Am Thu, Sep 02, 2021 at 11:41:47AM -0500 schrieb Spike White:
> OK,
> 
> That particular candidate seems like a very unusual end corner case.  Where
> someone cloned an existing VM, renamed it, re-IP'd and (incorrectly)
> re-joined it to AD.
> 
> I saw "incorrectly", because they did not clear the existing
> /etc/krb5.keytab file prior to the re-join.  Hence, the old bogus entries
> in /etc/krb5.keytab with the original hostname -- which confused adcli.
> 
> BTW, Sumit -- I completely understand what you're saying about AD and
> TGTs.  You can request TGT tickets only off your UPN.  So our UPN is always
> 'host/fqdn@REALM'.  in AD, you cannot request TGT tickets off your SPNs.
> In other Kerberos implementations, they allow you to request TGT tickets
> off SPNs -- but not AD.  AD does not allow that.   So I completely get the
> difference between kinit -k and adcli.
> 
> I think a better command-line test for us to troubleshoot sssd would be
> request a Kerberos service ticket, not a Kerberos TGT ticket.    But I
> don't know how to do that on the command line (kinit only requests TGT
> tickets and renews tickets).   We use 'adcli testjoin' to simulate sssd
> Kerberos initialization.

Hi,

you can use 'kvno' to request a service ticket on the command line.

> 
> Anyway, back to our research.  We have now found 8 candidates that has AD
> attribute 'passwordLastSet' between 31 days and 40 days.  (Actually, two
> are at 40 days, so probably AD has locked those machine accounts.)
> 
> On this first candidate, we think it's another one-off for that particular
> server.  CPU pegged at 100% since Aug 9.  We rebooted, set debug_level 9
> and it appears to have renewed this first attempt (based on timestamps).
> We see this output in the sssd_amer.company.com.log
> 
> (2021-09-01 14:44:36): [be[amer.company.com]]
> [ad_machine_account_password_renewal_done] (0x1000):  --- adcli output
> start---
> ---adcli output end---
> (2021-09-01 14:44:36): [be[amer.company.com]] [be_ptask_done] (0x0400):
> Task [AD machine account password renewal]: finished successfully
> (2021-09-01 14:44:36): [be[amer.company.com]] [be_ptask_schedule] (0x0400):
> Task [AD machine account password renewal]: scheduling task 86400 seconds
> from last execution time [1630608275]
> 
> We saw a second update attempt later (today?) with a lot of  adcli output,
> but it said:
> 
> ...--- adcli output start---
> ...
>  * Password not too old, no change needed
> ...
> ---adcli output end---
> 
> So we suspect this candidate is yet another edge-corner case (CPU at 100%
> -- not able to adcli update).
> 
> Looking at the next couple of candidates, these are a more interesting (&
> seemingly more common) case.  They updated their entry in AD, but the local
> /etc/krb5.keytab file was not updated.  These happen to be OL7 servers (but
> we have a RHEL7 candidate at 40 days non-check-in).    Because these are
> *L7, it's not the Kerberos UDP kpasswd problem (that's only on RHEL6/OL6).

I recently came across a similar issue where an older SELinux policy was
installed which prevented 'adcli' called from SSSD under SSSD's SELinux
context to write to the keytab.

bye,
Sumit

> 
> Let's take the first one.  casnlrritpgm206. According to AD,  it has a
> 'passwordLastSet' of 7/28/2021.
> 
>  PS C:\Users\spike_white> get-adcomputer casnlrritpgm206  -properties
> 'passwordLastSet'
> 
> DistinguishedName :
> CN=CASNLRRITPGM206,OU=Servers,OU=UNIX,DC=amer,DC=company,DC=com
> DNSHostName       : casnlrritpgm206.us.company.com
> Enabled           : True
> Name              : CASNLRRITPGM206
> ObjectClass       : computer
> ObjectGUID        : f9fa2b5b-75b6-434b-8e94-477599d1afca
> PasswordLastSet   : 7/28/2021 10:04:49 PM
> SamAccountName    : CASNLRRITPGM206$
> SID               : S-1-5-21-1802859667-647903414-1863928812-3091065
> UserPrincipalName : host/casnlrritpgm206.us.company....@amer.company.com
> 
> It has a 'msDS-KeyVersionNumber' of 7.
> 
> but in the local /etc/krb5.keytab file, it has a last KVNO of 6 with a
> timestamp of 6/28:
> 
> Keytab name: FILE:/etc/krb5.keytab
> 
> KVNO Timestamp           Principal
> 
> ---- -------------------
> ------------------------------------------------------
> 
>    6 06/28/2021 06:53:30 CASNLRRITPGM206$@AMER.COMPANY.COM (arcfour-hmac)
> 
>    6 06/28/2021 06:53:30 CASNLRRITPGM206$@AMER.COMPANY.COM
> (aes128-cts-hmac-sha1-96)
> 
>    6 06/28/2021 06:53:30 CASNLRRITPGM206$@AMER.COMPANY.COM
> (aes256-cts-hmac-sha1-96)
> 
>    6 06/28/2021 06:53:30 host/
> casnlrritpgm206.us.company....@amer.company.com (arcfour-hmac)
> 
>    6 06/28/2021 06:53:30 host/
> casnlrritpgm206.us.company....@amer.company.com (aes128-cts-hmac-sha1-96)
> 
>    6 06/28/2021 06:53:30 host/
> casnlrritpgm206.us.company....@amer.company.com (aes256-cts-hmac-sha1-96)
> 
>    6 06/28/2021 06:53:30 host/casnlrritpgm...@amer.company.com
> (arcfour-hmac)
> 
>    6 06/28/2021 06:53:30 host/casnlrritpgm...@amer.company.com
> (aes128-cts-hmac-sha1-96)
> 
>    6 06/28/2021 06:53:30 host/casnlrritpgm...@amer.company.com
> (aes256-cts-hmac-sha1-96)
> 
>    6 06/28/2021 06:53:30 RestrictedKrbHost/casnlrritpgm...@amer.company.com
> (arcfour-hmac)
> 
>    6 06/28/2021 06:53:31 RestrictedKrbHost/casnlrritpgm...@amer.company.com
> (aes128-cts-hmac-sha1-96)
> 
>    6 06/28/2021 06:53:31 RestrictedKrbHost/casnlrritpgm...@amer.company.com
> (aes256-cts-hmac-sha1-96)
> 
>    6 06/28/2021 06:53:31 RestrictedKrbHost/
> casnlrritpgm206.us.company....@amer.company.com (arcfour-hmac)
> 
>    6 06/28/2021 06:53:31 RestrictedKrbHost/
> casnlrritpgm206.us.company....@amer.company.com (aes128-cts-hmac-sha1-96)
> 
>    6 06/28/2021 06:53:31 RestrictedKrbHost/
> casnlrritpgm206.us.company....@amer.company.com (aes256-cts-hmac-sha1-96)
> 
>    5 05/29/2021 02:08:37 CASNLRRITPGM206$@AMER.COMPANY.COM (arcfour-hmac)
> 
>    5 05/29/2021 02:08:37 CASNLRRITPGM206$@AMER.COMPANY.COM
> (aes128-cts-hmac-sha1-96)
> 
>    5 05/29/2021 02:08:37 CASNLRRITPGM206$@AMER.COMPANY.COM
> (aes256-cts-hmac-sha1-96)
> 
> 
> So 7/28 is 30 days after 6/28.    It appears on 7/28 that sssd invoked
> adcli update to update the machine account password in AD.  adcli update
> updated it in AD, but not in the local /etc/krb5.keytab file.
> 
> 
> The next candidate is similar.  It has a KVNO in AD one more than in
> /etc/krb5.keytab file with a timestamp 30 days past the timestamp of the
> latest entry in /etc/krb5.keytab file.
> 
> 
> This sure seems similar to the Kerberos kpasswd UDP problem.  But it's not
> -- krb5-libs quit using UDP for kpasswd after RHEL6/OL6.
> 
> 
> We know how to remediate when we hit such a candidate.  adcli update with
> the valid user principal and valid login ccache of a principal that have AD
> privs to update these machine accounts.
> 
> 
> So -- this is the ultimate question?  *Why* is this happening?  Why is the
> adcli update (called by sssd) updating the passwd in AD and
> the msDS-KeyVersionNumber, but not updating /etc/krb5.keytab?
> 
> 
> I think this is the common case that we're seeing -- that these other cases
> (plus one other) are the unusual end-corner cases.
> 
> 
> Spike
> 
> On Thu, Sep 2, 2021 at 12:49 AM Sumit Bose <sb...@redhat.com> wrote:
> 
> > Am Wed, Sep 01, 2021 at 11:39:30AM -0500 schrieb Spike White:
> > > So to respond to my own email, but a co-worker did finally find some
> > > references to that bizarre name ZZZKBTDURBOL8.
> > >
> > > [root@nwpllv8bu100 post_install]# klist -kte
> > > Keytab name: FILE:/etc/krb5.keytab
> > > KVNO Timestamp           Principal
> > > ---- -------------------
> > > ------------------------------------------------------
> > >    2 07/13/2021 16:42:17 ZZZKBTDURBOL8$@AMER.COMPANY.COM
> > > (aes128-cts-hmac-sha1-96)
> > >    2 07/13/2021 16:42:17 ZZZKBTDURBOL8$@AMER.COMPANY.COM
> > > (aes256-cts-hmac-sha1-96)
> > >    2 07/13/2021 16:42:17 host/
> > > zzzkbtdurbol8.amer.company....@amer.company.com
> > (aes128-cts-hmac-sha1-96)
> > >    2 07/13/2021 16:42:17 host/
> > > zzzkbtdurbol8.amer.company....@amer.company.com
> > (aes256-cts-hmac-sha1-96)
> > >    2 07/13/2021 16:42:17 host/zzzkbtdurb...@amer.company.com
> > > (aes128-cts-hmac-sha1-96)
> > >    2 07/13/2021 16:42:17 host/zzzkbtdurb...@amer.company.com
> > > (aes256-cts-hmac-sha1-96)
> > >    2 07/13/2021 16:42:17 RestrictedKrbHost/
> > zzzkbtdurb...@amer.company.com
> > > (aes128-cts-hmac-sha1-96)
> > >    2 07/13/2021 16:42:17 RestrictedKrbHost/
> > zzzkbtdurb...@amer.company.com
> > > (aes256-cts-hmac-sha1-96)
> > >    2 07/13/2021 16:42:17 RestrictedKrbHost/
> > > zzzkbtdurbol8.amer.company....@amer.company.com
> > (aes128-cts-hmac-sha1-96)
> > >    2 07/13/2021 16:42:17 RestrictedKrbHost/
> > > zzzkbtdurbol8.amer.company....@amer.company.com
> > (aes256-cts-hmac-sha1-96)
> > >    3 07/29/2021 13:38:27 NWPLLV8BU100$@AMER.COMPANY.COM
> > > (DEPRECATED:arcfour-hmac)
> > >    3 07/29/2021 13:38:27 NWPLLV8BU100$@AMER.COMPANY.COM
> > > (aes128-cts-hmac-sha1-96)
> > >    3 07/29/2021 13:38:27 NWPLLV8BU100$@AMER.COMPANY.COM
> > > (aes256-cts-hmac-sha1-96)
> > >    3 07/29/2021 13:38:27 host/
> > nwpllv8bu100.amer.company....@amer.company.com
> > > (DEPRECATED:arcfour-hmac)
> > >    3 07/29/2021 13:38:27 host/
> > nwpllv8bu100.amer.company....@amer.company.com
> > > (aes128-cts-hmac-sha1-96)
> > >    3 07/29/2021 13:38:27 host/
> > nwpllv8bu100.amer.company....@amer.company.com
> > > (aes256-cts-hmac-sha1-96)
> > >    3 07/29/2021 13:38:27 host/nwpllv8bu...@amer.company.com
> > > (DEPRECATED:arcfour-hmac)
> > >    3 07/29/2021 13:38:27 host/nwpllv8bu...@amer.company.com
> > > (aes128-cts-hmac-sha1-96)
> > >    3 07/29/2021 13:38:27 host/nwpllv8bu...@amer.company.com
> > > (aes256-cts-hmac-sha1-96)
> > >    3 07/29/2021 13:38:27 RestrictedKrbHost/nwpllv8bu...@amer.company.com
> > > (DEPRECATED:arcfour-hmac)
> > >    3 07/29/2021 13:38:27 RestrictedKrbHost/nwpllv8bu...@amer.company.com
> > > (aes128-cts-hmac-sha1-96)
> > >    3 07/29/2021 13:38:27 RestrictedKrbHost/nwpllv8bu...@amer.company.com
> > > (aes256-cts-hmac-sha1-96)
> > >    3 07/29/2021 13:38:27 RestrictedKrbHost/
> > > nwpllv8bu100.amer.company....@amer.company.com (DEPRECATED:arcfour-hmac)
> > >    3 07/29/2021 13:38:27 RestrictedKrbHost/
> > > nwpllv8bu100.amer.company....@amer.company.com (aes128-cts-hmac-sha1-96)
> > >    3 07/29/2021 13:38:27 RestrictedKrbHost/
> > > nwpllv8bu100.amer.company....@amer.company.com (aes256-cts-hmac-sha1-96)
> > >
> > > I realize this is reflecting the literal entries in the /etc/krb5.keytab
> > > file.  So it appears that when this VM was born (on July 13th), it was
> > > named zzzkbtdurbo18.amer.company.com.   (I see other supporting evidence
> > > for this).  On or before July 29th, it was renamed to final FQDN
> > > nwpllv8bu100.amer.company.com.  /etc/hostname, /etc/hosts,
> > > /etc/sysconfig/network etc were all updated and it was rejoined to AD.
> > >
> > > kinit -k works fine.  It picks up the current hostname and apparently
> > uses
> > > host/nwpllv8bu100.amer.company....@amer.company.com as its service
> > > principal.  Since there's a valid entry in /etc/krb5.keytab file for
> > this,
> > > it uses this and all is good.  (I'm guessing it uses the 14th or 15th
> > > /etc/krb5.keytab file entry above.)
> > >
> > > sssd works, because it has this line:
> > >
> > > ldap_sasl_authid = host/nwpllv8bu100.amer.company....@amer.company.com
> > >
> > > But when sssd invokes adcli update to refresh the machine account
> > password,
> > > adcli update fails.
> > >
> > > Also, I see that adcli testjoin fails.
> > >
> > > [root@nwpllv8bu100 tmp]# adcli testjoin -D AMER.COMPANY.COM
> > > adcli: couldn't connect to AMER.COMPANY.COM domain: Couldn't
> > authenticate
> > > as machine account: ZZZKBTDURBOL8: Preauthentication failed
> > > [root@nwpllv8bu100 tmp]#
> > >
> > > From a strace of this adcli testjoin, it appears that adcli is opening
> > the
> > > /etc/krb5.keytab file to determine the default service principal to use
> > and
> > > is pulling the old server name.  (instead of using the correct service
> > > principal, as kinit -k somehow does.)
> >
> > Hi,
> >
> > it looks like your environment is a bit special. I guess you have added
> > 'host/nwpllv8bu100.amer.company....@amer.company.com' to the
> > 'userPrincipalName' LDAP attribute in the AD computer object for this
> > host.
> >
> > # klist -k
> > Keytab name: FILE:/etc/krb5.keytab
> > KVNO Principal
> > ----
> > --------------------------------------------------------------------------
> >    2 MASTER$@CHILD.AD.VM
> >    2 MASTER$@CHILD.AD.VM
> >    2 host/mas...@child.ad.vm
> >    2 host/mas...@child.ad.vm
> >    2 host/master.client...@child.ad.vm
> >    2 host/master.client...@child.ad.vm
> >    2 RestrictedKrbHost/mas...@child.ad.vm
> >    2 RestrictedKrbHost/mas...@child.ad.vm
> >    2 RestrictedKrbHost/master.client...@child.ad.vm
> >    2 RestrictedKrbHost/master.client...@child.ad.vm
> > # kdestroy -A
> > #
> > #
> > # kinit -k
> > kinit: Client 'host/master.client...@child.ad.vm' not found in Kerberos
> > database while getting initial credentials
> > # kinit -k 'MASTER$@CHILD.AD.VM'
> >
> >
> > The reason is that 'kinit -k' constructs the principal by calling
> > gethostname() or similar, adding the 'host/' prefix and the realm. But
> > by default this principal in AD is only a service principal can cannot
> > be used to request a TGT as kinit does. AD only allows user principals
> > for request a TGT and this is by default 'SHORT$@AD.REALM'. If the
> > userPrincipalName attribute is set, this principal given here is allowed
> > as well.
> >
> > That's why adcli is checking the keytab for a principal with a '$'
> > character and by default it uses the first it finds because it is
> > expected there is only one. Adding some heuristics in case there are
> > more '$' principals in the keytab like highest KVNO might help in some
> > cases but would fail in other cases so I think just using the first is
> > good enough.
> >
> >
> > >
> > > Maybe when sssd constructs this adcli update invocation, it's not passing
> > > the ldap_sasl_authid, so the adcli update is doing the above logic to
> > pull
> > > the old server name?
> >
> > Adding a new option to adcli and using the value from ldap_sasl_authid
> > might be a solution, I will think about it.
> >
> > HTH
> >
> > bye,
> > Sumit
> >
> > >
> > > Sounds like an adcli problem.  Adcli should do as 'kinit -k' does when
> > it's
> > > passed no explicit service principal.  Should dive into /etc/krb5.keytab
> > > file and use the most recent set of entries (KVNO = 3 in above example).
> > > Maybe derive the default service principal off the current FQDN and
> > > Kerberos realm?
> > >
> > > Spike
> > > PS As a general policy, we are not supposed to clone a VM and rename it
> > to
> > > another FQDN/IP address.  I'll be trying to track down who did this and
> > for
> > > what reason.
> > >
> > > On Wed, Sep 1, 2021 at 10:08 AM Spike White <spikewhit...@gmail.com>
> > wrote:
> > >
> > > > Ok, this is *very* illuminating!
> > > >
> > > > I see this in sssd_amer.company.com.log"
> > > >
> > > > (2021-09-01  3:44:46): [be[amer.company.com]]
> > > > [ad_machine_account_password_renewal_done] (0x1000): --- adcli output
> > > > start---
> > > > adcli: couldn't connect to amer.company.com domain: Couldn't
> > authenticate
> > > > as machine account: ZZZKBTDURBOL8: Preauthentication failed
> > > > ---adcli output end---
> > > >
> > > > However, I don't find that host name ZZZKBTDURBOL8 anywhere on the
> > > > system.  (By company convention, servers named ZZZ* are test servers
> > that
> > > > linux SEs spin up themselves).
> > > >
> > > > This server that's not renewing its creds is named:
> > > > nwpllv8bu100.amer.company.com.  it's a std dev server.  in
> > > > /etc/sssd/sssd.conf file, it has that as its sasl auth ID:
> > > >
> > > > [root@nwpllv8bu100 sssd]# grep sasl /etc/sssd/sssd.conf
> > > > ldap_sasl_authid = host/nwpllv8bu100.amer.dell....@amer.company.com
> > > > [root@nwpllv8bu100 sssd]#
> > > >
> > > > If I do 'kinit -k',  the /etc/krb5.keytab file has that name as well:
> > > >
> > > > [root@nwpllv8bu100 sssd]# kinit -k
> > > > [root@nwpllv8bu100 sssd]# klist
> > > > Ticket cache: KCM:0
> > > > Default principal: host/nwpllv8bu100.amer.dell....@amer.company.com
> > > >
> > > > Valid starting       Expires              Service principal
> > > > 09/01/2021 11:04:16  09/01/2021 21:04:16  krbtgt/
> > > > amer.dell....@amer.company.com
> > > >         renew until 09/08/2021 11:04:16
> > > > [root@nwpllv8bu100 sssd]#
> > > >
> > > > I searched /etc/sssd/sssd.conf -- no "zzz" or "ZZZ" string is anywhere
> > in
> > > > there.   So where is sssd picking up this name ZZZKBTDURBOL8 and
> > passing it
> > > > to adcli update?
> > > >
> > > > Spike
> > > >
> > > >
> > > >
> > > >
> > > >
> > > >
> > > >
> > > > On Wed, Sep 1, 2021 at 2:46 AM Sumit Bose <sb...@redhat.com> wrote:
> > > >
> > > >> Am Tue, Aug 31, 2021 at 09:53:01PM +0200 schrieb Alexey Tikhonov:
> > > >> > On Tue, Aug 31, 2021 at 6:47 PM Spike White <spikewhit...@gmail.com
> > >
> > > >> wrote:
> > > >> >
> > > >> > > All,
> > > >> > >
> > > >> > > OK we have a query we run in AD for machine account passwords for
> > a
> > > >> > > certain age.  In today's run, 31 - 32 days.  Then we verify it's
> > > >> pingable.
> > > >> > >
> > > >> > > We have found such one such suspicious candidate today (two
> > actually,
> > > >> but
> > > >> > > the other Linux server is quite sick).  So one good research
> > > >> candidate.
> > > >> > > According to both AD and /etc/krb5.keytab file, the machine
> > account
> > > >> > > password was last set on 7/29.  Today is 8/31, so that would be 32
> > > >> days.
> > > >> > > This 'automatic machine account keytab renewal'  background task
> > > >> should
> > > >> > > trigger again today.
> > > >> > >
> > > >> > > sssd service was last started 2 weeks ago and, by all appearances,
> > > >> appears
> > > >> > > healthy.  sssctl domain-status <domain> shows online, connected
> > to AD
> > > >> > > servers (both domain and GC servers)..  All logins and group
> > > >> enumerations
> > > >> > > working as expected.
> > > >> > >
> > > >> > > Just now, we dynamically set the debug level to 9 with 'sssctl
> > > >> debug-level
> > > >> > > 9'.  This particular server is Oracle Linux 8.4,
> > > >> > > running sssd-*-2.4.0-9.0.1.el8_4.1.x86_64.   Installed July 13th,
> > > >> 2021.  So
> > > >> > > -- very recent sssd version.  (This problem occurs with both RHEL
> > & OL
> > > >> > > 6/7/8, it's just today's candidate happens to be OL8.)
> > > >> > >
> > > >> > > We can't keep debug level 9 up for a great many days;  it swamps
> > the
> > > >> > > /var/log filesystem.  But we can leave up for a few days.  We
> > > >> purposely did
> > > >> > > not restart sssd server as we know that would trigger a machine
> > > >> account
> > > >> > > renewal.
> > > >> > >
> > > >> > > Speaking of that -- from Sumit's sssd source code in
> > > >> > > ad_provider/ad_machine_pw_renewal.c, it appears that sssd is
> > creating
> > > >> a
> > > >> > > back-end task to call external program /usr/sbin/adcli with
> > certain
> > > >> args.
> > > >> > >  What string can I look for in which sssd log file (now that I
> > have
> > > >> debug
> > > >> > > level 9 enabled) to tell me when this 'adcli update' task (aka
> > > >> 'automatic
> > > >> > > machine account keytab renewal')  is triggered?
> > > >> > >
> > > >> >
> > > >> > It seems SSSD itself only logs in case of errors. I didn't find any
> > > >> > explicit logs around `ad_machine_account_password_renewal_send()`.
> > > >> > But perhaps there will be something like "[be_ptask_execute]
> > (0x0400):
> > > >> Task
> > > >> > [AD machine account password renewal]: executing task" from generic
> > > >> > be_ptask_* helpers in the sssd_$domain.log (I'm not sure).
> > > >> >
> > > >> > Also at this verbosity level `--verbose` should be supplied to adcli
> > > >> itself
> > > >> > and I guess output should be captured in sssd_$domain.log as well.
> > I'm
> > > >> not
> > > >> > familiar with `adcli` internals, you can take a glance at
> > > >> > https://gitlab.freedesktop.org/realmd/adcli to find its log
> > messages.
> > > >>
> > > >> Hi,
> > > >>
> > > >> if SSSD's debug_level is 7 or higher the '--verbose' option is set
> > > >> when calling adcli and the output is added to the backend logs. It
> > will
> > > >> start with log message "--- adcli output start---".
