Hi, On Mon, Jun 16, 2025 at 5:28 PM Kroon PC, Peter via FreeIPA-users < freeipa-users@lists.fedorahosted.org> wrote:
> > Hi Flo, > > >> [server1]# ldapsearch -Y GSSAPI -h server2.ipa.test -b "" -s base > >This one fails > >What is the error/output? > Sorry, should've mentioned that immediately: > ``` > SASL/GSSAPI authentication started > ldap_sasl_interactive_bind: Invalid credentials (49) > ``` > The logs on server2: > ``` > [server2]# grep conn=94717 access > [16/Jun/2025:15:06:02.209765786 +0000] conn=94717 fd=340 slot=340 > connection from 192.168.12.58 to 192.168.13.128 > [16/Jun/2025:15:06:02.226498460 +0000] conn=94717 op=0 BIND dn="" > method=sasl version=3 mech=GSSAPI > [16/Jun/2025:15:06:02.227725823 +0000] conn=94717 op=0 RESULT err=49 > tag=97 nentries=0 wtime=0.000429934 optime=0.001229939 etime=0.001657378 - > SASL(-13): authentication failure: GSSAPI Failure: gss_accept_sec_context > My last idea would be to check if you see any S4U2PROXY_EVIDENCE_TKT_WITHOUT_PAC error in /var/log/krb5kdc.log on server1/server2. This may be related to missing SID, and if that's the case you need to run # kinit admin # ipa config-mod --enable-sid --add-sids Since replication is broken I would run the command on both machines. Then check if there are any error related to sid in /var/log/dirsrv/slapd-XXX/errors flo [16/Jun/2025:15:06:02.477199855 +0000] conn=94717 op=1 UNBIND > [16/Jun/2025:15:06:02.477239120 +0000] conn=94717 op=1 fd=340 Disconnect - > Cleanly Closed Connection - U1 > [server2]# grep conn=94720 access > [16/Jun/2025:15:06:03.438152386 +0000] conn=94720 fd=384 slot=384 > connection from 192.168.12.58 to 192.168.13.128 > [16/Jun/2025:15:06:03.470403124 +0000] conn=94720 op=0 BIND dn="" > method=sasl version=3 mech=GSSAPI > [16/Jun/2025:15:06:03.471510086 +0000] conn=94720 op=0 RESULT err=49 > tag=97 nentries=0 wtime=0.000427299 optime=0.001123074 etime=0.001548149 - > SASL(-13): authentication failure: GSSAPI Failure: gss_accept_sec_context > [16/Jun/2025:15:06:03.473239612 +0000] conn=94720 op=1 UNBIND > [16/Jun/2025:15:06:03.473268077 +0000] conn=94720 op=1 fd=384 Disconnect - > Cleanly Closed Connection - U1 > [server2]# grep conn=94721 access > [16/Jun/2025:15:06:03.472944276 +0000] conn=94721 fd=386 slot=386 > connection from 192.168.12.58 to 192.168.13.128 > [16/Jun/2025:15:06:03.499428848 +0000] conn=94721 op=0 BIND dn="" > method=sasl version=3 mech=GSSAPI > [16/Jun/2025:15:06:03.500455145 +0000] conn=94721 op=0 RESULT err=49 > tag=97 nentries=0 wtime=0.000313752 optime=0.001027941 etime=0.001339388 - > SASL(-13): authentication failure: GSSAPI Failure: gss_accept_sec_context > [16/Jun/2025:15:06:03.750092421 +0000] conn=94721 op=1 UNBIND > [16/Jun/2025:15:06:03.750133630 +0000] conn=94721 op=1 fd=386 Disconnect - > Cleanly Closed Connection - U1 > ``` > > I diffed the service-show output; it's almost identical. I've marked the > places where it differs: > ``` > [server1]# ipa service-show ldap/server1.ipa.t...@ipa.test --all --raw > dn: krbprincipalname=ldap/server1.ipa.t...@ipa.test > ,cn=services,cn=accounts,<redacted> > krbcanonicalname: ldap/server1.ipa.t...@ipa.test > krbprincipalname: ldap/server1.ipa.t...@ipa.test > usercertificate: <redacted, identical on server2> > subject: CN=server1.ipa.t...@ipa.test > serial_number: 268369921 > serial_number_hex: 0xFFF0001 > issuer: CN=Certificate Authority,O=IPA.TEST > valid_not_before: Tue Apr 30 09:02:26 2024 UTC > valid_not_after: Fri May 01 09:02:26 2026 UTC > sha1_fingerprint: > 67:f5:4c:bd:df:a1:af:1f:45:b5:ce:1e:36:0b:1d:64:41:46:ae:44 > sha256_fingerprint: > da:0c:22:12:6a:41:11:ea:09:e7:2a:aa:89:cd:09:66:23:cd:95:a4:77:21:34:5c:21:82:6e:01:77:ae:9a:9b > has_keytab: TRUE > managedby: fqdn=server1.ipa.test,cn=computers,cn=accounts,<redacted> > ipaKrbPrincipalAlias: ldap/server1.ipa.t...@ipa.test > ipaUniqueID: 4d3c9622-06d0-11ef-be74-a60b6cb71064 > krbExtraData: <redacted, identical on server2> > krbLastFailedAuth: 20250616150511Z # This is absent on server2 > krbLastPwdChange: 20240430090159Z > krbLastSuccessfulAuth: 20250616150512Z # This is different on server2 > krbLoginFailedCount: 0 # This is absent on server2 > krbPwdPolicyReference: cn=Default Service Password > Policy,cn=services,cn=accounts,<redacted> > memberof: cn=replication managers,cn=sysaccounts,cn=etc,<redacted> > objectClass: krbprincipal > objectClass: krbprincipalaux > objectClass: krbticketpolicyaux > objectClass: ipaobject > objectClass: ipaservice > objectClass: pkiuser > objectClass: ipakrbprincipal > objectClass: top > > [server2]# ipa service-show ldap/server1.ipa.t...@ipa.test --all --raw > dn: krbprincipalname=ldap/server1.ipa.t...@ipa.test > ,cn=services,cn=accounts,<redacted> > krbcanonicalname: ldap/server1.ipa.t...@ipa.test > krbprincipalname: ldap/server1.ipa.t...@ipa.test > usercertificate: <redacted, identical on server1> > subject: CN=server1.ipa.t...@ipa.test > serial_number: 268369921 > serial_number_hex: 0xFFF0001 > issuer: CN=Certificate Authority,O=IPA.TEST > valid_not_before: Tue Apr 30 09:02:26 2024 UTC > valid_not_after: Fri May 01 09:02:26 2026 UTC > sha1_fingerprint: > 67:f5:4c:bd:df:a1:af:1f:45:b5:ce:1e:36:0b:1d:64:41:46:ae:44 > sha256_fingerprint: > da:0c:22:12:6a:41:11:ea:09:e7:2a:aa:89:cd:09:66:23:cd:95:a4:77:21:34:5c:21:82:6e:01:77:ae:9a:9b > has_keytab: TRUE > managedby: fqdn=server1.ipa.test,cn=computers,cn=accounts,<redacted> > ipaKrbPrincipalAlias: ldap/server1.ipa.t...@ipa.test > ipaUniqueID: 4d3c9622-06d0-11ef-be74-a60b6cb71064 > krbExtraData: <redacted, identical on server1> > krbLastPwdChange: 20240430090159Z > krbLastSuccessfulAuth: 20250530124646Z # This is different on server1 > krbPwdPolicyReference: cn=Default Service Password > Policy,cn=services,cn=accounts,<redacted> > memberof: cn=replication managers,cn=sysaccounts,cn=etc,<redacted> > objectClass: krbprincipal > objectClass: krbprincipalaux > objectClass: krbticketpolicyaux > objectClass: ipaobject > objectClass: ipaservice > objectClass: pkiuser > objectClass: ipakrbprincipal > objectClass: top > ``` > > Many thanks for thinking along! > Peter > ________________________________________ > From: Florence Blanc-Renaud <f...@redhat.com> > Sent: Monday, 16 June 2025 16:57 > To: Kroon PC, Peter > Cc: FreeIPA users list > Subject: Re: [Freeipa-users] Re: Replication issues > > U ontvangt niet vaak e-mail van f...@redhat.com. Ontdek waarom dit > belangrijk is<https://aka.ms/LearnAboutSenderIdentification> > Hi, > > On Mon, Jun 16, 2025 at 10:37 AM Kroon PC, Peter <p.c.kr...@pl.hanze.nl > <mailto:p.c.kr...@pl.hanze.nl>> wrote: > Thanks Flo, > Outlook still hates inline replies, so I'll put it all on top: > > > [server1]# ldapsearch -Y GSSAPI -h server2.ipa.test -b "" -s base > This one fails > What is the error/output? > Do you see a corresponding log on server2 in > /var/log/dirsrv/slapd-XXX/access ? As the access log is buffered, it may > not appear immediately but the lines should look like this: > > [16/Jun/2025:14:19:40.196675396 +0000] conn=4308 fd=91 slot=91 connection > from 10.0.144.249 to 10.0.147.13 > [16/Jun/2025:14:19:40.235073103 +0000] conn=4308 op=0 BIND dn="" > method=sasl version=3 mech=GSSAPI > [16/Jun/2025:14:19:40.238083749 +0000] conn=4308 op=0 RESULT err=14 tag=97 > nentries=0 wtime=0.000239213 optime=0.003014757 etime=0.003253237, SASL > bind in progress > [16/Jun/2025:14:19:40.242142681 +0000] conn=4308 op=1 BIND dn="" > method=sasl version=3 mech=GSSAPI > [16/Jun/2025:14:19:40.243578790 +0000] conn=4308 op=1 RESULT err=14 tag=97 > nentries=0 wtime=0.000043381 optime=0.001435699 etime=0.001478388, SASL > bind in progress > [16/Jun/2025:14:19:40.244527413 +0000] conn=4308 op=2 BIND dn="" > method=sasl version=3 mech=GSSAPI > [16/Jun/2025:14:19:40.245078046 +0000] conn=4308 op=2 RESULT err=0 tag=97 > nentries=0 wtime=0.000030979 optime=0.000556235 etime=0.000586594 > dn="krbprincipalname=ldap/server1.ipa.t...@ipa.test > ,cn=services,cn=accounts,dc=ipa,dc=test" > [16/Jun/2025:14:19:40.245470809 +0000] conn=4308 op=3 SRCH base="" scope=0 > filter="(objectClass=*)" attrs=ALL > [16/Jun/2025:14:19:40.246272148 +0000] conn=4308 op=3 RESULT err=0 tag=101 > nentries=1 wtime=0.000101444 optime=0.000801741 etime=0.000902112 > [16/Jun/2025:14:19:40.247713690 +0000] conn=4308 op=4 UNBIND > > If you don't see the first lines, it means the connection is not > established, maybe a DNS issue or firewall issue. > If you see the BIND lines with a corresponding err=49, it means the server > is not able to associate the kerberos principal name with a LDAP entry. Can > you check the content of this ldap entry on both server1 and server2 with > this command: > ipa service-show ldap/server1.ipa.t...@ipa.test --all --raw > > The value for krbprincipalname should be ldap/server1.ipa.t...@ipa.test > > flo > > > > > [server1]# klist -kte /etc/dirsrv/ds.keytab > > [server1]# kvno ldap/server1.ipa.t...@ipa.test > Both of these have kvno 1 > > > [server2]# kadmin.local getprinc ldap/server.ipa.t...@ipa.test > Interesing, this one also has knvo1! > > Screen output for the lot: > [server1]# klist -kte /etc/dirsrv/ds.keytab > Keytab name: FILE:/etc/dirsrv/ds.keytab > KVNO Timestamp Principal > ---- ----------------- > -------------------------------------------------------- > 1 04/30/24 11:01:59 ldap/server1.ipa.t...@ipa.test > (aes256-cts-hmac-sha1-96) > 1 04/30/24 11:01:59 ldap/server1.ipa.t...@ipa.test > (aes128-cts-hmac-sha1-96) > [server1]# kvno ldap/server1.ipa.t...@ipa.test > ldap/server1.ipa.t...@ipa.test: kvno = 1 > > [server2]# kadmin.local getprinc ldap/server1.ipa.t...@ipa.test > Principal: ldap/server1.ipa.t...@ipa.test > Expiration date: [never] > Last password change: Tue Apr 30 09:01:59 UTC 2024 > Password expiration date: [never] > Maximum ticket life: 1 day 00:00:00 > Maximum renewable life: 7 days 00:00:00 > Last modified: Tue Apr 30 09:01:59 UTC 2024 (ldap/server1.ipa.t...@ipa.test > ) > Last successful authentication: Fri May 30 12:46:46 UTC 2025 > Last failed authentication: [never] > Failed password attempts: 0 > Number of keys: 2 > Key: vno 1, aes256-cts-hmac-sha1-96:special > Key: vno 1, aes128-cts-hmac-sha1-96:special > MKey: vno 1 > Attributes: REQUIRES_PRE_AUTH > Policy: [none] > > Many thanks, > Peter > ________________________________________ > From: Florence Blanc-Renaud <f...@redhat.com<mailto:f...@redhat.com>> > Sent: Monday, 16 June 2025 10:01 > To: FreeIPA users list > Cc: Kroon PC, Peter > Subject: Re: [Freeipa-users] Re: Replication issues > > U ontvangt niet vaak e-mail van f...