[Freeipa] [Bug 1635568] [NEW] freeipa-client - Can't enroll a client if server has external CA certs in addition to self signed CA cert

2016-10-21 Thread georgijsr
Public bug reported:

Ubuntu version - Ubuntu 14.04.5 LTS
freeipa-client package version - 3.3.4-0ubuntu3.1

What is expected:

root@ip-10-5-0-73:/home/ubuntu# ipa-client-install --mkhomedir
Discovery was successful!
Client hostname: ip-10-5-0-73.eu-west-1.compute.internal
Realm: ID.DOMAIN.COM
DNS Domain: id.domain.com
IPA Server: directory.id.domain.com
BaseDN: dc=id,dc=domain,dc=com

Continue to configure the system with these values? [no]: yes
Synchronizing time with KDC...
Attempting to sync time using ntpd.  Will timeout after 15 seconds
Attempting to sync time using ntpd.  Will timeout after 15 seconds
Attempting to sync time using ntpd.  Will timeout after 15 seconds
Unable to sync time with NTP server, assuming the time is in sync. Please check 
that 123 UDP port is opened.
User authorized to enroll computers: enroll.user
Password for enroll.u...@id.domain.com:
Successfully retrieved CA cert
Subject: CN=Certificate Authority,O=ID.DOMAIN.COM
Issuer:  CN=Certificate Authority,O=ID.DOMAIN.COM
Valid From:  Wed Oct 19 14:54:08 2016 UTC
Valid Until: Sun Oct 19 14:54:08 2036 UTC

Subject: CN=AddTrust External CA Root,OU=AddTrust External TTP 
Network,O=AddTrust AB,C=SE
Issuer:  CN=AddTrust External CA Root,OU=AddTrust External TTP 
Network,O=AddTrust AB,C=SE
Valid From:  Tue May 30 10:48:38 2000 UTC
Valid Until: Sat May 30 10:48:38 2020 UTC

Subject: CN=COMODO RSA Certification Authority,O=COMODO CA 
Limited,L=Salford,ST=Greater Manchester,C=GB
Issuer:  CN=AddTrust External CA Root,OU=AddTrust External TTP 
Network,O=AddTrust AB,C=SE
Valid From:  Tue May 30 10:48:38 2000 UTC
Valid Until: Sat May 30 10:48:38 2020 UTC

Subject: CN=COMODO RSA Certification Authority,O=COMODO CA 
Limited,L=Salford,ST=Greater Manchester,C=GB
Issuer:  CN=COMODO RSA Certification Authority,O=COMODO CA 
Limited,L=Salford,ST=Greater Manchester,C=GB
Valid From:  Tue Jan 19 00:00:00 2010 UTC
Valid Until: Mon Jan 18 23:59:59 2038 UTC

Subject: CN=COMODO RSA Domain Validation Secure Server CA,O=COMODO CA 
Limited,L=Salford,ST=Greater Manchester,C=GB
Issuer:  CN=COMODO RSA Certification Authority,O=COMODO CA 
Limited,L=Salford,ST=Greater Manchester,C=GB
Valid From:  Wed Feb 12 00:00:00 2014 UTC
Valid Until: Sun Feb 11 23:59:59 2029 UTC

Subject: CN=AddTrust External CA Root,OU=AddTrust External TTP 
Network,O=AddTrust AB,C=SE
Issuer:  CN=AddTrust External CA Root,OU=AddTrust External TTP 
Network,O=AddTrust AB,C=SE
Valid From:  Tue May 30 10:48:38 2000 UTC
Valid Until: Sat May 30 10:48:38 2020 UTC

Subject: CN=COMODO RSA Domain Validation Secure Server CA,O=COMODO CA 
Limited,L=Salford,ST=Greater Manchester,C=GB
Issuer:  CN=COMODO RSA Certification Authority,O=COMODO CA 
Limited,L=Salford,ST=Greater Manchester,C=GB
Valid From:  Wed Feb 12 00:00:00 2014 UTC
Valid Until: Sun Feb 11 23:59:59 2029 UTC

Subject: CN=COMODO RSA Certification Authority,O=COMODO CA 
Limited,L=Salford,ST=Greater Manchester,C=GB
Issuer:  CN=COMODO RSA Certification Authority,O=COMODO CA 
Limited,L=Salford,ST=Greater Manchester,C=GB
Valid From:  Tue Jan 19 00:00:00 2010 UTC
Valid Until: Mon Jan 18 23:59:59 2038 UTC

Enrolled in IPA realm ID.DOMAIN.COM
Created /etc/ipa/default.conf
New SSSD config will be created
Configured sudoers in /etc/nsswitch.conf
Configured /etc/sssd/sssd.conf
Configured /etc/krb5.conf for IPA realm ID.DOMAIN.COM
trying https://directory.id.domain.com/ipa/json
Forwarding 'ping' to json server 'https://directory.id.domain.com/ipa/json'
Forwarding 'ca_is_enabled' to json server 
'https://directory.id.domain.com/ipa/json'
Systemwide CA database updated.
Adding SSH public key from /etc/ssh/ssh_host_rsa_key.pub
Adding SSH public key from /etc/ssh/ssh_host_ed25519_key.pub
Adding SSH public key from /etc/ssh/ssh_host_dsa_key.pub
Adding SSH public key from /etc/ssh/ssh_host_ecdsa_key.pub
Forwarding 'host_mod' to json server 'https://directory.id.domain.com/ipa/json'
Could not update DNS SSHFP records.
SSSD enabled
Configured /etc/openldap/ldap.conf
NTP enabled
Configured /etc/ssh/ssh_config
Configured /etc/ssh/sshd_config
Configuring id.domain.com as NIS domain.
Client configuration complete.

What happend instead:

root@ip-10-5-0-73:/home/ubuntu# ipa-client-install --mkhomedir
Using existing certificate '/etc/ipa/ca.crt'.
Discovery was successful!
Hostname: freeradius.id.domain.com
Realm: ID.DOMAIN.COM
DNS Domain: id.domain.com
IPA Server: directory2.id.domain.com
BaseDN: dc=id,dc=domain,dc=com

Continue to configure the system with these values? [no]: yes
User authorized to enroll computers: enroll.user
Synchronizing time with KDC...
Unable to sync time with IPA NTP server, assuming the time is in sync. Please 
check that 123 UDP port is opened.
Password for enroll.u...@id.domain.com:
Enrolled in IPA realm ID.DOMAIN.COM
Created /etc/ipa/default.conf
New SSSD 

[Freeipa] [Bug 1635568] Re: freeipa-client - Can't enroll a client if server has external CA certs in addition to self signed CA cert

2017-03-07 Thread georgijsr
Hello, Timo!

Sorry, forgot to mention in "What is expected" tested Ubuntu version.

"What is expected" ipa-client-install was tested on Ubuntu 16.04
clients, and it worked.

The problem is, that 3/4 of our server infrastructure is running Ubuntu
14.04.

We're planning to gradually move to 16.04, but for now, I just wanted to
know, if it is possible to use 3rd party certificates with FreeIPA and
Ubuntu 14.04 clients.

-- 
You received this bug notification because you are a member of FreeIPA,
which is subscribed to freeipa in Ubuntu.
https://bugs.launchpad.net/bugs/1635568

Title:
  freeipa-client - Can't enroll a client if server has external CA certs
  in addition to self signed CA cert

Status in freeipa package in Ubuntu:
  Incomplete

Bug description:
  Ubuntu version - Ubuntu 14.04.5 LTS
  freeipa-client package version - 3.3.4-0ubuntu3.1

  What is expected:

  root@ip-10-5-0-73:/home/ubuntu# ipa-client-install --mkhomedir
  Discovery was successful!
  Client hostname: ip-10-5-0-73.eu-west-1.compute.internal
  Realm: ID.DOMAIN.COM
  DNS Domain: id.domain.com
  IPA Server: directory.id.domain.com
  BaseDN: dc=id,dc=domain,dc=com

  Continue to configure the system with these values? [no]: yes
  Synchronizing time with KDC...
  Attempting to sync time using ntpd.  Will timeout after 15 seconds
  Attempting to sync time using ntpd.  Will timeout after 15 seconds
  Attempting to sync time using ntpd.  Will timeout after 15 seconds
  Unable to sync time with NTP server, assuming the time is in sync. Please 
check that 123 UDP port is opened.
  User authorized to enroll computers: enroll.user
  Password for enroll.u...@id.domain.com:
  Successfully retrieved CA cert
  Subject: CN=Certificate Authority,O=ID.DOMAIN.COM
  Issuer:  CN=Certificate Authority,O=ID.DOMAIN.COM
  Valid From:  Wed Oct 19 14:54:08 2016 UTC
  Valid Until: Sun Oct 19 14:54:08 2036 UTC

