<div dir="ltr"><div><div><div>Well Flo, the issue was IPV6 was disabled.  As soon as I enabled it again, added that /etc/hosts entry back, and rebooted the server, things are working again!<br><br></div>So is that now a requirement for 4.4.x?  Server worked fine on 4.2 without IPV6 enabled.  Or has that always been a requirement and I just got lucky somehow.  I'm looking through the docs now.<br><br>Regardless, thank you very much for the help Flo!<br></div><br></div>Jay<br></div><div class="gmail_extra"><br><div class="gmail_quote">On Tue, Dec 13, 2016 at 10:20 AM, Florence Blanc-Renaud <span dir="ltr"><<a href="mailto:flo@redhat.com" target="_blank">flo@redhat.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><span class="">On 12/13/2016 04:41 PM, jay wrote:<br>
</span><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><span class="">
Maybe this will help more, I noticed this error in the Apache logs<br>
<br>
[Tue Dec 13 09:33:37.<a href="tel:774921%202016" value="+17749212016" target="_blank">774921 2016</a>] [:error] [pid 2309] ipa: INFO:<br>
[jsonserver_kerb] <a href="mailto:admin@IPA.US-WEST-2.COMPUTE.IN">admin@IPA.US-WEST-2.COMPUTE.IN</a><wbr>TERNAL:<br>
cert_show/1(u'1', version=u'2.213'): CertificateOperationError<br>
[Tue Dec 13 09:35:29.141847 2016] [proxy:error] [pid 2316]<br>
(111)Connection refused: AH00957: AJP: attempt to connect to<br>
</span><a href="http://127.0.0.1:8009" rel="noreferrer" target="_blank">127.0.0.1:8009</a> <<a href="http://127.0.0.1:8009" rel="noreferrer" target="_blank">http://127.0.0.1:8009</a>> (localhost) failed<span class=""><br>
[Tue Dec 13 09:35:29.141881 2016] [proxy:error] [pid 2316] AH00959:<br>
ap_proxy_connect_backend disabling worker for (localhost) for 60s<br>
[Tue Dec 13 09:35:29.141900 2016] [proxy_ajp:error] [pid 2316] [client<br>
</span><a href="http://172.31.0.254:39646" rel="noreferrer" target="_blank">172.31.0.254:39646</a> <<a href="http://172.31.0.254:39646" rel="noreferrer" target="_blank">http://172.31.0.254:39646</a>>] AH00896: failed to make<span class=""><br>
connection to backend: localhost<br>
[Tue Dec 13 09:35:29.142412 2016] [:error] [pid 2310] ipa: ERROR:<br>
ra.get_certificate(): Unable to communicate with CMS (503)<br>
<br>
<br>
So whatever is running on port 8009 isn't responding or setup properly.<br>
<br>
Jay<br>
<br>
On Tue, Dec 13, 2016 at 8:46 AM, jay <<a href="mailto:titleistfour@gmail.com" target="_blank">titleistfour@gmail.com</a><br></span><div><div class="h5">
<mailto:<a href="mailto:titleistfour@gmail.com" target="_blank">titleistfour@gmail.com</a><wbr>>> wrote:<br>
<br>
    Thank you for the response Flo.  So I do see Apache running and<br>
    listening on port 443.  However, running that command I get a 503<br>
<br>
    *   Trying 172.31.0.254...<br>
    * Connected to ip-172-31-0-254.us-west-2.comp<wbr>ute.internal<br>
    (172.31.0.254) port 443 (#0)<br>
    * Initializing NSS with certpath: sql:/etc/httpd/alias<br>
    *   CAfile: /etc/pki/tls/certs/ca-bundle.c<wbr>rt<br>
      CApath: none<br>
    * SSL connection using TLS_ECDHE_RSA_WITH_AES_256_GCM<wbr>_SHA384<br>
    * Server certificate:<br>
    *       subject:<br>
    CN=ip-172-31-0-254.us-west-2.c<wbr>ompute.internal,O=IPA.US-WEST-<wbr>2.COMPUTE.INTERNAL<br>
    *       start date: Dec 13 14:33:16 2016 GMT<br>
    *       expire date: Dec 14 14:33:16 2018 GMT<br>
    *       common name: ip-172-31-0-254.us-west-2.comp<wbr>ute.internal<br>
    *       issuer: CN=Certificate<br>
    Authority,O=IPA.US-WEST-2.COMP<wbr>UTE.INTERNAL<br>
    > GET /ca/agent/ca/displayBySerial?s<wbr>erialNumber=1 HTTP/1.1<br>
    > User-Agent: curl/7.29.0<br>
    > Host: ip-172-31-0-254.us-west-2.comp<wbr>ute.internal<br>
    > Accept: */*<br>
    ><br>
    * NSS: using client certificate: ipaCert<br>
    *       subject: CN=IPA RA,O=<a href="http://IPA.US-WEST-2.COMPUTE.INT">IPA.US-WEST-2.COMPUTE.INT</a><wbr>ERNAL<br>
    *       start date: Dec 13 14:32:28 2016 GMT<br>
    *       expire date: Dec 03 14:32:28 2018 GMT<br>
    *       common name: IPA RA<br>
    *       issuer: CN=Certificate<br>
    Authority,O=IPA.US-WEST-2.COMP<wbr>UTE.INTERNAL<br>
    < HTTP/1.1 503 Service Unavailable<br>
    < Date: Tue, 13 Dec 2016 14:44:00 GMT<br>
    < Server: Apache<br>
    < Content-Length: 299<br>
    < Connection: close<br>
    < Content-Type: text/html; charset=iso-8859-1<br>
<br>
    [root@ip-172-31-0-254 ~]# cat out.html<br>
    <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><br>
    <html><head><br>
    <title>503 Service Unavailable</title><br>
    </head><body><br>
    <h1>Service Unavailable</h1><br>
    <p>The server is temporarily unable to service your<br>
    request due to maintenance downtime or capacity<br>
    problems. Please try again later.</p><br>
    </body></html><br>
    [root@ip-172-31-0-254 ~]#<br>
<br>
<br>
    What would cause the service to be unavailable?  Maybe the installer<br>
    changed and I need to provide another option now that I didn't have<br>
    to before the version upgrade?<br>
<br>
</div></div></blockquote>
Hi Jay,<br>
<br>
I am not completely familiar with Tomcat, but I understand so far that the httpd server is configured to redirect requests on displayBySerial to Tomcat with this setting in the file /etc/httpd/conf.d/ipa-pki-prox<wbr>y.conf:<br>
<br>
<LocationMatch "^/ca/agent/ca/displayBySerial<wbr>|^/ca/agent/ca/doRevoke|^/ca/<wbr>agent/ca/doUnrevoke|^/ca/<wbr>agent/ca/updateDomainXML|^/ca/<wbr>eeca/ca/profileSubmitSSLClient<wbr>|^/kra/agent/kra/connector"><br>
    NSSOptions +StdEnvVars +ExportCertData +StrictRequire +OptRenegotiate<br>
    NSSVerifyClient require<br>
    ProxyPassMatch ajp://localhost:8009<br>
    ProxyPassReverse ajp://localhost:8009<br>
</LocationMatch><br>
<br>
And this port must be configured in /etc/pki/pki-tomcat/server.xml<wbr>:<br>
    <Connector port="8009"<br>
            protocol="AJP/1.3"<br>
            redirectPort="8443"<br>
            address="::1" /><br>
<br>
In my setup I also have /etc/hosts defining localhost:<br>
127.0.0.1   localhost localhost.localdomain localhost4 localhost4.localdomain4<br>
::1         localhost localhost.localdomain localhost6 localhost6.localdomain6<br>
<br>
<br>
Can you check that you also have those settings? If yes, then I assume that Tomcat is not able to create the AJP connector on port 8009.<br>
When PKI is started, you should find a trace of the connector initialization in /var/log/pki/pki-tomcat/catali<wbr>na.$DATE.log:<br>
<br>
12-Dec-2016 13:54:17.579 INFO [main] org.apache.coyote.AbstractProt<wbr>ocol.init Initializing ProtocolHandler ["ajp-nio-0:0:0:0:0:0:0:1-8009<wbr>"]<br>
12-Dec-2016 13:54:25.076 INFO [main] org.apache.coyote.AbstractProt<wbr>ocol.start Starting ProtocolHandler ["ajp-nio-0:0:0:0:0:0:0:1-8009<wbr>"]<br>
12-Dec-2016 13:56:33.683 INFO [ajp-nio-0:0:0:0:0:0:0:1-8009-<wbr>exec-1] org.jboss.resteasy.plugins.ser<wbr>ver.servlet.ServletContainerDi<wbr>spatcher.processApplication RESTEASY002225: Deploying javax.ws.rs.core.Application: class org.dogtagpki.server.ca.rest.C<wbr>AApplication<br>
<br>
Next steps to debug would be to increase Tomcat logs.<br>
Flo.<br>
<br>
<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><span class="">
    Thanks,<br>
    Jay<br>
<br>
    On Tue, Dec 13, 2016 at 1:56 AM, Florence Blanc-Renaud<br></span><div><div class="h5">
    <<a href="mailto:flo@redhat.com" target="_blank">flo@redhat.com</a> <mailto:<a href="mailto:flo@redhat.com" target="_blank">flo@redhat.com</a>>> wrote:<br>
<br>
        On 12/12/2016 10:32 PM, jay wrote:<br>
<br>
            Hello,<br>
<br>
            I have been testing freeipa on CentOS 7 for a while now with a<br>
            relatively simple setup, just a single server and 12 or so<br>
            Linux clients<br>
            in AWS.  I went to rebuild the environment today and part of<br>
            my Ansible<br>
            playbook failed with this error<br>
<br>
            ipa: ERROR: Certificate operation cannot be completed: Unable to<br>
            communicate with CMS (503)<br>
<br>
            This is the command that failed<br>
<br>
            /usr/bin/ipa cert-show 1 --out=/root/cacert.crt<br>
<br>
            I noticed the version I was using on Friday was<br>
            ipa-server-4.2.0-15.0.1.el7.ce<wbr>ntos.19.x86_64.  But now I'm<br>
            getting<br>
            ipa-server-4.4.0-14.el7.centos<wbr>.x86_64 installed, so the repo<br>
            was updated<br>
            over the weekend.<br>
<br>
            Is there a known issue running cert-show with this version?<br>
            I can't<br>
            find anything in the debug logs that point to something<br>
            wrong.  Running<br>
            'ipa cert-find' and 'getcert list -d /etc/httpd/alias -n<br>
            ipaCert' work<br>
            just fine.<br>
<br>
            Can someone offer some advice or pointer to what might be<br>
            going on?  I'm<br>
            invoking the install with these options and it has worked<br>
            flawlessly<br>
            before this new version<br>
<br>
            2016-12-12T21:05:21Z DEBUG ipa-server-install was invoked<br>
            with arguments<br>
            [] and options: {'no_dns_<br>
            sshfp': None, 'ignore_topology_disconnect': None, 'verbose':<br>
            False,<br>
            'ip_addresses': [CheckedIPAddr<br>
            ess('172.31.0.235')], 'domainlevel': None, 'mkhomedir': None,<br>
            'http_cert_files': None, 'no_ntp': N<br>
            one, 'reverse_zones': None, 'no_forwarders': None,<br>
            'external_ca_type':<br>
            None, 'ssh_trust_dns': True<br>
            , 'domain_name': 'ipa.us-west-2.compute.interna<wbr>l', 'idmax':<br>
            None,<br>
            'http_cert_name': None, 'dirsrv_<br>
            cert_files': None, 'no_dnssec_validation': None,<br>
            'ca_signing_algorithm':<br>
            None, 'no_reverse': None,<br>
             'subject': None, 'unattended': True, 'auto_reverse': None,<br>
            'auto_forwarders': None, 'no_host_dns'<br>
            : None, 'no_sshd': None, 'no_ui_redirect': None,<br>
            'ignore_last_of_role':<br>
            None, 'realm_name': 'IPA.U<br>
            S-WEST-2.COMPUTE.INTERNAL', 'forwarders':<br>
            [CheckedIPAddress('172.31.0.2'<wbr>)], 'idstart': 5000, 'exte<br>
            rnal_ca': None, 'no_ssh': None, 'external_cert_files': None,<br>
            'no_hbac_allow': None, 'forward_polic<br>
            y': None, 'dirsrv_cert_name': None, 'ca_cert_files': None,<br>
            'zonemgr':<br>
            None, 'quiet': False, 'setup<br>
            _dns': True, 'host_name': '<a href="http://ip-172-31-0-235.us-west-2.com" rel="noreferrer" target="_blank">ip-172-31-0-235.us-west-2.com</a><br></div></div>
            <<a href="http://ip-172-31-0-235.us-west-2.com" rel="noreferrer" target="_blank">http://ip-172-31-0-235.us-wes<wbr>t-2.com</a>>pute.internal',<span class=""><br>
            'dirsrv_config_file': None<br>
            , 'log_file': None, 'allow_zone_overlap': None, 'uninstall':<br>
            False}<br>
            2016-12-12T21:05:21Z DEBUG IPA version 4.4.0-14.el7.centos<br>
<br>
            Thank you<br>
            Jay<br>
<br>
<br>
<br>
        Hi,<br>
<br>
        the ipa cert-show command is communicating with Dogtag, using<br>
        port 443. Can you check if Dogtag is properly responding on this<br>
        port?<br>
<br>
        $ SSL_DIR=/etc/httpd/alias/ curl -v -E ipaCert:`cat<br>
        /etc/httpd/alias/pwdfile.txt`<br>
        <a href="https://hostname.domainname:443/ca/agent/ca/displayBySerial?serialNumber=1" rel="noreferrer" target="_blank">https://hostname.domainname:44<wbr>3/ca/agent/ca/displayBySerial?<wbr>serialNumber=1</a><br>
        <<a href="https://hostname.domainname:443/ca/agent/ca/displayBySerial?serialNumber=1" rel="noreferrer" target="_blank">https://hostname.domainname:4<wbr>43/ca/agent/ca/displayBySerial<wbr>?serialNumber=1</a>><br>
        -o out.html<br>
<br>
        The issue can be that Dogtag is down, or a SSL issue (the<br>
        certificate ipaCert in /etc/httpd/alias is used to authenticate<br>
        the client to Dogtag).<br>
<br>
        HTH,<br>
        Flo.<br>
<br>
<br>
<br>
<br>
<br>
</span></blockquote>
<br>
</blockquote></div><br></div>