJlZj0iaHR0cDov
L2lwYWhlYWx0aGNoZWNrLmlwYS50cnVzdC5JUEFUcnVzdENhdGFsb2dDaGVjay5BRCIgdGFyZ2V0
PSJfYmxhbmsiPmlwYWhlYWx0aGNoZWNrLmlwYS50cnVzdC5JUEFUcnVzdENhdGFsb2dDaGVjay5B
RDwvYT4gRG9tYWluIENvbnRyb2xsZXI6IEFEIERvbWFpbiBDb250cm9sbGVyIG5vdCBmb3VuZCBp
biAvdXNyL3NiaW4vc3NzY3RsICYjMzk7ZG9tYWluLXN0YXR1cyYjMzk7IG91dHB1dDogQWN0aXZl
IHNlcnZlcnM6Cjxicj5JUEE6IDxhIGhyZWY9Imh0dHA6Ly9sYWIwMDMubGFibmV0Lm9yZyIgdGFy
Z2V0PSJfYmxhbmsiPmxhYjAwMy5sYWJuZXQub3JnPC9hPjxicj4KPGJyPjwvc3Bhbj48L2Rpdj48
ZGl2PkNhbiBhbnlvbmUgc3VnZ2VzdCB3aGF0IEkgaGF2ZSBkb25lIHdyb25nIG9yIG1pc3NlZD8g
QXMgZmFyIGFzIEkgY2FuIHRlbGwgdGhlcmUgYXJlIG5vIGNvbW1hbmRzIHRoYXQgbGV0IG1lIHdy
aXRlIHRvIHRoZSBHTG9iYWwgQ2F0YWxvZz88L2Rpdj48ZGl2PlRoYW5rcyE8L2Rpdj48L2Rpdj4K
LS08YnI+Cl9fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fPGJy
PgpGcmVlSVBBLXVzZXJzIG1haWxpbmcgbGlzdCAtLSA8YSBocmVmPSJtYWlsdG86ZnJlZWlwYS11
c2Vyc0BsaXN0cy5mZWRvcmFob3N0ZWQub3JnIiB0YXJnZXQ9Il9ibGFuayI+ZnJlZWlwYS11c2Vy
c0BsaXN0cy5mZWRvcmFob3N0ZWQub3JnPC9hPjxicj4KVG8gdW5zdWJzY3JpYmUgc2VuZCBhbiBl
bWFpbCB0byA8YSBocmVmPSJtYWlsdG86ZnJlZWlwYS11c2Vycy1sZWF2ZUBsaXN0cy5mZWRvcmFo
b3N0ZWQub3JnIiB0YXJnZXQ9Il9ibGFuayI+ZnJlZWlwYS11c2Vycy1sZWF2ZUBsaXN0cy5mZWRv
cmFob3N0ZWQub3JnPC9hPjxicj4KRmVkb3JhIENvZGUgb2YgQ29uZHVjdDogPGEgaHJlZj0iaHR0
cHM6Ly9kb2NzLmZlZG9yYXByb2plY3Qub3JnL2VuLVVTL3Byb2plY3QvY29kZS1vZi1jb25kdWN0
LyIgcmVsPSJub3JlZmVycmVyIiB0YXJnZXQ9Il9ibGFuayI+aHR0cHM6Ly9kb2NzLmZlZG9yYXBy
b2plY3Qub3JnL2VuLVVTL3Byb2plY3QvY29kZS1vZi1jb25kdWN0LzwvYT48YnI+Ckxpc3QgR3Vp
ZGVsaW5lczogPGEgaHJlZj0iaHR0cHM6Ly9mZWRvcmFwcm9qZWN0Lm9yZy93aWtpL01haWxpbmdf
bGlzdF9ndWlkZWxpbmVzIiByZWw9Im5vcmVmZXJyZXIiIHRhcmdldD0iX2JsYW5rIj5odHRwczov
L2ZlZG9yYXByb2plY3Qub3JnL3dpa2kvTWFpbGluZ19saXN0X2d1aWRlbGluZXM8L2E+PGJyPgpM
aXN0IEFyY2hpdmVzOiA8YSBocmVmPSJodHRwczovL2xpc3RzLmZlZG9yYWhvc3RlZC5vcmcvYXJj
aGl2ZXMvbGlzdC9mcmVlaXBhLXVzZXJzQGxpc3RzLmZlZG9yYWhvc3RlZC5vcmciIHJlbD0ibm9y
ZWZlcnJlciIgdGFyZ2V0PSJfYmxhbmsiPmh0dHBzOi8vbGlzdHMuZmVkb3JhaG9zdGVkLm9yZy9h
cmNoaXZlcy9saXN0L2ZyZWVpcGEtdXNlcnNAbGlzdHMuZmVkb3JhaG9zdGVkLm9yZzwvYT48YnI+
CkRvIG5vdCByZXBseSB0byBzcGFtLCByZXBvcnQgaXQ6IDxhIGhyZWY9Imh0dHBzOi8vcGFndXJl
LmlvL2ZlZG9yYS1pbmZyYXN0cnVjdHVyZS9uZXdfaXNzdWUiIHJlbD0ibm9yZWZlcnJlciIgdGFy
Z2V0PSJfYmxhbmsiPmh0dHBzOi8vcGFndXJlLmlvL2ZlZG9yYS1pbmZyYXN0cnVjdHVyZS9uZXdf
aXNzdWU8L2E+PGJyPgo8L2Jsb2NrcXVvdGU+PC9kaXY+PC9kaXY+CjwvYmxvY2txdW90ZT48L2Rp
dj48L2Rpdj4KPC9ibG9ja3F1b3RlPjwvZGl2PjwvZGl2Pgo=
--===============6799959363220103788==--
From clopmz at outlook.com Fri Apr 19 08:57:08 2024
Content-Type: multipart/mixed; boundary="===============6691024975383359730=="
MIME-Version: 1.0
From: Carlos Lopez
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Password expired is not requested with Ubuntu clients
Date: Fri, 19 Apr 2024 08:56:36 +0000
Message-ID: <
>
--===============6691024975383359730==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Good morning,
I have configured some Ubuntu clientes to authenticate via Kerberos against=
my RHEL9 IdM server. Everything works correctly: clients are authenticated=
, etc.
The problem comes when a user's password has expired. In the IdM server log=
s it is clear that the user must change the password:
2024-04-19T08:38:20.946335+00:00 rhelidmsrv01 krb5kdc[21392]: AS_REQ (8 ety=
pes {aes256-cts-hmac-sha1-96(18), aes128-cts-hmac-sha1-96(17), aes256-cts-h=
mac-sha384-192(20), aes128-cts-hmac-sha256-128(19), DEPRECATED:des3-cbc-sha=
1(16), DEPRECATED:arcfour-hmac(23), camellia128-cts-cmac(25), camellia256-c=
ts-cmac(26)}) 172.19.11.14: REQUIRED PWCHANGE: user1(a)MYDOM.ORG for krbtgt=
/MYDOM.ORG(a)MYDOM.ORG, Password has expired
2024-04-19T08:38:20.946413+00:00 rhelidmsrv01 krb5kdc[21392]: closing down =
fd 13
2024-04-19T08:38:20.946712+00:00 rhelidmsrv01 krb5kdc[21392]: AS_REQ (8 ety=
pes {aes256-cts-hmac-sha1-96(18), aes128-cts-hmac-sha1-96(17), aes256-cts-h=
mac-sha384-192(20), aes128-cts-hmac-sha256-128(19), DEPRECATED:des3-cbc-sha=
1(16), DEPRECATED:arcfour-hmac(23), camellia128-cts-cmac(25), camellia256-c=
ts-cmac(26)}) 172.19.11.14: NEEDED_PREAUTH: user1(a)MYDOM.ORG for kadmin/ch=
angepw(a)MYDOM.ORG, Additional pre-authentication required
2024-04-19T08:38:20.946747+00:00 rhelidmsrv01 krb5kdc[21392]: closing down =
fd 13
2024-04-19T08:38:20.950691+00:00 rhelidmsrv01 krb5kdc[21392]: AS_REQ (8 ety=
pes {aes256-cts-hmac-sha1-96(18), aes128-cts-hmac-sha1-96(17), aes256-cts-h=
mac-sha384-192(20), aes128-cts-hmac-sha256-128(19), DEPRECATED:des3-cbc-sha=
1(16), DEPRECATED:arcfour-hmac(23), camellia128-cts-cmac(25), camellia256-c=
ts-cmac(26)}) 172.19.11.14: ISSUE: authtime 1713515900, etypes {rep=3Daes25=
6-cts-hmac-sha1-96(18), tkt=3Daes256-cts-hmac-sha384-192(20), ses=3Daes256-=
cts-hmac-sha1-96(18)}, user1(a)MYDOM.ORG for kadmin/changepw(a)MYDOM.ORG
But when accessing to Ubuntu client via ssh, it never prompts to change the=
password and you can log in.
My sssd's config in Ubuntu client is:
[sssd]
config_file_version =3D 2
services =3D pam
domains =3D mydom.org
[pam]
pam_pwd_expiration_warning =3D 2
[domain/mydom.org]
id_provider =3D proxy
proxy_lib_name =3D files
auth_provider =3D krb5
chpass_provider =3D krb5
krb5_server =3D rhelidmsrv01.mydom.org
krb5_kpasswd =3D rhelidmsrv01.mydom.org
krb5_realm =3D mydom.org
krb5_ccname_template =3D KEYRING:persistent:%U
krb5_validate =3D true
cache_credentials =3D true
What could be the problem?
Best regards,
C. L. Martinez
--===============6691024975383359730==--
From jdoe53851 at gmail.com Fri Apr 19 10:06:32 2024
Content-Type: multipart/mixed; boundary="===============7567587721283358485=="
MIME-Version: 1.0
From: John Doe
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: IPA Replica can't authenticate users
Date: Fri, 19 Apr 2024 12:04:45 +0200
Message-ID:
In-Reply-To: CAFDg7Jxk0W52nZjWo88QH0fhUbF=Hy44i=w+FO=z3UXwPMaLWg@mail.gmail.com
--===============7567587721283358485==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Hi,
Thank you for your continued support.
However after reading up on the chapters on Replicas and Trust Controller
and Trust Agents I was able to deduce my misstake ;-)
The problem was that I on the replica ran both of these commands, which had
already been run on the master;
sudo ipa-adtrust-install
sudo ipa trust-add --type=3Dad ad.labnet.org --admin Administrator
--password --two-way=3Dtrue
Instead I should only have run the following command on the replica;
sudo ipa-adtrust-install --add-agents
So I redid the setup and correctd my misstake, now it all works :-)
Both IPA servers now have the roles Trust Controller and Trust Agent.
Now I can authenticate users from IPA clients no matter if both IPA servers
are or just one of them are up and running.
Thanks a million!
Den fre 19 apr. 2024 kl 10:25 skrev Florence Blanc-Renaud :
> Hi,
>
> On Mon, Apr 15, 2024 at 10:10=E2=80=AFAM John Doe =
wrote:
>
>>
>>
>> Den m=C3=A5n 15 apr. 2024 kl 09:35 skrev Florence Blanc-Renaud > >:
>>
>>> Hi,
>>>
>>> On Mon, Apr 15, 2024 at 9:03=E2=80=AFAM John Doe via FreeIPA-users <
>>> freeipa-users(a)lists.fedorahosted.org> wrote:
>>>
>>>> I'm playing around with IPA trying to figure out how to set it up to be
>>>> redundant. The problem is that the IPA Replica isn't able to authentic=
ate
>>>> AD users if IPA Master is down.
>>>> My setup;
>>>> One Windows Server set up with Active Direcory Domain Services, Active
>>>> Directory Certificate Services and DNS server hosting the ad.labnet.org
>>>> domain and the Root CA.
>>>>
>>>> Two Linux servers setup in the labnet.org domain. Both using the
>>>> Windows Server DNS server.
>>>> The first one is setup as a IPA Master server hosting the domain
>>>> ipa.labnet.org and act as a subordinate CA server. It was setup with
>>>> the following commands;
>>>> sudo ipa-server-install --external-ca --external-ca-type=3Dms-cs
>>>> sudo ipa-server-install --external-cert-file=3D/home/$USER/ipa.cer
>>>> --external-cert-file=3D/home/$USER/certnew.cer
>>>> kinit admin
>>>> sudo ipa-adtrust-install
>>>> sudo ipa trust-add --type=3Dad ad.labnet.org --admin Administrator
>>>> --password --two-way=3Dtrue
>>>>
>>>> The second one is setup as a IPA Replica also hosting the domain
>>>> ipa.labnet.org It has been setup with the following commands;
>>>> sudo ipa-client-install --mkhomedir
>>>> sudo ipa-replica-install
>>>> sudo ipa-ca-install
>>>> kinit admin
>>>> sudo ipa-adtrust-install
>>>> sudo ipa trust-add --type=3Dad ad.labnet.org --admin Administrator
>>>> --password --two-way=3Dtrue
>>>>
>>> The above command (ipa trust-add) probably exited on error as the trust
>>> was already established. Please read Trust controllers and Trust Agents
>>> to
>>> understand how the replica should be setup in order to be able to resol=
ve
>>> AD users and groups. With your set of commands, both master and replica=
are
>>> configured as AD Trust Controllers and should be able to resolve users =
and
>>> groups, but there is no need to run twice the trust-add part.
>>>
>>
>> They both show up in IPA Admin GUI as being both Trust Controllers and
>> Trust Agents. I read that at least two trust controllers should be
>> configured per IdM deployment.
>> Thanks I will check the document again.
>>
>>
>>> All needed DNS records have been created in the DNS server on the
>>>> Windows server. At least I hope so.
>>>> IPA Healthceck on both IPA servers don't complain about anything
>>>> missing.
>>>> sudo ipa-healthcheck --output-type human
>>>>
>>>> One IPA Client also setup in the labnet.org domain and using the
>>>> Windows server DNS, was setup with the following command;
>>>> sudo ipa-client-install --domain=3Dipa.labnet.org --mkhomedir
>>>>
>>>> Testing authentication on the IPA Client as a user in the ad.labnet.org
>>>> works out like this;
>>>> Both IPA Servers up works OK
>>>> Only IPA Master up works OK
>>>> Only IPA Replica up doesn't work.
>>>>
>>> Did you test authentication on the IPA replica?
>>> Is your master a DNS server for ipa.labnet.org? Is the replica a DNS
>>> server for ipa.labnet.org?
>>>
>>> I may have missed that, but just tried it out now. No I'm not able to
>> authenticate as an AD user on the IPA Replica :-(
>>
> You can enable debug level in the replica: add debug_level=3D9 in all the
> sections in /etc/sssd/sssd.conf, restart sssd with systemctl restart sssd
> and clean the cache. Then retry authentication of an AD user on the repli=
ca
> and gather the logs from /var/log/sssd/*. We may be able to help with the
> logs. Do not forget to remove the debug_level when you're done.
>
> If authentication works on the master but not on the replica, it is often
> related to DNS or firewall issues between the trust controller and the AD
> domain controller.
> You can refer to
> https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/=
html/planning_identity_management/planning-a-cross-forest-trust-between-idm=
-and-ad_planning-identity-management#guidelines-for-setting-up-dns-for-an-i=
dm-ad-trust_planning-a-cross-forest-trust-between-idm-and-ad
> and
>
> https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/=
html/installing_trust_between_idm_and_ad/configuring-dns-and-realm-settings=
-for-a-trust_installing-trust-between-idm-and-ad#doc-wrapper
>
> flo
>
>
> No only the Windows DNS server is a DNS server, hosting all the domains
>> labnet.org, ad.labnet.org and ipa.labnet.org
>>
>> Thanks!
>>
>> flo
>>>
>>>>
>>>> After this check with IPA Healthcheck on the IPA Replica now comes back
>>>> with this;
>>>> WARNING: ipahealthcheck.ipa.trust.IPATrustCatalogCheck.{}: Look up of
>>>> ID {} for ad.labnet.org returned nothing
>>>> ERROR: ipahealthcheck.ipa.trust.IPATrustCatalogCheck.AD Global
>>>> Catalog: AD Global Catalog not found in /usr/sbin/sssctl 'domain-statu=
s'
>>>> output: Active servers:
>>>> IPA: lab003.labnet.org
>>>> ERROR: ipahealthcheck.ipa.trust.IPATrustCatalogCheck.AD Domain
>>>> Controller: AD Domain Controller not found in /usr/sbin/sssctl
>>>> 'domain-status' output: Active servers:
>>>> IPA: lab003.labnet.org
>>>>
>>>> Can anyone suggest what I have done wrong or missed? As far as I can
>>>> tell there are no commands that let me write to the GLobal Catalog?
>>>> Thanks!
>>>> --
>>>> _______________________________________________
>>>> FreeIPA-users mailing list -- freeipa-users(a)lists.fedorahosted.org
>>>> To unsubscribe send an email to
>>>> freeipa-users-leave(a)lists.fedorahosted.org
>>>> Fedora Code of Conduct:
>>>> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
>>>> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
>>>> List Archives:
>>>> https://lists.fedorahosted.org/archives/list/freeipa-users(a)lists.fed=
orahosted.org
>>>> Do not reply to spam, report it:
>>>> https://pagure.io/fedora-infrastructure/new_issue
>>>>
>>>
--===============7567587721283358485==
Content-Type: text/html
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="attachment.html"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--===============7567587721283358485==--
From rcritten at redhat.com Fri Apr 19 12:28:49 2024
Content-Type: multipart/mixed; boundary="===============7980859928759791521=="
MIME-Version: 1.0
From: Rob Crittenden
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: sudo hbac rule resfues to work for AD users (one
way trust).
Date: Fri, 19 Apr 2024 08:28:10 -0400
Message-ID: <86dcaba7-8471-a5d7-a0fa-85550a60c61a@redhat.com>
In-Reply-To: 20240419081608.3327.83666@mailman01.iad2.fedoraproject.org
--===============7980859928759791521==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
slek kus via FreeIPA-users wrote:
> Issue might have started after enabling compat mode to allow LDAP authent=
ication for AD users.
> Found this: https://microdevsys.com/wp/user-is-not-allowed-to-run-sudo-on=
-server-this-incident-will-be-reported/
> =
> Went to disable the plugin, but greeted for the directory manager's passw=
ord. I do not recall to have set this during FreeIPA installation.
Setting this password is required during installation.
To change it see
https://www.freeipa.org/page/Howto/Change_Directory_Manager_Password
rob
--===============7980859928759791521==--
From slekkus75 at proton.me Fri Apr 19 12:56:21 2024
Content-Type: multipart/mixed; boundary="===============7535692170245785398=="
MIME-Version: 1.0
From: slek kus
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: sudo hbac rule resfues to work for AD users (one
way trust).
Date: Fri, 19 Apr 2024 12:56:01 +0000
Message-ID: <20240419125601.30286.62134@mailman01.iad2.fedoraproject.org>
In-Reply-To: 86dcaba7-8471-a5d7-a0fa-85550a60c61a@redhat.com
--===============7535692170245785398==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Must have missed that, changed. Have disabled the compat module, restarted =
all. Still no sudo working on clients. =
It looks like sudo is not being handled by sssd (not aware of any rules), b=
ut wouldn't know where to look for an issue. All trivial checks and tests d=
one.
Most is confusing. Reading about nisdomains need to be set correctly to be =
able to use hostgroups but this has worked before without the need for this=
. =
I am lost here.=20
--===============7535692170245785398==--
From taniahagan at googlemail.com Fri Apr 19 14:13:40 2024
Content-Type: multipart/mixed; boundary="===============3102930435046919681=="
MIME-Version: 1.0
From: Tania Hagan
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Expiring password Notification email template - images
Date: Fri, 19 Apr 2024 14:13:14 +0000
Message-ID: <20240419141314.15152.31605@mailman01.iad2.fedoraproject.org>
--===============3102930435046919681==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Hi FreeIPA Users,
Does anyone know if its possible to include inline images in the email temp=
late for Expiring Password Notification? I've experimented with including b=
ase64 encoding but the message just shows a white box with a black outline.=
I think this is a limited of our email client, and tried swapping to usin=
g CID embedded image but have no way of pointing the template to the image =
file. =
Many Thanks, =
Tania
=20
--===============3102930435046919681==--
From sbose at redhat.com Fri Apr 19 15:47:01 2024
Content-Type: multipart/mixed; boundary="===============8346096630283557958=="
MIME-Version: 1.0
From: Sumit Bose
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: Password expired is not requested with Ubuntu
clients
Date: Fri, 19 Apr 2024 17:46:43 +0200
Message-ID:
In-Reply-To: PRAP251MB05671953ED3F5DF5931288D0DB0D2@PRAP251MB0567.EURP251.PROD.OUTLOOK.COM
--===============8346096630283557958==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Am Fri, Apr 19, 2024 at 08:56:36AM +0000 schrieb Carlos Lopez via FreeIPA-u=
sers:
> Good morning,
> =
> I have configured some Ubuntu clientes to authenticate via Kerberos again=
st my RHEL9 IdM server. Everything works correctly: clients are authenticat=
ed, etc.
> =
> The problem comes when a user's password has expired. In the IdM server l=
ogs it is clear that the user must change the password:
> =
> 2024-04-19T08:38:20.946335+00:00 rhelidmsrv01 krb5kdc[21392]: AS_REQ (8 e=
types {aes256-cts-hmac-sha1-96(18), aes128-cts-hmac-sha1-96(17), aes256-cts=
-hmac-sha384-192(20), aes128-cts-hmac-sha256-128(19), DEPRECATED:des3-cbc-s=
ha1(16), DEPRECATED:arcfour-hmac(23), camellia128-cts-cmac(25), camellia256=
-cts-cmac(26)}) 172.19.11.14: REQUIRED PWCHANGE: user1(a)MYDOM.ORG for krbt=
gt/MYDOM.ORG(a)MYDOM.ORG, Password has expired
> 2024-04-19T08:38:20.946413+00:00 rhelidmsrv01 krb5kdc[21392]: closing dow=
n fd 13
> 2024-04-19T08:38:20.946712+00:00 rhelidmsrv01 krb5kdc[21392]: AS_REQ (8 e=
types {aes256-cts-hmac-sha1-96(18), aes128-cts-hmac-sha1-96(17), aes256-cts=
-hmac-sha384-192(20), aes128-cts-hmac-sha256-128(19), DEPRECATED:des3-cbc-s=
ha1(16), DEPRECATED:arcfour-hmac(23), camellia128-cts-cmac(25), camellia256=
-cts-cmac(26)}) 172.19.11.14: NEEDED_PREAUTH: user1(a)MYDOM.ORG for kadmin/=
changepw(a)MYDOM.ORG, Additional pre-authentication required
> 2024-04-19T08:38:20.946747+00:00 rhelidmsrv01 krb5kdc[21392]: closing dow=
n fd 13
> 2024-04-19T08:38:20.950691+00:00 rhelidmsrv01 krb5kdc[21392]: AS_REQ (8 e=
types {aes256-cts-hmac-sha1-96(18), aes128-cts-hmac-sha1-96(17), aes256-cts=
-hmac-sha384-192(20), aes128-cts-hmac-sha256-128(19), DEPRECATED:des3-cbc-s=
ha1(16), DEPRECATED:arcfour-hmac(23), camellia128-cts-cmac(25), camellia256=
-cts-cmac(26)}) 172.19.11.14: ISSUE: authtime 1713515900, etypes {rep=3Daes=
256-cts-hmac-sha1-96(18), tkt=3Daes256-cts-hmac-sha384-192(20), ses=3Daes25=
6-cts-hmac-sha1-96(18)}, user1(a)MYDOM.ORG for kadmin/changepw(a)MYDOM.ORG
> =
> But when accessing to Ubuntu client via ssh, it never prompts to change t=
he password and you can log in.
