After getting SIDs added to all users and groups, and ensuring all hosts have 
krbcanonicalname added, I haven't gotten any further.

After adding the host as an ipa-client, I then run ipa-replica-install 
--setup-ca --skip-conncheck --unattended --verbose 
--log-file=/root/ipa-replica-install.log and it will finish succesfully.

All seems well until I poke a bit deeper. Setting a current CentOS 7 client to 
use this host and run ipa -vv ping I receive the error:
ipa: INFO: Connection to https://idm02.mgmt.example.net/ipa/session/json failed 
with <ProtocolError for idm02.mgmt.example.net/ipa/session/json: 401 
Unauthorized>
ipa: INFO: trying https://ipa02.mgmt.example.net/ipa/session/json
ipa: INFO: Request: {
    "id": 0, 
    "method": "ping", 
    "params": [
        [], 
        {}
    ]
}

I had similar issues from another RHEL8 box connecting to this host, and as 
near as I can tell, the issue is something arcane with kerberos.

logs from above ipa -vv ping call:
==> /var/log/httpd/error_log <==
[Thu Jan 09 00:23:41.273124 2025] [auth_gssapi:error] [pid 6115:tid 
140546118952704] [client 10.0.0.15:51082] Failed to unseal session data!, 
referer: https://idm02.mgmt.example.net/ipa/xml

==> /var/log/httpd/access_log <==
10.0.0.15 - - [09/Jan/2025:00:23:41 +0000] "POST /ipa/session/json HTTP/1.1" 
401 2719

==> /var/log/httpd/ssl_request_log <==
[09/Jan/2025:00:23:41 +0000] 10.0.0.15 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384 
"POST /ipa/session/json HTTP/1.1" 2719

==> /var/log/krb5kdc.log <==
Jan 09 00:23:41 idm02.mgmt.example.net krb5kdc[6348](info): TGS_REQ (7 etypes 
{aes256-cts-hmac-sha384-192(20), aes128-cts-hmac-sha256-128(19), 
aes256-cts-hmac-sha1-96(18), aes128-cts-hmac-sha1-96(17), 
camellia256-cts-cmac(26), camellia128-cts-cmac(25), 
DEPRECATED:arcfour-hmac(23)}) 10.1.0.50: 
S4U2PROXY_MISSING_EXTENDED_KDC_SIGN_IN_EVIDENCE_TKT_PAC: authtime 1736382160, 
etypes {rep=UNSUPPORTED:(0)} HTTP/idm02.mgmt.example....@ipa.example.net for 
ldap/idm02.mgmt.example....@ipa.example.net, KDC policy rejects request
Jan 09 00:23:41 idm02.mgmt.example.net krb5kdc[6348](info): ... 
CONSTRAINED-DELEGATION s4u-client=<unknown>
Jan 09 00:23:41 idm02.mgmt.example.net krb5kdc[6348](info): closing down fd 11

==> /var/log/httpd/error_log <==
[Thu Jan 09 00:23:41.292757 2025] [wsgi:error] [pid 5845:tid 140546394371840] 
[remote 10.0.0.15:51082] ipa: INFO: 401 Unauthorized: Insufficient access: 
SASL(-1): generic failure: GSSAPI Error: Unspecified GSS failure.  Minor code 
may provide more information (Credential cache is empty)

==> /var/log/httpd/access_log <==
10.0.0.15 - chris.jac...@ipa.example.net [09/Jan/2025:00:23:41 +0000] "POST 
/ipa/session/json HTTP/1.1" 401 290

==> /var/log/httpd/ssl_request_log <==
[09/Jan/2025:00:23:41 +0000] 10.0.0.15 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384 
"POST /ipa/session/json HTTP/1.1" 290

