Kees Bakker via FreeIPA-users wrote:
> On 13-07-2021 19:47, Kees Bakker via FreeIPA-users wrote:
>> *** EXTERNAL E-MAIL ***
>>
>>
>> On 13-07-2021 17:24, Kees Bakker via FreeIPA-users wrote:
>>> On 13-07-2021 17:08, Rob Crittenden wrote:
>>>> Kees Bakker wrote:
>>>>> On 12-07-2021 21:51, Rob Crittenden wrote:
>>>>>> Kees Bakker via FreeIPA-users wrote:
>>>>>>> Hi Flo,
>>>>>>>
>>>>>>> Do you have a hint how I can get to the point where I can execute
>>>>>>> the pki securitydomain-host-del command? All examples [2] on the
>>>>>>> Internet
>>>>>>> are from the time when there was a /root/ca-agent.p12 and ipaCert.
>>>>>>> I think that has been migrated to /var/lib/ipa/ra-agent.{key,pem}
>>>>>>> [1].
>>>>>>>
>>>>>>> Maybe you are going to say that I shouldn't need that pki
>>>>>>> command. But I
>>>>>>> have two deleted masters in the pki database. Using
>>>>>>> pki securitydomain-host-del seems the only way to get rid of
>>>>>>> them. If
>>>>>>> you
>>>>>>> have a better suggestion then please let me know.
>>>>>>>
>>>>>>> [1] https://www.freeipa.org/page/Releases/4.8.1
>>>>>>> [2] https://www.dogtagpki.org/wiki/IPA_PKI_Admin_Setup
>>>>>> The CA agent is something different and not used by IPA at all. If
>>>>>> your
>>>>>> installation is > 2 years old it is expired anyway.
>>>>>>
>>>>>> The dogtag documentation is woefully out-of-date in this regard
>>>>>> unfortunately (and yes, I realize I also live in a glass house
>>>>>> regarding
>>>>>> wikis).
>>>>>>
>>>>>> You don't need to import anything, the entries you need are already
>>>>>> there. Try:
>>>>>>
>>>>>> # pki -d /etc/pki/pki-tomcat/alias/ -n 'subsystemCert cert-pki-ca' -C
>>>>>> /etc/pki/pki-tomcat/alias/pwdfile.txt securitydomain-host-del 'CA
>>>>>> ipa.example.test 443'
>>>>> Thanks Rob,
>>>>>
>>>>> That did it.
>>>>>
>>>>> I'm now almost there to get a clean outcome of ipa-healthcheck.
>>>>> It reports no errors anymore, but ... there is one healthcheck that
>>>>> wants a password. I have no idea what or why.
>>>>>
>>>>> [root@linge ~]# /usr/bin/ipa-healthcheck --source
>>>>> pki.server.healthcheck.clones.connectivity_and_data
>>>>> keyctl_search: Required key not available
>>>>> Enter password for Internal Key Storage Token:
>>>>> []
>>>> This comes out of the pki healthcheck plugins.
>>>>
>>>> The check does some client cert connections, so I assume it needs the
>>>> NSS database password. I'm guessing it looks in the kernel keyring
>>>> (keyctl_search) and then prompts the user.
>>>>
>>>> You can open an issue against them at
>>>> https://github.com/dogtagpki/pki/issues
>>> See https://github.com/dogtagpki/pki/issues/3650
>>
>> I wrote some more details in the issue. First part of the problem is
>> that I have this in /etc/pki/pki-tomcat/ca/CS.cfg
>>
>> ca.subsystem.tokenname=Internal Key Storage Token
>>
>> The second part of the problem is that this name should be
>> normalized to "internal".
>>
>> In pki.nssdb there is a normalize function but that is not called
>> in the case. Furthermore, the function is not implemented as I
>> would have done it.
>>
>> If the above two problems were to be solved then the plugin would
>> get the password from /etc/pki/pki-tomcat/password.conf
> 
> I am a bit surprised that nobody has this problem but me. The solution
> is probably as simple as this:
> 
> diff --git
> a/base/server/healthcheck/pki/server/healthcheck/clones/plugin.py
> b/base/server/healthcheck/pki/server/healthcheck/clones/plugin.py
> index bea2872ea..2472f35b5 100644
> --- a/base/server/healthcheck/pki/server/healthcheck/clones/plugin.py
> +++ b/base/server/healthcheck/pki/server/healthcheck/clones/plugin.py
> @@ -168,7 +168,7 @@ class ClonesPlugin(Plugin):
>              # Set some vars we will be using later
>              self.db_dir = self.security_domain.config.get('jss.configDir')
>              self.subsystem_token =
> self.security_domain.config.get('ca.subsystem.tokenname')
> -            self.passwd = self.instance.get_password(self.subsystem_token)
> +            self.passwd =
> self.instance.get_token_password(self.subsystem_token)
> 
>          return sec_domain, sechost, secport

You're not the only one who has reported this, just the first to have
reported it upstream AFAIK.

Nice work on the patch.

rob

> 
> 
>> -- Kees
>>
>>>>
>>>> rob
>>>>
>>>>> -- Kees
>>>>>> rob
>>>>>>
>>>>>>> -- Kees
>>>>>>>
>>>>>>> On 12-07-2021 15:01, Kees Bakker via FreeIPA-users wrote:
>>>>>>>> It is now time for me to try and follow the suggested pki commands.
>>>>>>>> However, I don't have a /root/ca-agent.p12
>>>>>>>>
>>>>>>>> There is quite a bit of documentation on the Internet, but it might
>>>>>>>> not all be
>>>>>>>> up-to-date.
>>>>>>>>
>>>>>>>> Here [1] the file /root/ca-agent.p12 is mentioned under "PKI Admin
>>>>>>>> Certificate".
>>>>>>>>
>>>>>>>> "PKI admin certificate is stored in several locations:
>>>>>>>>
>>>>>>>>       /root/ca-agent.p12 with nickname ipa-ca-agent (misleading
>>>>>>>> nickname).
>>>>>>>>       /root/.dogtag/pki-tomcat/ca_admin.cert
>>>>>>>>       /root/.dogtag/pki-tomcat/ca_admin.cert.der
>>>>>>>>       /root/.dogtag/pki-tomcat/ca_admin_cert.p12 (moved to
>>>>>>>> /root/ca-agent.p12)
>>>>>>>> "
>>>>>>>>
>>>>>>>> I don't have any of them. Then [1] continues with
>>>>>>>>
>>>>>>>> "PKI Agent Certificate
>>>>>>>>
>>>>>>>> PKI agent certificate is stored in /etc/httpd/alias and tracked
>>>>>>>> by IPA:
>>>>>>>>
>>>>>>>>       ipaCert (CN=IPA RA)
>>>>>>>>
>>>>>>>> For IPA Password Vault the certificate is exported and cached into
>>>>>>>> /etc/httpd/alias/kra-agent.pem since python-requests does not
>>>>>>>> support
>>>>>>>> NSS. The cache is invalidated if the KRA authentication fails.
>>>>>>>> IPA Certificates
>>>>>>>>
>>>>>>>> IPA certificates are stored in /etc/httpd/alias:
>>>>>>>>
>>>>>>>>       <REALM> IPA CA (CN=Certificate Authority)
>>>>>>>>       <External CA DN>
>>>>>>>>       ipa-ca-agent (CN=ipa-ca-agent)
>>>>>>>>       ipaCert (CN=IPA RA)
>>>>>>>>       Signing-Cert (CN=Object Signing Cert)
>>>>>>>> "
>>>>>>>>
>>>>>>>> But all I have in /etc/httpd/alias is a file ipasession.key
>>>>>>>>
>>>>>>>> I'm confused.
>>>>>>>>
>>>>>>>> [1] https://www.dogtagpki.org/wiki/IPA_Certificates
>>>>>>>> -- Kees
>>>>>>>>
>>>>>>>> On 14-06-2021 16:39, github--- via FreeIPA-users wrote:
>>>>>>>>> On 29-05-2021 10:21, Alexander Bokovoy wrote:
>>>>>>>>>> But I did use "ipa-csreplica-manage del" as well. However, I
>>>>>>>>>> remember that it
>>>>>>>>>> complained it couldn't remove that host. I was assuming it was
>>>>>>>>>> already gone.
>>>>>>>>>> When I list with ipa-csreplica-manage then I don't see the old
>>>>>>>>>> hosts
>>>>>>>>>> anymore.
>>>>>>>>> Its worth noting my install (4.9.3) on Fedora
>>>>>>>>> `ipa-csreplica-manage
>>>>>>>>> del` just prints a deprecated message and doesn't seem to do
>>>>>>>>> anything.
>>>>>>>>>
>>>>>>>>>> So, two things
>>>>>>>>>> 1) "ipa-csreplica-manage del" somehow failed (it's probably
>>>>>>>>>> too late
>>>>>>>>>> to look
>>>>>>>>>> at logs)
>>>>>>>>>> 2) how can I still remove the old hosts?
>>>>>>>>> I have/had the same problem.  I used
>>>>>>>>> https://www.dogtagpki.org/wiki/IPA_PKI_Admin_Setup to help me auth
>>>>>>>>> into the CA to remove the dead host.
>>>>>>>>>
>>>>>>>>>        pki client-cert-import --pkcs12 /root/ca-agent.p12
>>>>>>>>> --pkcs12-password [redact]
>>>>>>>>>        pki -n ipa-ca-agent  securitydomain-host-find
>>>>>>>>>        # you need the full Host ID section to remove
>>>>>>>>>        pki -n ipa-ca-agent  securitydomain-host-del "CA
>>>>>>>>> freeipa2[redact].net 443"
>>>>>>>>>
>>>>>>>>> Keep in mind I'm fairly new to IPA, so maybe you don't want to do
>>>>>>>>> this on a production system without someone else more experienced
>>>>>>>>> chiming in.  But, so far, the health check stopped complaining,
>>>>>>>>> replication is fine, and all my users can still log in.
>>>>>>>>> _______________________________________________
>>>>>>>>> FreeIPA-users mailing list -- freeipa-users@lists.fedorahosted.org
>>>>>>>>> To unsubscribe send an email to
>>>>>>>>> freeipa-users-le...@lists.fedorahosted.org
>>>>>>>>> Fedora Code of Conduct:
>>>>>>>>> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
>>>>>>>>> List Guidelines:
>>>>>>>>> https://fedoraproject.org/wiki/Mailing_list_guidelines
>>>>>>>>> List Archives:
>>>>>>>>> https://lists.fedorahosted.org/archives/list/freeipa-users@lists.fedorahosted.org
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> Do not reply to spam on the list, report it:
>>>>>>>>> https://pagure.io/fedora-infrastructure
>>>>>>>> _______________________________________________
>>>>>>>> FreeIPA-users mailing list -- freeipa-users@lists.fedorahosted.org
>>>>>>>> To unsubscribe send an email to
>>>>>>>> freeipa-users-le...@lists.fedorahosted.org
>>>>>>>> Fedora Code of Conduct:
>>>>>>>> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
>>>>>>>> List Guidelines:
>>>>>>>> https://fedoraproject.org/wiki/Mailing_list_guidelines
>>>>>>>> List Archives:
>>>>>>>> https://lists.fedorahosted.org/archives/list/freeipa-users@lists.fedorahosted.org
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>> Do not reply to spam on the list, report it:
>>>>>>>> https://pagure.io/fedora-infrastructure
>>>>>>> _______________________________________________
>>>>>>> FreeIPA-users mailing list -- freeipa-users@lists.fedorahosted.org
>>>>>>> To unsubscribe send an email to
>>>>>>> freeipa-users-le...@lists.fedorahosted.org
>>>>>>> Fedora Code of Conduct:
>>>>>>> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
>>>>>>> List Guidelines:
>>>>>>> https://fedoraproject.org/wiki/Mailing_list_guidelines
>>>>>>> List Archives:
>>>>>>> https://lists.fedorahosted.org/archives/list/freeipa-users@lists.fedorahosted.org
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>> Do not reply to spam on the list, report it:
>>>>>>> https://pagure.io/fedora-infrastructure
>>> _______________________________________________
>>> FreeIPA-users mailing list -- freeipa-users@lists.fedorahosted.org
>>> To unsubscribe send an email to
>>> freeipa-users-le...@lists.fedorahosted.org
>>> Fedora Code of Conduct:
>>> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
>>> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
>>> List Archives:
>>> https://lists.fedorahosted.org/archives/list/freeipa-users@lists.fedorahosted.org
>>>
>>> Do not reply to spam on the list, report it:
>>> https://pagure.io/fedora-infrastructure
>> _______________________________________________
>> FreeIPA-users mailing list -- freeipa-users@lists.fedorahosted.org
>> To unsubscribe send an email to
>> freeipa-users-le...@lists.fedorahosted.org
>> Fedora Code of Conduct:
>> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
>> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
>> List Archives:
>> https://lists.fedorahosted.org/archives/list/freeipa-users@lists.fedorahosted.org
>>
>> Do not reply to spam on the list, report it:
>> https://pagure.io/fedora-infrastructure
> _______________________________________________
> FreeIPA-users mailing list -- freeipa-users@lists.fedorahosted.org
> To unsubscribe send an email to freeipa-users-le...@lists.fedorahosted.org
> Fedora Code of Conduct:
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives:
> https://lists.fedorahosted.org/archives/list/freeipa-users@lists.fedorahosted.org
> 
> Do not reply to spam on the list, report it:
> https://pagure.io/fedora-infrastructure
_______________________________________________
FreeIPA-users mailing list -- freeipa-users@lists.fedorahosted.org
To unsubscribe send an email to freeipa-users-le...@lists.fedorahosted.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedorahosted.org/archives/list/freeipa-users@lists.fedorahosted.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure

Reply via email to