On Tue, 2013-07-23 at 13:23 +0000, Armstrong, Kenneth Lawrence wrote: On Mon, 2013-07-22 at 17:49 -0400, Rob Crittenden wrote:
Armstrong, Kenneth Lawrence wrote: > On Mon, 2013-07-22 at 17:51 +0000, Armstrong, Kenneth Lawrence wrote: >> On Mon, 2013-07-22 at 13:41 -0400, Rob Crittenden wrote: >>> Armstrong, Kenneth Lawrence wrote: >>> > Hi all, >>> > >>> > I have a RHEL 6 IdM test domain set up. In production, we have RHEL 5 >>> > and RHEL 4 clients as well, so I was going to test that out. >>> > >>> > However, I can not get a RHEL 5.9 client to join the domain. >>> > >>> > [root@r5-idmclient <mailto:root@r5-idmclient> ~]# ipa-client-install >>> > --server lnxrealmtest01.liberty.edu --domain lnxrealmtest.liberty.edu >>> > root : ERROR LDAP Error: Connect error: error:14090086:SSL >>> > routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed >>> > Failed to verify that lnxrealmtest01.liberty.edu is an IPA Server. >>> > This may mean that the remote server is not up or is not reachable >>> > due to network or firewall settings. >>> > Installation failed. Rolling back changes. >>> > IPA client is not configured on this system. >>> > >>> > >>> > Digging a little bit and I see that the ipa-client is an older version: >>> > >>> > ipa-client-2.1.3-5.el5_9.2 >>> > >>> > Doing a yum update/upgrade doesn't show a newer version. >>> > >>> > I was considering a manual installation, but the ipa-admintools don't >>> > appear to be available for RHEL 5.9? >>> > >>> > Is there a way to make this work? >>> >>> I'd first try removing /etc/ipa/ca.crt and try the enrollment again. It >>> should be possible to use the 2.1.3 client in EL 5 to enroll against a >>> 3.x server. >>> >>> Otherwise we probably need more context from >>> /var/log/ipaclient-install.log to see how the CA was retrieved. >>> >>> rob >>> >> >> Thanks for the tip. I tried it again, and it still failed. End of >> the log: >> >> [root@r5-idmclient <mailto:root@r5-idmclient> ~]# tail -20 >> /var/log/ipaclient-install.log >> lnxrealmtest.liberty.edu = LNXREALMTEST.LIBERTY.EDU >> >> >> 2013-07-22 13:45:36,982 DEBUG args=kinit >> ad...@lnxrealmtest.liberty.edu<mailto:ad...@lnxrealmtest.liberty.edu> >> <mailto:ad...@lnxrealmtest.liberty.edu> >> 2013-07-22 13:45:36,983 DEBUG stdout=Password for >> ad...@lnxrealmtest.liberty.edu<mailto:ad...@lnxrealmtest.liberty.edu> >> <mailto:ad...@lnxrealmtest.liberty.edu>: >> >> 2013-07-22 13:45:36,983 DEBUG stderr= >> 2013-07-22 13:45:36,983 DEBUG trying to retrieve CA cert via LDAP from >> ldap://lnxrealmtest01.liberty.edu >> 2013-07-22 13:45:37,181 INFO Successfully retrieved CA cert >> Subject: /O=LNXREALMTEST.LIBERTY.EDU/CN=Certificate Authority >> Issuer: /DC=edu/DC=liberty/CN=LUPKI01 >> >> 2013-07-22 13:45:37,344 DEBUG args=/usr/sbin/ipa-join -s >> lnxrealmtest01.liberty.edu -b dc=lnxrealmtest,dc=liberty,dc=edu >> 2013-07-22 13:45:37,345 DEBUG stdout= >> 2013-07-22 13:45:37,345 DEBUG stderr=libcurl failed to execute the >> HTTP POST transaction. SSL certificate problem, verify that the CA >> cert is OK. Details: >> error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate >> verify failed >> >> 2013-07-22 13:45:37,490 DEBUG args=kdestroy >> 2013-07-22 13:45:37,491 DEBUG stdout= >> 2013-07-22 13:45:37,491 DEBUG stderr= >> _______________________________________________ >> Freeipa-users mailing list >> Freeipa-users@redhat.com<mailto:Freeipa-users@redhat.com> >> <mailto:Freeipa-users@redhat.com> >> https://www.redhat.com/mailman/listinfo/freeipa-users > > I just stood up a brand new RHEL 6 client, and it works just fine, so > there is something amiss with RHEL 5 on this. The time on the RHEL 5 > client and the RHEL 6 IdM server is the same, and the cert is valid, so > I don't know why the RHEL 5 system does not like the cert. Could it be > something with the versions of packages installed on it? > > libipa_hbac-1.5.1-58.el5 > ipa-client-2.1.3-5.el5_9.2 > curl-7.15.5-17.el5_9 > openssl-0.9.8e-26.el5_9.1 I have the feeling that OpenSSL doesn't like your CA certificate for some reason. Can you try this: # openssl s_client -host lnxrealmtest01.liberty.edu -port 443 -CAfile /etc/ipa/ca.crt Adding the -debug flag will add even more output. rob [klarmstrong2@r6-idmclient<mailto:klarmstrong2@r6-idmclient> ~]$ sudo openssl s_client -host lnxrealmtest01.liberty.edu -port 443 -CAfile /etc/ipa/ca.crt [sudo] password for klarmstrong2: CONNECTED(00000003) depth=0 O = LNXREALMTEST.LIBERTY.EDU, CN = lnxrealmtest01.liberty.edu verify error:num=20:unable to get local issuer certificate verify return:1 depth=0 O = LNXREALMTEST.LIBERTY.EDU, CN = lnxrealmtest01.liberty.edu verify error:num=27:certificate not trusted verify return:1 depth=0 O = LNXREALMTEST.LIBERTY.EDU, CN = lnxrealmtest01.liberty.edu verify error:num=21:unable to verify the first certificate verify return:1 --- Certificate chain 0 s:/O=LNXREALMTEST.LIBERTY.EDU/CN=lnxrealmtest01.liberty.edu i:/O=LNXREALMTEST.LIBERTY.EDU/CN=Certificate Authority 1 s:/O=LNXREALMTEST.LIBERTY.EDU/CN=Certificate Authority i:/DC=edu/DC=liberty/CN=LUPKI01 --- Server certificate -----BEGIN CERTIFICATE----- ... -----END CERTIFICATE----- subject=/O=LNXREALMTEST.LIBERTY.EDU/CN=lnxrealmtest01.liberty.edu issuer=/O=LNXREALMTEST.LIBERTY.EDU/CN=Certificate Authority --- No client certificate CA names sent --- SSL handshake has read 2629 bytes and written 462 bytes --- New, TLSv1/SSLv3, Cipher is AES256-SHA Server public key is 2048 bit Secure Renegotiation IS supported Compression: NONE Expansion: NONE SSL-Session: Protocol : TLSv1 Cipher : AES256-SHA Session-ID: 0D52FB7937A013C4F0F26E77B24A6133DB3B6D760BD1C65F0010A326A195FDEE Session-ID-ctx: Master-Key: ... Key-Arg : None Krb5 Principal: None PSK identity: None PSK identity hint: None Start Time: 1374585629 Timeout : 300 (sec) Verify return code: 21 (unable to verify the first certificate) So it doesn't like it, yet I can still add a RHEL 6 client? Is there more stringent checking with the version of OpenSSL in RHEL 5? -Kenny _______________________________________________ Freeipa-users mailing list Freeipa-users@redhat.com<mailto:Freeipa-users@redhat.com> https://www.redhat.com/mailman/listinfo/freeipa-users Ok, I am having troubles making sense of this. First, I checked the CA cert chain that I downloaded from our PKI server to see if it's cool: [root@lnxrealmtest01<mailto:root@lnxrealmtest01> ~]# openssl s_client -host lupki01.liberty.edu -port 443 -CAfile /root/CACert.cer CONNECTED(00000003) depth=2 C = US, O = GTE Corporation, OU = "GTE CyberTrust Solutions, Inc.", CN = GTE CyberTrust Global Root verify return:1 depth=1 DC = edu, DC = liberty, CN = LUPKI01 verify return:1 depth=0 C = US, ST = VA, L = Lynchburg, O = Liberty University, OU = Microsoft Team, CN = lupki01.liberty.edu verify return:1 --- Certificate chain 0 s:/C=US/ST=VA/L=Lynchburg/O=Liberty University/OU=Microsoft Team/CN=lupki01.liberty.edu i:/DC=edu/DC=liberty/CN=LUPKI01 1 s:/DC=edu/DC=liberty/CN=LUPKI01 i:/C=US/O=GTE Corporation/OU=GTE CyberTrust Solutions, Inc./CN=GTE CyberTrust Global Root --- Server certificate -----BEGIN CERTIFICATE----- ... -----END CERTIFICATE----- subject=/C=US/ST=VA/L=Lynchburg/O=Liberty University/OU=Microsoft Team/CN=lupki01.liberty.edu issuer=/DC=edu/DC=liberty/CN=LUPKI01 --- No client certificate CA names sent --- SSL handshake has read 2990 bytes and written 438 bytes --- New, TLSv1/SSLv3, Cipher is AES128-SHA Server public key is 2048 bit Secure Renegotiation IS supported Compression: NONE Expansion: NONE SSL-Session: Protocol : TLSv1 Cipher : AES128-SHA Session-ID: A917000003331BFAE02105066148E731DC3585E81DAD9AA18F9D0AAC71F4E0B1 Session-ID-ctx: Master-Key: ... Key-Arg : None Krb5 Principal: None PSK identity: None PSK identity hint: None Start Time: 1374598158 Timeout : 300 (sec) Verify return code: 0 (ok) --- ^C [root@lnxrealmtest01<mailto:root@lnxrealmtest01> ~]# ls anaconda-ks.cfg ca-agent.p12 CACert.cer cacert.p12 CACert.p7b install.log install.log.syslog ipa.cer ipa.csr [root@lnxrealmtest01<mailto:root@lnxrealmtest01> ~]# openssl s_client -host lupki01.liberty.edu -port 443 -CAfile /root/ipa.cer CONNECTED(00000003) depth=2 C = US, O = GTE Corporation, OU = "GTE CyberTrust Solutions, Inc.", CN = GTE CyberTrust Global Root verify return:1 depth=1 DC = edu, DC = liberty, CN = LUPKI01 verify return:1 depth=0 C = US, ST = VA, L = Lynchburg, O = Liberty University, OU = Microsoft Team, CN = lupki01.liberty.edu verify return:1 --- Certificate chain 0 s:/C=US/ST=VA/L=Lynchburg/O=Liberty University/OU=Microsoft Team/CN=lupki01.liberty.edu i:/DC=edu/DC=liberty/CN=LUPKI01 1 s:/DC=edu/DC=liberty/CN=LUPKI01 i:/C=US/O=GTE Corporation/OU=GTE CyberTrust Solutions, Inc./CN=GTE CyberTrust Global Root --- Server certificate -----BEGIN CERTIFICATE----- ... -----END CERTIFICATE----- subject=/C=US/ST=VA/L=Lynchburg/O=Liberty University/OU=Microsoft Team/CN=lupki01.liberty.edu issuer=/DC=edu/DC=liberty/CN=LUPKI01 --- No client certificate CA names sent --- SSL handshake has read 2990 bytes and written 438 bytes --- New, TLSv1/SSLv3, Cipher is AES128-SHA Server public key is 2048 bit Secure Renegotiation IS supported Compression: NONE Expansion: NONE SSL-Session: Protocol : TLSv1 Cipher : AES128-SHA Session-ID: 4F0B000037034E3D42400ACC911678D620D40CAB231E403B888A449C2A95F6CA Session-ID-ctx: Master-Key: ... Key-Arg : None Krb5 Principal: None PSK identity: None PSK identity hint: None Start Time: 1374598365 Timeout : 300 (sec) Verify return code: 0 (ok) --- Next, I check the cert that was issued by our local CA: [root@lnxrealmtest01<mailto:root@lnxrealmtest01> ~]# openssl s_client -host lupki01.liberty.edu -port 443 -CAfile /root/ipa.cer CONNECTED(00000003) depth=2 C = US, O = GTE Corporation, OU = "GTE CyberTrust Solutions, Inc.", CN = GTE CyberTrust Global Root verify return:1 depth=1 DC = edu, DC = liberty, CN = LUPKI01 verify return:1 depth=0 C = US, ST = VA, L = Lynchburg, O = Liberty University, OU = Microsoft Team, CN = lupki01.liberty.edu verify return:1 --- Certificate chain 0 s:/C=US/ST=VA/L=Lynchburg/O=Liberty University/OU=Microsoft Team/CN=lupki01.liberty.edu i:/DC=edu/DC=liberty/CN=LUPKI01 1 s:/DC=edu/DC=liberty/CN=LUPKI01 i:/C=US/O=GTE Corporation/OU=GTE CyberTrust Solutions, Inc./CN=GTE CyberTrust Global Root --- Server certificate -----BEGIN CERTIFICATE----- ... -----END CERTIFICATE----- subject=/C=US/ST=VA/L=Lynchburg/O=Liberty University/OU=Microsoft Team/CN=lupki01.liberty.edu issuer=/DC=edu/DC=liberty/CN=LUPKI01 --- No client certificate CA names sent --- SSL handshake has read 2990 bytes and written 438 bytes --- New, TLSv1/SSLv3, Cipher is AES128-SHA Server public key is 2048 bit Secure Renegotiation IS supported Compression: NONE Expansion: NONE SSL-Session: Protocol : TLSv1 Cipher : AES128-SHA Session-ID: 4F0B000037034E3D42400ACC911678D620D40CAB231E403B888A449C2A95F6CA Session-ID-ctx: Master-Key: ... Key-Arg : None Krb5 Principal: None PSK identity: None PSK identity hint: None Start Time: 1374598365 Timeout : 300 (sec) Verify return code: 0 (ok) --- So all that looks good, but I check the certificate against the IPA server, and it fails: [root@lnxrealmtest01<mailto:root@lnxrealmtest01> ~]# openssl s_client -host lnxrealmtest01.liberty.edu -port 443 -CAfile /root/CACert.cer CONNECTED(00000003) depth=0 O = LNXREALMTEST.LIBERTY.EDU, CN = lnxrealmtest01.liberty.edu verify error:num=20:unable to get local issuer certificate verify return:1 depth=0 O = LNXREALMTEST.LIBERTY.EDU, CN = lnxrealmtest01.liberty.edu verify error:num=27:certificate not trusted verify return:1 depth=0 O = LNXREALMTEST.LIBERTY.EDU, CN = lnxrealmtest01.liberty.edu verify error:num=21:unable to verify the first certificate verify return:1 --- Certificate chain 0 s:/O=LNXREALMTEST.LIBERTY.EDU/CN=lnxrealmtest01.liberty.edu i:/O=LNXREALMTEST.LIBERTY.EDU/CN=Certificate Authority 1 s:/O=LNXREALMTEST.LIBERTY.EDU/CN=Certificate Authority i:/DC=edu/DC=liberty/CN=LUPKI01 --- Server certificate -----BEGIN CERTIFICATE----- ... -----END CERTIFICATE----- subject=/O=LNXREALMTEST.LIBERTY.EDU/CN=lnxrealmtest01.liberty.edu issuer=/O=LNXREALMTEST.LIBERTY.EDU/CN=Certificate Authority --- No client certificate CA names sent --- SSL handshake has read 2629 bytes and written 462 bytes --- New, TLSv1/SSLv3, Cipher is AES256-SHA Server public key is 2048 bit Secure Renegotiation IS supported Compression: NONE Expansion: NONE SSL-Session: Protocol : TLSv1 Cipher : AES256-SHA Session-ID: 0D58B89B946578D2883CE2F306E66E5D638B152A96360C8BC69F7BB7A38F430D Session-ID-ctx: Master-Key: ... Key-Arg : None Krb5 Principal: None PSK identity: None PSK identity hint: None Start Time: 1374598420 Timeout : 300 (sec) Verify return code: 21 (unable to verify the first certificate) --- So I get it that it would fail against the IPA server, since it didn't issue it. But what I don't understand is that if the certificate is inherently ok, then why does it fail when I try to install the RHEL 5 client? -Kenny
_______________________________________________ Freeipa-users mailing list Freeipa-users@redhat.com https://www.redhat.com/mailman/listinfo/freeipa-users