I just check the logs you mentioned. > > Check in /var/log/pki/pki-tomcat/localhost_access_log.$DATE This is the access log after kinit and ipa-cert show:
10.1.0.4 - - [23/Jan/2025:21:43:48 +0100] "GET /ca/admin/ca/getStatus HTTP/1.1" 200 122 10.1.0.4 - - [23/Jan/2025:21:43:48 +0100] "GET /ca/admin/ca/getStatus HTTP/1.1" 200 122 10.1.0.4 - - [23/Jan/2025:21:43:48 +0100] "POST /ca/admin/ca/getStatus HTTP/1.1" 200 122 0:0:0:0:0:0:0:1 - - [23/Jan/2025:21:43:48 +0100] "-" 400 - 127.0.0.1 - - [23/Jan/2025:21:43:48 +0100] "-" 400 - 10.1.0.4 - - [23/Jan/2025:21:44:21 +0100] "GET /ca/rest/certs/198421384424903357883919048254057663382 HTTP/1.1" 200 12632 No /login line here. > > Check the logs in /var/logs/httpd/error_log > There seems to be a verification error on the certificate. [Thu Jan 23 21:44:21.532600 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] ipa: DEBUG: request GET https://[...]:443/ca/rest/certs/198421384424903357883919048254057663382 [Thu Jan 23 21:44:21.532617 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] ipa: DEBUG: request body '' [Thu Jan 23 21:44:21.537014 2025] [ssl:error] [pid 10413:tid 10547] [client 10.1.0.4:54670] AH02039: Certificate Verification: Error (50): application verification failure [Thu Jan 23 21:44:21.546571 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] ipa: DEBUG: httplib request failed: [Thu Jan 23 21:44:21.546589 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] Traceback (most recent call last): [Thu Jan 23 21:44:21.546592 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] File "/usr/lib/python3.13/site- packages/ipapython/dogtag.py", line 272, in _httplib_request [Thu Jan 23 21:44:21.546595 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] res = conn.getresponse() [Thu Jan 23 21:44:21.546598 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] File "/usr/lib64/python3.13/http/client.py", line 1428, in getresponse [Thu Jan 23 21:44:21.546601 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] response.begin() [Thu Jan 23 21:44:21.546603 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] ~~~~~~~~~~~~~~^^ [Thu Jan 23 21:44:21.546606 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] File "/usr/lib64/python3.13/http/client.py", line 331, in begin [Thu Jan 23 21:44:21.546609 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] version, status, reason = self._read_status() [Thu Jan 23 21:44:21.546611 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] ~~~~~~~~~~~~~~~~~^^ [Thu Jan 23 21:44:21.546614 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] File "/usr/lib64/python3.13/http/client.py", line 292, in _read_status [Thu Jan 23 21:44:21.546616 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] line = str(self.fp.readline(_MAXLINE + 1), "iso-8859-1") [Thu Jan 23 21:44:21.546619 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] ~~~~~~~~~~~~~~~~^^^^^^^^^^^^^^ [Thu Jan 23 21:44:21.546622 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] File "/usr/lib64/python3.13/socket.py", line 719, in readinto [Thu Jan 23 21:44:21.546624 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] return self._sock.recv_into(b) [Thu Jan 23 21:44:21.546627 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] ~~~~~~~~~~~~~~~~~~~~^^^ [Thu Jan 23 21:44:21.546629 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] File "/usr/lib64/python3.13/ssl.py", line 1304, in recv_into [Thu Jan 23 21:44:21.546632 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] return self.read(nbytes, buffer) [Thu Jan 23 21:44:21.546638 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] ~~~~~~~~~^^^^^^^^^^^^^^^^ [Thu Jan 23 21:44:21.546640 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] File "/usr/lib64/python3.13/ssl.py", line 1138, in read [Thu Jan 23 21:44:21.546643 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] return self._sslobj.read(len, buffer) [Thu Jan 23 21:44:21.546646 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] ~~~~~~~~~~~~~~~~~^^^^^^^^^^^^^ [Thu Jan 23 21:44:21.546648 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] ssl.SSLError: [SSL: SSLV3_ALERT_HANDSHAKE_FAILURE] ssl/tls alert handshake failure (_ssl.c:2638) [Thu Jan 23 21:44:21.564194 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] ipa: DEBUG: WSGI wsgi_execute PublicError: Traceback (most recent call last): [Thu Jan 23 21:44:21.564218 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] File "/usr/lib/python3.13/site- packages/ipapython/dogtag.py", line 272, in _httplib_request [Thu Jan 23 21:44:21.564222 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] res = conn.getresponse() [Thu Jan 23 21:44:21.564225 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] File "/usr/lib64/python3.13/http/client.py", line 1428, in getresponse [Thu Jan 23 21:44:21.564228 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] response.begin() [Thu Jan 23 21:44:21.564230 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] ~~~~~~~~~~~~~~^^ [Thu Jan 23 21:44:21.564233 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] File "/usr/lib64/python3.13/http/client.py", line 331, in begin [Thu Jan 23 21:44:21.564236 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] version, status, reason = self._read_status() [Thu Jan 23 21:44:21.564238 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] ~~~~~~~~~~~~~~~~~^^ [Thu Jan 23 21:44:21.564241 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] File "/usr/lib64/python3.13/http/client.py", line 292, in _read_status [Thu Jan 23 21:44:21.564244 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] line = str(self.fp.readline(_MAXLINE + 1), "iso-8859-1") [Thu Jan 23 21:44:21.564246 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] ~~~~~~~~~~~~~~~~^^^^^^^^^^^^^^ [Thu Jan 23 21:44:21.564249 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] File "/usr/lib64/python3.13/socket.py", line 719, in readinto [Thu Jan 23 21:44:21.564252 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] return self._sock.recv_into(b) [Thu Jan 23 21:44:21.564254 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] ~~~~~~~~~~~~~~~~~~~~^^^ [Thu Jan 23 21:44:21.564257 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] File "/usr/lib64/python3.13/ssl.py", line 1304, in recv_into [Thu Jan 23 21:44:21.564260 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] return self.read(nbytes, buffer) [Thu Jan 23 21:44:21.564262 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] ~~~~~~~~~^^^^^^^^^^^^^^^^ [Thu Jan 23 21:44:21.564265 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] File "/usr/lib64/python3.13/ssl.py", line 1138, in read [Thu Jan 23 21:44:21.564267 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] return self._sslobj.read(len, buffer) [Thu Jan 23 21:44:21.564270 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] ~~~~~~~~~~~~~~~~~^^^^^^^^^^^^^ [Thu Jan 23 21:44:21.564272 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] ssl.SSLError: [SSL: SSLV3_ALERT_HANDSHAKE_FAILURE] ssl/tls alert handshake failure (_ssl.c:2638) [Thu Jan 23 21:44:21.564275 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] [Thu Jan 23 21:44:21.564278 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] During handling of the above exception, another exception occurred: [Thu Jan 23 21:44:21.564284 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] [Thu Jan 23 21:44:21.564286 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] Traceback (most recent call last): [Thu Jan 23 21:44:21.564289 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] File "/usr/lib/python3.13/site- packages/ipaserver/rpcserver.py", line 417, in wsgi_execute [Thu Jan 23 21:44:21.564292 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] result = command(*args, **options) [Thu Jan 23 21:44:21.564294 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] File "/usr/lib/python3.13/site- packages/ipalib/frontend.py", line 477, in __call__ [Thu Jan 23 21:44:21.564297 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] return self.__do_call(*args, **options) [Thu Jan 23 21:44:21.564300 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] ~~~~~~~~~~~~~~^^^^^^^^^^^^^^^^^^ [Thu Jan 23 21:44:21.564302 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] File "/usr/lib/python3.13/site- packages/ipalib/frontend.py", line 544, in __do_call [Thu Jan 23 21:44:21.564305 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] ret = self.run(*args, **options) [Thu Jan 23 21:44:21.564308 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] File "/usr/lib/python3.13/site- packages/ipalib/frontend.py", line 885, in run [Thu Jan 23 21:44:21.564310 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] return self.execute(*args, **options) [Thu Jan 23 21:44:21.564313 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] ~~~~~~~~~~~~^^^^^^^^^^^^^^^^^^ [Thu Jan 23 21:44:21.564315 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] File "/usr/lib/python3.13/site- packages/ipaserver/plugins/cert.py", line 1379, in execute [Thu Jan 23 21:44:21.564318 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] result = self.Backend.ra.get_certificate(serial_number) [Thu Jan 23 21:44:21.564321 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] File "/usr/lib/python3.13/site- packages/ipaserver/plugins/dogtag.py", line 906, in get_certificate [Thu Jan 23 21:44:21.564324 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] _http_status, _http_headers, http_body = self._ssldo( [Thu Jan 23 21:44:21.564326 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] ~~~~~~~~~~~^ [Thu Jan 23 21:44:21.564329 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] 'GET', path, use_session=False, [Thu Jan 23 21:44:21.564331 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [Thu Jan 23 21:44:21.564334 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] ...<2 lines>... [Thu Jan 23 21:44:21.564337 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] }, [Thu Jan 23 21:44:21.564339 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] ^^ [Thu Jan 23 21:44:21.564342 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] ) [Thu Jan 23 21:44:21.564344 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] ^ [Thu Jan 23 21:44:21.564347 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] File "/usr/lib/python3.13/site- packages/ipaserver/plugins/dogtag.py", line 660, in _ssldo [Thu Jan 23 21:44:21.564350 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] status, resp_headers, resp_body = dogtag.https_request( [Thu Jan 23 21:44:21.564352 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] ~~~~~~~~~~~~~~~~~~~~^ [Thu Jan 23 21:44:21.564355 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] self.ca_host, self.override_port or self.env.ca_agent_port, [Thu Jan 23 21:44:21.564366 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [Thu Jan 23 21:44:21.564370 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] ...<4 lines>... [Thu Jan 23 21:44:21.564372 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] method=method, headers=headers, body=body [Thu Jan 23 21:44:21.564375 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [Thu Jan 23 21:44:21.564377 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] ) [Thu Jan 23 21:44:21.564380 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] ^ [Thu Jan 23 21:44:21.564382 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] File "/usr/lib/python3.13/site- packages/ipapython/dogtag.py", line 216, in https_request [Thu Jan 23 21:44:21.564385 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] return _httplib_request( [Thu Jan 23 21:44:21.564388 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] 'https', host, port, url, connection_factory, body, [Thu Jan 23 21:44:21.564390 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] method=method, headers=headers) [Thu Jan 23 21:44:21.564393 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] File "/usr/lib/python3.13/site- packages/ipapython/dogtag.py", line 280, in _httplib_request [Thu Jan 23 21:44:21.564396 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] raise NetworkError(uri=uri, error=str(e)) [Thu Jan 23 21:44:21.564398 2025] [wsgi:error] [pid 10410:tid 10685] [remote 10.1.0.4:54666] ipalib.errors.NetworkError: cannot connect to 'https://[...]:443/ca/rest/certs/198421384424903357883919048254057663382' : [SSL: SSLV3_ALERT_HANDSHAKE_FAILURE] ssl/tls alert handshake failure (_ssl.c:2638) > You also mentioned > I am able to get a working TLS Handshake and a sensible reply with > curl > on the same machine. > Which command did you run exactly? # curl -v https://[...]:443/ca/rest/certs/198421384424903357883919048254057663382 * Host [...]:443 was resolved. * IPv6: [...] * IPv4: [...] * Trying [...]:443... * Connected to [...] ([...]) port 443 * ALPN: curl offers h2,http/1.1 * TLSv1.3 (OUT), TLS handshake, Client hello (1): * CAfile: /etc/pki/tls/certs/ca-bundle.crt * CApath: none * TLSv1.3 (IN), TLS handshake, Server hello (2): * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): * TLSv1.3 (IN), TLS handshake, Certificate (11): * TLSv1.3 (IN), TLS handshake, CERT verify (15): * TLSv1.3 (IN), TLS handshake, Finished (20): * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): * TLSv1.3 (OUT), TLS handshake, Finished (20): * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 / x25519 / RSASSA-PSS * ALPN: server accepted http/1.1 * Server certificate: * subject: [...] * start date: Jul 17 11:48:54 2024 GMT * expire date: Jul 18 11:48:54 2026 GMT * subjectAltName: host "[...]" matched cert's "[...]" * issuer: CN=onether.net IDM Intermediate CA * SSL certificate verify ok. * Certificate level 0: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption * Certificate level 1: Public key type RSA (3072/128 Bits/secBits), signed using sha256WithRSAEncryption * using HTTP/1.x > GET /ca/rest/certs/198421384424903357883919048254057663382 HTTP/1.1 > Host: [...] > User-Agent: curl/8.9.1 > Accept: */* > * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): * Request completely sent off * TLSv1.3 (IN), TLS handshake, Request CERT (13): * TLSv1.3 (OUT), TLS handshake, Certificate (11): * TLSv1.3 (OUT), TLS handshake, Finished (20): * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): < HTTP/1.1 200 200 < Date: Thu, 23 Jan 2025 20:58:05 GMT < Server: Apache/2.4.62 (Fedora Linux) OpenSSL/3.2.2 mod_wsgi/5.0.2 Python/3.13 mod_auth_gssapi/1.6.5 < Content-Type: application/json < Vary: Accept-Encoding < Transfer-Encoding: chunked < {"id":"0x9546918eec13583066bc7c638498cb96","IssuerDN":"CN=[...] > > Is the ipa-healthcheck error the only one? I have got nine of the ssl/tls alert handshake failures and this one additionally: { "source": "ipahealthcheck.ipa.certs", "check": "IPADogtagCertsMatchCheck", "result": "CRITICAL", "uuid": "67657ec3-d8ae-40b1-9e4c-4b7ded3e203b", "when": "20250123210034Z", "duration": "0.204734", "kw": { "exception": "no matching entry found", "traceback": "Traceback (most recent call last):\n File \"/usr/lib/python3.13/site-packages/ipahealthcheck/core/core.py\", line 56, in run_plugin\n for result in plugin.check():\n ~~~~~~~~~~~~^^\n File \"/usr/lib/python3.13/site- packages/ipahealthcheck/core/plugin.py\", line 18, in wrapper\n for result in f(*args, **kwds):\n ~^^^^^^^^^^^^^^^\n File \"/usr/lib/python3.13/site-packages/ipahealthcheck/ipa/certs.py\", line 950, in check\n ipaca_certs_ok = yield from match_ldap_nss_certs_by_subject(\n ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^\n ...<3 lines>...\n )\n ^\n File \"/usr/lib/python3.13/site- packages/ipahealthcheck/ipa/certs.py\", line 877, in match_ldap_nss_certs_by_subject\n entries = ldap.get_entries(\n dn,\n filter=f'subjectname={subject}'\n )\n File \"/usr/lib/python3.13/site-packages/ipapython/ipaldap.py\", line 1473, in get_entries\n entries, truncated = self.find_entries(\n ~~~~~~~~~~~~~~~~~^\n base_dn=base_dn, scope=scope, filter=filter, attrs_list=attrs_list,\n ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^\n get_effective_rights=get_effective_rights,\n ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^\n **kwargs)\n ^^^^^^^^^\n File \"/usr/lib/python3.13/site- packages/ipapython/ipaldap.py\", line 1617, in find_entries\n raise errors.EmptyResult(reason='no matching entry found')\nipalib.errors.EmptyResult: no matching entry found\n" } } Then there are some deprecation warnings like: Properties that return a naïve datetime object have been deprecated. Please switch to not_valid_after_utc Hannes -- _______________________________________________ FreeIPA-users mailing list -- freeipa-users@lists.fedorahosted.org To unsubscribe send an email to freeipa-users-le...@lists.fedorahosted.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedorahosted.org/archives/list/freeipa-users@lists.fedorahosted.org Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue