Florence Blanc-Renaud via FreeIPA-users wrote:
> Hi,
> 
> On Thu, May 25, 2023 at 9:53 AM Nicholas Cross <[email protected]
> <mailto:[email protected]>> wrote:
> 
>     Hi, thanks for the reply.
> 
>     This was the process.
>     1. prep
>     2. test connectivity - works ok
>     3. install replica (successfully) - no DNS no CA at this point
>     4. test connectivity - fails.
> 
>     If i replace step 4 for the following:
> 
>     4. install DNS (successfully)
>     5. install CA (fails - with the "invalid 'cn': must be" error)
> 
>     If we can ignore the step 4 where the comms check fails and
>     concentrate on step 5 where the CA fails. I am happy to do so.
>     But in step 5. it is the comms check that the `ipa-ca-install`
>     command runs that also fails as far as i can see (no expert here
>     myself, though my company thinks so LOL)
> 
>     Successful DNS install logs http://sprunge.us/7WCtpW 
> 
>     Failed CA install logs  http://sprunge.us/hTVLzL
> 
> I believe this error needs to be investigated:
> 
> 2023-05-25T07:52:07Z INFO Connection to 
> https://ipa008.ad.companyx.fm/ipa/json failed with Insufficient access: 
> SASL(-1): generic failure: GSSAPI Error: No credentials were supplied, or the 
> credentials were unavailable or inaccessible (Credential cache is empty)
> 
> We can see that the process is able to connect to the master and get a
> cookie but later on GSSAPI auth fails.
> 
> Are there any corresponding logs in the master in
> /var/log/httpd/error_log? You can enable debug logs on the master with
> the following procedure:
> - create /etc/ipa/server.conf:
> [global]
> debug=True
> 
> then restart apache with systemctl restart httpd.
> You can also run ipa-healthcheck on the master/the replica to find any
> config issue.

It would also be interesting to see the entries around the
'server_conncheck' call in /var/log/httpd/error_log to see what
arguments were passed in (on ipa011) since you're enabling debug mode
anyway.

rob

> 
> flo
> 
>     [root@ipa011 ~]# ipa-ca-install
>     Directory Manager (existing master) password:
> 
>     Run connection check to master
> 
>     Your system may be partly configured.
>     Run /usr/sbin/ipa-server-install --uninstall to clean up.
> 
>     Connection check failed!
>     See /var/log/ipareplica-conncheck.log for more information.
>     If the check results are not valid it can be skipped with
>     --skip-conncheck parameter.
> 
> 
> 
>     thanks,
>     Nick
> 
>     On Thu, 25 May 2023 at 08:18, Florence Blanc-Renaud <[email protected]
>     <mailto:[email protected]>> wrote:
> 
>         Hi,
> 
>         On Wed, May 24, 2023 at 3:29 PM Nicholas Cross
>         <[email protected] <mailto:[email protected]>> wrote:
> 
>             Hi Flo (and other helpful people on this list),
> 
>             After fixing the SID/PAC issue, i am back to looking as to
>             why the ipa-replica-conncheck fails when installing the CA
>             to a (working) replica.
> 
>             I ran your suggested commands and they look fine now.
> 
>             [root@ipa011 ~]# kdestroy
>             kdestroy: No credentials cache found while destroying cache
> 
>             [root@ipa011 ~]# kinit -V -kt /etc/krb5.keytab
>             host/[email protected]
>             <mailto:[email protected]>
>             Using default cache: 0
>             Using principal: host/[email protected]
>             <mailto:[email protected]>
>             Using keytab: /etc/krb5.keytab
>             Authenticated to Kerberos v5
> 
>             [root@ipa011 ~]# kvno
>             HTTP/[email protected]
>             <mailto:[email protected]>
>             HTTP/[email protected]
>             <mailto:[email protected]>: kvno = 1
> 
>             I can run the following BEFORE i install the replica and it
>             works 100%, it is part of our pre-reqs in our docs to make
>             sure comms work.
> 
>             ipa-replica-conncheck --master=ipa008.ad.companyx.fm
>             <http://ipa008.ad.companyx.fm> --auto-master-check
>             --realm=AD.companyx.FM <http://AD.companyx.FM>
>             --principal=nicholas.cross
> 
>             After i install the replica with ipa-replica-install. (no
>             DNS, no CA) then running the above ipa-replica-conncheck
>             command fails and we see the errors as described.
> 
> 
>         ipa-replica-conncheck is intended to be run *before* replica
>         installation, as stated in the man page:
>                ipa-replica-conncheck - Check a replica-master network
>         connection before installation
> 
>         The reason is that it opens server sockets listening on the
>         tested ports, for the master to try to reach the replica. If the
>         replica is already installed, the ports are already in use by
>         the ldap server, the apache web server etc...
> 
>         I understand that you tried to run ipa-replica-conncheck to
>         ensure that ipa-dns-install or ipa-ca-install won't hit any
>         issue. Did you actually try to install the DNS service and the
>         CA service on the replica? If you see errors in those steps we
>         can help troubleshoot, based on the produced logs, but
>         ipa-replica-conncheck won't be of any use here.
> 
>         flo
> 
> 
>             Some logs:
>             1. before ipa-replica-install - conn check works.
>             http://sprunge.us/4yrInD
>             2. after successful ipa-replica-install - but conn check fails
>             http://sprunge.us/gvqEle
> 
>             new replica versions
>             [root@ipa011 ~]# rpm -qa | grep ipa | sort
>             almalinux-logos-ipa-90.5.1-1.1.el9.noarch
>             ipa-client-4.10.1-6.el9.x86_64
>             ipa-client-common-4.10.1-6.el9.noarch
>             ipa-common-4.10.1-6.el9.noarch
>             ipa-healthcheck-0.12-1.el9.noarch
>             ipa-healthcheck-core-0.12-1.el9.noarch
>             ipa-selinux-4.9.8-7.el9_0.noarch
>             ipa-server-4.10.1-6.el9.x86_64
>             ipa-server-common-4.10.1-6.el9.noarch
>             ipa-server-dns-4.10.1-6.el9.noarch
>             libipa_hbac-2.8.2-2.el9.x86_64
>             python3-ipaclient-4.10.1-6.el9.noarch
>             python3-ipalib-4.10.1-6.el9.noarch
>             python3-ipaserver-4.10.1-6.el9.noarch
>             python3-libipa_hbac-2.8.2-2.el9.x86_64
>             sssd-ipa-2.8.2-2.el9.x86_64
> 
>             current master versions
>             [nicholas.cross@ipa008 ~]$ rpm -qa | grep ipa | sort
>             almalinux-logos-ipa-90.5.1-1.1.el9.noarch
>             ipa-client-4.10.0-8.el9_1.x86_64
>             ipa-client-common-4.10.0-8.el9_1.noarch
>             ipa-common-4.10.0-8.el9_1.noarch
>             ipa-healthcheck-0.9-9.el9.noarch
>             ipa-healthcheck-core-0.9-9.el9.noarch
>             ipa-selinux-4.9.8-7.el9_0.noarch
>             ipa-server-4.10.0-8.el9_1.x86_64
>             ipa-server-common-4.10.0-8.el9_1.noarch
>             ipa-server-dns-4.10.0-8.el9_1.noarch
>             libipa_hbac-2.7.3-4.el9_1.3.x86_64
>             python3-ipaclient-4.10.0-8.el9_1.noarch
>             python3-ipalib-4.10.0-8.el9_1.noarch
>             python3-ipaserver-4.10.0-8.el9_1.noarch
>             python3-libipa_hbac-2.7.3-4.el9_1.3.x86_64
>             sssd-ipa-2.7.3-4.el9_1.3.x86_64
> 
>             thanks,
>             Nick
> 
>             On Tue, 23 May 2023 at 10:01, Florence Blanc-Renaud
>             <[email protected] <mailto:[email protected]>> wrote:
> 
>                 Hi,
> 
>                 the replica-conncheck error means that a call to
>                 server_conncheck reached the wrong server.
>                 ipa-replica-conncheck performs multiple checks:
>                 - first from the replica to the existing master (here we
>                 seem to be good)
>                 - then from the existing master to the replica, by doing
>                 a call to the XMLRPC api server_conncheck on the master.
>                 If the connection from replica to master fails, another
>                 server is tried (in this case, the replica launches
>                 server_conncheck on itself), but there is a security
>                 that ensures the right server is handling the call.
>                 The logs shows that the connection fails because of SASL
>                 auth failure:
>                 2023-05-22T18:14:03Z INFO Connection to
>                 https://ipa010.ad.companyx.fm/ipa/json failed with
>                 Insufficient access: SASL(-1): generic failure: GSSAPI
>                 Error: No credentials were supplied, or the credentials
>                 were unavailable or inaccessible (Credential cache is empty)
> 
>                 Are you able to do kinit -kt /etc/krb5.keytab
>                 host/<replicafqdn>@<REALM> on the replica? And then kvno
>                 HTTP/<serverfqdn>@<REALM> ?
>                 flo
> 
>                 On Tue, May 23, 2023 at 9:55 AM Nicholas Cross via
>                 FreeIPA-users <[email protected]
>                 <mailto:[email protected]>> wrote:
> 
>                     That was the /var/log/ipareplica-conncheck.log log file
> 
>                     it does looks like a DNs issue, but im not sure where.
> 
>                     dns resolves the host fine on the host
> 
>                     [root@ipa011 ~]# host ipa011
>                     ipa011.ad.companyx.fm <http://ipa011.ad.companyx.fm>
>                     has address 10.32.225.7
> 
>                     [root@ipa011 ~]# grep ipa /etc/ipa/default.conf
>                     host = ipa011.ad.companyx.fm
>                     <http://ipa011.ad.companyx.fm>
>                     xmlrpc_uri = https://ipa011.ad.companyx.fm/ipa/xml
>                     ca_host = ipa010.ad.companyx.fm
>                     <http://ipa010.ad.companyx.fm>
> 
>                     it's odd as i run the connection check before the
>                     start of the install, to check ports and routes. 
>                      it works fine.
>                     replica install works.
>                     dns install works.
>                     just the ca installer comes back with this error.
> 
>                     As an additional test i added the dns record for
>                     this host into IPA before the install.  Normally we
>                     don't need to, but just as a test, but it made no
>                     difference.
> 
> 
>                     We do have new DNS forwarders on the network - these
>                     are in front of the IPA servers.   They are there
>                     just take the load from the k8s clusters away from
>                     IPA DNS.
>                     Would the CA install break if the DNS lookups are
>                     "proxied" by the DNS forwarders?
>                     All DNS tests i can think of work via the
>                     forwarders.  The IPA clients (100s) are all fine
>                     with them.
> 
>                     I will update the client to ignore the forwarders,
>                     but if you can think of anything else to try?
> 
>                     thanks, Nick
>                     _______________________________________________
>                     FreeIPA-users mailing list --
>                     [email protected]
>                     <mailto:[email protected]>
>                     To unsubscribe send an email to
>                     [email protected]
>                     <mailto:[email protected]>
>                     Fedora Code of Conduct:
>                     
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
>                     List Guidelines:
>                     https://fedoraproject.org/wiki/Mailing_list_guidelines
>                     List Archives:
>                     
> https://lists.fedorahosted.org/archives/list/[email protected]
>                     Do not reply to spam, report it:
>                     https://pagure.io/fedora-infrastructure/new_issue
> 
> 
> _______________________________________________
> FreeIPA-users mailing list -- [email protected]
> To unsubscribe send an email to [email protected]
> Fedora Code of Conduct: 
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives: 
> https://lists.fedorahosted.org/archives/list/[email protected]
> Do not reply to spam, report it: 
> https://pagure.io/fedora-infrastructure/new_issue
> 
_______________________________________________
FreeIPA-users mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedorahosted.org/archives/list/[email protected]
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue

Reply via email to