On 12/20/18 6:52 PM, dbischof--- via FreeIPA-users wrote:
Hi Florence,

On Thu, 20 Dec 2018, Florence Blanc-Renaud via FreeIPA-users wrote:

On 12/20/18 4:22 PM, dbischof--- via FreeIPA-users wrote:
 my IPA system consists of 2 masters with their own self-signed CAs, one of
 them being the certificate renewal master (ipa1). The system has been
 running for years and has been migrated from an IPA 3 system.

 Since a while, the Web UI logins on ipa1 don't work anymore ("Login failed
 due to an unknown reason.").

 Web UI logins on the other server (ipa2) work and everything else is
 working fine, too, ipactl status reports all services running.

 On login attempt:

 --- httpd log
 [...]
 [:error] [pid 15551] [remote 141.51.X.X:0] mod_wsgi (pid=15551): Exception
 occurred processing WSGI script '/usr/share/ipa/wsgi.py'.
 [...]
 [:error] [pid 15551] [remote 141.51.X.X:0] CalledProcessError: Command
 '/usr/bin/kinit -n -c /var/run/ipa/ccaches/armor_15551 -X
 X509_anchors=FILE:/var/kerberos/krb5kdc/kdc.crt -X
 X509_anchors=FILE:/var/lib/ipa-client/pki/kdc-ca-bundle.pem' returned
 non-zero exit status 1
 ---

 --- krb5kdc.log
 [...]
 Dec 20 16:06:54 ipa1.example.com krb5kdc[15517](info): AS_REQ (8 etypes
 {18 17 20 19 16 23 25 26}) 141.51.X.Y: NEEDED_PREAUTH:
 WELLKNOWN/[email protected] for krbtgt/[email protected],
 Additional pre-authentication required
 Dec 20 16:06:54 ipa1.example.com krb5kdc[15517](info): closing down fd 11
 Dec 20 16:06:54 ipa1.example.com krb5kdc[15518](info): AS_REQ (8 etypes
 {18 17 20 19 16 23 25 26}) 141.51.X.Y: KDC_RETURN_PADATA:
 WELLKNOWN/[email protected] for krbtgt/[email protected], Failed
 to verify own certificate (depth 0): certificate has expired
 Dec 20 16:06:54 ipa1.example.com krb5kdc[15518](info): closing down fd 11
 ---

 --- ipa-checkcerts.py
 IPA version 4.5.4-10.el7.centos.3
 Check CA status
 Check tracking
 Check NSS trust
 Check dates
 Checking certificates in CS.cfg
 Comparing certificates to requests in LDAP
 Checking RA certificate
 Checking authorities
 Checking host keytab
 Validating certificates
 Checking renewal master
 End-to-end cert API test
 Checking permissions and ownership
 Failures:
 Unable to find request for serial 268304391
 Unable to find request for serial 268304394
 Unable to find request for serial 268304393
 Unable to find request for serial 268304392
 Subject O=EXAMPLE.COM,CN=ipa2.example.com and template subject
 CN=ipa1.example.com,O=EXAMPLE.COM do not match for serial 57
 ---

 --- ipa pkinit-status --all
 -----------------
 2 servers matched
 -----------------
    Server name: ipa2.example.com
    PKINIT status: enabled

    Server name: ipa1.example.com
    PKINIT status: enabled
 ----------------------------
 Number of entries returned 2
 ----------------------------

 To my understanding, proper certificate exchange between my two servers
 ceased working at some point. How do i track this down and fix it?

your issue looks similar to ticket #6792 [1]. Can you check the result of upgrade in /var/log/ipaupgrade.log?
Also check the output of
$ ipa-pkinit-manage status
and if the files /var/lib/ipa-client/pki/kdc-ca-bundle.pem and /var/lib/ipa-client/pki/ca-bundle.pem exist, with -rw-r--r-- permissions.

Regarding the certificates, does getcert list show expired certs?
flo

[1] https://pagure.io/freeipa/issue/6792

---
$ ipa-pkinit-manage status
PKINIT is enabled
---

There are no expired certificates, kdc-ca-bundle.pem and ca-bundle.pem exist with proper permissions, but I found something in ipaupgrade.log:

---
2018-09-12T13:37:18Z DEBUG args=/usr/bin/certutil -d /etc/httpd/alias -L -f /etc/httpd/alias/pwdfile.txt
2018-09-12T13:37:19Z DEBUG Process finished, return code=0
2018-09-12T13:37:19Z DEBUG stdout=
Certificate Nickname                                         Trust Attributes

SSL,S/MIME,JAR/XPI

Server-Cert                                                  u,u,u
EXAMPLE.COM IPA CA                                           CT,C,C

2018-09-12T13:37:19Z DEBUG stderr=
2018-09-12T13:37:19Z DEBUG Starting external process
2018-09-12T13:37:19Z DEBUG args=/usr/bin/certutil -d /etc/httpd/alias -L -n EXAMPLE.COM IPA CA -a -f /etc/httpd/alias/pwdfile.txt
2018-09-12T13:37:19Z DEBUG Process finished, return code=0
2018-09-12T13:37:19Z DEBUG stdout=
-----BEGIN CERTIFICATE-----
[...]
-----END CERTIFICATE-----

2018-09-12T13:37:19Z DEBUG stderr=
2018-09-12T13:37:19Z DEBUG Executing upgrade plugin: update_ra_cert_store
2018-09-12T13:37:19Z DEBUG raw: update_ra_cert_store
2018-09-12T13:37:19Z DEBUG raw: ca_is_enabled(version=u'2.228')
2018-09-12T13:37:19Z DEBUG ca_is_enabled(version=u'2.228')
2018-09-12T13:37:19Z DEBUG Starting external process
2018-09-12T13:37:19Z DEBUG args=/usr/bin/certutil -d /etc/httpd/alias -L -n ipaCert -a -f /etc/httpd/alias/pwdfile.txt
2018-09-12T13:37:19Z DEBUG Process finished, return code=255
2018-09-12T13:37:19Z DEBUG stdout=
2018-09-12T13:37:19Z DEBUG stderr=certutil: Could not find cert: ipaCert
: PR_FILE_NOT_FOUND_ERROR: File not found
[...]
---

Hi,
this error can be ignored in most of the cases. The upgrade is trying to move ipaCert (cert+key) from the NSS database /etc/httpd/alias to the files /var/lib/ipa/ra-agent.pem and /var/lib/ipa/ra-agent.key. So if the upgrade is run a second time, he won't find ipaCert in the NSS database. To be sure, you can check if /var/lib/ipa/ra-agent.{pem|key} are present and contain a certificate with Subject CN=IPA RA,O=DOMAIN.COM. The files must be readable by root and ipaapi group, and must contain the same cert as the other masters.

What is the content of /var/lib/ipa-client/pki/kdc-ca-bundle.pem and ca-bundle.pem? both must contain IPA CA certificate.

What are the permissions of /var/kerberos/krb5kdc/kdc.crt? It needs to be readable by everyone. And what is the content of this cert? It should be issued by IPA CA.

About the errors spotted by ipa-checkcerts.py, what are the certificates with errors reported? You can find them with ipa cert-show <serial>.

flo


Mit freundlichen Gruessen/With best regards,

--Daniel.
_______________________________________________
FreeIPA-users mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedorahosted.org/archives/list/[email protected]
_______________________________________________
FreeIPA-users mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedorahosted.org/archives/list/[email protected]

Reply via email to