On 09/09/2016 04:24 PM, Giorgos Kafataridis wrote:
> 
> 
> On 09/09/2016 04:09 PM, Petr Vobornik wrote:
>> On 09/09/2016 02:33 PM, Giorgos Kafataridis wrote:
>>>>> Yes, I have followed
>>>>> https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/Linux_Domain_Identity_Authentication_and_Policy_Guide/upgrading.html
>>>>>
>>>>> to the letter.
>>>>> The only reason I had to recreate the cacert.p12 file is because it
>>>>> is not
>>>>> renewed automatically in v3, so the cacert.p12 was outdated and the
>>>>> CA was
>>>>> throwing an "p12 invalid digest" error.
>>>>>
>>>>>     * I opened all necessary ports
>>>>>     * I checked all certs and they are valid for another year
>>>>>
>>>>>
>>>>> /Run connection check to master//
>>>>> //Check connection from replica to remote master 'ipa-server.nelios'://
>>>>> //   Directory Service: Unsecure port (389): OK//
>>>>> //   Directory Service: Secure port (636): OK//
>>>>> //   Kerberos KDC: TCP (88): OK//
>>>>> //   Kerberos Kpasswd: TCP (464): OK//
>>>>> //   HTTP Server: Unsecure port (80): OK//
>>>>> //   HTTP Server: Secure port (443): OK//
>>>>> //   PKI-CA: Directory Service port (7389): OK//
>>>>> //
>>>>> //The following list of ports use UDP protocol and would need to be//
>>>>> //checked manually://
>>>>> //   Kerberos KDC: UDP (88): SKIPPED//
>>>>> //   Kerberos Kpasswd: UDP (464): SKIPPED//
>>>>> //
>>>>> //Connection from replica to master is OK.//
>>>>> //Start listening on required ports for remote master check//
>>>>> //Get credentials to log in to remote master//
>>>>> //Check SSH connection to remote master//
>>>>> //Execute check on remote master//
>>>>> //Check connection from master to remote replica
>>>>> 'ipa2-server2.nelios'://
>>>>> //   Directory Service: Unsecure port (389): OK//
>>>>> //   Directory Service: Secure port (636): OK//
>>>>> //   Kerberos KDC: TCP (88): OK//
>>>>> //   Kerberos KDC: UDP (88): OK//
>>>>> //   Kerberos Kpasswd: TCP (464): OK//
>>>>> //   Kerberos Kpasswd: UDP (464): OK//
>>>>> //   HTTP Server: Unsecure port (80): OK//
>>>>> //   HTTP Server: Secure port (443): OK//
>>>>> //
>>>>> //Connection from master to replica is OK.//
>>>>> //
>>>>> //Connection check OK/
>>>>>
>>>>> *Even with a fresh install of centos 7 with different hostname and ip
>>>>> and I
>>>>> still get the  the error below*
>>>>>
>>>>> Configuring certificate server (pki-tomcatd). Estimated time: 3
>>>>> minutes 30 seconds
>>>>>      [1/24]: creating certificate server user
>>>>>      [2/24]: configuring certificate server instance
>>>>> ipa.ipaserver.install.cainstance.CAInstance: CRITICAL Failed to
>>>>> configure CA
>>>>> instance: Command ''/usr/sbin/pkispawn' '-s' 'CA' '-f' '/tmp/tmpbMwmp_''
>>>>> returned non-zero exit status 1
>>>>> ipa.ipaserver.install.cainstance.CAInstance: CRITICAL See the
>>>>> installation logs
>>>>> and the following files/directories for more information:
>>>>> ipa.ipaserver.install.cainstance.CAInstance: CRITICAL
>>>>> /var/log/pki-ca-install.log
>>>>> ipa.ipaserver.install.cainstance.CAInstance: CRITICAL
>>>>> /var/log/pki/pki-tomcat
>>>>>      [error] RuntimeError: CA configuration failed.
>>>>> Your system may be partly configured.
>>>>> Run /usr/sbin/ipa-server-install --uninstall to clean up.
>>>>>
>>>>> ipa.ipapython.install.cli.install_tool(Replica): ERROR    CA
>>>>> configuration failed.
>>>>>
>>>>> *
>>>>> **With debug enabled I get: *
>>>>>
>>>>> pa         : DEBUG    Starting external process
>>>>> ipa         : DEBUG    args='/usr/sbin/pkispawn' '-s' 'CA' '-f'
>>>>> '/tmp/tmpwY8XjR'
>>>>> ipa         : DEBUG    Process finished, return code=1
>>>>> ipa         : DEBUG    stdout=Log file:
>>>>> /var/log/pki/pki-ca-spawn.20160909044214.log
>>>>> Loading deployment configuration from /tmp/tmpwY8XjR.
>>>>> Installing CA into /var/lib/pki/pki-tomcat.
>>>>> Storing deployment configuration into
>>>>> /etc/sysconfig/pki/tomcat/pki-tomcat/ca/deployment.cfg.
>>>>>
>>>>> Installation failed.
>>>>>
>>>>>
>>>>> ipa         : DEBUG
>>>>> stderr=/usr/lib/python2.7/site-packages/urllib3/connectionpool.py:769:
>>>>> InsecureRequestWarning: Unverified HTTPS request is being made. Adding
>>>>> certificate verification is strongly advised. See:
>>>>> https://urllib3.readthedocs.org/en/latest/security.html
>>>>>      InsecureRequestWarning)
>>>>> pkispawn    : WARNING  ....... unable to validate security domain
>>>>> user/password
>>>>> through REST interface. Interface not available
>>>>> pkispawn    : ERROR    ....... Exception from Java Configuration
>>>>> Servlet: 500
>>>>> Server Error: Internal Server Error
>>>>> pkispawn    : ERROR    ....... ParseError: not well-formed (invalid
>>>>> token): line
>>>>> 1, column 0:
>>>>> {"Attributes":{"Attribute":[]},"ClassName":"com.netscape.certsrv.base.PKIException","Code":500,"Message":"Failed
>>>>>
>>>>> to obtain installation token from security domain"}
>>>>>
>>>>>
>>>>> Is there a way to validate the repilca .gpg file from a v3
>>>>> installation against
>>>>> a v4.2 freeipa installation to check for any errors before going
>>>>> through the
>>>>> ipa-replica-install?
>>>>> The ipa-replica-install completes if I don't include the --setup-ca
>>>>> flag but I
>>>>> don't want that
>>>>>
>>>> There is no automatic method to verify the replica file.
>>>>
>>>> Could you share the stack trace from /var/log/pki/pki-tomcat/ca/debug  +
>>>> couple lines before and after?
>>>>
>>>>
>>> Contents  of /var/log/pki/pki-tomcat/ca/debug:
>>>
>>> [09/Sep/2016:08:22:51][http-bio-8443-exec-3]: MessageFormatInterceptor:
>>> SystemConfigResource.configure()
>>> [09/Sep/2016:08:22:51][http-bio-8443-exec-3]: MessageFormatInterceptor:
>>> content-type: application/json
>>> [09/Sep/2016:08:22:51][http-bio-8443-exec-3]: MessageFormatInterceptor:
>>> accept: [application/json]
>>> [09/Sep/2016:08:22:51][http-bio-8443-exec-3]: MessageFormatInterceptor:
>>> request format: application/json
>>> [09/Sep/2016:08:22:51][http-bio-8443-exec-3]: MessageFormatInterceptor:
>>> response format: application/json
>>> [09/Sep/2016:08:22:51][http-bio-8443-exec-3]: SystemConfigService:
>>> configure()
>>> [09/Sep/2016:08:22:51][http-bio-8443-exec-3]: SystemConfigService:
>>> request: ConfigurationRequest [pin=XXXX, token=Internal Key Storage
>>> Token, tokenPassword=XXXX, securityDomainType=existingdomain,
>>> securityDomainUri=https://ipa-server.nelios:443,
>>> securityDomainName=null, securityDomainUser=admin,
>>> securityDomainPassword=XXXX, isClone=true,
>>> cloneUri=https://ipa-server.nelios:443, subsystemName=CA
>>> ipa2-server2.nelios 8443, p12File=/tmp/ca.p12, p12Password=XXXX,
>>> hierarchy=root, dsHost=ipa2-server2.nelios, dsPort=389, baseDN=o=ipaca,
>>> bindDN=cn=Directory Manager, bindpwd=XXXX, database=ipaca,
>>> secureConn=false, removeData=true, replicateSchema=false,
>>> masterReplicationPort=7389, cloneReplicationPort=389,
>>> replicationSecurity=TLS,