==> /var/log/krb5kdc.log <==
Jan 09 00:23:41 idm02.mgmt.example.net krb5kdc[6348](info): TGS_REQ (7 etypes 
{aes256-cts-hmac-sha384-192(20), aes128-cts-hmac-sha256-128(19), 
aes256-cts-hmac-sha1-96(18), aes128-cts-hmac-sha1-96(17), 
camellia256-cts-cmac(26), camellia128-cts-cmac(25), 
DEPRECATED:arcfour-hmac(23)}) 10.1.0.50: 
S4U2PROXY_MISSING_EXTENDED_KDC_SIGN_IN_EVIDENCE_TKT_PAC: authtime 1736382160, 
etypes {rep=UNSUPPORTED:(0)} HTTP/idm02.mgmt.example....@ipa.example.net for 
ldap/idm02.mgmt.example....@ipa.example.net, KDC policy rejects request
Jan 09 00:23:41 idm02.mgmt.example.net krb5kdc[6348](info): ... 
CONSTRAINED-DELEGATION s4u-client=<unknown>
Jan 09 00:23:41 idm02.mgmt.example.net krb5kdc[6348](info): closing down fd 11

==> /var/log/httpd/error_log <==
[Thu Jan 09 00:23:41.314422 2025] [wsgi:error] [pid 5844:tid 140546394371840] 
[remote 10.0.0.15:51084] ipa: INFO: 401 Unauthorized: Insufficient access: 
SASL(-1): generic failure: GSSAPI Error: Unspecified GSS failure.  Minor code 
may provide more information (Credential cache is empty)

==> /var/log/httpd/access_log <==
10.0.0.15 - chris.jac...@ipa.example.net [09/Jan/2025:00:23:41 +0000] "POST 
/ipa/session/json HTTP/1.1" 401 290

==> /var/log/httpd/ssl_request_log <==
[09/Jan/2025:00:23:41 +0000] 10.0.0.15 TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384 
"POST /ipa/session/json HTTP/1.1" 290

==> /var/log/messages <==
Jan  9 00:23:41 idm02 [5845]: GSSAPI Error: Unspecified GSS failure.  Minor 
code may provide more information (Credential cache is empty)
Jan  9 00:23:41 idm02 [5844]: GSSAPI Error: Unspecified GSS failure.  Minor 
code may provide more information (Credential cache is empty)

I have verified permission of /run/ipa/ccache, I have tried after reboots, and 
I also found this seemingly related error in slapd log:
[09/Jan/2025:00:09:03.758725886 +0000] - ERR - set_krb5_creds - Could not get 
initial credentials for principal [ldap/idm02.mgmt.example....@ipa.example.net] 
in keytab [FILE:/etc/dirsrv/ds.keytab]: -1765328324 (Generic error (see e-text))

I have the same issues with default crypto policies, DEFAULT:AD-SUPPORT and 
LEGACY:AD-SUPPORT.

ipa packages:
ipa-client-4.9.13-14.module+el8.10.0+22574+12a10600.x86_64
ipa-client-common-4.9.13-14.module+el8.10.0+22574+12a10600.noarch
ipa-common-4.9.13-14.module+el8.10.0+22574+12a10600.noarch
ipa-healthcheck-0.12-4.module+el8.10.0+22138+e77d88cf.noarch
ipa-healthcheck-core-0.12-4.module+el8.10.0+22138+e77d88cf.noarch
ipa-selinux-4.9.13-14.module+el8.10.0+22574+12a10600.noarch
ipa-server-4.9.13-14.module+el8.10.0+22574+12a10600.x86_64
ipa-server-common-4.9.13-14.module+el8.10.0+22574+12a10600.noarch

The old CentOS 7 ipa nodes are running latest available to them from centos 
repos: 4.6.8

End goal: get RHEL8 idm nodes up and running to take over for the existing ipa 
nodes (I think all I'll need to do once I get these RHEL8 IDM nodes up and 
running well is set one them as the CA and CRL master and then slowly snip the 
old C7 IPA nodes).

I'm at my wits end here and seem to have hit a roadblock. Any help would be 
appreciated.

Thanks,
- chris
-- 
_______________________________________________
FreeIPA-users mailing list -- freeipa-users@lists.fedorahosted.org
To unsubscribe send an email to freeipa-users-le...@lists.fedorahosted.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedorahosted.org/archives/list/freeipa-users@lists.fedorahosted.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue

Reply via email to