Domain controllers switch to LDAPS
by Ronald Wimmer
Hi,
will Microsofts decision to let domain controllers talk LDAPS only in
the near future affect IPA sowehow?
Cheers,
Ronald
2 years, 1 month
ca replication for hosts with different dns domains
by askstack@yahoo.com
Hi
IDM domain: "fist.domain"
Host name: host1.first.domain
host2.second.domain
I was able to run "ipa-client-install" on host2 and promoted it to a domain replica. After I verified domain replication was working, I tried to run ipa-ca-install. It failed on host2.
Redhat support said host1 and host2 are on two different dns domains so replication is not supported. I am not sure that is the case since two hosts are in the same and onlyIDM domain replication group.
Is redhat support correct?
Thanks.
2 years, 1 month
Migration (in place)
by Christian Reiss
Hey folks,
Running a 3-node FreeIPA Installation. All is well, but I am now
upgrading all VMs, including my three IPA Servers from Centos 7 to 8.
As the Upgrade for Centos 7 to 8 is a complete reinstall I would need
to, one at a time, upgrade an IPA server. The IP and FQDN would remain
the same.
- I read several documents out there and some say decommission one,
reinstall and add it again.
- Others go for replica-prepare and go from there.
- What about simply backup up the data direcory and restore that?
Maybe there is a recommended way?
I tried doing this some months ago for a failed server, and I got an
issue about replication agreement already existing which I only was able
to resolve by reinstalling. The proposed "modify ldap" was way, way
above me ;)
Thank you all
and stay healthy!
--
with kind regards,
mit freundlichen Gruessen,
Christian Reiss
2 years, 1 month
EL7 Upgrades
by Angus Clarke
Hello
Our environment has grown and as additional IPA servers have been added, different versions have been deployed. I am looking to bring IPA servers up to the latest version for EL7 and wanted some guidance or reassurance.
Here are my versions, they are all VMWare VMs:
idm001 ipa-server-4.5.4-10.0.1.el7.x86_64 Red Hat Enterprise Linux Server release 7.4 (Maipo) * UPGRADED *
idm002 ipa-server-4.5.0-22.0.1.el7_4.x86_64 Red Hat Enterprise Linux Server release 7.4 (Maipo) * CA MASTER *
idm003 ipa-server-4.5.0-22.0.1.el7_4.x86_64 Red Hat Enterprise Linux Server release 7.4 (Maipo)
idm004 ipa-server-4.5.0-22.0.1.el7_4.x86_64 Red Hat Enterprise Linux Server release 7.4 (Maipo)
idm005 ipa-server-4.6.5-11.0.1.el7_7.4.x86_64 Red Hat Enterprise Linux Server release 7.7 (Maipo)
idm006 ipa-server-4.6.5-11.0.1.el7_7.4.x86_64 Red Hat Enterprise Linux Server release 7.7 (Maipo)
idm007 ipa-server-4.6.5-11.0.1.el7_7.3.x86_64 Red Hat Enterprise Linux Server release 7.7 (Maipo)
idm008 ipa-server-4.6.5-11.0.1.el7_7.3.x86_64 Red Hat Enterprise Linux Server release 7.7 (Maipo)
idm009 ipa-server-4.6.4-10.0.1.el7_6.6.x86_64 Red Hat Enterprise Linux Server release 7.6 (Maipo)
idm010 ipa-server-4.6.4-10.0.1.el7_6.6.x86_64 Red Hat Enterprise Linux Server release 7.6 (Maipo)
I have upgraded idm001 without issue, the path was:
1) take VMWare snapshot
2) ipactl stop
3) yum update (channel with latest EL versions)
4) reboot
5) after a day or so, remove VMWare snapshot
and it now shows:
idm001 ipa-server-4.6.5-11.0.1.el7_7.4.x86_64 Red Hat Enterprise Linux Server release 7.7 (Maipo)
Post upgrade checks on idm001:
I see network connections to port 88 and 389
I can obtain a kerberos ticket through kinit
I can login through the web interface and issue ipa commands.
I don't see anything particularly alarming in log files.
I understand the distributed LDAP schema was already up-to-date due to the roll out of idm005-006 on EL7.7/ipa-server-4.6.5-11.0.1.el7_7.4.
I'm particularly concerned about upgrading idm002, my CA server - perhaps I should upgrade through each EL iteration? Are VMWare snapshots a suitable roll back mechanism for IPA (and IPA CA master) server upgrades?
I was reading Rob's reply to Christian Reiss regarding his upgrade path to EL8 (bookmarked for future reference,) I don't have the ipa-crlgen-manage command on my CA server (presumably due to older version) to check if it is the CRL generator - I assume it is though, although in any case I'm unsure of the relevance with this EL7 series of ipa-server.
All my IPA servers have CA capability except for idm001 - I presume I deployed it incorrectly in the first place. I would like to add CA facility to it, perhaps this is for a different thread though ...
Thank you for any feedback.
Regards
Angus
2 years, 1 month
FreeIPA 4.6.8 released
by Alexander Bokovoy
Hello!
The FreeIPA team would like to announce FreeIPA 4.6.8 release!
It can be downloaded from http://www.freeipa.org/page/Downloads.
== Highlights in 4.6.8
* 5662: ID Views: do not allow custom Views for the masters
Custom ID views cannot be applied to IPA masters. A check was added
to both IPA CLI and Web UI to prevent applying custom ID views to
avoid confusion and unintended side-effects.
* 6783: [RFE] Host-group names command rename
host groups can now be renamed with IPA CLI: 'ipa hostgroup-mod
group-name --rename new-name'. Protected hostgroups ('ipaservers')
cannot be renamed.
* 7181: ipa-replica-prepare fails for 2nd replica when passwordHistory
is enabled
FreeIPA password policy plugin in 389-ds was extended to exempt
non-Kerberos LDAP objects from checking Kerberos policy during
password changes by the Directory Manager or a password
synchronization manager. This issue affected, among others, an
integrated CA administrator account during deployment of more than
one replica in some cases.
* 8236: Enforce a check to prevent adding objects from IPA as external
members of external groups
Command 'ipa group-add-member' allowed to specify any user or group
for '--external' option. A stricter check is added to verify that a
group or user to be added as an external member does not come from
IPA domain.
* 8239: Actualize Bootstrap version
Bootstrap Javascript framework used by FreeIPA web UI was updated to
version 3.4.1.
=== Enhancements
=== Known Issues
=== Bug fixes
FreeIPA 4.6.8 is a stabilization release for the features delivered as a
part of 4.6 version series.
There are more than 50 bug-fixes details of which can be seen in the
list of resolved tickets below.
== Upgrading
Upgrade instructions are available on Upgrade page.
== Feedback
Please provide comments, bugs and other feedback via the freeipa-users
mailing list (https://lists.fedoraproject.org/archives/list/freeipa-users@lists.fedorah...)
or #freeipa channel on Freenode.
== Resolved tickets
* https://pagure.io/freeipa/issue/4972[#4972]
(https://bugzilla.redhat.com/show_bug.cgi?id=1206690[rhbz#1206690])
check for existence of private group is done even if UPG definition is
disabled
* https://pagure.io/freeipa/issue/5662[#5662]
(https://bugzilla.redhat.com/show_bug.cgi?id=1404770[rhbz#1404770]) ID
Views: do not allow custom Views for the masters
* https://pagure.io/freeipa/issue/6210[#6210]
(https://bugzilla.redhat.com/show_bug.cgi?id=1364139[rhbz#1364139],
https://bugzilla.redhat.com/show_bug.cgi?id=1751951[rhbz#1751951]) When
master's IP address does not resolve to its name, ipa-replica-install
fails
* https://pagure.io/freeipa/issue/6783[#6783]
(https://bugzilla.redhat.com/show_bug.cgi?id=1430365[rhbz#1430365])
[RFE] Host-group names command rename
* https://pagure.io/freeipa/issue/6951[#6951]
(https://bugzilla.redhat.com/show_bug.cgi?id=1449133[rhbz#1449133])
Update samba config file and use sss idmap module
* https://pagure.io/freeipa/issue/7181[#7181]
(https://bugzilla.redhat.com/show_bug.cgi?id=1545755[rhbz#1545755])
ipa-replica-prepare fails for 2nd replica when passwordHistory is
enabled
* https://pagure.io/freeipa/issue/7307[#7307]
(https://bugzilla.redhat.com/show_bug.cgi?id=1518939[rhbz#1518939]) RFE:
Extend IPA to support unadvertised replicas
* https://pagure.io/freeipa/issue/7470[#7470]
TestBasicADTrust.test_ipauser_authentication is failing with error
"Confidentiality required"
* https://pagure.io/freeipa/issue/7566[#7566]
(https://bugzilla.redhat.com/show_bug.cgi?id=1591824[rhbz#1591824])
Installation of replica against a specific master
* https://pagure.io/freeipa/issue/7597[#7597]
(https://bugzilla.redhat.com/show_bug.cgi?id=1583950[rhbz#1583950]) IPA:
IDM drops all custom attributes when moving account from preserved to
stage
* https://pagure.io/freeipa/issue/7600[#7600]
(https://bugzilla.redhat.com/show_bug.cgi?id=1585020[rhbz#1585020])
Enable compat tree to provide information about AD users and groups on
trust agents
* https://pagure.io/freeipa/issue/7725[#7725]
(https://bugzilla.redhat.com/show_bug.cgi?id=1636765[rhbz#1636765])
ipa-restore set wrong file permissions and ownership for
/var/log/dirsrv/slapd- directory
* https://pagure.io/freeipa/issue/7795[#7795]
(https://bugzilla.redhat.com/show_bug.cgi?id=1795890[rhbz#1795890])
ipa-pkinit-manage enable fails on replica if it doesn't host the CA
* https://pagure.io/freeipa/issue/7804[#7804]
(https://bugzilla.redhat.com/show_bug.cgi?id=1777811[rhbz#1777811]) `ipa
otptoken-sync` fails with stack trace
* https://pagure.io/freeipa/issue/7807[#7807]
(https://bugzilla.redhat.com/show_bug.cgi?id=1752005[rhbz#1752005])
Detect container installation to avoid Kernel keyring
* https://pagure.io/freeipa/issue/7870[#7870]
(https://bugzilla.redhat.com/show_bug.cgi?id=1680039[rhbz#1680039])
[certmonger][upgrade] "Failed to get request: bus, object_path and
dbus_interface must not be None."
