Discussion:
[Freeipa-users] Broken dirsrv and SSL certificate in CA-less install of FreeIPA 4.4 on CentOS 7.3
Peter Pakos
2016-12-29 12:52:55 UTC
Permalink
Hi guys,

I'm facing yet another problem with CA-less install of FreeIPA replica and
3rd party SSL certificate.

Few days ago I deployed a new CA-less server (ipa02) by running the
following command:

ipa-server-install \
-r PAKOS.UK \
-n pakos.uk \
-p 'password' \
-a 'password' \
--mkhomedir \
--setup-dns \
--no-forwarders \
--no-dnssec-validation \
--dirsrv-cert-file=/root/ssl/star.pakos.uk.pfx \
--dirsrv-pin='' \
--http-cert-file=/root/ssl/star.pakos.uk.pfx \
--http-pin='' \
--http-cert-name=AlphaWildcardIPA \
--idstart=1000
This server appears to be working OK.

Then yesterday I deployed a client (ipa01):

ipa-client-install \
-p admin \
-w 'password' \
--mkhomedir
Next, I promoted it to IPA server:

ipa-replica-install \
-w 'password' \
--mkhomedir \
--setup-dns \
--no-forwarders \
--no-dnssec-validation \
--dirsrv-cert-file=/root/ssl/star.pakos.uk.pfx \
--dirsrv-pin='' \
--dirsrv-cert-name=AlphaWildcardIPA \
--http-cert-file=/root/ssl/star.pakos.uk.pfx \
--http-pin='' \
--http-cert-name=AlphaWildcardIPA
After it finished, I've noticed that dirsrv wasn't running on port 636 on
ipa01.

Further investigation revealed that the SSL wildcard certificate
(AlphaWildcardIPA) wasn't installed in dirsrv DB and CA certificates were
named oddly (CA 1 and CA 2):

[***@ipa01 ~]# certutil -L -d /etc/httpd/alias/

Certificate Nickname Trust Attributes
SSL,S/MIME,JAR/XPI

AlphaWildcardIPA u,u,u
CA 1 ,,
CA 2 C,,


[***@ipa01 ~]# certutil -L -d /etc/dirsrv/slapd-PAKOS-UK/

Certificate Nickname Trust Attributes
SSL,S/MIME,JAR/XPI

GlobalSign Root CA - GlobalSign nv-sa ,,
AlphaSSL CA - SHA256 - G2 - GlobalSign nv-sa C,,


This is what I found in the error log:

[29/Dec/2016:01:43:58.852745536 +0000] 389-Directory/1.3.5.10
B2016.341.2222 starting up
[29/Dec/2016:01:43:58.867642515 +0000] default_mr_indexer_create:
warning - plugin [caseIgnoreIA5Match] does not handle
caseExactIA5Match
[29/Dec/2016:01:43:58.889866051 +0000] schema-compat-plugin -
scheduled schema-compat-plugin tree scan in about 5 seconds after the
server startup!
[29/Dec/2016:01:43:58.905267535 +0000] NSACLPlugin - The ACL target
cn=groups,cn=compat,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.907051833 +0000] NSACLPlugin - The ACL target
cn=computers,cn=compat,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.908396407 +0000] NSACLPlugin - The ACL target
cn=ng,cn=compat,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.909758735 +0000] NSACLPlugin - The ACL target
ou=sudoers,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.911133739 +0000] NSACLPlugin - The ACL target
cn=users,cn=compat,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.912416230 +0000] NSACLPlugin - The ACL target
cn=vaults,cn=kra,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.913644794 +0000] NSACLPlugin - The ACL target
cn=vaults,cn=kra,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.914901802 +0000] NSACLPlugin - The ACL target
cn=vaults,cn=kra,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.916158004 +0000] NSACLPlugin - The ACL target
cn=vaults,cn=kra,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.917409810 +0000] NSACLPlugin - The ACL target
cn=vaults,cn=kra,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.918636743 +0000] NSACLPlugin - The ACL target
cn=vaults,cn=kra,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.919904210 +0000] NSACLPlugin - The ACL target
cn=vaults,cn=kra,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.921175543 +0000] NSACLPlugin - The ACL target
cn=vaults,cn=kra,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.922417264 +0000] NSACLPlugin - The ACL target
cn=vaults,cn=kra,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.923818252 +0000] NSACLPlugin - The ACL target
cn=vaults,cn=kra,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.925218237 +0000] NSACLPlugin - The ACL target
cn=vaults,cn=kra,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.928474915 +0000] NSACLPlugin - The ACL target
cn=ad,cn=etc,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.943158867 +0000] NSACLPlugin - The ACL target
cn=casigningcert
cert-pki-ca,cn=ca_renewal,cn=ipa,cn=etc,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.944679679 +0000] NSACLPlugin - The ACL target
cn=casigningcert
cert-pki-ca,cn=ca_renewal,cn=ipa,cn=etc,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:59.060335708 +0000] NSACLPlugin - The ACL target
cn=automember rebuild membership,cn=tasks,cn=config does not exist
[29/Dec/2016:01:43:59.066618653 +0000] Skipping CoS Definition
cn=Password Policy,cn=accounts,dc=pakos,dc=uk--no CoS Templates found,
which should be added before the CoS Definition.
[29/Dec/2016:01:43:59.100168779 +0000] schema-compat-plugin -
schema-compat-plugin tree scan will start in about 5 seconds!
[29/Dec/2016:01:43:59.108366423 +0000] slapd started. Listening on
All Interfaces port 389 for LDAP requests
[29/Dec/2016:01:43:59.109788596 +0000] Listening on
/var/run/slapd-PAKOS-UK.socket for LDAPI requests
[29/Dec/2016:01:44:04.117095313 +0000] schema-compat-plugin - warning:
no entries set up under cn=ng, cn=compat,dc=pakos,dc=uk
[29/Dec/2016:01:44:04.142962437 +0000] schema-compat-plugin - warning:
no entries set up under cn=computers, cn=compat,dc=pakos,dc=uk
[29/Dec/2016:01:44:04.164958006 +0000] schema-compat-plugin - Finished
plugin initialization.
[29/Dec/2016:01:44:20.113621699 +0000] ipa-topology-plugin -
ipa_topo_util_get_replica_conf: server configuration missing
[29/Dec/2016:01:44:20.115517170 +0000] ipa-topology-plugin -
ipa_topo_util_get_replica_conf: cannot create replica


At this point I trashed ipa01 and tried to re-deploy it again using the
same commands. The install failed with the following error message:

Done configuring directory server (dirsrv).
Configuring ipa-custodia
[1/4]: Generating ipa-custodia config file
[2/4]: Generating ipa-custodia keys
[3/4]: starting ipa-custodia
[4/4]: configuring ipa-custodia to start on boot
Done configuring ipa-custodia.
Configuring Kerberos KDC (krb5kdc). Estimated time: 30 seconds
[1/4]: configuring KDC
[2/4]: adding the password extension to the directory
[3/4]: starting the KDC
[4/4]: configuring KDC to start on boot
Done configuring Kerberos KDC (krb5kdc).
Configuring kadmin
[1/2]: starting kadmin
[2/2]: configuring kadmin to start on boot
Done configuring kadmin.
Configuring ipa_memcached
[1/2]: starting ipa_memcached
[2/2]: configuring ipa_memcached to start on boot
Done configuring ipa_memcached.
Configuring the web interface (httpd). Estimated time: 1 minute
[1/19]: setting mod_nss port to 443
[2/19]: setting mod_nss cipher suite
[3/19]: setting mod_nss protocol list to TLSv1.0 - TLSv1.2
[4/19]: setting mod_nss password file
[5/19]: enabling mod_nss renegotiate
[6/19]: adding URL rewriting rules
[7/19]: configuring httpd
[8/19]: setting up httpd keytab
[9/19]: setting up ssl
[error] NotFound: no such entry
Your system may be partly configured.
Run /usr/sbin/ipa-server-install --uninstall to clean up.

ipa.ipapython.install.cli.install_tool(Replica): ERROR no such entry
ipa.ipapython.install.cli.install_tool(Replica): ERROR The
ipa-replica-install command failed. See
/var/log/ipareplica-install.log for more information

Here's the full install log:
https://files.pakos.uk/ipareplica-install.log.txt

I've raised this problem on #freeipa channel (many thanks to mbasti and ab
for their help in investigating this issue with me) however we didn't get
too far and some further input from dirsrv gurus is required here.

[***@ipa01 ipa]# echo $SERVICE
HTTP/***@PAKOS.UK

[***@ipa01 ipa]# echo $DN
krbprincipalname=HTTP/***@PAKOS.UK,cn=services,cn=accounts,dc=pakos,dc=uk

[***@ipa01 ipa]# ldapsearch -D "cn=Directory Manager" -W -b $DN -s sub
Enter LDAP Password:
# extended LDIF
#
# LDAPv3
# base <krbprincipalname=HTTP/***@PAKOS.UK,cn=services,cn=accounts,dc=pakos,dc=uk>
with scope subtree
# filter: (objectclass=*)
# requesting: ALL
#

# HTTP/***@PAKOS.UK, services, accounts, pakos.uk
dn: krbprincipalname=HTTP/***@PAKOS.UK,cn=services,cn=accounts,dc=p
akos,dc=uk
krbExtraData:: AAJS5mRYSFRUUC9pcGEwMS5wYWtvcy51a0BQQUtPUy5VSwA=
krbLastPwdChange: 20161229103250Z
krbPrincipalKey:: MIHeoAMCAQGhAwIBAaIDAgEBowMCAQGkgccwgcQwaKAbMBmgAwIBBKESBBB5
NUQyJVZFPGYyMTZAUU0+oUkwR6ADAgESoUAEPiAA1r2NfOUD/7xph6tSb4hg/nTOwIVYhOusG/omq
a1qMz/ZVA/nn4pct9yNwFxKUGOFOz1suDz0l2Rur2vUMFigGzAZoAMCAQShEgQQOiQnZGE8Nk93V3
pvJSRLVaE5MDegAwIBEaEwBC4QAJbWI/ipYCPMu9I/jUqL39P0a9WHq8BdW2kpY9kYqsoy7D+A3fP
LwmAX3lYm
objectClass: ipaobject
objectClass: ipaservice
objectClass: krbticketpolicyaux
objectClass: ipakrbprincipal
objectClass: krbprincipal
objectClass: krbprincipalaux
objectClass: pkiuser
objectClass: top
ipaKrbPrincipalAlias: HTTP/***@PAKOS.UK
krbCanonicalName: HTTP/***@PAKOS.UK
managedBy: fqdn=ipa01.pakos.uk,cn=computers,cn=accounts,dc=pakos,dc=uk
krbPrincipalName: HTTP/***@PAKOS.UK
ipaUniqueID: 25dc5432-cdb2-11e6-a20e-005056a2f7f5

# search result
search: 2
result: 0 Success

# numResponses: 2
# numEntries: 1

[***@ipa01 ipa]# ldapsearch -D "cn=Directory Manager" -W -b $DN -s
sub "krbprincipalname=*"
Enter LDAP Password:
# extended LDIF
#
# LDAPv3
# base <krbprincipalname=HTTP/***@PAKOS.UK,cn=services,cn=accounts,dc=pakos,dc=uk>
with scope subtree
# filter: krbprincipalname=*
# requesting: ALL
#

# HTTP/***@PAKOS.UK, services, accounts, pakos.uk
dn: krbprincipalname=HTTP/***@PAKOS.UK,cn=services,cn=accounts,dc=p
akos,dc=uk
krbExtraData:: AAJS5mRYSFRUUC9pcGEwMS5wYWtvcy51a0BQQUtPUy5VSwA=
krbLastPwdChange: 20161229103250Z
krbPrincipalKey:: MIHeoAMCAQGhAwIBAaIDAgEBowMCAQGkgccwgcQwaKAbMBmgAwIBBKESBBB5
NUQyJVZFPGYyMTZAUU0+oUkwR6ADAgESoUAEPiAA1r2NfOUD/7xph6tSb4hg/nTOwIVYhOusG/omq
a1qMz/ZVA/nn4pct9yNwFxKUGOFOz1suDz0l2Rur2vUMFigGzAZoAMCAQShEgQQOiQnZGE8Nk93V3
pvJSRLVaE5MDegAwIBEaEwBC4QAJbWI/ipYCPMu9I/jUqL39P0a9WHq8BdW2kpY9kYqsoy7D+A3fP
LwmAX3lYm
objectClass: ipaobject
objectClass: ipaservice
objectClass: krbticketpolicyaux
objectClass: ipakrbprincipal
objectClass: krbprincipal
objectClass: krbprincipalaux
objectClass: pkiuser
objectClass: top
ipaKrbPrincipalAlias: HTTP/***@PAKOS.UK
krbCanonicalName: HTTP/***@PAKOS.UK
managedBy: fqdn=ipa01.pakos.uk,cn=computers,cn=accounts,dc=pakos,dc=uk
krbPrincipalName: HTTP/***@PAKOS.UK
ipaUniqueID: 25dc5432-cdb2-11e6-a20e-005056a2f7f5

# search result
search: 2
result: 0 Success

# numResponses: 2
# numEntries: 1

[***@ipa01 ipa]# ldapsearch -D "cn=Directory Manager" -W -b $DN -s
sub "(objectclass=*)"
Enter LDAP Password:
# extended LDIF
#
# LDAPv3
# base <krbprincipalname=HTTP/***@PAKOS.UK,cn=services,cn=accounts,dc=pakos,dc=uk>
with scope subtree
# filter: (objectclass=*)
# requesting: ALL
#

# HTTP/***@PAKOS.UK, services, accounts, pakos.uk
dn: krbprincipalname=HTTP/***@PAKOS.UK,cn=services,cn=accounts,dc=p
akos,dc=uk
krbExtraData:: AAJS5mRYSFRUUC9pcGEwMS5wYWtvcy51a0BQQUtPUy5VSwA=
krbLastPwdChange: 20161229103250Z
krbPrincipalKey:: MIHeoAMCAQGhAwIBAaIDAgEBowMCAQGkgccwgcQwaKAbMBmgAwIBBKESBBB5
NUQyJVZFPGYyMTZAUU0+oUkwR6ADAgESoUAEPiAA1r2NfOUD/7xph6tSb4hg/nTOwIVYhOusG/omq
a1qMz/ZVA/nn4pct9yNwFxKUGOFOz1suDz0l2Rur2vUMFigGzAZoAMCAQShEgQQOiQnZGE8Nk93V3
pvJSRLVaE5MDegAwIBEaEwBC4QAJbWI/ipYCPMu9I/jUqL39P0a9WHq8BdW2kpY9kYqsoy7D+A3fP
LwmAX3lYm
objectClass: ipaobject
objectClass: ipaservice
objectClass: krbticketpolicyaux
objectClass: ipakrbprincipal
objectClass: krbprincipal
objectClass: krbprincipalaux
objectClass: pkiuser
objectClass: top
ipaKrbPrincipalAlias: HTTP/***@PAKOS.UK
krbCanonicalName: HTTP/***@PAKOS.UK
managedBy: fqdn=ipa01.pakos.uk,cn=computers,cn=accounts,dc=pakos,dc=uk
krbPrincipalName: HTTP/***@PAKOS.UK
ipaUniqueID: 25dc5432-cdb2-11e6-a20e-005056a2f7f5

# search result
search: 2
result: 0 Success

# numResponses: 2
# numEntries: 1

[***@ipa01 ipa]# ldapsearch -D "cn=Directory Manager" -W -b $DN -s base
Enter LDAP Password:
# extended LDIF
#
# LDAPv3
# base <krbprincipalname=HTTP/***@PAKOS.UK,cn=services,cn=accounts,dc=pakos,dc=uk>
with scope baseObject
# filter: (objectclass=*)
# requesting: ALL
#

# HTTP/***@PAKOS.UK, services, accounts, pakos.uk
dn: krbprincipalname=HTTP/***@PAKOS.UK,cn=services,cn=accounts,dc=p
akos,dc=uk
krbExtraData:: AAJS5mRYSFRUUC9pcGEwMS5wYWtvcy51a0BQQUtPUy5VSwA=
krbLastPwdChange: 20161229103250Z
krbPrincipalKey:: MIHeoAMCAQGhAwIBAaIDAgEBowMCAQGkgccwgcQwaKAbMBmgAwIBBKESBBB5
NUQyJVZFPGYyMTZAUU0+oUkwR6ADAgESoUAEPiAA1r2NfOUD/7xph6tSb4hg/nTOwIVYhOusG/omq
a1qMz/ZVA/nn4pct9yNwFxKUGOFOz1suDz0l2Rur2vUMFigGzAZoAMCAQShEgQQOiQnZGE8Nk93V3
pvJSRLVaE5MDegAwIBEaEwBC4QAJbWI/ipYCPMu9I/jUqL39P0a9WHq8BdW2kpY9kYqsoy7D+A3fP
LwmAX3lYm
objectClass: ipaobject
objectClass: ipaservice
objectClass: krbticketpolicyaux
objectClass: ipakrbprincipal
objectClass: krbprincipal
objectClass: krbprincipalaux
objectClass: pkiuser
objectClass: top
ipaKrbPrincipalAlias: HTTP/***@PAKOS.UK
krbCanonicalName: HTTP/***@PAKOS.UK
managedBy: fqdn=ipa01.pakos.uk,cn=computers,cn=accounts,dc=pakos,dc=uk
krbPrincipalName: HTTP/***@PAKOS.UK
ipaUniqueID: 25dc5432-cdb2-11e6-a20e-005056a2f7f5

# search result
search: 2
result: 0 Success

# numResponses: 2
# numEntries: 1


I must say that this a show stopper for us at WANdisco which is holding
back the upgrade from FreeIPA 4.2 to FreeIPA 4.4.

If there is anything else I can do to help with the investigation, please
just let me know.

Many thanks in advance.
--
Kind regards,
Peter Pakos
Peter Pakos
2016-12-29 18:13:10 UTC
Permalink
Access log: https://files.pakos.uk/access.txt
Error log: https://files.pakos.uk/ipareplica-install.log.txt

I hope it helps.
Post by Peter Pakos
Hi guys,
I'm facing yet another problem with CA-less install of FreeIPA replica and
3rd party SSL certificate.
Few days ago I deployed a new CA-less server (ipa02) by running the
ipa-server-install \
-r PAKOS.UK \
-n pakos.uk \
-p 'password' \
-a 'password' \
--mkhomedir \
--setup-dns \
--no-forwarders \
--no-dnssec-validation \
--dirsrv-cert-file=/root/ssl/star.pakos.uk.pfx \
--dirsrv-pin='' \
--http-cert-file=/root/ssl/star.pakos.uk.pfx \
--http-pin='' \
--http-cert-name=AlphaWildcardIPA \
--idstart=1000
This server appears to be working OK.
ipa-client-install \
-p admin \
-w 'password' \
--mkhomedir
ipa-replica-install \
-w 'password' \
--mkhomedir \
--setup-dns \
--no-forwarders \
--no-dnssec-validation \
--dirsrv-cert-file=/root/ssl/star.pakos.uk.pfx \
--dirsrv-pin='' \
--dirsrv-cert-name=AlphaWildcardIPA \
--http-cert-file=/root/ssl/star.pakos.uk.pfx \
--http-pin='' \
--http-cert-name=AlphaWildcardIPA
After it finished, I've noticed that dirsrv wasn't running on port 636 on
ipa01.
Further investigation revealed that the SSL wildcard certificate
(AlphaWildcardIPA) wasn't installed in dirsrv DB and CA certificates were
Certificate Nickname Trust Attributes
SSL,S/MIME,JAR/XPI
AlphaWildcardIPA u,u,u
CA 1 ,,
CA 2 C,,
Certificate Nickname Trust Attributes
SSL,S/MIME,JAR/XPI
GlobalSign Root CA - GlobalSign nv-sa ,,
AlphaSSL CA - SHA256 - G2 - GlobalSign nv-sa C,,
[29/Dec/2016:01:43:58.852745536 +0000] 389-Directory/1.3.5.10 B2016.341.2222 starting up
[29/Dec/2016:01:43:58.867642515 +0000] default_mr_indexer_create: warning - plugin [caseIgnoreIA5Match] does not handle caseExactIA5Match
[29/Dec/2016:01:43:58.889866051 +0000] schema-compat-plugin - scheduled schema-compat-plugin tree scan in about 5 seconds after the server startup!
[29/Dec/2016:01:43:58.905267535 +0000] NSACLPlugin - The ACL target cn=groups,cn=compat,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.907051833 +0000] NSACLPlugin - The ACL target cn=computers,cn=compat,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.908396407 +0000] NSACLPlugin - The ACL target cn=ng,cn=compat,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.909758735 +0000] NSACLPlugin - The ACL target ou=sudoers,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.911133739 +0000] NSACLPlugin - The ACL target cn=users,cn=compat,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.912416230 +0000] NSACLPlugin - The ACL target cn=vaults,cn=kra,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.913644794 +0000] NSACLPlugin - The ACL target cn=vaults,cn=kra,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.914901802 +0000] NSACLPlugin - The ACL target cn=vaults,cn=kra,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.916158004 +0000] NSACLPlugin - The ACL target cn=vaults,cn=kra,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.917409810 +0000] NSACLPlugin - The ACL target cn=vaults,cn=kra,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.918636743 +0000] NSACLPlugin - The ACL target cn=vaults,cn=kra,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.919904210 +0000] NSACLPlugin - The ACL target cn=vaults,cn=kra,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.921175543 +0000] NSACLPlugin - The ACL target cn=vaults,cn=kra,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.922417264 +0000] NSACLPlugin - The ACL target cn=vaults,cn=kra,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.923818252 +0000] NSACLPlugin - The ACL target cn=vaults,cn=kra,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.925218237 +0000] NSACLPlugin - The ACL target cn=vaults,cn=kra,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.928474915 +0000] NSACLPlugin - The ACL target cn=ad,cn=etc,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.943158867 +0000] NSACLPlugin - The ACL target cn=casigningcert cert-pki-ca,cn=ca_renewal,cn=ipa,cn=etc,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.944679679 +0000] NSACLPlugin - The ACL target cn=casigningcert cert-pki-ca,cn=ca_renewal,cn=ipa,cn=etc,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:59.060335708 +0000] NSACLPlugin - The ACL target cn=automember rebuild membership,cn=tasks,cn=config does not exist
[29/Dec/2016:01:43:59.066618653 +0000] Skipping CoS Definition cn=Password Policy,cn=accounts,dc=pakos,dc=uk--no CoS Templates found, which should be added before the CoS Definition.
[29/Dec/2016:01:43:59.100168779 +0000] schema-compat-plugin - schema-compat-plugin tree scan will start in about 5 seconds!
[29/Dec/2016:01:43:59.108366423 +0000] slapd started. Listening on All Interfaces port 389 for LDAP requests
[29/Dec/2016:01:43:59.109788596 +0000] Listening on /var/run/slapd-PAKOS-UK.socket for LDAPI requests
[29/Dec/2016:01:44:04.117095313 +0000] schema-compat-plugin - warning: no entries set up under cn=ng, cn=compat,dc=pakos,dc=uk
[29/Dec/2016:01:44:04.142962437 +0000] schema-compat-plugin - warning: no entries set up under cn=computers, cn=compat,dc=pakos,dc=uk
[29/Dec/2016:01:44:04.164958006 +0000] schema-compat-plugin - Finished plugin initialization.
[29/Dec/2016:01:44:20.113621699 +0000] ipa-topology-plugin - ipa_topo_util_get_replica_conf: server configuration missing
[29/Dec/2016:01:44:20.115517170 +0000] ipa-topology-plugin - ipa_topo_util_get_replica_conf: cannot create replica
At this point I trashed ipa01 and tried to re-deploy it again using the
Done configuring directory server (dirsrv).
Configuring ipa-custodia
[1/4]: Generating ipa-custodia config file
[2/4]: Generating ipa-custodia keys
[3/4]: starting ipa-custodia
[4/4]: configuring ipa-custodia to start on boot
Done configuring ipa-custodia.
Configuring Kerberos KDC (krb5kdc). Estimated time: 30 seconds
[1/4]: configuring KDC
[2/4]: adding the password extension to the directory
[3/4]: starting the KDC
[4/4]: configuring KDC to start on boot
Done configuring Kerberos KDC (krb5kdc).
Configuring kadmin
[1/2]: starting kadmin
[2/2]: configuring kadmin to start on boot
Done configuring kadmin.
Configuring ipa_memcached
[1/2]: starting ipa_memcached
[2/2]: configuring ipa_memcached to start on boot
Done configuring ipa_memcached.
Configuring the web interface (httpd). Estimated time: 1 minute
[1/19]: setting mod_nss port to 443
[2/19]: setting mod_nss cipher suite
[3/19]: setting mod_nss protocol list to TLSv1.0 - TLSv1.2
[4/19]: setting mod_nss password file
[5/19]: enabling mod_nss renegotiate
[6/19]: adding URL rewriting rules
[7/19]: configuring httpd
[8/19]: setting up httpd keytab
[9/19]: setting up ssl
[error] NotFound: no such entry
Your system may be partly configured.
Run /usr/sbin/ipa-server-install --uninstall to clean up.
ipa.ipapython.install.cli.install_tool(Replica): ERROR no such entry
ipa.ipapython.install.cli.install_tool(Replica): ERROR The ipa-replica-install command failed. See /var/log/ipareplica-install.log for more information
Here's the full install log: https://files.pakos.uk/
ipareplica-install.log.txt
I've raised this problem on #freeipa channel (many thanks to mbasti and ab
for their help in investigating this issue with me) however we didn't get
too far and some further input from dirsrv gurus is required here.
# extended LDIF
#
# LDAPv3
# filter: (objectclass=*)
# requesting: ALL
#
akos,dc=uk
krbExtraData:: AAJS5mRYSFRUUC9pcGEwMS5wYWtvcy51a0BQQUtPUy5VSwA=
krbLastPwdChange: 20161229103250Z
krbPrincipalKey:: MIHeoAMCAQGhAwIBAaIDAgEBowMCAQGkgccwgcQwaKAbMBmgAwIBBKESBBB5
NUQyJVZFPGYyMTZAUU0+oUkwR6ADAgESoUAEPiAA1r2NfOUD/7xph6tSb4hg/nTOwIVYhOusG/omq
a1qMz/ZVA/nn4pct9yNwFxKUGOFOz1suDz0l2Rur2vUMFigGzAZoAMCAQShEgQQOiQnZGE8Nk93V3
pvJSRLVaE5MDegAwIBEaEwBC4QAJbWI/ipYCPMu9I/jUqL39P0a9WHq8BdW2kpY9kYqsoy7D+A3fP
LwmAX3lYm
objectClass: ipaobject
objectClass: ipaservice
objectClass: krbticketpolicyaux
objectClass: ipakrbprincipal
objectClass: krbprincipal
objectClass: krbprincipalaux
objectClass: pkiuser
objectClass: top
managedBy: fqdn=ipa01.pakos.uk,cn=computers,cn=accounts,dc=pakos,dc=uk
ipaUniqueID: 25dc5432-cdb2-11e6-a20e-005056a2f7f5
# search result
search: 2
result: 0 Success
# numResponses: 2
# numEntries: 1
# extended LDIF
#
# LDAPv3
# filter: krbprincipalname=*
# requesting: ALL
#
akos,dc=uk
krbExtraData:: AAJS5mRYSFRUUC9pcGEwMS5wYWtvcy51a0BQQUtPUy5VSwA=
krbLastPwdChange: 20161229103250Z
krbPrincipalKey:: MIHeoAMCAQGhAwIBAaIDAgEBowMCAQGkgccwgcQwaKAbMBmgAwIBBKESBBB5
NUQyJVZFPGYyMTZAUU0+oUkwR6ADAgESoUAEPiAA1r2NfOUD/7xph6tSb4hg/nTOwIVYhOusG/omq
a1qMz/ZVA/nn4pct9yNwFxKUGOFOz1suDz0l2Rur2vUMFigGzAZoAMCAQShEgQQOiQnZGE8Nk93V3
pvJSRLVaE5MDegAwIBEaEwBC4QAJbWI/ipYCPMu9I/jUqL39P0a9WHq8BdW2kpY9kYqsoy7D+A3fP
LwmAX3lYm
objectClass: ipaobject
objectClass: ipaservice
objectClass: krbticketpolicyaux
objectClass: ipakrbprincipal
objectClass: krbprincipal
objectClass: krbprincipalaux
objectClass: pkiuser
objectClass: top
managedBy: fqdn=ipa01.pakos.uk,cn=computers,cn=accounts,dc=pakos,dc=uk
ipaUniqueID: 25dc5432-cdb2-11e6-a20e-005056a2f7f5
# search result
search: 2
result: 0 Success
# numResponses: 2
# numEntries: 1
# extended LDIF
#
# LDAPv3
# filter: (objectclass=*)
# requesting: ALL
#
akos,dc=uk
krbExtraData:: AAJS5mRYSFRUUC9pcGEwMS5wYWtvcy51a0BQQUtPUy5VSwA=
krbLastPwdChange: 20161229103250Z
krbPrincipalKey:: MIHeoAMCAQGhAwIBAaIDAgEBowMCAQGkgccwgcQwaKAbMBmgAwIBBKESBBB5
NUQyJVZFPGYyMTZAUU0+oUkwR6ADAgESoUAEPiAA1r2NfOUD/7xph6tSb4hg/nTOwIVYhOusG/omq
a1qMz/ZVA/nn4pct9yNwFxKUGOFOz1suDz0l2Rur2vUMFigGzAZoAMCAQShEgQQOiQnZGE8Nk93V3
pvJSRLVaE5MDegAwIBEaEwBC4QAJbWI/ipYCPMu9I/jUqL39P0a9WHq8BdW2kpY9kYqsoy7D+A3fP
LwmAX3lYm
objectClass: ipaobject
objectClass: ipaservice
objectClass: krbticketpolicyaux
objectClass: ipakrbprincipal
objectClass: krbprincipal
objectClass: krbprincipalaux
objectClass: pkiuser
objectClass: top
managedBy: fqdn=ipa01.pakos.uk,cn=computers,cn=accounts,dc=pakos,dc=uk
ipaUniqueID: 25dc5432-cdb2-11e6-a20e-005056a2f7f5
# search result
search: 2
result: 0 Success
# numResponses: 2
# numEntries: 1
# extended LDIF
#
# LDAPv3
# filter: (objectclass=*)
# requesting: ALL
#
akos,dc=uk
krbExtraData:: AAJS5mRYSFRUUC9pcGEwMS5wYWtvcy51a0BQQUtPUy5VSwA=
krbLastPwdChange: 20161229103250Z
krbPrincipalKey:: MIHeoAMCAQGhAwIBAaIDAgEBowMCAQGkgccwgcQwaKAbMBmgAwIBBKESBBB5
NUQyJVZFPGYyMTZAUU0+oUkwR6ADAgESoUAEPiAA1r2NfOUD/7xph6tSb4hg/nTOwIVYhOusG/omq
a1qMz/ZVA/nn4pct9yNwFxKUGOFOz1suDz0l2Rur2vUMFigGzAZoAMCAQShEgQQOiQnZGE8Nk93V3
pvJSRLVaE5MDegAwIBEaEwBC4QAJbWI/ipYCPMu9I/jUqL39P0a9WHq8BdW2kpY9kYqsoy7D+A3fP
LwmAX3lYm
objectClass: ipaobject
objectClass: ipaservice
objectClass: krbticketpolicyaux
objectClass: ipakrbprincipal
objectClass: krbprincipal
objectClass: krbprincipalaux
objectClass: pkiuser
objectClass: top
managedBy: fqdn=ipa01.pakos.uk,cn=computers,cn=accounts,dc=pakos,dc=uk
ipaUniqueID: 25dc5432-cdb2-11e6-a20e-005056a2f7f5
# search result
search: 2
result: 0 Success
# numResponses: 2
# numEntries: 1
I must say that this a show stopper for us at WANdisco which is holding
back the upgrade from FreeIPA 4.2 to FreeIPA 4.4.
If there is anything else I can do to help with the investigation, please
just let me know.
Many thanks in advance.
--
Kind regards,
Peter Pakos
--
Kind regards,
Peter Pakos
Martin Basti
2016-12-30 10:54:28 UTC
Permalink
Hello,

The first half of the first issue is this bug:
https://fedorahosted.org/freeipa/ticket/6226

you have to enable SSL on server manually after installation


The second half of the first issue shouldn't be related to ticket above,
but I don't know more details I'll leave this for IPA CA gurus


The second issue is unrelated to certificates, I believe that something
in dirsrv causes this unusual behavior. I saw this before with other users.

* both no such entry for HTTP principal, or for topology plugin are the
same issue

* all users have this issue with CA-less installation, but not always
reproducible, I'm not sure if there can be a step in CA-less install
that can cause this

* entries are in database (were added previously by installer) but
during installation the search failed with no such entry, ldapsearch
after installation works

* in access log SRCH is before ADD operation, but this is against the
steps in installer, entry is added first and even installer failed hard
so there is no way how to add it after failure caused by not found error.

[29/Dec/2016:10:33:02.775715491 +0000] conn=16 op=1 SRCH base="krbprincipalname=HTTP/***@PAKOS.UK,cn=services,cn=accounts,dc=pakos,dc=uk" scope=0 filter="(objectClass=*)" attrs=ALL
[29/Dec/2016:10:33:02.775892719 +0000] conn=16 op=1 RESULT err=32 tag=101 nentries=0 etime=0


This caused installation failure (IMO - there is no more SRCH operation for HTTP principal in log) ^^^^^^
......
[29/Dec/2016:10:33:05.487917960 +0000] conn=17 op=10 ADD dn="krbprincipalname=HTTP/***@PAKOS.UK,cn=services,cn=accounts,dc=pakos,dc=uk"
[29/Dec/2016:10:33:05.492213776 +0000] conn=17 op=10 RESULT err=0 tag=105 nentries=0 etime=0 csn=5864e653000000040000
[29/Dec/2016:10:33:05.492372184 +0000] conn=17 op=11 MOD dn="krbprincipalname=HTTP/***@PAKOS.UK,cn=services,cn=accounts,dc=pakos,dc=uk"
[29/Dec/2016:10:33:05.494649080 +0000] conn=17 op=11 RESULT err=0 tag=103 nentries=0 etime=0 csn=5864e653000100040000
[29/Dec/2016:10:33:05.494816357 +0000] conn=17 op=12 MOD dn="krbprincipalname=HTTP/***@PAKOS.UK,cn=services,cn=accounts,dc=pakos,dc=uk"
These were added after failure ??? ^^^^^


I need a DS guru assistance to resolve this :)
Martin^2
Post by Peter Pakos
Access log: https://files.pakos.uk/access.txt
Error log: https://files.pakos.uk/ipareplica-install.log.txt
I hope it helps.
Hi guys,
I'm facing yet another problem with CA-less install of FreeIPA
replica and 3rd party SSL certificate.
Few days ago I deployed a new CA-less server (ipa02) by running
ipa-server-install \ -r PAKOS.UK <http://PAKOS.UK> \ -n
pakos.uk <http://pakos.uk> \ -p 'password' \ -a 'password'
\ --mkhomedir \ --setup-dns \ --no-forwarders \
--no-dnssec-validation \
--dirsrv-cert-file=/root/ssl/star.pakos.uk.pfx \
--dirsrv-pin='' \
--http-cert-file=/root/ssl/star.pakos.uk.pfx \ --http-pin=''
\ --http-cert-name=AlphaWildcardIPA \ --idstart=1000
This server appears to be working OK.
ipa-client-install \ -p admin \ -w 'password' \ --mkhomedir
ipa-replica-install \ -w 'password' \ --mkhomedir \
--setup-dns \ --no-forwarders \ --no-dnssec-validation \
--dirsrv-cert-file=/root/ssl/star.pakos.uk.pfx \
--dirsrv-pin='' \ --dirsrv-cert-name=AlphaWildcardIPA \
--http-cert-file=/root/ssl/star.pakos.uk.pfx \ --http-pin=''
\ --http-cert-name=AlphaWildcardIPA
After it finished, I've noticed that dirsrv wasn't running on port
636 on ipa01.
Further investigation revealed that the SSL wildcard certificate
(AlphaWildcardIPA) wasn't installed in dirsrv DB and CA
Nickname Trust Attributes SSL,S/MIME,JAR/XPI AlphaWildcardIPA
/etc/dirsrv/slapd-PAKOS-UK/ Certificate Nickname Trust Attributes
SSL,S/MIME,JAR/XPI GlobalSign Root CA - GlobalSign nv-sa ,,
AlphaSSL CA - SHA256 - G2 - GlobalSign nv-sa C,,
[29/Dec/2016:01:43:58.852745536 +0000] 389-Directory/1.3.5.10
<http://1.3.5.10> B2016.341.2222 starting up
warning - plugin [caseIgnoreIA5Match] does not handle
caseExactIA5Match [29/Dec/2016:01:43:58.889866051 +0000]
schema-compat-plugin - scheduled schema-compat-plugin tree scan in
about 5 seconds after the server startup!
[29/Dec/2016:01:43:58.905267535 +0000] NSACLPlugin - The ACL
target cn=groups,cn=compat,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.907051833 +0000] NSACLPlugin - The ACL
target cn=computers,cn=compat,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.908396407 +0000] NSACLPlugin - The ACL
target cn=ng,cn=compat,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.909758735 +0000] NSACLPlugin - The ACL
target ou=sudoers,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.911133739 +0000] NSACLPlugin - The ACL
target cn=users,cn=compat,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.912416230 +0000] NSACLPlugin - The ACL
target cn=vaults,cn=kra,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.913644794 +0000] NSACLPlugin - The ACL
target cn=vaults,cn=kra,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.914901802 +0000] NSACLPlugin - The ACL
target cn=vaults,cn=kra,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.916158004 +0000] NSACLPlugin - The ACL
target cn=vaults,cn=kra,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.917409810 +0000] NSACLPlugin - The ACL
target cn=vaults,cn=kra,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.918636743 +0000] NSACLPlugin - The ACL
target cn=vaults,cn=kra,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.919904210 +0000] NSACLPlugin - The ACL
target cn=vaults,cn=kra,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.921175543 +0000] NSACLPlugin - The ACL
target cn=vaults,cn=kra,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.922417264 +0000] NSACLPlugin - The ACL
target cn=vaults,cn=kra,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.923818252 +0000] NSACLPlugin - The ACL
target cn=vaults,cn=kra,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.925218237 +0000] NSACLPlugin - The ACL
target cn=vaults,cn=kra,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.928474915 +0000] NSACLPlugin - The ACL
target cn=ad,cn=etc,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.943158867 +0000] NSACLPlugin - The ACL
target cn=casigningcert
cert-pki-ca,cn=ca_renewal,cn=ipa,cn=etc,dc=pakos,dc=uk does not
exist [29/Dec/2016:01:43:58.944679679 +0000] NSACLPlugin - The ACL
target cn=casigningcert
cert-pki-ca,cn=ca_renewal,cn=ipa,cn=etc,dc=pakos,dc=uk does not
exist [29/Dec/2016:01:43:59.060335708 +0000] NSACLPlugin - The ACL
target cn=automember rebuild membership,cn=tasks,cn=config does
not exist [29/Dec/2016:01:43:59.066618653 +0000] Skipping CoS
Definition cn=Password Policy,cn=accounts,dc=pakos,dc=uk--no CoS
Templates found, which should be added before the CoS Definition.
[29/Dec/2016:01:43:59.100168779 +0000] schema-compat-plugin -
schema-compat-plugin tree scan will start in about 5 seconds!
[29/Dec/2016:01:43:59.108366423 +0000] slapd started. Listening on
All Interfaces port 389 for LDAP requests
[29/Dec/2016:01:43:59.109788596 +0000] Listening on
/var/run/slapd-PAKOS-UK.socket for LDAPI requests
[29/Dec/2016:01:44:04.117095313 +0000] schema-compat-plugin -
warning: no entries set up under cn=ng, cn=compat,dc=pakos,dc=uk
[29/Dec/2016:01:44:04.142962437 +0000] schema-compat-plugin -
warning: no entries set up under cn=computers,
cn=compat,dc=pakos,dc=uk [29/Dec/2016:01:44:04.164958006 +0000]
schema-compat-plugin - Finished plugin initialization.
[29/Dec/2016:01:44:20.113621699 +0000] ipa-topology-plugin -
ipa_topo_util_get_replica_conf: server configuration missing
[29/Dec/2016:01:44:20.115517170 +0000] ipa-topology-plugin -
ipa_topo_util_get_replica_conf: cannot create replica
At this point I trashed ipa01 and tried to re-deploy it again
using the same commands. The install failed with the following
Done configuring directory server (dirsrv). Configuring
configuring ipa-custodia to start on boot Done configuring
30 seconds [1/4]: configuring KDC [2/4]: adding the password
configuring KDC to start on boot Done configuring Kerberos KDC
configuring kadmin to start on boot Done configuring kadmin.
configuring ipa_memcached to start on boot Done configuring
ipa_memcached. Configuring the web interface (httpd). Estimated
time: 1 minute [1/19]: setting mod_nss port to 443 [2/19]: setting
mod_nss cipher suite [3/19]: setting mod_nss protocol list to
enabling mod_nss renegotiate [6/19]: adding URL rewriting rules
setting up ssl [error] NotFound: no such entry Your system may be
partly configured. Run /usr/sbin/ipa-server-install --uninstall to
clean up. ipa.ipapython.install.cli.install_tool(Replica): ERROR
ERROR The ipa-replica-install command failed. See
/var/log/ipareplica-install.log for more information
https://files.pakos.uk/ipareplica-install.log.txt
<https://files.pakos.uk/ipareplica-install.log.txt>
I've raised this problem on #freeipa channel (many thanks to
mbasti and ab for their help in investigating this issue with me)
however we didn't get too far and some further input from dirsrv
gurus is required here.
-s sub Enter LDAP Password: # extended LDIF # # LDAPv3 # base
with scope subtree # filter: (objectclass=*) # requesting: ALL # #
MIHeoAMCAQGhAwIBAaIDAgEBowMCAQGkgccwgcQwaKAbMBmgAwIBBKESBBB5
NUQyJVZFPGYyMTZAUU0+oUkwR6ADAgESoUAEPiAA1r2NfOUD/7xph6tSb4hg/nTOwIVYhOusG/omq
a1qMz/ZVA/nn4pct9yNwFxKUGOFOz1suDz0l2Rur2vUMFigGzAZoAMCAQShEgQQOiQnZGE8Nk93V3
pvJSRLVaE5MDegAwIBEaEwBC4QAJbWI/ipYCPMu9I/jUqL39P0a9WHq8BdW2kpY9kYqsoy7D+A3fP
LwmAX3lYm objectClass: ipaobject objectClass: ipaservice
objectClass: krbticketpolicyaux objectClass: ipakrbprincipal
objectClass: krbprincipal objectClass: krbprincipalaux
<http://ipa01.pakos.uk>,cn=computers,cn=accounts,dc=pakos,dc=uk
25dc5432-cdb2-11e6-a20e-005056a2f7f5 # search result search: 2
ipa]# ldapsearch -D "cn=Directory Manager" -W -b $DN -s sub
"krbprincipalname=*" Enter LDAP Password: # extended LDIF # #
with scope subtree # filter: krbprincipalname=* # requesting: ALL
MIHeoAMCAQGhAwIBAaIDAgEBowMCAQGkgccwgcQwaKAbMBmgAwIBBKESBBB5
NUQyJVZFPGYyMTZAUU0+oUkwR6ADAgESoUAEPiAA1r2NfOUD/7xph6tSb4hg/nTOwIVYhOusG/omq
a1qMz/ZVA/nn4pct9yNwFxKUGOFOz1suDz0l2Rur2vUMFigGzAZoAMCAQShEgQQOiQnZGE8Nk93V3
pvJSRLVaE5MDegAwIBEaEwBC4QAJbWI/ipYCPMu9I/jUqL39P0a9WHq8BdW2kpY9kYqsoy7D+A3fP
LwmAX3lYm objectClass: ipaobject objectClass: ipaservice
objectClass: krbticketpolicyaux objectClass: ipakrbprincipal
objectClass: krbprincipal objectClass: krbprincipalaux
<http://ipa01.pakos.uk>,cn=computers,cn=accounts,dc=pakos,dc=uk
25dc5432-cdb2-11e6-a20e-005056a2f7f5 # search result search: 2
ipa]# ldapsearch -D "cn=Directory Manager" -W -b $DN -s sub
"(objectclass=*)" Enter LDAP Password: # extended LDIF # # LDAPv3
with scope subtree # filter: (objectclass=*) # requesting: ALL # #
MIHeoAMCAQGhAwIBAaIDAgEBowMCAQGkgccwgcQwaKAbMBmgAwIBBKESBBB5
NUQyJVZFPGYyMTZAUU0+oUkwR6ADAgESoUAEPiAA1r2NfOUD/7xph6tSb4hg/nTOwIVYhOusG/omq
a1qMz/ZVA/nn4pct9yNwFxKUGOFOz1suDz0l2Rur2vUMFigGzAZoAMCAQShEgQQOiQnZGE8Nk93V3
pvJSRLVaE5MDegAwIBEaEwBC4QAJbWI/ipYCPMu9I/jUqL39P0a9WHq8BdW2kpY9kYqsoy7D+A3fP
LwmAX3lYm objectClass: ipaobject objectClass: ipaservice
objectClass: krbticketpolicyaux objectClass: ipakrbprincipal
objectClass: krbprincipal objectClass: krbprincipalaux
<http://ipa01.pakos.uk>,cn=computers,cn=accounts,dc=pakos,dc=uk
25dc5432-cdb2-11e6-a20e-005056a2f7f5 # search result search: 2
result: 0 Success # numResponses: 2 # numEntries: 1
-s base Enter LDAP Password: # extended LDIF # # LDAPv3 # base
with scope baseObject # filter: (objectclass=*) # requesting: ALL
MIHeoAMCAQGhAwIBAaIDAgEBowMCAQGkgccwgcQwaKAbMBmgAwIBBKESBBB5
NUQyJVZFPGYyMTZAUU0+oUkwR6ADAgESoUAEPiAA1r2NfOUD/7xph6tSb4hg/nTOwIVYhOusG/omq
a1qMz/ZVA/nn4pct9yNwFxKUGOFOz1suDz0l2Rur2vUMFigGzAZoAMCAQShEgQQOiQnZGE8Nk93V3
pvJSRLVaE5MDegAwIBEaEwBC4QAJbWI/ipYCPMu9I/jUqL39P0a9WHq8BdW2kpY9kYqsoy7D+A3fP
LwmAX3lYm objectClass: ipaobject objectClass: ipaservice
objectClass: krbticketpolicyaux objectClass: ipakrbprincipal
objectClass: krbprincipal objectClass: krbprincipalaux
<http://ipa01.pakos.uk>,cn=computers,cn=accounts,dc=pakos,dc=uk
25dc5432-cdb2-11e6-a20e-005056a2f7f5 # search result search: 2
result: 0 Success # numResponses: 2 # numEntries: 1
I must say that this a show stopper for us at WANdisco which is
holding back the upgrade from FreeIPA 4.2 to FreeIPA 4.4.
If there is anything else I can do to help with the investigation,
please just let me know.
Many thanks in advance.
--
Kind regards,
Peter Pakos
--
Kind regards,
Peter Pakos
Martin Basti
2017-01-04 12:59:04 UTC
Permalink
Post by Martin Basti
Hello,
https://fedorahosted.org/freeipa/ticket/6226
you have to enable SSL on server manually after installation
The second half of the first issue shouldn't be related to ticket
above, but I don't know more details I'll leave this for IPA CA gurus
The second issue is unrelated to certificates, I believe that
something in dirsrv causes this unusual behavior. I saw this before
with other users.
* both no such entry for HTTP principal, or for topology plugin are
the same issue
* all users have this issue with CA-less installation, but not always
reproducible, I'm not sure if there can be a step in CA-less install
that can cause this
* entries are in database (were added previously by installer) but
during installation the search failed with no such entry, ldapsearch
after installation works
* in access log SRCH is before ADD operation, but this is against the
steps in installer, entry is added first and even installer failed
hard so there is no way how to add it after failure caused by not
found error.
[29/Dec/2016:10:33:02.775892719 +0000] conn=16 op=1 RESULT err=32 tag=101 nentries=0 etime=0
This caused installation failure (IMO - there is no more SRCH operation for HTTP principal in log) ^^^^^^
......
[29/Dec/2016:10:33:05.492213776 +0000] conn=17 op=10 RESULT err=0 tag=105 nentries=0 etime=0 csn=5864e653000000040000
[29/Dec/2016:10:33:05.494649080 +0000] conn=17 op=11 RESULT err=0 tag=103 nentries=0 etime=0 csn=5864e653000100040000
These were added after failure ??? ^^^^^
I need a DS guru assistance to resolve this :)
Martin^2
Ticket for this issue has been opened
https://fedorahosted.org/freeipa/ticket/6575 Martin^2
Post by Martin Basti
Post by Peter Pakos
Access log: https://files.pakos.uk/access.txt
Error log: https://files.pakos.uk/ipareplica-install.log.txt
I hope it helps.
Hi guys,
I'm facing yet another problem with CA-less install of FreeIPA
replica and 3rd party SSL certificate.
Few days ago I deployed a new CA-less server (ipa02) by running
ipa-server-install \ -r PAKOS.UK <http://PAKOS.UK> \ -n
pakos.uk <http://pakos.uk> \ -p 'password' \ -a
'password' \ --mkhomedir \ --setup-dns \
--no-forwarders \ --no-dnssec-validation \
--dirsrv-cert-file=/root/ssl/star.pakos.uk.pfx \
--dirsrv-pin='' \
--http-cert-file=/root/ssl/star.pakos.uk.pfx \
--http-pin='' \ --http-cert-name=AlphaWildcardIPA \
--idstart=1000
This server appears to be working OK.
ipa-client-install \ -p admin \ -w 'password' \ --mkhomedir
ipa-replica-install \ -w 'password' \ --mkhomedir \
--setup-dns \ --no-forwarders \ --no-dnssec-validation \
--dirsrv-cert-file=/root/ssl/star.pakos.uk.pfx \
--dirsrv-pin='' \ --dirsrv-cert-name=AlphaWildcardIPA \
--http-cert-file=/root/ssl/star.pakos.uk.pfx \
--http-pin='' \ --http-cert-name=AlphaWildcardIPA
After it finished, I've noticed that dirsrv wasn't running on
port 636 on ipa01.
Further investigation revealed that the SSL wildcard certificate
(AlphaWildcardIPA) wasn't installed in dirsrv DB and CA
Nickname Trust Attributes SSL,S/MIME,JAR/XPI AlphaWildcardIPA
/etc/dirsrv/slapd-PAKOS-UK/ Certificate Nickname Trust Attributes
SSL,S/MIME,JAR/XPI GlobalSign Root CA - GlobalSign nv-sa ,,
AlphaSSL CA - SHA256 - G2 - GlobalSign nv-sa C,,
[29/Dec/2016:01:43:58.852745536 +0000] 389-Directory/1.3.5.10
<http://1.3.5.10> B2016.341.2222 starting up
warning - plugin [caseIgnoreIA5Match] does not handle
caseExactIA5Match [29/Dec/2016:01:43:58.889866051 +0000]
schema-compat-plugin - scheduled schema-compat-plugin tree scan
in about 5 seconds after the server startup!
[29/Dec/2016:01:43:58.905267535 +0000] NSACLPlugin - The ACL
target cn=groups,cn=compat,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.907051833 +0000] NSACLPlugin - The ACL
target cn=computers,cn=compat,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.908396407 +0000] NSACLPlugin - The ACL
target cn=ng,cn=compat,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.909758735 +0000] NSACLPlugin - The ACL
target ou=sudoers,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.911133739 +0000] NSACLPlugin - The ACL
target cn=users,cn=compat,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.912416230 +0000] NSACLPlugin - The ACL
target cn=vaults,cn=kra,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.913644794 +0000] NSACLPlugin - The ACL
target cn=vaults,cn=kra,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.914901802 +0000] NSACLPlugin - The ACL
target cn=vaults,cn=kra,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.916158004 +0000] NSACLPlugin - The ACL
target cn=vaults,cn=kra,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.917409810 +0000] NSACLPlugin - The ACL
target cn=vaults,cn=kra,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.918636743 +0000] NSACLPlugin - The ACL
target cn=vaults,cn=kra,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.919904210 +0000] NSACLPlugin - The ACL
target cn=vaults,cn=kra,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.921175543 +0000] NSACLPlugin - The ACL
target cn=vaults,cn=kra,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.922417264 +0000] NSACLPlugin - The ACL
target cn=vaults,cn=kra,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.923818252 +0000] NSACLPlugin - The ACL
target cn=vaults,cn=kra,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.925218237 +0000] NSACLPlugin - The ACL
target cn=vaults,cn=kra,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.928474915 +0000] NSACLPlugin - The ACL
target cn=ad,cn=etc,dc=pakos,dc=uk does not exist
[29/Dec/2016:01:43:58.943158867 +0000] NSACLPlugin - The ACL
target cn=casigningcert
cert-pki-ca,cn=ca_renewal,cn=ipa,cn=etc,dc=pakos,dc=uk does not
exist [29/Dec/2016:01:43:58.944679679 +0000] NSACLPlugin - The
ACL target cn=casigningcert
cert-pki-ca,cn=ca_renewal,cn=ipa,cn=etc,dc=pakos,dc=uk does not
exist [29/Dec/2016:01:43:59.060335708 +0000] NSACLPlugin - The
ACL target cn=automember rebuild membership,cn=tasks,cn=config
does not exist [29/Dec/2016:01:43:59.066618653 +0000] Skipping
CoS Definition cn=Password Policy,cn=accounts,dc=pakos,dc=uk--no
CoS Templates found, which should be added before the CoS
Definition. [29/Dec/2016:01:43:59.100168779 +0000]
schema-compat-plugin - schema-compat-plugin tree scan will start
in about 5 seconds! [29/Dec/2016:01:43:59.108366423 +0000] slapd
started. Listening on All Interfaces port 389 for LDAP requests
[29/Dec/2016:01:43:59.109788596 +0000] Listening on
/var/run/slapd-PAKOS-UK.socket for LDAPI requests
[29/Dec/2016:01:44:04.117095313 +0000] schema-compat-plugin -
warning: no entries set up under cn=ng, cn=compat,dc=pakos,dc=uk
[29/Dec/2016:01:44:04.142962437 +0000] schema-compat-plugin -
warning: no entries set up under cn=computers,
cn=compat,dc=pakos,dc=uk [29/Dec/2016:01:44:04.164958006 +0000]
schema-compat-plugin - Finished plugin initialization.
[29/Dec/2016:01:44:20.113621699 +0000] ipa-topology-plugin -
ipa_topo_util_get_replica_conf: server configuration missing
[29/Dec/2016:01:44:20.115517170 +0000] ipa-topology-plugin -
ipa_topo_util_get_replica_conf: cannot create replica
At this point I trashed ipa01 and tried to re-deploy it again
using the same commands. The install failed with the following
Done configuring directory server (dirsrv). Configuring
configuring ipa-custodia to start on boot Done configuring
30 seconds [1/4]: configuring KDC [2/4]: adding the password
configuring KDC to start on boot Done configuring Kerberos KDC
configuring kadmin to start on boot Done configuring kadmin.
configuring ipa_memcached to start on boot Done configuring
ipa_memcached. Configuring the web interface (httpd). Estimated
setting mod_nss cipher suite [3/19]: setting mod_nss protocol
list to TLSv1.0 - TLSv1.2 [4/19]: setting mod_nss password file
[5/19]: enabling mod_nss renegotiate [6/19]: adding URL rewriting
rules [7/19]: configuring httpd [8/19]: setting up httpd keytab
[9/19]: setting up ssl [error] NotFound: no such entry Your
system may be partly configured. Run /usr/sbin/ipa-server-install
--uninstall to clean up.
ipa.ipapython.install.cli.install_tool(Replica): ERROR no such
entry ipa.ipapython.install.cli.install_tool(Replica): ERROR The
ipa-replica-install command failed. See
/var/log/ipareplica-install.log for more information
https://files.pakos.uk/ipareplica-install.log.txt
<https://files.pakos.uk/ipareplica-install.log.txt>
I've raised this problem on #freeipa channel (many thanks to
mbasti and ab for their help in investigating this issue with me)
however we didn't get too far and some further input from dirsrv
gurus is required here.
-s sub Enter LDAP Password: # extended LDIF # # LDAPv3 # base
with scope subtree # filter: (objectclass=*) # requesting: ALL #
AAJS5mRYSFRUUC9pcGEwMS5wYWtvcy51a0BQQUtPUy5VSwA=
MIHeoAMCAQGhAwIBAaIDAgEBowMCAQGkgccwgcQwaKAbMBmgAwIBBKESBBB5
NUQyJVZFPGYyMTZAUU0+oUkwR6ADAgESoUAEPiAA1r2NfOUD/7xph6tSb4hg/nTOwIVYhOusG/omq
a1qMz/ZVA/nn4pct9yNwFxKUGOFOz1suDz0l2Rur2vUMFigGzAZoAMCAQShEgQQOiQnZGE8Nk93V3
pvJSRLVaE5MDegAwIBEaEwBC4QAJbWI/ipYCPMu9I/jUqL39P0a9WHq8BdW2kpY9kYqsoy7D+A3fP
LwmAX3lYm objectClass: ipaobject objectClass: ipaservice
objectClass: krbticketpolicyaux objectClass: ipakrbprincipal
objectClass: krbprincipal objectClass: krbprincipalaux
<http://ipa01.pakos.uk>,cn=computers,cn=accounts,dc=pakos,dc=uk
25dc5432-cdb2-11e6-a20e-005056a2f7f5 # search result search: 2
ipa]# ldapsearch -D "cn=Directory Manager" -W -b $DN -s sub
"krbprincipalname=*" Enter LDAP Password: # extended LDIF # #
with scope subtree # filter: krbprincipalname=* # requesting: ALL
AAJS5mRYSFRUUC9pcGEwMS5wYWtvcy51a0BQQUtPUy5VSwA=
MIHeoAMCAQGhAwIBAaIDAgEBowMCAQGkgccwgcQwaKAbMBmgAwIBBKESBBB5
NUQyJVZFPGYyMTZAUU0+oUkwR6ADAgESoUAEPiAA1r2NfOUD/7xph6tSb4hg/nTOwIVYhOusG/omq
a1qMz/ZVA/nn4pct9yNwFxKUGOFOz1suDz0l2Rur2vUMFigGzAZoAMCAQShEgQQOiQnZGE8Nk93V3
pvJSRLVaE5MDegAwIBEaEwBC4QAJbWI/ipYCPMu9I/jUqL39P0a9WHq8BdW2kpY9kYqsoy7D+A3fP
LwmAX3lYm objectClass: ipaobject objectClass: ipaservice
objectClass: krbticketpolicyaux objectClass: ipakrbprincipal
objectClass: krbprincipal objectClass: krbprincipalaux
<http://ipa01.pakos.uk>,cn=computers,cn=accounts,dc=pakos,dc=uk
25dc5432-cdb2-11e6-a20e-005056a2f7f5 # search result search: 2
ipa]# ldapsearch -D "cn=Directory Manager" -W -b $DN -s sub
"(objectclass=*)" Enter LDAP Password: # extended LDIF # # LDAPv3
with scope subtree # filter: (objectclass=*) # requesting: ALL #
AAJS5mRYSFRUUC9pcGEwMS5wYWtvcy51a0BQQUtPUy5VSwA=
MIHeoAMCAQGhAwIBAaIDAgEBowMCAQGkgccwgcQwaKAbMBmgAwIBBKESBBB5
NUQyJVZFPGYyMTZAUU0+oUkwR6ADAgESoUAEPiAA1r2NfOUD/7xph6tSb4hg/nTOwIVYhOusG/omq
a1qMz/ZVA/nn4pct9yNwFxKUGOFOz1suDz0l2Rur2vUMFigGzAZoAMCAQShEgQQOiQnZGE8Nk93V3
pvJSRLVaE5MDegAwIBEaEwBC4QAJbWI/ipYCPMu9I/jUqL39P0a9WHq8BdW2kpY9kYqsoy7D+A3fP
LwmAX3lYm objectClass: ipaobject objectClass: ipaservice
objectClass: krbticketpolicyaux objectClass: ipakrbprincipal
objectClass: krbprincipal objectClass: krbprincipalaux
<http://ipa01.pakos.uk>,cn=computers,cn=accounts,dc=pakos,dc=uk
25dc5432-cdb2-11e6-a20e-005056a2f7f5 # search result search: 2
result: 0 Success # numResponses: 2 # numEntries: 1
-s base Enter LDAP Password: # extended LDIF # # LDAPv3 # base
with scope baseObject # filter: (objectclass=*) # requesting: ALL
AAJS5mRYSFRUUC9pcGEwMS5wYWtvcy51a0BQQUtPUy5VSwA=
MIHeoAMCAQGhAwIBAaIDAgEBowMCAQGkgccwgcQwaKAbMBmgAwIBBKESBBB5
NUQyJVZFPGYyMTZAUU0+oUkwR6ADAgESoUAEPiAA1r2NfOUD/7xph6tSb4hg/nTOwIVYhOusG/omq
a1qMz/ZVA/nn4pct9yNwFxKUGOFOz1suDz0l2Rur2vUMFigGzAZoAMCAQShEgQQOiQnZGE8Nk93V3
pvJSRLVaE5MDegAwIBEaEwBC4QAJbWI/ipYCPMu9I/jUqL39P0a9WHq8BdW2kpY9kYqsoy7D+A3fP
LwmAX3lYm objectClass: ipaobject objectClass: ipaservice
objectClass: krbticketpolicyaux objectClass: ipakrbprincipal
objectClass: krbprincipal objectClass: krbprincipalaux
<http://ipa01.pakos.uk>,cn=computers,cn=accounts,dc=pakos,dc=uk
25dc5432-cdb2-11e6-a20e-005056a2f7f5 # search result search: 2
result: 0 Success # numResponses: 2 # numEntries: 1
I must say that this a show stopper for us at WANdisco which is
holding back the upgrade from FreeIPA 4.2 to FreeIPA 4.4.
If there is anything else I can do to help with the
investigation, please just let me know.
Many thanks in advance.
--
Kind regards,
Peter Pakos
--
Kind regards,
Peter Pakos
Loading...