[Freeipa-users] krb5kdc will not start (kerberos authentication error)

Simo Sorce simo at redhat.com
Thu Nov 12 18:39:26 UTC 2015


On 10/11/15 11:54, Gronde, Christopher (Contractor) wrote:
> # ldapsearch -x -D 'cn=Directory Manager' -W -b cn=mapping,cn=sasl,cn=config
> Enter LDAP Password:
> # extended LDIF
> #
> # LDAPv3
> # base <cn=mapping,cn=sasl,cn=config> with scope subtree
> # filter: (objectclass=*)
> # requesting: ALL
> #
>
> # mapping, sasl, config
> dn: cn=mapping,cn=sasl,cn=config
> objectClass: top
> objectClass: nsContainer
> cn: mapping

It seem like you have mappings that shouldn't be there in EL6.
During ipa-server[replica]-install we explicitly replace all mappings 
with IPA ones, but it seem that something is wrong on your server and 
you have both the default DS mappings (which we usually remove at 
install time) and the IPA mappings.

You should have only:
cn=Full Principal,cn=mapping,cn=sasl,cn=config
cn=Name Only,cn=mapping,cn=sasl,cn=config

Please remove:
cn=Kerberos uid mapping,cn=mapping,cn=sasl,cn=config
cn=rfc 2829 dn syntax,cn=mapping,cn=sasl,cn=config
cn=rfc 2829 u syntax,cn=mapping,cn=sasl,cn=config
cn=uid mapping,cn=mapping,cn=sasl,cn=config

And your server will be able again to properly resolve sasl mappings.

HTH,
Simo.

> # Full Principal, mapping, sasl, config
> dn: cn=Full Principal,cn=mapping,cn=sasl,cn=config
> objectClass: top
> objectClass: nsSaslMapping
> nsSaslMapRegexString: \(.*\)@\(.*\)
> cn: Full Principal
> nsSaslMapBaseDNTemplate: dc=itmodev,dc=gov
> nsSaslMapFilterTemplate: (krbPrincipalName=\1@\2)
>
> # Kerberos uid mapping, mapping, sasl, config
> dn: cn=Kerberos uid mapping,cn=mapping,cn=sasl,cn=config
> objectClass: top
> objectClass: nsSaslMapping
> cn: Kerberos uid mapping
> nsSaslMapRegexString: \(.*\)@\(.*\)\.\(.*\)
> nsSaslMapBaseDNTemplate: dc=\2,dc=\3
> nsSaslMapFilterTemplate: (uid=\1)
>
> # Name Only, mapping, sasl, config
> dn: cn=Name Only,cn=mapping,cn=sasl,cn=config
> objectClass: top
> objectClass: nsSaslMapping
> nsSaslMapRegexString: ^[^:@]+$
> cn: Name Only
> nsSaslMapBaseDNTemplate: dc=itmodev,dc=gov
> nsSaslMapFilterTemplate: (krbPrincipalName=&@ITMODEV.GOV)
>
> # rfc 2829 dn syntax, mapping, sasl, config
> dn: cn=rfc 2829 dn syntax,cn=mapping,cn=sasl,cn=config
> objectClass: top
> objectClass: nsSaslMapping
> cn: rfc 2829 dn syntax
> nsSaslMapRegexString: ^dn:\(.*\)
> nsSaslMapBaseDNTemplate: \1
> nsSaslMapFilterTemplate: (objectclass=*)
>
> # rfc 2829 u syntax, mapping, sasl, config
> dn: cn=rfc 2829 u syntax,cn=mapping,cn=sasl,cn=config
> objectClass: top
> objectClass: nsSaslMapping
> cn: rfc 2829 u syntax
> nsSaslMapRegexString: ^u:\(.*\)
> nsSaslMapBaseDNTemplate: dc=itmodev,dc=gov
> nsSaslMapFilterTemplate: (uid=\1)
>
> # uid mapping, mapping, sasl, config
> dn: cn=uid mapping,cn=mapping,cn=sasl,cn=config
> objectClass: top
> objectClass: nsSaslMapping
> cn: uid mapping
> nsSaslMapRegexString: ^[^:@]+$
> nsSaslMapBaseDNTemplate: dc=itmodev,dc=gov
> nsSaslMapFilterTemplate: (uid=&)
>
> # search result
> search: 2
> result: 0 Success
>
> # numResponses: 8
> # numEntries: 7
> [root at comipa02 ~]#
>
> -----Original Message-----
> From: Rob Crittenden [mailto:rcritten at redhat.com]
> Sent: Tuesday, November 10, 2015 11:52 AM
> To: Gronde, Christopher (Contractor) <Christopher.Gronde at fincen.gov>; Ludwig Krispenz <lkrispen at redhat.com>; freeipa-users at redhat.com
> Subject: Re: [Freeipa-users] krb5kdc will not start (kerberos authentication error)
>
> Gronde, Christopher (Contractor) wrote:
>> This gave me a huge return!  Appears to be a long list of all the servers and applications whose users authenticate to the IPA servers.
