Also, I just noticed this:

# ipa-replica-manage  dnarange-show
ipa02.hq.spinque.com: 1172150501-1172175499
ipa01.hq.spinque.com: 1172175501-1172199999

while ipa idrange-find showed:

  ipabaseid: 117200000
  ipaidrangesize: 1000

These ranges are one order of magnitude far apart:

117200000
1172150501

I'm confused now. Shouldn't the two DNA ranges be the per-replica split of
the defined local domain ID range?


On Wed, 3 Jan 2024 at 11:22, Roberto Cornacchia <
roberto.cornacc...@gmail.com> wrote:

> Hi Alexander,
>
> Looking back at related messages, I've read a bunch of RedHat articles.
>
> I ran
>
> $  ipa config-mod --enable-sid --add-sids
>
> which did not return with failure but also did not add SIDs to users.
>
> Looking further, I understood that this fails because some UIDs and GIDs
> are outside the defined ID range.
> I don't really know how that happened, but apparently it did.
>
> I have finally landed on this article [1], which should help me fix this
> and then I'll be able to try the SIDs generation again.
>
> If I look at the existing ID ranges, it looks like the primary range is
> defined to be only 1000 IDs long:
>
> # ipa idrange-find --all --raw
> ----------------
> 2 ranges matched
> ----------------
>   dn: cn=HQ.SPINQUE.COM_id_range,cn=ranges,cn=etc,dc=hq,dc=spinque,dc=com
>   cn: HQ.SPINQUE.COM_id_range
>   ipabaseid: 117200000
>   ipaidrangesize: 1000
>   ipabaserid: 1000
>   ipasecondarybaserid: 100000000
>   iparangetype: ipa-local
>   objectclass: top
>   objectclass: ipaIDrange
>   objectclass: ipaDomainIDRange
>
>   dn:
> cn=HQ.SPINQUE.COM_subid_range,cn=ranges,cn=etc,dc=hq,dc=spinque,dc=com
>   cn: HQ.SPINQUE.COM_subid_range
>   ipabaseid: 2147483648
>   ipaidrangesize: 2147352576
>   ipabaserid: 2147482648
>   ipanttrusteddomainsid: S-1-5-21-738065-838566-3901153701
>   iparangetype: ipa-ad-trust
>   objectclass: top
>   objectclass: ipaIDrange
>   objectclass: ipaTrustedADDomainRange
>
> I seem to remember that the default range size is 200K, and I'm sure I
> haven't reduced it myself.
>
> So my question, before trying to fix this, is: are you aware of this
> happening for a reason, maybe during one of the upgrades? Can I safely
> re-expand the range?
>
> Thanks for your support, Roberto
>
> [1] https://access.redhat.com/solutions/394763
>
> On Tue, 2 Jan 2024 at 17:04, Alexander Bokovoy <aboko...@redhat.com>
> wrote:
>
>> On Аўт, 02 сту 2024, Roberto Cornacchia via FreeIPA-users wrote:
>> >Hi there, clients are having trouble with kerberos authentication:
>> >
>> >$ kinit -V user
>> >Using existing cache: xxxxxxxxxx:yyyyy
>> >Using principal: u...@sub.example.com <robe...@sub.example.com>
>> >Password for u...@sub.example.com <robe...@sub.example.com>:
>> >kinit: Generic error (see e-text) while getting initial credentials
>> >
>> >On the ipa server, /var/log/krb5kdc.log says:
>> >
>> >Dec 24 14:40:34 ipa01.sub.example.com krb5kdc[3324](info): AS_REQ (6
>> etypes
>> >{aes256-cts-hmac-sha384-192(20), aes128-cts-hmac-sha256-128(19),
>> >aes256-cts-hmac-sha1-96(18), aes128-cts-hmac-sha1-96(17),
>> >camellia256-cts-cmac(26), camellia128-cts-cmac(25)}) <
>> ><http://192.168.0.202/>IP>: NEEDED_PREAUTH: u...@sub.example.com
>> ><robe...@sub.example.com> for krbtgt/sub.example....@sub.example.com,
>> >Additional pre-authentication required
>> >Dec 24 14:40:34 ipa01.sub.example.com krb5kdc[3324](info): closing down
>> fd
>> >11
>> >Dec 24 14:40:51 ipa01.sub.example.com krb5kdc[3324](info): AS_REQ :
>> >handle_authdata (2)
>> >Dec 24 14:40:51 ipa01.sub.example.com krb5kdc[3324](info): AS_REQ (6
>> etypes
>> >{aes256-cts-hmac-sha384-192(20), aes128-cts-hmac-sha256-128(19),
>> >aes256-cts-hmac-sha1-96(18), aes128-cts-hmac-sha1-96(17),
>> >camellia256-cts-cmac(26), camellia128-cts-cmac(25)}) <
>> ><http://192.168.0.202/>IP>: HANDLE_AUTHDATA: user <
>> robe...@sub.example.com>
>> >@SUB.EXAMPLE.COM <robe...@sub.example.com> for krbtgt/
>> >sub.example....@sub.example.com, No such file or directory
>>
>> ^^^ this means the user roberto has no SID assigned. Look into numerous
>> discussions on this mailing list in 2023, there are plenty of suggested
>> actions in those threads.
>>
>> >Dec 24 14:40:51 ipa01.sub.example.com krb5kdc[3324](info): closing down
>> fd
>> >11
>> >Dec 24 14:40:57 ipa01.sub.example.com krb5kdc[3324](info): AS_REQ (4
>> etypes
>> >{aes256-cts-hmac-sha1-96(18), aes128-cts-hmac-sha1-96(17),
>> >aes256-cts-hmac-sha384-192(20), aes128-cts-hmac-sha256-128(19)}) <
>> ><http://192.168.0.16/>IP>: NEEDED_PREAUTH: ldap/
>> >ipa01.sub.example....@sub.example.com for krbtgt/
>> >sub.example....@sub.example.com, Additional pre-authentication required
>> >Dec 24 14:40:57 ipa01.sub.example.com krb5kdc[3324](info): closing down
>> fd
>> >11
>> >Dec 24 14:40:57 ipa01.sub.example.com krb5kdc[3324](info): AS_REQ (4
>> etypes
>> >{aes256-cts-hmac-sha1-96(18), aes128-cts-hmac-sha1-96(17),
>> >aes256-cts-hmac-sha384-192(20), aes128-cts-hmac-sha256-128(19)}) <
>> ><http://192.168.0.16/>IP>: ISSUE: authtime 1703425257, etypes
>> >{rep=aes256-cts-hmac-sha1-96(18), tkt=aes256-cts-hmac-sha1-96(18),
>> >ses=aes256-cts-hmac-sha1-96(18)},
>> >ldap/ipa01.sub.example....@sub.example.com for
>> >krbtgt/sub.example....@sub.example.com
>> >Dec 24 14:40:57 ipa01.sub.example.com krb5kdc[3324](info): closing down
>> fd
>> >11
>> >Dec 24 14:40:57 ipa01.sub.example.com krb5kdc[3324](info): TGS_REQ (4
>> >etypes {aes256-cts-hmac-sha384-192(20), aes128-cts-hmac-sha256-128(19),
>> >aes256-cts-hmac-sha1-96(18), aes128-cts-hmac-sha1-96(17)}) <
>> ><http://192.168.0.16/>IP>: ISSUE: authtime 1703425257, etypes
>> >{rep=aes256-cts-hmac-sha1-96(18), tkt=aes256-cts-hmac-sha1-96(18),
>> >ses=aes256-cts-hmac-sha1-96(18)},
>> >ldap/ipa01.sub.example....@sub.example.com for
>> >ldap/ipa02.sub.example....@sub.example.com
>> >Dec 24 14:40:57 ipa01.sub.example.com krb5kdc[3324](info): closing down
>> fd
>> >11
>> >
>> >There are 2 ipa servers, ipa01 (Rocky 9.3, ipa 4.10.2) and ipa02 (Rock
>> 9.1,
>> >ipa4.10.0), both with CA and DNS. ipa02 is CRL master.
>> >On both, ipa-healthcheck doesn't find any issue.
>> >
>> >Also: kinit fails from within ipa01, succeeds from within ipa02.
>> >
>> >The issue seems to be in ipa01, and I have already tried to reinstall it
>> >from scratch. One thing that is different is the version.
>> >
>> >Could you please help me figure out what's wrong?
>> >
>> >Best regards,
>> >Roberto
>>
>>
>>
>>
>> --
>> / Alexander Bokovoy
>> Sr. Principal Software Engineer
>> Security / Identity Management Engineering
>> Red Hat Limited, Finland
>>
>>
--
_______________________________________________
FreeIPA-users mailing list -- freeipa-users@lists.fedorahosted.org
To unsubscribe send an email to freeipa-users-le...@lists.fedorahosted.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedorahosted.org/archives/list/freeipa-users@lists.fedorahosted.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue

Reply via email to