<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 TRANSITIONAL//EN">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<meta name="GENERATOR" content="GtkHTML/4.6.5">
</head>
<body>
On Fri, 2013-07-26 at 06:21 -0400, Eduardo Minguez wrote:
<blockquote type="CITE"><br>
<br>
<hr align="center">
<br>
<blockquote><b><font color="#000000">From: </font></b><font color="#000000">"Dmitri Pal" <dpal@redhat.com></font><br>
<b><font color="#000000">To: </font></b><font color="#000000">freeipa-users@redhat.com</font><br>
<b><font color="#000000">Sent: </font></b><font color="#000000">Thursday, 25 July, 2013 11:35:32 PM</font><br>
<b><font color="#000000">Subject: </font></b><font color="#000000">Re: [Freeipa-users] still failing to get a RHEL 5 client to join, LDAP bind issue?</font><br>
<br>
<font color="#000000">On 07/25/2013 03:51 PM, Armstrong, Kenneth Lawrence wrote: </font>
<br>
<blockquote><font color="#000000">I am still having issues trying to get a RHEL 5.9 client to join a RHEL 6.4 IdM domain.</font><br>
<br>
<font color="#000000">All packages on both systems updated.</font><br>
<br>
<font color="#000000">First problem is this:</font><br>
<br>
<font color="#000000">ipa-client-install --server lnxrealmtest01.liberty.edu --domain lnxrealmtest.liberty.edu --enable-dns-updates</font><br>
<br>
<font color="#000000">Which fails with:</font><br>
<br>
<font color="#000000">root : ERROR Cannot obtain CA certificate</font><br>
<font color="#000000">'ldap://lnxrealmtest01.liberty.edu' doesn't have a certificate.</font><br>
<font color="#000000">Installation failed. Rolling back changes.</font><br>
<font color="#000000">IPA client is not configured on this system.</font><br>
<br>
<font color="#000000">All of the appropriate ports are open on the IdM server, and I verified this by telnetting to all of them.</font><br>
<br>
<font color="#000000">I worked around this by running this:</font><br>
<br>
<font color="#000000">wget -O /etc/ipa/ca.crt <a href="http://lnxrealmtest01.liberty.edu/ipa/config/ca.crt">
http://lnxrealmtest01.liberty.edu/ipa/config/ca.crt</a></font><br>
<br>
<font color="#000000">Then ran:</font><br>
<br>
<font color="#000000">ipa-client-install --server lnxrealmtest01.lnxrealmtest.liberty.edu --domain lnxrealmtest.liberty.edu --enable-dns-updates --no-ntp --ca-cert-file=/etc/ipa/ca.crt</font><br>
<br>
<font color="#000000">And I was having better results, so apparently the RHEL 5.9 ipa-client-install does not want to download my cert.</font><br>
</blockquote>
<br>
<font color="#000000">This rings the bell. It sounds like a known issue for 5.9 openssl libraries.</font><br>
<font color="#000000">Rob can you add details please?</font><br>
<br>
<blockquote><br>
<br>
<font color="#000000">On to the next problem:</font><br>
<br>
<br>
<font color="#000000">User authorized to enroll computers: admin</font><br>
<font color="#000000">Synchronizing time with KDC...</font><br>
<font color="#000000">Password for <a href="mailto:admin@LNXREALMTEST.LIBERTY.EDU">
admin@LNXREALMTEST.LIBERTY.EDU</a>: </font><br>
<br>
<font color="#000000">Joining realm failed: SASL Bind failed Local error (-2) !</font><br>
<font color="#000000">child exited with 9</font><br>
<font color="#000000">Installation failed. Rolling back changes.</font><br>
<br>
</blockquote>
<br>
</blockquote>
<font color="#000000">Run ipa-client-install with "-d" debug flag to get more information. I've had the same issue due to DNS reverse for the server not being correct (check the krb log in the server)</font><br>
<br>
<blockquote>
<blockquote><br>
<font color="#000000">It is the same user that I use to login to the web interface, and I am 100% positive that I am not entering the password incorrectly. So why else would the admin user not be able to bind to my IdM setup?</font><br>
<br>
<font color="#000000">-Kenny </font><br>
<br>
<pre>
<font color="#000000">_______________________________________________</font>
<font color="#000000">Freeipa-users mailing list</font>
<font color="#000000"><a href="mailto:Freeipa-users@redhat.com">Freeipa-users@redhat.com</a></font>
<font color="#000000"><a href="https://www.redhat.com/mailman/listinfo/freeipa-users">https://www.redhat.com/mailman/listinfo/freeipa-users</a></font>
</pre>
</blockquote>
<br>
<br>
<pre>
<font color="#000000">-- </font>
<font color="#000000">Thank you,</font>
<font color="#000000">Dmitri Pal</font>
<font color="#000000">Sr. Engineering Manager for IdM portfolio</font>
<font color="#000000">Red Hat Inc.</font>
<font color="#000000">-------------------------------</font>
<font color="#000000">Looking to carve out IT costs?</font>
<font color="#000000"><a href="http://www.redhat.com/carveoutcosts/">www.redhat.com/carveoutcosts/</a></font>
</pre>
<br>
<font color="#000000">_______________________________________________</font><br>
<font color="#000000">Freeipa-users mailing list</font><br>
<font color="#000000">Freeipa-users@redhat.com</font><br>
<font color="#000000">https://www.redhat.com/mailman/listinfo/freeipa-users</font><br>
</blockquote>
<br>
<br>
<br>
<font color="#000000">-- </font></blockquote>
<blockquote type="CITE"><font color="#000000">Eduardo Mínguez Pérez</font><br>
<font color="#000000">Infrastructure Consultant (RHCE, RHCSA)</font><br>
<font color="#000000">Red Hat - Spain</font><br>
<font color="#000000">Mobile: +34 629803049 (CET/CEST)</font><br>
<font color="#000000">E-mail: eminguez@redhat.com</font><br>
<br>
<br>
</blockquote>
<blockquote type="CITE">
<pre>
_______________________________________________
Freeipa-users mailing list
<a href="mailto:Freeipa-users@redhat.com">Freeipa-users@redhat.com</a>
<a href="https://www.redhat.com/mailman/listinfo/freeipa-users">https://www.redhat.com/mailman/listinfo/freeipa-users</a>
</pre>
</blockquote>
<br>
Ok, if I have time, I'll try with a RHEL 5.8 client today.<br>
<br>
<br>
As for debug output, this is what I get:<br>
<br>
[<a href="mailto:root@r5-idmclient">root@r5-idmclient</a> ~]# ipa-client-install --server lnxrealmtest01.liberty.edu --domain lnxrealmtest.liberty.edu --enable-dns-updates --no-ntp --ca-cert-file=/etc/ipa/ca.crt -d<br>
root : DEBUG /usr/sbin/ipa-client-install was invoked with options: {'conf_ntp': False, 'domain': 'lnxrealmtest.liberty.edu', 'uninstall': False, 'force': False, 'sssd': True, 'krb5_offline_passwords': True, 'hostname': None, 'permit': False, 'server':
'lnxrealmtest01.liberty.edu', 'prompt_password': False, 'mkhomedir': False, 'dns_updates': True, 'preserve_sssd': False, 'debug': True, 'on_master': False, 'ca_cert_file': '/etc/ipa/ca.crt', 'realm_name': None, 'unattended': None, 'ntp_server': None, 'principal':
None}<br>
root : DEBUG missing options might be asked for interactively later<br>
<br>
root : DEBUG Loading Index file from '/var/lib/ipa-client/sysrestore/sysrestore.index'<br>
root : DEBUG Loading StateFile from '/var/lib/ipa-client/sysrestore/sysrestore.state'<br>
root : DEBUG [ipadnssearchkrb]<br>
root : DEBUG [ipacheckldap]<br>
root : DEBUG Init ldap with: ldap://lnxrealmtest01.liberty.edu:389<br>
root : ERROR LDAP Error: Connect error: TLS: hostname does not match CN in peer certificate<br>
root : DEBUG will use domain: lnxrealmtest.liberty.edu<br>
<br>
root : DEBUG will use server: lnxrealmtest01.liberty.edu<br>
<br>
Failed to verify that lnxrealmtest01.liberty.edu is an IPA Server.<br>
This may mean that the remote server is not up or is not reachable<br>
due to network or firewall settings.<br>
Installation failed. Rolling back changes.<br>
IPA client is not configured on this system.<br>
<br>
<br>
I do have an A record and PTR record for both lnxrealmtest01.liberty.edu and lnxrealmtest.lnxrealmtest.liberty.edu.<br>
<br>
The part that confuses me (I'm still new to the innards of SSL) is this:<br>
<br>
DAP Error: Connect error: TLS: hostname does not match CN in peer certificate<br>
<br>
When I look at the cert using:<br>
<br>
openssl x509 -in /etc/ipa/ca.crt -noout -text<br>
<br>
I see this:<br>
<br>
Issuer: O=LNXREALMTEST.LIBERTY.EDU, CN=Certificate Authority<br>
Validity<br>
Not Before: Jul 25 18:22:53 2013 GMT<br>
Not After : Jul 25 18:22:53 2033 GMT<br>
Subject: O=LNXREALMTEST.LIBERTY.EDU, CN=Certificate Authority<br>
<br>
<br>
and ...<br>
<br>
OCSP - URI:<a href="http://lnxrealmtest01.lnxrealmtest.liberty.edu:80/ca/ocsp">http://lnxrealmtest01.lnxrealmtest.liberty.edu:80/ca/ocsp</a><br>
<br>
<br>
So is it trying to use CN=Certificate Authority when it's expecting the host name of the IPA server?<br>
<br>
-Kenny
</body>
</html>