>>> systemCerts=[com.netscape.certsrv.system.SystemCertData@434a841],
>>> issuingCA=https://ipa-server.nelios:443, backupKeys=true,
>>> backupPassword=XXXX,
>>> backupFile=/etc/pki/pki-tomcat/alias/ca_backup_keys.p12, adminUID=null,
>>> adminPassword=XXXX, adminEmail=null, adminCertRequest=null,
>>> adminCertRequestType=null, adminSubjectDN=null, adminName=null,
>>> adminProfileID=null, adminCert=null, importAdminCert=false,
>>> generateServerCert=true, external=false, standAlone=false,
>>> stepTwo=false, authdbBaseDN=null, authdbHost=null, authdbPort=null,
>>> authdbSecureConn=null, caUri=null, kraUri=null, tksUri=null,
>>> enableServerSideKeyGen=null, importSharedSecret=null,
>>> generateSubsystemCert=null, sharedDB=false, sharedDBUserDN=null,
>>> createNewDB=true, setupReplication=True, subordinateSecurityDomainNamenull]
>>> [09/Sep/2016:08:22:51][http-bio-8443-exec-3]: === Token Panel ===
>>> [09/Sep/2016:08:22:51][http-bio-8443-exec-3]: === Security Domain Panel ===
>>> [09/Sep/2016:08:22:51][http-bio-8443-exec-3]: Joining existing security
>>> domain
>>> [09/Sep/2016:08:22:51][http-bio-8443-exec-3]: Resolving security domain
>>> URLhttps://ipa-server.nelios:443
>>> [09/Sep/2016:08:22:51][http-bio-8443-exec-3]: Getting security domain
>>> cert chain
>>> [09/Sep/2016:08:22:52][http-bio-8443-exec-3]: Getting install token
>>> [09/Sep/2016:08:22:52][http-bio-8443-exec-3]: Getting install token
>>> [09/Sep/2016:08:22:52][http-bio-8443-exec-3]: Getting old cookie
>>> [09/Sep/2016:08:22:52][http-bio-8443-exec-3]: Token: null
>>> [09/Sep/2016:08:22:52][http-bio-8443-exec-3]: Install token is null
>>> [09/Sep/2016:08:22:52][http-bio-8443-exec-3]: Failed to obtain
>>> installation token from security domain
>>>
>>> I assume it is the null token the perpetrator ? if yes what should I fix
>>> on master?
>>>
>> I don't know this part much. Therefore CCing PKI experts - in addition
>> to figure out if there is anything to fix on IPA or PKI side.
>>
>> Endi, Matthew,
>>
>> do I understand it correctly that for obtaining the token, it contacts
>> master server with
>>     pki_security_domain_user == admin
>>     pki_security_domain_password == whatever provided in ipa-replica-install
>>
>> pki_security_domain_user matches uid=admin,ou=people,o=ipaca which has a
>> password which was set during ipa-server-install(and thus pkisilent) on
>> original 6.x server.
>>
>> Therefore if admin password changed between these two installations then
>> it will fail obtain the cookie? (guessing that wrong credential might be
>> the reason)
> 
> 
> If I look for uid=admin,ou=people,o=ipaca on  master (ipa v3, centos 6.x) 
> this 
> is what I get:
> 
> [root@ipa-server ~]# ldapsearch -D "cn=directory manager" -W -p 389 -h 
> localhost 
> -b "uid=admin,ou=people,o=ipaca,dc=nelios"
> 
> # extended LDIF
> #
> # LDAPv3
> # base <uid=admin,ou=people,o=ipaca,dc=nelios> with scope subtree
> # filter: (objectclass=*)
> # requesting: ALL
> #
> 
> # search result
> search: 2
> result: 32 No such object
> matchedDN: dc=nelios
> 
> # numResponses: 1
> 
> LDAP manager password seems to be correct as I used it more than once in the 
> last few days  to remove the failing replicas.
> 

You search for wrong dn:
  uid=admin,ou=people,o=ipaca,dc=nelios
instead of:
  uid=admin,ou=people,o=ipaca

-- 
Petr Vobornik

-- 
Manage your subscription for the Freeipa-users mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-users
Go to http://freeipa.org for more info on the project

Reply via email to