> -----Original Message-----
> From: Rob Crittenden [mailto:[email protected]]
> Sent: Wednesday, October 23, 2013 6:58 PM
> To: Thomson, Ryan; [email protected]
> Subject: Re: [Freeipa-users] Failure decoding Certificate Signing Request
>
> I think this still points to NSS not being initialized. The way we currently
> use
> NSS in the server is Apache fires things up using mod_nss, then because we
> are a child of Apache via mod_wsgi, we inherit the open NSS database in
> /etc/httpd/alias. This gives us the CA cert and the client cert we need in
> order to talk to dogtag.
>
> What I thought, and the excellent debugging above confirms, is that at some
> point the NSS database is being shut down. At some point we need to do
> some crypto and try to initialize it ourselves to no avail. We shouldn't ever
> need to do it in the server and thus don't have access to PINs and such
> because we don't need them. We do initialize things from time to time on
> the client side but we tend to do a database-less initialization
> (nss_init_nodb()).
>
> I'm not really sure what this tells us though. It would appear that SSL is
> working in Apache, because you are able to get far enough to make a
> request and have it fail. So the NSS database is still initialized in Apache,
> but
> for some reason the wsgi code doesn't seem to agree.
>
> Would it be possible for you to stop and restart Apache and run some simple
> IPA command like ipa user-show admin (and let me know if it succeeds)?
> Then send me the error_log?
>
> If you are in SELinux enforcing mode it would also be helpful to check for any
> AVCs. Maybe we simply can't access the database.
>
> thanks
>
> rob
I am able to stop/wait/start apache and then execute "ipa user-show admin"
successfully.
Relevant error log from /var/log/httpd/error_log:
[Mon Oct 07 18:36:51 2013] [error] ipa: DEBUG: WSGI wsgi_dispatch.__call__:
[Mon Oct 07 18:36:51 2013] [error] ipa: DEBUG: WSGI xmlserver.__call__:
[Mon Oct 07 18:36:51 2013] [error] ipa: DEBUG: Created connection context.ldap2
[Mon Oct 07 18:36:51 2013] [error] ipa: DEBUG: WSGI WSGIExecutioner.__call__:
[Mon Oct 07 18:36:51 2013] [error] ipa: DEBUG: raw: user_show(u'admin',
rights=False, all=False, raw=False, version=u'2.46')
[Mon Oct 07 18:36:51 2013] [error] ipa: DEBUG: user_show(u'admin',
rights=False, all=False, raw=False, version=u'2.46')
[Mon Oct 07 18:36:51 2013] [error] ipa: DEBUG: retrieving schema for
SchemaCache url=ldapi://%2fvar%2frun%2fslapd-FMRI-UBC-CA.socket
conn=<ldap.ldapobject.SimpleLDAPObject instance at 0x7f4db74f07e8>
[Mon Oct 07 18:36:52 2013] [error] ipa: DEBUG: get_memberof:
entry_dn=uid=admin,cn=users,cn=accounts,dc=fully,dc=qualified,dc=domain
memberof=[ipapython.dn.DN('cn=admins,cn=groups,cn=accounts,dc=fully,dc=qualified,dc=domain'),
ipapython.dn.DN('cn=replication
administrators,cn=privileges,cn=pbac,dc=fully,dc=qualified,dc=domain'),
ipapython.dn.DN('cn=add replication
agreements,cn=permissions,cn=pbac,dc=fully,dc=qualified,dc=domain'),
ipapython.dn.DN('cn=modify replication
agreements,cn=permissions,cn=pbac,dc=fully,dc=qualified,dc=domain'),
ipapython.dn.DN('cn=remove replication
agreements,cn=permissions,cn=pbac,dc=fully,dc=qualified,dc=domain'),
ipapython.dn.DN('cn=host
enrollment,cn=privileges,cn=pbac,dc=fully,dc=qualified,dc=domain'),
ipapython.dn.DN('cn=manage host
keytab,cn=permissions,cn=pbac,dc=fully,dc=qualified,dc=domain'),
ipapython.dn.DN('cn=enroll a
host,cn=permissions,cn=pbac,dc=fully,dc=qualified,dc=domain'),
ipapython.dn.DN('cn=add krbprincipalname to a host,cn=p!
ermissions,cn=pbac,dc=fully,dc=qualified,dc=domain'),
ipapython.dn.DN('cn=unlock user
accounts,cn=permissions,cn=pbac,dc=fully,dc=qualified,dc=domain'),
ipapython.dn.DN('cn=manage service
keytab,cn=permissions,cn=pbac,dc=fully,dc=qualified,dc=domain'),
ipapython.dn.DN('cn=trust
admins,cn=groups,cn=accounts,dc=fully,dc=qualified,dc=domain')]
[Mon Oct 07 18:36:52 2013] [error] ipa: DEBUG: get_memberof: result
direct=[ipapython.dn.DN('cn=admins,cn=groups,cn=accounts,dc=fully,dc=qualified,dc=domain'),
ipapython.dn.DN('cn=trust
admins,cn=groups,cn=accounts,dc=fully,dc=qualified,dc=domain')]
indirect=[ipapython.dn.DN('cn=replication
administrators,cn=privileges,cn=pbac,dc=fully,dc=qualified,dc=domain'),
ipapython.dn.DN('cn=add replication
agreements,cn=permissions,cn=pbac,dc=fully,dc=qualified,dc=domain'),
ipapython.dn.DN('cn=modify replication
agreements,cn=permissions,cn=pbac,dc=fully,dc=qualified,dc=domain'),
ipapython.dn.DN('cn=remove replication
agreements,cn=permissions,cn=pbac,dc=fully,dc=qualified,dc=domain'),
ipapython.dn.DN('cn=host
enrollment,cn=privileges,cn=pbac,dc=fully,dc=qualified,dc=domain'),
ipapython.dn.DN('cn=manage host
keytab,cn=permissions,cn=pbac,dc=fully,dc=qualified,dc=domain'),
ipapython.dn.DN('cn=enroll a
host,cn=permissions,cn=pbac,dc=fully,dc=qualified,dc=domain'),
ipapython.dn.DN('cn=ad!
d krbprincipalname to a
host,cn=permissions,cn=pbac,dc=fully,dc=qualified,dc=domain'),
ipapython.dn.DN('cn=unlock user
accounts,cn=permissions,cn=pbac,dc=fully,dc=qualified,dc=domain'),
ipapython.dn.DN('cn=manage service
keytab,cn=permissions,cn=pbac,dc=fully,dc=qualified,dc=domain')]
[Mon Oct 07 18:36:52 2013] [error] ipa: INFO: [email protected]:
user_show(u'admin', rights=False, all=False, raw=False, version=u'2.46'):
SUCCESS
[Mon Oct 07 18:36:52 2013] [error] ipa: DEBUG: response: entries returned 1
[Mon Oct 07 18:36:52 2013] [error] ipa: DEBUG: no session id in request,
generating empty session data with id=47992da2d1630a11bc106cc6390147e8
[Mon Oct 07 18:36:52 2013] [error] ipa: DEBUG: store session:
session_id=47992da2d1630a11bc106cc6390147e8 start_timestamp=2013-10-07T18:36:52
access_timestamp=2013-10-07T18:36:52 expiration_timestamp=1969-12-31T16:00:00
[Mon Oct 07 18:36:52 2013] [error] ipa: DEBUG: finalize_kerberos_acquisition:
xmlserver ccache_name="FILE:/tmp/krb5cc_apache_mFOaRq"
session_id="47992da2d1630a11bc106cc6390147e8"
[Mon Oct 07 18:36:52 2013] [error] ipa: DEBUG: reading ccache data from file
"/tmp/krb5cc_apache_mFOaRq"
[Mon Oct 07 18:36:52 2013] [error] ipa: DEBUG: get_credential_times:
principal=HTTP/[email protected],
authtime=10/07/13 18:36:21, starttime=10/07/13 18:36:51, endtime=10/08/13
18:36:19, renew_till=12/31/69 16:00:00
[Mon Oct 07 18:36:52 2013] [error] ipa: DEBUG: KRB5_CCache
FILE:/tmp/krb5cc_apache_mFOaRq endtime=1381282579 (10/08/13 18:36:19)
[Mon Oct 07 18:36:52 2013] [error] ipa: DEBUG: set_session_expiration_time:
duration_type=inactivity_timeout duration=1200 max_age=1381282279
expiration=1381197412.49 (2013-10-07T18:56:52)
[Mon Oct 07 18:36:52 2013] [error] ipa: DEBUG: store session:
session_id=47992da2d1630a11bc106cc6390147e8 start_timestamp=2013-10-07T18:36:52
access_timestamp=2013-10-07T18:36:52 expiration_timestamp=2013-10-07T18:56:52
[Mon Oct 07 18:36:52 2013] [error] ipa: DEBUG: Destroyed connection
context.ldap2
And the command output with debugging on:
root@HOSTNAME:~
# date
Mon Oct 7 18:36:43 PDT 2013
root@HOSTNAME:~
# klist
Ticket cache: FILE:/tmp/krb5cc_0
Default principal: [email protected]
Valid starting Expires Service principal
10/07/13 18:36:21 10/08/13 18:36:19
krbtgt/[email protected]
root@HOSTNAME:~
# ipa user-show admin
ipa: DEBUG: importing all plugin modules in
'/usr/lib/python2.6/site-packages/ipalib/plugins'...
ipa: DEBUG: importing plugin module
'/usr/lib/python2.6/site-packages/ipalib/plugins/aci.py'
ipa: DEBUG: importing plugin module
'/usr/lib/python2.6/site-packages/ipalib/plugins/automember.py'
ipa: DEBUG: importing plugin module
'/usr/lib/python2.6/site-packages/ipalib/plugins/automount.py'
ipa: DEBUG: importing plugin module
'/usr/lib/python2.6/site-packages/ipalib/plugins/baseldap.py'
ipa: DEBUG: importing plugin module
'/usr/lib/python2.6/site-packages/ipalib/plugins/batch.py'
ipa: DEBUG: importing plugin module
'/usr/lib/python2.6/site-packages/ipalib/plugins/cert.py'
ipa: DEBUG: importing plugin module
'/usr/lib/python2.6/site-packages/ipalib/plugins/config.py'
ipa: DEBUG: importing plugin module
'/usr/lib/python2.6/site-packages/ipalib/plugins/delegation.py'
ipa: DEBUG: importing plugin module
'/usr/lib/python2.6/site-packages/ipalib/plugins/dns.py'
ipa: DEBUG: importing plugin module
'/usr/lib/python2.6/site-packages/ipalib/plugins/group.py'
ipa: DEBUG: importing plugin module
'/usr/lib/python2.6/site-packages/ipalib/plugins/hbacrule.py'
ipa: DEBUG: importing plugin module
'/usr/lib/python2.6/site-packages/ipalib/plugins/hbacsvc.py'
ipa: DEBUG: importing plugin module
'/usr/lib/python2.6/site-packages/ipalib/plugins/hbacsvcgroup.py'
ipa: DEBUG: importing plugin module
'/usr/lib/python2.6/site-packages/ipalib/plugins/hbactest.py'
ipa: DEBUG: importing plugin module
'/usr/lib/python2.6/site-packages/ipalib/plugins/host.py'
ipa: DEBUG: importing plugin module
'/usr/lib/python2.6/site-packages/ipalib/plugins/hostgroup.py'
ipa: DEBUG: importing plugin module
'/usr/lib/python2.6/site-packages/ipalib/plugins/idrange.py'
ipa: DEBUG: importing plugin module
'/usr/lib/python2.6/site-packages/ipalib/plugins/internal.py'
ipa: DEBUG: importing plugin module
'/usr/lib/python2.6/site-packages/ipalib/plugins/kerberos.py'
ipa: DEBUG: importing plugin module
'/usr/lib/python2.6/site-packages/ipalib/plugins/krbtpolicy.py'
ipa: DEBUG: importing plugin module
'/usr/lib/python2.6/site-packages/ipalib/plugins/migration.py'
ipa: DEBUG: importing plugin module
'/usr/lib/python2.6/site-packages/ipalib/plugins/misc.py'
ipa: DEBUG: importing plugin module
'/usr/lib/python2.6/site-packages/ipalib/plugins/netgroup.py'
ipa: DEBUG: importing plugin module
'/usr/lib/python2.6/site-packages/ipalib/plugins/passwd.py'
ipa: DEBUG: importing plugin module
'/usr/lib/python2.6/site-packages/ipalib/plugins/permission.py'
ipa: DEBUG: importing plugin module
'/usr/lib/python2.6/site-packages/ipalib/plugins/ping.py'
ipa: DEBUG: importing plugin module
'/usr/lib/python2.6/site-packages/ipalib/plugins/privilege.py'
ipa: DEBUG: importing plugin module
'/usr/lib/python2.6/site-packages/ipalib/plugins/pwpolicy.py'
ipa: DEBUG: args=klist -V
ipa: DEBUG: stdout=Kerberos 5 version 1.10.3
ipa: DEBUG: stderr=
ipa: DEBUG: importing plugin module
'/usr/lib/python2.6/site-packages/ipalib/plugins/role.py'
ipa: DEBUG: importing plugin module
'/usr/lib/python2.6/site-packages/ipalib/plugins/selfservice.py'
ipa: DEBUG: importing plugin module
'/usr/lib/python2.6/site-packages/ipalib/plugins/selinuxusermap.py'
ipa: DEBUG: importing plugin module
'/usr/lib/python2.6/site-packages/ipalib/plugins/service.py'
ipa: DEBUG: importing plugin module
'/usr/lib/python2.6/site-packages/ipalib/plugins/sudocmd.py'
ipa: DEBUG: importing plugin module
'/usr/lib/python2.6/site-packages/ipalib/plugins/sudocmdgroup.py'
ipa: DEBUG: importing plugin module
'/usr/lib/python2.6/site-packages/ipalib/plugins/sudorule.py'
ipa: DEBUG: importing plugin module
'/usr/lib/python2.6/site-packages/ipalib/plugins/trust.py'
ipa: DEBUG: importing plugin module
'/usr/lib/python2.6/site-packages/ipalib/plugins/user.py'
ipa: DEBUG: importing plugin module
'/usr/lib/python2.6/site-packages/ipalib/plugins/virtual.py'
ipa: DEBUG: importing plugin module
'/usr/lib/python2.6/site-packages/ipalib/plugins/xmlclient.py'
ipa: DEBUG: args=keyctl search @s user
ipa_session_cookie:[email protected]
ipa: DEBUG: stdout=311493198
ipa: DEBUG: stderr=
ipa: DEBUG: args=keyctl pipe 311493198
ipa: DEBUG: stdout=ipa_session=0b5649ff40d800567f75f34aef2cce11;
Domain=HOSTNAME.FULLY.QUALIFIED.DOMAIN; Path=/ipa; Expires=Mon, 07 Oct 2013
04:29:31 GMT; Secure; HttpOnly
ipa: DEBUG: stderr=
ipa: DEBUG: found session_cookie in persistent storage for principal
'[email protected]', cookie:
'ipa_session=0b5649ff40d800567f75f34aef2cce11;
Domain=HOSTNAME.FULLY.QUALIFIED.DOMAIN; Path=/ipa; Expires=Mon, 07 Oct 2013
04:29:31 GMT; Secure; HttpOnly'
ipa: DEBUG: deleting session data for principal '[email protected]':
cookie named 'ipa_session'; expired at Mon, 07 Oct 2013 04:29:31 GMT'
ipa: DEBUG: args=keyctl search @s user
ipa_session_cookie:[email protected]
ipa: DEBUG: stdout=311493198
ipa: DEBUG: stderr=
ipa: DEBUG: args=keyctl unlink 311493198 @s
ipa: DEBUG: stdout=
ipa: DEBUG: stderr=
ipa: INFO: trying https://HOSTNAME.FULLY.QUALIFIED.DOMAIN/ipa/xml
ipa: DEBUG: Created connection context.xmlclient
ipa: DEBUG: raw: user_show(u'admin', rights=False, all=False, raw=False,
version=u'2.46')
ipa: DEBUG: user_show(u'admin', rights=False, all=False, raw=False,
version=u'2.46')
ipa: INFO: Forwarding 'user_show' to server
u'https://HOSTNAME.FULLY.QUALIFIED.DOMAIN/ipa/xml'
ipa: DEBUG: NSSConnection init HOSTNAME.FULLY.QUALIFIED.DOMAIN
ipa: DEBUG: Connecting: 142.103.89.209:0
ipa: DEBUG: auth_certificate_callback: check_sig=True is_server=False
Data:
Version: 3 (0x2)
Serial Number: 22 (0x16)
Signature Algorithm:
Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: CN=Certificate Authority,O=FULLY.QUALIFIED.DOMAIN
Validity:
Not Before: Thu Apr 11 23:23:18 2013 UTC
Not After: Tue Oct 08 23:23:18 2013 UTC
Subject: CN=HOSTNAME.FULLY.QUALIFIED.DOMAIN,O=FULLY.QUALIFIED.DOMAIN
Subject Public Key Info:
Public Key Algorithm:
Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b0:b0:50:1f:e9:72:26:d5:dd:ff:70:ba:66:bb:a6:90:
bf:02:e9:7f:9b:73:10:9b:d9:a5:84:f7:34:c6:ed:03:
ca:48:11:5e:50:9d:19:9f:22:24:8a:17:35:69:d0:69:
0e:f7:a8:37:2d:46:11:98:5e:df:a8:2c:93:96:a7:66:
e4:3d:20:c1:72:e2:94:46:36:0b:84:44:2e:94:a9:98:
7a:da:1d:3a:f0:13:53:47:0d:b1:30:21:9d:55:a8:32:
09:be:c6:d3:98:2e:6c:a1:a1:34:02:9a:7f:df:ba:4b:
f1:c9:10:c4:0b:70:e7:08:de:98:24:c4:a6:d2:4a:e5:
0c:41:e7:f6:80:a5:7a:25:b7:8d:0e:b9:aa:b7:ff:4f:
cd:85:b5:3e:1c:e0:6f:83:e5:c1:86:ec:e0:6f:dd:f2:
3a:6b:60:ce:3f:63:46:9a:75:5e:e3:20:76:d3:36:53:
07:1f:34:77:a7:42:3e:58:0d:30:15:f6:47:e3:a2:d3:
46:b0:cf:62:1b:00:2a:28:18:39:5c:35:3b:ff:c6:7a:
c2:9d:08:75:17:92:d3:7f:58:6d:c8:bc:55:c3:6f:3e:
17:f7:55:bf:e6:3c:af:cc:8a:18:59:f1:46:50:07:36:
09:38:87:4b:38:67:44:f6:b6:bb:cf:f0:af:88:30:5f
Exponent:
65537 (0x10001)
Signed Extensions: (5)
Name: Certificate Authority Key Identifier
Critical: False
Key ID:
3a:41:f5:c1:b7:ff:bb:79:13:d1:23:92:61:16:fc:7d:
a7:d1:82:d2
Serial Number: None
General Names: [0 total]
Name: Authority Information Access
Critical: False
Name: Certificate Key Usage
Critical: True
Usages:
Digital Signature
Non-Repudiation
Key Encipherment
Data Encipherment
Name: Extended Key Usage
Critical: False
Usages:
TLS Web Server Authentication Certificate
Name: Certificate Subject Key ID
Critical: False
Data:
e0:56:1f:d5:73:7c:5f:7f:60:5e:d7:3c:88:43:8d:97:
b7:f5:fb:24
Signature:
Signature Algorithm:
Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
85:60:83:4c:d5:80:28:9c:ec:69:b0:26:7a:4f:fc:99:
e1:4e:3d:78:54:59:d7:46:b3:cf:fb:81:8e:16:67:18:
b4:c4:98:3f:16:54:05:ef:6e:79:5f:62:81:65:e3:a8:
e7:7b:68:12:25:1f:af:dc:bf:3a:f7:74:72:9d:1d:51:
ae:e8:12:73:4c:a8:19:ad:54:03:22:a6:c0:56:29:1a:
cc:70:81:5e:fb:38:c0:f7:16:d5:9b:34:2c:16:43:84:
b3:7f:bb:86:83:fd:9a:d7:f5:67:a8:f4:c3:33:58:5e:
89:7a:f6:9f:a8:d7:b6:f9:0b:47:d7:6e:46:53:32:63:
e6:da:23:54:89:bc:4f:12:16:6d:eb:d4:f0:55:08:46:
64:69:46:55:20:90:ab:61:c4:f2:b6:d5:50:b5:48:07:
c0:f9:da:8e:fb:dd:53:e6:9f:1f:4e:d9:ec:af:a6:ad:
75:76:75:e4:b7:b3:ad:56:52:66:f4:9b:71:0d:b1:92:
a1:fc:16:c7:66:41:dd:b4:2f:df:34:ed:ad:29:26:40:
4f:85:a5:98:2c:9b:f0:18:42:3d:97:aa:73:16:3b:ac:
48:a9:8c:af:77:b3:24:d0:0d:07:ff:11:79:a9:24:a8:
2a:08:bd:e1:84:e3:6a:6f:2c:8e:62:78:8e:86:95:73
Fingerprint (MD5):
27:7d:ec:86:4f:07:65:9f:27:1e:eb:c4:af:9b:b0:b1
Fingerprint (SHA1):
df:60:7a:1b:54:22:bd:f2:2c:ea:ee:51:17:23:ae:2d:
f2:57:69:88
ipa: DEBUG: approved_usage = SSLServer intended_usage = SSLServer
ipa: DEBUG: cert valid True for
"CN=HOSTNAME.FULLY.QUALIFIED.DOMAIN,O=FULLY.QUALIFIED.DOMAIN"
ipa: DEBUG: handshake complete, peer = 142.103.89.209:443
ipa: DEBUG: received Set-Cookie 'ipa_session=47992da2d1630a11bc106cc6390147e8;
Domain=HOSTNAME.FULLY.QUALIFIED.DOMAIN; Path=/ipa; Expires=Tue, 08 Oct 2013
01:56:52 GMT; Secure; HttpOnly'
ipa: DEBUG: storing cookie 'ipa_session=47992da2d1630a11bc106cc6390147e8;
Domain=HOSTNAME.FULLY.QUALIFIED.DOMAIN; Path=/ipa; Expires=Tue, 08 Oct 2013
01:56:52 GMT; Secure; HttpOnly' for principal [email protected]
ipa: DEBUG: args=keyctl search @s user
ipa_session_cookie:[email protected]
ipa: DEBUG: stdout=
ipa: DEBUG: stderr=keyctl_search: Required key not available
ipa: DEBUG: args=keyctl search @s user
ipa_session_cookie:[email protected]
ipa: DEBUG: stdout=
ipa: DEBUG: stderr=keyctl_search: Required key not available
ipa: DEBUG: args=keyctl padd user
ipa_session_cookie:[email protected] @s
ipa: DEBUG: stdout=655885819
ipa: DEBUG: stderr=
ipa: DEBUG: Destroyed connection context.xmlclient
User login: admin
Last name: Administrator
Home directory: /home/admin
Login shell: /bin/bash
UID: 1615800000
GID: 1615800000
Account disabled: False
Password: True
Member of groups: admins, trust admins
Kerberos keys available: True
SELinux is currently in permissive mode:
root@HOSTNAME:~
# getenforce
Permissive
Thank you,
--Ryan
_______________________________________________
Freeipa-users mailing list
[email protected]
https://www.redhat.com/mailman/listinfo/freeipa-users