@redhat.com<mailto:f...@redhat.com>. > Ontdek waarom dit belangrijk is< > https://aka.ms/LearnAboutSenderIdentification> > Hi, > > On Mon, Jun 16, 2025 at 9:10 AM Kroon PC, Peter via FreeIPA-users < > freeipa-users@lists.fedorahosted.org<mailto: > freeipa-users@lists.fedorahosted.org><mailto: > freeipa-users@lists.fedorahosted.org<mailto: > freeipa-users@lists.fedorahosted.org>>> wrote: > Hi Mark, > > thanks for chipping in. > Does anyone else have any suggestions before I wipe and reinstall the > replica entirely? > > You need to check if the credentials used for the replication are working. > > On the first server: > [server1]# kinit -kt /etc/dirsrv/ds.keytab ldap/server1.ipa.test > [server1]# ldapsearch -Y GSSAPI -h server1.ipa.test -b "" -s base > [server1]# ldapsearch -Y GSSAPI -h server2.ipa.test -b "" -s base > > The first LDAP search authenticates to the local LDAP server with the > credentials from ds keytab, the 2nd LDAP search authenticates to the other > master. Both should succeed. > If one fails, you need to check the kvno: > [server1]# klist -kte /etc/dirsrv/ds.keytab > [server1]# kvno ldap/server1.ipa.t...@ipa.test > The klist command outputs the kvno stored in the ds.keytab file. It has to > match the kvno returned by the 2nd command (the kvno as seen by the > kerberos server). If they don't match, it means that the key has been > re-generated but there is an inconsistency between the one stored in the > ds.keytab file and the one stored by the kerberos server. > > Also check that you get the same value for the KVNO on the other master > [server2]# kadmin.local getprinc ldap/server.ipa.t...@ipa.test > The above command directly checks in the kerberos server. > > The repair steps depend on which key is the most recent one, and where it > is stored. Please provide the kvnos from all the commands and we'll try to > guide you. > flo > > Peter > > ________________________________________ > From: Mark Reynolds <marey...@redhat.com<mailto:marey...@redhat.com > ><mailto:marey...@redhat.com<mailto:marey...@redhat.com>>> > Sent: Friday, 6 June 2025 17:32 > To: FreeIPA users list > Cc: Kroon PC, Peter > Subject: Re: [Freeipa-users] Re: Replication issues > > [You don't often get email from marey...@redhat.com<mailto: > marey...@redhat.com><mailto:marey...@redhat.com<mailto:marey...@redhat.com>>. > Learn why this is important at > https://aka.ms/LearnAboutSenderIdentification ] > > On 6/6/25 11:01 AM, Kroon PC, Peter via FreeIPA-users wrote: > > Hi Mark, > > > > thanks for the quick reply. > > Server-B has the following in the access log (twice, actually): > > ``` > > [06/Jun/2025:14:55:33.573567003 +0000] conn=8984 fd=372 slot=372 > connection from 192.168.12.58 to 192.168.13.128 > > [06/Jun/2025:14:55:33.613280772 +0000] conn=8984 op=0 BIND dn="" > method=sasl version=3 mech=GSSAPI > > [06/Jun/2025:14:55:33.614444924 +0000] conn=8984 op=0 RESULT err=49 > tag=97 nentries=0 wtime=0.000406209 optime=0.001176425 etime=0.001580230 - > SASL(-13): authentication failure: GSSAPI Failure: gss_accept_sec_context > > [06/Jun/2025:14:55:33.696712718 +0000] conn=8984 op=1 UNBIND > > [06/Jun/2025:14:55:33.696753716 +0000] conn=8984 op=1 fd=372 Disconnect > - Cleanly Closed Connection - U1 > > ``` > > I don't fully understand why it's trying GSSAPI after I entered the > directory manager password. > You authenticated as Directory Manager to the