After getting SIDs added to all users and groups, and ensuring all hosts have krbcanonicalname added, I haven't gotten any further.
After adding the host as an ipa-client, I then run ipa-replica-install --setup-ca --skip-conncheck --unattended --verbose --log-file=/root/ipa-replica-install.log and it will finish succesfully. All seems well until I poke a bit deeper. Setting a current CentOS 7 client to use this host and run ipa -vv ping I receive the error: ipa: INFO: Connection to https://idm02.mgmt.example.net/ipa/session/json failed with <ProtocolError for idm02.mgmt.example.net/ipa/session/json: 401 Unauthorized> ipa: INFO: trying https://ipa02.mgmt.example.net/ipa/session/json ipa: INFO: Request: { "id": 0, "method": "ping", "params": [ [], {} ] } I had similar issues from another RHEL8 box connecting to this host, and as near as I can tell, the issue is something arcane with kerberos. logs from above ipa -vv ping call: ==> /var/log/httpd/error_log <== [Thu Jan 09 00:23:41.273124 2025] [auth_gssapi:error] [pid 6115:tid 140546118952704] [client 10.0.0.15:51082] Failed to unseal session data!, referer: https://idm02.mgmt.example.net/ipa/xml ==> /var/log/httpd/access_log <== 10.0.0.15 - - [09/Jan/2025:00:23:41 +0000] "POST /ipa/session/json HTTP/1.1" 401 2719 ==> /var/log/httpd/ssl_request_log <== [09/Jan/2025:00:23:41 +0000] 10.0.0.15 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384 "POST /ipa/session/json HTTP/1.1" 2719 ==> /var/log/krb5kdc.log <== Jan 09 00:23:41 idm02.mgmt.example.net krb5kdc[6348](info): TGS_REQ (7 etypes {aes256-cts-hmac-sha384-192(20), aes128-cts-hmac-sha256-128(19), aes256-cts-hmac-sha1-96(18), aes128-cts-hmac-sha1-96(17), camellia256-cts-cmac(26), camellia128-cts-cmac(25), DEPRECATED:arcfour-hmac(23)}) 10.1.0.50: S4U2PROXY_MISSING_EXTENDED_KDC_SIGN_IN_EVIDENCE_TKT_PAC: authtime 1736382160, etypes {rep=UNSUPPORTED:(0)} HTTP/idm02.mgmt.example....@ipa.example.net for ldap/idm02.mgmt.example....@ipa.example.net, KDC policy rejects request Jan 09 00:23:41 idm02.mgmt.example.net krb5kdc[6348](info): ... CONSTRAINED-DELEGATION s4u-client=<unknown> Jan 09 00:23:41 idm02.mgmt.example.net krb5kdc[6348](info): closing down fd 11 ==> /var/log/httpd/error_log <== [Thu Jan 09 00:23:41.292757 2025] [wsgi:error] [pid 5845:tid 140546394371840] [remote 10.0.0.15:51082] ipa: INFO: 401 Unauthorized: Insufficient access: SASL(-1): generic failure: GSSAPI Error: Unspecified GSS failure. Minor code may provide more information (Credential cache is empty) ==> /var/log/httpd/access_log <== 10.0.0.15 - chris.jac...@ipa.example.net [09/Jan/2025:00:23:41 +0000] "POST /ipa/session/json HTTP/1.1" 401 290 ==> /var/log/httpd/ssl_request_log <== [09/Jan/2025:00:23:41 +0000] 10.0.0.15 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384 "POST /ipa/session/json HTTP/1.1" 290 ==> /var/log/krb5kdc.log <== Jan 09 00:23:41 idm02.mgmt.example.net krb5kdc[6348](info): TGS_REQ (7 etypes {aes256-cts-hmac-sha384-192(20), aes128-cts-hmac-sha256-128(19), aes256-cts-hmac-sha1-96(18), aes128-cts-hmac-sha1-96(17), camellia256-cts-cmac(26), camellia128-cts-cmac(25), DEPRECATED:arcfour-hmac(23)}) 10.1.0.50: S4U2PROXY_MISSING_EXTENDED_KDC_SIGN_IN_EVIDENCE_TKT_PAC: authtime 1736382160, etypes {rep=UNSUPPORTED:(0)} HTTP/idm02.mgmt.example....@ipa.example.net for ldap/idm02.mgmt.example....@ipa.example.net, KDC policy rejects request Jan 09 00:23:41 idm02.mgmt.example.net krb5kdc[6348](info): ... CONSTRAINED-DELEGATION s4u-client=<unknown> Jan 09 00:23:41 idm02.mgmt.example.net krb5kdc[6348](info): closing down fd 11 ==> /var/log/httpd/error_log <== [Thu Jan 09 00:23:41.314422 2025] [wsgi:error] [pid 5844:tid 140546394371840] [remote 10.0.0.15:51084] ipa: INFO: 401 Unauthorized: Insufficient access: SASL(-1): generic failure: GSSAPI Error: Unspecified GSS failure. Minor code may provide more information (Credential cache is empty) ==> /var/log/httpd/access_log <== 10.0.0.15 - chris.jac...@ipa.example.net [09/Jan/2025:00:23:41 +0000] "POST /ipa/session/json HTTP/1.1" 401 290 ==> /var/log/httpd/ssl_request_log <== [09/Jan/2025:00:23:41 +0000] 10.0.0.15 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384 "POST /ipa/session/json HTTP/1.1" 290 ==> /var/log/messages <== Jan 9 00:23:41 idm02 [5845]: GSSAPI Error: Unspecified GSS failure. Minor code may provide more information (Credential cache is empty) Jan 9 00:23:41 idm02 [5844]: GSSAPI Error: Unspecified GSS failure. Minor code may provide more information (Credential cache is empty) I have verified permission of /run/ipa/ccache, I have tried after reboots, and I also found this seemingly related error in slapd log: [09/Jan/2025:00:09:03.758725886 +0000] - ERR - set_krb5_creds - Could not get initial credentials for principal [ldap/idm02.mgmt.example....@ipa.example.net] in keytab [FILE:/etc/dirsrv/ds.keytab]: -1765328324 (Generic error (see e-text)) I have the same issues with default crypto policies, DEFAULT:AD-SUPPORT and LEGACY:AD-SUPPORT. ipa packages: ipa-client-4.9.13-14.module+el8.10.0+22574+12a10600.x86_64 ipa-client-common-4.9.13-14.module+el8.10.0+22574+12a10600.noarch ipa-common-4.9.13-14.module+el8.10.0+22574+12a10600.noarch ipa-healthcheck-0.12-4.module+el8.10.0+22138+e77d88cf.noarch ipa-healthcheck-core-0.12-4.module+el8.10.0+22138+e77d88cf.noarch ipa-selinux-4.9.13-14.module+el8.10.0+22574+12a10600.noarch ipa-server-4.9.13-14.module+el8.10.0+22574+12a10600.x86_64 ipa-server-common-4.9.13-14.module+el8.10.0+22574+12a10600.noarch The old CentOS 7 ipa nodes are running latest available to them from centos repos: 4.6.8 End goal: get RHEL8 idm nodes up and running to take over for the existing ipa nodes (I think all I'll need to do once I get these RHEL8 IDM nodes up and running well is set one them as the CA and CRL master and then slowly snip the old C7 IPA nodes). I'm at my wits end here and seem to have hit a roadblock. Any help would be appreciated. Thanks, - chris -- _______________________________________________ FreeIPA-users mailing list -- freeipa-users@lists.fedorahosted.org To unsubscribe send an email to freeipa-users-le...@lists.fedorahosted.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedorahosted.org/archives/list/freeipa-users@lists.fedorahosted.org Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue