Ah ok, I see the nss lookup fails on the client now.

On the ipa master during failed client login, the only nss log entry says my ad 
user matched the ad domain.

When I log in to the master with ad creds (which works), I see all of the ad 
groups properly resolving in the logs (at least the ones with proper gidNumber 
attributes). The cache on the ipa master contains an entry for the ad user with 
proper membership as well.

At this stage, is it failing to lookup the ad user against AD or against ipa? I 
can see that during successful ad logins on the master, it looks first at ipa 
but understands that it must then look at ad.

FWIW the ipa masters have the AD ldaps cert installed but the clients do not. 
Not sure if that's related.

Thanks,
D
‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐
On Monday, April 29, 2019 3:04 PM, Jakub Hrozek via FreeIPA-users 
<freeipa-users@lists.fedorahosted.org> wrote:

> On Mon, Apr 29, 2019 at 06:56:33PM +0000, D via FreeIPA-users wrote:
>
> > Hello,
> > Apologies for the earlier premature post :)
> > This list helped me solve a number of issues getting a proof-of-concept 
> > ipa-ad cross-forest trust working. I believe there is one final issue, 
> > hopefully one of the experts here can have a look at the logs and let me 
> > know if anything sticks out.
> > I am able to SSH into the ipa master using my AD creds, but have not yet 
> > been able to ssh into a given ipa client using AD creds.
> > Here's some details:
> >
> > 1.  domain.acme.com is the AD domain, ipa.domain.acme.com is the ipa 
> > domain. All ipa clients belong to ipa.domain.acme.com, and they reside in a 
> > DNS zone controlled by the ipa server.
> > 2.  It's using the posix id range scheme.
> > 3.  All configs are fairly stock, and everything set up quite happily using 
> > srvs for autodiscovery. There are sites configured, which appear to be 
> > working.
> > 4.  The ipa clients make no effort to contact the ad servers for KDC or 
> > PAC. I have a feeling it doesn't get that far.
> > 5.  IPA users can ssh into the ipa clients just fine, ad users cannot.
> >
> > Thank you for your time,
> > D
>
> > (Mon Apr 29 18:14:17 2019) [sssd[be[ipa.domain.acme.com]]] [sbus_dispatch] 
> > (0x4000): dbus conn: 0x55b6a51cc380
> > (Mon Apr 29 18:14:17 2019) [sssd[be[ipa.domain.acme.com]]] [sbus_dispatch] 
> > (0x4000): Dispatching.
> > (Mon Apr 29 18:14:17 2019) [sssd[be[ipa.domain.acme.com]]] 
> > [sbus_message_handler] (0x2000): Received SBUS method 
> > org.freedesktop.sssd.dataprovider.getAccountInfo on path 
> > /org/freedesktop/sssd/dataprovider
> > (Mon Apr 29 18:14:17 2019) [sssd[be[ipa.domain.acme.com]]] 
> > [sbus_get_sender_id_send] (0x2000): Not a sysbus message, quit
> > (Mon Apr 29 18:14:17 2019) [sssd[be[ipa.domain.acme.com]]] 
> > [dp_get_account_info_handler] (0x0200): Got request for 
> > [0x1][BE_REQ_USER][name=myu...@domain.acme.com]
> > (Mon Apr 29 18:14:17 2019) [sssd[be[ipa.domain.acme.com]]] [dp_attach_req] 
> > (0x0400): DP Request [Account #31]: New request. Flags [0x0001].
> > (Mon Apr 29 18:14:17 2019) [sssd[be[ipa.domain.acme.com]]] [dp_attach_req] 
> > (0x0400): Number of active DP request: 1
> > (Mon Apr 29 18:14:17 2019) [sssd[be[ipa.domain.acme.com]]] 
> > [sss_domain_get_state] (0x1000): Domain ipa.domain.acme.com is Active
> > (Mon Apr 29 18:14:17 2019) [sssd[be[ipa.domain.acme.com]]] 
> > [sss_domain_get_state] (0x1000): Domain domain.acme.com is Active
> > (Mon Apr 29 18:14:17 2019) [sssd[be[ipa.domain.acme.com]]] 
> > [sss_domain_get_state] (0x1000): Domain ipa.domain.acme.com is Active
> > (Mon Apr 29 18:14:17 2019) [sssd[be[ipa.domain.acme.com]]] 
> > [sss_domain_get_state] (0x1000): Domain domain.acme.com is Active
> > (Mon Apr 29 18:14:17 2019) [sssd[be[ipa.domain.acme.com]]] 
> > [sdap_id_op_connect_step] (0x4000): reusing cached connection
> > (Mon Apr 29 18:14:17 2019) [sssd[be[ipa.domain.acme.com]]] 
> > [sdap_id_op_connect_step] (0x4000): reusing cached connection
> > (Mon Apr 29 18:14:17 2019) [sssd[be[ipa.domain.acme.com]]] 
> > [ipa_get_ad_override_connect_done] (0x4000): Searching for overrides in 
> > view [Default Trust View] with filter 
> > [(&(objectClass=ipaUserOverride)(uid=myuser))].
> > (Mon Apr 29 18:14:17 2019) [sssd[be[ipa.domain.acme.com]]] 
> > [sdap_print_server] (0x2000): Searching 172.18.181.132:389
> > (Mon Apr 29 18:14:17 2019) [sssd[be[ipa.domain.acme.com]]] 
> > [sdap_get_generic_ext_step] (0x0400): calling ldap_search_ext with 
> > [(&(objectClass=ipaUserOverride)(uid=myuser))][cn=Default Trust 
> > View,cn=views,cn=accounts,dc=ipa,dc=domain,dc=acme,dc=com].
> > (Mon Apr 29 18:14:17 2019) [sssd[be[ipa.domain.acme.com]]] 
> > [sdap_get_generic_ext_step] (0x2000): ldap_search_ext called, msgid = 9
> > (Mon Apr 29 18:14:17 2019) [sssd[be[ipa.domain.acme.com]]] [sdap_op_add] 
> > (0x2000): New operation 9 timeout 30
> > (Mon Apr 29 18:14:17 2019) [sssd[be[ipa.domain.acme.com]]] 
> > [sdap_process_result] (0x2000): Trace: sh[0x55b6a51e5060], connected[1], 
> > ops[0x55b6a51d8680], ldap[0x55b6a51cb9c0]
> > (Mon Apr 29 18:14:17 2019) [sssd[be[ipa.domain.acme.com]]] 
> > [sdap_process_message] (0x4000): Message type: [LDAP_RES_SEARCH_RESULT]
> > (Mon Apr 29 18:14:17 2019) [sssd[be[ipa.domain.acme.com]]] 
> > [sdap_get_generic_op_finished] (0x0400): Search result: Success(0), no 
> > errmsg set
> > (Mon Apr 29 18:14:17 2019) [sssd[be[ipa.domain.acme.com]]] 
> > [sdap_op_destructor] (0x2000): Operation 9 finished
> > (Mon Apr 29 18:14:17 2019) [sssd[be[ipa.domain.acme.com]]] 
> > [ipa_get_ad_override_done] (0x4000): No override found with filter 
> > [(&(objectClass=ipaUserOverride)(uid=myuser))].
> > (Mon Apr 29 18:14:17 2019) [sssd[be[ipa.domain.acme.com]]] 
> > [sdap_id_op_destroy] (0x4000): releasing operation connection
> > (Mon Apr 29 18:14:17 2019) [sssd[be[ipa.domain.acme.com]]] 
> > [sss_domain_get_state] (0x1000): Domain ipa.domain.acme.com is Active
> > (Mon Apr 29 18:14:17 2019) [sssd[be[ipa.domain.acme.com]]] 
> > [sss_domain_get_state] (0x1000): Domain domain.acme.com is Active
> > (Mon Apr 29 18:14:17 2019) [sssd[be[ipa.domain.acme.com]]] 
> > [sdap_id_op_connect_step] (0x4000): reusing cached connection
> > (Mon Apr 29 18:14:17 2019) [sssd[be[ipa.domain.acme.com]]] 
> > [ipa_s2n_get_acct_info_send] (0x0400): Sending request_type: 
> > [REQ_FULL_WITH_MEMBERS] for trust user [myuser] to IPA server
> > (Mon Apr 29 18:14:17 2019) [sssd[be[ipa.domain.acme.com]]] 
> > [ipa_s2n_exop_send] (0x0400): Executing extended operation
> > (Mon Apr 29 18:14:17 2019) [sssd[be[ipa.domain.acme.com]]] 
> > [ipa_s2n_exop_send] (0x2000): ldap_extended_operation sent, msgid = 10
>
> The client was not able to resolve the user from the server. Can you
> resolve the user /and all their groups/ on the server? If you tail
> sssd_nss on the server at the same time, are there some lookups that
> fail?
>
> FreeIPA-users mailing list -- freeipa-users@lists.fedorahosted.org
> To unsubscribe send an email to freeipa-users-le...@lists.fedorahosted.org
> Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives: 
> https://lists.fedorahosted.org/archives/list/freeipa-users@lists.fedorahosted.org

_______________________________________________
FreeIPA-users mailing list -- freeipa-users@lists.fedorahosted.org
To unsubscribe send an email to freeipa-users-le...@lists.fedorahosted.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedorahosted.org/archives/list/freeipa-users@lists.fedorahosted.org

Reply via email to