OK, I found the generated zoe file in /tmp and it looks sane.
Should I add those lines of config to our DNS servers?

On Mon, Dec 8, 2014 at 2:10 PM, Matthew Herzog <matthew.her...@gmail.com>
wrote:

> Here are some errors I'm seeing on the client.
>
> tail -f sssd_lnx.e-bozo.com.log
> (Mon Dec  8 14:03:20 2014) [sssd[be[lnx.e-bozo.com]]] [sbus_dispatch]
> (0x4000): dbus conn: 0x1e72ad0
> (Mon Dec  8 14:03:20 2014) [sssd[be[lnx.e-bozo.com]]] [sbus_dispatch]
> (0x4000): Dispatching.
> (Mon Dec  8 14:03:20 2014) [sssd[be[lnx.e-bozo.com]]]
> [sbus_message_handler] (0x4000): Received SBUS method [ping]
> (Mon Dec  8 14:03:20 2014) [sssd[be[lnx.e-bozo.com]]]
> [sbus_get_sender_id_send] (0x2000): Not a sysbus message, quit
> (Mon Dec  8 14:03:20 2014) [sssd[be[lnx.e-bozo.com]]]
> [sbus_handler_got_caller_id] (0x4000): Received SBUS method [ping]
> (Mon Dec  8 14:03:30 2014) [sssd[be[lnx.e-bozo.com]]] [sbus_dispatch]
> (0x4000): dbus conn: 0x1e72ad0
> (Mon Dec  8 14:03:30 2014) [sssd[be[lnx.e-bozo.com]]] [sbus_dispatch]
> (0x4000): Dispatching.
> (Mon Dec  8 14:03:30 2014) [sssd[be[lnx.e-bozo.com]]]
> [sbus_message_handler] (0x4000): Received SBUS method [ping]
> (Mon Dec  8 14:03:30 2014) [sssd[be[lnx.e-bozo.com]]]
> [sbus_get_sender_id_send] (0x2000): Not a sysbus message, quit
> (Mon Dec  8 14:03:30 2014) [sssd[be[lnx.e-bozo.com]]]
> [sbus_handler_got_caller_id] (0x4000): Received SBUS method [ping]
> (Mon Dec  8 14:03:40 2014) [sssd[be[lnx.e-bozo.com]]] [sbus_dispatch]
> (0x4000): dbus conn: 0x1e72ad0
> (Mon Dec  8 14:03:40 2014) [sssd[be[lnx.e-bozo.com]]] [sbus_dispatch]
> (0x4000): Dispatching.
>
> [root@freeipa-poc-client02 sssd]# tail -f sssd_ssh.log
> (Sun Dec  7 19:32:09 2014) [sssd[ssh]] [ssh_process_init] (0x0010):
> sss_process_init() failed
> (Sun Dec  7 19:32:09 2014) [sssd[ssh]] [sss_dp_init] (0x0010): Failed to
> connect to monitor services.
> (Sun Dec  7 19:32:09 2014) [sssd[ssh]] [sss_process_init] (0x0010): fatal
> error setting up backend connector
> (Sun Dec  7 19:32:09 2014) [sssd[ssh]] [ssh_process_init] (0x0010):
> sss_process_init() failed
> (Sun Dec  7 19:32:16 2014) [sssd[ssh]] [sss_dp_init] (0x0010): Failed to
> connect to monitor services.
> (Sun Dec  7 19:32:16 2014) [sssd[ssh]] [sss_process_init] (0x0010): fatal
> error setting up backend connector
> (Sun Dec  7 19:32:16 2014) [sssd[ssh]] [ssh_process_init] (0x0010):
> sss_process_init() failed
> (Sun Dec  7 19:32:16 2014) [sssd[ssh]] [sss_dp_init] (0x0010): Failed to
> connect to monitor services.
> (Sun Dec  7 19:32:16 2014) [sssd[ssh]] [sss_process_init] (0x0010): fatal
> error setting up backend connector
> (Sun Dec  7 19:32:16 2014) [sssd[ssh]] [ssh_process_init] (0x0010):
> sss_process_init() failed
>
>
> On Mon, Dec 8, 2014 at 11:48 AM, Matthew Herzog <matthew.her...@gmail.com>
> wrote:
>
>> I have never seen my IPA servers produce a zone file nor has the install
>> script ever mentioned the creation of such. In fact, I just ran
>> ipa-server-install --uninstall && ipa-server-install and there was no
>> mention of a zone file.
>>
>> Where should I look in the file system to be sure? I see nothing in
>> /var/named. I'm using 3.3.3 IPA on Oracle Linux from Oracle's yum repo.
>> (Not my choice.)
>>
>> dsee7 is *not *running Kerberos. dsee7 is *not *configured with SRV
>> records. I guess I'll need to add SRV records for all my Linux hosts.
>>
>>
>>
>>
>>
>>
>> On Mon, Dec 8, 2014 at 10:41 AM, Petr Spacek <pspa...@redhat.com> wrote:
>>
>>> On 8.12.2014 14:44, Matthew Herzog wrote:
>>> > Petr said, "You can run ipa-server-install *without* --setup-dns
>>> option and
>>> > at the end of
>>> > installation it will produce DNS records which you have to manually
>>> add to
>>> > your existing DNS database."
>>> >
>>> > I can't see how this would be useful or which machines I would need to
>>> add
>>> > to our DNS.
>>> >
>>> > Perhaps I should have explained that we are not going to set up a new
>>> DNS
>>> > domain for the ipa-managed servers.
>>> Good.
>>>
>>> Now you should run ipa-server-install *without* --setup-dns, using
>>> lnx.e-bozo.com as you IPA domain. It will install full IPA server and
>>> spit out
>>> DNS zone file.
>>>
>>> Then you *have to* take this zone file and import it to your existing DNS
>>> infrastructure - that will give you fully functional IPA domain
>>> lnx.e-bozo.com.
>>>
>>> Caveat:
>>> Preceding text assumes that 'dsee7' is nor using either Kerberos nor DNS
>>> SRV
>>> records for LDAP service in domain lnx.e-bozo.com, i.e. clients
>>> connecting to
>>> DSEE7 should be (most likely) statically configured with DSEE7 server
>>> name.
>>>
>>> Petr^2 Spacek
>>>
>>> > We have an Oracle dsee7 server doing
>>> > LDAP for our Linux servers and accounts. We want to migrate to IPA so
>>> we
>>> > don't have to maintain a Linux/LDAP account for every user who needs
>>> access
>>> > to Linux servers. All of our users start with an account in AD and
>>> since
>>> > none of my predecessors knew about Winbind, they set up dsee7.
>>> >
>>> > So I'm thinking we'll need to import all our dsee7 accounts AND make it
>>> > possible for AD users to access the Linux systems without needing to
>>> create
>>> > them in IPA.
>>> >
>>> > On Mon, Dec 8, 2014 at 2:56 AM, Petr Spacek <pspa...@redhat.com>
>>> wrote:
>>> >
>>> >> On 8.12.2014 05:02, Dmitri Pal wrote:
>>> >>> On 12/07/2014 10:10 PM, Matthew Herzog wrote:
>>> >>>> So should the FreeIPA server be authoritative for the Kerb.
>>> realm/DNS
>>> >> domain
>>> >>>> or can it/should it be a slave DNS server instead? Or caching only?
>>> >>>
>>> >>> IPA DNS can't be a slave so you either delegate a whole zone to it or
>>> >> manage
>>> >>> IPA DNS domain via your own DNS server.
>>> >>
>>> >> Generally, "slave" is not allowed to do any changes so it is useless
>>> in
>>> >> your
>>> >> scenario.
>>> >>
>>> >> You can run ipa-server-install *without* --setup-dns option and at
>>> the end
>>> >> of
>>> >> installation it will produce DNS records which you have to manually
>>> add to
>>> >> your existing DNS database.
>>> >>
>>> >> Did you try that?
>>> >>
>>> >> Petr^2 Spacek
>>> >>
>>> >>>> On Sun, Dec 7, 2014 at 9:57 PM, Dmitri Pal <d...@redhat.com
>>> >>>> <mailto:d...@redhat.com>> wrote:
>>> >>>>
>>> >>>>     On 12/07/2014 09:51 PM, Matthew Herzog wrote:
>>> >>>>>     What must be done in or on the ipa server with regard to DNS,
>>> if
>>> >>>>>     anything?
>>> >>>>>
>>> >>>>>     Our DNS works. It works well. We have four Linux DNS servers
>>> and
>>> >>>>>     two AD domain controllers that also do DNS.
>>> >>>>>
>>> >>>>>     So if we already have DNS working well in our domain, why do we
>>> >>>>>     want to manage DNS in IPA?
>>> >>>>
>>> >>>>     Let us keep the discussion on the list.
>>> >>>>     IPA when used with AD trust presents itself as a separate
>>> forest.
>>> >>>>     AD thinks that it is working with another AD forest.
>>> >>>>     For that to work we need to follow MSFT rules about relationship
>>> >>>>     between Kerberos realm and DNS domain.
>>> >>>>     AD assumes that for every trusted forest Kerberos realm = DNS
>>> >>>>     domain. IPA makes it easy to do because it has integrated tools
>>> to
>>> >>>>     manage IPA DNS domain.
>>> >>>>     If you want to manage it yourself through your DNS you can do
>>> it,
>>> >>>>     just more manual operations for you.
>>> >>>>
>>> >>>>     HTH
>>> >>>>
>>> >>>>     Thanks
>>> >>>>     Dmitri
>>> >>>>
>>> >>>>
>>> >>>>>
>>> >>>>>     On Sun, Dec 7, 2014 at 9:44 PM, Dmitri Pal <d...@redhat.com
>>> >>>>>     <mailto:d...@redhat.com>> wrote:
>>> >>>>>
>>> >>>>>         On 12/07/2014 06:44 PM, Matthew Herzog wrote:
>>> >>>>>>         Thanks guys. I'm sorry for my delay in responding.
>>> >>>>>>
>>> >>>>>>         Firstly, I was under the impression (from reading the
>>> docs)
>>> >>>>>>         that having named running on IPA server was critical.
>>> >>>>>
>>> >>>>>         Properly configured DNS is critical.
>>> >>>>>         How you accomplish it is up to you.
>>> >>>>>         IPA allows you to have a DNS server that would simplify DNS
>>> >>>>>         management but it can be done manually too. This is why DNS
>>> >>>>>         is optional.
>>> >>>>>
>>> >>>>>
>>> >>>>>>         Also, the first question the ipa-server-install script
>>> asks
>>> >>>>>>         is, "Do you want to configure integrated DNS (BIND)? ."
>>> >>>>>>         While it's true the default answer is no, it leads one to
>>> >>>>>>         believe that DNS is central to IPA. Also the
>>> >>>>>>         ipa-client-install script says,
>>> >>>>>>
>>> >>>>>>         [root@freeipa-poc-client02 ~]# ipa-client-install
>>> >>>>>>         DNS discovery failed to determine your DNS domain
>>> >>>>>>         Provide the domain name of your IPA server (ex:
>>> example.com
>>> >>>>>>         <http://example.com>):
>>> >>>>>>
>>> >>>>>>         I can resolve -anything- from the machine using dig or
>>> >> whatever.
>>> >>>>>>
>>> >>>>>>         Ultimately, the reason I started to be concerned about my
>>> >>>>>>         IPA server's DNS config was because I was not able to
>>> >>>>>>         authenticate AD accounts to a client machine. I saw a
>>> bunch
>>> >>>>>>         of errors in the client's sssd logs which of course I
>>> can't
>>> >>>>>>         find now.
>>> >>>>>>
>>> >>>>>>         Perhaps it was these . . .
>>> >>>>>>
>>> >>>>>>         (Thu Dec  4 13:45:23 2014) [sssd] [ping_check] (0x0100):
>>> >>>>>>         Service nss replied to ping
>>> >>>>>>         (Thu Dec  4 13:45:23 2014) [sssd] [ping_check] (0x0100):
>>> >>>>>>         Service sudo replied to ping
>>> >>>>>>         (Thu Dec  4 13:45:23 2014) [sssd] [ping_check] (0x0100):
>>> >>>>>>         Service pam replied to ping
>>> >>>>>>         (Thu Dec  4 13:45:23 2014) [sssd] [ping_check] (0x0100):
>>> >>>>>>         Service ssh replied to ping
>>> >>>>>>         (Thu Dec  4 13:45:23 2014) [sssd] [ping_check] (0x0100):
>>> >>>>>>         Service pac replied to ping
>>> >>>>>>         (Thu Dec  4 13:45:23 2014) [sssd] [ping_check] (0x0100):
>>> >>>>>>         Service bo3.e-bozo.com <http://bo3.e-bozo.com> replied to
>>> >> ping
>>> >>>>>>
>>> >>>>>>         I'm not allowed onto the AD domain controllers to examine
>>> >>>>>>         log files or I'd be checking those first.
>>> >>>>>>
>>> >>>>>>         So ultimately the goal is to authenticate AD users and
>>> users
>>> >>>>>>         that exist in our ldap schema. We need to set up groups of
>>> >>>>>>         users that can run sudo commands on specific groups of
>>> hosts.
>>> >>>>>
>>> >>>>>         Did you setup trusts as explained on the following page?
>>> >>>>>         http://www.freeipa.org/page/Howto/IPAv3_AD_trust_setup
>>> >>>>>
>>> >>>>>
>>> >>>>>>
>>> >>>>>>
>>> >>>>>>
>>> >>>>>>         On Wed, Dec 3, 2014 at 3:46 AM, Petr Spacek
>>> >>>>>>         <pspa...@redhat.com <mailto:pspa...@redhat.com>> wrote:
>>> >>>>>>
>>> >>>>>>             On 3.12.2014 04:35, Dmitri Pal wrote:
>>> >>>>>>             > On 12/02/2014 08:54 PM, Matthew Herzog wrote:
>>> >>>>>>             >> Any other ideas? I just spun up a new VM and took
>>> the
>>> >>>>>>             defaults on everything
>>> >>>>>>             >> while running ipa-server-install (the defaults did
>>> >>>>>>             make sense) and my new VM
>>> >>>>>>             >> can't resolve -anything- in the domain in which it
>>> >>>>>>             lives. The "old" VM
>>> >>>>>>             >> (running the same versions of everything on the
>>> same
>>> >>>>>>             OS) can't even resolve
>>> >>>>>>             >> the clients I have registered with it!
>>> >>>>>>             >>
>>> >>>>>>             >> So I'm pretty frustrated and am wondering, what
>>> >>>>>>             _exactly_ is the role of
>>> >>>>>>             >> bind in the IPA server and how is it expected to
>>> know
>>> >>>>>>             anything about the
>>> >>>>>>             >> local DNS domain without becoming a bind slave
>>> server?
>>> >>>>>>             >
>>> >>>>>>             > I am not sure I am 100% with you but...
>>> >>>>>>             > If you use the defaults and nothing else you get to
>>> >>>>>>             the scenario when IPA has
>>> >>>>>>             > its DNS but it is a self contained environment. It
>>> >>>>>>             seems that this is what you
>>> >>>>>>             > observe.
>>> >>>>>>             > It is expected that you decide in advance what you
>>> >>>>>>             want to do with DNS. There
>>> >>>>>>             > are several options:
>>> >>>>>>             > 1) You can delegate a zone to IPA to manage, then
>>> you
>>> >>>>>>             need to connect your IPA
>>> >>>>>>             > DNS to your existing DNS during install or after.
>>> >>>>>>             > In this case the systems joined to IPA will be a
>>> part
>>> >>>>>>             of IPA domain/zone and
>>> >>>>>>             > would also be able to resolve other systems around
>>> >>>>>>             > 2) Not use IPA DNS if you do not want to take
>>> >>>>>>             advantage of it
>>> >>>>>>             > 3) Have a self contained demo/lab environment that
>>> you
>>> >>>>>>             currently observe.
>>> >>>>>>             >
>>> >>>>>>             > What is the intent?
>>> >>>>>>
>>> >>>>>>             I agree with Dmitri, we need more information from
>>> you:
>>> >>>>>>             - You said "my new VM can't resolve -anything- in the
>>> >>>>>>             domain in which it
>>> >>>>>>             lives." - Which domain do you mean?
>>> >>>>>>
>>> >>>>>>             - Apparently you have configured FreeIPA to serve zone
>>> >>>>>>             e-bozo.com <http://e-bozo.com>. Do you have
>>> >>>>>>             this zone configured on some other DNS server at the
>>> >>>>>>             same time?
>>> >>>>>>
>>> >>>>>>             Please keep in mind that authoritative servers should
>>> >>>>>>             share the database. You
>>> >>>>>>             will get naming collisions if e-bozo.com
>>> >>>>>>             <http://e-bozo.com> is served by FreeIPA DNS servers
>>> and
>>> >>>>>>             some other servers at the same time. Maybe that is the
>>> >>>>>>             problem you see right now.
>>> >>>>>>
>>> >>>>>>             As Dmitri said, the architecturally correct solution
>>> is
>>> >>>>>>             to decide if you want
>>> >>>>>>             to use FreeIPA DNS or not. You have option to either
>>> >>>>>>             remove non-FreeIPA DNS
>>> >>>>>>             servers and import data to FreeIPA or to add
>>> >>>>>>             FreeIPA-specific DNS records to
>>> >>>>>>             existing DNS servers and do not configure FreeIPA to
>>> act
>>> >>>>>>             as DNS server.
>>> >>>>>>
>>> >>>>>>             Petr^2 Spacek
>>> >>>>>>
>>> >>>>>>             >> Thanks.
>>> >>>>>>             >>
>>> >>>>>>             >> On Tue, Dec 2, 2014 at 11:58 AM, Petr Spacek
>>> >>>>>>             <pspa...@redhat.com <mailto:pspa...@redhat.com>
>>> >>>>>>             >> <mailto:pspa...@redhat.com
>>> >>>>>>             <mailto:pspa...@redhat.com>>> wrote:
>>> >>>>>>             >>
>>> >>>>>>             >>     On 2.12.2014 17:36, Martin Basti wrote:
>>> >>>>>>             >>     > On 02/12/14 17:28, Matthew Herzog wrote:
>>> >>>>>>             >>     >> I just realized that my IPA servers cannot
>>> >>>>>>             resolve ANY servers
>>> >>>>>>             >>     in my domain.
>>> >>>>>>             >>     >> What do I need to do to fix this? Below is
>>> my
>>> >>>>>>             named.conf.
>>> >>>>>>             >>     >>
>>> >>>>>>             >>     >>
>>> >>>>>>             >>     >> options {
>>> >>>>>>             >>     >>  // turns on IPv6 for port 53, IPv4 is on by
>>> >>>>>>             default for
>>> >>>>>>             >>     all ifaces
>>> >>>>>>             >>     >>  listen-on-v6 {any;};
>>> >>>>>>             >>     >>
>>> >>>>>>             >>     >>  // Put files that named is allowed to write
>>> >>>>>>             in the
>>> >>>>>>             >>     data/ directory:
>>> >>>>>>             >>     >>  directory "/var/named"; // the default
>>> >>>>>>             >>     >>  dump-file "data/cache_dump.db";
>>> >>>>>>             >>     >>  statistics-file "data/named_stats.txt";
>>> >>>>>>             >>     >>  memstatistics-file
>>> "data/named_mem_stats.txt";
>>> >>>>>>             >>     >>
>>> >>>>>>             >>     >>  forward first;
>>> >>>>>>             >>     >>  forwarders {
>>> >>>>>>             >>     >>          10.100.8.41;
>>> >>>>>>             >>     >>          10.100.8.40;
>>> >>>>>>             >>     >>          10.100.4.13;
>>> >>>>>>             >>     >>          10.100.4.14;
>>> >>>>>>             >>     >>          10.100.4.19;
>>> >>>>>>             >>     >>          10.100.4.44;
>>> >>>>>>             >>     >>  };
>>> >>>>>>             >>     >>
>>> >>>>>>             >>     >>  // Any host is permitted to issue recursive
>>> >>>>>>             queries
>>> >>>>>>             >>     >>  allow-recursion { any; };
>>> >>>>>>             >>     >>
>>> >>>>>>             >>     >>  tkey-gssapi-keytab "/etc/named.keytab";
>>> >>>>>>             >>     >>  pid-file "/run/named/named.pid";
>>> >>>>>>             >>     >> };
>>> >>>>>>             >>     >>
>>> >>>>>>             >>     >> /* If you want to enable debugging, eg.
>>> using
>>> >>>>>>             the 'rndc trace'
>>> >>>>>>             >>     command,
>>> >>>>>>             >>     >>  * By default, SELinux policy does not allow
>>> >>>>>>             named to modify
>>> >>>>>>             >>     the /var/named
>>> >>>>>>             >>     >> directory,
>>> >>>>>>             >>     >>  * so put the default debug log file in
>>> data/ :
>>> >>>>>>             >>     >>  */
>>> >>>>>>             >>     >> logging {
>>> >>>>>>             >>     >>  channel default_debug {
>>> >>>>>>             >>     >>          file "data/named.run";
>>> >>>>>>             >>     >>          severity dynamic;
>>> >>>>>>             >>     >>          print-time yes;
>>> >>>>>>             >>     >>  };
>>> >>>>>>             >>     >>  };
>>> >>>>>>             >>     >> };
>>> >>>>>>             >>     >>
>>> >>>>>>             >>     >> zone "." IN {
>>> >>>>>>             >>     >>  type hint;
>>> >>>>>>             >>     >>  file "named.ca <http://named.ca>
>>> >>>>>>             <http://named.ca> <http://named.ca>";
>>> >>>>>>             >>     >> };
>>> >>>>>>             >>     >>
>>> >>>>>>             >>     >> include "/etc/named.rfc1912.zones";
>>> >>>>>>             >>     >>
>>> >>>>>>             >>     >> dynamic-db "ipa" {
>>> >>>>>>             >>     >>  library "ldap.so";
>>> >>>>>>             >>     >>  arg "uri
>>> >>>>>>             >>
>>> ldapi://%2fvar%2frun%2fslapd-BO3-E-BOZO-COM.socket";
>>> >>>>>>             >>     >>  arg "base cn=dns, dc=bo3,dc=e-bozo,dc=com";
>>> >>>>>>             >>     >>  arg "fake_mname
>>> freeipa-poc01.bo3.e-bozo.com
>>> >>>>>>             <http://freeipa-poc01.bo3.e-bozo.com>
>>> >>>>>>             >>     <http://freeipa-poc01.bo3.e-bozo.com>
>>> >>>>>>             >>     >> <http://freeipa-poc01.bo3.e-bozo.com>.";
>>> >>>>>>             >>     >>  arg "auth_method sasl";
>>> >>>>>>             >>     >>  arg "sasl_mech GSSAPI";
>>> >>>>>>             >>     >>  arg "sasl_user
>>> >>>>>>             DNS/freeipa-poc01.bo3.e-bozo.com
>>> >>>>>>             <http://freeipa-poc01.bo3.e-bozo.com>
>>> >>>>>>             >>     <http://freeipa-poc01.bo3.e-bozo.com>
>>> >>>>>>             >>     >> <http://freeipa-poc01.bo3.e-bozo.com>";
>>> >>>>>>             >>     >>  arg "serial_autoincrement yes";
>>> >>>>>>             >>     >> };
>>> >>>>>>             >>     >>
>>> >>>>>>             >>     >>
>>> >>>>>>             >>     >>
>>> >>>>>>             >>     >>
>>> >>>>>>             >>     > Hello,
>>> >>>>>>             >>     >
>>> >>>>>>             >>     > which version ipa do you use? which platform?
>>> >>>>>>             Which version
>>> >>>>>>             >>     bind-dyndb-ldap?
>>> >>>>>>             >>     >
>>> >>>>>>             >>     > Can you run these commands, and check if
>>> there
>>> >>>>>>             any errors?
>>> >>>>>>             >>     > ipactl status
>>> >>>>>>             >>     > systemctl status named  (respectively
>>> >>>>>>             journalctl -u named)
>>> >>>>>>             >>
>>> >>>>>>             >>     We also may want to see information listed on
>>> page
>>> >>>>>>             >>
>>> >>>>>>
>>> >> https://fedorahosted.org/bind-dyndb-ldap/wiki/BugReporting
>>>
>>> --
>>> Petr^2 Spacek
>>>
>>
>>
>>
>> --
>> If life gives you melons, you may be dyslexic.
>>
>
>
>
> --
> If life gives you melons, you may be dyslexic.
>



-- 
If life gives you melons, you may be dyslexic.
-- 
Manage your subscription for the Freeipa-users mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-users
Go To http://freeipa.org for more info on the project

Reply via email to