Hi,
can you share your PAM configuration for the sshd service. I'm asking
because the change of expired passwords in handled in the 'account'
section and I guess with your configuration (local users with
authentication by SSSD) pam_sss.so is not called for local users during
'account'.
bye,
Sumit
> =
> My sssd's config in Ubuntu client is:
> =
> [sssd]
> config_file_version =3D 2
> services =3D pam
> domains =3D mydom.org
> =
> [pam]
> pam_pwd_expiration_warning =3D 2
> =
> [domain/mydom.org]
> id_provider =3D proxy
> proxy_lib_name =3D files
> auth_provider =3D krb5
> chpass_provider =3D krb5
> krb5_server =3D rhelidmsrv01.mydom.org
> krb5_kpasswd =3D rhelidmsrv01.mydom.org
> krb5_realm =3D mydom.org
> krb5_ccname_template =3D KEYRING:persistent:%U
> krb5_validate =3D true
> cache_credentials =3D true
> =
> What could be the problem?
> =
> Best regards,
> C. L. Martinez
> --
> _______________________________________________
> FreeIPA-users mailing list -- freeipa-users(a)lists.fedorahosted.org
> To unsubscribe send an email to freeipa-users-leave(a)lists.fedorahosted.=
org
> Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code=
-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives: https://lists.fedorahosted.org/archives/list/freeipa-users=
(a)lists.fedorahosted.org
> Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/=
new_issue
--===============8346096630283557958==--
From basile.pinsard at gmail.com Fri Apr 19 16:20:09 2024
Content-Type: multipart/mixed; boundary="===============7499550387263785603=="
MIME-Version: 1.0
From: Basile Pinsard
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: pki-tomcat won't start + expired certificates
Date: Fri, 19 Apr 2024 16:19:50 +0000
Message-ID: <20240419161950.13506.9177@mailman01.iad2.fedoraproject.org>
In-Reply-To: CAFDg7JwByJV9DrPOO_JAd5aTBuFXD91toakJjAZ9ev2xaSJw3A@mail.gmail.com
--===============7499550387263785603==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Hi! =
Here is the output of ipa-cert-fix on the original instance:
```
The following certificates will be renewed:
Dogtag sslserver certificate:
Subject: CN=3Dipa.DOMAIN.COM,O=3DDOMAIN.COM
Serial: 3
Expires: 2024-03-19 20:36:25
Dogtag subsystem certificate:
Subject: CN=3DCA Subsystem,O=3DDOMAIN.COM
Serial: 4
Expires: 2024-03-19 20:36:27
Dogtag ca_ocsp_signing certificate:
Subject: CN=3DOCSP Subsystem,O=3DDOMAIN.COM
Serial: 2
Expires: 2024-03-19 20:36:24
Dogtag ca_audit_signing certificate:
Subject: CN=3DCA Audit,O=3DDOMAIN.COM
Serial: 5
Expires: 2024-03-19 20:36:30
IPA IPA RA certificate:
Subject: CN=3DIPA RA,O=3DDOMAIN.COM
Serial: 7
Expires: 2024-03-19 20:38:19
IPA KDC certificate:
Subject: CN=3Dipa.DOMAIN.COM,O=3DDOMAIN.COM
Serial: 10
Expires: 2024-03-30 20:40:27
Enter "yes" to proceed: yes
Proceeding.
CalledProcessError(Command ['pki-server', 'cert-fix', '--ldapi-socket', '/r=
un/slapd-DOMAIN-COM.socket', '--agent-uid', 'ipara', '--cert', 'sslserver'
, '--cert', 'subsystem', '--cert', 'ca_ocsp_signing', '--cert', 'ca_audit_s=
igning', '--extra-cert', '7', '--extra-cert', '10'] returned non-zero exit =
stat
us 1: "INFO: Loading instance: pki-tomcat\nINFO: Loading global Tomcat conf=
ig: /etc/tomcat/tomcat.conf\nINFO: Loading PKI Tomcat config: /usr/share/pk=
i/et
c/tomcat.conf\nINFO: Loading instance Tomcat config: /etc/pki/pki-tomcat/to=
mcat.conf\nINFO: Loading password config: /etc/pki/pki-tomcat/password.conf=
\nIN
FO: Loading subsystem config: /var/lib/pki/pki-tomcat/ca/conf/CS.cfg\nINFO:=
Loading subsystem registry: /var/lib/pki/pki-tomcat/ca/conf/registry.cfg\n=
INFO
: Loading instance registry: /etc/sysconfig/pki/tomcat/pki-tomcat/pki-tomca=
t\nINFO: Fixing the following system certs: ['sslserver', 'subsystem', 'ca_=
ocsp
_signing', 'ca_audit_signing']\nINFO: Renewing the following additional cer=
ts: ['7', '10']\nINFO: Stopping the instance to proceed with system cert re=
newa
l\nINFO: Configuring LDAP connection for CA\nINFO: Setting pkidbuser passwo=
rd via ldappasswd\nSASL/EXTERNAL authentication started\nSASL username: gid=
Numb
er=3D0+uidNumber=3D0,cn=3Dpeercred,cn=3Dexternal,cn=3Dauth\nSASL SSF: 0\nIN=
FO: Storing subsystem config: /var/lib/pki/pki-tomcat/ca/conf/CS.cfg\nINFO:=
Storing regis
try config: /var/lib/pki/pki-tomcat/ca/conf/registry.cfg\nINFO: Storing sub=
system config: /var/lib/pki/pki-tomcat/ca/conf/CS.cfg\nINFO: Storing regist=
ry c
onfig: /var/lib/pki/pki-tomcat/ca/conf/registry.cfg\nINFO: Selftests disabl=
ed for subsystems: ca\nSASL/EXTERNAL authentication started\nSASL username:=
gid
Number=3D0+uidNumber=3D0,cn=3Dpeercred,cn=3Dexternal,cn=3Dauth\nSASL SSF: 0=
\nINFO: Resetting password for uid=3Dipara,ou=3Dpeople,o=3Dipaca\nSASL/EXTE=
RNAL authentication
started\nSASL username: gidNumber=3D0+uidNumber=3D0,cn=3Dpeercred,cn=3Dexte=
rnal,cn=3Dauth\nSASL SSF: 0\nINFO: Creating a temporary sslserver cert\nINF=
O: Getting ssl
server cert info from CS.cfg\nINFO: Getting sslserver cert info from NSS da=
tabase\nINFO: Trying to create a new temp cert for sslserver.\nINFO: Genera=
te t
emp SSL certificate\nINFO: Getting sslserver cert info from CS.cfg\nINFO: G=
etting sslserver cert info from NSS database\nINFO: CSR for sslserver has b=
een
written to /tmp/tmpydx011j8/sslserver.csr\nINFO: Getting signing cert info =
from CS.cfg\nINFO: Getting signing cert info from NSS database\nINFO: CA ce=
rt w
ritten to /tmp/tmpydx011j8/ca_certificate.crt\nINFO: AKI: 0x7A0D23C6A1283EB=
899A0E5A4EFA3F92042F7F6D0\nINFO: Storing subsystem config: /var/lib/pki/pki=
-tom
cat/ca/conf/CS.cfg\nINFO: Storing registry config: /var/lib/pki/pki-tomcat/=
ca/conf/registry.cfg\nINFO: Selftests enabled for subsystems: ca\nINFO: Res=
tori
ng LDAP connection for CA\nINFO: Storing subsystem config: /var/lib/pki/pki=
-tomcat/ca/conf/CS.cfg\nINFO: Storing registry config: /var/lib/pki/pki-tom=
cat/
ca/conf/registry.cfg\nERROR: Failed to generate CA-signed temp SSL certific=
ate. RC: 255\n")
The ipa-cert-fix command failed.
```
> If you have a backup of the previous http/ldap certs you can put them back
> in place.
Unfortunately, I don't have these anymore.
However, I tried the approach I described above on a copy of the data in an=
other container, managed to install temporary certs/CA for the ldap/httpd s=
ervers, pki-tomcat seems to be able to establish the connection to the LDAP=
but crashes at the following error. =
`Certificate not found: caSigningCert cert-pki-ca`
Not sure what else needs to be fixed.
On this copy, with the hacked temporary certs, if I run `ipa-cert-fix` I ge=
t the same error as on the original instance. If I run the `pki-server cert=
-fix` command that crashes, but removing `--cert sslserver`, it goes a bit =
further but is still blocked by `pki-tomcat` not being able to start.
Thanks for all the help.=20
--===============7499550387263785603==--
From clopmz at outlook.com Fri Apr 19 17:05:12 2024
Content-Type: multipart/mixed; boundary="===============8842526694852073790=="
MIME-Version: 1.0
From: Carlos Lopez
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: Password expired is not requested with Ubuntu
clients
Date: Fri, 19 Apr 2024 17:03:46 +0000
Message-ID: <
>
In-Reply-To: ZiKR4_AvWkXarq-U@sbose.users.ipa.redhat.com
--===============8842526694852073790==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Of course. Here it is:
# PAM configuration for the Secure Shell service
# Standard Un*x authentication.
@include common-auth
# Disallow non-root logins when /etc/nologin exists.
account required pam_nologin.so
# Uncomment and edit /etc/security/access.conf if you need to set complex
# access limits that are hard to express in sshd_config.
# account required pam_access.so
# Standard Un*x authorization.
@include common-account
# SELinux needs to be the first session rule. This ensures that any
# lingering context has been cleared. Without this it is possible that a
# module could execute code in the wrong domain.
session [success=3Dok ignore=3Dignore module_unknown=3Dignore default=3Dbad=
] pam_selinux.so close
# Set the loginuid process attribute.
session required pam_loginuid.so
# Create a new session keyring.
session optional pam_keyinit.so force revoke
# Standard Un*x session setup and teardown.
@include common-session
# Print the message of the day upon successful login.
# This includes a dynamically generated part from /run/motd.dynamic
# and a static (admin-editable) part from /etc/motd.
session optional pam_motd.so motd=3D/run/motd.dynamic
session optional pam_motd.so noupdate
# Print the status of the user's mailbox upon successful login.
session optional pam_mail.so standard noenv # [1]
# Set up user limits from /etc/security/limits.conf.
session required pam_limits.so
# Read environment variables from /etc/environment and
# /etc/security/pam_env.conf.
session required pam_env.so # [1]
# In Debian 4.0 (etch), locale-related environment variables were moved to
# /etc/default/locale, so read that as well.
session required pam_env.so user_readenv=3D1 envfile=3D/etc/default/=
locale
# SELinux needs to intervene at login time to ensure that the process starts
# in the proper default security context. Only sessions which are intended
# to run in the user's context should be run after this.
session [success=3Dok ignore=3Dignore module_unknown=3Dignore default=3Dbad=
] pam_selinux.so open
# Standard Un*x password updating.
@include common-password
and common-account:
#
# /etc/pam.d/common-account - authorization settings common to all services
#
# This file is included from other service-specific PAM config files,
# and should contain a list of the authorization modules that define
# the central access policy for use on the system. The default is to
# only deny service to users whose accounts are expired in /etc/shadow.
#
# As of pam 1.0.1-6, this file is managed by pam-auth-update by default.
# To take advantage of this, it is recommended that you configure any
# local modules either before or after the default block, and use
# pam-auth-update to manage selection of other modules. See
# pam-auth-update(8) for details.
#
# here are the per-package modules (the "Primary" block)
account [success=3D1 new_authtok_reqd=3Ddone default=3Dignore] pam_u=
nix.so
# here's the fallback if no module succeeds
account requisite pam_deny.so
# prime the stack with a positive return value if there isn't one already;
# this avoids us returning an error just because nothing sets a success code
# since the modules above will each just jump around
account required pam_permit.so
# and here are more per-package modules (the "Additional" block)
# end of pam-auth-update config
Best regards,
C. L. Martinez
________________________________________
From: Sumit Bose
Sent: 19 April 2024 17:46
To: FreeIPA users list
Cc: Carlos Lopez
Subject: Re: [Freeipa-users] Password expired is not requested with Ubuntu =
clients
Am Fri, Apr 19, 2024 at 08:56:36AM +0000 schrieb Carlos Lopez via FreeIPA-u=
sers:
> Good morning,
>
> I have configured some Ubuntu clientes to authenticate via Kerberos again=
st my RHEL9 IdM server. Everything works correctly: clients are authenticat=
ed, etc.
>
> The problem comes when a user's password has expired. In the IdM server l=
ogs it is clear that the user must change the password:
>
> 2024-04-19T08:38:20.946335+00:00 rhelidmsrv01 krb5kdc[21392]: AS_REQ (8 e=
types {aes256-cts-hmac-sha1-96(18), aes128-cts-hmac-sha1-96(17), aes256-cts=
-hmac-sha384-192(20), aes128-cts-hmac-sha256-128(19), DEPRECATED:des3-cbc-s=
ha1(16), DEPRECATED:arcfour-hmac(23), camellia128-cts-cmac(25), camellia256=
-cts-cmac(26)}) 172.19.11.14: REQUIRED PWCHANGE: user1(a)MYDOM.ORG for krbt=
gt/MYDOM.ORG(a)MYDOM.ORG, Password has expired
> 2024-04-19T08:38:20.946413+00:00 rhelidmsrv01 krb5kdc[21392]: closing dow=
n fd 13
> 2024-04-19T08:38:20.946712+00:00 rhelidmsrv01 krb5kdc[21392]: AS_REQ (8 e=
types {aes256-cts-hmac-sha1-96(18), aes128-cts-hmac-sha1-96(17), aes256-cts=
-hmac-sha384-192(20), aes128-cts-hmac-sha256-128(19), DEPRECATED:des3-cbc-s=
ha1(16), DEPRECATED:arcfour-hmac(23), camellia128-cts-cmac(25), camellia256=
-cts-cmac(26)}) 172.19.11.14: NEEDED_PREAUTH: user1(a)MYDOM.ORG for kadmin/=
changepw(a)MYDOM.ORG, Additional pre-authentication required
> 2024-04-19T08:38:20.946747+00:00 rhelidmsrv01 krb5kdc[21392]: closing dow=
n fd 13
> 2024-04-19T08:38:20.950691+00:00 rhelidmsrv01 krb5kdc[21392]: AS_REQ (8 e=
types {aes256-cts-hmac-sha1-96(18), aes128-cts-hmac-sha1-96(17), aes256-cts=
-hmac-sha384-192(20), aes128-cts-hmac-sha256-128(19), DEPRECATED:des3-cbc-s=
ha1(16), DEPRECATED:arcfour-hmac(23), camellia128-cts-cmac(25), camellia256=
-cts-cmac(26)}) 172.19.11.14: ISSUE: authtime 1713515900, etypes {rep=3Daes=
256-cts-hmac-sha1-96(18), tkt=3Daes256-cts-hmac-sha384-192(20), ses=3Daes25=
6-cts-hmac-sha1-96(18)}, user1(a)MYDOM.ORG for kadmin/changepw(a)MYDOM.ORG
>
> But when accessing to Ubuntu client via ssh, it never prompts to change t=
he password and you can log in.
Hi,
can you share your PAM configuration for the sshd service. I'm asking
because the change of expired passwords in handled in the 'account'
section and I guess with your configuration (local users with
authentication by SSSD) pam_sss.so is not called for local users during
'account'.
bye,
Sumit
>
> My sssd's config in Ubuntu client is:
>
> [sssd]
> config_file_version =3D 2
> services =3D pam
> domains =3D mydom.org
>
> [pam]
> pam_pwd_expiration_warning =3D 2
>
> [domain/mydom.org]
> id_provider =3D proxy
> proxy_lib_name =3D files
> auth_provider =3D krb5
> chpass_provider =3D krb5
> krb5_server =3D rhelidmsrv01.mydom.org
> krb5_kpasswd =3D rhelidmsrv01.mydom.org
> krb5_realm =3D mydom.org
> krb5_ccname_template =3D KEYRING:persistent:%U
> krb5_validate =3D true
> cache_credentials =3D true
>
> What could be the problem?
>
> Best regards,
> C. L. Martinez
> --
> _______________________________________________
> FreeIPA-users mailing list -- freeipa-users(a)lists.fedorahosted.org
> To unsubscribe send an email to freeipa-users-leave(a)lists.fedorahosted.=
org
> Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code=
-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives: https://lists.fedorahosted.org/archives/list/freeipa-users=
(a)lists.fedorahosted.org
> Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/=
new_issue
--===============8842526694852073790==--
From sbose at redhat.com Fri Apr 19 17:34:03 2024
Content-Type: multipart/mixed; boundary="===============3580088927763873118=="
MIME-Version: 1.0
From: Sumit Bose
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: Password expired is not requested with Ubuntu
clients
Date: Fri, 19 Apr 2024 19:33:38 +0200
Message-ID:
In-Reply-To: PRAP251MB0567925D61D0A97D0807FBD5DB0D2@PRAP251MB0567.EURP251.PROD.OUTLOOK.COM
--===============3580088927763873118==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Am Fri, Apr 19, 2024 at 05:03:46PM +0000 schrieb Carlos Lopez:
> Of course. Here it is:
> =
> # PAM configuration for the Secure Shell service
> =
> # Standard Un*x authentication.
> @include common-auth
> =
> # Disallow non-root logins when /etc/nologin exists.
> account required pam_nologin.so
> =
> # Uncomment and edit /etc/security/access.conf if you need to set complex
> # access limits that are hard to express in sshd_config.
> # account required pam_access.so
> =
> # Standard Un*x authorization.
> @include common-account
> =
> # SELinux needs to be the first session rule. This ensures that any
> # lingering context has been cleared. Without this it is possible that a
> # module could execute code in the wrong domain.
> session [success=3Dok ignore=3Dignore module_unknown=3Dignore default=3Db=
ad] pam_selinux.so close
> =
> # Set the loginuid process attribute.
> session required pam_loginuid.so
> =
> # Create a new session keyring.
> session optional pam_keyinit.so force revoke
> =
> # Standard Un*x session setup and teardown.
> @include common-session
> =
> # Print the message of the day upon successful login.
> # This includes a dynamically generated part from /run/motd.dynamic
> # and a static (admin-editable) part from /etc/motd.
> session optional pam_motd.so motd=3D/run/motd.dynamic
> session optional pam_motd.so noupdate
> =
> # Print the status of the user's mailbox upon successful login.
> session optional pam_mail.so standard noenv # [1]
> =
> # Set up user limits from /etc/security/limits.conf.
> session required pam_limits.so
> =
> # Read environment variables from /etc/environment and
> # /etc/security/pam_env.conf.
> session required pam_env.so # [1]
> # In Debian 4.0 (etch), locale-related environment variables were moved to
> # /etc/default/locale, so read that as well.
> session required pam_env.so user_readenv=3D1 envfile=3D/etc/defaul=
t/locale
> =
> # SELinux needs to intervene at login time to ensure that the process sta=
rts
> # in the proper default security context. Only sessions which are intend=
ed
> # to run in the user's context should be run after this.
> session [success=3Dok ignore=3Dignore module_unknown=3Dignore default=3Db=
ad] pam_selinux.so open
> =
> # Standard Un*x password updating.
> @include common-password
> =
> and common-account:
> =
> #
> # /etc/pam.d/common-account - authorization settings common to all servic=
es
> #
> # This file is included from other service-specific PAM config files,
> # and should contain a list of the authorization modules that define
> # the central access policy for use on the system. The default is to
> # only deny service to users whose accounts are expired in /etc/shadow.
> #
> # As of pam 1.0.1-6, this file is managed by pam-auth-update by default.
> # To take advantage of this, it is recommended that you configure any
> # local modules either before or after the default block, and use
> # pam-auth-update to manage selection of other modules. See
> # pam-auth-update(8) for details.
> #
> =
> # here are the per-package modules (the "Primary" block)
> account [success=3D1 new_authtok_reqd=3Ddone default=3Dignore] pam=
_unix.so
> # here's the fallback if no module succeeds
> account requisite pam_deny.so
> # prime the stack with a positive return value if there isn't one already;
> # this avoids us returning an error just because nothing sets a success c=
ode
> # since the modules above will each just jump around
> account required pam_permit.so
> # and here are more per-package modules (the "Additional" block)
> # end of pam-auth-update config
Hi,
so pam_sss.so is not called at all which would explain the behavior. I
assume pam_sss.so is listed in common-auth. Did you add it on your own
to common-auth or was it added by a system utility e.g. pam-auth-update?
bye,
Sumit
> =
> Best regards,
> C. L. Martinez
> =
> ________________________________________
> From: Sumit Bose
> Sent: 19 April 2024 17:46
> To: FreeIPA users list
> Cc: Carlos Lopez
> Subject: Re: [Freeipa-users] Password expired is not requested with Ubunt=
u clients
> =
> Am Fri, Apr 19, 2024 at 08:56:36AM +0000 schrieb Carlos Lopez via FreeIPA=
-users:
> > Good morning,
> >
> > I have configured some Ubuntu clientes to authenticate via Kerberos aga=
inst my RHEL9 IdM server. Everything works correctly: clients are authentic=
ated, etc.
> >
> > The problem comes when a user's password has expired. In the IdM server=
logs it is clear that the user must change the password:
> >
> > 2024-04-19T08:38:20.946335+00:00 rhelidmsrv01 krb5kdc[21392]: AS_REQ (8=
etypes {aes256-cts-hmac-sha1-96(18), aes128-cts-hmac-sha1-96(17), aes256-c=
ts-hmac-sha384-192(20), aes128-cts-hmac-sha256-128(19), DEPRECATED:des3-cbc=
-sha1(16), DEPRECATED:arcfour-hmac(23), camellia128-cts-cmac(25), camellia2=
56-cts-cmac(26)}) 172.19.11.14: REQUIRED PWCHANGE: user1(a)MYDOM.ORG for kr=
btgt/MYDOM.ORG(a)MYDOM.ORG, Password has expired
> > 2024-04-19T08:38:20.946413+00:00 rhelidmsrv01 krb5kdc[21392]: closing d=
own fd 13
> > 2024-04-19T08:38:20.946712+00:00 rhelidmsrv01 krb5kdc[21392]: AS_REQ (8=
etypes {aes256-cts-hmac-sha1-96(18), aes128-cts-hmac-sha1-96(17), aes256-c=
ts-hmac-sha384-192(20), aes128-cts-hmac-sha256-128(19), DEPRECATED:des3-cbc=
-sha1(16), DEPRECATED:arcfour-hmac(23), camellia128-cts-cmac(25), camellia2=
56-cts-cmac(26)}) 172.19.11.14: NEEDED_PREAUTH: user1(a)MYDOM.ORG for kadmi=
n/changepw(a)MYDOM.ORG, Additional pre-authentication required
> > 2024-04-19T08:38:20.946747+00:00 rhelidmsrv01 krb5kdc[21392]: closing d=
own fd 13
> > 2024-04-19T08:38:20.950691+00:00 rhelidmsrv01 krb5kdc[21392]: AS_REQ (8=
etypes {aes256-cts-hmac-sha1-96(18), aes128-cts-hmac-sha1-96(17), aes256-c=
ts-hmac-sha384-192(20), aes128-cts-hmac-sha256-128(19), DEPRECATED:des3-cbc=
-sha1(16), DEPRECATED:arcfour-hmac(23), camellia128-cts-cmac(25), camellia2=
56-cts-cmac(26)}) 172.19.11.14: ISSUE: authtime 1713515900, etypes {rep=3Da=
es256-cts-hmac-sha1-96(18), tkt=3Daes256-cts-hmac-sha384-192(20), ses=3Daes=
256-cts-hmac-sha1-96(18)}, user1(a)MYDOM.ORG for kadmin/changepw(a)MYDOM.ORG
> >
> > But when accessing to Ubuntu client via ssh, it never prompts to change=
the password and you can log in.
> =
> Hi,
> =
> can you share your PAM configuration for the sshd service. I'm asking
> because the change of expired passwords in handled in the 'account'
> section and I guess with your configuration (local users with
> authentication by SSSD) pam_sss.so is not called for local users during
> 'account'.
> =
> bye,
> Sumit
> =
> >
> > My sssd's config in Ubuntu client is:
> >
> > [sssd]
> > config_file_version =3D 2
> > services =3D pam
> > domains =3D mydom.org
> >
> > [pam]
> > pam_pwd_expiration_warning =3D 2
> >
> > [domain/mydom.org]
> > id_provider =3D proxy
> > proxy_lib_name =3D files
> > auth_provider =3D krb5
> > chpass_provider =3D krb5
> > krb5_server =3D rhelidmsrv01.mydom.org
> > krb5_kpasswd =3D rhelidmsrv01.mydom.org
> > krb5_realm =3D mydom.org
> > krb5_ccname_template =3D KEYRING:persistent:%U
> > krb5_validate =3D true
> > cache_credentials =3D true
> >
> > What could be the problem?
> >
> > Best regards,
> > C. L. Martinez
> > --
> > _______________________________________________
> > FreeIPA-users mailing list -- freeipa-users(a)lists.fedorahosted.org
> > To unsubscribe send an email to freeipa-users-leave(a)lists.fedorahoste=
d.org
> > Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/co=
de-of-conduct/
> > List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> > List Archives: https://lists.fedorahosted.org/archives/list/freeipa-use=
rs(a)lists.fedorahosted.org
> > Do not reply to spam, report it: https://pagure.io/fedora-infrastructur=
e/new_issue
>=20
--===============3580088927763873118==--
From rcritten at redhat.com Fri Apr 19 17:46:10 2024
Content-Type: multipart/mixed; boundary="===============4365289122898447258=="
MIME-Version: 1.0
From: Rob Crittenden
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: sudo hbac rule resfues to work for AD users (one
way trust).
Date: Fri, 19 Apr 2024 13:45:52 -0400
Message-ID: <4ba8f47c-903a-fa9d-33bc-36644701be4e@redhat.com>
In-Reply-To: 20240419125601.30286.62134@mailman01.iad2.fedoraproject.org
--===============4365289122898447258==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
slek kus via FreeIPA-users wrote:
> Must have missed that, changed. Have disabled the compat module, restarte=
d all. Still no sudo working on clients. =
> It looks like sudo is not being handled by sssd (not aware of any rules),=
but wouldn't know where to look for an issue. All trivial checks and tests=
done.
> Most is confusing. Reading about nisdomains need to be set correctly to b=
e able to use hostgroups but this has worked before without the need for th=
is. =
> =
> I am lost here. =
Start with https://docs.pagure.org/sssd.sssd/users/sudo_troubleshooting.html
rob
--===============4365289122898447258==--
From Bernard.LHEUREUX at staff.win.be Mon Apr 22 10:58:40 2024
Content-Type: multipart/mixed; boundary="===============5037133020896077646=="
MIME-Version: 1.0
From: LHEUREUX Bernard
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Not possible to delete ID views from Default Trust
View if user is no longer present in AD
Date: Mon, 22 Apr 2024 10:57:49 +0000
Message-ID: <62efb5de5ca840f08cc6acb920996c10@staff.win.be>
--===============5037133020896077646==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Hello,
I=E2=80=99m trying to delete some anchors on Default Trust View on a FreeIP=
A with trust to an AD and, I always get the message =E2=80=9C=E2=80=A6@... =
user not found =C2=BB
Effectively those users are no longer part of the organization and have bee=
n removed from the AD, but how could I clean them in the Default Trust View
Thanks for your help.
---
Bernard Lheureux
Win S.A.
________________________________
1/Conform=C3=A9ment =C3=A0 notre certification ISO 27001, ce message et tou=
te pi=C3=A8ce jointe sont la propri=C3=A9t=C3=A9 exclusive de Win. L=E2=80=
=99information contenue dans cet e- mail peut s=E2=80=99av=C3=A9rer confide=
ntielle et d=C3=A8s lors prot=C3=A9g=C3=A9e de toute divulgation. Si vous a=
vez re=C3=A7u cette communication par erreur, veuillez nous en informer imm=
=C3=A9diatement en r=C3=A9pondant =C3=A0 ce message et en le supprimant de =
votre ordinateur, sans le copier ni le divulguer.
2/L=E2=80=99acceptation de toute offre commerciale (quel qu=E2=80=99en soit=
le support) emporte l=E2=80=99adh=C3=A9sion aux descriptifs (notamment tec=
hniques) inh=C3=A9rents aux solutions offertes, ainsi qu=E2=80=99aux condit=
ions commerciales g=C3=A9n=C3=A9rales de Win, consultables via https://www.=
win.be/cgv
DISCLAIMER : https://www.win.be/fr-win/disclaimer.htm
--===============5037133020896077646==
Content-Type: text/html
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="attachment.html"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--===============5037133020896077646==--
From slekkus75 at proton.me Mon Apr 22 12:45:45 2024
Content-Type: multipart/mixed; boundary="===============0710299246048751314=="
MIME-Version: 1.0
From: slek kus
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: sudo hbac rule resfues to work for AD users (one
way trust).
Date: Mon, 22 Apr 2024 12:45:33 +0000
Message-ID: <20240422124533.9883.99728@mailman01.iad2.fedoraproject.org>
In-Reply-To: 4ba8f47c-903a-fa9d-33bc-36644701be4e@redhat.com
--===============0710299246048751314==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Thanks for that troubleshooting link. Bookmarked.
The issue has been resolved and was totally user mistake, by not understand=
ing the relation between hbac and sudo rules. =
HBAC sets who can access sudo, but one still needs to tell sudo which rules=
are allowed to execute which where the sudo rules come in.
In my case I had set just the HBAC rule with user group, host group and the=
service "sudo-i". =
Things work now and hope my understand is correct as stated above.
Greeting!=20
--===============0710299246048751314==--
From cdth at gmx.net Mon Apr 22 13:54:40 2024
Content-Type: multipart/mixed; boundary="===============0544773301997178187=="
MIME-Version: 1.0
From: Thomas Handler
To: freeipa-users at lists.fedorahosted.org
Subject: =?utf-8?q?=5BFreeipa-users=5D_Question_regarding_=E2=80=9CSamba__on_an_Id?=
=?utf-8?q?M_domain_member=E2=80=9D?=
Date: Mon, 22 Apr 2024 15:54:20 +0200
Message-ID:
--===============0544773301997178187==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Hello,
beginning of March I have received support running=C2=A0Samba on an IdM dom=
ain member from Alexander. Back then my problem was what Alexander pinpoint=
s in his text=C2=A0https://vda.li/en/posts/2019/03/24/Kerberos-host-to-real=
m-translation/=C2=A0under "Mixed realm deployments=E2=80=9D where the Linux=
machine running Samba was in the wrong DNS zone.
After having fixed this things are running fine.
Now it came as it already was obvious back then and what is well noted alre=
ady in the RedHat Docs=C2=A0https://access.redhat.com/documentation/en-en/r=
ed_hat_enterprise_linux/9/html/using_external_red_hat_utilities_with_identi=
ty_management/setting-up-samba-on-an-idm-domain-member_using-external-red-h=
at-utilities-with-idm=C2=A0where is stated =E2=80=9CAD users logged into a =
Windows machine can not access Samba shares hosted on an IdM domain member=
=E2=80=9D.
So the customer has now stumbled exactly over this and I just wanted to con=
firm that my understanding of this section in the docs is correct and that =
there=E2=80=99s no way to ensure that an AD user on a Windows machine can a=
ccess the shares on the Samba machine joined to IdM.=C2=A0
Thank you.
Best regards,
Thomas
--===============0544773301997178187==--
From flo at redhat.com Tue Apr 23 06:31:35 2024
Content-Type: multipart/mixed; boundary="===============3899993962837828058=="
MIME-Version: 1.0
From: Florence Blanc-Renaud
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: pki-tomcat won't start + expired certificates
Date: Tue, 23 Apr 2024 08:31:06 +0200
Message-ID:
In-Reply-To: 20240419161950.13506.9177@mailman01.iad2.fedoraproject.org
--===============3899993962837828058==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Hi,
On Fri, Apr 19, 2024 at 6:20=E2=80=AFPM Basile Pinsard via FreeIPA-users <
freeipa-users(a)lists.fedorahosted.org> wrote:
> Hi!
>
> Here is the output of ipa-cert-fix on the original instance:
>
> ```
>
> The following certificates will be renewed:
>
> Dogtag sslserver certificate:
> Subject: CN=3Dipa.DOMAIN.COM,O=3DDOMAIN.COM
> Serial: 3
> Expires: 2024-03-19 20:36:25
>
> Dogtag subsystem certificate:
> Subject: CN=3DCA Subsystem,O=3DDOMAIN.COM
> Serial: 4
> Expires: 2024-03-19 20:36:27
>
> Dogtag ca_ocsp_signing certificate:
> Subject: CN=3DOCSP Subsystem,O=3DDOMAIN.COM
> Serial: 2
> Expires: 2024-03-19 20:36:24
>
> Dogtag ca_audit_signing certificate:
> Subject: CN=3DCA Audit,O=3DDOMAIN.COM
> Serial: 5
> Expires: 2024-03-19 20:36:30
>
> IPA IPA RA certificate:
> Subject: CN=3DIPA RA,O=3DDOMAIN.COM
> Serial: 7
> Expires: 2024-03-19 20:38:19
>
> IPA KDC certificate:
> Subject: CN=3Dipa.DOMAIN.COM,O=3DDOMAIN.COM
> Serial: 10
> Expires: 2024-03-30 20:40:27
>
> Enter "yes" to proceed: yes
> Proceeding.
> CalledProcessError(Command ['pki-server', 'cert-fix', '--ldapi-socket',
> '/run/slapd-DOMAIN-COM.socket', '--agent-uid', 'ipara', '--cert',
> 'sslserver'
> , '--cert', 'subsystem', '--cert', 'ca_ocsp_signing', '--cert',
> 'ca_audit_signing', '--extra-cert', '7', '--extra-cert', '10'] returned
> non-zero exit stat
> us 1: "INFO: Loading instance: pki-tomcat\nINFO: Loading global Tomcat
> config: /etc/tomcat/tomcat.conf\nINFO: Loading PKI Tomcat config:
> /usr/share/pki/et
> c/tomcat.conf\nINFO: Loading instance Tomcat config:
> /etc/pki/pki-tomcat/tomcat.conf\nINFO: Loading password config:
> /etc/pki/pki-tomcat/password.conf\nIN
> FO: Loading subsystem config:
> /var/lib/pki/pki-tomcat/ca/conf/CS.cfg\nINFO: Loading subsystem registry:
> /var/lib/pki/pki-tomcat/ca/conf/registry.cfg\nINFO
> : Loading instance registry:
> /etc/sysconfig/pki/tomcat/pki-tomcat/pki-tomcat\nINFO: Fixing the followi=
ng
> system certs: ['sslserver', 'subsystem', 'ca_ocsp
> _signing', 'ca_audit_signing']\nINFO: Renewing the following additional
> certs: ['7', '10']\nINFO: Stopping the instance to proceed with system ce=
rt
> renewa
> l\nINFO: Configuring LDAP connection for CA\nINFO: Setting pkidbuser
> password via ldappasswd\nSASL/EXTERNAL authentication started\nSASL
> username: gidNumb
> er=3D0+uidNumber=3D0,cn=3Dpeercred,cn=3Dexternal,cn=3Dauth\nSASL SSF: 0\n=
INFO:
> Storing subsystem config: /var/lib/pki/pki-tomcat/ca/conf/CS.cfg\nINFO:
> Storing regis
> try config: /var/lib/pki/pki-tomcat/ca/conf/registry.cfg\nINFO: Storing
> subsystem config: /var/lib/pki/pki-tomcat/ca/conf/CS.cfg\nINFO: Storing
> registry c
> onfig: /var/lib/pki/pki-tomcat/ca/conf/registry.cfg\nINFO: Selftests
> disabled for subsystems: ca\nSASL/EXTERNAL authentication started\nSASL
> username: gid
> Number=3D0+uidNumber=3D0,cn=3Dpeercred,cn=3Dexternal,cn=3Dauth\nSASL SSF:=
0\nINFO:
> Resetting password for uid=3Dipara,ou=3Dpeople,o=3Dipaca\nSASL/EXTERNAL
> authentication
> started\nSASL username:
> gidNumber=3D0+uidNumber=3D0,cn=3Dpeercred,cn=3Dexternal,cn=3Dauth\nSASL S=
SF: 0\nINFO:
> Creating a temporary sslserver cert\nINFO: Getting ssl
> server cert info from CS.cfg\nINFO: Getting sslserver cert info from NSS
> database\nINFO: Trying to create a new temp cert for sslserver.\nINFO:
> Generate t
> emp SSL certificate\nINFO: Getting sslserver cert info from CS.cfg\nINFO:
> Getting sslserver cert info from NSS database\nINFO: CSR for sslserver has
> been
> written to /tmp/tmpydx011j8/sslserver.csr\nINFO: Getting signing cert info
> from CS.cfg\nINFO: Getting signing cert info from NSS database\nINFO: CA
> cert w
> ritten to /tmp/tmpydx011j8/ca_certificate.crt\nINFO: AKI:
> 0x7A0D23C6A1283EB899A0E5A4EFA3F92042F7F6D0\nINFO: Storing subsystem confi=
g:
> /var/lib/pki/pki-tom
> cat/ca/conf/CS.cfg\nINFO: Storing registry config:
> /var/lib/pki/pki-tomcat/ca/conf/registry.cfg\nINFO: Selftests enabled for
> subsystems: ca\nINFO: Restori
> ng LDAP connection for CA\nINFO: Storing subsystem config:
> /var/lib/pki/pki-tomcat/ca/conf/CS.cfg\nINFO: Storing registry config:
> /var/lib/pki/pki-tomcat/
> ca/conf/registry.cfg\nERROR: Failed to generate CA-signed temp SSL
> certificate. RC: 255\n")
> The ipa-cert-fix command failed.
>
> ```
>
>
> > If you have a backup of the previous http/ldap certs you can put them
> back
> > in place.
>
> Unfortunately, I don't have these anymore.
>
>
> However, I tried the approach I described above on a copy of the data in
> another container, managed to install temporary certs/CA for the ldap/htt=
pd
> servers, pki-tomcat seems to be able to establish the connection to the
> LDAP but crashes at the following error.
>
> `Certificate not found: caSigningCert cert-pki-ca`
>
Do you have the IPA CA cert in /etc/pki/pki-tomcat/alias/ and
/etc/ipa/ca.crt ?
>
> Not sure what else needs to be fixed.
>
> On this copy, with the hacked temporary certs, if I run `ipa-cert-fix` I
> get the same error as on the original instance. If I run the `pki-server
> cert-fix` command that crashes, but removing `--cert sslserver`, it goes a
> bit further but is still blocked by `pki-tomcat` not being able to start.
>
You can also try to run the pki-server cert-fix command with the additional
arguments --verbose --debug, it may provide you with more information.
flo
>
> Thanks for all the help.
> --
> _______________________________________________
> FreeIPA-users mailing list -- freeipa-users(a)lists.fedorahosted.org
> To unsubscribe send an email to freeipa-users-leave(a)lists.fedorahosted.=
org
> Fedora Code of Conduct:
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives:
> https://lists.fedorahosted.org/archives/list/freeipa-users(a)lists.fedora=
hosted.org
> Do not reply to spam, report it:
> https://pagure.io/fedora-infrastructure/new_issue
>
--===============3899993962837828058==
Content-Type: text/html
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="attachment.html"
PGRpdiBkaXI9Imx0ciI+PGRpdiBkaXI9Imx0ciI+PGRpdiBjbGFzcz0iZ21haWxfZGVmYXVsdCIg
c3R5bGU9ImZvbnQtZmFtaWx5OmFyaWFsLHNhbnMtc2VyaWYiPkhpLDwvZGl2PjwvZGl2Pjxicj48
ZGl2IGNsYXNzPSJnbWFpbF9xdW90ZSI+PGRpdiBkaXI9Imx0ciIgY2xhc3M9ImdtYWlsX2F0dHIi
Pk9uIEZyaSwgQXByIDE5LCAyMDI0IGF0IDY6MjDigK9QTSBCYXNpbGUgUGluc2FyZCB2aWEgRnJl
ZUlQQS11c2VycyAmbHQ7PGEgaHJlZj0ibWFpbHRvOmZyZWVpcGEtdXNlcnNAbGlzdHMuZmVkb3Jh
aG9zdGVkLm9yZyI+ZnJlZWlwYS11c2Vyc0BsaXN0cy5mZWRvcmFob3N0ZWQub3JnPC9hPiZndDsg
d3JvdGU6PGJyPjwvZGl2PjxibG9ja3F1b3RlIGNsYXNzPSJnbWFpbF9xdW90ZSIgc3R5bGU9Im1h
cmdpbjowcHggMHB4IDBweCAwLjhleDtib3JkZXItbGVmdDoxcHggc29saWQgcmdiKDIwNCwyMDQs
MjA0KTtwYWRkaW5nLWxlZnQ6MWV4Ij5IaSEgPGJyPgo8YnI+CkhlcmUgaXMgdGhlIG91dHB1dCBv
ZiBpcGEtY2VydC1maXggb24gdGhlIG9yaWdpbmFsIGluc3RhbmNlOjxicj4KPGJyPgpgYGA8YnI+
Cjxicj4KVGhlIGZvbGxvd2luZyBjZXJ0aWZpY2F0ZXMgd2lsbCBiZSByZW5ld2VkOjxicj4KPGJy
PgpEb2d0YWcgc3Nsc2VydmVyIGNlcnRpZmljYXRlOjxicj4KwqAgU3ViamVjdDogQ049PGEgaHJl
Zj0iaHR0cDovL2lwYS5ET01BSU4uQ09NIiByZWw9Im5vcmVmZXJyZXIiIHRhcmdldD0iX2JsYW5r
Ij5pcGEuRE9NQUlOLkNPTTwvYT4sTz08YSBocmVmPSJodHRwOi8vRE9NQUlOLkNPTSIgcmVsPSJu
b3JlZmVycmVyIiB0YXJnZXQ9Il9ibGFuayI+RE9NQUlOLkNPTTwvYT48YnI+CsKgIFNlcmlhbDrC
oCAzPGJyPgrCoCBFeHBpcmVzOiAyMDI0LTAzLTE5IDIwOjM2OjI1PGJyPgo8YnI+CkRvZ3RhZyBz
dWJzeXN0ZW0gY2VydGlmaWNhdGU6PGJyPgrCoCBTdWJqZWN0OiBDTj1DQSBTdWJzeXN0ZW0sTz08
YSBocmVmPSJodHRwOi8vRE9NQUlOLkNPTSIgcmVsPSJub3JlZmVycmVyIiB0YXJnZXQ9Il9ibGFu
ayI+RE9NQUlOLkNPTTwvYT48YnI+CsKgIFNlcmlhbDrCoCA0PGJyPgrCoCBFeHBpcmVzOiAyMDI0
LTAzLTE5IDIwOjM2OjI3PGJyPgo8YnI+CkRvZ3RhZyBjYV9vY3NwX3NpZ25pbmcgY2VydGlmaWNh
dGU6PGJyPgrCoCBTdWJqZWN0OiBDTj1PQ1NQIFN1YnN5c3RlbSxPPTxhIGhyZWY9Imh0dHA6Ly9E
T01BSU4uQ09NIiByZWw9Im5vcmVmZXJyZXIiIHRhcmdldD0iX2JsYW5rIj5ET01BSU4uQ09NPC9h
Pjxicj4KwqAgU2VyaWFsOsKgIDI8YnI+CsKgIEV4cGlyZXM6IDIwMjQtMDMtMTkgMjA6MzY6MjQ8
YnI+Cjxicj4KRG9ndGFnIGNhX2F1ZGl0X3NpZ25pbmcgY2VydGlmaWNhdGU6PGJyPgrCoCBTdWJq
ZWN0OiBDTj1DQSBBdWRpdCxPPTxhIGhyZWY9Imh0dHA6Ly9ET01BSU4uQ09NIiByZWw9Im5vcmVm
ZXJyZXIiIHRhcmdldD0iX2JsYW5rIj5ET01BSU4uQ09NPC9hPjxicj4KwqAgU2VyaWFsOsKgIDU8
YnI+CsKgIEV4cGlyZXM6IDIwMjQtMDMtMTkgMjA6MzY6MzA8YnI+Cjxicj4KSVBBIElQQSBSQSBj
ZXJ0aWZpY2F0ZTo8YnI+CsKgIFN1YmplY3Q6IENOPUlQQSBSQSxPPTxhIGhyZWY9Imh0dHA6Ly9E
T01BSU4uQ09NIiByZWw9Im5vcmVmZXJyZXIiIHRhcmdldD0iX2JsYW5rIj5ET01BSU4uQ09NPC9h
Pjxicj4KwqAgU2VyaWFsOsKgIDc8YnI+CsKgIEV4cGlyZXM6IDIwMjQtMDMtMTkgMjA6Mzg6MTk8
YnI+Cjxicj4KSVBBIEtEQyBjZXJ0aWZpY2F0ZTo8YnI+CsKgIFN1YmplY3Q6IENOPTxhIGhyZWY9
Imh0dHA6Ly9pcGEuRE9NQUlOLkNPTSIgcmVsPSJub3JlZmVycmVyIiB0YXJnZXQ9Il9ibGFuayI+
aXBhLkRPTUFJTi5DT008L2E+LE89PGEgaHJlZj0iaHR0cDovL0RPTUFJTi5DT00iIHJlbD0ibm9y
ZWZlcnJlciIgdGFyZ2V0PSJfYmxhbmsiPkRPTUFJTi5DT008L2E+PGJyPgrCoCBTZXJpYWw6wqAg
MTA8YnI+CsKgIEV4cGlyZXM6IDIwMjQtMDMtMzAgMjA6NDA6Mjc8YnI+Cjxicj4KRW50ZXIgJnF1
b3Q7eWVzJnF1b3Q7IHRvIHByb2NlZWQ6IHllczxicj4KUHJvY2VlZGluZy48YnI+CkNhbGxlZFBy
b2Nlc3NFcnJvcihDb21tYW5kIFsmIzM5O3BraS1zZXJ2ZXImIzM5OywgJiMzOTtjZXJ0LWZpeCYj
Mzk7LCAmIzM5Oy0tbGRhcGktc29ja2V0JiMzOTssICYjMzk7L3J1bi9zbGFwZC1ET01BSU4tQ09N
LnNvY2tldCYjMzk7LCAmIzM5Oy0tYWdlbnQtdWlkJiMzOTssICYjMzk7aXBhcmEmIzM5OywgJiMz
OTstLWNlcnQmIzM5OywgJiMzOTtzc2xzZXJ2ZXImIzM5Ozxicj4KLCAmIzM5Oy0tY2VydCYjMzk7
LCAmIzM5O3N1YnN5c3RlbSYjMzk7LCAmIzM5Oy0tY2VydCYjMzk7LCAmIzM5O2NhX29jc3Bfc2ln
bmluZyYjMzk7LCAmIzM5Oy0tY2VydCYjMzk7LCAmIzM5O2NhX2F1ZGl0X3NpZ25pbmcmIzM5Oywg
JiMzOTstLWV4dHJhLWNlcnQmIzM5OywgJiMzOTs3JiMzOTssICYjMzk7LS1leHRyYS1jZXJ0JiMz
OTssICYjMzk7MTAmIzM5O10gcmV0dXJuZWQgbm9uLXplcm8gZXhpdCBzdGF0PGJyPgp1cyAxOiAm
cXVvdDtJTkZPOiBMb2FkaW5nIGluc3RhbmNlOiBwa2ktdG9tY2F0XG5JTkZPOiBMb2FkaW5nIGds
b2JhbCBUb21jYXQgY29uZmlnOiAvZXRjL3RvbWNhdC90b21jYXQuY29uZlxuSU5GTzogTG9hZGlu
ZyBQS0kgVG9tY2F0IGNvbmZpZzogL3Vzci9zaGFyZS9wa2kvZXQ8YnI+CmMvdG9tY2F0LmNvbmZc
bklORk86IExvYWRpbmcgaW5zdGFuY2UgVG9tY2F0IGNvbmZpZzogL2V0Yy9wa2kvcGtpLXRvbWNh
dC90b21jYXQuY29uZlxuSU5GTzogTG9hZGluZyBwYXNzd29yZCBjb25maWc6IC9ldGMvcGtpL3Br
aS10b21jYXQvcGFzc3dvcmQuY29uZlxuSU48YnI+CkZPOiBMb2FkaW5nIHN1YnN5c3RlbSBjb25m
aWc6IC92YXIvbGliL3BraS9wa2ktdG9tY2F0L2NhL2NvbmYvQ1MuY2ZnXG5JTkZPOiBMb2FkaW5n
IHN1YnN5c3RlbSByZWdpc3RyeTogL3Zhci9saWIvcGtpL3BraS10b21jYXQvY2EvY29uZi9yZWdp
c3RyeS5jZmdcbklORk88YnI+CjogTG9hZGluZyBpbnN0YW5jZSByZWdpc3RyeTogL2V0Yy9zeXNj
b25maWcvcGtpL3RvbWNhdC9wa2ktdG9tY2F0L3BraS10b21jYXRcbklORk86IEZpeGluZyB0aGUg
Zm9sbG93aW5nIHN5c3RlbSBjZXJ0czogWyYjMzk7c3Nsc2VydmVyJiMzOTssICYjMzk7c3Vic3lz
dGVtJiMzOTssICYjMzk7Y2Ffb2NzcDxicj4KX3NpZ25pbmcmIzM5OywgJiMzOTtjYV9hdWRpdF9z
aWduaW5nJiMzOTtdXG5JTkZPOiBSZW5ld2luZyB0aGUgZm9sbG93aW5nIGFkZGl0aW9uYWwgY2Vy
dHM6IFsmIzM5OzcmIzM5OywgJiMzOTsxMCYjMzk7XVxuSU5GTzogU3RvcHBpbmcgdGhlIGluc3Rh
bmNlIHRvIHByb2NlZWQgd2l0aCBzeXN0ZW0gY2VydCByZW5ld2E8YnI+CmxcbklORk86IENvbmZp
Z3VyaW5nIExEQVAgY29ubmVjdGlvbiBmb3IgQ0FcbklORk86IFNldHRpbmcgcGtpZGJ1c2VyIHBh
c3N3b3JkIHZpYSBsZGFwcGFzc3dkXG5TQVNML0VYVEVSTkFMIGF1dGhlbnRpY2F0aW9uIHN0YXJ0
ZWRcblNBU0wgdXNlcm5hbWU6IGdpZE51bWI8YnI+CmVyPTArdWlkTnVtYmVyPTAsY249cGVlcmNy
ZWQsY249ZXh0ZXJuYWwsY249YXV0aFxuU0FTTCBTU0Y6IDBcbklORk86IFN0b3Jpbmcgc3Vic3lz
dGVtIGNvbmZpZzogL3Zhci9saWIvcGtpL3BraS10b21jYXQvY2EvY29uZi9DUy5jZmdcbklORk86
IFN0b3JpbmcgcmVnaXM8YnI+CnRyeSBjb25maWc6IC92YXIvbGliL3BraS9wa2ktdG9tY2F0L2Nh
L2NvbmYvcmVnaXN0cnkuY2ZnXG5JTkZPOiBTdG9yaW5nIHN1YnN5c3RlbSBjb25maWc6IC92YXIv
bGliL3BraS9wa2ktdG9tY2F0L2NhL2NvbmYvQ1MuY2ZnXG5JTkZPOiBTdG9yaW5nIHJlZ2lzdHJ5
IGM8YnI+Cm9uZmlnOiAvdmFyL2xpYi9wa2kvcGtpLXRvbWNhdC9jYS9jb25mL3JlZ2lzdHJ5LmNm
Z1xuSU5GTzogU2VsZnRlc3RzIGRpc2FibGVkIGZvciBzdWJzeXN0ZW1zOiBjYVxuU0FTTC9FWFRF
Uk5BTCBhdXRoZW50aWNhdGlvbiBzdGFydGVkXG5TQVNMIHVzZXJuYW1lOiBnaWQ8YnI+Ck51bWJl
cj0wK3VpZE51bWJlcj0wLGNuPXBlZXJjcmVkLGNuPWV4dGVybmFsLGNuPWF1dGhcblNBU0wgU1NG
OiAwXG5JTkZPOiBSZXNldHRpbmcgcGFzc3dvcmQgZm9yIHVpZD1pcGFyYSxvdT1wZW9wbGUsbz1p
cGFjYVxuU0FTTC9FWFRFUk5BTCBhdXRoZW50aWNhdGlvbjxicj4Kc3RhcnRlZFxuU0FTTCB1c2Vy
bmFtZTogZ2lkTnVtYmVyPTArdWlkTnVtYmVyPTAsY249cGVlcmNyZWQsY249ZXh0ZXJuYWwsY249
YXV0aFxuU0FTTCBTU0Y6IDBcbklORk86IENyZWF0aW5nIGEgdGVtcG9yYXJ5IHNzbHNlcnZlciBj
ZXJ0XG5JTkZPOiBHZXR0aW5nIHNzbDxicj4Kc2VydmVyIGNlcnQgaW5mbyBmcm9tIENTLmNmZ1xu
SU5GTzogR2V0dGluZyBzc2xzZXJ2ZXIgY2VydCBpbmZvIGZyb20gTlNTIGRhdGFiYXNlXG5JTkZP
OiBUcnlpbmcgdG8gY3JlYXRlIGEgbmV3IHRlbXAgY2VydCBmb3Igc3Nsc2VydmVyLlxuSU5GTzog
R2VuZXJhdGUgdDxicj4KZW1wIFNTTCBjZXJ0aWZpY2F0ZVxuSU5GTzogR2V0dGluZyBzc2xzZXJ2
ZXIgY2VydCBpbmZvIGZyb20gQ1MuY2ZnXG5JTkZPOiBHZXR0aW5nIHNzbHNlcnZlciBjZXJ0IGlu
Zm8gZnJvbSBOU1MgZGF0YWJhc2VcbklORk86IENTUiBmb3Igc3Nsc2VydmVyIGhhcyBiZWVuPGJy
Pgp3cml0dGVuIHRvIC90bXAvdG1weWR4MDExajgvc3Nsc2VydmVyLmNzclxuSU5GTzogR2V0dGlu
ZyBzaWduaW5nIGNlcnQgaW5mbyBmcm9tIENTLmNmZ1xuSU5GTzogR2V0dGluZyBzaWduaW5nIGNl
cnQgaW5mbyBmcm9tIE5TUyBkYXRhYmFzZVxuSU5GTzogQ0EgY2VydCB3PGJyPgpyaXR0ZW4gdG8g
L3RtcC90bXB5ZHgwMTFqOC9jYV9jZXJ0aWZpY2F0ZS5jcnRcbklORk86IEFLSTogMHg3QTBEMjND
NkExMjgzRUI4OTlBMEU1QTRFRkEzRjkyMDQyRjdGNkQwXG5JTkZPOiBTdG9yaW5nIHN1YnN5c3Rl
bSBjb25maWc6IC92YXIvbGliL3BraS9wa2ktdG9tPGJyPgpjYXQvY2EvY29uZi9DUy5jZmdcbklO
Rk86IFN0b3JpbmcgcmVnaXN0cnkgY29uZmlnOiAvdmFyL2xpYi9wa2kvcGtpLXRvbWNhdC9jYS9j
b25mL3JlZ2lzdHJ5LmNmZ1xuSU5GTzogU2VsZnRlc3RzIGVuYWJsZWQgZm9yIHN1YnN5c3RlbXM6
IGNhXG5JTkZPOiBSZXN0b3JpPGJyPgpuZyBMREFQIGNvbm5lY3Rpb24gZm9yIENBXG5JTkZPOiBT
dG9yaW5nIHN1YnN5c3RlbSBjb25maWc6IC92YXIvbGliL3BraS9wa2ktdG9tY2F0L2NhL2NvbmYv
Q1MuY2ZnXG5JTkZPOiBTdG9yaW5nIHJlZ2lzdHJ5IGNvbmZpZzogL3Zhci9saWIvcGtpL3BraS10
b21jYXQvPGJyPgpjYS9jb25mL3JlZ2lzdHJ5LmNmZ1xuRVJST1I6IEZhaWxlZCB0byBnZW5lcmF0
ZSBDQS1zaWduZWQgdGVtcCBTU0wgY2VydGlmaWNhdGUuIFJDOiAyNTVcbiZxdW90Oyk8YnI+ClRo
ZSBpcGEtY2VydC1maXggY29tbWFuZCBmYWlsZWQuPGJyPgo8YnI+CmBgYDxicj4KPGJyPgo8YnI+
CiZndDsgSWYgeW91IGhhdmUgYSBiYWNrdXAgb2YgdGhlIHByZXZpb3VzIGh0dHAvbGRhcCBjZXJ0
cyB5b3UgY2FuIHB1dCB0aGVtIGJhY2s8YnI+CiZndDsgaW4gcGxhY2UuPGJyPgo8YnI+ClVuZm9y
dHVuYXRlbHksIEkgZG9uJiMzOTt0IGhhdmUgdGhlc2UgYW55bW9yZS48YnI+Cjxicj4KPGJyPgpI
b3dldmVyLCBJIHRyaWVkIHRoZSBhcHByb2FjaCBJIGRlc2NyaWJlZCBhYm92ZSBvbiBhIGNvcHkg
b2YgdGhlIGRhdGEgaW4gYW5vdGhlciBjb250YWluZXIsIG1hbmFnZWQgdG8gaW5zdGFsbCB0ZW1w
b3JhcnkgY2VydHMvQ0EgZm9yIHRoZSBsZGFwL2h0dHBkIHNlcnZlcnMsIHBraS10b21jYXQgc2Vl
bXMgdG8gYmUgYWJsZSB0byBlc3RhYmxpc2ggdGhlIGNvbm5lY3Rpb24gdG8gdGhlIExEQVAgYnV0
IGNyYXNoZXMgYXQgdGhlIGZvbGxvd2luZyBlcnJvci4gPGJyPgo8YnI+CmBDZXJ0aWZpY2F0ZSBu
b3QgZm91bmQ6IGNhU2lnbmluZ0NlcnQgY2VydC1wa2ktY2FgPGJyPjwvYmxvY2txdW90ZT48ZGl2
PjxzcGFuIGNsYXNzPSJnbWFpbF9kZWZhdWx0IiBzdHlsZT0iZm9udC1mYW1pbHk6YXJpYWwsc2Fu
cy1zZXJpZiI+RG8geW91IGhhdmUgdGhlIElQQSBDQSBjZXJ0IGluwqA8L3NwYW4+wqAvZXRjL3Br
aS9wa2ktdG9tY2F0L2FsaWFzLzxzcGFuIGNsYXNzPSJnbWFpbF9kZWZhdWx0IiBzdHlsZT0iZm9u
dC1mYW1pbHk6YXJpYWwsc2Fucy1zZXJpZiI+IGFuZCAvZXRjL2lwYS9jYS5jcnQgPzwvc3Bhbj48
L2Rpdj48YmxvY2txdW90ZSBjbGFzcz0iZ21haWxfcXVvdGUiIHN0eWxlPSJtYXJnaW46MHB4IDBw
eCAwcHggMC44ZXg7Ym9yZGVyLWxlZnQ6MXB4IHNvbGlkIHJnYigyMDQsMjA0LDIwNCk7cGFkZGlu
Zy1sZWZ0OjFleCI+Cjxicj4KTm90IHN1cmUgd2hhdCBlbHNlIG5lZWRzIHRvIGJlIGZpeGVkLjxi
cj4KPGJyPgpPbiB0aGlzIGNvcHksIHdpdGggdGhlIGhhY2tlZCB0ZW1wb3JhcnkgY2VydHMsIGlm
IEkgcnVuIGBpcGEtY2VydC1maXhgIEkgZ2V0IHRoZSBzYW1lIGVycm9yIGFzIG9uIHRoZSBvcmln
aW5hbCBpbnN0YW5jZS4gSWYgSSBydW4gdGhlIGBwa2ktc2VydmVyIGNlcnQtZml4YCBjb21tYW5k
IHRoYXQgY3Jhc2hlcywgYnV0IHJlbW92aW5nIGAtLWNlcnQgc3Nsc2VydmVyYCwgaXQgZ29lcyBh
IGJpdCBmdXJ0aGVyIGJ1dCBpcyBzdGlsbCBibG9ja2VkIGJ5IGBwa2ktdG9tY2F0YCBub3QgYmVp
bmcgYWJsZSB0byBzdGFydC48YnI+PC9ibG9ja3F1b3RlPjxkaXY+PHNwYW4gY2xhc3M9ImdtYWls
X2RlZmF1bHQiIHN0eWxlPSJmb250LWZhbWlseTphcmlhbCxzYW5zLXNlcmlmIj5Zb3UgY2FuIGFs
c28gdHJ5IHRvIHJ1biB0aGUgcGtpLXNlcnZlciBjZXJ0LWZpeCBjb21tYW5kIHdpdGggdGhlIGFk
ZGl0aW9uYWwgYXJndW1lbnRzIC0tdmVyYm9zZSAtLWRlYnVnLCBpdCBtYXkgcHJvdmlkZSB5b3Ug
d2l0aCBtb3JlIGluZm9ybWF0aW9uLjwvc3Bhbj48L2Rpdj48ZGl2PjxzcGFuIGNsYXNzPSJnbWFp
bF9kZWZhdWx0IiBzdHlsZT0iZm9udC1mYW1pbHk6YXJpYWwsc2Fucy1zZXJpZiI+ZmxvPC9zcGFu
PjwvZGl2PjxkaXY+wqA8L2Rpdj48YmxvY2txdW90ZSBjbGFzcz0iZ21haWxfcXVvdGUiIHN0eWxl
PSJtYXJnaW46MHB4IDBweCAwcHggMC44ZXg7Ym9yZGVyLWxlZnQ6MXB4IHNvbGlkIHJnYigyMDQs
MjA0LDIwNCk7cGFkZGluZy1sZWZ0OjFleCI+Cjxicj4KVGhhbmtzIGZvciBhbGwgdGhlIGhlbHAu
IDxicj4KLS08YnI+Cl9fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fPGJyPgpGcmVlSVBBLXVzZXJzIG1haWxpbmcgbGlzdCAtLSA8YSBocmVmPSJtYWlsdG86ZnJl
ZWlwYS11c2Vyc0BsaXN0cy5mZWRvcmFob3N0ZWQub3JnIiB0YXJnZXQ9Il9ibGFuayI+ZnJlZWlw
YS11c2Vyc0BsaXN0cy5mZWRvcmFob3N0ZWQub3JnPC9hPjxicj4KVG8gdW5zdWJzY3JpYmUgc2Vu
ZCBhbiBlbWFpbCB0byA8YSBocmVmPSJtYWlsdG86ZnJlZWlwYS11c2Vycy1sZWF2ZUBsaXN0cy5m
ZWRvcmFob3N0ZWQub3JnIiB0YXJnZXQ9Il9ibGFuayI+ZnJlZWlwYS11c2Vycy1sZWF2ZUBsaXN0
cy5mZWRvcmFob3N0ZWQub3JnPC9hPjxicj4KRmVkb3JhIENvZGUgb2YgQ29uZHVjdDogPGEgaHJl
Zj0iaHR0cHM6Ly9kb2NzLmZlZG9yYXByb2plY3Qub3JnL2VuLVVTL3Byb2plY3QvY29kZS1vZi1j
b25kdWN0LyIgcmVsPSJub3JlZmVycmVyIiB0YXJnZXQ9Il9ibGFuayI+aHR0cHM6Ly9kb2NzLmZl
ZG9yYXByb2plY3Qub3JnL2VuLVVTL3Byb2plY3QvY29kZS1vZi1jb25kdWN0LzwvYT48YnI+Ckxp
c3QgR3VpZGVsaW5lczogPGEgaHJlZj0iaHR0cHM6Ly9mZWRvcmFwcm9qZWN0Lm9yZy93aWtpL01h
aWxpbmdfbGlzdF9ndWlkZWxpbmVzIiByZWw9Im5vcmVmZXJyZXIiIHRhcmdldD0iX2JsYW5rIj5o
dHRwczovL2ZlZG9yYXByb2plY3Qub3JnL3dpa2kvTWFpbGluZ19saXN0X2d1aWRlbGluZXM8L2E+
PGJyPgpMaXN0IEFyY2hpdmVzOiA8YSBocmVmPSJodHRwczovL2xpc3RzLmZlZG9yYWhvc3RlZC5v
cmcvYXJjaGl2ZXMvbGlzdC9mcmVlaXBhLXVzZXJzQGxpc3RzLmZlZG9yYWhvc3RlZC5vcmciIHJl
bD0ibm9yZWZlcnJlciIgdGFyZ2V0PSJfYmxhbmsiPmh0dHBzOi8vbGlzdHMuZmVkb3JhaG9zdGVk
Lm9yZy9hcmNoaXZlcy9saXN0L2ZyZWVpcGEtdXNlcnNAbGlzdHMuZmVkb3JhaG9zdGVkLm9yZzwv
YT48YnI+CkRvIG5vdCByZXBseSB0byBzcGFtLCByZXBvcnQgaXQ6IDxhIGhyZWY9Imh0dHBzOi8v
cGFndXJlLmlvL2ZlZG9yYS1pbmZyYXN0cnVjdHVyZS9uZXdfaXNzdWUiIHJlbD0ibm9yZWZlcnJl
ciIgdGFyZ2V0PSJfYmxhbmsiPmh0dHBzOi8vcGFndXJlLmlvL2ZlZG9yYS1pbmZyYXN0cnVjdHVy
ZS9uZXdfaXNzdWU8L2E+PGJyPgo8L2Jsb2NrcXVvdGU+PC9kaXY+PC9kaXY+Cg==
--===============3899993962837828058==--
From gladia2r at gmail.com Tue Apr 23 07:53:38 2024
Content-Type: multipart/mixed; boundary="===============1644956592551744684=="
MIME-Version: 1.0
From: Lee Csk
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] LDAP conflicts after yum update on Almalinux 8.9
Date: Tue, 23 Apr 2024 07:53:28 +0000
Message-ID: <20240423075328.457.26512@mailman01.iad2.fedoraproject.org>
--===============1644956592551744684==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
After performing a usual Yum update's on multiple IPA servers (not at the s=
ame time, one server reportedly started hanging), we started observing "LDA=
P Conflicts" in multiple IPA replication servers:
az2-replica.noc.net
| LDAP Conflicts | 9 | FAIL |
mi2-replica.noc.net:
| LDAP Conflicts | 9 | FAIL |
mi1-replica.noc.net:
| LDAP Conflicts | 9 | FAIL |
az1-replica.noc.net:
| LDAP Conflicts | 10 | FAIL |
sg1-replicate.noc.net:
| LDAP Conflicts | 3 | FAIL |
sg2-replica.noc.net
| LDAP Conflicts | 3 | FAIL |
The "Replication status" while reports OK, we observe also flapping at time=
s between OK and FAIL too.
We have tried to follow on one of the replication servers: https://access.r=
edhat.com/documentation/en-us/red_hat_directory_server/11/html/administrati=
on_guide/managing_replication-solving_common_replication_conflicts#Solving_=
Common_Replication_Conflicts-Solving_Orphan_Entry_Conflicts
- by removing the orphan entry, however the replication broke completely on=
it (ipa service couldn't start back up), requiring a full re-install of th=
at specific replica.
]$ sudo -u admin /home/admin/.local/bin/cipa -H localhost |grep "LDAP Confl=
icts"
| LDAP Conflicts | 0 | OK |
$ dsconf -D "cn=3DDirectory Manager" ldap://$(hostname) repl-conflict list-=
glue "dc=3Dnoc,dc=3Dnet"
Enter password for cn=3DDirectory Manager on ldap://az1-replica.noc.net: =
dn: cn=3Dsg1-replica.noc.net,cn=3Dmasters,cn=3Dipa,cn=3Detc,dc=3Dnoc,dc=3Dn=
et
cn: sg1-replica.noc.net
ipaLocation: idnsname=3Dsingapore,cn=3Dlocations,cn=3Detc,dc=3Dnoc,dc=3Dnet
ipaMaxDomainLevel: 1
ipaMinDomainLevel: 1
ipaReplTopoManagedSuffix: dc=3Dnoc,dc=3Dnet
nsds5replconflict: deletedEntryHasChildren
objectClass: top
objectClass: nsContainer
objectClass: ipaReplTopoManagedServer
objectClass: ipaConfigObject
objectClass: ipaSupportedDomainLevelConfig
objectClass: ipalocationmember
objectClass: extensibleobject
objectClass: glue
$ ldapsearch -H ldaps://$(hostname) -W -D 'cn=3DDirectory Manager' '(&(obje=
ctClass=3DldapSubEntry)(nsds5ReplConflict=3D*))' nsds5ReplConflict
Enter LDAP Password: =
# extended LDIF
#
# LDAPv3
# base (default) with scope subtree
# filter: (&(objectClass=3DldapSubEntry)(nsds5ReplConflict=3D*))
# requesting: nsds5ReplConflict =
#
# sg1-replica.noc.net + 039c4293-257f11ed-a255f732-cfd01100, masters, ipa, =
etc, noc.net
dn: cn=3Dsg1-replica.noc.net+nsuniqueid=3D039c4293-257f11ed-a255f732-cfd011=
00,cn=3Dmasters,cn=3Dipa,cn=3Detc,dc=3Dnoc,dc=3Dnet
nsds5ReplConflict: namingConflict (ADD) cn=3Dsg1-replica.noc.net,cn=3Dmaste=
rs,cn=3Dipa,cn=3Detc,dc=3Dnoc,dc=3Dnet
# HTTP/mi1-replica.noc.net(a)noc.NET + 0264df8b-fca611ee-a3cba8b9-8a6b8039,=
services, accounts, noc.net
dn: krbprincipalname=3DHTTP/mi1-replica.noc.net(a)NOC.NET+nsuniqueid=3D0264=
df8b-fca611ee-a3cba8b9-8a6b8039,cn=3Dservices,cn=3Daccounts,dc=3Dnoc,dc=3Dn=
et
nsds5ReplConflict: namingConflict (ADD) krbprincipalname=3Dhttp/mi1-ipaca.n=
oc.net(a)noc.net,cn=3Dservices,cn=3Daccounts,dc=3Dnoc,dc=3Dnet
# search result
search: 2
result: 0 Success
# numResponses: 3
# numEntries: 2
OR:
az1-replica.noc.net:/$ ldapsearch -H ldap://$(hostname) -D "cn=3DDirectory =
Manager" -W -b "dc=3Dnoc,dc=3Dnet" "(&(objectClass=3DldapSubEntry)(nsds5Rep=
lConflict=3D*))" \* nsds5ReplConflict
Enter LDAP Password: =
# extended LDIF
#
# LDAPv3
# base with scope subtree
# filter: (&(objectClass=3DldapSubEntry)(nsds5ReplConflict=3D*))
# requesting: * nsds5ReplConflict =
#
# sg1-replica.noc.net + 039c4293-257f11ed-a255f732-cfd01100, masters, ipa,
etc, noc.net
dn: cn=3Dsg1-replica.noc.net+nsuniqueid=3D039c4293-257f11ed-a255f732-cfd011=
00
,cn=3Dmasters,cn=3Dipa,cn=3Detc,dc=3Dnoc,dc=3Dnet
ipaLocation: idnsname=3Dsingapore,cn=3Dlocations,cn=3Detc,dc=3Dnoc,dc=3Dnet
objectClass: top
objectClass: nsContainer
objectClass: ipaReplTopoManagedServer
objectClass: ipaConfigObject
objectClass: ipaSupportedDomainLevelConfig
objectClass: ldapsubentry
objectClass: ipalocationmember
cn: sg1-replica.noc.net
ipaReplTopoManagedSuffix: dc=3Dnoc,dc=3Dnet
ipaMinDomainLevel: 1
ipaMaxDomainLevel: 1
nsds5ReplConflict: namingConflict (ADD) cn=3Dsg1-replica.noc.net,cn=3Dmaste=
rs
,cn=3Dipa,cn=3Detc,dc=3Dnoc,dc=3Dnet
# search result
search: 2
result: 0 Success
# numResponses: 2
# numEntries: 1
We expect: | LDAP Conflicts | 0 | OK |
Running versions:
ipa-server-4.9.12-14.module_el8.9.0+3785+2238a12a.alma.1.x86_64
ipa-client-4.9.12-14.module_el8.9.0+3785+2238a12a.alma.1.x86_64
389-ds-base-1.4.3.37-2.module_el8.9.0+3710+3183c30a.alma.1.x86_64
krb5-server-1.18.2-26.el8_9.x86_64
The yum update happened from:
ipa-server-4.9.12-11.module_el8.9.0+3715+e4197dc9.alma.1.x86_64
to:
ipa-server-4.9.12-14.module_el8.9.0+3785+2238a12a.alma.1.x86_64
Please advise, how its best to resolve these "LDAP Conflicts".
How to remove, or retain if its the case?
Thanks,
Lee
--===============1644956592551744684==--
From abokovoy at redhat.com Tue Apr 23 08:19:01 2024
Content-Type: multipart/mixed; boundary="===============7390503135100346437=="
MIME-Version: 1.0
From: Alexander Bokovoy
To: freeipa-users at lists.fedorahosted.org
Subject: =?utf-8?q?=5BFreeipa-users=5D_Re=3A_Question_regarding_=E2=80=9CSamba__on?=
=?utf-8?q?_an_IdM_domain_member=E2=80=9D?=
Date: Tue, 23 Apr 2024 11:18:42 +0300
Message-ID:
In-Reply-To: etPan.66266c11.2b3251af.a99@gmx.net
--===============7390503135100346437==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
On =D0=9F=D0=B0=D0=BD, 22 =D0=BA=D1=80=D0=B0 2024, Thomas Handler via FreeI=
PA-users wrote:
>
>Hello,
>
>beginning of March I have received support running=C2=A0Samba on an IdM
>domain member from Alexander. Back then my problem was what Alexander
>pinpoints in his
>text=C2=A0https://vda.li/en/posts/2019/03/24/Kerberos-host-to-realm-transl=
ation/=C2=A0under
>"Mixed realm deployments=E2=80=9D where the Linux machine running Samba wa=
s in
>the wrong DNS zone.
>
>After having fixed this things are running fine.
>
>Now it came as it already was obvious back then and what is well noted
>already in the RedHat
>Docs=C2=A0https://access.redhat.com/documentation/en-en/red_hat_enterprise=
_linux/9/html/using_external_red_hat_utilities_with_identity_management/set=
ting-up-samba-on-an-idm-domain-member_using-external-red-hat-utilities-with=
-idm=C2=A0where
>is stated =E2=80=9CAD users logged into a Windows machine can not access S=
amba
>shares hosted on an IdM domain member=E2=80=9D.
>
>So the customer has now stumbled exactly over this and I just wanted to
>confirm that my understanding of this section in the docs is correct
>and that there=E2=80=99s no way to ensure that an AD user on a Windows mac=
hine
>can access the shares on the Samba machine joined to IdM.=C2=A0
Short answer: yes, the documentation is up to date.
-- =
/ Alexander Bokovoy
Sr. Principal Software Engineer
Security / Identity Management Engineering
Red Hat Limited, Finland
--===============7390503135100346437==--
From flo at redhat.com Tue Apr 23 08:19:23 2024
Content-Type: multipart/mixed; boundary="===============1285815130535106453=="
MIME-Version: 1.0
From: Florence Blanc-Renaud
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: LDAP conflicts after yum update on Almalinux 8.9
Date: Tue, 23 Apr 2024 10:18:55 +0200
Message-ID:
In-Reply-To: 20240423075328.457.26512@mailman01.iad2.fedoraproject.org
--===============1285815130535106453==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Hi,
On Tue, Apr 23, 2024 at 9:53=E2=80=AFAM Lee Csk via FreeIPA-users <
freeipa-users(a)lists.fedorahosted.org> wrote:
> After performing a usual Yum update's on multiple IPA servers (not at the
> same time, one server reportedly started hanging), we started observing
> "LDAP Conflicts" in multiple IPA replication servers:
>
> az2-replica.noc.net
> | LDAP Conflicts | 9 | FAIL |
> mi2-replica.noc.net:
> | LDAP Conflicts | 9 | FAIL |
> mi1-replica.noc.net:
> | LDAP Conflicts | 9 | FAIL |
> az1-replica.noc.net:
> | LDAP Conflicts | 10 | FAIL |
> sg1-replicate.noc.net:
> | LDAP Conflicts | 3 | FAIL |
> sg2-replica.noc.net
> | LDAP Conflicts | 3 | FAIL |
>
> The "Replication status" while reports OK, we observe also flapping at
> times between OK and FAIL too.
>
> We have tried to follow on one of the replication servers:
> https://access.redhat.com/documentation/en-us/red_hat_directory_server/11=
/html/administration_guide/managing_replication-solving_common_replication_=
conflicts#Solving_Common_Replication_Conflicts-Solving_Orphan_Entry_Conflic=
ts
> - by removing the orphan entry, however the replication broke completely
> on it (ipa service couldn't start back up), requiring a full re-install of
> that specific replica.
>
> ]$ sudo -u admin /home/admin/.local/bin/cipa -H localhost |grep "LDAP
> Conflicts"
> | LDAP Conflicts | 0 | OK |
>
> $ dsconf -D "cn=3DDirectory Manager" ldap://$(hostname) repl-conflict
> list-glue "dc=3Dnoc,dc=3Dnet"
> Enter password for cn=3DDirectory Manager on ldap://az1-replica.noc.net:
> dn: cn=3Dsg1-replica.noc.net,cn=3Dmasters,cn=3Dipa,cn=3Detc,dc=3Dnoc,dc=
=3Dnet
> cn: sg1-replica.noc.net
> ipaLocation: idnsname=3Dsingapore,cn=3Dlocations,cn=3Detc,dc=3Dnoc,dc=3Dn=
et
> ipaMaxDomainLevel: 1
> ipaMinDomainLevel: 1
> ipaReplTopoManagedSuffix: dc=3Dnoc,dc=3Dnet
> nsds5replconflict: deletedEntryHasChildren
> objectClass: top
> objectClass: nsContainer
> objectClass: ipaReplTopoManagedServer
> objectClass: ipaConfigObject
> objectClass: ipaSupportedDomainLevelConfig
> objectClass: ipalocationmember
> objectClass: extensibleobject
> objectClass: glue
>
> $ ldapsearch -H ldaps://$(hostname) -W -D 'cn=3DDirectory Manager'
> '(&(objectClass=3DldapSubEntry)(nsds5ReplConflict=3D*))' nsds5ReplConflict
> Enter LDAP Password:
> # extended LDIF
> #
> # LDAPv3
> # base (default) with scope subtree
> # filter: (&(objectClass=3DldapSubEntry)(nsds5ReplConflict=3D*))
> # requesting: nsds5ReplConflict
> #
>
> # sg1-replica.noc.net + 039c4293-257f11ed-a255f732-cfd01100, masters,
> ipa, etc, noc.net
> dn: cn=3Dsg1-replica.noc.net
> +nsuniqueid=3D039c4293-257f11ed-a255f732-cfd01100,cn=3Dmasters,cn=3Dipa,c=
n=3Detc,dc=3Dnoc,dc=3Dnet
> nsds5ReplConflict: namingConflict (ADD) cn=3Dsg1-replica.noc.net
> ,cn=3Dmasters,cn=3Dipa,cn=3Detc,dc=3Dnoc,dc=3Dnet
>
> # HTTP/mi1-replica.noc.net(a)noc.NET +
> 0264df8b-fca611ee-a3cba8b9-8a6b8039,services, accounts, noc.net
> dn: krbprincipalname=3DHTTP/mi1-replica.noc.net(a)NOC.NET
> +nsuniqueid=3D0264df8b-fca611ee-a3cba8b9-8a6b8039,cn=3Dservices,cn=3Dacco=
unts,dc=3Dnoc,dc=3Dnet
> nsds5ReplConflict: namingConflict (ADD) krbprincipalname=3Dhttp/
> mi1-ipaca.noc.net(a)noc.net,cn=3Dservices,cn=3Daccounts,dc=3Dnoc,dc=3Dnet
>
> # search result
> search: 2
> result: 0 Success
>
> # numResponses: 3
> # numEntries: 2
>
> OR:
>
> az1-replica.noc.net:/$ ldapsearch -H ldap://$(hostname) -D "cn=3DDirectory
> Manager" -W -b "dc=3Dnoc,dc=3Dnet"
> "(&(objectClass=3DldapSubEntry)(nsds5ReplConflict=3D*))" \* nsds5ReplConf=
lict
> Enter LDAP Password:
> # extended LDIF
> #
> # LDAPv3
> # base with scope subtree
> # filter: (&(objectClass=3DldapSubEntry)(nsds5ReplConflict=3D*))
> # requesting: * nsds5ReplConflict
> #
>
> # sg1-replica.noc.net + 039c4293-257f11ed-a255f732-cfd01100, masters, ipa,
> etc, noc.net
> dn: cn=3Dsg1-replica.noc.net+nsuniqueid=3D039c4293-257f11ed-a255f732-cfd0=
1100
> ,cn=3Dmasters,cn=3Dipa,cn=3Detc,dc=3Dnoc,dc=3Dnet
> ipaLocation: idnsname=3Dsingapore,cn=3Dlocations,cn=3Detc,dc=3Dnoc,dc=3Dn=
et
> objectClass: top
> objectClass: nsContainer
> objectClass: ipaReplTopoManagedServer
> objectClass: ipaConfigObject
> objectClass: ipaSupportedDomainLevelConfig
> objectClass: ldapsubentry
> objectClass: ipalocationmember
> cn: sg1-replica.noc.net
> ipaReplTopoManagedSuffix: dc=3Dnoc,dc=3Dnet
> ipaMinDomainLevel: 1
> ipaMaxDomainLevel: 1
> nsds5ReplConflict: namingConflict (ADD) cn=3Dsg1-replica.noc.net,cn=3Dmas=
ters
> ,cn=3Dipa,cn=3Detc,dc=3Dnoc,dc=3Dnet
>
> # search result
> search: 2
> result: 0 Success
>
> # numResponses: 2
> # numEntries: 1
>
> We expect: | LDAP Conflicts | 0 | OK |
>
> Running versions:
> ipa-server-4.9.12-14.module_el8.9.0+3785+2238a12a.alma.1.x86_64
> ipa-client-4.9.12-14.module_el8.9.0+3785+2238a12a.alma.1.x86_64
> 389-ds-base-1.4.3.37-2.module_el8.9.0+3710+3183c30a.alma.1.x86_64
> krb5-server-1.18.2-26.el8_9.x86_64
>
> The yum update happened from:
> ipa-server-4.9.12-11.module_el8.9.0+3715+e4197dc9.alma.1.x86_64
> to:
> ipa-server-4.9.12-14.module_el8.9.0+3785+2238a12a.alma.1.x86_64
>
ipa-server-4.9.12-14 fixes this issue:
https://issues.redhat.com/browse/RHEL-28847 and must be installed with the
corresponding bind update that fixes
https://issues.redhat.com/browse/RHEL-25648: bind-9.11.36-11.el8_9.1
Do you have the right bind version?
flo
>
> Please advise, how its best to resolve these "LDAP Conflicts".
> How to remove, or retain if its the case?
>
> Thanks,
> Lee
> --
> _______________________________________________
> FreeIPA-users mailing list -- freeipa-users(a)lists.fedorahosted.org
> To unsubscribe send an email to freeipa-users-leave(a)lists.fedorahosted.=
org
> Fedora Code of Conduct:
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives:
> https://lists.fedorahosted.org/archives/list/freeipa-users(a)lists.fedora=
hosted.org
> Do not reply to spam, report it:
> https://pagure.io/fedora-infrastructure/new_issue
>
--===============1285815130535106453==
Content-Type: text/html
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="attachment.html"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--===============1285815130535106453==--
From gladia2r at gmail.com Tue Apr 23 10:07:59 2024
Content-Type: multipart/mixed; boundary="===============7629544398885166897=="
MIME-Version: 1.0
From: Lee Csk
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: LDAP conflicts after yum update on Almalinux 8.9
Date: Tue, 23 Apr 2024 10:07:48 +0000
Message-ID: <20240423100748.19020.20863@mailman01.iad2.fedoraproject.org>
In-Reply-To: CAFDg7Jxe6zPJ39PY++g4CfPF7Jtj9zSe+Fr1dFHPnZH4o=Qc6A@mail.gmail.com
--===============7629544398885166897==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
> ipa-server-4.9.12-14 fixes this issue:
> https://issues.redhat.com/browse/RHEL-28847 and must be installed with the
> corresponding bind update that fixes
> https://issues.redhat.com/browse/RHEL-25648: bind-9.11.36-11.el8_9.1
> Do you have the right bind version?
> =
> flo
I do not have access to those RHEL issues unfortunately.
That is a good point however, observed that various replica servers running=
different bind versions.
Some: bind-9.11.36-11.el8_9.x86_64
Others: bind-9.11.36-11.el8_9.1.x86_64
We are updating them now slowly, and already updated 2 replica servers to t=
he latest bind version - however the LDAP Conflicts don't disappear.
Thanks,
Lee
--===============7629544398885166897==--
From net.ricky at gmail.com Tue Apr 23 10:45:33 2024
Content-Type: multipart/mixed; boundary="===============5182173304947041638=="
MIME-Version: 1.0
From: Riccardo Rotondo
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] User Agreement Description Field
Date: Tue, 23 Apr 2024 10:45:21 +0000
Message-ID: <20240423104521.24624.17699@mailman01.iad2.fedoraproject.org>
--===============5182173304947041638==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Hi, =
I defined an Agreement in the web-ui and I can see loaded in noggin. =
I was wondering if the description support html, markdown or any other synt=
ax in order to put an url clickable in the description. =
I made some tests but with no luck.
Thank you in advance. =
Riccardo
--===============5182173304947041638==--
From flo at redhat.com Tue Apr 23 11:43:37 2024
Content-Type: multipart/mixed; boundary="===============1174271718734029432=="
MIME-Version: 1.0
From: Florence Blanc-Renaud
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: Not possible to delete ID views from Default
Trust View if user is no longer present in AD
Date: Tue, 23 Apr 2024 13:43:11 +0200
Message-ID:
In-Reply-To: 62efb5de5ca840f08cc6acb920996c10@staff.win.be
--===============1174271718734029432==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Hi,
On Mon, Apr 22, 2024 at 12:58=E2=80=AFPM LHEUREUX Bernard via FreeIPA-users=
<
freeipa-users(a)lists.fedorahosted.org> wrote:
> Hello,
>
>
>
> I=E2=80=99m trying to delete some anchors on Default Trust View on a Free=
IPA with
> trust to an AD and, I always get the message =E2=80=9C=E2=80=A6@... user =
not found =C2=BB
>
> Effectively those users are no longer part of the organization and have
> been removed from the AD, but how could I clean them in the Default Trust
> View
>
> Thanks for your help.
>
You can use the SID format to delete the idoverride user. For instance, in
my deployment I have setup an idoverrideuser for adposixuser(a)ad.test and
then deleted the entry from Active Directory.
If I try to directly remove the idoverrideuser:
#* ipa idoverrideuser-del "Default Trust View" adposixuser(a)ad.test*
ipa: ERROR: adposixuser(a)ad.test: user not found
But I can find the SID format for the override with:
#* ipa idoverrideuser-find "Default Trust View" --all --raw*
--------------------------
1 User ID override matched
--------------------------
dn:
ipaanchoruuid=3D:SID:S-1-5-21-3461337807-2625513185-2631243145-1108,cn=3DDe=
fault
Trust View,cn=3Dviews,cn=3Daccounts,dc=3Dipa,dc=3Dtest
ipaanchoruuid: *:SID:S-1-5-21-3461337807-2625513185-2631243145-1108*
ipaoriginaluid: *adposixuser(a)ad.test*
objectClass: ipaOverrideAnchor
objectClass: top
objectClass: ipaUserOverride
objectClass: ipasshuser
objectClass: ipaSshGroupOfPubKeys
----------------------------
Number of entries returned 1
----------------------------
and then use this format to remove the idoverride user:
# *ipa idoverrideuser-del "Default Trust View"
":SID:S-1-5-21-3461337807-2625513185-2631243145-1108"*
---------------------------------------------------------------------------=
---
Deleted User ID override
":SID:S-1-5-21-3461337807-2625513185-2631243145-1108"
---------------------------------------------------------------------------=
---
HTH,
flo
>
>
> ---
>
> Bernard Lheureux
>
> Win S.A.
>
>
>
> ------------------------------
> 1/Conform=C3=A9ment =C3=A0 notre certification ISO 27001, ce message et t=
oute pi=C3=A8ce
> jointe sont la propri=C3=A9t=C3=A9 exclusive de Win. L=E2=80=99informatio=
n contenue dans cet
> e- mail peut s=E2=80=99av=C3=A9rer confidentielle et d=C3=A8s lors prot=
=C3=A9g=C3=A9e de toute
> divulgation. Si vous avez re=C3=A7u cette communication par erreur, veuil=
lez
> nous en informer imm=C3=A9diatement en r=C3=A9pondant =C3=A0 ce message e=
t en le
> supprimant de votre ordinateur, sans le copier ni le divulguer.
> 2/L=E2=80=99acceptation de toute offre commerciale (quel qu=E2=80=99en so=
it le support)
> emporte l=E2=80=99adh=C3=A9sion aux descriptifs (notamment techniques) in=
h=C3=A9rents aux
> solutions offertes, ainsi qu=E2=80=99aux conditions commerciales g=C3=A9n=
=C3=A9rales de Win,
> consultables via https://www.win.be/cgv
> DISCLAIMER : https://www.win.be/fr-win/disclaimer.htm
> --
> _______________________________________________
> FreeIPA-users mailing list -- freeipa-users(a)lists.fedorahosted.org
> To unsubscribe send an email to freeipa-users-leave(a)lists.fedorahosted.=
org
> Fedora Code of Conduct:
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives:
> https://lists.fedorahosted.org/archives/list/freeipa-users(a)lists.fedora=
hosted.org
> Do not reply to spam, report it:
> https://pagure.io/fedora-infrastructure/new_issue
>
--===============1174271718734029432==
Content-Type: text/html
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="attachment.html"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--===============1174271718734029432==--
From cheimes at redhat.com Tue Apr 23 12:04:44 2024
Content-Type: multipart/mixed; boundary="===============1699645247217016633=="
MIME-Version: 1.0
From: Christian Heimes
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: User Agreement Description Field
Date: Tue, 23 Apr 2024 14:04:21 +0200
Message-ID: <6ee9a326-490a-44af-bacb-968c8a27c0c1@redhat.com>
In-Reply-To: 20240423104521.24624.17699@mailman01.iad2.fedoraproject.org
--===============1699645247217016633==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
On 23/04/2024 12.45, Riccardo Rotondo via FreeIPA-users wrote:
> Hi,
> I defined an Agreement in the web-ui and I can see loaded in noggin.
> I was wondering if the description support html, markdown or any other sy=
ntax in order to put an url clickable in the description.
> I made some tests but with no luck.
> Thank you in advance.
Widgets support raw HTML. HTML rendering is disabled by default, because =
it is a source of XSS vulnerabilities. If you enable HTML mode, then you =
have to validate and sanity any user-controlled input yourself.
Christian
-- =
Christian Heimes
Principal Software Engineer, Identity Management and Platform Security
Red Hat GmbH, https://de.redhat.com/ , Registered seat: Grasbrunn,
Commercial register: Amtsgericht Muenchen, HRB 153243,
Managing Directors: Charles Cachera, Brian Klemm, Laurie Krebs, Michael O'N=
eill
--===============1699645247217016633==--
From joyce at ennexa.com Tue Apr 23 15:04:58 2024
Content-Type: multipart/mixed; boundary="===============4956080064299256310=="
MIME-Version: 1.0
From: Joyce Babu
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Error adding cross trust between FreeIPA and Zentyal
(Samba)
Date: Tue, 23 Apr 2024 15:04:48 +0000
Message-ID: <20240423150448.31224.50883@mailman01.iad2.fedoraproject.org>
--===============4956080064299256310==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
I am trying to setup cross trust between IPA and Samba. When I try to run
ipa trust-add --type=3Dad ad.example.org --admin Administrator --passw=
ord --range-type=3Dipa-ad-trust
The command aborts with error
ipa: ERROR: CIFS server communication error: code "3221225473", message=
"{Operation Failed} The requested operation was unsuccessful." (both may b=
e "None")
Samba log on the Zentyal server has the following error message
Kerberos: Client (Administrator(a)AD.EXAMPLE.ORG) from ipv4:10.15.5.2:41504=
has no common enctypes with KDC to use for the session key
--===============4956080064299256310==--
From flo at redhat.com Wed Apr 24 06:32:28 2024
Content-Type: multipart/mixed; boundary="===============5762668047189681593=="
MIME-Version: 1.0
From: Florence Blanc-Renaud
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: LDAP conflicts after yum update on Almalinux 8.9
Date: Wed, 24 Apr 2024 08:32:00 +0200
Message-ID:
In-Reply-To: 20240423100748.19020.20863@mailman01.iad2.fedoraproject.org
--===============5762668047189681593==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Hi,
in your first message, the output of
$ dsconf -D "cn=3DDirectory Manager" ldap://$(hostname) repl-conflict
list-glue "dc=3Dnoc,dc=3Dnet"
mentions:
dn: cn=3Dsg1-replica.noc.net,cn=3Dmasters,cn=3Dipa,cn=3Detc,dc=3Dnoc,dc=3Dn=
et
*nsds5replconflict: deletedEntryHasChildren*
It means that the replication tried to delete this entry on 1 server but
there were subentries below that one.
Is this replica sg1-replica.noc.net still present in the topology? If it
has been removed, you can delete the entry and its children. Otherwise you
need to keep it.
The other conflict is dn: krbprincipalname=3DHTTP/mi1-replica.noc.net(a)NOC=
.NET
+nsuniqueid=3D0264df8b-fca611ee-a3cba8b9-8a6b8039,cn=3Dservices,cn=3Daccoun=
ts,dc=3Dnoc,dc=3Dnet
Can you show the content of the entry and the content of the conflict
entry? The differences may help understand why there is a conflict.
ldapsearch -D "cn=3Ddirectory manager" -W -b krbprincipalname=3DHTTP/
mi1-replica.noc.net(a)NOC.NET
+nsuniqueid=3D0264df8b-fca611ee-a3cba8b9-8a6b8039,cn=3Dservices,cn=3Daccoun=
ts,dc=3Dnoc,dc=3Dnet
ldapsearch -D "cn=3Ddirectory manager" -W -b krbprincipalname=3DHTTP/
mi1-replica.noc.net(a)NOC.NET,cn=3Dservices,cn=3Daccounts,dc=3Dnoc,dc=3Dnet
flo
On Tue, Apr 23, 2024 at 12:08=E2=80=AFPM Lee Csk via FreeIPA-users <
freeipa-users(a)lists.fedorahosted.org> wrote:
> > ipa-server-4.9.12-14 fixes this issue:
> > https://issues.redhat.com/browse/RHEL-28847 and must be installed with
> the
> > corresponding bind update that fixes
> > https://issues.redhat.com/browse/RHEL-25648: bind-9.11.36-11.el8_9.1
> > Do you have the right bind version?
> >
> > flo
>
> I do not have access to those RHEL issues unfortunately.
>
> That is a good point however, observed that various replica servers
> running different bind versions.
> Some: bind-9.11.36-11.el8_9.x86_64
> Others: bind-9.11.36-11.el8_9.1.x86_64
>
> We are updating them now slowly, and already updated 2 replica servers to
> the latest bind version - however the LDAP Conflicts don't disappear.
>
> Thanks,
> Lee
> --
> _______________________________________________
> FreeIPA-users mailing list -- freeipa-users(a)lists.fedorahosted.org
> To unsubscribe send an email to freeipa-users-leave(a)lists.fedorahosted.=
org
> Fedora Code of Conduct:
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives:
> https://lists.fedorahosted.org/archives/list/freeipa-users(a)lists.fedora=
hosted.org
> Do not reply to spam, report it:
> https://pagure.io/fedora-infrastructure/new_issue
>
--===============5762668047189681593==
Content-Type: text/html
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="attachment.html"
PGRpdiBkaXI9Imx0ciI+PGRpdiBjbGFzcz0iZ21haWxfZGVmYXVsdCIgc3R5bGU9ImZvbnQtZmFt
aWx5OmFyaWFsLHNhbnMtc2VyaWYiPkhpLDwvZGl2PjxkaXYgY2xhc3M9ImdtYWlsX2RlZmF1bHQi
IHN0eWxlPSJmb250LWZhbWlseTphcmlhbCxzYW5zLXNlcmlmIj48YnI+PC9kaXY+PGRpdiBjbGFz
cz0iZ21haWxfZGVmYXVsdCIgc3R5bGU9ImZvbnQtZmFtaWx5OmFyaWFsLHNhbnMtc2VyaWYiPmlu
IHlvdXIgZmlyc3QgbWVzc2FnZSwgdGhlIG91dHB1dCBvZjwvZGl2PjxkaXYgY2xhc3M9ImdtYWls
X2RlZmF1bHQiIHN0eWxlPSIiPjxzcGFuIHN0eWxlPSJmb250LWZhbWlseTpBcmlhbCxIZWx2ZXRp
Y2Esc2Fucy1zZXJpZiI+JCBkc2NvbmYgLUQgJnF1b3Q7Y249RGlyZWN0b3J5IE1hbmFnZXImcXVv
dDsgbGRhcDovLyQoaG9zdG5hbWUpIHJlcGwtY29uZmxpY3QgbGlzdC1nbHVlICZxdW90O2RjPW5v
YyxkYz1uZXQmcXVvdDs8L3NwYW4+PGJyIHN0eWxlPSJmb250LWZhbWlseTpBcmlhbCxIZWx2ZXRp
Y2Esc2Fucy1zZXJpZiI+bWVudGlvbnM6PC9kaXY+PGRpdiBjbGFzcz0iZ21haWxfZGVmYXVsdCIg
c3R5bGU9IiI+ZG46IGNuPTxhIGhyZWY9Imh0dHA6Ly9zZzEtcmVwbGljYS5ub2MubmV0LyIgcmVs
PSJub3JlZmVycmVyIiB0YXJnZXQ9Il9ibGFuayI+c2cxLXJlcGxpY2Eubm9jLm5ldDwvYT4sY249
bWFzdGVycyxjbj1pcGEsY249ZXRjLGRjPW5vYyxkYz1uZXQ8YnIgc3R5bGU9ImZvbnQtZmFtaWx5
OkFyaWFsLEhlbHZldGljYSxzYW5zLXNlcmlmIj48c3BhbiBzdHlsZT0iZm9udC1mYW1pbHk6QXJp
YWwsSGVsdmV0aWNhLHNhbnMtc2VyaWYiPjxiPm5zZHM1cmVwbGNvbmZsaWN0OiBkZWxldGVkRW50
cnlIYXNDaGlsZHJlbjwvYj48L3NwYW4+PGJyPjwvZGl2PjxkaXYgY2xhc3M9ImdtYWlsX2RlZmF1
bHQiIHN0eWxlPSIiPjxzcGFuIHN0eWxlPSJmb250LWZhbWlseTpBcmlhbCxIZWx2ZXRpY2Esc2Fu
cy1zZXJpZiI+PGI+PGJyPjwvYj48L3NwYW4+PC9kaXY+PGRpdiBjbGFzcz0iZ21haWxfZGVmYXVs
dCIgc3R5bGU9IiI+PHNwYW4gc3R5bGU9ImZvbnQtZmFtaWx5OkFyaWFsLEhlbHZldGljYSxzYW5z
LXNlcmlmIj5JdCBtZWFucyB0aGF0IHRoZSByZXBsaWNhdGlvbiB0cmllZCB0byBkZWxldGUgdGhp
cyBlbnRyeSBvbiAxIHNlcnZlciBidXQgdGhlcmUgd2VyZSBzdWJlbnRyaWVzIGJlbG93IHRoYXQg
b25lLjwvc3Bhbj48L2Rpdj48ZGl2IGNsYXNzPSJnbWFpbF9kZWZhdWx0IiBzdHlsZT0iIj48c3Bh
biBzdHlsZT0iZm9udC1mYW1pbHk6QXJpYWwsSGVsdmV0aWNhLHNhbnMtc2VyaWYiPklzIHRoaXMg
cmVwbGljYcKgPC9zcGFuPjxhIGhyZWY9Imh0dHA6Ly9zZzEtcmVwbGljYS5ub2MubmV0LyIgcmVs
PSJub3JlZmVycmVyIiB0YXJnZXQ9Il9ibGFuayI+c2cxLXJlcGxpY2Eubm9jLm5ldDwvYT7CoHN0
aWxsIHByZXNlbnQgaW4gdGhlIHRvcG9sb2d5PyBJZiBpdCBoYXMgYmVlbiByZW1vdmVkLCB5b3Ug
Y2FuIGRlbGV0ZSB0aGUgZW50cnkgYW5kIGl0cyBjaGlsZHJlbi4gT3RoZXJ3aXNlIHlvdSBuZWVk
IHRvIGtlZXAgaXQuPC9kaXY+PGRpdiBjbGFzcz0iZ21haWxfZGVmYXVsdCIgc3R5bGU9IiI+PGJy
PjwvZGl2PjxkaXYgY2xhc3M9ImdtYWlsX2RlZmF1bHQiIHN0eWxlPSIiPlRoZSBvdGhlciBjb25m
bGljdCBpcyBkbjoga3JicHJpbmNpcGFsbmFtZT1IVFRQLzxhIGhyZWY9Im1haWx0bzptaTEtcmVw
bGljYS5ub2MubmV0QE5PQy5ORVQiIHRhcmdldD0iX2JsYW5rIj5taTEtcmVwbGljYS5ub2MubmV0
QE5PQy5ORVQ8L2E+K25zdW5pcXVlaWQ9MDI2NGRmOGItZmNhNjExZWUtYTNjYmE4YjktOGE2Yjgw
MzksY249c2VydmljZXMsY249YWNjb3VudHMsZGM9bm9jLGRjPW5ldDwvZGl2PjxkaXYgY2xhc3M9
ImdtYWlsX2RlZmF1bHQiIHN0eWxlPSIiPjxicj48L2Rpdj48ZGl2IGNsYXNzPSJnbWFpbF9kZWZh
dWx0IiBzdHlsZT0iIj5DYW4geW91IHNob3cgdGhlIGNvbnRlbnQgb2YgdGhlIGVudHJ5IGFuZCB0
aGUgY29udGVudCBvZiB0aGUgY29uZmxpY3QgZW50cnk/IFRoZSBkaWZmZXJlbmNlcyBtYXkgaGVs
cCB1bmRlcnN0YW5kIHdoeSB0aGVyZSBpcyBhIGNvbmZsaWN0LjwvZGl2PjxkaXYgY2xhc3M9Imdt
YWlsX2RlZmF1bHQiIHN0eWxlPSIiPjxicj48L2Rpdj48ZGl2IGNsYXNzPSJnbWFpbF9kZWZhdWx0
IiBzdHlsZT0iIj5sZGFwc2VhcmNoIC1EICZxdW90O2NuPWRpcmVjdG9yeSBtYW5hZ2VyJnF1b3Q7
IC1XIC1iwqBrcmJwcmluY2lwYWxuYW1lPUhUVFAvPGEgaHJlZj0ibWFpbHRvOm1pMS1yZXBsaWNh
Lm5vYy5uZXRATk9DLk5FVCI+bWkxLXJlcGxpY2Eubm9jLm5ldEBOT0MuTkVUPC9hPituc3VuaXF1
ZWlkPTAyNjRkZjhiLWZjYTYxMWVlLWEzY2JhOGI5LThhNmI4MDM5LGNuPXNlcnZpY2VzLGNuPWFj
Y291bnRzLGRjPW5vYyxkYz1uZXQ8L2Rpdj48ZGl2IGNsYXNzPSJnbWFpbF9kZWZhdWx0IiBzdHls
ZT0iIj5sZGFwc2VhcmNoIC1EICZxdW90O2NuPWRpcmVjdG9yeSBtYW5hZ2VyJnF1b3Q7IC1XIC1i
wqBrcmJwcmluY2lwYWxuYW1lPUhUVFAvPGEgaHJlZj0ibWFpbHRvOm1pMS1yZXBsaWNhLm5vYy5u
ZXRATk9DLk5FVCI+bWkxLXJlcGxpY2Eubm9jLm5ldEBOT0MuTkVUPC9hPixjbj1zZXJ2aWNlcyxj
bj1hY2NvdW50cyxkYz1ub2MsZGM9bmV0PC9kaXY+PGRpdiBjbGFzcz0iZ21haWxfZGVmYXVsdCIg
c3R5bGU9IiI+PGJyPjwvZGl2PjxkaXYgY2xhc3M9ImdtYWlsX2RlZmF1bHQiIHN0eWxlPSIiPmZs
bzwvZGl2PjxkaXYgY2xhc3M9ImdtYWlsX2RlZmF1bHQiIHN0eWxlPSIiPjxicj48L2Rpdj48L2Rp
dj48YnI+PGRpdiBjbGFzcz0iZ21haWxfcXVvdGUiPjxkaXYgZGlyPSJsdHIiIGNsYXNzPSJnbWFp
bF9hdHRyIj5PbiBUdWUsIEFwciAyMywgMjAyNCBhdCAxMjowOOKAr1BNIExlZSBDc2sgdmlhIEZy
ZWVJUEEtdXNlcnMgJmx0OzxhIGhyZWY9Im1haWx0bzpmcmVlaXBhLXVzZXJzQGxpc3RzLmZlZG9y
YWhvc3RlZC5vcmciPmZyZWVpcGEtdXNlcnNAbGlzdHMuZmVkb3JhaG9zdGVkLm9yZzwvYT4mZ3Q7
IHdyb3RlOjxicj48L2Rpdj48YmxvY2txdW90ZSBjbGFzcz0iZ21haWxfcXVvdGUiIHN0eWxlPSJt
YXJnaW46MHB4IDBweCAwcHggMC44ZXg7Ym9yZGVyLWxlZnQ6MXB4IHNvbGlkIHJnYigyMDQsMjA0
LDIwNCk7cGFkZGluZy1sZWZ0OjFleCI+Jmd0OyBpcGEtc2VydmVyLTQuOS4xMi0xNCBmaXhlcyB0
aGlzIGlzc3VlOjxicj4KJmd0OyA8YSBocmVmPSJodHRwczovL2lzc3Vlcy5yZWRoYXQuY29tL2Jy
b3dzZS9SSEVMLTI4ODQ3IiByZWw9Im5vcmVmZXJyZXIiIHRhcmdldD0iX2JsYW5rIj5odHRwczov
L2lzc3Vlcy5yZWRoYXQuY29tL2Jyb3dzZS9SSEVMLTI4ODQ3PC9hPiBhbmQgbXVzdCBiZSBpbnN0
YWxsZWQgd2l0aCB0aGU8YnI+CiZndDsgY29ycmVzcG9uZGluZyBiaW5kIHVwZGF0ZSB0aGF0IGZp
eGVzPGJyPgomZ3Q7IDxhIGhyZWY9Imh0dHBzOi8vaXNzdWVzLnJlZGhhdC5jb20vYnJvd3NlL1JI
RUwtMjU2NDgiIHJlbD0ibm9yZWZlcnJlciIgdGFyZ2V0PSJfYmxhbmsiPmh0dHBzOi8vaXNzdWVz
LnJlZGhhdC5jb20vYnJvd3NlL1JIRUwtMjU2NDg8L2E+OiBiaW5kLTkuMTEuMzYtMTEuZWw4Xzku
MTxicj4KJmd0OyBEbyB5b3UgaGF2ZSB0aGUgcmlnaHQgYmluZCB2ZXJzaW9uPzxicj4KJmd0OyA8
YnI+CiZndDsgZmxvPGJyPgo8YnI+CkkgZG8gbm90IGhhdmUgYWNjZXNzIHRvIHRob3NlIFJIRUwg
aXNzdWVzIHVuZm9ydHVuYXRlbHkuPGJyPgo8YnI+ClRoYXQgaXMgYSBnb29kIHBvaW50IGhvd2V2
ZXIsIG9ic2VydmVkIHRoYXQgdmFyaW91cyByZXBsaWNhIHNlcnZlcnMgcnVubmluZyBkaWZmZXJl
bnQgYmluZCB2ZXJzaW9ucy48YnI+CsKgU29tZTogYmluZC05LjExLjM2LTExLmVsOF85Lng4Nl82
NDxicj4KwqBPdGhlcnM6IGJpbmQtOS4xMS4zNi0xMS5lbDhfOS4xLng4Nl82NDxicj4KPGJyPgpX
ZSBhcmUgdXBkYXRpbmcgdGhlbSBub3cgc2xvd2x5LCBhbmQgYWxyZWFkeSB1cGRhdGVkIDIgcmVw
bGljYSBzZXJ2ZXJzIHRvIHRoZSBsYXRlc3QgYmluZCB2ZXJzaW9uIC0gaG93ZXZlciB0aGUgTERB
UCBDb25mbGljdHMgZG9uJiMzOTt0IGRpc2FwcGVhci48YnI+Cjxicj4KVGhhbmtzLDxicj4KTGVl
PGJyPgotLTxicj4KX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X188YnI+CkZyZWVJUEEtdXNlcnMgbWFpbGluZyBsaXN0IC0tIDxhIGhyZWY9Im1haWx0bzpmcmVl
aXBhLXVzZXJzQGxpc3RzLmZlZG9yYWhvc3RlZC5vcmciIHRhcmdldD0iX2JsYW5rIj5mcmVlaXBh
LXVzZXJzQGxpc3RzLmZlZG9yYWhvc3RlZC5vcmc8L2E+PGJyPgpUbyB1bnN1YnNjcmliZSBzZW5k
IGFuIGVtYWlsIHRvIDxhIGhyZWY9Im1haWx0bzpmcmVlaXBhLXVzZXJzLWxlYXZlQGxpc3RzLmZl
ZG9yYWhvc3RlZC5vcmciIHRhcmdldD0iX2JsYW5rIj5mcmVlaXBhLXVzZXJzLWxlYXZlQGxpc3Rz
LmZlZG9yYWhvc3RlZC5vcmc8L2E+PGJyPgpGZWRvcmEgQ29kZSBvZiBDb25kdWN0OiA8YSBocmVm
PSJodHRwczovL2RvY3MuZmVkb3JhcHJvamVjdC5vcmcvZW4tVVMvcHJvamVjdC9jb2RlLW9mLWNv
bmR1Y3QvIiByZWw9Im5vcmVmZXJyZXIiIHRhcmdldD0iX2JsYW5rIj5odHRwczovL2RvY3MuZmVk
b3JhcHJvamVjdC5vcmcvZW4tVVMvcHJvamVjdC9jb2RlLW9mLWNvbmR1Y3QvPC9hPjxicj4KTGlz
dCBHdWlkZWxpbmVzOiA8YSBocmVmPSJodHRwczovL2ZlZG9yYXByb2plY3Qub3JnL3dpa2kvTWFp
bGluZ19saXN0X2d1aWRlbGluZXMiIHJlbD0ibm9yZWZlcnJlciIgdGFyZ2V0PSJfYmxhbmsiPmh0
dHBzOi8vZmVkb3JhcHJvamVjdC5vcmcvd2lraS9NYWlsaW5nX2xpc3RfZ3VpZGVsaW5lczwvYT48
YnI+Ckxpc3QgQXJjaGl2ZXM6IDxhIGhyZWY9Imh0dHBzOi8vbGlzdHMuZmVkb3JhaG9zdGVkLm9y
Zy9hcmNoaXZlcy9saXN0L2ZyZWVpcGEtdXNlcnNAbGlzdHMuZmVkb3JhaG9zdGVkLm9yZyIgcmVs
PSJub3JlZmVycmVyIiB0YXJnZXQ9Il9ibGFuayI+aHR0cHM6Ly9saXN0cy5mZWRvcmFob3N0ZWQu
b3JnL2FyY2hpdmVzL2xpc3QvZnJlZWlwYS11c2Vyc0BsaXN0cy5mZWRvcmFob3N0ZWQub3JnPC9h
Pjxicj4KRG8gbm90IHJlcGx5IHRvIHNwYW0sIHJlcG9ydCBpdDogPGEgaHJlZj0iaHR0cHM6Ly9w
YWd1cmUuaW8vZmVkb3JhLWluZnJhc3RydWN0dXJlL25ld19pc3N1ZSIgcmVsPSJub3JlZmVycmVy
IiB0YXJnZXQ9Il9ibGFuayI+aHR0cHM6Ly9wYWd1cmUuaW8vZmVkb3JhLWluZnJhc3RydWN0dXJl
L25ld19pc3N1ZTwvYT48YnI+CjwvYmxvY2txdW90ZT48L2Rpdj4K
--===============5762668047189681593==--
From tmdag at tmdag.com Wed Apr 24 21:51:41 2024
Content-Type: multipart/mixed; boundary="===============6386836901408965782=="
MIME-Version: 1.0
From: Albert Szostkiewicz
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] autofs freezes system after update to F40.
Date: Wed, 24 Apr 2024 21:51:31 +0000
Message-ID: <20240424215131.32199.40528@mailman01.iad2.fedoraproject.org>
--===============6386836901408965782==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Yesterday I've upgraded F38-F49, all went fine, no issues. Today I tried F3=
9-f40 and system freezes on autofs. Got some sssd errors, and i assume it m=
ight be all related (?).
There are no errors from autofs side itself, only warning:
"autofs.service: Referenced but unset environment variable evaluates to an =
empty string: OPTIONS"
. As soon as I enable autofs, all system is frozen (although my nfs mounts =
are set to 'soft').
I am getting those errors, which I have reported here (https://github.com/S=
SSD/sssd/issues/7314) as I saw something similar being reported year ago:
/var/log/sssd/krb5_child.log
(2024-04-24 14:15:14): [krb5_child[13003]] [sss_krb5_expire_callback_func] =
(0x0020): [RID#97] Time to expire out of range.
********************** PREVIOUS MESSAGE WAS TRIGGERED BY THE FOLLOWING BACK=
TRACE:
* (2024-04-24 14:15:14): [krb5_child[13003]] [main] (0x0400): [RID#97] =
krb5_child started.
* (2024-04-24 14:15:14): [krb5_child[13003]] [unpack_buffer] (0x1000): =
[RID#97] total buffer size: [113]
* (2024-04-24 14:15:14): [krb5_child[13003]] [unpack_buffer] (0x0100): =
[RID#97] cmd [241 (auth)] uid [1907400001] gid [1907400001] validate [true]=
enterprise principal [false] offline [false] UPN [user(a)DOMAIN.COM]
* (2024-04-24 14:15:14): [krb5_child[13003]] [unpack_buffer] (0x0100): =
[RID#97] ccname: [KCM:] old_ccname: [KCM:] keytab: [/etc/krb5.keytab]
* (2024-04-24 14:15:14): [krb5_child[13003]] [switch_creds] (0x0200): [=
RID#97] Switch workstation(a)domain.com to [1907400001][1907400001].
* (2024-04-24 14:15:14): [krb5_child[13003]] [switch_creds] (0x0200): [=
RID#97] Switch workstation(a)domain.com to [0][0].
* (2024-04-24 14:15:14): [krb5_child[13003]] [k5c_check_old_ccache] (0x=
4000): [RID#97] Ccache_file is [KCM:] and is active and TGT is valid.
* (2024-04-24 14:15:14): [krb5_child[13003]] [k5c_setup_fast] (0x0100):=
[RID#97] Fast principal is set to [host/workstation(a)domain.com]
* (2024-04-24 14:15:14): [krb5_child[13003]] [find_principal_in_keytab]=
(0x4000): [RID#97] Trying to find principal host/workstation(a)domain.com =
in keytab.
* (2024-04-24 14:15:14): [krb5_child[13003]] [match_principal] (0x1000)=
: [RID#97] Principal matched to the sample (host/workstation(a)domain.com).
* (2024-04-24 14:15:14): [krb5_child[13003]] [check_fast_ccache] (0x020=
0): [RID#97] FAST TGT is still valid.
* (2024-04-24 14:15:14): [krb5_child[13003]] [become_workstation(a)doma=
in.com] (0x0200): [RID#97] Trying to become workstation(a)domain.com [19074=
00001][1907400001].
* (2024-04-24 14:15:14): [krb5_child[13003]] [main] (0x2000): [RID#97] =
Running as [1907400001][1907400001].
* (2024-04-24 14:15:14): [krb5_child[13003]] [set_lifetime_options] (0x=
0100): [RID#97] No specific renewable lifetime requested.
* (2024-04-24 14:15:14): [krb5_child[13003]] [set_lifetime_options] (0x=
0100): [RID#97] No specific lifetime requested.
* (2024-04-24 14:15:14): [krb5_child[13003]] [set_canonicalize_option] =
(0x0100): [RID#97] Canonicalization is set to [true]
* (2024-04-24 14:15:14): [krb5_child[13003]] [main] (0x0400): [RID#97] =
Will perform auth
* (2024-04-24 14:15:14): [krb5_child[13003]] [main] (0x0400): [RID#97] =
Will perform online auth
* (2024-04-24 14:15:14): [krb5_child[13003]] [tgt_req_child] (0x1000): =
[RID#97] Attempting to get a TGT
* (2024-04-24 14:15:14): [krb5_child[13003]] [get_and_save_tgt] (0x0400=
): [RID#97] Attempting kinit for realm [DOMAIN.COM]
* (2024-04-24 14:15:14): [krb5_child[13003]] [sss_krb5_responder] (0x40=
00): [RID#97] Got question [password].
* (2024-04-24 14:15:14): [krb5_child[13003]] [sss_krb5_expire_callback_=
func] (0x0020): [RID#97] Time to expire out of range.
********************** BACKTRACE DUMP ENDS HERE ***************************=
******
(2024-04-24 14:15:14): [krb5_child[13003]] [sss_extract_pac] (0x0040): [RID=
#97] No PAC authdata available.
********************** PREVIOUS MESSAGE WAS TRIGGERED BY THE FOLLOWING BACK=
TRACE:
* (2024-04-24 14:15:14): [krb5_child[13003]] [validate_tgt] (0x2000): [=
RID#97] Found keytab entry with the realm of the credential.
* (2024-04-24 14:15:14): [krb5_child[13003]] [validate_tgt] (0x0400): [=
RID#97] TGT verified using key for [host/workstation(a)domain.com].
* (2024-04-24 14:15:14): [krb5_child[13003]] [sss_extract_pac] (0x0040)=
: [RID#97] No PAC authdata available.
********************** BACKTRACE DUMP ENDS HERE ***************************=
******
(2024-04-24 14:15:14): [krb5_child[13003]] [validate_tgt] (0x0040): [RID#97=
] sss_extract_and_send_pac failed, group membership for workstation(a)domai=
n.com with principal [user(a)DOMAIN.COM] might not be correct.
--===============6386836901408965782==--
From tmdag at tmdag.com Wed Apr 24 22:39:55 2024
Content-Type: multipart/mixed; boundary="===============6362998835409045474=="
MIME-Version: 1.0
From: Albert Szostkiewicz
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: autofs freezes system after update to F40.
Date: Wed, 24 Apr 2024 22:39:41 +0000
Message-ID: <20240424223941.14388.22835@mailman01.iad2.fedoraproject.org>
In-Reply-To: 20240424215131.32199.40528@mailman01.iad2.fedoraproject.org
--===============6362998835409045474==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
ok, figured out that autofs had nothing to do with this
--===============6362998835409045474==--
From rcritten at redhat.com Thu Apr 25 00:45:52 2024
Content-Type: multipart/mixed; boundary="===============0679580863822144949=="
MIME-Version: 1.0
From: Rob Crittenden
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: autofs freezes system after update to F40.
Date: Wed, 24 Apr 2024 20:45:25 -0400
Message-ID: <49dacf99-69f5-1699-8e1d-dc7da273fdd8@redhat.com>
In-Reply-To: 20240424223941.14388.22835@mailman01.iad2.fedoraproject.org
--===============0679580863822144949==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Albert Szostkiewicz via FreeIPA-users wrote:
> ok, figured out that autofs had nothing to do with this
What was the problem? Maybe your solution will help someone else.
thanks
rob
--===============0679580863822144949==--
From tmdag at tmdag.com Thu Apr 25 00:50:43 2024
Content-Type: multipart/mixed; boundary="===============2621142485512338505=="
MIME-Version: 1.0
From: Albert Szostkiewicz
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: autofs freezes system after update to F40.
Date: Thu, 25 Apr 2024 00:50:25 +0000
Message-ID: <20240425005025.9493.77650@mailman01.iad2.fedoraproject.org>
In-Reply-To: 49dacf99-69f5-1699-8e1d-dc7da273fdd8@redhat.com
--===============2621142485512338505==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
autofs issue was a user error. I have limited access to nfs share per IP. F=
or some reason, after updating fedora to a latest version, my router assign=
ed me different IP than expected, which caused nfs being inaccessible.
But i still wonder about those backtrace dumps i am getting.
--===============2621142485512338505==--
From gladia2r at gmail.com Thu Apr 25 11:49:08 2024
Content-Type: multipart/mixed; boundary="===============7050317029836721429=="
MIME-Version: 1.0
From: Lee Csk
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: LDAP conflicts after yum update on Almalinux 8.9
Date: Thu, 25 Apr 2024 11:48:56 +0000
Message-ID: <20240425114856.15354.20317@mailman01.iad2.fedoraproject.org>
In-Reply-To: CAFDg7Jz397gxe1hpfiX-U1h-BRiaD=Ms3vgLpMqxBYjTi7x5sg@mail.gmail.com
--===============7050317029836721429==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Hello,
> Hi,
> =
> in your first message, the output of
> $ dsconf -D "cn=3DDirectory Manager" ldap://$(hostname) repl-conflict
> list-glue "dc=3Dnoc,dc=3Dnet"
> mentions:
> dn: cn=3Dsg1-replica.noc.net,cn=3Dmasters,cn=3Dipa,cn=3Detc,dc=3Dnoc,dc=
=3Dnet
> *nsds5replconflict: deletedEntryHasChildren*
> =
> It means that the replication tried to delete this entry on 1 server but
> there were subentries below that one.
> Is this replica sg1-replica.noc.net still present in the topology? If it
> has been removed, you can delete the entry and its children. Otherwise you
> need to keep it.
Yes, that replicate still in the topology, what is the best way to "keep it=
" ?
> The other conflict is dn: krbprincipalname=3DHTTP/mi1-replica.noc.net(a)N=
OC.NET
> +nsuniqueid=3D0264df8b-fca611ee-a3cba8b9-8a6b8039,cn=3Dservices,cn=3Dacco=
unts,dc=3Dnoc,dc=3Dnet
> =
> Can you show the content of the entry and the content of the conflict
> entry? The differences may help understand why there is a conflict.
> =
> ldapsearch -D "cn=3Ddirectory manager" -W -b krbprincipalname=3DHTTP/
> mi1-replica.noc.net(a)NOC.NET
> +nsuniqueid=3D0264df8b-fca611ee-a3cba8b9-8a6b8039,cn=3Dservices,cn=3Dacco=
unts,dc=3Dnoc,dc=3Dnet
This does not seems to result anything:
# extended LDIF
#
# LDAPv3
# base with scope subtree
# filter: (objectclass=3D*)
# requesting: ALL
#
# search result
search: 2
result: 0 Success
# numResponses: 1
> ldapsearch -D "cn=3Ddirectory manager" -W -b krbprincipalname=3DHTTP/
> mi1-replica.noc.net(a)NOC.NET,cn=3Dservices,cn=3Daccounts,dc=3Dnoc,dc=3Dn=
et
This outputs the following: =
# extended LDIF
#
# LDAPv3
# base with scope subtree
# filter: (objectclass=3D*)
# requesting: ALL
#
# HTTP/mi1-replica.noc.net(a)NOC.NET, services, accounts, noc.net
dn: krbprincipalname=3DHTTP/mi1-replica.noc.net(a)NOC.NET,cn=3Dservices,cn=
=3Dacco
unts,dc=3Dnoc,dc=3Dnet
userCertificate:: MIIFRD...
userCertificate:: MIIFRD...
krbExtraData:: AAIAs...
krbLastPwdChange: 20220428151720Z
krbPrincipalKey:: MIHe...
krbCanonicalName: HTTP/mi1-replica.noc.net(a)NOC.NET
objectClass: krbprincipal
objectClass: krbprincipalaux
objectClass: krbticketpolicyaux
objectClass: ipaobject
objectClass: ipaservice
objectClass: pkiuser
objectClass: ipakrbprincipal
objectClass: top
managedBy: fqdn=3Dmi1-replica.noc.net,cn=3Dcomputers,cn=3Daccounts,dc=3Dnoc=
,dc=3Dne
t
ipaKrbPrincipalAlias: HTTP/mi1-replica.noc.net(a)NOC.NET
krbPrincipalName: HTTP/mi1-replica.noc.net(a)NOC.NET
ipaUniqueID: 4bfed72c-c706-11ec-a9d8-ac1f6bfcc04f
krbPwdPolicyReference: cn=3DDefault Service Password Policy,cn=3Dservices,c=
n=3Daccou
nts,dc=3Dnoc,dc=3Dnet
# search result
search: 2
result: 0 Success
# numResponses: 2
# numEntries: 1
> flo
> =
> =
> On Tue, Apr 23, 2024 at 12:08=E2=80=AFPM Lee Csk via FreeIPA-users <
> freeipa-users(a)lists.fedorahosted.org> wrote:
Thank you,
Lee
--===============7050317029836721429==--
From slekkus75 at proton.me Thu Apr 25 15:03:54 2024
Content-Type: multipart/mixed; boundary="===============7593279693135026193=="
MIME-Version: 1.0
From: slek kus
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] IPA replica cannot lookup AD trust users (worked
before)
Date: Thu, 25 Apr 2024 15:03:41 +0000
Message-ID: <20240425150341.14559.84099@mailman01.iad2.fedoraproject.org>
--===============7593279693135026193==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Hi, the only replica cannot retrieve AD trust users (one way trust). Trust =
agent had been installed on this replica.
I noticed this issue, since clients that point to the replica started to fa=
il authenticating users. This replica worked OK before.
All functions and syncs except for the AD user lookup. overrides are synced=
over but replica cannot find the user. =
Can't get it fixed. Is this repairable? Can I uninstall the replica and rei=
nstall?
[root(a)idm01 ~]# ipa server-role-find
-----------------------
10 server roles matched
-----------------------
Server name: idm01.linux.redacted.domain
Role name: AD trust agent
Role status: enabled
Server name: idm02.linux.redacted.domain
Role name: AD trust agent
Role status: enabled
Server name: idm01.linux.redacted.domain
Role name: AD trust controller
Role status: enabled
Server name: idm02.linux.redacted.domain
Role name: AD trust controller
Role status: enabled
<...>
On the main server, the AD user can be looked up. On the "replica" it retur=
ns empty.
working on main server:
[root(a)idm01 ~]# getent passwd testuser(a)subdoma.redacted.domain
testuser(a)subdomA.redacted.domain:*:683005154:683005154:CHANGED:/home/test=
user:/usr/bin/bash
Checking the sssd_doamin.log of the replica, I see the message that the dom=
ain is not active while fetching ad user. Further in the same log there's m=
ention of another subdomain be inactive. =
The trust is wirth a AD forest with 2 subdomains. =
-----
(2024-04-25 16:40:11): [be[linux.redacted.domain]] [ipa_srv_ad_acct_lookup_=
done] (0x0040): [RID#34] ipa_get_*_acct request failed: [1432158277]: Subdo=
main is inactive.
* ... skipping repetitive backtrace ...
=
<...>
(2024-04-25 16:39:44): [be[linux.redacted.domain]] [resolv_discover_srv_don=
e] (0x0040): [RID#33] SRV query failed [11]: Could not contact DNS servers
* ... skipping repetitive backtrace ...
(2024-04-25 16:39:44): [be[linux.redacted.domain]] [fo_discover_servers_pri=
mary_done] (0x0040): [RID#33] Unable to retrieve primary servers [143215823=
8]: SRV lookup error
* ... skipping repetitive backtrace ...
(2024-04-25 16:39:44): [be[linux.redacted.domain]] [resolve_srv_done] (0x00=
40): [RID#33] Unable to resolve SRV [1432158238]: SRV lookup error
* ... skipping repetitive backtrace ...
(2024-04-25 16:39:44): [be[linux.redacted.domain]] [fo_resolve_service_send=
] (0x0020): [RID#33] No available servers for service 'sd_SUBDOMB.redacted.=
domain'
* ... skipping repetitive backtrace ...
(2024-04-25 16:39:44): [be[linux.redacted.domain]] [ipa_srv_ad_acct_lookup_=
done] (0x0040): [RID#33] ipa_get_*_acct request failed: [1432158277]: Subdo=
main is inactive.
********************** PREVIOUS MESSAGE WAS TRIGGERED BY THE FOLLOWING BACK=
TRACE:
* (2024-04-25 16:39:44): [be[linux.redacted.domain]] [be_resolve_server=
_done] (0x1000): [RID#33] Server [NULL] resolution failed: [5]: Input/outpu=
t error
* (2024-04-25 16:39:44): [be[linux.redacted.domain]] [sdap_id_op_connec=
t_done] (0x0400): [RID#33] Failed to connect to server, but ignore mark off=
line is enabled.
* (2024-04-25 16:39:44): [be[linux.redacted.domain]] [sdap_id_op_connec=
t_done] (0x4000): [RID#33] notify error to op #1: 5 [Input/output error]
* (2024-04-25 16:39:44): [be[linux.redacted.domain]] [be_mark_dom_offli=
ne] (0x1000): [RID#33] Marking subdomain SUBDOMB.redacted.domain offline
* (2024-04-25 16:39:44): [be[linux.redacted.domain]] [be_mark_subdom_of=
fline] (0x1000): [RID#33] Marking subdomain SUBDOMB.redacted.domain as inac=
tive
* (2024-04-25 16:39:44): [be[linux.redacted.domain]] [ipa_srv_ad_acct_l=
ookup_done] (0x0040): [RID#33] ipa_get_*_acct request failed: [1432158277]:=
Subdomain is inactive.
********************** BACKTRACE DUMP ENDS HERE ***************************=
******
There are not replication issues:
----
[root(a)idm01 ~]# ipa-healthcheck --source=3Dipahealthcheck.ds.replication
[
{
"source": "ipahealthcheck.ds.replication",
"check": "ReplicationCheck",
"result": "WARNING",
"uuid": "4a5341db-bf65-4350-bf2c-c81872db536b",
"when": "20240425145134Z",
"duration": "0.391402",
"kw": {
"key": "DSREPLLE0002",
"items": [
"Replication",
"Conflict Entries"
],
"msg": "There were 1 conflict entries found under the replication suf=
fix \"dc=3Dlinux,dc=3Dredacted,dc=3Ddomain\"."
}
}
]
=
=
--===============7593279693135026193==--
From sbose at redhat.com Thu Apr 25 19:10:56 2024
Content-Type: multipart/mixed; boundary="===============3173075081047723861=="
MIME-Version: 1.0
From: Sumit Bose
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: IPA replica cannot lookup AD trust users (worked
before)
Date: Thu, 25 Apr 2024 21:10:33 +0200
Message-ID:
In-Reply-To: 20240425150341.14559.84099@mailman01.iad2.fedoraproject.org
--===============3173075081047723861==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Am Thu, Apr 25, 2024 at 03:03:41PM -0000 schrieb slek kus via FreeIPA-users:
> Hi, the only replica cannot retrieve AD trust users (one way trust). Trus=
t agent had been installed on this replica.
> I noticed this issue, since clients that point to the replica started to =
fail authenticating users. This replica worked OK before.
> All functions and syncs except for the AD user lookup. overrides are sync=
ed over but replica cannot find the user. =
> =
> Can't get it fixed. Is this repairable? Can I uninstall the replica and r=
einstall?
> =
> [root(a)idm01 ~]# ipa server-role-find
> -----------------------
> 10 server roles matched
> -----------------------
> Server name: idm01.linux.redacted.domain
> Role name: AD trust agent
> Role status: enabled
> =
> Server name: idm02.linux.redacted.domain
> Role name: AD trust agent
> Role status: enabled
> =
> Server name: idm01.linux.redacted.domain
> Role name: AD trust controller
> Role status: enabled
> =
> Server name: idm02.linux.redacted.domain
> Role name: AD trust controller
> Role status: enabled
> =
> <...>
> =
> On the main server, the AD user can be looked up. On the "replica" it ret=
urns empty.
> =
> working on main server:
> [root(a)idm01 ~]# getent passwd testuser(a)subdoma.redacted.domain
> testuser(a)subdomA.redacted.domain:*:683005154:683005154:CHANGED:/home/te=
stuser:/usr/bin/bash
> =
> =
> =
> Checking the sssd_doamin.log of the replica, I see the message that the d=
omain is not active while fetching ad user. Further in the same log there's=
mention of another subdomain be inactive. =
> The trust is wirth a AD forest with 2 subdomains. =
> -----
> (2024-04-25 16:40:11): [be[linux.redacted.domain]] [ipa_srv_ad_acct_looku=
p_done] (0x0040): [RID#34] ipa_get_*_acct request failed: [1432158277]: Sub=
domain is inactive.
> * ... skipping repetitive backtrace ...
> =
> <...>
> =
> (2024-04-25 16:39:44): [be[linux.redacted.domain]] [resolv_discover_srv_d=
one] (0x0040): [RID#33] SRV query failed [11]: Could not contact DNS servers
Hi,
looks like DNS issues, does
host -t SRV _ldap._tcp.SUBDOMB.redacted.domain
return anything?
bye,
Sumit
=
> * ... skipping repetitive backtrace ...
> (2024-04-25 16:39:44): [be[linux.redacted.domain]] [fo_discover_servers_p=
rimary_done] (0x0040): [RID#33] Unable to retrieve primary servers [1432158=
238]: SRV lookup error
> * ... skipping repetitive backtrace ...
> (2024-04-25 16:39:44): [be[linux.redacted.domain]] [resolve_srv_done] (0x=
0040): [RID#33] Unable to resolve SRV [1432158238]: SRV lookup error
> * ... skipping repetitive backtrace ...
> (2024-04-25 16:39:44): [be[linux.redacted.domain]] [fo_resolve_service_se=
nd] (0x0020): [RID#33] No available servers for service 'sd_SUBDOMB.redacte=
d.domain'
> * ... skipping repetitive backtrace ...
> (2024-04-25 16:39:44): [be[linux.redacted.domain]] [ipa_srv_ad_acct_looku=
p_done] (0x0040): [RID#33] ipa_get_*_acct request failed: [1432158277]: Sub=
domain is inactive.
> ********************** PREVIOUS MESSAGE WAS TRIGGERED BY THE FOLLOWING BA=
CKTRACE:
> * (2024-04-25 16:39:44): [be[linux.redacted.domain]] [be_resolve_serv=
er_done] (0x1000): [RID#33] Server [NULL] resolution failed: [5]: Input/out=
put error
> * (2024-04-25 16:39:44): [be[linux.redacted.domain]] [sdap_id_op_conn=
ect_done] (0x0400): [RID#33] Failed to connect to server, but ignore mark o=
ffline is enabled.
> * (2024-04-25 16:39:44): [be[linux.redacted.domain]] [sdap_id_op_conn=
ect_done] (0x4000): [RID#33] notify error to op #1: 5 [Input/output error]
> * (2024-04-25 16:39:44): [be[linux.redacted.domain]] [be_mark_dom_off=
line] (0x1000): [RID#33] Marking subdomain SUBDOMB.redacted.domain offline
> * (2024-04-25 16:39:44): [be[linux.redacted.domain]] [be_mark_subdom_=
offline] (0x1000): [RID#33] Marking subdomain SUBDOMB.redacted.domain as in=
active
> * (2024-04-25 16:39:44): [be[linux.redacted.domain]] [ipa_srv_ad_acct=
_lookup_done] (0x0040): [RID#33] ipa_get_*_acct request failed: [1432158277=
]: Subdomain is inactive.
> ********************** BACKTRACE DUMP ENDS HERE *************************=
********
> =
> There are not replication issues:
> ----
> [root(a)idm01 ~]# ipa-healthcheck --source=3Dipahealthcheck.ds.replication
> [
> {
> "source": "ipahealthcheck.ds.replication",
> "check": "ReplicationCheck",
> "result": "WARNING",
> "uuid": "4a5341db-bf65-4350-bf2c-c81872db536b",
> "when": "20240425145134Z",
> "duration": "0.391402",
> "kw": {
> "key": "DSREPLLE0002",
> "items": [
> "Replication",
> "Conflict Entries"
> ],
> "msg": "There were 1 conflict entries found under the replication s=
uffix \"dc=3Dlinux,dc=3Dredacted,dc=3Ddomain\"."
> }
> }
> ]
> =
> =
> =
> =
> --
> _______________________________________________
> FreeIPA-users mailing list -- freeipa-users(a)lists.fedorahosted.org
> To unsubscribe send an email to freeipa-users-leave(a)lists.fedorahosted.=
org
> Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code=
-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives: https://lists.fedorahosted.org/archives/list/freeipa-users=
(a)lists.fedorahosted.org
> Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/=
new_issue
--===============3173075081047723861==--
From slekkus75 at proton.me Fri Apr 26 07:37:56 2024
Content-Type: multipart/mixed; boundary="===============7373219009705315526=="
MIME-Version: 1.0
From: slek kus
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: IPA replica cannot lookup AD trust users (worked
before)
Date: Fri, 26 Apr 2024 07:37:44 +0000
Message-ID: <20240426073744.2391.82006@mailman01.iad2.fedoraproject.org>
In-Reply-To: ZiqqqZLMboLdsdpZ@sbose.users.ipa.redhat.com
--===============7373219009705315526==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Hi Sumit, that does not return anything good on the replica. See below. =
On the main IPA node node:
----
[alma(a)idm01 ~]$ host -t SRV _ldap._tcp.redacted.domain
_ldap._tcp.redacted.domain has SRV record 0 100 389 dc01.redacted.domain.
_ldap._tcp.redacted.domain has SRV record 0 100 389 dc01.redacted.domain.
[alma(a)idm01 ~]$ host -t SRV _ldap._tcp.domaina.redacted.domain
_ldap._tcp.domaina.redacted.domain has SRV record 0 100 389 windc-dc01.doma=
ina.redacted.domain.
_ldap._tcp.domaina.redacted.domain has SRV record 0 100 389 windc-dc02.doma=
ina.redacted.domain.
[alma(a)idm01 ~]$ host -t SRV _ldap._tcp.domainb.redacted.domain
_ldap._tcp.domainb.redacted.domain has SRV record 0 100 389 windc-dc02.doma=
inb.redacted.domain.
_ldap._tcp.domainb.redacted.domain has SRV record 0 100 389 windc-dc01.doma=
inb.redacted.domain.
On the secondary (replica):
----
[alma(a)idm02 ~]$ host -t SRV _ldap._tcp.redacted.domain
Host _ldap._tcp.redacted.domain not found: 2(SERVFAIL)
[alma(a)idm02 ~]$ host -t SRV _ldap._tcp.domainb.redacted.domain
Host _ldap._tcp.domainb.redacted.domain not found: 2(SERVFAIL)
[alma(a)idm02 ~]$ host -t SRV _ldap._tcp.domaina.redacted.domain
Host _ldap._tcp.domaina.redacted.domain not found: 2(SERVFAIL)
The DNS zone seems replicated and OK on the replica. The record is present =
there too.
On the main IPA node node:
----
[alma(a)idm01 ~]$ ipa dnsrecord-find linux.redacted.domain.
Record name: _ldap._tcp
SRV record: 0 100 389 idm01.linux.redacted.domain., 0 200 389 idm02.linux=
.redacted.domain.
On the secondary (replica):
-----
[alma(a)idm02 ~]$ ipa dnsrecord-find linux.redacted.domain.
Record name: _ldap._tcp
SRV record: 0 100 389 idm01.linux.redacted.domain., 0 200 389 idm02.linux=
.redacted.domain.
