[Freeipa-users] IPA Trusts

2015-03-16 Thread Erinn Looney-Triggs
Reading through the RHEL 7.1 documents on setting up a trust between IPA and AD I came across a note that IPA had to be managing DNS in order for this to work. Why is this? Is there any way around this? At this point the DNS IPA would manage is DNSSEC signed and as such can't be managed by IPA,

Re: [Freeipa-users] IPA Trusts

2015-03-16 Thread Erinn Looney-Triggs
On Monday, March 16, 2015 09:13:56 PM Alexander Bokovoy wrote: On Mon, 16 Mar 2015, Erinn Looney-Triggs wrote: Reading through the RHEL 7.1 documents on setting up a trust between IPA and AD I came across a note that IPA had to be managing DNS in order for this to work. Why

Re: [Freeipa-users] IPA 4.1.0 in RHEL 7.1

2015-03-12 Thread Erinn Looney-Triggs
On 03/12/2015 01:46 PM, Martin Kosek wrote: On 03/12/2015 07:24 PM, Erinn Looney-Triggs wrote: On 03/12/2015 02:10 AM, Jan Cholasta wrote: Dne 12.3.2015 v 08:25 Martin Kosek napsal(a): On 03/11/2015 09:05 PM, Dmitri Pal wrote: On 03/11/2015 03:15 PM, Erinn Looney-Triggs wrote: ... Third

Re: [Freeipa-users] IPA 4.1.0 in RHEL 7.1

2015-03-12 Thread Erinn Looney-Triggs
On 03/12/2015 02:10 AM, Jan Cholasta wrote: Dne 12.3.2015 v 08:25 Martin Kosek napsal(a): On 03/11/2015 09:05 PM, Dmitri Pal wrote: On 03/11/2015 03:15 PM, Erinn Looney-Triggs wrote: ... Third, there appears to be a behavior change from in ipalib. I cleaned up a little inventory script

[Freeipa-users] IPA 4.1.0 in RHEL 7.1

2015-03-11 Thread Erinn Looney-Triggs
First off congratulations on getting this out. Love the new UI, all pretty and integrates well with the access.redhat.com UI. Second, did DNSSEC not make the chop? It looks like for FreeIPA DNSSEC was included in the 4.1.0 release, but near as I can tell it is not part of IPA 4.1.0 in RHEL

[Freeipa-users] Possible for system to be member of both IPA domain and AD domain?

2015-03-03 Thread Erinn Looney-Triggs
Before I go charging down this path too far, I wanted to figure out whether it is possible for a RHEL 7 system to be a member of both an IPA domain and a separate AD domain? At this point trusts are not established between IPA and the AD, this will happen around the 7.1 release, however, I

[Freeipa-users] SASL GSSAPI behavior change in RHEL 7

2015-01-14 Thread Erinn Looney-Triggs
This is not exactly the right place to post this message, but I reckon it is close enough. A year or so ago, I wrote up a guide for configuring a Postfix client to use Kerb/GSSAPI to authenticate against a Postfix server acting as a relay. The guide is here:

Re: [Freeipa-users] MinSSF suggestions?

2014-08-14 Thread Erinn Looney-Triggs
On Wednesday, August 13, 2014 08:57:19 PM Rob Crittenden wrote: Erinn Looney-Triggs wrote: On 08/12/2014 09:21 AM, Alexander Bokovoy wrote: On Tue, 12 Aug 2014, Erinn Looney-Triggs wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 08/11/2014 09:08 AM, Martin Kosek wrote

Re: [Freeipa-users] MinSSF suggestions?

2014-08-12 Thread Erinn Looney-Triggs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 08/11/2014 09:08 AM, Martin Kosek wrote: On 08/11/2014 04:24 PM, Jakub Hrozek wrote: On Mon, Aug 11, 2014 at 05:18:03PM +0300, Alexander Bokovoy wrote: On Sat, 09 Aug 2014, Erinn Looney-Triggs wrote: -BEGIN PGP SIGNED MESSAGE- Hash

Re: [Freeipa-users] MinSSF suggestions?

2014-08-12 Thread Erinn Looney-Triggs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 08/12/2014 09:21 AM, Alexander Bokovoy wrote: On Tue, 12 Aug 2014, Erinn Looney-Triggs wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 08/11/2014 09:08 AM, Martin Kosek wrote: On 08/11/2014 04:24 PM, Jakub Hrozek wrote: On Mon

[Freeipa-users] Replicating o=ipaca

2014-08-12 Thread Erinn Looney-Triggs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 The documentation seems to be a little fuzzy on setting up two CAs, some parts indicate this is a bad idea because the CRLs can clobber each other, other parts, such as the migration guide from RHEL 6.5 to 7 seem to indicate that it is ok, albeit

Re: [Freeipa-users] MinSSF suggestions?

2014-08-12 Thread Erinn Looney-Triggs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 08/12/2014 09:21 AM, Alexander Bokovoy wrote: On Tue, 12 Aug 2014, Erinn Looney-Triggs wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 08/11/2014 09:08 AM, Martin Kosek wrote: On 08/11/2014 04:24 PM, Jakub Hrozek wrote: On Mon

Re: [Freeipa-users] MinSSF suggestions?

2014-08-12 Thread Erinn Looney-Triggs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 08/12/2014 12:33 PM, Alexander Bokovoy wrote: On Tue, 12 Aug 2014, Erinn Looney-Triggs wrote: I guess the part I don't get here, is that this setting does not disable anonymous access to rootdse it just requires, as far as I understand

Re: [Freeipa-users] Replicating o=ipaca

2014-08-12 Thread Erinn Looney-Triggs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 08/12/2014 11:49 AM, Rob Crittenden wrote: Erinn Looney-Triggs wrote: The documentation seems to be a little fuzzy on setting up two CAs, some parts indicate this is a bad idea because the CRLs can clobber each other, other parts

[Freeipa-users] MinSSF suggestions?

2014-08-09 Thread Erinn Looney-Triggs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 It would seem to be prudent to set the minssf setting for 389 to 56, however I am wondering why this isn't done by default, and if there is any reason why I shouldn't do it? Thanks, - -Erinn -BEGIN PGP SIGNATURE- Version: GnuPG v1

Re: [Freeipa-users] RHEL 7 Upgrade experience so far

2014-08-05 Thread Erinn Looney-Triggs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Here you go: dbs.beginReplicaNumber=1 dbs.beginRequestNumber=1 dbs.beginSerialNumber=1 dbs.enableSerialManagement=true dbs.endReplicaNumber=50 dbs.endRequestNumber=990 dbs.endSerialNumber=ff6 dbs.ldap=internaldb

Re: [Freeipa-users] RHEL 7 Upgrade experience so far

2014-08-05 Thread Erinn Looney-Triggs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 08/04/2014 01:51 PM, Ade Lee wrote: OK - I suspect you may be running into an issue with serial number generation. Each time we install a clone, we end up allocating a new range of serial numbers for the clone. The idea is to keep

Re: [Freeipa-users] RHEL 7 Upgrade experience so far

2014-08-05 Thread Erinn Looney-Triggs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Ok I am throwing up the white flag on this one and starting anew. Clearly there are several things broken down there in the murky depths, and well I just don't trust my install all that much at this point. Thanks for all the help I really

Re: [Freeipa-users] RHEL 7 Upgrade experience so far

2014-08-04 Thread Erinn Looney-Triggs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 08/04/2014 08:46 AM, Rob Crittenden wrote: Erinn Looney-Triggs wrote: On 08/04/2014 04:01 AM, Martin Kosek wrote: On 08/04/2014 04:45 AM, Erinn Looney-Triggs wrote: Whether related or not I am getting the following in my RHEL 6.5 IPA

Re: [Freeipa-users] RHEL 7 Upgrade experience so far

2014-08-04 Thread Erinn Looney-Triggs
to clean that up. Ade On Mon, 2014-08-04 at 12:10 -0700, Erinn Looney-Triggs wrote: On 08/04/2014 11:48 AM, Ade Lee wrote: OK - so its not really even getting started on the install. My guess is there is some cruft from previous installs/uninstalls that was not cleaned up

Re: [Freeipa-users] RHEL 7 Upgrade experience so far

2014-08-03 Thread Erinn Looney-Triggs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 07/30/2014 02:31 PM, Ade Lee wrote: On Tue, 2014-07-29 at 17:49 -0700, Erinn Looney-Triggs wrote: Ok, well I tried deleting it using certutil it deletes both, I tried using keytool to see if it would work any better, no dice there. I'll

Re: [Freeipa-users] RHEL 7 Upgrade experience so far

2014-08-03 Thread Erinn Looney-Triggs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Whether related or not I am getting the following in my RHEL 6.5 IPA instance /var/log/dirsrv/slapd-PKI-CA/debug log: [26/Jul/2014:20:23:23 +] slapi_ldap_bind - Error: could not send startTLS re quest: error -1 (Can't contact LDAP

Re: [Freeipa-users] RHEL 7 Upgrade experience so far

2014-07-31 Thread Erinn Looney-Triggs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 07/30/2014 02:31 PM, Ade Lee wrote: On Tue, 2014-07-29 at 17:49 -0700, Erinn Looney-Triggs wrote: Ok, well I tried deleting it using certutil it deletes both, I tried using keytool to see if it would work any better, no dice there. I'll

Re: [Freeipa-users] RHEL 7 Upgrade experience so far

2014-07-29 Thread Erinn Looney-Triggs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Ok, well I tried deleting it using certutil it deletes both, I tried using keytool to see if it would work any better, no dice there. I'll try the rename, but at this point I am not holding my breath on that, it seems all operation are a bit

Re: [Freeipa-users] RHEL 7 Upgrade experience so far

2014-07-28 Thread Erinn Looney-Triggs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 07/28/2014 08:04 AM, Ade Lee wrote: On Mon, 2014-07-28 at 07:41 -0700, Erinn Looney-Triggs wrote: On 07/28/2014 07:17 AM, Rob Crittenden wrote: Rob Crittenden wrote: Erinn Looney-Triggs wrote: On 07/27/2014 12:02 AM, Erinn Looney-Triggs

Re: [Freeipa-users] RHEL 7 Upgrade experience so far

2014-07-28 Thread Erinn Looney-Triggs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 07/28/2014 11:07 AM, Ade Lee wrote: On Mon, 2014-07-28 at 08:26 -0700, Erinn Looney-Triggs wrote: On 07/28/2014 08:04 AM, Ade Lee wrote: On Mon, 2014-07-28 at 07:41 -0700, Erinn Looney-Triggs wrote: On 07/28/2014 07:17 AM, Rob Crittenden

Re: [Freeipa-users] RHEL 7 Upgrade experience so far

2014-07-28 Thread Erinn Looney-Triggs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 07/28/2014 11:07 AM, Ade Lee wrote: On Mon, 2014-07-28 at 08:26 -0700, Erinn Looney-Triggs wrote: On 07/28/2014 08:04 AM, Ade Lee wrote: On Mon, 2014-07-28 at 07:41 -0700, Erinn Looney-Triggs wrote: On 07/28/2014 07:17 AM, Rob Crittenden

Re: [Freeipa-users] RHEL 7 Upgrade experience so far

2014-07-28 Thread Erinn Looney-Triggs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 07/28/2014 11:07 AM, Ade Lee wrote: No exceptions thrown in the journal. When investigating the cacert.p12 file that is bundled up for the replica's I see two caSigningCert's. One is the older one, before I renewed and one is the new,

Re: [Freeipa-users] RHEL 7 Upgrade experience so far

2014-07-28 Thread Erinn Looney-Triggs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 07/28/2014 12:20 PM, Ade Lee wrote: On Mon, 2014-07-28 at 12:14 -0700, Erinn Looney-Triggs wrote: On 07/28/2014 11:07 AM, Ade Lee wrote: No exceptions thrown in the journal. When investigating the cacert.p12 file that is bundled up

Re: [Freeipa-users] RHEL 7 Upgrade experience so far

2014-07-28 Thread Erinn Looney-Triggs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 07/28/2014 12:56 PM, Rob Crittenden wrote: Erinn Looney-Triggs wrote: On 07/28/2014 12:20 PM, Ade Lee wrote: On Mon, 2014-07-28 at 12:14 -0700, Erinn Looney-Triggs wrote: On 07/28/2014 11:07 AM, Ade Lee wrote: No exceptions thrown

Re: [Freeipa-users] RHEL 7 Upgrade experience so far

2014-07-28 Thread Erinn Looney-Triggs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 07/28/2014 12:20 PM, Ade Lee wrote: On Mon, 2014-07-28 at 12:14 -0700, Erinn Looney-Triggs wrote: On 07/28/2014 11:07 AM, Ade Lee wrote: No exceptions thrown in the journal. When investigating the cacert.p12 file that is bundled up

Re: [Freeipa-users] RHEL 7 Upgrade experience so far

2014-07-28 Thread Erinn Looney-Triggs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 07/28/2014 12:56 PM, Rob Crittenden wrote: Erinn Looney-Triggs wrote: On 07/28/2014 12:20 PM, Ade Lee wrote: On Mon, 2014-07-28 at 12:14 -0700, Erinn Looney-Triggs wrote: On 07/28/2014 11:07 AM, Ade Lee wrote: No exceptions thrown

Re: [Freeipa-users] RHEL 7 Upgrade experience so far

2014-07-27 Thread Erinn Looney-Triggs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 07/26/2014 07:12 PM, Erinn Looney-Triggs wrote: On 07/26/2014 05:25 PM, Erinn Looney-Triggs wrote: Well it hasn't been all the pretty trying to move from RHEL 6.5 to RHEL 7. I have two servers providing my ipa instances ipa and ipa2. Given

Re: [Freeipa-users] RHEL 7 Upgrade experience so far

2014-07-27 Thread Erinn Looney-Triggs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 07/27/2014 12:02 AM, Erinn Looney-Triggs wrote: On 07/26/2014 07:12 PM, Erinn Looney-Triggs wrote: On 07/26/2014 05:25 PM, Erinn Looney-Triggs wrote: Well it hasn't been all the pretty trying to move from RHEL 6.5 to RHEL 7. I have two

[Freeipa-users] RHEL 7 Upgrade experience so far

2014-07-26 Thread Erinn Looney-Triggs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Well it hasn't been all the pretty trying to move from RHEL 6.5 to RHEL 7. I have two servers providing my ipa instances ipa and ipa2. Given that I don't have a great deal of spare capacity the plan was to remove ipa2 from the replication

Re: [Freeipa-users] RHEL 7 Upgrade experience so far

2014-07-26 Thread Erinn Looney-Triggs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 07/26/2014 05:25 PM, Erinn Looney-Triggs wrote: Well it hasn't been all the pretty trying to move from RHEL 6.5 to RHEL 7. I have two servers providing my ipa instances ipa and ipa2. Given that I don't have a great deal of spare capacity

[Freeipa-users] IPA commands failing

2014-07-07 Thread Erinn Looney-Triggs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On a RHEL 6.5 environment the IPA command line tools are failing me with the following: ipa ping ipa: ERROR: cannot connect to Gettext('any of the configured servers', domain='ipa', localedir=None): https://ipa.foo.com/ipa/xml,

[Freeipa-users] OTP in RHEL 7

2014-03-21 Thread Erinn Looney-Triggs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hopefully I am not overlooking something. However, it appears that with RHEL 7 IPA includes the OTP auth piece. However, I can't seem to find any documentation on how to use it. I can deconstruct from the Fedora test day, but before I head down that

Re: [Freeipa-users] OTP in RHEL 7

2014-03-21 Thread Erinn Looney-Triggs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 03/21/2014 02:54 PM, Alexander Bokovoy wrote: On Fri, 21 Mar 2014, Erinn Looney-Triggs wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hopefully I am not overlooking something. However, it appears that with RHEL 7 IPA includes the OTP

Re: [Freeipa-users] JSON interface (Was: IPA DNS command line tools and ~)

2014-03-07 Thread Erinn Looney-Triggs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 03/07/2014 08:57 AM, Petr Viktorin wrote: On 03/07/2014 04:34 PM, Rich Megginson wrote: [...] The ipa command line tools use RPC, but they use XML. If you run ipa -vv dnsrecord-add ... you can see the XML sent and received. There is a bit of

Re: [Freeipa-users] CA expiration and renewal

2013-12-05 Thread Erinn Looney-Triggs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 12/05/2013 01:35 AM, Martin Kosek wrote: On 12/04/2013 06:58 PM, Erinn Looney-Triggs wrote: On 12/04/2013 07:15 AM, Rob Crittenden wrote: Erinn Looney-Triggs wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 11/27/2013 11:11 AM, Rob

Re: [Freeipa-users] CA expiration and renewal

2013-12-05 Thread Erinn Looney-Triggs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 12/05/2013 12:18 PM, Rob Crittenden wrote: Erinn Looney-Triggs wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 12/05/2013 01:35 AM, Martin Kosek wrote: On 12/04/2013 06:58 PM, Erinn Looney-Triggs wrote: On 12/04/2013 07:15 AM, Rob

Re: [Freeipa-users] CA expiration and renewal

2013-12-04 Thread Erinn Looney-Triggs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 12/04/2013 07:15 AM, Rob Crittenden wrote: Erinn Looney-Triggs wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 11/27/2013 11:11 AM, Rob Crittenden wrote: Erinn Looney-Triggs wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1

Re: [Freeipa-users] Dogtag not working?

2013-12-03 Thread Erinn Looney-Triggs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 12/03/2013 05:45 AM, Rob Crittenden wrote: Erinn Looney-Triggs wrote: Rob, Thanks so much for the help. It was the first certificate but other than that you were spot on, we can't all be perfect ;). That fixed the issue and I am now able

Re: [Freeipa-users] CA expiration and renewal

2013-12-03 Thread Erinn Looney-Triggs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 11/27/2013 11:11 AM, Rob Crittenden wrote: Erinn Looney-Triggs wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 11/25/2013 11:09 AM, Rob Crittenden wrote: Erinn Looney-Triggs wrote: Folks just wanted to touch base again before

Re: [Freeipa-users] Dogtag not working?

2013-12-03 Thread Erinn Looney-Triggs
On 12/3/2013 9:45 AM, Rob Crittenden wrote: Erinn Looney-Triggs wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 12/02/2013 10:18 AM, Rob Crittenden wrote: Erinn Looney-Triggs wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 12/02/2013 08:03 AM, Rob Crittenden wrote: Erinn

Re: [Freeipa-users] Dogtag not working?

2013-12-02 Thread Erinn Looney-Triggs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 12/02/2013 07:40 AM, Rob Crittenden wrote: Erinn Looney-Triggs wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 11/28/2013 03:50 PM, Erinn Looney-Triggs wrote: In the process of prepping a replication host for changing over the CA I

Re: [Freeipa-users] Dogtag not working?

2013-12-02 Thread Erinn Looney-Triggs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 12/02/2013 08:03 AM, Rob Crittenden wrote: Erinn Looney-Triggs wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 12/02/2013 07:40 AM, Rob Crittenden wrote: Erinn Looney-Triggs wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1

Re: [Freeipa-users] Dogtag not working?

2013-12-02 Thread Erinn Looney-Triggs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 12/02/2013 10:18 AM, Rob Crittenden wrote: Erinn Looney-Triggs wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 12/02/2013 08:03 AM, Rob Crittenden wrote: Erinn Looney-Triggs wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1

Re: [Freeipa-users] Dogtag not working?

2013-11-29 Thread Erinn Looney-Triggs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 11/28/2013 03:50 PM, Erinn Looney-Triggs wrote: In the process of prepping a replication host for changing over the CA I had to use certmonger to generate another certificate on my secondary IPA server. Unfortunately it seems to fail every

[Freeipa-users] Dogtag not working?

2013-11-28 Thread Erinn Looney-Triggs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 In the process of prepping a replication host for changing over the CA I had to use certmonger to generate another certificate on my secondary IPA server. Unfortunately it seems to fail every single time. Here is what I am running and here is what I

Re: [Freeipa-users] CA expiration and renewal

2013-11-27 Thread Erinn Looney-Triggs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 11/25/2013 11:09 AM, Rob Crittenden wrote: Erinn Looney-Triggs wrote: Folks just wanted to touch base again before the American holiday season starts. My CA, which is subordinate to AD CS will be expiring on December 9th, I submitted a bug

[Freeipa-users] CA expiration and renewal

2013-11-13 Thread Erinn Looney-Triggs
Folks just wanted to touch base again before the American holiday season starts. My CA, which is subordinate to AD CS will be expiring on December 9th, I submitted a bug, y'all drew up docs etc for a plan (thanks). Now I just wanted to see how it was going and if need be what manual steps I will

[Freeipa-users] Renewing CA certificate

2013-10-14 Thread Erinn Looney-Triggs
Folks, I wanted to touch base with y'all about how/if work is progressing on the ability to replace the CA certificate. My certificate is a subordinate of an AD CS instance and will be expiring in December, after two years. Some how, some way, without rebuilding I would like to be able to replace

Re: [Freeipa-users] Renewing CA certificate

2013-10-14 Thread Erinn Looney-Triggs
On 10/14/2013 10:26 AM, Rob Crittenden wrote: Erinn Looney-Triggs wrote: Folks, I wanted to touch base with y'all about how/if work is progressing on the ability to replace the CA certificate. My certificate is a subordinate of an AD CS instance and will be expiring in December, after two

Re: [Freeipa-users] DNS views: request for comments

2013-10-01 Thread Erinn Looney-Triggs
On 10/01/2013 09:11 AM, Petr Spacek wrote: Hello list, we would like to get more details about DNS views and how you use them in real life. Also, any idea how user a interface should work is more than welcome! (If you don't know views, read it as differentiate answer to a DNS query on client's

Re: [Freeipa-users] TLSA records in FreeIPA

2013-09-26 Thread Erinn Looney-Triggs
On 09/24/2013 12:06 PM, Petr Spacek wrote: On 24.9.2013 19:23, Erinn Looney-Triggs wrote: I wanted to bring up the idea of integrating TLSA records into FreeIPA so that a host that is issued a certificate for say the web server (via dogtag) would also publish that information in DNS using

[Freeipa-users] TLSA records in FreeIPA

2013-09-24 Thread Erinn Looney-Triggs
I wanted to bring up the idea of integrating TLSA records into FreeIPA so that a host that is issued a certificate for say the web server (via dogtag) would also publish that information in DNS using a TLSA record. This is very much like how SSHFP records are handled now in FreeIPA. Has this been

Re: [Freeipa-users] Instructions for using Postfix SMTP Client Relay with FreeIPA

2013-07-12 Thread Erinn Looney-Triggs
On 07/12/2013 11:36 AM, Simo Sorce wrote: On Fri, 2013-07-12 at 10:04 -0500, Anthony Messina wrote: On Wednesday, July 10, 2013 05:00:53 PM Dmitri Pal wrote: On 07/10/2013 12:12 PM, Simo Sorce wrote: On Wed, 2013-07-10 at 11:45 -0400, Erinn Looney-Triggs wrote: Folks, I swear I am not trying

Re: [Freeipa-users] IPA CA install in ca-bundle.crt

2013-07-12 Thread Erinn Looney-Triggs
On 07/12/2013 01:25 PM, Rob Crittenden wrote: Erinn Looney-Triggs wrote: On 07/12/2013 01:19 PM, Rob Crittenden wrote: Erinn Looney-Triggs wrote: Is there a reason that ipa-client-install does not add the CA of the IPA server to the ca-bundle.crt file in /etc/pki/certs/? Seems like

Re: [Freeipa-users] Is GSSAPI secure without TLS?

2013-07-12 Thread Erinn Looney-Triggs
On 07/12/2013 05:03 PM, Dmitri Pal wrote: On 07/12/2013 11:33 AM, Erinn Looney-Triggs wrote: GSSAPI inside of a TLS channel apparently isn't secure unless the channel is secure and verified. The irony being that GSSAPI auth outside of a TLS connection is just fine for postfix

[Freeipa-users] Instructions for using Postfix SMTP Client Relay with FreeIPA

2013-07-10 Thread Erinn Looney-Triggs
Folks, I swear I am not trying to drive up traffic to my very small blog, but I wrote up some instruction for how to configure the postfix mail client to use Kerberos to relay through a Postfix gateway. Instructions are here for folks that are interested:

[Freeipa-users] Replacing CA Certificate

2013-06-14 Thread Erinn Looney-Triggs
So my CA certificate in IPA is a subordinate certificate of an AD CS instance. These certificates by default are only valid for two years, and mine will be up come this December. So, I am looking for a way to replace this certificate in IPA. Any thoughts? -Erinn signature.asc Description:

Re: [Freeipa-users] FreeIPA dual stacked

2013-04-15 Thread Erinn Looney-Triggs
On 04/15/2013 09:45 AM, Adam Bishop wrote: Hi, I've just had a go at deploying FreeIPA v3.1.3 and have hit a minor road bump. The server hostname resolves to more than one address: :::::4 xxx.xxx.xxx.180 Please provide the IP address to be used for this host

Re: [Freeipa-users] Upgrading to 6.4 - additional information

2013-02-26 Thread Erinn Looney-Triggs
On 02/26/2013 10:29 AM, Dmitri Pal wrote: On 02/21/2013 12:31 PM, Dmitri Pal wrote: On 02/21/2013 11:44 AM, Erinn Looney-Triggs wrote: On 02/21/2013 09:40 AM, Rob Crittenden wrote: Erinn Looney-Triggs wrote: On 02/21/2013 09:34 AM, Rob Crittenden wrote: Erinn Looney-Triggs wrote: On 02/21

Re: [Freeipa-users] Upgrading to 6.4 - additional information

2013-02-26 Thread Erinn Looney-Triggs
On 02/26/2013 12:08 PM, Martin Kosek wrote: On 02/26/2013 06:05 PM, Erinn Looney-Triggs wrote: On 02/26/2013 10:29 AM, Dmitri Pal wrote: On 02/21/2013 12:31 PM, Dmitri Pal wrote: On 02/21/2013 11:44 AM, Erinn Looney-Triggs wrote: On 02/21/2013 09:40 AM, Rob Crittenden wrote: Erinn Looney

[Freeipa-users] Upgrading to 6.4

2013-02-21 Thread Erinn Looney-Triggs
For the fool hearty amongst us, as in me, I upgraded to RHEL 6.4 today. So far the Web UI portion of IPA is broken. I receive the following error via the UI: IPA Error 903 an internal error has occurred. Other things appear to be working fine, though my testing hasn't been all that thorough at

Re: [Freeipa-users] Upgrading to 6.4

2013-02-21 Thread Erinn Looney-Triggs
On 02/21/2013 09:07 AM, Rob Crittenden wrote: add:attributeTypes: (2.16.840.1.113730.3.8.11.1 NAME 'ipaExternalMember' DESC 'External Group Member Identifier' EQUALITY caseIgnoreMatch ORDERING caseIgnoreOrderingMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 X-ORIGIN 'IPA v3' ) add:objectClasses:

Re: [Freeipa-users] Upgrading to 6.4

2013-02-21 Thread Erinn Looney-Triggs
On 02/21/2013 09:40 AM, Rob Crittenden wrote: Erinn Looney-Triggs wrote: On 02/21/2013 09:34 AM, Rob Crittenden wrote: Erinn Looney-Triggs wrote: On 02/21/2013 09:07 AM, Rob Crittenden wrote: add:attributeTypes: (2.16.840.1.113730.3.8.11.1 NAME 'ipaExternalMember' DESC 'External Group

Re: [Freeipa-users] Upgrading to 6.4

2013-02-21 Thread Erinn Looney-Triggs
On 02/21/2013 09:34 AM, Rob Crittenden wrote: Erinn Looney-Triggs wrote: On 02/21/2013 09:07 AM, Rob Crittenden wrote: add:attributeTypes: (2.16.840.1.113730.3.8.11.1 NAME 'ipaExternalMember' DESC 'External Group Member Identifier' EQUALITY caseIgnoreMatch ORDERING caseIgnoreOrderingMatch

Re: [Freeipa-users] Postponing IPA 3 upgrade

2013-02-11 Thread Erinn Looney-Triggs
On 02/11/2013 10:00 AM, rashard.ke...@sita.aero wrote: I was wondering if I need to be concerned about IPA 2 being updated automatically to IPA 3? We have a working IPA 2 environment in place now and wanted to know if IPA needed to be added to an exclude list. We are afraid of breaking our

Re: [Freeipa-users] Aiisues to wathc out fro / anticipate when upgrading RHEL6.3 and IPA 2 to 6.4 and IPA 3

2013-01-09 Thread Erinn Looney-Triggs
On 01/09/13 00:02, Martin Kosek wrote: On 01/08/2013 11:20 PM, Erinn Looney-Triggs wrote: On 01/08/13 12:45, Rob Crittenden wrote: Erinn Looney-Triggs wrote: On 01/08/13 11:44, Rob Crittenden wrote: Simo Sorce wrote: On Tue, 2013-01-08 at 19:31 +, Steven Jones wrote: HI, I assume RHEL

Re: [Freeipa-users] Aiisues to wathc out fro / anticipate when upgrading RHEL6.3 and IPA 2 to 6.4 and IPA 3

2013-01-08 Thread Erinn Looney-Triggs
On 01/08/13 11:44, Rob Crittenden wrote: Simo Sorce wrote: On Tue, 2013-01-08 at 19:31 +, Steven Jones wrote: HI, I assume RHEL 6.4 is GA shortly just how straigh forward is the upgrade from one IPA version to another please? regards Should just require an rpm upgrade and a restart

Re: [Freeipa-users] Aiisues to wathc out fro / anticipate when upgrading RHEL6.3 and IPA 2 to 6.4 and IPA 3

2013-01-08 Thread Erinn Looney-Triggs
On 01/08/13 11:55, Jakub Hrozek wrote: On Tue, Jan 08, 2013 at 11:49:11AM -0900, Erinn Looney-Triggs wrote: On 01/08/13 11:44, Rob Crittenden wrote: Simo Sorce wrote: On Tue, 2013-01-08 at 19:31 +, Steven Jones wrote: HI, I assume RHEL 6.4 is GA shortly just how straigh forward

Re: [Freeipa-users] Aiisues to wathc out fro / anticipate when upgrading RHEL6.3 and IPA 2 to 6.4 and IPA 3

2013-01-08 Thread Erinn Looney-Triggs
On 01/08/13 12:45, Rob Crittenden wrote: Erinn Looney-Triggs wrote: On 01/08/13 11:44, Rob Crittenden wrote: Simo Sorce wrote: On Tue, 2013-01-08 at 19:31 +, Steven Jones wrote: HI, I assume RHEL 6.4 is GA shortly just how straigh forward is the upgrade from one IPA version to another

Re: [Freeipa-users] authentication with latest putty fails

2013-01-04 Thread Erinn Looney-Triggs
On 01/04/13 06:56, Han Boetes wrote: Your information about the quest putty version seems to be outdated. ;-) Quest Softare no longer maintains recent releases of PuTTY. To obtain the latest stable release of PuTTY please goto PuTTY Download Page * The functionality that was provided by

Re: [Freeipa-users] Disadantages of using external DNS

2012-12-12 Thread Erinn Looney-Triggs
On 12/12/12 09:09, rashard.ke...@sita.aero wrote: What are the disadvantages of using an external DNS source? My three options are install DNS services on the IPA server, use the local Active Directory DNS, or connect to a linux based DNS appliance. Is it common not to use DNS at all if so

[Freeipa-users] Updating the CA certificate

2012-11-05 Thread Erinn Looney-Triggs
I hope I haven't missed it in searching around, but how does one update the CA certificate in IPA? Though it is a year out from expiring I would rather know sooner than later when it comes to this. -Erinn signature.asc Description: OpenPGP digital signature

Re: [Freeipa-users] Updating the CA certificate

2012-11-05 Thread Erinn Looney-Triggs
On 11/05/12 10:25, Rob Crittenden wrote: Erinn Looney-Triggs wrote: I hope I haven't missed it in searching around, but how does one update the CA certificate in IPA? Though it is a year out from expiring I would rather know sooner than later when it comes to this. Kudos for planning

Re: [Freeipa-users] Updating the CA certificate

2012-11-05 Thread Erinn Looney-Triggs
On 11/05/12 10:42, Rob Crittenden wrote: Erinn Looney-Triggs wrote: On 11/05/12 10:25, Rob Crittenden wrote: Erinn Looney-Triggs wrote: I hope I haven't missed it in searching around, but how does one update the CA certificate in IPA? Though it is a year out from expiring I would rather

Re: [Freeipa-users] Process open FD table is full.

2012-11-02 Thread Erinn Looney-Triggs
by the way, though the problem appeared in 6.2 for me. Regards Johan -Original Message- From: freeipa-users-boun...@redhat.com [mailto:freeipa-users-boun...@redhat.com] On Behalf Of Erinn Looney-Triggs Sent: den 1 november 2012 23:15 To: FreeIPAUsers Subject: [Freeipa-users] Process

Re: [Freeipa-users] Process open FD table is full.

2012-11-02 Thread Erinn Looney-Triggs
On 11/02/12 07:28, Rich Megginson wrote: On 11/02/2012 09:06 AM, Simo Sorce wrote: On Fri, 2012-11-02 at 08:38 +, Johan Sunnerstig wrote: Looks a lot like a problem I have as well. Check out the /proc/xxx/fd directory of the dirsrv process for your IPA realm, in my case it's full of dead

[Freeipa-users] Process open FD table is full.

2012-11-01 Thread Erinn Looney-Triggs
Have any folks run into this: PR_Accept() failed, Netscape Portable Runtime error -5971 (Process open FD table is full.) From the dirsrv logs. It appears that this may have been what killed IPA in total on one server for me last night. I can't turn up anything via Google. After a restart of all

Re: [Freeipa-users] SELinux user mapping

2012-08-29 Thread Erinn Looney-Triggs
On 08/28/2012 11:23 PM, Jakub Hrozek wrote: On Tue, Aug 28, 2012 at 01:54:12PM -0800, Erinn Looney-Triggs wrote: I am hoping I haven't missed something here, but it appears that the SELinux user mapping portion is not working for me. This is tested on a RHEL 6.3 client and server. The rule I

[Freeipa-users] SELinux user mapping

2012-08-28 Thread Erinn Looney-Triggs
I am hoping I haven't missed something here, but it appears that the SELinux user mapping portion is not working for me. This is tested on a RHEL 6.3 client and server. The rule I have: Rule name: Developers staff_U SELinux User: staff_u:s0-s0:c0.c1023 Description: Confines developers on

Re: [Freeipa-users] Lost dse.ldif

2012-08-16 Thread Erinn Looney-Triggs
On 08/16/2012 11:18 AM, Sigbjorn Lie wrote: On 08/16/2012 09:08 PM, Rich Megginson wrote: On 08/16/2012 11:46 AM, Erinn Looney-Triggs wrote: On 08/15/2012 05:13 PM, Rich Megginson wrote: On 08/15/2012 03:58 PM, Erinn Looney-Triggs wrote: After a restart of the system I received the following

[Freeipa-users] Lost dse.ldif

2012-08-15 Thread Erinn Looney-Triggs
After a restart of the system I received the following errors: Starting dirsrv: FOO-COM...[15/Aug/2012:21:48:26 +] startup - The default password storage scheme SSHA could not be read or was not found in the file /etc/dirsrv/slapd-FOO-COM/dse.ldif. It is mandatory.

