Rob Crittenden via FreeIPA-users wrote: > Kees Bakker via FreeIPA-users wrote: >> On 13-07-2021 19:47, Kees Bakker via FreeIPA-users wrote: >>> *** EXTERNAL E-MAIL *** >>> >>> >>> On 13-07-2021 17:24, Kees Bakker via FreeIPA-users wrote: >>>> On 13-07-2021 17:08, Rob Crittenden wrote: >>>>> Kees Bakker wrote: >>>>>> On 12-07-2021 21:51, Rob Crittenden wrote: >>>>>>> Kees Bakker via FreeIPA-users wrote: >>>>>>>> Hi Flo, >>>>>>>> >>>>>>>> Do you have a hint how I can get to the point where I can execute >>>>>>>> the pki securitydomain-host-del command? All examples [2] on the >>>>>>>> Internet >>>>>>>> are from the time when there was a /root/ca-agent.p12 and ipaCert. >>>>>>>> I think that has been migrated to /var/lib/ipa/ra-agent.{key,pem} >>>>>>>> [1]. >>>>>>>> >>>>>>>> Maybe you are going to say that I shouldn't need that pki >>>>>>>> command. But I >>>>>>>> have two deleted masters in the pki database. Using >>>>>>>> pki securitydomain-host-del seems the only way to get rid of >>>>>>>> them. If >>>>>>>> you >>>>>>>> have a better suggestion then please let me know. >>>>>>>> >>>>>>>> [1] https://www.freeipa.org/page/Releases/4.8.1 >>>>>>>> [2] https://www.dogtagpki.org/wiki/IPA_PKI_Admin_Setup >>>>>>> The CA agent is something different and not used by IPA at all. If >>>>>>> your >>>>>>> installation is > 2 years old it is expired anyway. >>>>>>> >>>>>>> The dogtag documentation is woefully out-of-date in this regard >>>>>>> unfortunately (and yes, I realize I also live in a glass house >>>>>>> regarding >>>>>>> wikis). >>>>>>> >>>>>>> You don't need to import anything, the entries you need are already >>>>>>> there. Try: >>>>>>> >>>>>>> # pki -d /etc/pki/pki-tomcat/alias/ -n 'subsystemCert cert-pki-ca' -C >>>>>>> /etc/pki/pki-tomcat/alias/pwdfile.txt securitydomain-host-del 'CA >>>>>>> ipa.example.test 443' >>>>>> Thanks Rob, >>>>>> >>>>>> That did it. >>>>>> >>>>>> I'm now almost there to get a clean outcome of ipa-healthcheck. >>>>>> It reports no errors anymore, but ... there is one healthcheck that >>>>>> wants a password. I have no idea what or why. >>>>>> >>>>>> [root@linge ~]# /usr/bin/ipa-healthcheck --source >>>>>> pki.server.healthcheck.clones.connectivity_and_data >>>>>> keyctl_search: Required key not available >>>>>> Enter password for Internal Key Storage Token: >>>>>> [] >>>>> This comes out of the pki healthcheck plugins. >>>>> >>>>> The check does some client cert connections, so I assume it needs the >>>>> NSS database password. I'm guessing it looks in the kernel keyring >>>>> (keyctl_search) and then prompts the user. >>>>> >>>>> You can open an issue against them at >>>>> https://github.com/dogtagpki/pki/issues >>>> See https://github.com/dogtagpki/pki/issues/3650 >>> >>> I wrote some more details in the issue. First part of the problem is >>> that I have this in /etc/pki/pki-tomcat/ca/CS.cfg >>> >>> ca.subsystem.tokenname=Internal Key Storage Token >>> >>> The second part of the problem is that this name should be >>> normalized to "internal". >>> >>> In pki.nssdb there is a normalize function but that is not called >>> in the case. Furthermore, the function is not implemented as I >>> would have done it. >>> >>> If the above two problems were to be solved then the plugin would >>> get the password from /etc/pki/pki-tomcat/password.conf >> >> I am a bit surprised that nobody has this problem but me. The solution >> is probably as simple as this: >> >> diff --git >> a/base/server/healthcheck/pki/server/healthcheck/clones/plugin.py >> b/base/server/healthcheck/pki/server/healthcheck/clones/plugin.py >> index bea2872ea..2472f35b5 100644 >> --- a/base/server/healthcheck/pki/server/healthcheck/clones/plugin.py >> +++ b/base/server/healthcheck/pki/server/healthcheck/clones/plugin.py >> @@ -168,7 +168,7 @@ class ClonesPlugin(Plugin): >> # Set some vars we will be using later >> self.db_dir = self.security_domain.config.get('jss.configDir') >> self.subsystem_token = >> self.security_domain.config.get('ca.subsystem.tokenname') >> - self.passwd = self.instance.get_password(self.subsystem_token) >> + self.passwd = >> self.instance.get_token_password(self.subsystem_token) >> >> return sec_domain, sechost, secport > > You're not the only one who has reported this, just the first to have > reported it upstream AFAIK. > > Nice work on the patch.
BTW there is also a BZ for this, https://bugzilla.redhat.com/show_bug.cgi?id=1980378 rob > >> >> >>> -- Kees >>> >>>>> >>>>> rob >>>>> >>>>>> -- Kees >>>>>>> rob >>>>>>> >>>>>>>> -- Kees >>>>>>>> >>>>>>>> On 12-07-2021 15:01, Kees Bakker via FreeIPA-users wrote: >>>>>>>>> It is now time for me to try and follow the suggested pki commands. >>>>>>>>> However, I don't have a /root/ca-agent.p12 >>>>>>>>> >>>>>>>>> There is quite a bit of documentation on the Internet, but it might >>>>>>>>> not all be >>>>>>>>> up-to-date. >>>>>>>>> >>>>>>>>> Here [1] the file /root/ca-agent.p12 is mentioned under "PKI Admin >>>>>>>>> Certificate". >>>>>>>>> >>>>>>>>> "PKI admin certificate is stored in several locations: >>>>>>>>> >>>>>>>>> /root/ca-agent.p12 with nickname ipa-ca-agent (misleading >>>>>>>>> nickname). >>>>>>>>> /root/.dogtag/pki-tomcat/ca_admin.cert >>>>>>>>> /root/.dogtag/pki-tomcat/ca_admin.cert.der >>>>>>>>> /root/.dogtag/pki-tomcat/ca_admin_cert.p12 (moved to >>>>>>>>> /root/ca-agent.p12) >>>>>>>>> " >>>>>>>>> >>>>>>>>> I don't have any of them. Then [1] continues with >>>>>>>>> >>>>>>>>> "PKI Agent Certificate >>>>>>>>> >>>>>>>>> PKI agent certificate is stored in /etc/httpd/alias and tracked >>>>>>>>> by IPA: >>>>>>>>> >>>>>>>>> ipaCert (CN=IPA RA) >>>>>>>>> >>>>>>>>> For IPA Password Vault the certificate is exported and cached into >>>>>>>>> /etc/httpd/alias/kra-agent.pem since python-requests does not >>>>>>>>> support >>>>>>>>> NSS. The cache is invalidated if the KRA authentication fails. >>>>>>>>> IPA Certificates >>>>>>>>> >>>>>>>>> IPA certificates are stored in /etc/httpd/alias: >>>>>>>>> >>>>>>>>> <REALM> IPA CA (CN=Certificate Authority) >>>>>>>>> <External CA DN> >>>>>>>>> ipa-ca-agent (CN=ipa-ca-agent) >>>>>>>>> ipaCert (CN=IPA RA) >>>>>>>>> Signing-Cert (CN=Object Signing Cert) >>>>>>>>> " >>>>>>>>> >>>>>>>>> But all I have in /etc/httpd/alias is a file ipasession.key >>>>>>>>> >>>>>>>>> I'm confused. >>>>>>>>> >>>>>>>>> [1] https://www.dogtagpki.org/wiki/IPA_Certificates >>>>>>>>> -- Kees >>>>>>>>> >>>>>>>>> On 14-06-2021 16:39, github--- via FreeIPA-users wrote: >>>>>>>>>> On 29-05-2021 10:21, Alexander Bokovoy wrote: >>>>>>>>>>> But I did use "ipa-csreplica-manage del" as well. However, I >>>>>>>>>>> remember that it >>>>>>>>>>> complained it couldn't remove that host. I was assuming it was >>>>>>>>>>> already gone. >>>>>>>>>>> When I list with ipa-csreplica-manage then I don't see the old >>>>>>>>>>> hosts >>>>>>>>>>> anymore. >>>>>>>>>> Its worth noting my install (4.9.3) on Fedora >>>>>>>>>> `ipa-csreplica-manage >>>>>>>>>> del` just prints a deprecated message and doesn't seem to do >>>>>>>>>> anything. >>>>>>>>>> >>>>>>>>>>> So, two things >>>>>>>>>>> 1) "ipa-csreplica-manage del" somehow failed (it's probably >>>>>>>>>>> too late >>>>>>>>>>> to look >>>>>>>>>>> at logs) >>>>>>>>>>> 2) how can I still remove the old hosts? >>>>>>>>>> I have/had the same problem. I used >>>>>>>>>> https://www.dogtagpki.org/wiki/IPA_PKI_Admin_Setup to help me auth >>>>>>>>>> into the CA to remove the dead host. >>>>>>>>>> >>>>>>>>>> pki client-cert-import --pkcs12 /root/ca-agent.p12 >>>>>>>>>> --pkcs12-password [redact] >>>>>>>>>> pki -n ipa-ca-agent securitydomain-host-find >>>>>>>>>> # you need the full Host ID section to remove >>>>>>>>>> pki -n ipa-ca-agent securitydomain-host-del "CA >>>>>>>>>> freeipa2[redact].net 443" >>>>>>>>>> >>>>>>>>>> Keep in mind I'm fairly new to IPA, so maybe you don't want to do >>>>>>>>>> this on a production system without someone else more experienced >>>>>>>>>> chiming in. But, so far, the health check stopped complaining, >>>>>>>>>> replication is fine, and all my users can still log in. _______________________________________________ FreeIPA-users mailing list -- freeipa-users@lists.fedorahosted.org To unsubscribe send an email to freeipa-users-le...@lists.fedorahosted.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedorahosted.org/archives/list/freeipa-users@lists.fedorahosted.org Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure