Hi Rob,

Thanks for your help. There are three servers, we use a third-party CA, and
the CA certificate is installed on the IPA servers, but as far as I know
our IPA install is not configured to act as a CA itself. Setting the time
back did not change the system behavior.

The issue ended up being an incorrect private key. I installed the correct
private key for the new certificate and was able to start and log in
normally. I thought that the private key for the prior cert was unchanged
(as was the case for other servers in my system), but this one appears to
have used a different, encrypted private key previously.

Thanks again,

Toma

On Mon, Jul 1, 2024 at 4:48 PM Rob Crittenden <rcrit...@redhat.com> wrote:

> Toma Morris via FreeIPA-users wrote:
> > ## Problem and version info
> >
> > I recently took over as the sysadmin for a system that was previously
> set up, and has not had a sysadmin for 6+ months, plus appears to have been
> fairly neglected even before then. It has three FreeIPA nodes that have not
> seen a system update in several years, and CentOS can no longer be updated
> so I cannot update them. I'm planning to replace them but have not created
> the replacements yet and need the current system to continue functioning,
> both in general and also in order to enroll new nodes and replicate to them
> before bringing down the old ones.
> >
> > ```
> > $ ipa --version
> > VERSION: 4.9.6, API_VERSION: 2.245
> > $ lsb_release -a
> > LSB Version:  :core-4.1-amd64:core-4.1-noarch
> > Distributor ID:       Fedora
> > Description:  Fedora release 34 (Thirty Four)
> > Release:      34
> > Codename:     ThirtyFour
> > ```
> >
> > I have been working my way through system updates and improvements, but
> had not checked the expiration dates on the server certificates yet, and
> the certificates expired on June 21. I saw this and got a new (wildcard, as
> before) certificate and began replacing them. I'm new to FreeIPA and had
> only used it to add a handful of users and set a few DNS entries. I
> bypassed the certificate error in the browser to go to the FreeIPA web UI (
> https://freeipa1.mydomain.com/ipa/ui/#), and tried to log in and got the
> error message "Login failed due to an unknown reason". I am certain of my
> password.
> >
> > I saw that it runs httpd, so I copied the new cert onto the server and
> changed the httpd config to point to it and the appropriate key. Now, when
> I navigate to the web UI I no longer get a certificate error, but I
> continue to get the same error message when I try to log in.
> >
> > FreeIPA appears to be working partially, because it governs `sudo`
> access and login within this system and I am still able to login and
> `sudo`. When I try to use any `ipa` commands, however, I get the following
> or something similar:
> >
> > ```
> > $ sudo ipa-certupdate
> > Connection to https://freeipa1.mydomain.com/ipa/json failed with [SSL:
> CERTIFICATE_VERIFY_FAILED] certificate verify failed: unable to get local
> issuer certificate (_ssl.c:1129)
> > Connection to https://freeipa2.mydomain.com/ipa/json failed with [SSL:
> CERTIFICATE_VERIFY_FAILED] certificate verify failed: unable to get local
> issuer certificate (_ssl.c:1129)
> > Connection to https://freeipa3.mydomain.com/ipa/json failed with [SSL:
> CERTIFICATE_VERIFY_FAILED] certificate verify failed: unable to get local
> issuer certificate (_ssl.c:1129)
> > cannot connect to 'any of the configured servers':
> https://freeipa1.mydomain.com/ipa/json,
> https://freeipa2.mydomain.com/ipa/json,
> https://freeipa3.mydomain.com/ipa/json
> > The ipa-certupdate command failed.
> > ```
>
> You replaced the certificate(s) with one from an issuer untrusted by the
> system.
>
> > and
> >
> > ```
> > $ ipa user-find
> > ipa: ERROR: cannot connect to 'any of the configured servers':
> https://freeipa1.mydomain.com/ipa/json,
> https://freeipa2.mydomain.com/ipa/json,
> https://freeipa3.mydomain.com/ipa/json
> > ```
> >
> > I am able to get correct responses from `id [username]` and `getent
> passwd [username]`, and am able to `kinit`, `ssh`, and `sudo` using
> credentials that are governed by these servers.
> >
> > ## What I have tried
> >
> > - I replaced the old certificate in the httpd config with a new one that
> is essentially the same except it has an updated valid date window, and is
> signed with RSA384 instead of RSA356 (I don't think this matters, but
> including for completeness), and then restarted httpd
>
> Do you have a CA configured in this topology? How many servers?
>
> > - I did `ipactl restart` and `systemctl restart sssd`
> > - I put the old certificate back in place, disabled NTP on the server
> and set the time back to a date when the prior certificate was valid
>
> And then what? Did things work?
>
> > - I have looked through sssd_* and /var/log/secure for relevant logs. I
> found one at /var/log/sssd/sssd_mydomain.com.log, with error logs that
> appear relevant, but I'm not able to tell what is not working. I have not
> found other relevant-looking entries in other sssd logs
> > - `dig -t SRV _ldap._tcp.freeipa1.mydomain.com @127.0.0.1` from the
> freeipa1 terminal gave a reasonable response
> >
> > I also tried an ldapsearch that had worked previously:
> >
> > ```
> > $ ldapsearch -x -b "dc=mydomain,dc=com" -H ldap://freeipa1.mydomain.com
> -D "cn=admin,dc=mydomain,dc=com" -W
> > Enter LDAP Password:
> > ldap_bind: Invalid credentials (49)
> > ```
>
> You used the wrong DN. It is
> uid=admin,cn=users,cn=accounts,dc=mydomain,dc=com
>
> And this won't exercise TLS which is the root of the problem. But being
> able to use LDAP will give you more information on the installation if
> necessary.
>
> >
> > ## Logs
> >
> > Here is a snippet from a very large log file from freeipa3.mydomain.com:
> /var/log/sssd/sssd_mydomain.com.log. I elided portions that seem to be
> generic, and kept lines that mention mydomain.com and what appears to be
> related context. It's possible I elided something important, and can
> provide unelided logs or specific portions if needed. There are 3
> backtraces here, the first is long and elided and the last two are short
> and included in full. I notice the conspicuous "Network is unreachable"
> messages, and checked to confirm that I am able to ping all three servers
> from everywhere in the network (including from these servers themselves),
> so I don't believe it is actually a network outage.
>
>
> This is a server-side problem. The client is in this case is unrelated.
>
> rob
>
>
-- 
_______________________________________________
FreeIPA-users mailing list -- freeipa-users@lists.fedorahosted.org
To unsubscribe send an email to freeipa-users-le...@lists.fedorahosted.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedorahosted.org/archives/list/freeipa-users@lists.fedorahosted.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue

Reply via email to