  Subject: CN=AddTrust External CA Root,OU=AddTrust External TTP 
Network,O=AddTrust AB,C=SE
  Issuer:  CN=AddTrust External CA Root,OU=AddTrust External TTP 
Network,O=AddTrust AB,C=SE
  Valid From:  Tue May 30 10:48:38 2000 UTC
  Valid Until: Sat May 30 10:48:38 2020 UTC

  Subject: CN=COMODO RSA Certification Authority,O=COMODO CA 
Limited,L=Salford,ST=Greater Manchester,C=GB
  Issuer:  CN=AddTrust External CA Root,OU=AddTrust External TTP 
Network,O=AddTrust AB,C=SE
  Valid From:  Tue May 30 10:48:38 2000 UTC
  Valid Until: Sat May 30 10:48:38 2020 UTC

  Subject: CN=COMODO RSA Certification Authority,O=COMODO CA 
Limited,L=Salford,ST=Greater Manchester,C=GB
  Issuer:  CN=COMODO RSA Certification Authority,O=COMODO CA 
Limited,L=Salford,ST=Greater Manchester,C=GB
  Valid From:  Tue Jan 19 00:00:00 2010 UTC
  Valid Until: Mon Jan 18 23:59:59 2038 UTC

  Subject: CN=COMODO RSA Domain Validation Secure Server CA,O=COMODO CA 
Limited,L=Salford,ST=Greater Manchester,C=GB
  Issuer:  CN=COMODO RSA Certification Authority,O=COMODO CA 
Limited,L=Salford,ST=Greater Manchester,C=GB
  Valid From:  Wed Feb 12 00:00:00 2014 UTC
  Valid Until: Sun Feb 11 23:59:59 2029 UTC

  Subject: CN=AddTrust External CA Root,OU=AddTrust External TTP 
Network,O=AddTrust AB,C=SE
  Issuer:  CN=AddTrust External CA Root,OU=AddTrust External TTP 
Network,O=AddTrust AB,C=SE
  Valid From:  Tue May 30 10:48:38 2000 UTC
  Valid Until: Sat May 30 10:48:38 2020 UTC

  Subject: CN=COMODO RSA Domain Validation Secure Server CA,O=COMODO CA 
Limited,L=Salford,ST=Greater Manchester,C=GB
  Issuer:  CN=COMODO RSA Certification Authority,O=COMODO CA 
Limited,L=Salford,ST=Greater Manchester,C=GB
  Valid From:  Wed Feb 12 00:00:00 2014 UTC
  Valid Until: Sun Feb 11 23:59:59 2029 UTC

  Subject: CN=COMODO RSA Certification Authority,O=COMODO CA 
Limited,L=Salford,ST=Greater Manchester,C=GB
  Issuer:  CN=COMODO RSA Certification Authority,O=COMODO CA 
Limited,L=Salford,ST=Greater Manchester,C=GB
  Valid From:  Tue Jan 19 00:00:00 2010 UTC
  Valid Until: Mon Jan 18 23:59:59 2038 UTC

  Enrolled in IPA realm ID.DOMAIN.COM
  Created /etc/ipa/default.conf
  New SSSD config will be created
  Configured sudoers in /etc/nsswitch.conf
  Configured /etc/sssd/sssd.conf
  Configured /etc/krb5.conf for IPA realm ID.DOMAIN.COM
  trying https://directory.id.domain.com/ipa/json
  Forwarding 'ping' to json server 'https://directory.id.domain.com/ipa/json'
  Forwarding 'ca_is_enabled' to json server 
'https://directory.id.domain.com/ipa/json'
  Systemwide CA database updated.
  Adding SSH public key from /etc/ssh/ssh_host_rsa_key.pub
  Adding SSH public key from /etc/ssh/ssh_host_ed25519_key.pub
  Adding SSH public key from /etc/ssh/ssh_host_dsa_key.pub
  Adding SSH public key from /etc/ssh/ssh_host_ecdsa_key.pub
  Forwarding 'host_mod' to json server 
'https://directory.id.domain.com/ipa/json'
  Could not update DNS SSHFP recor