Hi,

Thanks for the links Alexander,I tried to setup as per the documents it is
working without any issues.

Problem:
I tried to bring the ipa server down and I am still able to communicate
with ssh-key mechanism.How it is possible and how it is allowing me to
communicate.Ideally when the ipa server is down! it shouldn't connect. as
all my public keys are located on ipa server.
Is there any way to fix this issue?

###################
─pradeep@sys-blr1-dsk04 ~
╰─$ ping 10.40.1.67
PING 10.40.1.67 (10.40.1.67) 56(84) bytes of data.
^C
--- 10.40.1.67 ping statistics ---
3 packets transmitted, 0 received, 100% packet loss, time 2033ms

####################
─pradeep@sys-blr1-dsk04 ~
╰─$ ssh [email protected] -vv

                                                                     1 ↵
OpenSSH_8.9p1 Ubuntu-3ubuntu0.3, OpenSSL 3.0.2 15 Mar 2022
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: Reading configuration data /etc/ssh/ssh_config.d/my.conf
debug1: /etc/ssh/ssh_config line 21: Applying options for *
debug2: resolve_canonicalize: hostname 10.40.1.200 is address
debug1: Connecting to 10.40.1.200 [10.40.1.200] port 22.
debug1: Connection established.
debug1: identity file /home/pradeep/.ssh/id_rsa type 0
debug1: identity file /home/pradeep/.ssh/id_rsa-cert type -1
debug1: identity file /home/pradeep/.ssh/id_ecdsa type -1
debug1: identity file /home/pradeep/.ssh/id_ecdsa-cert type -1
debug1: identity file /home/pradeep/.ssh/id_ecdsa_sk type -1
debug1: identity file /home/pradeep/.ssh/id_ecdsa_sk-cert type -1
debug1: identity file /home/pradeep/.ssh/id_ed25519 type -1
debug1: identity file /home/pradeep/.ssh/id_ed25519-cert type -1
debug1: identity file /home/pradeep/.ssh/id_ed25519_sk type -1
debug1: identity file /home/pradeep/.ssh/id_ed25519_sk-cert type -1
debug1: identity file /home/pradeep/.ssh/id_xmss type -1
debug1: identity file /home/pradeep/.ssh/id_xmss-cert type -1
debug1: identity file /home/pradeep/.ssh/id_dsa type -1
debug1: identity file /home/pradeep/.ssh/id_dsa-cert type -1
debug1: Local version string SSH-2.0-OpenSSH_8.9p1 Ubuntu-3ubuntu0.3
debug1: Remote protocol version 2.0, remote software version OpenSSH_8.7
debug1: compat_banner: match: OpenSSH_8.7 pat OpenSSH* compat 0x04000000
debug2: fd 3 setting O_NONBLOCK
debug1: Authenticating to 10.40.1.200:22 as 'kns'
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug2: local client KEXINIT proposal
debug2: KEX algorithms: curve25519-sha256,[email protected]
,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,
[email protected]
,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,ext-info-c
debug2: host key algorithms: ssh-rsa
debug2: ciphers ctos: [email protected]
,aes128-ctr,aes192-ctr,aes256-ctr,[email protected],
[email protected]
debug2: ciphers stoc: [email protected]
,aes128-ctr,aes192-ctr,aes256-ctr,[email protected],
[email protected]
debug2: MACs ctos: [email protected],[email protected],
[email protected],[email protected],
[email protected],[email protected],[email protected]
,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: MACs stoc: [email protected],[email protected],
[email protected],[email protected],
[email protected],[email protected],[email protected]
,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: compression ctos: none,[email protected],zlib
debug2: compression stoc: none,[email protected],zlib
debug2: languages ctos:
debug2: languages stoc:
debug2: first_kex_follows 0
debug2: reserved 0
debug2: peer server KEXINIT proposal
debug2: KEX algorithms: curve25519-sha256,[email protected]
,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1
debug2: host key algorithms:
rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256,ssh-ed25519
debug2: ciphers ctos: [email protected],[email protected]
,aes256-ctr,[email protected],aes128-ctr
debug2: ciphers stoc: [email protected],[email protected]
,aes256-ctr,[email protected],aes128-ctr
debug2: MACs ctos: [email protected],[email protected],
[email protected],[email protected]
,hmac-sha2-256,hmac-sha1,[email protected],hmac-sha2-512
debug2: MACs stoc: [email protected],[email protected],
[email protected],[email protected]
,hmac-sha2-256,hmac-sha1,[email protected],hmac-sha2-512
debug2: compression ctos: none,[email protected]
debug2: compression stoc: none,[email protected]
debug2: languages ctos:
debug2: languages stoc:
debug2: first_kex_follows 0
debug2: reserved 0
debug1: kex: algorithm: curve25519-sha256
debug1: kex: host key algorithm: ssh-rsa
debug1: kex: server->client cipher: [email protected] MAC:
<implicit> compression: none
debug1: kex: client->server cipher: [email protected] MAC:
<implicit> compression: none
debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
debug1: SSH2_MSG_KEX_ECDH_REPLY received
debug1: Server host key: ssh-rsa
SHA256:wWKt87w2Wzv40Bhcbp533kOCLCJFXeogYcqycugoHSM
debug1: load_hostkeys: fopen /home/pradeep/.ssh/known_hosts2: No such file
or directory
debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or
directory
debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or
directory
debug1: Host '10.40.1.200' is known and matches the RSA host key.
debug1: Found key in /home/pradeep/.ssh/known_hosts:5
debug2: ssh_set_newkeys: mode 1
debug1: rekey out after 134217728 blocks
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug1: SSH2_MSG_NEWKEYS received
debug2: ssh_set_newkeys: mode 0
debug1: rekey in after 134217728 blocks
debug1: get_agent_identities: bound agent to hostkey
debug1: get_agent_identities: agent returned 1 keys
debug1: Will attempt key: /home/pradeep/.ssh/id_rsa RSA
SHA256:o1zUnwlDUPSy/1/aPXOqFRt+DLKQaCw5BehTjDhNVGU agent
debug1: Will attempt key: /home/pradeep/.ssh/id_ecdsa
debug1: Will attempt key: /home/pradeep/.ssh/id_ecdsa_sk
debug1: Will attempt key: /home/pradeep/.ssh/id_ed25519
debug1: Will attempt key: /home/pradeep/.ssh/id_ed25519_sk
debug1: Will attempt key: /home/pradeep/.ssh/id_xmss
debug1: Will attempt key: /home/pradeep/.ssh/id_dsa
debug2: pubkey_prepare: done
debug1: SSH2_MSG_EXT_INFO received
debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,
[email protected]
,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,
[email protected],
[email protected]>
debug2: service_accept: ssh-userauth
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug1: Authentications that can continue:
publickey,gssapi-keyex,gssapi-with-mic,password,keyboard-interactive
debug1: Next authentication method: gssapi-with-mic
debug1: No credentials were supplied, or the credentials were unavailable
or inaccessible
No Kerberos credentials available (default cache: FILE:/tmp/krb5cc_1001)


debug1: No credentials were supplied, or the credentials were unavailable
or inaccessible
No Kerberos credentials available (default cache: FILE:/tmp/krb5cc_1001)


debug2: we did not send a packet, disable method
debug1: Next authentication method: publickey
debug1: Offering public key: /home/pradeep/.ssh/id_rsa RSA
SHA256:o1zUnwlDUPSy/1/aPXOqFRt+DLKQaCw5BehTjDhNVGU agent
debug2: we sent a publickey packet, wait for reply
debug1: Server accepts key: /home/pradeep/.ssh/id_rsa RSA
SHA256:o1zUnwlDUPSy/1/aPXOqFRt+DLKQaCw5BehTjDhNVGU agent
Authenticated to 10.40.1.200 ([10.40.1.200]:22) using "publickey".
debug1: channel 0: new [client-session]
debug2: channel 0: send open
debug1: Requesting [email protected]
debug1: Entering interactive session.
debug1: pledge: filesystem
debug1: client_input_global_request: rtype [email protected]
want_reply 0
debug1: client_input_hostkeys: searching /home/pradeep/.ssh/known_hosts for
10.40.1.200 / (none)
debug1: client_input_hostkeys: searching /home/pradeep/.ssh/known_hosts2
for 10.40.1.200 / (none)
debug1: client_input_hostkeys: hostkeys file
/home/pradeep/.ssh/known_hosts2 does not exist
debug1: client_input_hostkeys: no new or deprecated keys from server
debug1: Remote: /usr/bin/sss_ssh_authorizedkeys:1: key options:
agent-forwarding port-forwarding pty user-rc x11-forwarding
debug1: Remote: /usr/bin/sss_ssh_authorizedkeys:1: key options:
agent-forwarding port-forwarding pty user-rc x11-forwarding
debug2: channel_input_open_confirmation: channel 0: callback start
debug2: fd 3 setting TCP_NODELAY
debug2: client_session2_setup: id 0
debug2: channel 0: request pty-req confirm 1
debug1: Sending environment.
debug1: channel 0: setting env LANG = "en_IN"
debug2: channel 0: request env confirm 0
debug2: channel 0: request shell confirm 1
debug2: channel_input_open_confirmation: channel 0: callback done
debug2: channel 0: open confirm rwindow 0 rmax 32768
debug2: channel_input_status_confirm: type 99 id 0
debug2: PTY allocation request accepted on channel 0
debug2: channel 0: rcvd adjust 2097152
debug2: channel_input_status_confirm: type 99 id 0
debug2: shell request accepted on channel 0
Register this system with Red Hat Insights: insights-client --register
Create an account or view all your systems at
https://red.ht/insights-dashboard
Last login: Wed Oct 11 17:37:13 2023 from 10.80.101.53
[kns@ts-mum1-pve01 ~]$ ^C
[kns@ts-mum1-pve01 ~]$




On Tue, Oct 3, 2023 at 2:33 PM Pradeep KNS <[email protected]>
wrote:

> Thanks Alexander,Thanks for the info
>
> On Tue, 3 Oct 2023 at 2:21 PM, Alexander Bokovoy <[email protected]>
> wrote:
>
>> On Аўт, 03 кас 2023, Pradeep KNS wrote:
>> >Thanks for the information.
>> >Will go through the document.
>> >
>> >But if i add the public key i am able authenticate from server A to
>> server
>> >B and C from same Server A.
>> >
>> >But if i want to communicate in-between Server B to Server C how this ipa
>> >will work? should i want to copy my pvt key?? Across all the hosts so
>> that
>> >internal communication will happens?
>>
>> It happens exactly same way as you'd do that without IPA. Something
>> should provide access to that private key. Typically people achieve that
>> by forwarding SSH authentication agent connection. Look at man page for
>> ssh about authentication agent.
>>
>> >
>> >
>> >On Tue, 3 Oct 2023 at 2:11 PM, Alexander Bokovoy <[email protected]>
>> >wrote:
>> >
>> >> On Аўт, 03 кас 2023, Pradeep KNS wrote:
>> >> >Hi Alexander,
>> >> >
>> >> >Thanks for your email,
>> >> >Like this i need to add all servers? As my dns is located in internal
>> >> >different server.
>> >>
>> >> Only if you need to use Kerberos authentication.
>> >>
>> >> >
>> >> >Also if i want to jump from one server to another server on ipa
>> clients
>> >> >using sshkeybased? How this mechanism works? here
>> >>
>> >> If you are using SSH keypairs, you are not using Kerberos and thus
>> don't
>> >> need these aliases at all.
>> >>
>> >> If you want to use SSH keypair to authenticate, then upload public SSH
>> >> key for that user to IPA.
>> >>
>> >> In general, almost all these details covered in the RHEL IdM
>> >> documentation:
>> >>
>> >>
>> https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/managing_idm_users_groups_hosts_and_access_control_rules/managing-public-ssh-keys_managing-users-groups-hosts
>> >>
>> >> >
>> >> >
>> >> >
>> >> >
>> >> >On Tue, 3 Oct 2023 at 1:45 PM, Pradeep KNS <
>> [email protected]>
>> >> >wrote:
>> >> >
>> >> >> Awesome, thanks for the info!
>> >> >>
>> >> >> On Tue, 3 Oct 2023 at 1:44 PM, Alexander Bokovoy <
>> [email protected]>
>> >> >> wrote:
>> >> >>
>> >> >>> On Аўт, 03 кас 2023, Pradeep KNS via FreeIPA-users wrote:
>> >> >>> >Hi Rob,
>> >> >>> >
>> >> >>> >Thanks for your email,
>> >> >>> >
>> >> >>> >Yeah true FQDN is working without any issues.But is there any way
>> to
>> >> ssh
>> >> >>> >via IP as well rather than hostname
>> >> >>>
>> >> >>> Kerberos authentication is based on names of services known to your
>> >> KDC.
>> >> >>> IP address is not a name in this context and is not associated
>> with the
>> >> >>> service host/$FQDN, hence it is not found in the Kerberos database.
>> >> >>>
>> >> >>> You can add such service name alias using 'ipa host-add-principal'
>> >> >>> command. It is, however, not always enough because most Kerberos
>> >> >>> services do not expect to operate with multiple aliases. Luckily,
>> SSH
>> >> >>> works fine with such tickets in IPA environment.
>> >> >>>
>> >> >>> $ ipa host-add-principal server.ipa.example host/10.40.1.201
>> >> >>> ---------------------------------------
>> >> >>> Added new aliases to host "server.ipa.example"
>> >> >>> ---------------------------------------
>> >> >>>    Host name: server.ipa.example
>> >> >>>    Principal alias: host/[email protected],
>> >> >>> host/[email protected]
>> >> >>>
>> >> >>>
>> >> >>>
>> >> >>> >
>> >> >>> >On Tue, 3 Oct 2023 at 2:22 AM, Rob Crittenden <
>> [email protected]>
>> >> >>> wrote:
>> >> >>> >
>> >> >>> >> Pradeep KNS wrote:
>> >> >>> >> > ssh [email protected] -v
>> >> >>> >>
>> >> >>> >> [snip]
>> >> >>> >>
>> >> >>> >> > SHA256:1BAWa9F52c6u26qe8T9ZQsin3lk+VTFeRYBDtkOzNMU
>> >> >>> >> > debug1: load_hostkeys: fopen /home/kns/.ssh/known_hosts: No
>> such
>> >> >>> file or
>> >> >>> >> > directory
>> >> >>> >> > debug1: load_hostkeys: fopen /home/kns/.ssh/known_hosts2: No
>> such
>> >> >>> file
>> >> >>> >> > or directory
>> >> >>> >> > debug1: Host '10.40.1.201' is known and matches the ED25519
>> host
>> >> key.
>> >> >>> >> > debug1: Found key in /var/lib/sss/pubconf/known_hosts:2
>> >> >>> >>
>> >> >>> >> The SSSD ssh integration was used to to validate that the
>> host's SSH
>> >> >>> key
>> >> >>> >> matched what was received so you avoided the "do you trust this
>> >> host"
>> >> >>> >> prompt. So that's good.
>> >> >>> >>
>> >> >>> >> > debug1: rekey out after 4294967296 blocks
>> >> >>> >> > debug1: SSH2_MSG_NEWKEYS sent
>> >> >>> >> > debug1: expecting SSH2_MSG_NEWKEYS
>> >> >>> >> > debug1: SSH2_MSG_NEWKEYS received
>> >> >>> >> > debug1: rekey in after 4294967296 blocks
>> >> >>> >> > debug1: Will attempt key: /home/kns/.ssh/id_rsa
>> >> >>> >> > debug1: Will attempt key: /home/kns/.ssh/id_dsa
>> >> >>> >> > debug1: Will attempt key: /home/kns/.ssh/id_ecdsa
>> >> >>> >> > debug1: Will attempt key: /home/kns/.ssh/id_ecdsa_sk
>> >> >>> >> > debug1: Will attempt key: /home/kns/.ssh/id_ed25519
>> >> >>> >> > debug1: Will attempt key: /home/kns/.ssh/id_ed25519_sk
>> >> >>> >> > debug1: Will attempt key: /home/kns/.ssh/id_xmss
>> >> >>> >> > debug1: SSH2_MSG_EXT_INFO received
>> >> >>> >> > debug1: kex_input_ext_info:
>> >> >>> >> > server-sig-algs=<ssh-ed25519,[email protected]
>> >> >>> >> > <mailto:[email protected]
>> >> >>> >>
>> >> >>>
>> >>
>> >,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,
>> >> >>> >> [email protected]
>> >> >>> >> > <mailto:[email protected]>,
>> >> >>> >> [email protected]
>> >> >>> >> > <mailto:[email protected]>>
>> >> >>> >> > debug1: SSH2_MSG_SERVICE_ACCEPT received
>> >> >>> >> > debug1: Authentications that can continue:
>> >> >>> >> >
>> >> publickey,gssapi-keyex,gssapi-with-mic,password,keyboard-interactive
>> >> >>> >> > debug1: Next authentication method: gssapi-with-mic
>> >> >>> >> > *debug1: Unspecified GSS failure.  Minor code may provide more
>> >> >>> >> information
>> >> >>> >> > Server host/[email protected]
>> >> >>> >> > <mailto:[email protected]> not found in Kerberos
>> >> database*
>> >> >>> >>
>> >> >>> >> IPA keys on hostnames, not IP addresses, hence this message. You
>> >> need
>> >> >>> to
>> >> >>> >> use a FQDN. AFAIK there is no workaround.
>> >> >>> >>
>> >> >>> >> > debug1: Authentications that can continue:
>> >> >>> >> >
>> >> publickey,gssapi-keyex,gssapi-with-mic,password,keyboard-interactive
>> >> >>> >> > debug1: Next authentication method: publickey
>> >> >>> >> > debug1: Trying private key: /home/kns/.ssh/id_rsa
>> >> >>> >> > debug1: Trying private key: /home/kns/.ssh/id_dsa
>> >> >>> >> > debug1: Trying private key: /home/kns/.ssh/id_ecdsa
>> >> >>> >> > debug1: Trying private key: /home/kns/.ssh/id_ecdsa_sk
>> >> >>> >> > debug1: Trying private key: /home/kns/.ssh/id_ed25519
>> >> >>> >> > debug1: Trying private key: /home/kns/.ssh/id_ed25519_sk
>> >> >>> >> > debug1: Trying private key: /home/kns/.ssh/id_xmss
>> >> >>> >> > debug1: Next authentication method: keyboard-interactive
>> >> >>> >> > ([email protected] <mailto:[email protected]>) Password:
>> >> >>> >>
>> >> >>> >> It failed to do a Kerberos/GSSAPI auth so it fell back to
>> password.
>> >> >>> >>
>> >> >>> >> rob
>> >> >>> >>
>> >> >>> >>
>> >> >>>
>> >> >>>
>> >> >>>
>> >> >>>
>> >> >>> --
>> >> >>> / Alexander Bokovoy
>> >> >>> Sr. Principal Software Engineer
>> >> >>> Security / Identity Management Engineering
>> >> >>> Red Hat Limited, Finland
>> >> >>>
>> >> >>>
>> >>
>> >>
>> >>
>> >>
>> >> --
>> >> / Alexander Bokovoy
>> >> Sr. Principal Software Engineer
>> >> Security / Identity Management Engineering
>> >> Red Hat Limited, Finland
>> >>
>> >>
>>
>>
>>
>>
>> --
>> / Alexander Bokovoy
>> Sr. Principal Software Engineer
>> Security / Identity Management Engineering
>> Red Hat Limited, Finland
>>
>>
_______________________________________________
FreeIPA-users mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedorahosted.org/archives/list/[email protected]
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue

Reply via email to