Hi, the server is in a strange situation as it has in the file a keytab with kvno 2 but in the LDAP database kvno 1. This could happen if the keytab was renewed someday but there was an ipa-restore or re-initialize from other replicas which would not know of this new one.
To fix the issue I would try to retrieve the keytab with kvno 1 with the following command: ipa-getkeytab -r -p ' HTTP/ipa4.lix.polytechnique...@lix.polytechnique.fr' -D cn=directory\ manager -w Secret123 -k /tmp/gssproxy.keytab The -r option is very important as it allows to retrieve the keytab (without the -r option, a new keytab gets generated). Then check that the new keytab has kvno 1 as expected with klist -kte /tmp/gssproxy.keytab, try kinit with this one. If it succeeds, replace the file /var/lib/ipa/gssproxy/http.keytab with /tmp/gssproxy.keytab (make a backup first) and restart ipa services with ipactl restart. You should also check that there is no replication issue between your servers. flo On Thu, Jan 30, 2025 at 10:48 AM Frederic Ayrault <f...@lix.polytechnique.fr> wrote: > Bonjour, <f...@lix.polytechnique.fr> > > Le 30/01/2025 à 10:30, Florence Blanc-Renaud a écrit : > > Hi, > > The kerberos pre-authentication is failing for HTTP/$HOSTNAME. > Can you run > # klist -kte /var/lib/ipa/gssproxy/http.keytab > > > entries are duplicated and KVNO is not 1 like the replicas or kvno > HTTP/ipa4.lix.polytechnique...@lix.polytechnique.fr > returns HTTP/ipa4.lix.polytechnique...@lix.polytechnique.fr: kvno = 1 (I > found this command on google but I do not know what I on doing) > > Keytab name: FILE:/var/lib/ipa/gssproxy/http.keytab > KVNO Timestamp Principal > ---- ------------------- > ------------------------------------------------------ > 2 28/09/2023 17:13:53 > HTTP/ipa4.lix.polytechnique...@lix.polytechnique.fr > (aes256-cts-hmac-sha1-96) > 2 28/09/2023 17:13:53 > HTTP/ipa4.lix.polytechnique...@lix.polytechnique.fr > (aes128-cts-hmac-sha1-96) > 2 28/09/2023 17:13:53 > HTTP/ipa4.lix.polytechnique...@lix.polytechnique.fr (des3-cbc-sha1) > 2 28/09/2023 17:13:53 > HTTP/ipa4.lix.polytechnique...@lix.polytechnique.fr (arcfour-hmac) > 2 28/09/2023 15:45:17 > HTTP/ipa4.lix.polytechnique...@lix.polytechnique.fr > (aes256-cts-hmac-sha1-96) > 2 28/09/2023 15:45:17 > HTTP/ipa4.lix.polytechnique...@lix.polytechnique.fr > (aes128-cts-hmac-sha1-96) > 2 28/09/2023 15:45:17 > HTTP/ipa4.lix.polytechnique...@lix.polytechnique.fr (des3-cbc-sha1) > 2 28/09/2023 15:45:17 > HTTP/ipa4.lix.polytechnique...@lix.polytechnique.fr (arcfour-hmac) > > Note the exact principal name, then try > # KRB5_TRACE=/dev/stderr kinit -kt /var/lib/ipa/gssproxy/http.keytab > $PRINCIPAL > > > here is what I get from console > > [6402] 1738229690.634028: Resolving unique ccache of type KEYRING > [6402] 1738229690.634029: Getting initial credentials for > HTTP/ipa4.lix.polytechnique...@lix.polytechnique.fr > [6402] 1738229690.634030: Looked up etypes in keytab: aes256-cts, > aes128-cts, des3-cbc-sha1, rc4-hmac, aes256-cts, aes128-cts, des3-cbc-sha1, > rc4-hmac > [6402] 1738229690.634032: Sending unauthenticated request > [6402] 1738229690.634033: Sending request (215 bytes) to > LIX.POLYTECHNIQUE.FR > [6402] 1738229690.634034: Initiating TCP connection to stream > 193.55.176.152:88 > [6402] 1738229690.634035: Sending TCP request to stream 193.55.176.152:88 > [6402] 1738229690.634036: Received answer (352 bytes) from stream > 193.55.176.152:88 > [6402] 1738229690.634037: Terminating TCP connection to stream > 193.55.176.152:88 > [6402] 1738229690.634038: Response was from master KDC > [6402] 1738229690.634039: Received error from KDC: -1765328359/Additional > pre-authentication required > [6402] 1738229690.634042: Preauthenticating using KDC method data > [6402] 1738229690.634043: Processing preauth types: PA-PK-AS-REQ (16), > PA-PK-AS-REP_OLD (15), PA-PK-AS-REQ_OLD (14), PA-FX-FAST (136), > PA-ETYPE-INFO2 (19), PA-PKINIT-KX (147), PA-ENC-TIMESTAMP (2), PA-FX-COOKIE > (133) > [6402] 1738229690.634044: Selected etype info: etype aes256-cts, salt > "B(H"|0MI*@=l?gT\", params "" > [6402] 1738229690.634045: Received cookie: MIT > [6402] 1738229690.634046: PKINIT client has no configured identity; giving > up > [6402] 1738229690.634047: Preauth module pkinit (147) (info) returned: > 0/Success > [6402] 1738229690.634048: PKINIT client has no configured identity; giving > up > [6402] 1738229690.634049: Preauth module pkinit (16) (real) returned: > 22/Argument invalide > [6402] 1738229690.634050: PKINIT client has no configured identity; giving > up > [6402] 1738229690.634051: Preauth module pkinit (14) (real) returned: > 22/Argument invalide > [6402] 1738229690.634052: Retrieving > HTTP/ipa4.lix.polytechnique...@lix.polytechnique.fr from > FILE:/var/lib/ipa/gssproxy/http.keytab (vno 0, enctype aes256-cts) with > result: 0/Success > [6402] 1738229690.634053: AS key obtained for encrypted timestamp: > aes256-cts/CF42 > [6402] 1738229690.634055: Encrypted timestamp (for 1738229690.640142): > plain 301AA011180F32303235303133303039333435305AA105020309C48E, encrypted > DFDBA80FB60F3347BA2554153959E46BCE008762BD0AFE647CA0E78028212C7D67C209AABCBABF1FE80CB70394BA12B3440F97FA2DD4938A > [6402] 1738229690.634056: Preauth module encrypted_timestamp (2) (real) > returned: 0/Success > [6402] 1738229690.634057: Produced preauth for next request: PA-FX-COOKIE > (133), PA-ENC-TIMESTAMP (2) > [6402] 1738229690.634058: Sending request (310 bytes) to > LIX.POLYTECHNIQUE.FR > [6402] 1738229690.634059: Initiating TCP connection to stream > 193.55.176.152:88 > [6402] 1738229690.634060: Sending TCP request to stream 193.55.176.152:88 > [6402] 1738229690.634061: Received answer (352 bytes) from stream > 193.55.176.152:88 > [6402] 1738229690.634062: Terminating TCP connection to stream > 193.55.176.152:88 > [6402] 1738229690.634063: Response was from master KDC > [6402] 1738229690.634064: Received error from KDC: > -1765328360/Preauthentication failed > [6402] 1738229690.634067: Preauthenticating using KDC method data > [6402] 1738229690.634068: Processing preauth types: PA-PK-AS-REQ (16), > PA-PK-AS-REP_OLD (15), PA-PK-AS-REQ_OLD (14), PA-FX-FAST (136), > PA-ETYPE-INFO2 (19), PA-PKINIT-KX (147), PA-ENC-TIMESTAMP (2), PA-FX-COOKIE > (133) > [6402] 1738229690.634069: Selected etype info: etype aes256-cts, salt > "B(H"|0MI*@=l?gT\", params "" > [6402] 1738229690.634070: Received cookie: MIT > [6402] 1738229690.634071: Preauth module pkinit (147) (info) returned: > 0/Success > [6402] 1738229690.634072: PKINIT client has no configured identity; giving > up > [6402] 1738229690.634073: Preauth module pkinit (14) (real) returned: > 22/Argument invalide > kinit: Preauthentication failed while getting initial credentials > > > and check the logs in /var/log/krb5kdc.log > > > and in the log > > Jan 30 10:34:50 ipa4.lix.polytechnique.fr krb5kdc[30130](info): AS_REQ (8 > etypes {18 17 16 23 20 19 25 26}) 193.55.176.152: NEEDED_PREAUTH: > HTTP/ipa4.lix.polytechnique...@lix.polytechnique.fr for > krbtgt/lix.polytechnique...@lix.polytechnique.fr, Additional > pre-authentication required > Jan 30 10:34:50 ipa4.lix.polytechnique.fr krb5kdc[30130](info): closing > down fd 11 > Jan 30 10:34:50 ipa4.lix.polytechnique.fr krb5kdc[30130](info): preauth > (encrypted_timestamp) verify failure: Preauthentication failed > Jan 30 10:34:50 ipa4.lix.polytechnique.fr krb5kdc[30130](info): AS_REQ (8 > etypes {18 17 16 23 20 19 25 26}) 193.55.176.152: PREAUTH_FAILED: > HTTP/ipa4.lix.polytechnique...@lix.polytechnique.fr for > krbtgt/lix.polytechnique...@lix.polytechnique.fr, Preauthentication failed > Jan 30 10:34:50 ipa4.lix.polytechnique.fr krb5kdc[30130](info): closing > down fd 11 > Jan 30 10:36:06 ipa4.lix.polytechnique.fr krb5kdc[30130](info): closing > down fd 11 > > > flo > > > > Thank you for your help > > Regards > > Frederic > > > On Wed, Jan 22, 2025 at 6:40 PM Frederic Ayrault via FreeIPA-users < > freeipa-users@lists.fedorahosted.org> wrote: > >> Bonsoir, >> >> Le 22/01/2025 à 17:45, Florence Blanc-Renaud via FreeIPA-users a écrit : >> >> Hi, >> >> CA-less => did you install the server with a PKINIT certificate (with >> --pkinit-cert-file) or with --no-pkinit? >> >> >> All the servers where installed with --no-pkinit (I have 4 replicas and >> only have the problem on the master) >> >> >> >> You can also check if gssproxy service is up and running and follow the >> troubleshooting steps from https://www.freeipa.org/page/Troubleshooting >> <https://www.freeipa.org/page/Troubleshooting/PrivilegeSeparation> >> >> >> gssproxy is active (running) >> >> /PrivilegeSeparation >> <https://www.freeipa.org/page/Troubleshooting/PrivilegeSeparation> >> >> >> I did setup the debug_level for gssproxy, and here is what I get when I >> run the ipa ping >> >> Jan 22 18:21:51 ipa4 gssproxy: [2025/01/22 17:21:51]: Client connected >> (fd = 10)[2025/01/22 17:21:51]: (pid = 12908) (uid = 0) (gid = >> 0)[2025/01/22 17:21:51]: (context = >> system_u:system_r:kernel_t:s0)[2025/01/22 17:21:51]: >> Jan 22 18:23:56 ipa4 gssproxy: [2025/01/22 17:23:56]: Client connected >> (fd = 11)[2025/01/22 17:23:56]: (pid = 1267) (uid = 48) (gid = >> 48)[2025/01/22 17:23:56]: (context = >> system_u:system_r:httpd_t:s0)[2025/01/22 17:23:56]: >> Jan 22 18:23:56 ipa4 gssproxy: [CID 11][2025/01/22 17:23:56]: >> gp_rpc_execute: executing 6 (GSSX_ACQUIRE_CRED) for service "ipa-httpd", >> euid: 48,socket: (null) >> Jan 22 18:23:56 ipa4 gssproxy: GSSX_ARG_ACQUIRE_CRED( call_ctx: { "" [ ] >> } input_cred_handle: <Null> add_cred: 0 desired_name: <Null> time_req: >> 4294967295 desired_mechs: { { 1 2 840 113554 1 2 2 } } cred_usage: BOTH >> initiator_time_req: 0 acceptor_time_req: 0 ) >> Jan 22 18:23:56 ipa4 gssproxy: GSSX_RES_ACQUIRE_CRED( status: { 851968 { >> 1 2 840 113554 1 2 2 } 2529638936 "Unspecified GSS failure. Minor code may >> provide more information" "Preauthentication failed" [ ] } >> output_cred_handle: <Null> ) >> Jan 22 18:23:56 ipa4 gssproxy: [CID 11][2025/01/22 17:23:56]: >> gp_rpc_execute: executing 6 (GSSX_ACQUIRE_CRED) for service "ipa-httpd", >> euid: 48,socket: (null) >> Jan 22 18:23:56 ipa4 gssproxy: GSSX_ARG_ACQUIRE_CRED( call_ctx: { "" [ ] >> } input_cred_handle: <Null> add_cred: 0 desired_name: <Null> time_req: >> 4294967295 desired_mechs: { { 1 2 840 113554 1 2 2 } } cred_usage: BOTH >> initiator_time_req: 0 acceptor_time_req: 0 ) >> Jan 22 18:23:56 ipa4 gssproxy: GSSX_RES_ACQUIRE_CRED( status: { 851968 { >> 1 2 840 113554 1 2 2 } 2529638936 "Unspecified GSS failure. Minor code may >> provide more information" "Preauthentication failed" [ ] } >> output_cred_handle: <Null> ) >> >> I run getcert list, I have 1 certificate, its status is monitoring and >> will expire in december >> >> >> flo >> >> >> Thank you for your help >> >> Regards, >> >> Frederic >> >> -- >> _______________________________________________ >> FreeIPA-users mailing list -- freeipa-users@lists.fedorahosted.org >> To unsubscribe send an email to >> freeipa-users-le...@lists.fedorahosted.org >> Fedora Code of Conduct: >> https://docs.fedoraproject.org/en-US/project/code-of-conduct/ >> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines >> List Archives: >> https://lists.fedorahosted.org/archives/list/freeipa-users@lists.fedorahosted.org >> Do not reply to spam, report it: >> https://pagure.io/fedora-infrastructure/new_issue >> > >
-- _______________________________________________ FreeIPA-users mailing list -- freeipa-users@lists.fedorahosted.org To unsubscribe send an email to freeipa-users-le...@lists.fedorahosted.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedorahosted.org/archives/list/freeipa-users@lists.fedorahosted.org Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue