Hello, thank you Rob
[root@prod-us-freeipa /]# ipa-healthcheck
[
{
"source": "ipahealthcheck.ipa.certs",
"check": "IPACertMatchCheck",
"result": "ERROR",
"uuid": "4bb93268-3bee-4c0c-8dc9-c1bd03293d34",
"when": "20240905082820Z",
"duration": "0.011836",
"kw": {
"key": "cn=JSCRAMBLER.COM IPA
CA,cn=certificates,cn=ipa,cn=etc,dc=jscrambler,dc=com",
"dn": "cn=JSCRAMBLER.COM IPA
CA,cn=certificates,cn=ipa,cn=etc,dc=jscrambler,dc=com",
"serial_number": 1,
"msg": "CA Certificate serial number {serial} is in LDAP '{dn}' but
is not in /etc/ipa/ca.crt"
}
},
{
"source": "ipahealthcheck.ipa.certs",
"check": "IPADogtagCertsMatchCheck",
"result": "ERROR",
"uuid": "f2f7f0e4-5d46-4e45-9ca6-56ae855e56e9",
"when": "20240905082820Z",
"duration": "0.070035",
"kw": {
"key": "caSigningCert cert-pki-ca",
"nickname": "caSigningCert cert-pki-ca",
"dbdir": "/etc/pki/pki-tomcat/alias",
"msg": "{nickname} certificate in NSS DB {dbdir} does not match entry
in LDAP"
}
},
{
"source": "ipahealthcheck.ipa.certs",
"check": "IPADogtagCertsMatchCheck",
"result": "ERROR",
"uuid": "8c591194-50d3-489e-a078-7f9fadb6c2fd",
"when": "20240905082820Z",
"duration": "0.399892",
"kw": {
"key": "ocspSigningCert cert-pki-ca",
"nickname": "ocspSigningCert cert-pki-ca",
"dbdir": "/etc/pki/pki-tomcat/alias",
"msg": "{nickname} certificate in NSS DB {dbdir} does not match entry
in LDAP"
}
},
{
"source": "ipahealthcheck.ipa.certs",
"check": "IPADogtagCertsMatchCheck",
"result": "ERROR",
"uuid": "10a1cb1c-c08c-4f05-87ea-ee1aac253692",
"when": "20240905082820Z",
"duration": "0.448749",
"kw": {
"key": "subsystemCert cert-pki-ca",
"nickname": "subsystemCert cert-pki-ca",
"dbdir": "/etc/pki/pki-tomcat/alias",
"msg": "{nickname} certificate in NSS DB {dbdir} does not match entry
in LDAP"
}
},
{
"source": "ipahealthcheck.ipa.certs",
"check": "IPADogtagCertsMatchCheck",
"result": "ERROR",
"uuid": "ac4edfc6-c254-45c5-8ec6-63cbd653f010",
"when": "20240905082820Z",
"duration": "0.496190",
"kw": {
"key": "auditSigningCert cert-pki-ca",
"nickname": "auditSigningCert cert-pki-ca",
"dbdir": "/etc/pki/pki-tomcat/alias",
"msg": "{nickname} certificate in NSS DB {dbdir} does not match entry
in LDAP"
}
},
{
"source": "ipahealthcheck.ipa.certs",
"check": "IPADogtagCertsMatchCheck",
"result": "ERROR",
"uuid": "edf86d59-2a47-4af8-a97c-bcaf8613897d",
"when": "20240905082820Z",
"duration": "0.568801",
"kw": {
"key": "Server-Cert cert-pki-ca",
"nickname": "Server-Cert cert-pki-ca",
"dbdir": "/etc/pki/pki-tomcat/alias",
"msg": "{nickname} certificate in NSS DB {dbdir} does not match entry
in LDAP"
}
},
{
"source": "ipahealthcheck.ipa.certs",
"check": "IPARAAgent",
"result": "ERROR",
"uuid": "bfb90711-9ab8-4b86-be1c-7fce8a0c673c",
"when": "20240905082820Z",
"duration": "0.006922",
"kw": {
"key": "ldap_mismatch",
"certfile": "/var/lib/ipa/ra-agent.pem",
"dn": "uid=ipara,ou=people,o=ipaca",
"msg": "RA agent certificate in {certfile} not found in LDAP
userCertificate attribute for the entry {dn}"
}
},
{
"source": "ipahealthcheck.ipa.dna",
"check": "IPADNARangeCheck",
"result": "CRITICAL",
"uuid": "f9e6c147-ef0d-4a80-b19d-cbb3cbe4ce1d",
"when": "20240905082822Z",
"duration": "0.074268",
"kw": {
"exception": "Insufficient access: SASL(-1): generic failure: GSSAPI
Error: No credentials were supplied, or the credentials were unavailable or
inaccessible (Preauthentication failed)",
"traceback": "Traceback (most recent call last):\n File
\"/usr/lib/python3.9/site-packages/ipapython/ipaldap.py\", line 1087, in
error_handler\n yield\n File
\"/usr/lib/python3.9/site-packages/ipapython/ipaldap.py\", line 1258, in
gssapi_bind\n self.conn.sasl_interactive_bind_s(\n File
\"/usr/lib64/python3.9/site-packages/ldap/ldapobject.py\", line 270, in
sasl_interactive_bind_s\n return
self._ldap_call(self._l.sasl_interactive_bind_s,who,auth,RequestControlTuples(serverctrls),RequestControlTuples(clientctrls),sasl_flags)\n
File \"/usr/lib64/python3.9/site-packages/ldap/ldapobject.py\", line 128,
in _ldap_call\n result = func(*args,**kwargs)\nldap.LOCAL_ERROR:
{'result': -2, 'desc': 'Local error', 'ctrls': [], 'info': 'SASL(-1):
generic failure: GSSAPI Error: No credentials were supplied, or the
credentials were unavailable or inaccessible (Preauthentication
failed)'}\n\nDuring handling of the above exception, another exception
occurred:\n\nTraceback (most recent call last):\n File
\"/usr/lib/python3.9/site-packages/ipahealthcheck/core/core.py\", line 56,
in run_plugin\n for result in plugin.check():\n File
\"/usr/lib/python3.9/site-packages/ipahealthcheck/core/plugin.py\", line
18, in wrapper\n for result in f(*args, **kwds):\n File
\"/usr/lib/python3.9/site-packages/ipahealthcheck/ipa/dna.py\", line 32, in
check\n agmt = replication.ReplicationManager(api.env.realm,
api.env.host)\n File
\"/usr/lib/python3.9/site-packages/ipaserver/install/replication.py\", line
268, in __init__\n self.conn.gssapi_bind()\n File
\"/usr/lib/python3.9/site-packages/ipapython/ipaldap.py\", line 1258, in
gssapi_bind\n self.conn.sasl_interactive_bind_s(\n File
\"/usr/lib64/python3.9/contextlib.py\", line 137, in __exit__\n
self.gen.throw(typ, value, traceback)\n File
\"/usr/lib/python3.9/site-packages/ipapython/ipaldap.py\", line 1143, in
error_handler\n raise
errors.ACIError(info=info)\nipalib.errors.ACIError: Insufficient access:
SASL(-1): generic failure: GSSAPI Error: No credentials were supplied, or
the credentials were unavailable or inaccessible (Preauthentication
failed)\n"
}
},
{
"source": "ipahealthcheck.ipa.idns",
"check": "IPADNSSystemRecordsCheck",
"result": "WARNING",
"uuid": "5c105f14-6f10-4931-8986-5effd0be9b27",
"when": "20240905082822Z",
"duration": "0.070505",
"kw": {
"msg": "Expected SRV record missing",
"key": "_ldap._tcp.jscrambler.com.:prod-us-freeipa.jscrambler.com."
}
},
{
"source": "ipahealthcheck.ipa.idns",
"check": "IPADNSSystemRecordsCheck",
"result": "WARNING",
"uuid": "50e2ccb5-7d62-4edb-a9e4-691e49c6966d",
"when": "20240905082822Z",
"duration": "0.077283",
"kw": {
"msg": "Expected SRV record missing",
"key": "_kerberos._tcp.jscrambler.com.:prod-us-freeipa.jscrambler.com
."
}
},
{
"source": "ipahealthcheck.ipa.idns",
"check": "IPADNSSystemRecordsCheck",
"result": "WARNING",
"uuid": "ddbd6ec8-de76-4b1d-a3df-bbf45e1669e4",
"when": "20240905082822Z",
"duration": "0.098272",
"kw": {
"msg": "Expected SRV record missing",
"key": "_kerberos._udp.jscrambler.com.:prod-us-freeipa.jscrambler.com
."
}
},
{
"source": "ipahealthcheck.ipa.idns",
"check": "IPADNSSystemRecordsCheck",
"result": "WARNING",
"uuid": "be3790d6-158e-40ae-b1d2-c0b5b532be96",
"when": "20240905082822Z",
"duration": "0.105748",
"kw": {
"msg": "Expected SRV record missing",
"key": "_kerberos-master._tcp.jscrambler.com.:
prod-us-freeipa.jscrambler.com."
}
},
{
"source": "ipahealthcheck.ipa.idns",
"check": "IPADNSSystemRecordsCheck",
"result": "WARNING",
"uuid": "b3fbd679-4906-4ad8-889b-923426ec9bc2",
"when": "20240905082822Z",
"duration": "0.121375",
"kw": {
"msg": "Expected SRV record missing",
"key": "_kerberos-master._udp.jscrambler.com.:
prod-us-freeipa.jscrambler.com."
}
},
{
"source": "ipahealthcheck.ipa.idns",
"check": "IPADNSSystemRecordsCheck",
"result": "WARNING",
"uuid": "550ed58a-309d-4756-8e20-61d8e2a7ea60",
"when": "20240905082822Z",
"duration": "0.129817",
"kw": {
"msg": "Expected SRV record missing",
"key": "_kpasswd._tcp.jscrambler.com.:prod-us-freeipa.jscrambler.com."
}
},
{
"source": "ipahealthcheck.ipa.idns",
"check": "IPADNSSystemRecordsCheck",
"result": "WARNING",
"uuid": "e22c24d3-e1d1-4db8-9640-332fb3c3d901",
"when": "20240905082822Z",
"duration": "0.139263",
"kw": {
"msg": "Expected SRV record missing",
"key": "_kpasswd._udp.jscrambler.com.:prod-us-freeipa.jscrambler.com."
}
},
{
"source": "ipahealthcheck.ipa.idns",
"check": "IPADNSSystemRecordsCheck",
"result": "WARNING",
"uuid": "265a4ab3-fb2e-4f2b-b83d-0264e11a13d7",
"when": "20240905082822Z",
"duration": "0.146888",
"kw": {
"msg": "Expected URI record missing",
"key": "_kerberos.jscrambler.com.:krb5srv:m:tcp:
prod-us-freeipa.jscrambler.com."
}
},
{
"source": "ipahealthcheck.ipa.idns",
"check": "IPADNSSystemRecordsCheck",
"result": "WARNING",
"uuid": "df8e8a86-69c7-4d6d-a850-597c017ad9da",
"when": "20240905082822Z",
"duration": "0.146902",
"kw": {
"msg": "Expected URI record missing",
"key": "_kerberos.jscrambler.com.:krb5srv:m:udp:
prod-us-freeipa.jscrambler.com."
}
},
{
"source": "ipahealthcheck.ipa.idns",
"check": "IPADNSSystemRecordsCheck",
"result": "WARNING",
"uuid": "591655a6-fddc-42e9-9cdd-b310cddd912e",
"when": "20240905082822Z",
"duration": "0.152359",
"kw": {
"msg": "Expected URI record missing",
"key": "_kpasswd.jscrambler.com.:krb5srv:m:tcp:
prod-us-freeipa.jscrambler.com."
}
},
{
"source": "ipahealthcheck.ipa.idns",
"check": "IPADNSSystemRecordsCheck",
"result": "WARNING",
"uuid": "82727f16-ba22-4696-b542-1479ac8ffa3f",
"when": "20240905082822Z",
"duration": "0.152373",
"kw": {
"msg": "Expected URI record missing",
"key": "_kpasswd.jscrambler.com.:krb5srv:m:udp:
prod-us-freeipa.jscrambler.com."
}
},
{
"source": "ipahealthcheck.ipa.idns",
"check": "IPADNSSystemRecordsCheck",
"result": "WARNING",
"uuid": "1ab64a7e-0381-4fe3-a38b-301826551f6e",
"when": "20240905082822Z",
"duration": "0.174484",
"kw": {
"key": "ipa_ca_missing_prod-us-freeipa.jscrambler.com",
"server": "prod-us-freeipa.jscrambler.com",
"ipaddr": "172.18.0.2",
"msg": "expected ipa-ca to contain {ipaddr} for {server}"
}
},
{
"source": "ipahealthcheck.ipa.host",
"check": "IPAHostKeytab",
"result": "ERROR",
"uuid": "34eea407-73ae-46be-849c-71dddd4c01a4",
"when": "20240905082822Z",
"duration": "0.014935",
"kw": {
"msg": "Failed to obtain host TGT: Major (458752): No credentials
were supplied, or the credentials were unavailable or inaccessible, Minor
(2529638936): Preauthentication failed"
}
}
]
On Wed, Sep 4, 2024 at 6:41 PM Rob Crittenden <[email protected]> wrote:
> Duarte Petiz via FreeIPA-users wrote:
> > I will copy/paste it so:
> >
> > Hello
> >
> > [root@prod-us-freeipa backup]# getcert list | grep expires
> > expires: 2026-08-25 10:47:09 WEST
> > expires: 2026-08-25 10:46:16 WEST
> > expires: 2026-08-25 10:46:05 WEST
> > expires: 2026-08-25 10:46:12 WEST
> > expires: 2044-09-04 10:46:01 WEST
> > expires: 2026-08-25 10:46:09 WEST
> > expires: 2026-09-05 10:47:42 WEST
> >
> > Request ID '20240904094741':
> > status: MONITORING
> > stuck: no
> > key pair storage: type=FILE,location='/var/kerberos/krb5kdc/kdc.key'
> > certificate: type=FILE,location='/var/kerberos/krb5kdc/kdc.crt'
> > CA: IPA
> > issuer: CN=Certificate Authority,O=EXAMPLE.COM <http://example.com/>
> > subject: CN=prod-us-freeipa.example.com
> > <http://prod-us-freeipa.example.com/>,O=EXAMPLE.COM <http://example.com/
> >
> > issued: 2024-09-04 10:47:42 WEST
> > expires: 2026-09-05 10:47:42 WEST
> > dns: prod-us-freeipa.example.com <http://prod-us-freeipa.example.com/>
> > principal name: krbtgt/[email protected]
> > <mailto:[email protected]>
> > key usage:
> digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment
> > eku: id-kp-serverAuth,id-pkinit-KPKdc
> > profile: KDCs_PKINIT_Certs
> > pre-save command:
> > post-save command: /usr/libexec/ipa/certmonger/renew_kdc_cert
> > track: yes
> > auto-renew: yes
> >
> >
> > I think the problem is related with some certificate that is included in
> > the backup with "--data".
> > If I do a full restore it brokes de PKI and seems to be impossible to
> > restore.
> > The "--data" flag maybe have some certificate injected different else
> > than dn: uid=pkidbuser,ou=people,o=ipaca.
> > On the dashboard the error is: Your session has expired. Please log in
> > again.
> >
> > on the logs
> > [Wed Sep 04 10:09:13.645078 2024] [wsgi:error] [pid 254:tid 438]
> > [remote 172.21.0.1:48490 <http://172.21.0.1:48490/>] ipa: INFO: 401
> > Unauthorized: Insufficient access: Invalid credentials
> > [Wed Sep 04 10:09:13.819864 2024] [:warn] [pid 257:tid 325]
> > [client 172.21.0.1:48500 <http://172.21.0.1:48500/>] failed to set perms
> > (3140) on file (/run/ipa/ccaches/[email protected])!,
> > referer: https://prod-us-freeipa.example.com/ipa/ui
> > [Wed Sep 04 10:09:14.045869 2024] [wsgi:error] [pid 253:tid 432]
> > [remote 172.21.0.1:48504 <http://172.21.0.1:48504/>] ipa: INFO: 401
> > Unauthorized: Insufficient access: Invalid credentials
> >
> >
> > But i cannot find what is really causing the issue...
> >
> >
> > If I do a full-restore with the following procedure I can login into
> > the web portal, but the PKI goes broken.
> >
> > 1º install new freeipa 2º restore /var/lib/ipa/private/httpd.key 3º
> > restore /var/lib/ipa/gssproxy/http.keytab 5º docker exec -ti
> > ipa-freeipa-1 bash 6º ipa-restore /var/lib/ipa/backup/backup
> >
> > There is some way to do a new "pki" install in an existing
> > installed/restored freeipa?
> > I cannot let the PKI down, it will break the upgrades for future
> > versions. That's why I tried to restore data-only.
>
> There is no supported way to replace the CA.
>
> Can you install the {free}ipa-healthcheck package and run
> ipa-healthcheck? It is likely to return a slew of errors because the CA
> will be unresponsive but it will also check a number of things that
> could lead to a root cause.
>
> rob
>
> >
> >
> > On Wed, Sep 4, 2024 at 1:35 PM flo--- via FreeIPA-users
> > <[email protected]
> > <mailto:[email protected]>> wrote:
> >
> > The content of this message was lost. It was probably cross-posted to
> > multiple lists and previously handled on another list.
> > --
> > _______________________________________________
> > FreeIPA-users mailing list -- [email protected]
> > <mailto:[email protected]>
> > To unsubscribe send an email to
> > [email protected]
> > <mailto:[email protected]>
> > Fedora Code of Conduct:
> > https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> > List Guidelines:
> https://fedoraproject.org/wiki/Mailing_list_guidelines
> > List Archives:
> >
> https://lists.fedorahosted.org/archives/list/[email protected]
> > Do not reply to spam, report it:
> > https://pagure.io/fedora-infrastructure/new_issue
> >
> >
> >
> > --
> > /Kind Regards/
> >
> > *Duarte Petiz*
> > *DevOps Team Lead *| jscrambler.com <http://jscrambler.com/>
> > *
> > *
> > *
> > *
> >
> >
>
>
--
*Kind Regards*
*Duarte Petiz*
*DevOps Team Lead *| jscrambler.com
--
_______________________________________________
FreeIPA-users mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Fedora Code of Conduct:
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives:
https://lists.fedorahosted.org/archives/list/[email protected]
Do not reply to spam, report it:
https://pagure.io/fedora-infrastructure/new_issue