[Freeipa-users] gssapi sasl error - only picking up short hostname when running ipa-client-install (and failing)
Les Stott
Less at imagine-sw.com
Fri Nov 29 08:16:20 UTC 2013
Hi,
Recently installed freeipa on two servers in multi-master mode. We want to have a central authentication system for many hosts. Environment is RHEL 6.4 for servers, RHEL 6.1 for the first client host, standard rpm packages used - ipa-server-3.0.0-26.el6_4.4.x86_64 and ipa-client-3.0.0-37.el6.x86_64.
I am now trying to add the first linux host to freeipa via ipa-client-install.
When I run ipa-client-install on a host in debug mode it fails with errors below (I have changed hostnames and ip's, freeipa-1.mydomain.com 192.168.1.22 and freeipa-2.mydomain.com 192.168.1.23, host client - host1 192.168.1.15)
trying to retrieve CA cert via LDAP from ldap://freeipa-1.mydomain.com
get_ca_cert_from_ldap() error: Local error SASL(-1): generic failure: GSSAPI Error: Unspecified GSS failure. Minor code may provide more information (Server ldap/freeipa-1 at MYDOMAIN.COM not found in Kerberos database)
{'info': 'SASL(-1): generic failure: GSSAPI Error: Unspecified GSS failure. Minor code may provide more information (Server ldap/freeipa-1 at MYDOMAIN.COM not found in Kerberos database)', 'desc': 'Local error'}
The Kerberos logs on the server (free-ipa-1) show
Nov 29 01:46:14 freeipa-1.mydomain.com krb5kdc[1616](info): TGS_REQ (4 etypes {18 17 16 23}) 192.168.1.15: UNKNOWN_SERVER: authtime 0, admin@ MYDOMAIN.COM for HTTP/ freeipa-1 at MYDOMAIN.COM, Server not found in Kerberos database
The logs indicate that the service name is being used with the short hostname (HTTP/ freeipa-1 at MYDOMAIN.COM<mailto:freeipa-1 at MYDOMAIN.COM>). The FreeIPA server has records for HTTP/ freeipa-1.mydomain.com at MYDOMAIN.COM<mailto:freeipa-1.mydomain.com at MYDOMAIN.COM>. I can see these in the web interface. I believe this is where it is stumbling.
I've been banging my head against the wall on this one for a couple of days. Everything I've found says make sure you have working dns, make sure you can reverse lookup ip's, make sure hostnames are fqdn, make sure /etc/hosts on server has ip's for servers listed with fqdn first and shortname second. I've done all that.
I am using external dns (not integrated with freeipa), and have populated all records required as per sample config files provided during install. My time servers are other servers too, but that shouldn't matter, everything is in sync.
; for Kerberos Auto Discovery
; ldap servers
_ldap._tcp IN SRV 0 100 389 freeipa-1.mydomain.com.
_ldap._tcp IN SRV 0 100 389 freeipa-2.mydomain.com.
;kerberos realm
_kerberos IN TXT MYDOMAIN.COM
; kerberos servers
_kerberos._tcp IN SRV 0 100 88 freeipa-1.mydomain.com.
_kerberos._tcp IN SRV 0 100 88 freeipa-2.mydomain.com.
_kerberos._udp IN SRV 0 100 88 freeipa-1.mydomain.com.
_kerberos._ucp IN SRV 0 100 88 freeipa-2.mydomain.com.
_kerberos-master._tcp IN SRV 0 100 88 freeipa-1.mydomain.com.
_kerberos-master._tcp IN SRV 0 100 88 freeipa-2.mydomain.com.
_kerberos-master._udp IN SRV 0 100 88 freeipa-1.mydomain.com.
_kerberos-master._udp IN SRV 0 100 88 freeipa-2.mydomain.com.
_kpasswd._tcp IN SRV 0 100 464 freeipa-1.mydomain.com.
_kpasswd._tcp IN SRV 0 100 464 freeipa-2.mydomain.com.
_kpasswd._udp IN SRV 0 100 464 freeipa-1.mydomain.com.
_kpasswd._udp IN SRV 0 100 464 freeipa-2.mydomain.com.
;ntp server
_ntp._udp IN SRV 0 100 123 ntp1.mydomain.com.
_ntp._udp IN SRV 0 100 123 ntp2.mydomain.com.
Reverse dns entries are also available and both freeipa servers and the host I am trying to configure ipa-client on can do lookups and receive fqdn's. They can all do reverse lookups that resolve correctly.
I have read that when using SASL/GSSAPI (Kerberos) authentication, its possible that the service provider sets the principal name (SPN) to "ldap/servername" in the TGS_REQ based on a dns query of the PTR record. I do have PTR's configured, and they have FQDN's. Is it true that this happens with GSSAPI? If so how can I get around that?
Reverse Zone File for 192.168.1
22 PTR freeipa-1.mydomain.com.
23 PTR freeipa-2.mydomain.com.
Nslookup results for each IP:
22.1.168.192.in-addr.arpa name = freeipa-1.mydomain.com.
23.1.168.192.in-addr.arpa name = freeipa-2.mydomain.com.
I can authenticate using kinit before running the script and it still doesn't work.
The short version of running the install shows:
Discovery was successful!
Hostname: host1.mydomain.com
Realm: MYDOMAIN.COM
DNS Domain: mydomain.com
IPA Server: freeipa-1.mydomain.com
BaseDN: dc=mydomain,dc=com
It authenticates correctly with the admin user for enrolling the host, but joining the realm fails.
I've tried everything I can think of.
Please help.
Thanks,
Les
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://listman.redhat.com/archives/freeipa-users/attachments/20131129/38f5e8f3/attachment.htm>
More information about the Freeipa-users
mailing list