> > > >>
> > > >> HTH
> > > >>
> > > >> bye,
> > > >> Sumit
> > > >>
> > > >> >
> > > >> >
> > > >> > >
> > > >> > > I'm less certain now that we've surveyed our env that this
> > background
> > > >> > > 'adcli update' task is the reason behind 70 - 80 servers / month
> > > >> dropping
> > > >> > > off the domain.  It might be a slight contributor, but I find
> > only a
> > > >> very
> > > >> > > few pingable servers with machine account last renewal date
> > between
> > > >> 30 and
> > > >> > > 40 days.
> > > >> > >
> > > >> > > Yes, I can disable this default 30 day automatic update and roll
> > my
> > > >> own
> > > >> > > 'adcli update' cron.  But that's a mass deployment, to fix what
> > might
> > > >> not
> > > >> > > be the problem.   I want to verify this is the actual culprit
> > before
> > > >> I take
> > > >> > > those drastic steps.
> > > >> > >
> > > >> > > Spike
> > > >> > >
> > > >> > >
> > > >>
> > > >> > _______________________________________________
> > > >> > sssd-users mailing list -- sssd-users@lists.fedorahosted.org
> > > >> > To unsubscribe send an email to
> > sssd-users-le...@lists.fedorahosted.org
> > > >> > Fedora Code of Conduct:
> > > >> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> > > >> > List Guidelines:
> > https://fedoraproject.org/wiki/Mailing_list_guidelines
> > > >> > List Archives:
> > > >>
> > https://lists.fedorahosted.org/archives/list/sssd-users@lists.fedorahosted.org
> > > >> > Do not reply to spam on the list, report it:
> > > >> https://pagure.io/fedora-infrastructure
> > > >> _______________________________________________
> > > >> sssd-users mailing list -- sssd-users@lists.fedorahosted.org
> > > >> To unsubscribe send an email to
> > sssd-users-le...@lists.fedorahosted.org
> > > >> Fedora Code of Conduct:
> > > >> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> > > >> List Guidelines:
> > https://fedoraproject.org/wiki/Mailing_list_guidelines
> > > >> List Archives:
> > > >>
> > https://lists.fedorahosted.org/archives/list/sssd-users@lists.fedorahosted.org
> > > >> Do not reply to spam on the list, report it:
> > > >> https://pagure.io/fedora-infrastructure
> > > >>
> > > >
> >
> > > _______________________________________________
> > > sssd-users mailing list -- sssd-users@lists.fedorahosted.org
> > > To unsubscribe send an email to sssd-users-le...@lists.fedorahosted.org
> > > Fedora Code of Conduct:
> > https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> > > List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> > > List Archives:
> > https://lists.fedorahosted.org/archives/list/sssd-users@lists.fedorahosted.org
> > > Do not reply to spam on the list, report it:
> > https://pagure.io/fedora-infrastructure
> > _______________________________________________
> > sssd-users mailing list -- sssd-users@lists.fedorahosted.org
> > To unsubscribe send an email to sssd-users-le...@lists.fedorahosted.org
> > Fedora Code of Conduct:
> > https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> > List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> > List Archives:
> > https://lists.fedorahosted.org/archives/list/sssd-users@lists.fedorahosted.org
> > Do not reply to spam on the list, report it:
> > https://pagure.io/fedora-infrastructure
> >

> _______________________________________________
> sssd-users mailing list -- sssd-users@lists.fedorahosted.org
> To unsubscribe send an email to sssd-users-le...@lists.fedorahosted.org
> Fedora Code of Conduct: 
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives: 
> https://lists.fedorahosted.org/archives/list/sssd-users@lists.fedorahosted.org
> Do not reply to spam on the list, report it: 
> https://pagure.io/fedora-infrastructure
_______________________________________________
sssd-users mailing list -- sssd-users@lists.fedorahosted.org
To unsubscribe send an email to sssd-users-le...@lists.fedorahosted.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedorahosted.org/archives/list/sssd-users@lists.fedorahosted.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure

Reply via email to