--===============7373219009705315526==--
From abokovoy at redhat.com Fri Apr 26 07:59:17 2024
Content-Type: multipart/mixed; boundary="===============1373605318661737498=="
MIME-Version: 1.0
From: Alexander Bokovoy
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: IPA replica cannot lookup AD trust users (worked
before)
Date: Fri, 26 Apr 2024 10:57:14 +0300
Message-ID:
In-Reply-To: 20240426073744.2391.82006@mailman01.iad2.fedoraproject.org
--===============1373605318661737498==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
On =D0=9F=D1=8F=D1=82, 26 =D0=BA=D1=80=D0=B0 2024, slek kus via FreeIPA-use=
rs wrote:
>Hi Sumit, that does not return anything good on the replica. See below.
>
>On the main IPA node node:
>----
> [alma(a)idm01 ~]$ host -t SRV _ldap._tcp.redacted.domain
>_ldap._tcp.redacted.domain has SRV record 0 100 389 dc01.redacted.domain.
>_ldap._tcp.redacted.domain has SRV record 0 100 389 dc01.redacted.domain.
>
>[alma(a)idm01 ~]$ host -t SRV _ldap._tcp.domaina.redacted.domain
>_ldap._tcp.domaina.redacted.domain has SRV record 0 100 389 windc-dc01.dom=
aina.redacted.domain.
>_ldap._tcp.domaina.redacted.domain has SRV record 0 100 389 windc-dc02.dom=
aina.redacted.domain.
>
>[alma(a)idm01 ~]$ host -t SRV _ldap._tcp.domainb.redacted.domain
>_ldap._tcp.domainb.redacted.domain has SRV record 0 100 389 windc-dc02.dom=
ainb.redacted.domain.
>_ldap._tcp.domainb.redacted.domain has SRV record 0 100 389 windc-dc01.dom=
ainb.redacted.domain.
>
>On the secondary (replica):
>----
>[alma(a)idm02 ~]$ host -t SRV _ldap._tcp.redacted.domain
>Host _ldap._tcp.redacted.domain not found: 2(SERVFAIL)
>
>[alma(a)idm02 ~]$ host -t SRV _ldap._tcp.domainb.redacted.domain
>Host _ldap._tcp.domainb.redacted.domain not found: 2(SERVFAIL)
>
>[alma(a)idm02 ~]$ host -t SRV _ldap._tcp.domaina.redacted.domain
>Host _ldap._tcp.domaina.redacted.domain not found: 2(SERVFAIL)
>
>The DNS zone seems replicated and OK on the replica. The record is present=
there too.
What is used as a DNS server for the idm02? Are you running idm02 with
an integrated DNS server or it is some other machine that resolves the
queries?
SERVFAIL means DNS server did return an error when processing your
request. Judging that this error happens for IPA domain's DNS zone and
for others too, I wonder if you have a generic DNS resolution issue from
idm02? For example, if idm01 is used as a DNS server there and idm02 is
in a different IP network, then BIND on idm01 will not allow DNS client
from idm02 to perform DNS queries. You'd need to add an ACL to allow
that.
Or it could be a DNSSEC error where a client is configured to have
DNSSEC validation but the DNS server responds without DNSSEC.
>
>On the main IPA node node:
>----
>[alma(a)idm01 ~]$ ipa dnsrecord-find linux.redacted.domain.
>Record name: _ldap._tcp
> SRV record: 0 100 389 idm01.linux.redacted.domain., 0 200 389 idm02.linu=
x.redacted.domain.
>
>On the secondary (replica):
>-----
>[alma(a)idm02 ~]$ ipa dnsrecord-find linux.redacted.domain.
>Record name: _ldap._tcp
> SRV record: 0 100 389 idm01.linux.redacted.domain., 0 200 389 idm02.linu=
x.redacted.domain.
>--
>_______________________________________________
>FreeIPA-users mailing list -- freeipa-users(a)lists.fedorahosted.org
>To unsubscribe send an email to freeipa-users-leave(a)lists.fedorahosted.o=
rg
>Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-=
of-conduct/
>List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
>List Archives: https://lists.fedorahosted.org/archives/list/freeipa-users(=
a)lists.fedorahosted.org
>Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/n=
ew_issue
-- =
/ Alexander Bokovoy
Sr. Principal Software Engineer
Security / Identity Management Engineering
Red Hat Limited, Finland
--===============1373605318661737498==--
From clopmz at outlook.com Fri Apr 26 08:08:17 2024
Content-Type: multipart/mixed; boundary="===============3907123792303646727=="
MIME-Version: 1.0
From: Carlos Lopez
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: Password expired is not requested with Ubuntu
clients
Date: Fri, 26 Apr 2024 08:07:59 +0000
Message-ID: <
>
In-Reply-To: ZiKq8hRDctwaYecn@sbose.users.ipa.redhat.com
--===============3907123792303646727==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Sorry for this later response. Problem is solved. The problem was in the co=
mmon-auth file, in the line referring to pam_sss.so that was missing the op=
tion 'use_first_pass'.
Many thanks to all for your help
Regards,
C. L. Martinez
-----Original Message-----
From: Sumit Bose =
Sent: Friday, April 19, 2024 19:34
To: Carlos Lopez
Cc: Sumit Bose ; FreeIPA users list
Subject: Re: [Freeipa-users] Password expired is not requested with Ubuntu =
clients
Am Fri, Apr 19, 2024 at 05:03:46PM +0000 schrieb Carlos Lopez:
> Of course. Here it is:
> =
> # PAM configuration for the Secure Shell service
> =
> # Standard Un*x authentication.
> @include common-auth
> =
> # Disallow non-root logins when /etc/nologin exists.
> account required pam_nologin.so
> =
> # Uncomment and edit /etc/security/access.conf if you need to set =
> complex # access limits that are hard to express in sshd_config.
> # account required pam_access.so
> =
> # Standard Un*x authorization.
> @include common-account
> =
> # SELinux needs to be the first session rule. This ensures that any # =
> lingering context has been cleared. Without this it is possible that =
> a # module could execute code in the wrong domain.
> session [success=3Dok ignore=3Dignore module_unknown=3Dignore default=3Db=
ad] pam_selinux.so close
> =
> # Set the loginuid process attribute.
> session required pam_loginuid.so
> =
> # Create a new session keyring.
> session optional pam_keyinit.so force revoke
> =
> # Standard Un*x session setup and teardown.
> @include common-session
> =
> # Print the message of the day upon successful login.
> # This includes a dynamically generated part from /run/motd.dynamic # =
> and a static (admin-editable) part from /etc/motd.
> session optional pam_motd.so motd=3D/run/motd.dynamic
> session optional pam_motd.so noupdate
> =
> # Print the status of the user's mailbox upon successful login.
> session optional pam_mail.so standard noenv # [1]
> =
> # Set up user limits from /etc/security/limits.conf.
> session required pam_limits.so
> =
> # Read environment variables from /etc/environment and # =
> /etc/security/pam_env.conf.
> session required pam_env.so # [1]
> # In Debian 4.0 (etch), locale-related environment variables were =
> moved to # /etc/default/locale, so read that as well.
> session required pam_env.so user_readenv=3D1 envfile=3D/etc/defaul=
t/locale
> =
> # SELinux needs to intervene at login time to ensure that the process =
> starts # in the proper default security context. Only sessions which =
> are intended # to run in the user's context should be run after this.
> session [success=3Dok ignore=3Dignore module_unknown=3Dignore default=3Db=
ad] pam_selinux.so open
> =
> # Standard Un*x password updating.
> @include common-password
> =
> and common-account:
> =
> #
> # /etc/pam.d/common-account - authorization settings common to all =
> services # # This file is included from other service-specific PAM =
> config files, # and should contain a list of the authorization modules =
> that define # the central access policy for use on the system. The =
> default is to # only deny service to users whose accounts are expired =
> in /etc/shadow.
> #
> # As of pam 1.0.1-6, this file is managed by pam-auth-update by default.
> # To take advantage of this, it is recommended that you configure any =
> # local modules either before or after the default block, and use # =
> pam-auth-update to manage selection of other modules. See # =
> pam-auth-update(8) for details.
> #
> =
> # here are the per-package modules (the "Primary" block)
> account [success=3D1 new_authtok_reqd=3Ddone default=3Dignore] pam=
_unix.so
> # here's the fallback if no module succeeds
> account requisite pam_deny.so
> # prime the stack with a positive return value if there isn't one =
> already; # this avoids us returning an error just because nothing sets =
> a success code # since the modules above will each just jump around
> account required pam_permit.so
> # and here are more per-package modules (the "Additional" block) # end =
> of pam-auth-update config
Hi,
so pam_sss.so is not called at all which would explain the behavior. I assu=
me pam_sss.so is listed in common-auth. Did you add it on your own to commo=
n-auth or was it added by a system utility e.g. pam-auth-update?
bye,
Sumit
> =
> Best regards,
> C. L. Martinez
> =
> ________________________________________
> From: Sumit Bose
> Sent: 19 April 2024 17:46
> To: FreeIPA users list
> Cc: Carlos Lopez
> Subject: Re: [Freeipa-users] Password expired is not requested with =
> Ubuntu clients
> =
> Am Fri, Apr 19, 2024 at 08:56:36AM +0000 schrieb Carlos Lopez via FreeIPA=
-users:
> > Good morning,
> >
> > I have configured some Ubuntu clientes to authenticate via Kerberos aga=
inst my RHEL9 IdM server. Everything works correctly: clients are authentic=
ated, etc.
> >
> > The problem comes when a user's password has expired. In the IdM server=
logs it is clear that the user must change the password:
> >
> > 2024-04-19T08:38:20.946335+00:00 rhelidmsrv01 krb5kdc[21392]: AS_REQ =
> > (8 etypes {aes256-cts-hmac-sha1-96(18), aes128-cts-hmac-sha1-96(17), =
> > aes256-cts-hmac-sha384-192(20), aes128-cts-hmac-sha256-128(19), =
> > DEPRECATED:des3-cbc-sha1(16), DEPRECATED:arcfour-hmac(23), =
> > camellia128-cts-cmac(25), camellia256-cts-cmac(26)}) 172.19.11.14: =
> > REQUIRED PWCHANGE: user1(a)MYDOM.ORG for krbtgt/MYDOM.ORG(a)MYDOM.ORG, =
> > Password has expired
> > 2024-04-19T08:38:20.946413+00:00 rhelidmsrv01 krb5kdc[21392]: =
> > closing down fd 13
> > 2024-04-19T08:38:20.946712+00:00 rhelidmsrv01 krb5kdc[21392]: AS_REQ =
> > (8 etypes {aes256-cts-hmac-sha1-96(18), aes128-cts-hmac-sha1-96(17), =
> > aes256-cts-hmac-sha384-192(20), aes128-cts-hmac-sha256-128(19), =
> > DEPRECATED:des3-cbc-sha1(16), DEPRECATED:arcfour-hmac(23), =
> > camellia128-cts-cmac(25), camellia256-cts-cmac(26)}) 172.19.11.14: =
> > NEEDED_PREAUTH: user1(a)MYDOM.ORG for kadmin/changepw(a)MYDOM.ORG, =
> > Additional pre-authentication required
> > 2024-04-19T08:38:20.946747+00:00 rhelidmsrv01 krb5kdc[21392]: =
> > closing down fd 13
> > 2024-04-19T08:38:20.950691+00:00 rhelidmsrv01 krb5kdc[21392]: AS_REQ =
> > (8 etypes {aes256-cts-hmac-sha1-96(18), aes128-cts-hmac-sha1-96(17), =
> > aes256-cts-hmac-sha384-192(20), aes128-cts-hmac-sha256-128(19), =
> > DEPRECATED:des3-cbc-sha1(16), DEPRECATED:arcfour-hmac(23), =
> > camellia128-cts-cmac(25), camellia256-cts-cmac(26)}) 172.19.11.14: =
> > ISSUE: authtime 1713515900, etypes {rep=3Daes256-cts-hmac-sha1-96(18), =
> > tkt=3Daes256-cts-hmac-sha384-192(20), =
> > ses=3Daes256-cts-hmac-sha1-96(18)}, user1(a)MYDOM.ORG for =
> > kadmin/changepw(a)MYDOM.ORG
> >
> > But when accessing to Ubuntu client via ssh, it never prompts to change=
the password and you can log in.
> =
> Hi,
> =
> can you share your PAM configuration for the sshd service. I'm asking =
> because the change of expired passwords in handled in the 'account'
> section and I guess with your configuration (local users with =
> authentication by SSSD) pam_sss.so is not called for local users =
> during 'account'.
> =
> bye,
> Sumit
> =
> >
> > My sssd's config in Ubuntu client is:
> >
> > [sssd]
> > config_file_version =3D 2
> > services =3D pam
> > domains =3D mydom.org
> >
> > [pam]
> > pam_pwd_expiration_warning =3D 2
> >
> > [domain/mydom.org]
> > id_provider =3D proxy
> > proxy_lib_name =3D files
> > auth_provider =3D krb5
> > chpass_provider =3D krb5
> > krb5_server =3D rhelidmsrv01.mydom.org krb5_kpasswd =3D =
> > rhelidmsrv01.mydom.org krb5_realm =3D mydom.org krb5_ccname_template =
=3D =
> > KEYRING:persistent:%U krb5_validate =3D true cache_credentials =3D true
> >
> > What could be the problem?
> >
> > Best regards,
> > C. L. Martinez
> > --
> > _______________________________________________
> > FreeIPA-users mailing list -- freeipa-users(a)lists.fedorahosted.org
> > To unsubscribe send an email to =
> > freeipa-users-leave(a)lists.fedorahosted.org
> > Fedora Code of Conduct: =
> > https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> > List Guidelines: =
> > https://fedoraproject.org/wiki/Mailing_list_guidelines
> > List Archives: =
> > https://lists.fedorahosted.org/archives/list/freeipa-users(a)lists.fed
> > orahosted.org Do not reply to spam, report it: =
> > https://pagure.io/fedora-infrastructure/new_issue
>=20
--===============3907123792303646727==--
From slekkus75 at proton.me Fri Apr 26 08:17:22 2024
Content-Type: multipart/mixed; boundary="===============5319671784089183127=="
MIME-Version: 1.0
From: slek kus
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: IPA replica cannot lookup AD trust users (worked
before)
Date: Fri, 26 Apr 2024 08:17:10 +0000
Message-ID: <20240426081710.8605.97879@mailman01.iad2.fedoraproject.org>
In-Reply-To: ZiteWooHj_XMQjiM@redhat.com
--===============5319671784089183127==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Hi Alexander, according to /etc/resolv.conf it is integrated and points to =
localhost, but nmcli says DNS is set to idm01. =
A bit strange, since resolv.conf is generated by networkmanager. =
----
[root(a)idm02 ~]# nmcli dev show | grep DNS
IP4.DNS[1]: 172.16.27.10 <---- this is idm01
[root(a)idm02 ~]# cat /etc/resolv.conf
# Generated by NetworkManager
search linux.redacted.domain
nameserver 127.0.0.1
----
Both servers are in the same nertwork.
On idm02, I can resolve the ipa domain it is the AD domains that fail:
----
[root(a)idm02 ~]# host -t SRV _ldap._tcp.linux.redacted.domain
_ldap._tcp.linux.redacted.domain has SRV record 0 200 389 idm02.linux.redac=
ted.domain.
_ldap._tcp.linux.redacted.domain has SRV record 0 100 389 idm01.linux.redac=
ted.domain.
--===============5319671784089183127==--
From abokovoy at redhat.com Fri Apr 26 10:00:16 2024
Content-Type: multipart/mixed; boundary="===============0870983227793622629=="
MIME-Version: 1.0
From: Alexander Bokovoy
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: IPA replica cannot lookup AD trust users (worked
before)
Date: Fri, 26 Apr 2024 12:59:58 +0300
Message-ID:
In-Reply-To: 20240426081710.8605.97879@mailman01.iad2.fedoraproject.org
--===============0870983227793622629==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
On =D0=9F=D1=8F=D1=82, 26 =D0=BA=D1=80=D0=B0 2024, slek kus via FreeIPA-use=
rs wrote:
>Hi Alexander, according to /etc/resolv.conf it is integrated and points to=
localhost, but nmcli says DNS is set to idm01.
>A bit strange, since resolv.conf is generated by networkmanager.
>----
> [root(a)idm02 ~]# nmcli dev show | grep DNS
>IP4.DNS[1]: 172.16.27.10 <---- this is idm01
>[root(a)idm02 ~]# cat /etc/resolv.conf
># Generated by NetworkManager
>search linux.redacted.domain
>nameserver 127.0.0.1
>----
>
>Both servers are in the same nertwork.
>
>On idm02, I can resolve the ipa domain it is the AD domains that fail:
>----
>[root(a)idm02 ~]# host -t SRV _ldap._tcp.linux.redacted.domain
>_ldap._tcp.linux.redacted.domain has SRV record 0 200 389 idm02.linux.reda=
cted.domain.
>_ldap._tcp.linux.redacted.domain has SRV record 0 100 389 idm01.linux.reda=
cted.domain.
Do you have DNSSEC validation enforced on BIND side?
# grep dnssec /etc/named/ipa-options-ext.conf
/* dnssec-enable is obsolete and 'yes' by default */
dnssec-validation no;
If dnssec-validation is set to yes, that would explain because your AD
DNS server most likely is not using DNSSEC at all.
-- =
/ Alexander Bokovoy
Sr. Principal Software Engineer
Security / Identity Management Engineering
Red Hat Limited, Finland
--===============0870983227793622629==--
From slekkus75 at proton.me Fri Apr 26 11:06:04 2024
Content-Type: multipart/mixed; boundary="===============5323538460842351192=="
MIME-Version: 1.0
From: slek kus
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: IPA replica cannot lookup AD trust users (worked
before)
Date: Fri, 26 Apr 2024 11:05:54 +0000
Message-ID: <20240426110554.2124.81965@mailman01.iad2.fedoraproject.org>
In-Reply-To: Zit7Hl2a_VHh-3T8@redhat.com
--===============5323538460842351192==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Thanks much. dnssec-validation was set to yes on the replica. No idea how t=
hat happened. Works now.
Something else and not related I wondered about, is why some clients point =
to a certain server (in my case the failing server). =
This is seen with `sssctl domain-status ` under "Active servers=
". Is the weight added to the SRV records only when server/dns service is d=
own and not when misconfigured/malfunctioning?
--===============5323538460842351192==--
From jochen at jochen.org Fri Apr 26 19:02:09 2024
Content-Type: multipart/mixed; boundary="===============4769516172622075609=="
MIME-Version: 1.0
From: Jochen Kellner
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Fedora 40: new warning in ipa-healthckeck
Date: Fri, 26 Apr 2024 21:01:47 +0200
Message-ID: <83plucosmc.fsf@jochen.org>
--===============4769516172622075609==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Hi,
I've upgraded my freeipa server to Fedora 40 (the system was installed
several releases ago). After the upgrade I get the following new warning
from ipa-healthcheck:
{
"source": "ipahealthcheck.ds.backends",
"check": "BackendsCheck",
"result": "WARNING",
"uuid": "875db8e3-029c-46f7-87e5-bf9a216d9637",
"when": "20240426184431Z",
"duration": "0.031642",
"kw": {
"key": "DSBLE0005",
"items": [
"nsslapd-dbcachesize",
"nsslapd-db-logdirectory",
"nsslapd-db-transaction-wait",
"nsslapd-db-checkpoint-interval",
"nsslapd-db-compactdb-interval",
"nsslapd-db-compactdb-time",
"nsslapd-db-transaction-batch-val",
"nsslapd-db-transaction-batch-min-wait",
"nsslapd-db-transaction-batch-max-wait",
"nsslapd-db-logbuf-size",
"nsslapd-db-page-size",
"nsslapd-db-locks",
"nsslapd-db-locks-monitoring-enabled",
"nsslapd-db-locks-monitoring-threshold",
"nsslapd-db-locks-monitoring-pause",
"nsslapd-db-private-import-mem",
"nsslapd-db-deadlock-policy"
],
"msg": "Found configuration attributes that are not applicable for th=
e configured backend type."
}
},
According to
https://www.port389.org/docs/389ds/FAQ/Berkeley-DB-deprecation.html the
bdb backend is deprecated. The system was installed with
389-ds-base < 1.4.4.9-1.fc33.x86_64 (I see the upgrade to that version
in /var/log/dnf.rpm.log*. Since 3.0 new installations should use LMBD as
the backend. Is that true for new installations?
What is the desired action that I should take?
I can remove the options from the dirsrv configuration. Should I?
Shall I switch to lmdb manually? Or is that something that
ipa-server-upgrade should be doing?
Otherwise I can suppress the message in ipa-healthcheck for now. But I
guess I should fix my installation before the deprecated support really
gets dropped... Is deploying a new replica and decommisioning the old
server we the preferred action?
Jochen
-- =
This space is intentionally left blank.
--===============4769516172622075609==--
From rcritten at redhat.com Fri Apr 26 19:15:29 2024
Content-Type: multipart/mixed; boundary="===============7387260950092376016=="
MIME-Version: 1.0
From: Rob Crittenden
To: freeipa-users at lists.fedorahosted.org
Subject: [Freeipa-users] Re: Fedora 40: new warning in ipa-healthckeck
Date: Fri, 26 Apr 2024 15:15:13 -0400
Message-ID: <090a1eca-a33e-97cf-a6e3-39e76e905515@redhat.com>
In-Reply-To: 83plucosmc.fsf@jochen.org
--===============7387260950092376016==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Cross-posting this on the 389-users list.
rob
Jochen Kellner via FreeIPA-users wrote:
> =
> Hi,
> =
> I've upgraded my freeipa server to Fedora 40 (the system was installed
> several releases ago). After the upgrade I get the following new warning
> from ipa-healthcheck:
> =
> {
> "source": "ipahealthcheck.ds.backends",
> "check": "BackendsCheck",
> "result": "WARNING",
> "uuid": "875db8e3-029c-46f7-87e5-bf9a216d9637",
> "when": "20240426184431Z",
> "duration": "0.031642",
> "kw": {
> "key": "DSBLE0005",
> "items": [
> "nsslapd-dbcachesize",
> "nsslapd-db-logdirectory",
> "nsslapd-db-transaction-wait",
> "nsslapd-db-checkpoint-interval",
> "nsslapd-db-compactdb-interval",
> "nsslapd-db-compactdb-time",
> "nsslapd-db-transaction-batch-val",
> "nsslapd-db-transaction-batch-min-wait",
> "nsslapd-db-transaction-batch-max-wait",
> "nsslapd-db-logbuf-size",
> "nsslapd-db-page-size",
> "nsslapd-db-locks",
> "nsslapd-db-locks-monitoring-enabled",
> "nsslapd-db-locks-monitoring-threshold",
> "nsslapd-db-locks-monitoring-pause",
> "nsslapd-db-private-import-mem",
> "nsslapd-db-deadlock-policy"
> ],
> "msg": "Found configuration attributes that are not applicable for =
the configured backend type."
> }
> },
> =
> According to
> https://www.port389.org/docs/389ds/FAQ/Berkeley-DB-deprecation.html the
> bdb backend is deprecated. The system was installed with
> 389-ds-base < 1.4.4.9-1.fc33.x86_64 (I see the upgrade to that version
> in /var/log/dnf.rpm.log*. Since 3.0 new installations should use LMBD as
> the backend. Is that true for new installations?
> =
> What is the desired action that I should take?
> =
> I can remove the options from the dirsrv configuration. Should I?
> =
> Shall I switch to lmdb manually? Or is that something that
> ipa-server-upgrade should be doing?
> =
> Otherwise I can suppress the message in ipa-healthcheck for now. But I
> guess I should fix my installation before the deprecated support really
> gets dropped... Is deploying a new replica and decommisioning the old
> server we the preferred action?
> =
> Jochen
>=20
--===============7387260950092376016==--