Re: [Freeipa-users] cannot find name for user ID

2012-08-09 Thread Erinn Looney-Triggs
On 08/08/2012 01:11 PM, Jakub Hrozek wrote: On Wed, Aug 08, 2012 at 10:45:47AM -0800, Erinn Looney-Triggs wrote: An interesting problem has popped up and I am not sure where the issue lies. Users logging in are presented with cannot find name for user ID etc. etc. for all groups

Re: [Freeipa-users] cannot find name for user ID

2012-08-09 Thread Erinn Looney-Triggs
On 08/08/2012 01:11 PM, Jakub Hrozek wrote: On Wed, Aug 08, 2012 at 10:45:47AM -0800, Erinn Looney-Triggs wrote: An interesting problem has popped up and I am not sure where the issue lies. Users logging in are presented with cannot find name for user ID etc. etc. for all groups

[Freeipa-users] cannot find name for user ID

2012-08-08 Thread Erinn Looney-Triggs
An interesting problem has popped up and I am not sure where the issue lies. Users logging in are presented with cannot find name for user ID etc. etc. for all groups they are a member of id returns nothing but the numbers, and a getent passwd username returns nothing, when running as the user.

Re: [Freeipa-users] cannot find name for user ID

2012-08-08 Thread Erinn Looney-Triggs
On 08/08/2012 01:11 PM, Jakub Hrozek wrote: On Wed, Aug 08, 2012 at 10:45:47AM -0800, Erinn Looney-Triggs wrote: An interesting problem has popped up and I am not sure where the issue lies. Users logging in are presented with cannot find name for user ID etc. etc. for all groups

Re: [Freeipa-users] stopping su -

2012-07-16 Thread Erinn Looney-Triggs
On 07/16/2012 01:32 PM, Steven Jones wrote: I have craeted a sshd rule only for the HBAC, but I find a std user can su - to root, is this correect behavior? How do I? or can I? stop this unless explicitly allowed? regards Steven Jones Technical Specialist - Linux RHCE Victoria

Re: [Freeipa-users] stopping su -

2012-07-16 Thread Erinn Looney-Triggs
University, Wellington, NZ 0064 4 463 6272 From: freeipa-users-boun...@redhat.com [freeipa-users-boun...@redhat.com] on behalf of Erinn Looney-Triggs [erinn.looneytri...@gmail.com] Sent: Tuesday, 17 July 2012 9:38 a.m. To: freeipa-users@redhat.com

Re: [Freeipa-users] IPA dogtag as CA for puppet ?

2012-05-21 Thread Erinn Looney-Triggs
On 05/21/2012 01:00 PM, Jan-Frode Myklebust wrote: If joining a machine to IPA automatically gives it a SSL keyset, it seems silly to also join the puppetca for config management. Has anybody looked into using IPA-dogtag as CA for puppet and func? -jf

[Freeipa-users] Searching for subjectKeyIdentifier in SSL certs

2012-02-22 Thread Erinn Looney-Triggs
It looks like, as far as I can tell, the IPA pki setup does not by default include subjectKeyIdentifier in the SSL certificates issued. I am using ipa-getcert -f foo -k bar, to generate and submit the request. I am a little hazy about how all of this fits together at this point, so please forgive

Re: [Freeipa-users] Jabber services for IPA

2012-02-09 Thread Erinn Looney-Triggs
On 02/09/2012 06:48 AM, Dale Macartney wrote: Morning all I have a working setup of ejabberd authenticated to pam on an IPA client which works great.. However, unlike my other projects to provide details of integration with IPA, I am struggling with the SSO aspect of it, simply because

Re: [Freeipa-users] IPA Sudo - RHEL5

2012-02-01 Thread Erinn Looney-Triggs
On 02/01/2012 03:43 AM, Westerlund Johnny wrote: You pointed me in the correct direction. I only needed to setup ldap.conf in a correct way and it worked perfectly. the documentation for setting up sudo on rhel6 describes how to setup the nslcd.conf, i just did ldap.conf a symlink of that

Re: [Freeipa-users] Dovecot imap authentication with IPA/Kerberos

2012-01-30 Thread Erinn Looney-Triggs
On 01/30/2012 10:20 AM, Dale Macartney wrote: Hi Erinn I originally asked the question as I was thinking my auth attempts were failing when using ipa, however this was not the case. On closer inspection, i found that the authentication was successful yet dovecot was failing to read a

Re: [Freeipa-users] WebUI With Windows, Firefox, and MIT Kerberos

2012-01-28 Thread Erinn Looney-Triggs
On 1/27/2012 4:53 PM, JR Aquino wrote: On Jan 27, 2012, at 5:31 PM, Jr Aquino wrote: Has anyone successfully gotten firefox in windows with firefox and mit kerberos? I've followed several how to's, but i cant get firefox to take/pass my tgt. The Key to success:

Re: [Freeipa-users] Sudo options

2012-01-18 Thread Erinn Looney-Triggs
On 01/18/2012 11:50 AM, JR Aquino wrote: On Jan 18, 2012, at 11:47 AM, Erinn Looney-Triggs wrote: I can't really figure out what the proper syntax is for the sudo rules in IPA. I have a number of options that I would like included by default, I have put them in place, from ipa sudorule-show

  1   2   >