>>
>> ldapsearch -x -h 172.16.100.161 -D "cn=directory manager" -W -b "dc=itmodev,dc=gov" '(objectclass=krbprincipal)'
>>
>>
>> # search result
>> search: 2
>> result: 0 Success
>>
>> # numResponses: 142
>> # numEntries: 141
>
> Right, we need to see the sasl mapping:
>
> $ ldapsearch -x -D 'cn=Directory Manager' -W -b cn=mapping,cn=sasl,cn=config
>
> rob
>
>>
>> -----Original Message-----
>> From: freeipa-users-bounces at redhat.com
>> [mailto:freeipa-users-bounces at redhat.com] On Behalf Of Ludwig Krispenz
>> Sent: Tuesday, November 10, 2015 11:37 AM
>> To: freeipa-users at redhat.com
>> Subject: Re: [Freeipa-users] krb5kdc will not start (kerberos
>> authentication error)
>>
>> what do you get if you search for "objectclass=krbprincipal" ?
>>
>> On 11/10/2015 05:27 PM, Rich Megginson wrote:
>>> On 11/10/2015 09:16 AM, Gronde, Christopher (Contractor) wrote:
>>>> Neither came back with anything
>>>>
>>>> # ldapsearch -x -h 172.16.100.161 -D "cn=directory manager" -W -b
>>>> "dc=itmodev,dc=gov" '(uid=ldap/comipa01.itmodev.gov)'
>>>> Enter LDAP Password:
>>>> # extended LDIF
>>>> #
>>>> # LDAPv3
>>>> # base <dc=itmodev,dc=gov> with scope subtree # filter:
>>>> (uid=ldap/comipa01.itmodev.gov) # requesting: ALL #
>>>>
>>>> # search result
>>>> search: 2
>>>> result: 0 Success
>>>>
>>>> # numResponses: 1
>>>> [root at comipa02 ~]# ldapsearch -x -h 172.16.100.161 -D "cn=directory
>>>> manager" -W -b "dc=itmodev,dc=gov" '(uid=ldap/*.gov)' uid Enter LDAP
>>>> Password:
>>>> # extended LDIF
>>>> #
>>>> # LDAPv3
>>>> # base <dc=itmodev,dc=gov> with scope subtree # filter:
>>>> (uid=ldap/*.gov) # requesting: uid #
>>>>
>>>> # search result
>>>> search: 2
>>>> result: 0 Success
>>>>
>>>> # numResponses: 1
>>>
>>> That means this server has no LDAP service principals?  I'm not sure
>>> how to recover IPA from this scenario.
>>>
>>>>
>>>> -----Original Message-----
>>>> From: freeipa-users-bounces at redhat.com
>>>> [mailto:freeipa-users-bounces at redhat.com] On Behalf Of Rich
>>>> Megginson
>>>> Sent: Tuesday, November 10, 2015 11:04 AM
>>>> To: freeipa-users at redhat.com
>>>> Subject: Re: [Freeipa-users] krb5kdc will not start (kerberos
>>>> authentication error)
>>>>
>>>> On 11/10/2015 08:18 AM, Gronde, Christopher (Contractor) wrote:
>>>>> Thank you!  I should have caught that...
>>>>>
>>>>> I changed the log level and then restarted dirsrv and attempted to
>>>>> start krb5kdc and got the following...
>>>> <snip>
>>>>
>>>> [10/Nov/2015:10:12:02 -0500] conn=5 fd=64 slot=64 connection from
>>>> 172.16.100.208 to 172.16.100.161
>>>> [10/Nov/2015:10:12:02 -0500] conn=5 op=0 BIND dn="" method=sasl
>>>> version=3 mech=GSSAPI
>>>> [10/Nov/2015:10:12:03 -0500] conn=5 op=0 RESULT err=14 tag=97
>>>> nentries=0 etime=1, SASL bind in progress
>>>> [10/Nov/2015:10:12:03 -0500] conn=5 op=1 BIND dn="" method=sasl
>>>> version=3 mech=GSSAPI
>>>> [10/Nov/2015:10:12:03 -0500] conn=5 op=1 RESULT err=14 tag=97
>>>> nentries=0 etime=0, SASL bind in progress
>>>> [10/Nov/2015:10:12:03 -0500] conn=5 op=2 BIND dn="" method=sasl
>>>> version=3 mech=GSSAPI
>>>> [10/Nov/2015:10:12:03 -0500] conn=Internal op=-1 SRCH
>>>> base="dc=itmodev,dc=gov" scope=2
>>>> filter="(uid=ldap/comipa01.itmodev.gov)" attrs=ALL
>>>> [10/Nov/2015:10:12:03 -0500] conn=Internal op=-1 RESULT err=0 tag=48
>>>> nentries=0 etime=0
>>>> [10/Nov/2015:10:12:03 -0500] conn=5 op=2 RESULT err=49 tag=97
>>>> nentries=0
>>>> etime=0
>>>> [10/Nov/2015:10:12:03 -0500] conn=5 op=3 UNBIND
>>>> [10/Nov/2015:10:12:03 -0500] conn=5 op=3 fd=64 closed - U1
>>>>
>>>> <snip>
>>>>
>>>> This is the SASL bind.  It thinks the principal in the Kerberos
>>>> credential is "ldap/comipa01.itmodev.gov", and the SASL map tells
>>>> the code to look for something with uid=ldap/comipa01.itmodev.gov
>>>> under dc=itmodev,dc=gov.  However, this entry is not found: RESULT
>>>> err=0
>>>> tag=48 nentries=0.  nentries=0 means no entries matched the search
>>>> criteria.
>>>>
>>>> You can do the search yourself with ldapsearch:
>>>>
>>>> ldapsearch -x -h 172.16.100.161 -D "cn=directory manager" -W -b
>>>> "dc=itmodev,dc=gov" '(uid=ldap/comipa01.itmodev.gov)'
>>>>
>>>> If you want to find out if there is some other ldap principal, do a
>>>> search like this:
>>>>
>>>> ldapsearch -x -h 172.16.100.161 -D "cn=directory manager" -W -b
>>>> "dc=itmodev,dc=gov" '(uid=ldap/*.gov)' uid
>>>>
>>>>>> Ran into an error trying to set that
>>>>>>
>>>>>> # ldapmodify -a -D "cn=directory manager" -W Enter LDAP Password:
>>>>>> dn: cn=config
>>>>>> changetype: modify
>>>>>> replace: nsslapd-acesslog-level
>>>>>> : 260
>>>>>>
>>>>>> modifying entry "cn=config"
>>>>>> ldap_modify: Server is unwilling to perform (53)
>>>>>>             additional info: Unknown attribute
>>>>>> nsslapd-acesslog-level will be ignored
>>>>>>
>>>>>> [root at comipa02 ~]# ldapmodify -a -D "cn=config" -W Enter LDAP
>>>>>> Password:
>>>>>> ldap_bind: Inappropriate authentication (48)
>>>>>>
>>>>>> -----Original Message-----
>>>>>> From: Ludwig Krispenz [mailto:lkrispen at redhat.com]
>>>>>> Sent: Tuesday, November 10, 2015 9:48 AM
>>>>>> To: Gronde, Christopher (Contractor)
>>>>>> <Christopher.Gronde at fincen.gov>
>>>>>> Cc: freeipa-users at redhat.com
>>>>>> Subject: Re: [Freeipa-users] krb5kdc will not start (kerberos
>>>>>> authentication error)
>>>>>>
>>>>>>
>>>>>> On 11/10/2015 03:32 PM, Gronde, Christopher (Contractor) wrote:
>>>>>>> How do I change that log setting? Is that done in LDAP?  Using
>>>>>>> ldapmodify?
>>>>>> yes,
>>>>>> ldapmodify ...
>>>>>> dn: cn=config
>>>>>> changetype: modify
>>>>>> replace: nsslapd-acesslog-level
>>>>>> nsslapd-acesslog-level: 260
>>>>>>> -----Original Message-----
>>>>>>> From: freeipa-users-bounces at redhat.com
>>>>>>> [mailto:freeipa-users-bounces at redhat.com] On Behalf Of Ludwig
>>>>>>> Krispenz
>>>>>>> Sent: Tuesday, November 10, 2015 9:03 AM
>>>>>>> To: freeipa-users at redhat.com
>>>>>>> Subject: Re: [Freeipa-users] krb5kdc will not start (kerberos
>>>>>>> authentication error)
>>>>>>>
>>>>>>>
>>>>>>> On 11/10/2015 02:40 PM, Alexander Bokovoy wrote:
>>>>>>>> On Tue, 10 Nov 2015, Gronde, Christopher (Contractor) wrote:
>>>>>>>>> Where can I verify or change the credentials it is trying to use?
>>>>>>>>> Is it my LDAP password?
>>>>>>>> No, according to your logs, it is your LDAP master trying to
>>>>>>>> replicate (push changes) to your LDAP replica:
>>>>>>>>>> [09/Nov/2015:15:02:01 -0500] conn=2 fd=64 slot=64 connection
>>>>>>>>>> from <MASTER_IP> to <REPLICA_IP>
>>>>>>>>>> [09/Nov/2015:15:02:01 -0500] conn=2 op=0 BIND dn=""
>>>>>>>>>> method=sasl
>>>>>>>>>> version=3 mech=GSSAPI
>>>>>>> err=49 could also be a result if the entry which is mapped from
>>>>>>> the principal is not found in the directory. A bit more info
>>>>>>> could be gained by enabling logging of internal searches.
>>>>>>> Set nsslapd-acesslog-level: 260
>>>>>>>
>>>>>>> and then look what internal searches are done during the gssapi
>>>>>>> authentication
>>>>>>>> If that is true, it would be ldap/<master> Kerberos principal
>>>>>>>> talking to ldap/<replica> Kerberos principal. If that fails, it
>>>>>>>> means master and replica KDCs have different understanding of
>>>>>>>> both ldap/<master> and ldap/<replica> keys which most likely
>>>>>>>> means keys were rotated on master and weren't propagated to replica.
>>>>>>>>
>>>>>>>> How to solve it? One possibility is to set master's hostname as
>>>>>>>> KDC address in krb5.conf on replica, forcing LDAP server on
>>>>>>>> replica to use master's KDC. I'm absolutely not sure this will
>>>>>>>> actually work but at least it allows to see if we are indeed
>>>>>>>> dealing with inconsistent state of service principals' keys.
>>>>>>>>
>>>>>>>>> -----Original Message-----
>>>>>>>>> From: Alexander Bokovoy [mailto:abokovoy at redhat.com]
>>>>>>>>> Sent: Tuesday, November 10, 2015 8:18 AM
>>>>>>>>> To: Gronde, Christopher (Contractor)
>>>>>>>>> <Christopher.Gronde at fincen.gov>
>>>>>>>>> Cc: Rob Crittenden <rcritten at redhat.com>;
>>>>>>>>> freeipa-users at redhat.com
>>>>>>>>> Subject: Re: [Freeipa-users] krb5kdc will not start (kerberos
>>>>>>>>> authentication error)
>>>>>>>>>
>>>>>>>>> On Tue, 10 Nov 2015, Gronde, Christopher (Contractor) wrote:
>>>>>>>>>> When I tried to start the service again I got no response from
>>>>>>>>>> tail of the log, but this is a repeating entry I see in the
>>>>>>>>>> access log
>>>>>>>>>>
>>>>>>>>>> [09/Nov/2015:15:01:04 -0500] conn=1 fd=64 slot=64 connection
>>>>>>>>>> from
>>>>>>>>>> 127.0.0.1 to 127.0.0.1
>>>>>>>>>> [09/Nov/2015:15:01:04 -0500] conn=1 op=-1 fd=64 closed - B1
>>>>>>>>>> [09/Nov/2015:15:02:01 -0500] conn=2 fd=64 slot=64 connection
>>>>>>>>>> from <MASTER_IP> to <REPLICA_IP>
>>>>>>>>>> [09/Nov/2015:15:02:01 -0500] conn=2 op=0 BIND dn=""
>>>>>>>>>> method=sasl
>>>>>>>>>> version=3 mech=GSSAPI
>>>>>>>>>> [09/Nov/2015:15:02:01 -0500] conn=2 op=0 RESULT err=14 tag=97
>>>>>>>>>> nentries=0 etime=0, SASL bind in progress
>>>>>>>>>> [09/Nov/2015:15:02:01 -0500] conn=2 op=1 BIND dn=""
>>>>>>>>>> method=sasl
>>>>>>>>>> version=3 mech=GSSAPI
>>>>>>>>>> [09/Nov/2015:15:02:01 -0500] conn=2 op=1 RESULT err=14 tag=97
>>>>>>>>>> nentries=0 etime=0, SASL bind in progress
>>>>>>>>>> [09/Nov/2015:15:02:01 -0500] conn=2 op=2 BIND dn=""
>>>>>>>>>> method=sasl
>>>>>>>>>> version=3 mech=GSSAPI
>>>>>>>>>> [09/Nov/2015:15:02:01 -0500] conn=2 op=2 RESULT err=49 tag=97
>>>>>>>>>> nentries=0 etime=0
>>>>>>>>>> [09/Nov/2015:15:02:01 -0500] conn=2 op=3 UNBIND
>>>>>>>>>> [09/Nov/2015:15:02:01 -0500] conn=2 op=3 fd=64 closed - U1
>>>>>>>>>>
>>>>>>>>>> Does anyone know what err=14 or err=49 are?
>>>>>>>>> err=14 means SASL bind in progress -- i.e. multi-round
>>>>>>>>> processing is ongoing. This is normal for SASL GSSAPI.
>>>>>>>>>
>>>>>>>>> err=49 is wrong password or username, i.e. credentials were
>>>>>>>>> incorrect.
>>>>>>>>> It may also mean that LDAP server side was unable to process
>>>>>>>>> Kerberos negotiation due to not having a current Kerberos
>>>>>>>>> ticket for own service
>>>>>>>>> (LDAP) and trying to request it from the Kerberos KDC but
>>>>>>>>> Kerberos KDC is down.
>>>>>>>>>
>>>>>>>>>> -----Original Message-----
>>>>>>>>>> From: Rob Crittenden [mailto:rcritten at redhat.com]
>>>>>>>>>> Sent: Monday, November 09, 2015 3:26 PM
>>>>>>>>>> To: Gronde, Christopher (Contractor)
>>>>>>>>>> <Christopher.Gronde at fincen.gov>; Alexander Bokovoy
>>>>>>>>>> <abokovoy at redhat.com>
>>>>>>>>>> Cc: freeipa-users at redhat.com
>>>>>>>>>> Subject: Re: [Freeipa-users] krb5kdc will not start (kerberos
>>>>>>>>>> authentication error)
>>>>>>>>>>
>>>>>>>>>> Gronde, Christopher (Contractor) wrote:
>>>>>>>>>>> Nothing bad came back and there is definitely data in the tree.
>>>>>>>>>> Ok, I guess I'd try to start the kdc again and then watch the
>>>>>>>>>> 389-ds access log (buffered) to:
>>>>>>>>>>
>>>>>>>>>> 1. See if it is binding at all 2. See what the search is and
>>>>>>>>>> what, if any, results were returned
>>>>>>>>>>
>>>>>>>>>> This would be in /var/log/dirsrv/slapd-YOUR_REALM/access
>>>>>>>>>>
>>>>>>>>>> rob
>>>>>>>>>>
>>>>>>>>>>> -----Original Message-----
>>>>>>>>>>> From: Rob Crittenden [mailto:rcritten at redhat.com]
>>>>>>>>>>> Sent: Monday, November 09, 2015 11:46 AM
>>>>>>>>>>> To: Gronde, Christopher (Contractor)
>>>>>>>>>>> <Christopher.Gronde at fincen.gov>; Alexander Bokovoy
>>>>>>>>>>> <abokovoy at redhat.com>
>>>>>>>>>>> Cc: freeipa-users at redhat.com
>>>>>>>>>>> Subject: Re: [Freeipa-users] krb5kdc will not start (kerberos
>>>>>>>>>>> authentication error)
>>>>>>>>>>>
>>>>>>>>>>> Gronde, Christopher (Contractor) wrote:
>>>>>>>>>>>> I restarted dirsrv and attempted to start krb5kdc and this
>>>>>>>>>>>> is what the error log shows
>>>>>>>>>>>>
>>>>>>>>>>>> # tail /var/log/dirsrv/slapd-ITMODEV-GOV/errors
>>>>>>>>>>>> [09/Nov/2015:11:01:02 -0500] - WARNING: userRoot: entry
>>>>>>>>>>>> cache size 10485760B is less than db size 28016640B; We
>>>>>>>>>>>> recommend to increase the entry cache size nsslapd-cachememsize.
>>>>>>>>>>>> [09/Nov/2015:11:01:02 -0500] - slapd started. Listening on
>>>>>>>>>>>> All Interfaces port 389 for LDAP requests
>>>>>>>>>>>> [09/Nov/2015:11:06:04 -0500] - slapd shutting down -
>>>>>>>>>>>> signaling operation threads
>>>>>>>>>>>> [09/Nov/2015:11:06:04 -0500] - slapd shutting down - closing
>>>>>>>>>>>> down internal subsystems and plugins
>>>>>>>>>>>> [09/Nov/2015:11:06:04 -0500] - Waiting for 4 database
>>>>>>>>>>>> threads to stop
>>>>>>>>>>>> [09/Nov/2015:11:06:04 -0500] - All database threads now
>>>>>>>>>>>> stopped
>>>>>>>>>>>> [09/Nov/2015:11:06:04 -0500] - slapd stopped.
>>>>>>>>>>>> [09/Nov/2015:11:14:20 -0500] - 389-Directory/1.2.11.15
>>>>>>>>>>>> B2015.247.1737 starting up
>>>>>>>>>>>> [09/Nov/2015:11:14:20 -0500] - WARNING: userRoot: entry
>>>>>>>>>>>> cache size 10485760B is less than db size 28016640B; We
>>>>>>>>>>>> recommend to increase the entry cache size nsslapd-cachememsize.
>>>>>>>>>>>> [09/Nov/2015:11:14:20 -0500] - slapd started. Listening on
>>>>>>>>>>>> All Interfaces port 389 for LDAP requests
>>>>>>>>>>> Ok, that's good.
>>>>>>>>>>>
>>>>>>>>>>> I'd do something like this to see what is in the db
>>>>>>>>>>> (substitute example.com with your domain):
>>>>>>>>>>>
>>>>>>>>>>> $ ldapsearch -x -D 'cn=Directory Manager' -W -s one -b
>>>>>>>>>>> cn=kerberos,dc=example,dc=com
>>>>>>>>>>>
>>>>>>>>>>> (don't post the output as it would include the kerberos
>>>>>>>>>>> master key).
>>>>>>>>>>>
>>>>>>>>>>> If that returns nothing that's bad.
>>>>>>>>>>>
>>>>>>>>>>> If it succeeds I'd broaden the search base a bit to see what
>>>>>>>>>>> data you do
>>>>>>>>>>> have:
>>>>>>>>>>>
>>>>>>>>>>> $ ldapsearch -x -D 'cn=Directory Manager' -W -b
>>>>>>>>>>> cn=groups,cn=accounts,dc=example,dc=com
>>>>>>>>>>>
>>>>>>>>>>> I picked groups because usually groups << users in numbers.
>>>>>>>>>>> This is just to see if you have data in the tree.
>>>>>>>>>>>
>>>>>>>>>>> Let us know if either or both turns up nothing.
>>>>>>>>>>>
>>>>>>>>>>> rob
>>>>>>>>>>>
>>>>>>>>>>>> -----Original Message-----
>>>>>>>>>>>> From: Alexander Bokovoy [mailto:abokovoy at redhat.com]
>>>>>>>>>>>> Sent: Monday, November 09, 2015 10:51 AM
>>>>>>>>>>>> To: Gronde, Christopher (Contractor)
>>>>>>>>>>>> <Christopher.Gronde at fincen.gov>
>>>>>>>>>>>> Cc: freeipa-users at redhat.com
>>>>>>>>>>>> Subject: Re: [Freeipa-users] krb5kdc will not start
>>>>>>>>>>>> (kerberos authentication error)
>>>>>>>>>>>>
>>>>>>>>>>>> On Mon, 09 Nov 2015, Gronde, Christopher (Contractor) wrote:
>>>>>>>>>>>>> Hello all!
>>>>>>>>>>>>>
>>>>>>>>>>>>> On my replica IPA server after fixing a cert issue that had
>>>>>>>>>>>>> been going on for sometime, I have all my certs figured out
>>>>>>>>>>>>> but the krb5kdc service will not start.
>>>>>>>>>>>>>
>>>>>>>>>>>>> # service krb5kdc start
>>>>>>>>>>>>> Starting Kerberos 5 KDC: krb5kdc: cannot initialize realm
>>>>>>>>>>>>> ITMODEV.GOV - see log file for details
>>>>>>>>>>>>> [FAILED]
>>>>>>>>>>>>>
>>>>>>>>>>>>> # cat /var/log/krb5kdc.log
>>>>>>>>>>>>> krb5kdc: Server error - while fetching master key K/M for
>>>>>>>>>>>>> realm ITMODEV.GOV
>>>>>>>>>>>>> krb5kdc: Server error - while fetching master key K/M for
>>>>>>>>>>>>> realm ITMODEV.GOV
>>>>>>>>>>>>> krb5kdc: Server error - while fetching master key K/M for
>>>>>>>>>>>>> realm ITMODEV.GOV
>>>>>>>>>>>>>
>>>>>>>>>>>>> I found this article online:
>>>>>>>>>>>>> http://research.imb.uq.edu.au/~l.rathbone/ldap/kerberos.sht
>>>>>>>>>>>>> m
>>>>>>>>>>>>> l
>>>>>>>>>>>>>
>>>>>>>>>>>>> Which stated it might be because The slave KDC does not
>>>>>>>>>>>>> have a stash file (.k5.EXAMPLE.COM). You need to create one.
>>>>>>>>>>>>> Tried the command
>>>>>>>>>>>>> listed:
>>>>>>>>>>>>>
>>>>>>>>>>>>> # kdb5_util stash
>>>>>>>>>>>>> kdb5_util: Server error while retrieving master entry
>>>>>>>>>>>>>
>>>>>>>>>>>>> No further information found on the proceeding error above
>>>>>>>>>>>>> for the kdb5_util command.
>>>>>>>>>>>>>
>>>>>>>>>>>>> Any thoughts?
>>>>>>>>>>>> First: don't use instructions which are not related to IPA,
>>>>>>>>>>>> please.
>>>>>>>>>>>>
>>>>>>>>>>>> FreeIPA has its own LDAP driver for KDC and instructions for
>>>>>>>>>>>> anything else do not apply here at all.
>>>>>>>>>>>>
>>>>>>>>>>>> If you see 'Server error - while fetching master key ..' it
>>>>>>>>>>>> means KDC LDAP driver was unable to contact LDAP server.
>>>>>>>>>>>> Does LDAP server work on the replica? What is in its error
>>>>>>>>>>>> log (/var/log/dirsrv/slapd-ITMODEV-GOV/errors)?
>>>>>>>>>>>>
>>>>>>>>>>>> --
>>>>>>>>>>>> / Alexander Bokovoy
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>> --
>>>>>>>>> / Alexander Bokovoy
>>>>>>>>>
>>>>>>> --
>>>>>>> Manage your subscription for the Freeipa-users mailing list:
>>>>>>> https://www.redhat.com/mailman/listinfo/freeipa-users
>>>>>>> Go to http://freeipa.org for more info on the project
>>>>>>>
>>>>>
>>>> --
>>>> Manage your subscription for the Freeipa-users mailing list:
>>>> https://www.redhat.com/mailman/listinfo/freeipa-users
>>>> Go to http://freeipa.org for more info on the project
>>>>
>>>
>>
>> --
>> Manage your subscription for the Freeipa-users mailing list:
>> https://www.redhat.com/mailman/listinfo/freeipa-users
>> Go to http://freeipa.org for more info on the project
>>
>>
>
>
>


-- 
Simo Sorce * Red Hat, Inc * New York




More information about the Freeipa-users mailing list