On Fri, 15 Jan 2016, Simpson Lachlan wrote:
Hi
I’m not 100% sure where I've gone wrong, but I obviously have.
Running Centos 7.2, with FreeIPA 4.2.0 from the repos.
FreeIPA was set up per instructions (# ipa-server-install ), and we could surf
to the website and interact with it.
I set up a second server, yum install -y ipa-client, and then joined with
authconfig successfully and logged in.
Our intention is to join an AD domain over which we have no control in a one
way trust: co.org.au is trusted by unix.co.org.au.
In order to do this, I followed the instructions on redhat's documentation "
5.3.3.1. Preparing the IdM Server for Trust"
https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/Windows_Integration_Guide/creating-trusts.html#trust-set-up-idm
I installed "*ipa-server-trust-ad" samba, ran the ipa-adtrust-install script
successfully, confirmed DNS was properly configured, confirmed smbclient was properly
configured, then created a trust agreement successfully (this time yesterday I was
cheering).
--------------------------------------------------------
Added Active Directory trust for realm "co.org.au"
--------------------------------------------------------
Realm name: co.org.au
Domain NetBIOS name: PMCI
Domain Security Identifier: S-1-5-21-55386287-1424373824-1154838474
SID blacklist incoming: S-1-5-20, S-1-5-3, S-1-5-2, S-1-5-1, S-1-5-7, S-1-5-6,
S-1-5-5, S-1-5-4, S-1-5-9, S-1-5-8, S-1-5-17, S-1-5-16, S-1-5-15, S-1-5-14,
S-1-5-13, S-1-5-12, S-1-5-11, S-1-5-10, S-1-3, S-1-2, S-1-1, S-1-0, S-1-5-19,
S-1-5-18
SID blacklist outgoing: S-1-5-20, S-1-5-3, S-1-5-2, S-1-5-1, S-1-5-7, S-1-5-6,
S-1-5-5, S-1-5-4, S-1-5-9, S-1-5-8, S-1-5-17, S-1-5-16, S-1-5-15, S-1-5-14,
S-1-5-13, S-1-5-12, S-1-5-11, S-1-5-10, S-1-3, S-1-2, S-1-1, S-1-0, S-1-5-19,
S-1-5-18
Trust direction: Trusting forest
Trust type: Active Directory domain
Trust status: Established and verified
Then I started to see some differentiation from the documented output, so I
started investigating. In particular, kvno -S cifs adserver.example.com didn't
work.
Eventually I turned off selinux and the firewall all together and rebooted.
Now IPA doesn't start. When I look into it, this is what I see:
[root@vmts-linuxidm ~]# sc | grep failed
● dir...@unix.co.org.au.service loaded failed failed 389 Directory Server
unix.co.org.au.
● ipa.service loaded failed failed Identity,
Policy, Audit
● kadmin.service loaded failed failed Kerberos 5
Password-changing and Administration
● kdump.service loaded failed failed Crash recovery
kernel arming
● smb.service loaded failed failed Samba SMB Daemon
From the numerous logs and web pages I've read, I think this means:
IPA doesn't start because samba fails to start.
This is from jouirnalctl re samba:
Missing mandatory attribute ipaNTSecurityIdentifier
Cannot find SID of fallback group
pdb backend ipasam:ldapi://%2fvar%2frun%2fslapd-UNIX-CO-ORG-AU.socket did not
correctly init (error was NT_STATUS_INVALID_PARAMETER)
Server ldap/vmts-linux...@unix.co.org.au not found in Kerberos database
This is from the smb log:
[2016/01/15 14:53:03, 0] ../source3/smbd/server.c:1241(main)
smbd version 4.2.3 started.
Copyright Andrew Tridgell and the Samba Team 1992-2014
[2016/01/15 14:53:03.538393, 0] ipa_sam.c:4208(bind_callback_cleanup)
kerberos error: code=-1765328228, message=Cannot contact any KDC for realm
'UNIX.CO.ORG.AU'
[2016/01/15 14:53:03.538500, 0]
../source3/lib/smbldap.c:998(smbldap_connect_system)
failed to bind to server ldapi://%2fvar%2frun%2fslapd-UNIX-CO-ORG-AU.socket with
dn="[Anonymous bind]" Error: Local error
(unknown)
Samba seems to be failing because LDAP (dirsrv) is failing and it can't
connect, or because Kerberos isn't running.
LDAP isn't running because Kerberos isn't running:
krb5kdc: cannot initialize realm UNIX.CO.ORG.AU - see log file for details
krb5kdc: Server error - while fetching master key K/M for realm UNIX.CO.ORG.AU
So. It looks like samba and IPA won't start because Kerberus and LDAP
won't start.
It's hard to tell why they won't start, but it looks a little like
Kerberos won't start because there aren't any values in LDAP, and LDAP
won't start because Kerberos isn't started?
No, LDAP server startup is not tied to Kerberos. It can perfectly start
without that, as Kerberos in 389-ds is only needed for replication to
happen.
Samba is failing because it cannot get access to LDAP server using
GSSAPI, that's right.
KDC is failing because LDAP server is not available, that's right too.
This is from the /var/log/dirsrv/slapd-UNIX-CO-ORG-AU/errors file:
SSL Initialization - Configured SSL version range: min: TLS1.0, max: TLS1.2
- 389-Directory/1.3.4.0 B2015.343.1254 starting up
- WARNING: changelog: entry cache size 2097152B is less than db size 4259840B;
We recommend to increase the entry cache size nsslapd-cachememsize.
schema-compat-plugin - warning: no entries set up under cn=computers,
cn=compat,dc=unix,dc=co,dc=org,dc=au
schema-compat-plugin - warning: no entries set up under cn=ng,
cn=compat,dc=unix,dc=co,dc=org,dc=au
schema-compat-plugin - warning: no entries set up under
ou=sudoers,dc=unix,dc=co,dc=org,dc=au
NSACLPlugin - The ACL target cn=dns,dc=unix,dc=co,dc=org,dc=au does not exist
NSACLPlugin - The ACL target cn=dns,dc=unix,dc=co,dc=org,dc=au does not exist
NSACLPlugin - The ACL target cn=keys,cn=sec,cn=dns,dc=unix,dc=co,dc=org,dc=au
does not exist
NSACLPlugin - The ACL target cn=dns,dc=unix,dc=co,dc=org,dc=au does not exist
NSACLPlugin - The ACL target cn=dns,dc=unix,dc=co,dc=org,dc=au does not exist
NSACLPlugin - The ACL target cn=groups,cn=compat,dc=unix,dc=co,dc=org,dc=au
does not exist
NSACLPlugin - The ACL target cn=computers,cn=compat,dc=unix,dc=co,dc=org,dc=au
does not exist
NSACLPlugin - The ACL target cn=ng,cn=compat,dc=unix,dc=co,dc=org,dc=au does
not exist
NSACLPlugin - The ACL target ou=sudoers,dc=unix,dc=co,dc=org,dc=au does not
exist
NSACLPlugin - The ACL target cn=users,cn=compat,dc=unix,dc=co,dc=org,dc=au does
not exist
NSACLPlugin - The ACL target cn=vaults,cn=kra,dc=unix,dc=co,dc=org,dc=au does
not exist
NSACLPlugin - The ACL target cn=casigningcert
cert-pki-ca,cn=ca_renewal,cn=ipa,cn=etc,dc=unix,dc=co,dc=org,dc=au does not
exist
NSACLPlugin - The ACL target cn=casigningcert
cert-pki-ca,cn=ca_renewal,cn=ipa,cn=etc,dc=unix,dc=co,dc=org,dc=au does not
exist
NSACLPlugin - The ACL target cn=automember rebuild
membership,cn=tasks,cn=config does not exist
I don't understand why it's looking for dns.unix.co.org.au - I wanted
the upstream DNS to serve this domain as well?
You may ignore ACL's plugin output as it just mentions that there are
ACLs against entries which don't exist -- this is normal, because we
still have ACLs in place for cn=dns,$SUFFIX even if you don't configure
integrated DNS. These messages have nothing to do with your problem.
None of the above is revealing an issue.
Follow http://www.port389.org/docs/389ds/FAQ/faq.html#debugging-crashes
to enable crashdumps for ns-slapd to see what happens in reality (check
systemd-enabled systems' recipes).
--
/ Alexander Bokovoy
--
Manage your subscription for the Freeipa-users mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-users
Go to http://freeipa.org for more info on the project