CLI, but it invokes the > replication agreement credentials to do the replication initialization > behind the scenes. > > I'd assume it'd use simple bind. > > In the security log there's the following, nothing about the failed > gssapi bind. > > ``` > > { "date": "[06\/Jun\/2025:14:55:00.776221689 +0000] ", "utc_time": > "1749221700.776221689", "event": "BIND_SUCCESS", "dn": "cn=directory > manager", "bind_method": "SIMPLE", "root_dn": true, "client_ip": > "192.168.12.58", "server_ip": "192.168.13.128", "ldap_version": 3, > "conn_id": 8983, "op_id": 0, "msg": "" } > > ``` > This is a different connection, but the other failed bind should have > been logged. Might have a bug somewhere :-( > > > > I'm about to leave the office for a long weekend, so I probably won't > respond again before Tuesday. > > So you "might" need to do an offline initialization to fix this, but I > suspect there is an official way the IPA team recommends to fix this > (sorry not as familiar with IPA as I am DS). So maybe someone from the > core IPA team and provide their recommendation. > > Mark > > > > > Peter > > > > ________________________________________ > > From: Mark Reynolds <marey...@redhat.com<mailto:marey...@redhat.com > ><mailto:marey...@redhat.com<mailto:marey...@redhat.com>>> > > Sent: Friday, 6 June 2025 15:26 > > To: FreeIPA users list > > Cc: Kroon PC, Peter > > Subject: Re: [Freeipa-users] Replication issues > > > > [You don't often get email from marey...@redhat.com<mailto: > marey...@redhat.com><mailto:marey...@redhat.com<mailto:marey...@redhat.com>>. > Learn why this is important at > https://aka.ms/LearnAboutSenderIdentification ] > > > > Hi Peter, > > > > So the credentials the replication agreement is using are not valid (for > > whatever reason). Please check the directory server access log for > > "err=49" and you should see the bind DN and more details on why the > > authentication failed. > > > > HTH, > > > > Mark > > > > On 6/6/25 6:56 AM, Kroon PC, Peter via FreeIPA-users wrote: > >> Hello world, > >> > >> I have 3 IPA servers that are supposed to all replicate with each > other. For one server this stopped working. On all servers I have > ipa-server 4.12.2-14.el9_6 on Rocky Linux 9.6. > >> I'll call my servers A, B, and C. Server A cannot replicate with > neither server B nor C. B and C can replicate eachother without issues. My > first suspicion was a firewall, but I've already confirmed that that's not > the issue. > >> Here's the sanitized CLI outputs, all from server A: > >> ``` > >> $ ipa-healthcheck > >> { > >> "source": "ipahealthcheck.ds.replication", > >> "check": "ReplicationCheck", > >> "result": "CRITICAL", > >> "uuid": "9c96a61a-d917-44de-907a-d5c7a4df667e", > >> "when": "20250606095130Z", > >> "duration": "1.072988", > >> "kw": { > >> "key": "DSREPLLE0001", > >> "items": [ > >> "Replication", > >> "Agreement" > >> ], > >> "msg": "The replication agreement ( > server-A.example.com-to-server-C.example.com< > http://server-a.example.com-to-server-c.example.com/>< > http://server-a.example.com-to-server-c.example.com/< > http://server-a.example.com-to-server-c.example.com/>>) under > \"dc=example,dc=com\" is not in synchronization." > >> } > >> }, > >> { > >> "source": "ipahealthcheck.ds.replication", > >> "check": "ReplicationCheck", > >> "result": "CRITICAL", > >> "uuid": "6c29d38e-a216-414e-b47a-d9302f38da67", > >> "when": "20250606095131Z", > >> "duration": "1.073047", > >> "kw": { > >> "key": "DSREPLLE0001", > >> "items": [ > >> "Replication", > >> "Agreement" > >> ], > >> "msg": "The replication agreement (metoserver-B.example.com< > http://metoserver-b.example.com/><http://metoserver-b.example.com/< > http://metoserver-b.example.com/>>) under \"dc=example,dc=com\" is not in > synchronization." > >> } > >> }, > >> { > >> "source": "ipahealthcheck.ds.replication", > >> "check": "ReplicationCheck", > >> "result": "CRITICAL", > >> "uuid": "445f686b-27d9-47e0-aaa8-bb8d5f3416d4", > >> "when": "20250606095131Z", > >> "duration": "1.073054", > >> "kw": { > >> "key": "DSREPLLE0001", > >> "items": [ > >> "Replication", > >> "Agreement" > >> ], > >> "msg": "The replication agreement (catoserver-B.example.com< > http://catoserver-b.example.com/><http://catoserver-b.example.com/< > http://catoserver-b.example.com/>>) under \"o=ipaca\" is not in > synchronization." > >> } > >> }, > >> { > >> "source": "ipahealthcheck.ds.replication", > >> "check": "ReplicationCheck", > >> "result": "CRITICAL", > >> "uuid": "bb6fb4b1-54fc-45dc-bb33-c8c3562f5765", > >> "when": "20250606095131Z", > >> "duration": "1.073058", > >> "kw": { > >> "key": "DSREPLLE0001", > >> "items": [ > >> "Replication", > >> "Agreement" > >> ], > >> "msg": "The replication agreement ( > server-A.example.com-to-server-C.example.com< > http://server-a.example.com-to-server-c.example.com/>< > http://server-a.example.com-to-server-c.example.com/< > http://server-a.example.com-to-server-c.example.com/>>) under \"o=ipaca\" > is not in synchronization." > >> } > >> } > >> ``` > >> ``` > >> $ ipa-replica-manage list > >> ipa-replica-manage list > >> Directory Manager password: > >> > >> server-A.example.com<http://server-a.example.com/>< > http://server-a.example.com/<http://server-a.example.com/>>: master > >> server-B.example.com<http://server-b.example.com/>< > http://server-b.example.com/<http://server-b.example.com/>>: master > >> server-C.example.com<http://server-c.example.com/>< > http://server-c.example.com/<http://server-c.example.com/>>: master > >> ``` > >> Ok, things are broken, let's try force-sync. > >> ``` > >> $ ipa-replica-manage force-sync --from server-B.example.com< > http://server-b.example.com/><http://server-b.example.com/< > http://server-b.example.com/>> --verbose --debug > >> <snip imports> > >> ipa: DEBUG: found 1 A records for server-A.example.com< > http://server-a.example.com/><http://server-a.example.com/< > http://server-a.example.com/>>.: 192.168.12.58 > >> ipa: DEBUG: The DNS response does not contain an answer to the > question: server-A.example.com<http://server-a.example.com/>< > http://server-a.example.com/<http://server-a.example.com/>>. IN AAAA > >> Directory Manager password: > >> > >> ipa: DEBUG: Created connection context.ldap2_139632322538896 > >> ipa: DEBUG: found 1 A records for server-A.example.com< > http://server-a.example.com/><http://server-a.example.com/< > http://server-a.example.com/>>.: 192.168.12.58 > >> ipa: DEBUG: The DNS response does not contain an answer to the > question: server-A.example.com<http://server-a.example.com/>< > http://server-a.example.com/<http://server-a.example.com/>>. IN AAAA > >> ipa: DEBUG: found 1 A records for server-B.example.com< > http://server-b.example.com/><http://server-b.example.com/< > http://server-b.example.com/>>.: 192.168.13.128 > >> ipa: DEBUG: The DNS response does not contain an answer to the > question: server-B.example.com<http://server-b.example.com/>< > http://server-b.example.com/<http://server-b.example.com/>>. IN AAAA > >> ipa: DEBUG: retrieving schema for SchemaCache url=ldaps:// > server-A.example.com:636<http://server-a.example.com:636/>< > http://server-a.example.com:636/<http://server-a.example.com:636/>> > conn=<ldap.ldapobject.SimpleLDAPObject object at 0x7efeaefd2460> > >> ipa: DEBUG: Loading StateFile from > '/var/lib/ipa/sysrestore/sysrestore.state' > >> ipa: DEBUG: Loading Index file from > '/var/lib/ipa/sysrestore/sysrestore.index' > >> ipa: DEBUG: retrieving schema for SchemaCache > url=ldapi://%2Frun%2Fslapd-BIN-BIOINF-NL.socket > conn=<ldap.ldapobject.SimpleLDAPObject object at 0x7efeaefd2610> > >> ipa: DEBUG: retrieving schema for SchemaCache url=ldaps:// > server-B.example.com:636<http://server-b.example.com:636/>< > http://server-b.example.com:636/<http://server-b.example.com:636/>> > conn=<ldap.ldapobject.SimpleLDAPObject object at 0x7efeae1ee1f0> > >> ipa: INFO: Setting agreement cn=meToserver-A.example.com< > http://metoserver-a.example.com/><http://metoserver-a.example.com/< > http://metoserver-a.example.com/>>,cn=replica,cn=dc\=example\,dc\=com,cn=mapping > tree,cn=config schedule to 2358-2359 0 to force synch > >> ipa: INFO: Deleting schedule 2358-2359 0 from agreement cn= > meToserver-A.example.com<http://metoserver-a.example.com/>< > http://metoserver-a.example.com/<http://metoserver-a.example.com/>>,cn=replica,cn=dc\=example\,dc\=com,cn=mapping > tree,cn=config > >> ipa: INFO: Replication Update in progress: False: status: Error (49) > Problem connecting to replica - LDAP error: Invalid credentials (connection > error): start: 19700101000000: end: 19700101000000 > >> ipa: DEBUG: Destroyed connection context.ldap2_139632322538896 > >> ``` > >> Maybe I can re-initialize? > >> ``` > >> $ ipa-replica-manage re-initialize --from server-B.example.com< > http://server-b.example.com/><http://server-b.example.com/< > http://server-b.example.com/>> --verbose --debug > >> <snip import> > >> <snip DNS responses, same as above> > >> Directory Manager password: > >> ipa: DEBUG: Created connection context.ldap2_140512488991280 > >> ipa: DEBUG: retrieving schema for SchemaCache url=ldaps:// > server-A.example.com:636<http://server-a.example.com:636/>< > http://server-a.example.com:636/<http://server-a.example.com:636/>> > conn=<ldap.ldapobject.SimpleLDAPObject object at 0x7fcb9c310dc0> > >> ipa: DEBUG: retrieving schema for SchemaCache url=ldaps:// > server-B.example.com:636<http://server-b.example.com:636/>< > http://server-b.example.com:636/<http://server-b.example.com:636/>> > conn=<ldap.ldapobject.SimpleLDAPObject object at 0x7fcb9c1e10a0> > >> ipa: INFO: Setting agreement cn=meToserver-A.example.com< > http://metoserver-a.example.com/><http://metoserver-a.example.com/< > http://metoserver-a.example.com/>>,cn=replica,cn=dc\=example\,dc\=com,cn=mapping > tree,cn=config schedule to 2358-2359 0 to force synch > >> ipa: INFO: Deleting schedule 2358-2359 0 from agreement cn= > meToserver-A.example.com<http://metoserver-a.example.com/>< > http://metoserver-a.example.com/<http://metoserver-a.example.com/>>,cn=replica,cn=dc\=example\,dc\=com,cn=mapping > tree,cn=config > >> Update in progress, 15 seconds elapsed > >> [ldaps://server-B.example.com:636<http://server-b.example.com:636/>< > http://server-b.example.com:636/<http://server-b.example.com:636/>>] > reports: Update failed! Status: [Error (49) - LDAP error: Invalid > credentials - no response received] > >> ipa: DEBUG: Destroyed connection context.ldap2_140512488991280 > >> ``` > >> Is it a firewall or password issue? No: > >> ``` > >> $ ldapwhoami -H ldaps://server-B.example.com< > http://server-b.example.com/><http://server-b.example.com/< > http://server-b.example.com/>> -D 'cn=directory manager' -W > >> Enter LDAP Password: > >> dn: cn=directory manager > >> ``` > >> From server-B: > >> ``` > >> server-B $ ldapwhoami -H ldaps://server-A.example.com< > http://server-a.example.com/><http://server-a.example.com/< > http://server-a.example.com/>> -D 'cn=directory manager' -W > >> Enter LDAP Password: > >> dn: cn=directory manager > >> ``` > >> I also checked that `ipa-replica-manage list-ruv` produces the same > output for all 3 servers. > >> Does anyone have any more ideas I could explore? > >> > >> Many thanks in advance! > >> Peter > > -- > > Identity Management Development Team > > > -- > Identity Management Development Team > > -- > _______________________________________________ > FreeIPA-users mailing list -- freeipa-users@lists.fedorahosted.org<mailto: > freeipa-users@lists.fedorahosted.org><mailto: > freeipa-users@lists.fedorahosted.org<mailto: > freeipa-users@lists.fedorahosted.org>> > To unsubscribe send an email to freeipa-users-le...@lists.fedorahosted.org > <mailto:freeipa-users-le...@lists.fedorahosted.org><mailto: > freeipa-users-le...@lists.fedorahosted.org<mailto: > freeipa-users-le...@lists.fedorahosted.org>> > Fedora Code of Conduct: > https://docs.fedoraproject.org/en-US/project/code-of-conduct/< > https://docs.fedoraproject.org/en-US/project/code-of-conduct/>< > https://docs.fedoraproject.org/en-US/project/code-of-conduct/< > https://docs.fedoraproject.org/en-US/project/code-of-conduct/>> > List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines< > https://fedoraproject.org/wiki/Mailing_list_guidelines>< > https://fedoraproject.org/wiki/Mailing_list_guidelines< > https://fedoraproject.org/wiki/Mailing_list_guidelines>> > List Archives: > https://lists.fedorahosted.org/archives/list/freeipa-users@lists.fedorahosted.org > < > https://lists.fedorahosted.org/archives/list/freeipa-users@lists.fedorahosted.org > >< > https://lists.fedorahosted.org/archives/list/freeipa-users@lists.fedorahosted.org > < > https://lists.fedorahosted.org/archives/list/freeipa-users@lists.fedorahosted.org > >> > Do not reply to spam, report it: > https://pagure.io/fedora-infrastructure/new_issue< > https://pagure.io/fedora-infrastructure/new_issue>< > https://pagure.io/fedora-infrastructure/new_issue< > https://pagure.io/fedora-infrastructure/new_issue>> > -- > _______________________________________________ > FreeIPA-users mailing list -- freeipa-users@lists.fedorahosted.org > To unsubscribe send an email to freeipa-users-le...@lists.fedorahosted.org > Fedora Code of Conduct: > https://docs.fedoraproject.org/en-US/project/code-of-conduct/ > List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines > List Archives: > https://lists.fedorahosted.org/archives/list/freeipa-users@lists.fedorahosted.org > Do not reply to spam, report it: > https://pagure.io/fedora-infrastructure/new_issue >
-- _______________________________________________ FreeIPA-users mailing list -- freeipa-users@lists.fedorahosted.org To unsubscribe send an email to freeipa-users-le...@lists.fedorahosted.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedorahosted.org/archives/list/freeipa-users@lists.fedorahosted.org Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue