[Freeipa-users] Centos 7 IPA server, Centos 6 Clients

Rob Crittenden rcritten at redhat.com
Tue Apr 5 22:36:19 UTC 2016


Jeremy Utley wrote:
> Hello all!
>
> Is there any known issues with registering a CentOS 6 client with a
> CentOS 7 FreeIPA server?  I just tried to register my first C6 client
> (fully updated) with our new FreeIPA infrastructure installed on C7, and
> I'm getting an NSS error:
>
> args=/usr/sbin/ipa-join -s ds02.domain.com <http://ds02.domain.com> -b
> dc=ipa,dc=domain,dc=com -d
> stdout=
> stderr=XML-RPC CALL:
>
> <?xml version="1.0" encoding="UTF-8"?>\r\n
> <methodCall>\r\n
> <methodName>join</methodName>\r\n
> <params>\r\n
> <param><value><array><data>\r\n
> <value><string>hostname.domain.com
> <http://hostname.domain.com></string></value>\r\n
> </data></array></value></param>\r\n
> <param><value><struct>\r\n
> <member><name>nsosversion</name>\r\n
> <value><string>2.6.32-573.18.1.el6.x86_64</string></value></member>\r\n
> <member><name>nshardwareplatform</name>\r\n
> <value><string>x86_64</string></value></member>\r\n
> </struct></value></param>\r\n
> </params>\r\n
> </methodCall>\r\n
>
> * About to connect() to ds02.domain.com <http://ds02.domain.com> port
> 443 (#0)
> *   Trying 192.168.150.2... * Connected to ds02.domain.com
> <http://ds02.domain.com> (192.168.150.2) port 443 (#0)
> * Initializing NSS with certpath: sql:/etc/pki/nssdb
> *   CAfile: /etc/ipa/ca.crt
>    CApath: none
> * NSS error -12190
> * Closing connection #0
> libcurl failed to execute the HTTP POST transaction.  SSL connect error
>
> Looking up that NSS error, it seems to indicate a SSL protocol error.
> Looking at my FreeIPA webserver configuration, I'm allowing TLSv1.0,
> TLSv1.1, TLSv1.2:

Right, it is SSL_ERROR_PROTOCOL_VERSION_ALERT. Can you show the 
NSSProtocols from /etc/httpd/conf.d/nss.conf on the server?

> The oddest part is that, from the client, I can use wget to connect to
> the IPA server, but can not use curl:
>
> [root at hostname ~]# wget --no-check-certificate https://ds02.domain.com
> --2016-04-05 17:42:50-- https://ds02.domain.com/
> Resolving ds02.domain.com... 192.168.150.2
> Connecting to ds02.domain.com
> <http://ds02.domain.com>|192.168.150.2|:443... connected.
> WARNING: cannot verify ds02.domain.com <http://ds02.domain.com>’s
> certificate, issued by “/O=IPA.DOMAIN.COM/CN=Certificate
> <http://IPA.DOMAIN.COM/CN=Certificate> Authority”:
>    Self-signed certificate encountered.
> HTTP request sent, awaiting response... 301 Moved Permanently
> Location: https://ds02.domain.com/ipa/ui [following]
>
>
> [root at hostname ~]# curl -v -k https://ds02.domain.com/
> * About to connect() to ds02.domain.com <http://ds02.domain.com> port
> 443 (#0)
> *   Trying 192.168.150.2... connected
> * Connected to ds02.domain.com <http://ds02.domain.com> (192.168.150.2)
> port 443 (#0)
> * Initializing NSS with certpath: sql:/etc/pki/nssdb
> * warning: ignoring value of ssl.verifyhost
> * NSS error -12190
> * Closing connection #0
> * SSL connect error
> curl: (35) SSL connect error

They are linked against different crypto providers (OpenSSL and NSS)

> However, the same curl command, run from another C7 host, works just
> fine.  Something incompatible in the NSS libraries maybe?

It might be helpful to look at the output of:

$ openssl s_client -host ds02.domain.com -port 443

To test all the protocols you can do a test with each: -tls1, -tls1_1 
and -tls1_2

rob




More information about the Freeipa-users mailing list