* https://pagure.io/freeipa/issue/7893[#7893] ipasam needs changes for
Samba 4.10
* https://pagure.io/freeipa/issue/7895[#7895]
(https://bugzilla.redhat.com/show_bug.cgi?id=1686302[rhbz#1686302]) ipa
trust fetch-domains, server parameter ignored
* https://pagure.io/freeipa/issue/7964[#7964] GSSAPI failure causing
LWCA key replication failure on f30
* https://pagure.io/freeipa/issue/7995[#7995]
(https://bugzilla.redhat.com/show_bug.cgi?id=1711172[rhbz#1711172])
Removing TLSv1.0, TLSv1.1 from nss.conf
* https://pagure.io/freeipa/issue/8001[#8001] Need default
authentication indicators for SPAKE, PKINIT and encrypted challenge
preauth
* https://pagure.io/freeipa/issue/8017[#8017]
(https://bugzilla.redhat.com/show_bug.cgi?id=1817927[rhbz#1817927])
host-add --password logs cleartext userpassword to Apache error log
* https://pagure.io/freeipa/issue/8026[#8026] Update pr-ci definitions
with master_3client topology
* https://pagure.io/freeipa/issue/8029[#8029]
(https://bugzilla.redhat.com/show_bug.cgi?id=1749788[rhbz#1749788]) ipa
host-find --pkey-only includes SSH keys in output
* https://pagure.io/freeipa/issue/8044[#8044]
(https://bugzilla.redhat.com/show_bug.cgi?id=1717008[rhbz#1717008])
Extdom plugin should not return LDAP_NO_SUCH_OBJECT if there are timeout
or other errors
* https://pagure.io/freeipa/issue/8058[#8058]
(https://bugzilla.redhat.com/show_bug.cgi?id=1745108[rhbz#1745108])
ipa-4-6: ipa-client-install should not refuse single-label domains
* https://pagure.io/freeipa/issue/8067[#8067]
(https://bugzilla.redhat.com/show_bug.cgi?id=1750700[rhbz#1750700]) add
default access control configuration to trusted domain objects
* https://pagure.io/freeipa/issue/8070[#8070] Test failure in
test_integration/test_replica_promotion.py::TestHiddenReplicaPromotion::()::test_hidden_replica_install
* https://pagure.io/freeipa/issue/8077[#8077] New pylint 2.4.0 errors
* https://pagure.io/freeipa/issue/8082[#8082]
(https://bugzilla.redhat.com/show_bug.cgi?id=1756432[rhbz#1756432])
Default client configuration breaks ssh in FIPS mode.
* https://pagure.io/freeipa/issue/8084[#8084]
(https://bugzilla.redhat.com/show_bug.cgi?id=1758406[rhbz#1758406]) KRA
authentication fails when IPA CA has custom Subject DN
* https://pagure.io/freeipa/issue/8086[#8086]
(https://bugzilla.redhat.com/show_bug.cgi?id=1756568[rhbz#1756568])
ipa-server-certinstall man page does not match built-in help.
* https://pagure.io/freeipa/issue/8099[#8099]
(https://bugzilla.redhat.com/show_bug.cgi?id=1762317[rhbz#1762317])
ipa-backup command is failing on rhel-7.8
* https://pagure.io/freeipa/issue/8102[#8102] Pylint 2.4.3 + Astroid
2.3.2 errors
* https://pagure.io/freeipa/issue/8113[#8113]
(https://bugzilla.redhat.com/show_bug.cgi?id=1755535[rhbz#1755535])
ipa-advise on a RHEL7 IdM server is not able to generate a configuration
script for a RHEL8 IdM client
* https://pagure.io/freeipa/issue/8115[#8115] Nightly test failure in
fedora-30/test_smb and fedora-29/test_smb
* https://pagure.io/freeipa/issue/8120[#8120]
(https://bugzilla.redhat.com/show_bug.cgi?id=1769791[rhbz#1769791])
Invisible part of notification area in Web UI intercepts clicks of some
page elements
* https://pagure.io/freeipa/issue/8126[#8126] Nightly test failure in
fedora-27/test_ca_custom_sdn
* https://pagure.io/freeipa/issue/8131[#8131]
(https://bugzilla.redhat.com/show_bug.cgi?id=1777920[rhbz#1777920])
covscan memory leaks report
* https://pagure.io/freeipa/issue/8138[#8138]
(https://bugzilla.redhat.com/show_bug.cgi?id=1780548[rhbz#1780548]) Man
page ipa-cacert-manage does not display correctly on RHEL
* https://pagure.io/freeipa/issue/8148[#8148]
(https://bugzilla.redhat.com/show_bug.cgi?id=1782587[rhbz#1782587]) add
"systemctl restart sssd" to warning message when adding trust agents to
replicas
* https://pagure.io/freeipa/issue/8152[#8152] ipatests: Enhance
install_replica() method with promote option for ipa-4-6
* https://pagure.io/freeipa/issue/8164[#8164]
(https://bugzilla.redhat.com/show_bug.cgi?id=1788907[rhbz#1788907])
Renewed certs are not picked up by IPA CAs
* https://pagure.io/freeipa/issue/8170[#8170] Nightly test failure in
fedora-rawhide/test_backup_and_restore_TestBackupReinstallRestoreWithDNS
* https://pagure.io/freeipa/issue/8176[#8176] External CA is tracked for
renewals and replaced with a self-signed certificate
* https://pagure.io/freeipa/issue/8193[#8193]
(https://bugzilla.redhat.com/show_bug.cgi?id=1801791[rhbz#1801791])
Re-order 50-externalmembers.update to be after 80-schema_compat.update
* https://pagure.io/freeipa/issue/8213[#8213] Test failure in Travis CI:
missing IPv6 loopback interface
* https://pagure.io/freeipa/issue/8219[#8219] ipatests: unify editing of
sssd.conf
* https://pagure.io/freeipa/issue/8220[#8220] Pylint for python2
complains about import from ipaplatform
* https://pagure.io/freeipa/issue/8221[#8221]
(https://bugzilla.redhat.com/show_bug.cgi?id=1812169[rhbz#1812169])
Secure AJP connector between Dogtag and Apache proxy
* https://pagure.io/freeipa/issue/8236[#8236]
(https://bugzilla.redhat.com/show_bug.cgi?id=1809835[rhbz#1809835])
Enforce a check to prevent adding objects from IPA as external members
of external groups
* https://pagure.io/freeipa/issue/8238[#8238] Nightly test failure in
fedora-27/test_sssd
* https://pagure.io/freeipa/issue/8239[#8239] Actualize Bootstrap
version
* https://pagure.io/freeipa/issue/8242[#8242]
(https://bugzilla.redhat.com/show_bug.cgi?id=1788718[rhbz#1788718])
ipa-server-install incorrectly setting slew mode (-x) when setting up
ntpd
== Detailed changelog since 4.6.7
=== Armando Neto (2)
* Travis: Enable IPv6 support for Docker
https://pagure.io/freeipa/c/423a052700889d075d5dba3711679375e8990437[commit]
https://pagure.io/freeipa/issue/8213[#8213]
* prci: Update box used in branch ipa-4-6
https://pagure.io/freeipa/c/b93258d004ccd5da8b526ea554031315d756b57b[commit]
=== Alexander Bokovoy (24)
* Return to development snapshots
https://pagure.io/freeipa/c/33088c027424573209367ee6531910da30501519[commit]
* Become FreeIPA 4.6.8
https://pagure.io/freeipa/c/a718e4a4ab11ab1949bb45c8f15054bd7f2427ab[commit]
* Update list of contributors
https://pagure.io/freeipa/c/1c0749a3c12c3799fd772da17dd864896fc6f908[commit]
* Allow rename of a host group
https://pagure.io/freeipa/c/4c0a2a113d707166cca8cba857937fd624426745[commit]
https://pagure.io/freeipa/issue/6783[#6783]
* Add 'api' and 'aci' targets to make
https://pagure.io/freeipa/c/7ce5e79dae8cae2790717f68adacd039dc913ab4[commit]
* ipa-pwd-extop: don't check password policy for non-Kerberos account
set by DM or a passsync manager
https://pagure.io/freeipa/c/3d41453138c0d730a94acd8c22ef345d910a4e42[commit]
https://pagure.io/freeipa/issue/7181[#7181]
* ipa-pwd-extop: use SLAPI_BIND_TARGET_SDN
https://pagure.io/freeipa/c/d038fc70f8e904a492c5ec0874e0fd0be254ead6[commit]
https://pagure.io/freeipa/issue/7181[#7181]
* ipatests: test sysaccount password change with a password policy
applied
https://pagure.io/freeipa/c/41fc40a6b18d26d92869f278b2b8436378653b38[commit]
https://pagure.io/freeipa/issue/7181[#7181]
* ipatests: allow changing sysaccount passwords as cn=Directory Manager
https://pagure.io/freeipa/c/e4f3cd0f26efda56db44bf55aa0bb65d8470b160[commit]
https://pagure.io/freeipa/issue/7181[#7181]
* Fix indentation levels
https://pagure.io/freeipa/c/aaa79c872aad2a5458acefdc16203b9efd62c6c9[commit]
* Prevent adding IPA objects as external members of external groups
https://pagure.io/freeipa/c/c14e385141ea05f2709364b6f0fca844578a7652[commit]
https://pagure.io/freeipa/issue/8236[#8236]
* Secure AJP connector between Dogtag and Apache proxy
https://pagure.io/freeipa/c/901d0eca7d462c74c1664aae9b3415ede7ba3dfc[commit]
https://pagure.io/freeipa/issue/8221[#8221]
* Tighten permissions on PKI proxy configuration
https://pagure.io/freeipa/c/af2dca13d0cc24e0cf32bc23e4edb86fbbf60d03[commit]
https://pagure.io/freeipa/issue/8221[#8221]
* install/updates: move external members past schema compat update
https://pagure.io/freeipa/c/a5a201fc008b19841f98bb70d44ede7d04ef1126[commit]
https://pagure.io/freeipa/issue/8193[#8193]
* covscan: free ucs2-encoded password copy when generating NTLM hash
https://pagure.io/freeipa/c/830466c0489466d385a333cb829fe8cd5e59644c[commit]
https://pagure.io/freeipa/issue/8131[#8131]
* covscan: free encryption types in case there is an error
https://pagure.io/freeipa/c/e8983f69ce1788144b2b348a65f709412c68e47e[commit]
https://pagure.io/freeipa/issue/8131[#8131]
* Become FreeIPA 4.6.7
https://pagure.io/freeipa/c/71c4dd1f0ba5bd4ddee841d69821398bec35cef8[commit]
* Do not run trust upgrade code if master lacks Samba bindings
https://pagure.io/freeipa/c/fa23f5a13a326b4cedf6705be7d14da8bc813763[commit]
https://pagure.io/freeipa/issue/8001[#8001]
* adtrust: add default read_keys permission for TDO objects
https://pagure.io/freeipa/c/b764b386f66fdf813f3914362985b4944c13090f[commit]
https://pagure.io/freeipa/issue/8067[#8067]
* add default access control when migrating trust objects
https://pagure.io/freeipa/c/5741e031318267b28f5812154fa34ff2ff6c3483[commit]
https://pagure.io/freeipa/issue/8067[#8067]
* ipasam: use SID formatting calls to libsss_idmap
https://pagure.io/freeipa/c/95c91b5709d0c7fec20eef5ef69a084a74868c2d[commit]
https://pagure.io/freeipa/issue/7893[#7893]
* Use unicode strings for Python 2 version
https://pagure.io/freeipa/c/37fa917fa2630dd90dd3a12bab213aeb6adfe182[commit]
https://pagure.io/freeipa/issue/6951[#6951]
* ipa-extdom-extop: test timed out getgrgid_r
https://pagure.io/freeipa/c/387ed98e59ba4df8d3fd435cfc84f055970c064e[commit]
https://pagure.io/freeipa/issue/8044[#8044]
* Revert back to git snapshots
https://pagure.io/freeipa/c/ca00a83c79677c22aed5ff77044cb09c59182448[commit]
=== Anuja More (13)
* Mark test to skip sssd-1.16.3 [sssd/issue/4073]
https://pagure.io/freeipa/c/edbf8f78019709d4af396ba6ad3724a11dd2b576[commit]
* ipatests: User and group with same name should not break reading AD
user data.
https://pagure.io/freeipa/c/4ca75cf610335cfc2be43aeb8c0ddc1fde2e0c08[commit]
* Mark xfail for tests using sssd-1.16.3
https://pagure.io/freeipa/c/734121fa1497ef2e074d2879ab9fc54c0ace95b8[commit]
* ipatests: Added test when 2FA prompting configurations is set.
https://pagure.io/freeipa/c/b36c4a70fc0e577265bb587de1e1b7bd739a8709[commit]
* Mark xfail for sssd-version 1.16.3
https://pagure.io/freeipa/c/0c828dad4cfd3df9db8056b2497543c022c7680a[commit]
* ipatests: SSSD should fetch external groups without any limit.
https://pagure.io/freeipa/c/fd74fcf75606ded2987753337161c163e8ae9a44[commit]
* Add sssd.py in nightly ipa-4-6.yaml
https://pagure.io/freeipa/c/2e4e1b37a71d7a9d8bd834fefcc241eaac19e1e7[commit]
* ipatests: Add test for ipa-extdom-extop plugin should allow @ in group
name
https://pagure.io/freeipa/c/a736449a217dc38e98054e8018fe7c7fd11f54be[commit]
* Mark xfail for test_is_user_filtered
https://pagure.io/freeipa/c/d3b740e3df70c37bb3b7aa1fcd77acf5d68dc2bc[commit]
* ipatests: filter_users should be applied correctly.
https://pagure.io/freeipa/c/4b70132c83f417b83aa4905de73f720336a90128[commit]
* Mark xfail for test_sss_ssh_authorizedkeys()
https://pagure.io/freeipa/c/3ddddad50d98274a065781f2238c102badc8cea7[commit]
* ipatests: 'sss_ssh_authorizedkeys user' should return ssh key
https://pagure.io/freeipa/c/0c452369f753116496f3a170d1bb7fde4cdfb12f[commit]
* Extdom plugin should not return error (32)/'No such object'
https://pagure.io/freeipa/c/17536af58b5a2d1ae1adf7e741dade7b3f84179a[commit]
https://pagure.io/freeipa/issue/8044[#8044]
=== Christian Heimes (7)
* Add test case for OTP login
https://pagure.io/freeipa/c/cabb7abfc07b093a9912b20ee712baaa40d16d19[commit]
https://pagure.io/freeipa/issue/7804[#7804]
* Cherry-picked only ldapmodify_dm()
https://pagure.io/freeipa/c/48ecb92afdbd577fbb4fe05ea15cfaf44e504f89[commit]
* Use default ssh host key algorithms
https://pagure.io/freeipa/c/7cd1d565ac2b240eda697dbebb043a1a2885d23a[commit]
https://pagure.io/freeipa/issue/8082[#8082]
* Log stderr in run_command
https://pagure.io/freeipa/c/c5ff32870d22f7c42edec63c686a730d7bcf21cc[commit]
* Fix CustodiaClient ccache handling
https://pagure.io/freeipa/c/436214aea7fd5893525292cb03b3c28cdbc249f2[commit]
https://pagure.io/freeipa/issue/7964[#7964]
* Don't configure KEYRING ccache in containers
https://pagure.io/freeipa/c/91e54057f130f0c2d9da8506e34c3cadc9cd9c6e[commit]
https://pagure.io/freeipa/issue/7807[#7807]
* Remove ZERO_STRUCT() call
https://pagure.io/freeipa/c/910e56333d4631244053b5c506ba2bec905d1c27[commit]
=== François Cami (2)
* adtrust.py: mention restarting sssd when adding trust agents
https://pagure.io/freeipa/c/5bc4218bf8716d28339a3f30d1be8471d04cb4b4[commit]
https://pagure.io/freeipa/issue/8148[#8148]
* prci_definitions: add master_3client topology
https://pagure.io/freeipa/c/663163cbcf0bb12236a675b60784fdf36f917343[commit]
https://pagure.io/freeipa/issue/8026[#8026]
=== Florence Blanc-Renaud (28)
* ipatests: fix group-add-member in test_sssd
https://pagure.io/freeipa/c/7b9cdfb2556bd290d5f18b0680a1cf907b4dff0c[commit]
https://pagure.io/freeipa/issue/8238[#8238]
* ipatests: fix KeyError in test_sssd
https://pagure.io/freeipa/c/bce50976ca5363e2097171b36a0d9a5df652a988[commit]
https://pagure.io/freeipa/issue/8238[#8238]
* xmlrpc tests: add a test for idview-apply on a master
https://pagure.io/freeipa/c/e946b879750d0b316b25902f15b7f5a0a078012e[commit]
https://pagure.io/freeipa/issue/5662[#5662]
* idviews: prevent applying to a master
https://pagure.io/freeipa/c/0d62f3de06520282c9656e13ca07e503f1d48c59[commit]
https://pagure.io/freeipa/issue/5662[#5662]
* ipa-adtrust-install: remote command fails if ipa-server-trust-ad pkg
missing
https://pagure.io/freeipa/c/79f9ba5557d14e74ab29b85407c5de5622d7ea35[commit]
https://pagure.io/freeipa/issue/7600[#7600]
* ipatests: add test for ipa-adtrust-install --add-agents
https://pagure.io/freeipa/c/796c86ac701d23d1dd281d0d5c5331b9a66c2888[commit]
https://pagure.io/freeipa/issue/7600[#7600]
* ipa-adtrust-install: run remote configuration for new agents
https://pagure.io/freeipa/c/f9fcd2c7fb7823becb3a6b68da4b0bf2c1db229f[commit]
https://pagure.io/freeipa/issue/7600[#7600]
* Privilege: add a helper checking if a principal has a given privilege
https://pagure.io/freeipa/c/d051d2d47a36c79fd2c20733437fda95f443f053[commit]
https://pagure.io/freeipa/issue/7600[#7600]
* ipatests: fix TestSubCAkeyReplication
https://pagure.io/freeipa/c/ed71305be9e236d8f49e3298516c6f6bfadb958c[commit]
* ipatests: fix modify_sssd_conf()
https://pagure.io/freeipa/c/f605f21cc092300640a27dfc4652c2748407664f[commit]
* test: add non-reg test checking pkinit after server install
https://pagure.io/freeipa/c/18ed56acc58bb379d5187fbcaafc6d7f16178cdb[commit]
https://pagure.io/freeipa/issue/7795[#7795]
* pkinit setup: fix regression on master install
https://pagure.io/freeipa/c/50e8c5d652bc2b6c937a3def52621f0c60e085f1[commit]
https://pagure.io/freeipa/issue/7795[#7795]
* ipatests: add integration test for pkinit enable on replica
https://pagure.io/freeipa/c/95cbf7003ff7b391311a1da6f1065aa1d2c6addf[commit]
https://pagure.io/freeipa/issue/7795[#7795]
* pkinit enable: use local dogtag only if host has CA
https://pagure.io/freeipa/c/f7c47341c217312b4b4265fcbea80088bc06381f[commit]
https://pagure.io/freeipa/issue/7795[#7795]
* ipatests: fix backup and restore
https://pagure.io/freeipa/c/4bd5da1417f12e9f1f22d20b09ed58dcbcfca5cc[commit]
https://pagure.io/freeipa/issue/8170[#8170]
* ipa-cacert-manage man page: fix indentation
https://pagure.io/freeipa/c/3d8b16b9457a3a4d7eceb326b3c53be13bb6543c[commit]
https://pagure.io/freeipa/issue/8138[#8138]
* trust upgrade: ensure that host is member of adtrust agents
https://pagure.io/freeipa/c/bb4ec6fcb4547bc624cde93e16a9201dfa8d4426[commit]
* ipatests: fix test_ca_custom_sdn
https://pagure.io/freeipa/c/526c184a8729c36a54a81eeff73bac3428ed6e5a[commit]
https://pagure.io/freeipa/issue/8126[#8126]
* smartcard: make the ipa-advise script compatible with
authselect/authconfig
https://pagure.io/freeipa/c/7a19c0d730ae3d16a9763f4769a37bf19680622a[commit]
https://pagure.io/freeipa/issue/8113[#8113]
* ipa-backup: fix python2 issue with os.mkdir
https://pagure.io/freeipa/c/11921266df6e2600afc207b3a721f00bc7e63e99[commit]
https://pagure.io/freeipa/issue/8099[#8099]
* ipa-server-certinstall manpage: add missing options
https://pagure.io/freeipa/c/ddc00468b74b170721c1769029f771e163621c70[commit]
https://pagure.io/freeipa/issue/8086[#8086]
* ipatests: fix test_replica_promotion.py::TestHiddenReplicaPromotion
https://pagure.io/freeipa/c/a5228a7fb94fdcb16ec4571677af5b5ec33979d2[commit]
https://pagure.io/freeipa/issue/8070[#8070]
* ipatests: add XMLRPC test for user-add when UPG plugin is disabled
https://pagure.io/freeipa/c/317c111b830fbeb4cd907a6812ce35b7fbf1c174[commit]
https://pagure.io/freeipa/issue/4972[#4972]
* ipa user_add: do not check group if UPG is disabled
https://pagure.io/freeipa/c/0b574c130a1d28a6c7d085f795a9fdd3ef91f016[commit]
https://pagure.io/freeipa/issue/4972[#4972]
* replica install: enforce --server arg
https://pagure.io/freeipa/c/22e4eef6cb54c74fc9907db1385549db670094fa[commit]
https://pagure.io/freeipa/issue/7566[#7566]
* check for single-label domains only during server install
https://pagure.io/freeipa/c/8ae6c1af1e6ef25fdfbbf7e72265372366e6b106[commit]
https://pagure.io/freeipa/issue/8058[#8058]
* xmlrpc test: add test for preserved > stage user
https://pagure.io/freeipa/c/5ab31a9c3b16536b02416c6b996aec2c1f3ba962[commit]
https://pagure.io/freeipa/issue/7597[#7597]
* user-stage: transfer all attributes from preserved to stage user
https://pagure.io/freeipa/c/6a9f1c802bb28fde8e1d9f38673e554ef23e5620[commit]
https://pagure.io/freeipa/issue/7597[#7597]
=== Fraser Tweedale (8)
* Do not renew externally-signed CA as self-signed
https://pagure.io/freeipa/c/c30af44b8a55ebf85f4657ee13eb1554e3b2a2ad[commit]
https://pagure.io/freeipa/issue/8176[#8176]
* test_integration: add tests for custom CA subject DN
https://pagure.io/freeipa/c/0a0e802bd47188fe31d6bf02b28ef0ea51567194[commit]
https://pagure.io/freeipa/issue/8084[#8084]
* upgrade: fix ipakra people entry 'description' attribute
https://pagure.io/freeipa/c/2fa8c6903405294f0e11e373db321172663d6cfd[commit]
https://pagure.io/freeipa/issue/8084[#8084]
* krainstance: set correct issuer DN in uid=ipakra entry
https://pagure.io/freeipa/c/946d96f6c3fd5766d60222da940c27d5d4e41158[commit]
https://pagure.io/freeipa/issue/8084[#8084]
* Bump krb5 min version
https://pagure.io/freeipa/c/e686949dcdc46486061d23d5e18f21e2a2038f58[commit]
* CustodiaClient: fix IPASecStore config on ipa-4-7
https://pagure.io/freeipa/c/c9d0ba0c355c433ae883cafa3c1e99fea1a85220[commit]
https://pagure.io/freeipa/issue/7964[#7964]
* CustodiaClient: use ldapi when ldap_uri not specified
https://pagure.io/freeipa/c/1f455867f82407c0dfab0b9f123c75ca0d1a0090[commit]
https://pagure.io/freeipa/issue/7964[#7964]
* Handle missing LWCA certificate or chain
https://pagure.io/freeipa/c/82a9fe7e655115befbdde10907a5aa7669c35fde[commit]
https://pagure.io/freeipa/issue/7964[#7964]
=== Gaurav Talreja (1)
* Normalize test definations titles
https://pagure.io/freeipa/c/636ea489bb59ed0b26951299053db5651c78a20f[commit]
=== Ganna Kaihorodova (1)
* TestBasicADTrust.test_ipauser_authentication
https://pagure.io/freeipa/c/2b6638becbfbae746cef35176890ae3f4a8b01a6[commit]
https://pagure.io/freeipa/issue/7470[#7470]
=== Jayesh Garg (2)
* Test if ipactl starts services stopped by systemctl
https://pagure.io/freeipa/c/c1099f7298a7e175bb90bc65f3dd1af58995bc07[commit]
* Test for ipa-ca-install on replica
https://pagure.io/freeipa/c/c559e41e8ce87f2a16958113ef08effe5b5e8875[commit]
=== Kaleemullah Siddiqui (1)
* Tests for autounmembership feature
https://pagure.io/freeipa/c/4a8316d308a34a4a3e590ab1d3c4bb1de2b9d89b[commit]
=== Mohammad Rizwan Yusuf (7)
* ipatests: Test if slew mode is not set while configuring ntpd
https://pagure.io/freeipa/c/81b859795c72f6c96b27137cc24d6df327ca8471[commit]
https://pagure.io/freeipa/issue/8242[#8242]
* Test if schema-compat-entry-attribute is set
https://pagure.io/freeipa/c/b739bc2089774cea0437347283c821ac86f8251d[commit]
https://pagure.io/freeipa/issue/8193[#8193]
* Test if schema-compat-entry-attribute is set
https://pagure.io/freeipa/c/e6960b7af2e8d8e4746245d8ba82a46225174529[commit]
https://pagure.io/freeipa/issue/8193[#8193]
* Add promote option to install_replica() method
https://pagure.io/freeipa/c/0d91a78ee409e66f96e7b2555ca33fb2128fdfa3[commit]
https://pagure.io/freeipa/issue/8152[#8152]
* Add test to nightly.yaml
https://pagure.io/freeipa/c/9b3855ec486990ecd08a9f3a0ca408425ee7fbf7[commit]
* Installation of replica against a specific server
https://pagure.io/freeipa/c/f4dc0ee169689974020a4a77b8bb58b26f360369[commit]
https://pagure.io/freeipa/issue/7566[#7566]
* Check file ownership and permission for dirsrv log instance
https://pagure.io/freeipa/c/de0afeaf5e07028af8ec7247ce37efc789add2ae[commit]
https://pagure.io/freeipa/issue/7725[#7725]
=== ndehadra (1)
* Hidden Replica: Add a test for Automatic CRL configuration
https://pagure.io/freeipa/c/ad3ddbb80d9f1dd3556afdc9cf506f3bae7f6783[commit]
https://pagure.io/freeipa/issue/7307[#7307]
=== Rob Crittenden (11)
* Don't configure ntpd with -x
https://pagure.io/freeipa/c/2c1495460fcb0d58d27579bfbd6aba63b91bf985[commit]
https://pagure.io/freeipa/issue/8242[#8242]
* Test that pwpolicy only applied on Kerberos entries
https://pagure.io/freeipa/c/5a98670e4abfac2b7de2f604f8fe19fbea988b16[commit]
* Add ability to change a user password as the Directory Manager
https://pagure.io/freeipa/c/19e872e653705bb178457ebe39c90d4f550f438b[commit]
* Don't save password history on non-Kerberos accounts
https://pagure.io/freeipa/c/dc833948006fac6920581e56ec69763bde3f1d4a[commit]
* Allow an empty cookie in dogtag-ipa-ca-renew-agent-submit
https://pagure.io/freeipa/c/73d415b72da8a57a2369a55b1533b45f36daf544[commit]
https://pagure.io/freeipa/issue/8164[#8164]
* CVE-2019-10195: Don't log passwords embedded in commands in calls
using batch
https://pagure.io/freeipa/c/5913826a4654a115cd5ff2dbf4a2b3ad38a93081[commit]
* ipa-restore: Restore ownership and perms on 389-ds log directory
https://pagure.io/freeipa/c/8cd2052c3cb6d8a2569903593762d64669303ff6[commit]
https://pagure.io/freeipa/issue/7725[#7725]
* Report if a certmonger CA is missing
https://pagure.io/freeipa/c/9eb7763b76c7f4f3d78c76fa324560a8af9342ae[commit]
https://pagure.io/freeipa/issue/7870[#7870]
* Don't log host passwords when they are set/modified
https://pagure.io/freeipa/c/86529f5e21a5b09f026b9787178426a8b8b96bb4[commit]
https://pagure.io/freeipa/issue/8017[#8017]
* Disable deprecated-lambda check in adtrust upgrade code
https://pagure.io/freeipa/c/582e7a35121e0f5ff331699d29a485408f5e17ff[commit]
* Don't return SSH keys with ipa host-find --pkey-only
https://pagure.io/freeipa/c/643a1d6747e523ac456aefc4707772aebde5573a[commit]
https://pagure.io/freeipa/issue/8029[#8029]
=== Robbie Harwood (3)
* Fix NULL pointer dereference in maybe_require_preauth()
https://pagure.io/freeipa/c/95f50d7f51fe6b2bca29daa45b795de2517469a7[commit]
* Log INFO message when LDAP connection fails on startup
https://pagure.io/freeipa/c/f132def4812a5b9bb1d14672f8e33e66bc778229[commit]
* Fix segfault in ipadb_parse_ldap_entry()
https://pagure.io/freeipa/c/ed0d7561a148e23519a1097b3bdf99abf5edcc6d[commit]
=== Sumit Bose (2)
* ipa_sam: remove dependency to talloc_strackframe.h
https://pagure.io/freeipa/c/fa0b273874760503c7f57f279721e97aaf007ca5[commit]
* extdom: unify error code handling especially LDAP_NO_SUCH_OBJECT
https://pagure.io/freeipa/c/574a615e61ca74b08e2bd7e1e820757f88150418[commit]
https://pagure.io/freeipa/issue/8044[#8044]
=== Stanislav Levin (2)
* Fix errors found by Pylint-2.4.3
https://pagure.io/freeipa/c/f0f839326c8c0de83cb875a473b3fb5d4a014296[commit]
https://pagure.io/freeipa/issue/8102[#8102]
* Fixed errors newly exposed by pylint 2.4.0
https://pagure.io/freeipa/c/700a6c9313188a0448e46cca17a08146deb21c2a[commit]
https://pagure.io/freeipa/issue/8077[#8077]
=== Sergey Orlov (24)
* ipatests: remove test_ordering
https://pagure.io/freeipa/c/3a2244ce7fd8be03f7340afa18971cbfa306a196[commit]
* ipatests: add test_trust suite to nightly runs
https://pagure.io/freeipa/c/d44374e761a1e7f5aaca22399631f77fccc45f94[commit]
* ipatests: add workaround for unfixed sssd bug in Fedora 27
https://pagure.io/freeipa/c/37e383aae94b0450c06f0e78354245e4b14d70f5[commit]
* ipatests: use less strict check for error message
https://pagure.io/freeipa/c/941c231b692216f3dc4b66944dd170b5380fe981[commit]
* ipatests: provide AD admin password when trying to establish trust
https://pagure.io/freeipa/c/795a973c00c2fe862b1eff8bd851d8eafe9d970a[commit]
https://pagure.io/freeipa/issue/7895[#7895]
* ipatests: remove workaround for pylint error no-name-in-module
https://pagure.io/freeipa/c/46b9139ac9ecbbd89495239e380982514db3a5f4[commit]
https://pagure.io/freeipa/issue/8220[#8220]
* ipatests: temporary disable pylint check no-name-in-module
https://pagure.io/freeipa/c/044748b5724f408643fe9f95c3a63d29ca646002[commit]
https://pagure.io/freeipa/issue/8220[#8220]
* ipatests: remove invalid parameter from sssd.conf
https://pagure.io/freeipa/c/551dabe5f933475e4609b6b23eb1200dec90945b[commit]
https://pagure.io/freeipa/issue/8219[#8219]
* ipatests: use remote_sssd_config to modify sssd.conf
https://pagure.io/freeipa/c/aff397b9ef09b1f2dc6c02a6bb85b96fb16b9ded[commit]
https://pagure.io/freeipa/issue/8219[#8219]
* ipatests: replace utility for editing sssd.conf
https://pagure.io/freeipa/c/7f18f08ca607fdf3b730a6b5e66dc97535007259[commit]
https://pagure.io/freeipa/issue/8219[#8219]
* ipatests: update docstring to reflect changes in FileBackup.restore()
https://pagure.io/freeipa/c/e25b10ef3a4da973300cd7d888f1506291fa882d[commit]
* ipatests: refactor FileBackup helper
https://pagure.io/freeipa/c/714b61f3605f53ecde73dd7e3d23ae92d219f926[commit]
https://pagure.io/freeipa/issue/8115[#8115]
* ipatests: fix collection of tests from test_trust suite
https://pagure.io/freeipa/c/d12e4bdeef92415c081b99c5b3235997bb086529[commit]
* Add convenient template for temp commits
https://pagure.io/freeipa/c/3d0ffe2ca8b67715328596b18c8603ff55ecc4fc[commit]
* ipatests: add test_winsyncmigrate suite to nightly runs
https://pagure.io/freeipa/c/28df8cef01de0c7adac348774e243e72df7e8f96[commit]
* ipatests: fix compatibility with python2 (import ConfigParser)
https://pagure.io/freeipa/c/0ad66fc17db76187fb869983ded2b2c60e40d4a3[commit]
* ipatests: add new utilities for file management
https://pagure.io/freeipa/c/ba4aaa73f19035433bbd98b536540c86b87f87c8[commit]
* ipatests: add utility functions related to using and managing user
accounts
https://pagure.io/freeipa/c/ee3d998599bf96c4f0ddb1ab0abf049e3e0e892c[commit]
* ipatests: add check that ipa-adtrust-install generates sane smb.conf
https://pagure.io/freeipa/c/a8fbbb1d3528952685d7b3259329313cc112080e[commit]
https://pagure.io/freeipa/issue/6951[#6951]
* ipatests: add test to check that only TLS 1.2 is enabled in Apache
https://pagure.io/freeipa/c/4487fc43d036481a315574bfe719b10a57c54a64[commit]
https://pagure.io/freeipa/issue/7995[#7995]
* ipatests: modify run_command to allow specify successful return codes
https://pagure.io/freeipa/c/aa0ecc93ff0faad6663add73d5e013775ce4a68f[commit]
* ipatests: in DNS zone file add A record for name server
https://pagure.io/freeipa/c/cf61f74a2e67c03000ecd1020eb692f1d7364c28[commit]
* ipatests: strip newline character when getting name of temp file
https://pagure.io/freeipa/c/99e8d80bc5bc43cf84dd0b403b8a318d3353c936[commit]
* ipatests: fix DNS forwarders setup for AD trust tests with non-root
domains
https://pagure.io/freeipa/c/f803c2c935c03d4bf7bb328a0ee62463f209c487[commit]
=== Sumedh Sidhaye (2)
* Added a test to check if ipa host-find --pkey-only does not return SSH
public key
https://pagure.io/freeipa/c/189fc03a52c80dc675ea1015d97a4e4c357549b5[commit]
https://pagure.io/freeipa/issue/8029[#8029]
* Test: Test to check whether ssh from ipa client to ipa master is
successful after adding ldap_deref_threshold=0 in sssd.conf
https://pagure.io/freeipa/c/5d8936c44aaf1531a8f6de1ec747cd28db266fc6[commit]
=== Simo Sorce (1)
* Make sure to have storage space for tag
https://pagure.io/freeipa/c/cc45a3970cf7a9735a80df5342844339fc66faa3[commit]
=== Serhii Tsymbaliuk (2)
* WebUI: Fix notification area layout
https://pagure.io/freeipa/c/6e6223419de9a50f1357fc7478a95cf623bf5a10[commit]
https://pagure.io/freeipa/issue/8120[#8120]
* Web UI: Upgrade Bootstrap version 3.3.7 -> 3.4.1
https://pagure.io/freeipa/c/927e339cae309226b654997871c9f8b5cdf32b0b[commit]
https://pagure.io/freeipa/issue/8239[#8239]
=== Tibor Dudlák (1)
* Add container environment check to replicainstall
https://pagure.io/freeipa/c/a016ed75ecbe7e2698530036043ef19df1bd718f[commit]
https://pagure.io/freeipa/issue/6210[#6210]
=== Tomas Halman (4)
* extdom: add extdom protocol documentation
https://pagure.io/freeipa/c/9a140cdc269bbde9e9ebb99d9cd8c643a94afb6c[commit]
* extdom: use sss_nss_*_timeout calls
https://pagure.io/freeipa/c/0a1ad84adfedc141fbbaece3a7dee1ade69c1fdc[commit]
* extdom: plugin doesn't use timeout in blocking call
https://pagure.io/freeipa/c/20612db06516ec59922827e16f5226d21815751a[commit]
* extdom: plugin doesn't allow @ in group name
https://pagure.io/freeipa/c/b182a96226de46b6d194fb924b7374d923c14733[commit]
--
/ Alexander Bokovoy
Sr. Principal Software Engineer
Security / Identity Management Engineering
Red Hat Limited, Finland
2 years, 1 month
Update FreeIPA 4.8.6 on PI 4
by Dirk Streubel
Hello everybody,
i am using a PI4 with Fedora 32 Beta and the latest Packages of IPA.
Everything is working fine, but after an update this Afternoon my IPA
Server would not start any more.
I updated following packages: 389-ds-base-1.4.3.4-1.fc32.aarch64 and
389-ds-base-libs-1.4.3.4-1.fc32.aarch64
The following error message i get:
[root@pifour ~]# systemctl status dirsrv(a)XXX.service
● dirsrv(a)XXX.service - 389 Directory Server XXX.
Loaded: loaded (/usr/lib/systemd/system/dirsrv@.service; enabled;
vendor preset: disabled)
Drop-In: /usr/lib/systemd/system/dirsrv@.service.d
└─custom.conf
/etc/systemd/system/dirsrv(a)XXX.service.d
└─ipa-env.conf
Active: failed (Result: exit-code) since Thu 2020-04-02 21:50:43
CEST; 21min ago
Process: 6894
ExecStartPre=/usr/libexec/dirsrv/ds_systemd_ask_password_acl
/etc/dirsrv/slapd-XXX/dse.ldif (code=exited, status=0/SUCCESS)
Process: 6899 ExecStart=/usr/sbin/ns-slapd -D /etc/dirsrv/slapd-XXX
-i /run/dirsrv/slapd-XXX.pid (code=exited, status=1/FAILURE)
Main PID: 6899 (code=exited, status=1/FAILURE)
CPU: 433ms
Apr 02 21:50:42 pifour.linux.schnell.er systemd[1]: Starting 389
Directory Server XXX....
Apr 02 21:50:43 pifour.linux.schnell.er ns-slapd[6899]:
[02/Apr/2020:21:50:43.097278875 +0200] - ERR - dse_read_one_file - The
entry cn=schema in file /etc/dirsrv/slapd-XXX/schema/15rfc2307bis.ldif
(lineno: 1) is invalid, error code 20 (Type or value exists) - attribute
type nisDomain: Does not match the OID "1.3.6.1.4.1.1.1.1.12". Another
attribute type is already using the name or OID.
Apr 02 21:50:43 pifour.linux.schnell.er ns-slapd[6899]:
[02/Apr/2020:21:50:43.113521126 +0200] - ERR - setup_internal_backends -
Please edit the file to correct the reported problems and then restart
the server.
Apr 02 21:50:43 pifour.linux.schnell.er systemd[1]: dirsrv(a)XXX.service:
Main process exited, code=exited, status=1/FAILURE
Apr 02 21:50:43 pifour.linux.schnell.er systemd[1]: dirsrv(a)XXX.service:
Failed with result 'exit-code'.
Apr 02 21:50:43 pifour.linux.schnell.er systemd[1]: Failed to start 389
Directory Server XXX..
[root@pifour ~]#
Hope, somebody can help me, maybe a bug in the new packages?
Regards
Dirk
2 years, 1 month
Spacewalk and FreeIPA
by Ronald Wimmer
Hi,
anyone here successfully configured Spacewalk authentication for FreeIPA
users?
I followed every step on
https://github.com/spacewalkproject/spacewalk/wiki/SpacewalkAndIPA and
can see that Kerberos auth seemed to have worked according to the
ssl_access.log of Spacewalk but after clicking on login Spacewalk gives
me an HTTP 403 error and I cannot find anything helpful in any log I am
aware of.
Cheers,
Ronald
2 years, 1 month
Integration Freeipa with Keycloak
by dmitriys
Hi!
I tried connect freeipa to Keycloak. And hove some questions about attribute and filters
I filled in this way:
* Username LDAP attribute uid
* RDN LDAP attribute uid
* UUID LDAP attribute uid
* User Object Classes memberOf
* Connection URL ldap://ldap.example.com
* Users DN cn=users,cn=accounts,dc=example,dc=com
* Bind Type simple
Enable StartTLS (when set enable cant login)
* Bind DN uid=test,cn=users,cn=compat,dc=example,dc=com
* Bind Credential **********
Custom User LDAP Filter (memberOf=cn=users,cn=compat,dc=example,dc=com)
With this settings keycloak can connect to freeipa but cant sync any users
2020-04-01 13:20:26,810 INFO [org.keycloak.storage.ldap.LDAPIdentityStoreRegistry] (default task-29) Creating new LDAP Store for the LDAP storage provider: 'freeipa_dev', LDAP Configuration: {pagination=[true], fullSyncPeriod=[-1], startTls=[false], connectionPooling=[true], usersDn=[cn=users,cn=accounts,dc=example,dc=com], cachePolicy=[DEFAULT], useKerberosForPasswordAuthentication=[false], importEnabled=[true], enabled=[true], bindDn=[uid=admin,cn=users,cn=compat,dc=example,dc=com], changedSyncPeriod=[-1], usernameLDAPAttribute=[uid], lastSync=[1585747226], vendor=[other], uuidLDAPAttribute=[uid], allowKerberosAuthentication=[false], connectionUrl=[ldap://ldap2.example.com], syncRegistrations=[true], authType=[simple], customUserSearchFilter=[(memberOf=cn=users,cn=compat,dc=example,dc=com)], debug=[false], searchScope=[1], useTruststoreSpi=[ldapsOnly], trustEmail=[false], priority=[0], userObjectClasses=[memberOf], rdnLDAPAttribute=[uid], editMode=[READ_ONLY], validatePasswordPoli
cy=[false], batchSizeForSync=[1000]}, binaryAttributes: []
2020-04-01 13:20:26,812 INFO [org.keycloak.storage.ldap.LDAPStorageProviderFactory] (default task-29) Sync all users from LDAP to local store: realm: example, federation provider: freeipa_dev
2020-04-01 13:20:26,894 INFO [org.keycloak.storage.ldap.LDAPStorageProviderFactory] (default task-29) Sync all users finished: 0 imported users, 0 updated users
When try enable SSL/TLS get this error for connection
2020-04-01 13:23:26,179 ERROR [org.keycloak.services] (default task-40) KC-SERVICES0055: Error when connecting to LDAP: null: java.lang.NullPointerException
How i can resolve this issue ?
thank you
2 years, 1 month
LDAP Server stop to response after a period of time
by Lays Dragon
I deployed a two replica FreeIPA Servers,it woks well until this month,it start at the service report the LDAP is Timeout,I try to restart the server,even reinstall two IPA server and maintain the data via replica from another server. And it still happen after several days. The 389ds server just simply stop to response to any connection ,the wierd thing is the connection is established but no response after the connection.
LDAP server seems to blocked on something,even replica is dead because the ldap is blocked.simply restart not slove the problem,the ldap server will blocked really soon caused other service like IPA Web service or kinit dead too.
I guess the blocked is caused via replica function somehow,since I figure out I have to close the ldap port on blocked server firewall to make it isolate,and restart the server,waiting for about 10 min after the server is start,reopen the ldap port on firewall to let replica recover,and everything will be fine...And I notice there some connection stuck at CLOSE_WAIT of ns-slapd may be related.
Need some help . I not so familiar with of freeipa,and trying to deal this problem over the week but nothing works.
FreeIPA server version:4.8.4
Server System: Fedora 31 (Cloud Edition)
server1 access log
```
krbLastFailedAuth krbLoginFailedCount krbPrincipalAuthInd krbExtraData krbLastAdminUnlock krbObjectReferences krbTicketFlags krbMaxTicketLife krbMaxRenewableAge nsAccountLock passwordHistory
ipaKrbAuthzData ipaUserAuthType ipatokenRadiusConfigLink krbAuthIndMaxTicke..."
[08/Mar/2020:10:01:23.390837315 +0800] conn=4 op=6091 RESULT err=0 tag=101 nentries=1 etime=0.000276689
[08/Mar/2020:10:01:23.390906790 +0800] conn=4 op=6092 SRCH base="cn=ENMD.NET,cn=kerberos,dc=enmd,dc=net" scope=0 filter="(objectClass=krbticketpolicyaux)" attrs="krbMaxTicketLife krbMaxRenewableAge krbTicketFlags krbAuthIndMaxTicketLife krbAuthIndMaxRenewableAge"
[08/Mar/2020:10:01:23.391302403 +0800] conn=4 op=6092 RESULT err=0 tag=101 nentries=1 etime=0.000432879
[08/Mar/2020:10:01:23.392418974 +0800] conn=3351 op=1 BIND dn="" method=sasl version=3 mech=GSSAPI
[08/Mar/2020:10:01:25.953517485 +0800] conn=3352 fd=161 slot=161 connection from <masked>.152 to <masked>.165
[08/Mar/2020:10:01:27.007620375 +0800] conn=3353 fd=162 slot=162 connection from <masked>.154 to <masked>.165
[08/Mar/2020:10:01:27.151656148 +0800] conn=3354 fd=163 slot=163 connection from <masked>.150 to <masked>.165
[08/Mar/2020:10:01:27.559750675 +0800] conn=3355 fd=164 slot=164 connection from <masked>.153 to <masked>.165
[08/Mar/2020:10:01:39.015400434 +0800] conn=3356 fd=165 slot=165 connection from <masked>.154 to <masked>.165
[08/Mar/2020:10:01:51.582586229 +0800] conn=3357 fd=166 slot=166 connection from <masked>.153 to <masked>.165
[08/Mar/2020:10:01:52.513047687 +0800] conn=3358 fd=167 slot=167 connection from <masked>.150 to <masked>.165
[08/Mar/2020:10:01:53.573811317 +0800] conn=3359 fd=168 slot=168 connection from <masked>.152 to <masked>.165
[08/Mar/2020:10:02:44.012371005 +0800] conn=3360 fd=169 slot=169 connection from <masked>.160 to <masked>.165
[08/Mar/2020:10:02:44.419580574 +0800] conn=3361 fd=170 slot=170 connection from <masked>.151 to <masked>.165
[08/Mar/2020:10:02:45.548493596 +0800] conn=3362 fd=171 slot=171 connection from <masked>.153 to <masked>.165
[08/Mar/2020:10:02:50.018712852 +0800] conn=3363 fd=172 slot=172 connection from <masked>.160 to <masked>.165
[08/Mar/2020:10:02:51.081867407 +0800] conn=3364 fd=173 slot=173 connection from <masked>.152 to <masked>.165
[08/Mar/2020:10:03:04.062925765 +0800] conn=3365 fd=174 slot=174 connection from <masked>.154 to <masked>.165
[08/Mar/2020:10:03:06.223438080 +0800] conn=3366 fd=175 slot=175 connection from <masked>.150 to <masked>.165
[08/Mar/2020:10:03:10.063982993 +0800] conn=3367 fd=176 slot=176 connection from <masked>.154 to <masked>.165
[08/Mar/2020:10:03:52.027006125 +0800] conn=3368 fd=177 slot=177 connection from <masked>.153 to <masked>.165
[08/Mar/2020:10:03:57.005297121 +0800] conn=3369 fd=178 slot=178 connection from <masked>.152 to <masked>.165
[08/Mar/2020:10:04:01.001767909 +0800] conn=3370 fd=179 slot=179 connection from <masked>.150 to <masked>.165
[08/Mar/2020:10:04:08.003082421 +0800] conn=3371 fd=180 slot=180 connection from <masked>.154 to <masked>.165
[08/Mar/2020:10:04:12.014090964 +0800] conn=3372 fd=181 slot=181 connection from <masked>.151 to <masked>.165
[08/Mar/2020:10:04:18.140192092 +0800] conn=3373 fd=182 slot=182 connection from <masked>.166 to <masked>.165
[08/Mar/2020:10:04:20.007046774 +0800] conn=3374 fd=183 slot=183 connection from <masked>.154 to <masked>.165
[08/Mar/2020:10:04:24.040348027 +0800] conn=3375 fd=184 slot=184 connection from <masked>.160 to <masked>.165
[08/Mar/2020:10:04:30.139898749 +0800] conn=3376 fd=185 slot=185 connection from <masked>.160 to <masked>.165
[08/Mar/2020:10:05:22.043556910 +0800] conn=3377 fd=186 slot=186 connection from <masked>.160 to <masked>.165
[08/Mar/2020:10:05:34.140357676 +0800] conn=3378 fd=187 slot=187 connection from <masked>.160 to <masked>.165
[08/Mar/2020:10:05:36.006033007 +0800] conn=3379 fd=188 slot=188 connection from <masked>.165 to <masked>.165
[08/Mar/2020:10:06:07.002808000 +0800] conn=3380 fd=189 slot=189 connection from <masked>.150 to <masked>.165
[08/Mar/2020:10:06:12.043478717 +0800] conn=3381 fd=190 slot=190 connection from <masked>.152 to <masked>.165
[08/Mar/2020:10:06:15.007914045 +0800] conn=3382 fd=191 slot=191 connection from <masked>.153 to <masked>.165
[08/Mar/2020:10:06:17.005632290 +0800] conn=3383 fd=192 slot=192 connection from <masked>.154 to <masked>.165
[08/Mar/2020:10:06:19.016341572 +0800] conn=3384 fd=193 slot=193 connection from <masked>.165 to <masked>.165
[08/Mar/2020:10:06:23.007594584 +0800] conn=3385 fd=194 slot=194 connection from <masked>.154 to <masked>.165
[08/Mar/2020:10:06:27.026262632 +0800] conn=3386 fd=195 slot=195 connection from <masked>.165 to <masked>.165
[08/Mar/2020:10:06:30.031700186 +0800] conn=3387 fd=196 slot=196 SSL connection from <masked>.159 to <masked>.180
[08/Mar/2020:10:06:37.009611536 +0800] conn=3388 fd=197 slot=197 connection from <masked>.151 to <masked>.165
[08/Mar/2020:10:06:37.033108567 +0800] conn=3389 fd=198 slot=198 connection from <masked>.165 to <masked>.165
[08/Mar/2020:10:07:23.002813545 +0800] conn=3390 fd=199 slot=199 connection from <masked>.165 to <masked>.165
[08/Mar/2020:10:07:31.011795943 +0800] conn=3391 fd=200 slot=200 connection from <masked>.165 to <masked>.165
[08/Mar/2020:10:07:36.011894960 +0800] conn=3392 fd=201 slot=201 connection from <masked>.160 to <masked>.165
[08/Mar/2020:10:07:41.021108836 +0800] conn=3393 fd=202 slot=202 connection from <masked>.165 to <masked>.165
[08/Mar/2020:10:07:42.014874690 +0800] conn=3394 fd=203 slot=203 connection from <masked>.160 to <masked>.165
[08/Mar/2020:10:09:16.005883198 +0800] conn=3395 fd=204 slot=204 connection from <masked>.165 to <masked>.165
[08/Mar/2020:10:09:24.009940147 +0800] conn=3396 fd=205 slot=205 connection from <masked>.165 to <masked>.165
[08/Mar/2020:10:09:34.015154400 +0800] conn=3397 fd=206 slot=206 connection from <masked>.165 to <masked>.165
[08/Mar/2020:10:10:24.040398249 +0800] conn=3398 fd=207 slot=207 connection from <masked>.153 to <masked>.165
[08/Mar/2020:10:10:27.003675219 +0800] conn=3399 fd=208 slot=208 connection from <masked>.152 to <masked>.165
[08/Mar/2020:10:10:28.005336766 +0800] conn=3400 fd=209 slot=209 connection from <masked>.150 to <masked>.165
```
server1 error log
```
[08/Mar/2020:09:30:52.966764268 +0800] - ERR - NSMMReplicationPlugin - repl5_inc_waitfor_async_results - Timed out waiting for responses: 0 3074
[08/Mar/2020:09:32:53.684831136 +0800] - ERR - NSMMReplicationPlugin - release_replica - agmt="cn=meToipa2.enmd.net" (ipa2:389): Attempting to release replica, but unable to receive endReplication extended operation response from the replica. Error -5 (Timed out)
[08/Mar/2020:09:34:53.625806166 +0800] - WARN - NSMMReplicationPlugin - acquire_replica - agmt="cn=meToipa2.enmd.net" (ipa2:389): Unable to receive the response for a startReplication extended operation to consumer (Timed out). Will retry later.
[08/Mar/2020:09:36:56.570809366 +0800] - WARN - NSMMReplicationPlugin - acquire_replica - agmt="cn=meToipa2.enmd.net" (ipa2:389): Unable to receive the response for a startReplication extended operation to consumer (Timed out). Will retry later.
[08/Mar/2020:09:38:56.509924342 +0800] - WARN - NSMMReplicationPlugin - acquire_replica - agmt="cn=meToipa2.enmd.net" (ipa2:389): Unable to receive the response for a startReplication extended operation to consumer (Timed out). Will retry later.
[08/Mar/2020:09:40:59.458123866 +0800] - WARN - NSMMReplicationPlugin - acquire_replica - agmt="cn=meToipa2.enmd.net" (ipa2:389): Unable to receive the response for a startReplication extended operation to consumer (Timed out). Will retry later.
[08/Mar/2020:09:42:59.402931124 +0800] - WARN - NSMMReplicationPlugin - acquire_replica - agmt="cn=meToipa2.enmd.net" (ipa2:389): Unable to receive the response for a startReplication extended operation to consumer (Timed out). Will retry later.
[08/Mar/2020:09:45:02.343312876 +0800] - WARN - NSMMReplicationPlugin - acquire_replica - agmt="cn=meToipa2.enmd.net" (ipa2:389): Unable to receive the response for a startReplication extended operation to consumer (Timed out). Will retry later.
[08/Mar/2020:09:47:02.282487714 +0800] - WARN - NSMMReplicationPlugin - acquire_replica - agmt="cn=meToipa2.enmd.net" (ipa2:389): Unable to receive the response for a startReplication extended operation to consumer (Timed out). Will retry later.
[08/Mar/2020:09:49:05.220734403 +0800] - WARN - NSMMReplicationPlugin - acquire_replica - agmt="cn=meToipa2.enmd.net" (ipa2:389): Unable to receive the response for a startReplication extended operation to consumer (Timed out). Will retry later.
[08/Mar/2020:09:51:05.160565112 +0800] - WARN - NSMMReplicationPlugin - acquire_replica - agmt="cn=meToipa2.enmd.net" (ipa2:389): Unable to receive the response for a startReplication extended operation to consumer (Timed out). Will retry later.
[08/Mar/2020:09:53:08.105641621 +0800] - WARN - NSMMReplicationPlugin - acquire_replica - agmt="cn=meToipa2.enmd.net" (ipa2:389): Unable to receive the response for a startReplication extended operation to consumer (Timed out). Will retry later.
[08/Mar/2020:09:55:08.040503542 +0800] - WARN - NSMMReplicationPlugin - acquire_replica - agmt="cn=meToipa2.enmd.net" (ipa2:389): Unable to receive the response for a startReplication extended operation to consumer (Timed out). Will retry later.
[08/Mar/2020:09:57:11.997307120 +0800] - WARN - NSMMReplicationPlugin - acquire_replica - agmt="cn=meToipa2.enmd.net" (ipa2:389): Unable to receive the response for a startReplication extended operation to consumer (Timed out). Will retry later.
[08/Mar/2020:09:59:12.965695447 +0800] - WARN - NSMMReplicationPlugin - acquire_replica - agmt="cn=meToipa2.enmd.net" (ipa2:389): Unable to receive the response for a startReplication extended operation to consumer (Timed out). Will retry later.
[08/Mar/2020:10:01:15.903578926 +0800] - WARN - NSMMReplicationPlugin - acquire_replica - agmt="cn=meToipa2.enmd.net" (ipa2:389): Unable to receive the response for a startReplication extended operation to consumer (Timed out). Will retry later.
[08/Mar/2020:11:26:42.560167019 +0800] - INFO - slapd_extract_cert - CA CERT NAME: ENMD.NET IPA CA
[08/Mar/2020:11:26:42.567890161 +0800] - WARN - Security Initialization - SSL alert: Sending pin request to SVRCore. You may need to run systemd-tty-ask-password-agent to provide the password.
[08/Mar/2020:11:26:42.647668764 +0800] - INFO - slapd_extract_cert - SERVER CERT NAME: Server-Cert
[08/Mar/2020:11:26:42.722748631 +0800] - INFO - Security Initialization - SSL info: Enabling default cipher set.
[08/Mar/2020:11:26:42.726554182 +0800] - INFO - Security Initialization - SSL info: Configured NSS Ciphers
[08/Mar/2020:11:26:42.730304776 +0800] - INFO - Security Initialization - SSL info: TLS_AES_128_GCM_SHA256: enabled
[08/Mar/2020:11:26:42.733614343 +0800] - INFO - Security Initialization - SSL info: TLS_CHACHA20_POLY1305_SHA256: enabled
[08/Mar/2020:11:26:42.740389595 +0800] - INFO - Security Initialization - SSL info: TLS_AES_256_GCM_SHA384: enabled
[08/Mar/2020:11:26:42.743830864 +0800] - INFO - Security Initialization - SSL info: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: enabled
[08/Mar/2020:11:26:42.748868878 +0800] - INFO - Security Initialization - SSL info: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: enabled
[08/Mar/2020:11:26:42.762016895 +0800] - INFO - Security Initialization - SSL info: TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256: enabled
[08/Mar/2020:11:26:42.766962209 +0800] - INFO - Security Initialization - SSL info: TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256: enabled
[08/Mar/2020:11:26:42.779721887 +0800] - INFO - Security Initialization - SSL info: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: enabled
[08/Mar/2020:11:26:42.787619421 +0800] - INFO - Security Initialization - SSL info: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: enabled
[08/Mar/2020:11:26:42.795024632 +0800] - INFO - Security Initialization - SSL info: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: enabled
[08/Mar/2020:11:26:42.799027752 +0800] - INFO - Security Initialization - SSL info: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: enabled
[08/Mar/2020:11:26:42.802532993 +0800] - INFO - Security Initialization - SSL info: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: enabled
[08/Mar/2020:11:26:42.806279559 +0800] - INFO - Security Initialization - SSL info: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: enabled
```
2 years, 1 month