Also ssh logs

[kns@ti-mum1-pve04 ~]$ ssh kns@10.40.1.201 -v
OpenSSH_8.7p1, OpenSSL 3.0.7 1 Nov 2022
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: Reading configuration data /etc/ssh/ssh_config.d/04-ipa.conf
debug1: Executing command: 'true'
debug1: Reading configuration data /etc/ssh/ssh_config.d/50-redhat.conf
debug1: Reading configuration data
/etc/crypto-policies/back-ends/openssh.config
debug1: configuration requests final Match pass
debug1: re-parsing configuration
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: Reading configuration data /etc/ssh/ssh_config.d/04-ipa.conf
debug1: Executing command: 'true'
debug1: Reading configuration data /etc/ssh/ssh_config.d/50-redhat.conf
debug1: Reading configuration data
/etc/crypto-policies/back-ends/openssh.config
debug1: Executing proxy command: exec /usr/bin/sss_ssh_knownhostsproxy -p
22 10.40.1.201
debug1: identity file /home/kns/.ssh/id_rsa type -1
debug1: identity file /home/kns/.ssh/id_rsa-cert type -1
debug1: identity file /home/kns/.ssh/id_dsa type -1
debug1: identity file /home/kns/.ssh/id_dsa-cert type -1
debug1: identity file /home/kns/.ssh/id_ecdsa type -1
debug1: identity file /home/kns/.ssh/id_ecdsa-cert type -1
debug1: identity file /home/kns/.ssh/id_ecdsa_sk type -1
debug1: identity file /home/kns/.ssh/id_ecdsa_sk-cert type -1
debug1: identity file /home/kns/.ssh/id_ed25519 type -1
debug1: identity file /home/kns/.ssh/id_ed25519-cert type -1
debug1: identity file /home/kns/.ssh/id_ed25519_sk type -1
debug1: identity file /home/kns/.ssh/id_ed25519_sk-cert type -1
debug1: identity file /home/kns/.ssh/id_xmss type -1
debug1: identity file /home/kns/.ssh/id_xmss-cert type -1
debug1: Local version string SSH-2.0-OpenSSH_8.7
debug1: Remote protocol version 2.0, remote software version OpenSSH_8.7
debug1: compat_banner: match: OpenSSH_8.7 pat OpenSSH* compat 0x04000000
debug1: Authenticating to 10.40.1.201:22 as 'kns'
debug1: load_hostkeys: fopen /home/kns/.ssh/known_hosts: No such file or
directory
debug1: load_hostkeys: fopen /home/kns/.ssh/known_hosts2: No such file or
directory
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug1: kex: algorithm: curve25519-sha256
debug1: kex: host key algorithm: ssh-ed25519
debug1: kex: server->client cipher: aes256-...@openssh.com MAC: <implicit>
compression: none
debug1: kex: client->server cipher: aes256-...@openssh.com MAC: <implicit>
compression: none
debug1: kex: curve25519-sha256 need=32 dh_need=32
debug1: kex: curve25519-sha256 need=32 dh_need=32
debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
debug1: SSH2_MSG_KEX_ECDH_REPLY received
debug1: Server host key: ssh-ed25519
SHA256:1BAWa9F52c6u26qe8T9ZQsin3lk+VTFeRYBDtkOzNMU
debug1: load_hostkeys: fopen /home/kns/.ssh/known_hosts: No such file or
directory
debug1: load_hostkeys: fopen /home/kns/.ssh/known_hosts2: No such file or
directory
debug1: Host '10.40.1.201' is known and matches the ED25519 host key.
debug1: Found key in /var/lib/sss/pubconf/known_hosts:2
debug1: rekey out after 4294967296 blocks
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug1: SSH2_MSG_NEWKEYS received
debug1: rekey in after 4294967296 blocks
debug1: Will attempt key: /home/kns/.ssh/id_rsa
debug1: Will attempt key: /home/kns/.ssh/id_dsa
debug1: Will attempt key: /home/kns/.ssh/id_ecdsa
debug1: Will attempt key: /home/kns/.ssh/id_ecdsa_sk
debug1: Will attempt key: /home/kns/.ssh/id_ed25519
debug1: Will attempt key: /home/kns/.ssh/id_ed25519_sk
debug1: Will attempt key: /home/kns/.ssh/id_xmss
debug1: SSH2_MSG_EXT_INFO received
debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,
sk-ssh-ed25...@openssh.com
,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,
sk-ecdsa-sha2-nistp...@openssh.com,
webauthn-sk-ecdsa-sha2-nistp...@openssh.com>
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug1: Authentications that can continue:
publickey,gssapi-keyex,gssapi-with-mic,password,keyboard-interactive
debug1: Next authentication method: gssapi-with-mic

*debug1: Unspecified GSS failure.  Minor code may provide more
informationServer host/10.40.1....@alpha-grep.com
<10.40.1....@alpha-grep.com> not found in Kerberos database*


debug1: Authentications that can continue:
publickey,gssapi-keyex,gssapi-with-mic,password,keyboard-interactive
debug1: Next authentication method: publickey
debug1: Trying private key: /home/kns/.ssh/id_rsa
debug1: Trying private key: /home/kns/.ssh/id_dsa
debug1: Trying private key: /home/kns/.ssh/id_ecdsa
debug1: Trying private key: /home/kns/.ssh/id_ecdsa_sk
debug1: Trying private key: /home/kns/.ssh/id_ed25519
debug1: Trying private key: /home/kns/.ssh/id_ed25519_sk
debug1: Trying private key: /home/kns/.ssh/id_xmss
debug1: Next authentication method: keyboard-interactive
(kns@10.40.1.201) Password:



####################################################################################3
[kns@ti-mum1-pve04 ~]$ ssh kns@ti-mum1-pve01 -v
OpenSSH_8.7p1, OpenSSL 3.0.7 1 Nov 2022
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: Reading configuration data /etc/ssh/ssh_config.d/04-ipa.conf
debug1: Executing command: 'true'
debug1: Reading configuration data /etc/ssh/ssh_config.d/50-redhat.conf
debug1: Reading configuration data
/etc/crypto-policies/back-ends/openssh.config
debug1: configuration requests final Match pass
debug1: re-parsing configuration
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: Reading configuration data /etc/ssh/ssh_config.d/04-ipa.conf
debug1: Executing command: 'true'
debug1: Reading configuration data /etc/ssh/ssh_config.d/50-redhat.conf
debug1: Reading configuration data
/etc/crypto-policies/back-ends/openssh.config
debug1: Executing proxy command: exec /usr/bin/sss_ssh_knownhostsproxy -p
22 ti-mum1-pve01
debug1: identity file /home/kns/.ssh/id_rsa type -1
debug1: identity file /home/kns/.ssh/id_rsa-cert type -1
debug1: identity file /home/kns/.ssh/id_dsa type -1
debug1: identity file /home/kns/.ssh/id_dsa-cert type -1
debug1: identity file /home/kns/.ssh/id_ecdsa type -1
debug1: identity file /home/kns/.ssh/id_ecdsa-cert type -1
debug1: identity file /home/kns/.ssh/id_ecdsa_sk type -1
debug1: identity file /home/kns/.ssh/id_ecdsa_sk-cert type -1
debug1: identity file /home/kns/.ssh/id_ed25519 type -1
debug1: identity file /home/kns/.ssh/id_ed25519-cert type -1
debug1: identity file /home/kns/.ssh/id_ed25519_sk type -1
debug1: identity file /home/kns/.ssh/id_ed25519_sk-cert type -1
debug1: identity file /home/kns/.ssh/id_xmss type -1
debug1: identity file /home/kns/.ssh/id_xmss-cert type -1
debug1: Local version string SSH-2.0-OpenSSH_8.7
debug1: Remote protocol version 2.0, remote software version OpenSSH_8.7
debug1: compat_banner: match: OpenSSH_8.7 pat OpenSSH* compat 0x04000000
debug1: Authenticating to ti-mum1-pve01:22 as 'kns'
debug1: load_hostkeys: fopen /home/kns/.ssh/known_hosts: No such file or
directory
debug1: load_hostkeys: fopen /home/kns/.ssh/known_hosts2: No such file or
directory
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug1: kex: algorithm: curve25519-sha256
debug1: kex: host key algorithm: ssh-ed25519
debug1: kex: server->client cipher: aes256-...@openssh.com MAC: <implicit>
compression: none
debug1: kex: client->server cipher: aes256-...@openssh.com MAC: <implicit>
compression: none
debug1: kex: curve25519-sha256 need=32 dh_need=32
debug1: kex: curve25519-sha256 need=32 dh_need=32
debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
debug1: SSH2_MSG_KEX_ECDH_REPLY received
debug1: Server host key: ssh-ed25519
SHA256:1BAWa9F52c6u26qe8T9ZQsin3lk+VTFeRYBDtkOzNMU
debug1: load_hostkeys: fopen /home/kns/.ssh/known_hosts: No such file or
directory
debug1: load_hostkeys: fopen /home/kns/.ssh/known_hosts2: No such file or
directory
debug1: Host 'ti-mum1-pve01' is known and matches the ED25519 host key.
debug1: Found key in /var/lib/sss/pubconf/known_hosts:2
debug1: rekey out after 4294967296 blocks
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug1: SSH2_MSG_NEWKEYS received
debug1: rekey in after 4294967296 blocks
debug1: Will attempt key: /home/kns/.ssh/id_rsa
debug1: Will attempt key: /home/kns/.ssh/id_dsa
debug1: Will attempt key: /home/kns/.ssh/id_ecdsa
debug1: Will attempt key: /home/kns/.ssh/id_ecdsa_sk
debug1: Will attempt key: /home/kns/.ssh/id_ed25519
debug1: Will attempt key: /home/kns/.ssh/id_ed25519_sk
debug1: Will attempt key: /home/kns/.ssh/id_xmss
debug1: SSH2_MSG_EXT_INFO received
debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,
sk-ssh-ed25...@openssh.com
,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,
sk-ecdsa-sha2-nistp...@openssh.com,
webauthn-sk-ecdsa-sha2-nistp...@openssh.com>
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug1: Authentications that can continue:
publickey,gssapi-keyex,gssapi-with-mic,password,keyboard-interactive
debug1: Next authentication method: gssapi-with-mic
Authenticated to ti-mum1-pve01 (via proxy) using "gssapi-with-mic".
debug1: pkcs11_del_provider: called, provider_id = (null)
debug1: channel 0: new [client-session]
debug1: Requesting no-more-sessi...@openssh.com
debug1: Entering interactive session.
debug1: pledge: proc
debug1: client_input_global_request: rtype hostkeys...@openssh.com
want_reply 0
debug1: Sending environment.
debug1: channel 0: setting env LANG = "en_GB.UTF-8"
Register this system with Red Hat Insights: insights-client --register
Create an account or view all your systems at
https://red.ht/insights-dashboard
Last login: Tue Oct  3 01:59:36 2023 from 10.40.1.200
[kns@ti-mum1-pve01 ~]$

On Tue, Oct 3, 2023 at 1:19 AM Pradeep KNS <kns.prad...@alpha-grep.com>
wrote:

> Hi,
>
> I am able to configure Freeipa with internal DNS which is located on a
> different server and added dns records under the dns zone file.
> Now i have created a user and am able to communicate from Localhost to ipa
> client both key based and password based both.
>
> *Issue:*
> Not able to ssh via from client A --> to Client B via key based
> authentication its promoting for password.But if i use the hostname rather
> than ip i am able to login.But most of the times i use ip only to
> communicate.
>
> Trick:
> If add ssh-add <Keypath /rsa_pub> and then if cache with -A then able to
> communicate with ip as well i can jump any client from local.But its a
> trick it got worked but i would like to know where can i fix this to work
> properly.Rather than doing this trick how can i jump from one client to
> another without using password based authentication.Please let me know
> where i need to change configuration to work smoothly.
>
> _kerberos-master._tcp.test-local.com. 3600 IN SRV 0 100 88
> ipa1-mum1.test-local.com.
> _kerberos-master._udp.test-local.com. 3600 IN SRV 0 100 88
> ipa1-mum1.test-local.com.
> _kerberos._tcp.test-local.com. 3600 IN SRV 0 100 88
> ipa1-mum1.test-local.com.
> _kerberos._udp.test-local.com. 3600 IN SRV 0 100 88
> ipa1-mum1.test-local.com.
> _kerberos.test-local.com. 3600 IN TXT "ALPHA-GREP.COM"
> _kerberos.test-local.com. 3600 IN URI 0 100 "krb5srv:m:tcp:
> ipa1-mum1.test-local.com."
> _kerberos.test-local.com. 3600 IN URI 0 100 "krb5srv:m:udp:
> ipa1-mum1.test-local.com."
> _kpasswd._tcp.test-local.com. 3600 IN SRV 0 100 464
> ipa1-mum1.test-local.com.
> _kpasswd._udp.test-local.com. 3600 IN SRV 0 100 464
> ipa1-mum1.test-local.com.
> _kpasswd.test-local.com. 3600 IN URI 0 100 "krb5srv:m:tcp:
> ipa1-mum1.test-local.com."
> _kpasswd.test-local.com. 3600 IN URI 0 100 "krb5srv:m:udp:
> ipa1-mum1.test-local.com."
> _ldap._tcp.test-local.com. 3600 IN SRV 0 100 389 ipa1-mum1.test-local.com.
>
>
>
> On Fri, Sep 1, 2023 at 12:17 PM Pradeep KNS <kns.prad...@alpha-grep.com>
> wrote:
>
>> Thanks a lot,Will try it.
>>
>> On Thu, Aug 31, 2023 at 10:40 AM Yavor Marinov <ymari...@gmail.com>
>> wrote:
>>
>>> Hey guys,
>>>
>>> I would suggest an easier and quite simple method: create a subdomain in
>>> your current DNS, and describe its NSes to point to FreeIPA's DNSes.
>>> Configure FreeIPA with a subdomain, instead of the domain and if you need
>>> to create forwarding rules in FreeIPA to use your main DNS as a forwarder.
>>> Additionally newly added infra, can be just CNAME-ed into your main DNS
>>> with specifics (or even A record). Offering this, because in current infra
>>> we are using google's DNS for the domain, and our centralized login can be
>>> used with both of the domain and the subdomain. The only "frustrating"
>>> thing is that i need to change the client's DNS (eg resolv.conf) when I'm
>>> enrolling them, to point to FreeIPA and be able to properly enroll their
>>> DNS records into FreeIPA
>>>
>>> ~br
>>>
>>> On Wed, Aug 30, 2023 at 11:26 PM Rafael Jeffman via FreeIPA-users <
>>> freeipa-users@lists.fedorahosted.org> wrote:
>>>
>>>>
>>>> Hi Pradeep,
>>>>
>>>> On Wed, Aug 30, 2023 at 3:27 PM Pradeep KNS via FreeIPA-users <
>>>> freeipa-users@lists.fedorahosted.org> wrote:
>>>> >
>>>> > Hi Rob,
>>>> >
>>>> > Thank you for your valuable insights on FreeIPA and DNS. I have an
>>>> existing internal DNS server that I would like to integrate with FreeIPA's
>>>> DNS feature. As I understand it, FreeIPA can serve as an integrated DNS
>>>> solution. However, I would like to ensure that my existing internal DNS
>>>> infrastructure is utilized alongside FreeIPA's DNS capabilities.
>>>> >
>>>> > Could you provide guidance on how to configure FreeIPA to work with
>>>> my internal DNS server? Specifically, I'd like to achieve the following:
>>>> >
>>>> > Use FreeIPA for centralized user authentication and management.
>>>>
>>>> That would be just setting up FreeIPA and maintaining correct DNS
>>>> records,
>>>> so I won't jump into this one.
>>>>
>>>> > Integrate my existing internal DNS server with FreeIPA's DNS, so I
>>>> can manage internal DNS records within FreeIPA while maintaining the
>>>> internal DNS functionality.
>>>> >
>>>>
>>>> Is a short answer: you can't.
>>>>
>>>> The longer answer might provide a way to almost have what you want.
>>>>
>>>> FreeIPA's embedded nameserver has to be authoritative, and you can only
>>>> manage its records, not the ones on your current DNS infrastructure.
>>>>
>>>> To change DNS management to FreeIPA you'd have to set your internal DNS
>>>> nameserver to be a secondary nameserver, and configure FreeIPA's
>>>> nameserver to notify the internal nameserver of changes. It's doable,
>>>> but I
>>>> would not recommend doing so.
>>>>
>>>> Another possibility is to change DNS infrastructure to use FreeIPA
>>>> instead of
>>>> the current nameserver.
>>>>
>>>> If you can manage your internal zones with the limitations that
>>>> FreeIPA's
>>>> nameserver has (e.g. split-view is not supported), then you could plan
>>>> on
>>>> retiring the current nameserver in favor of the FreeIPA one. With
>>>> replicas you
>>>> can also get redundancy on the nameservers.
>>>>
>>>> If your current nameserver is exposed to the world, again, I'd suggest
>>>> against
>>>> this move.
>>>>
>>>> Bottom line, either use your current DNS infrastructure or fully
>>>> migrate to
>>>> FreeIPA.
>>>>
>>>> Rafael
>>>>
>>>> > I want to avoid any conflicts between FreeIPA's DNS and my existing
>>>> internal DNS server. Your expertise in this matter would greatly assist me
>>>> in achieving a successful and well-integrated DNS solution.
>>>> >
>>>> > Thank you for your time and support.
>>>> >
>>>> >
>>>> > On Wed, Aug 30, 2023 at 6:34 PM Rob Crittenden <rcrit...@redhat.com>
>>>> wrote:
>>>> >>
>>>> >> Pradeep KNS via FreeIPA-users wrote:
>>>> >> > Hello Team,
>>>> >> >
>>>> >> > While setting up Freeipa in my Linux infrastructure.I noticed a
>>>> strange
>>>> >> > warning. I would like to clarify before rolling into production.
>>>> >> > *
>>>> >> > *
>>>> >> > *|DNS zone alpha-grep.com <http://alpha-grep.com>. already exists
>>>> in DNS
>>>> >> > and is handled by server(s): ['ns2.', 'ns1.'] Please make sure
>>>> that the
>>>> >> > domain is properly delegated to this IPA server.|*
>>>> >> >
>>>> >> > Detailed installation log i have updated in this link. Please
>>>> suggest me
>>>> >> > will it be any security flaw in future.Before installing it on
>>>> production.
>>>> >> >
>>>> >> > https://bpa.st/AMITK
>>>> >>
>>>> >> I'm not sure what security issue you are worried about but you
>>>> >> explicitly allow this configuration with the --allow-zone-overlap
>>>> >> install option.
>>>> >>
>>>> >> Your domain DNS is managed externally and you've installed a DNS
>>>> server
>>>> >> to be authoritative for the same domain. If you want to expose you
>>>> IPA
>>>> >> DNS to the Internet you'll need to repoint the nameservers on your
>>>> >> domain to your IPA host.
>>>> >>
>>>> >> If what you're hoping to do is provide views, to limit what hosts are
>>>> >> resolvable depending on where the request is coming from, that is not
>>>> >> available in IPA. While IPA uses bind under the hood not all
>>>> >> capabilities are exposed.
>>>> >>
>>>> >> So whether this configuration is acceptable or not is up to you.
>>>> >>
>>>> >> rob
>>>> >>
>>>> > _______________________________________________
>>>> > FreeIPA-users mailing list -- freeipa-users@lists.fedorahosted.org
>>>> > To unsubscribe send an email to
>>>> freeipa-users-le...@lists.fedorahosted.org
>>>> > Fedora Code of Conduct:
>>>> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
>>>> > List Guidelines:
>>>> https://fedoraproject.org/wiki/Mailing_list_guidelines
>>>> > List Archives:
>>>> https://lists.fedorahosted.org/archives/list/freeipa-users@lists.fedorahosted.org
>>>> > Do not reply to spam, report it:
>>>> https://pagure.io/fedora-infrastructure/new_issue
>>>>
>>>>
>>>>
>>>> --
>>>> Rafael Guterres Jeffman
>>>> Senior Software Engineer
>>>> FreeIPA - Red Hat
>>>> _______________________________________________
>>>> FreeIPA-users mailing list -- freeipa-users@lists.fedorahosted.org
>>>> To unsubscribe send an email to
>>>> freeipa-users-le...@lists.fedorahosted.org
>>>> Fedora Code of Conduct:
>>>> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
>>>> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
>>>> List Archives:
>>>> https://lists.fedorahosted.org/archives/list/freeipa-users@lists.fedorahosted.org
>>>> Do not reply to spam, report it:
>>>> https://pagure.io/fedora-infrastructure/new_issue
>>>>
>>>
_______________________________________________
FreeIPA-users mailing list -- freeipa-users@lists.fedorahosted.org
To unsubscribe send an email to freeipa-users-le...@lists.fedorahosted.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedorahosted.org/archives/list/freeipa-users@lists.fedorahosted.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue

Reply via email to