<div dir="ltr"><div><div>Was able to trace down the problem.  Since this system is within a PCI zone, I need high security, and followed instructions at <a href="https://access.redhat.com/articles/1467293">https://access.redhat.com/articles/1467293</a>, and disabled TLSv1.0.  Evidently, the NSS libraries on C6 do not support TLS versions higher than 1.0, because once I put TLSv1.0 back into the config, it worked again.<br><br></div>Thanks for the help!<br><br></div>Jeremy<br></div><div class="gmail_extra"><br><div class="gmail_quote">On Tue, Apr 5, 2016 at 5:36 PM, Rob Crittenden <span dir="ltr"><<a href="mailto:rcritten@redhat.com" target="_blank">rcritten@redhat.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Jeremy Utley wrote:<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><span class="">
Hello all!<br>
<br>
Is there any known issues with registering a CentOS 6 client with a<br>
CentOS 7 FreeIPA server?  I just tried to register my first C6 client<br>
(fully updated) with our new FreeIPA infrastructure installed on C7, and<br>
I'm getting an NSS error:<br>
<br></span>
args=/usr/sbin/ipa-join -s <a href="http://ds02.domain.com" rel="noreferrer" target="_blank">ds02.domain.com</a> <<a href="http://ds02.domain.com" rel="noreferrer" target="_blank">http://ds02.domain.com</a>> -b<span class=""><br>
dc=ipa,dc=domain,dc=com -d<br>
stdout=<br>
stderr=XML-RPC CALL:<br>
<br>
<?xml version="1.0" encoding="UTF-8"?>\r\n<br>
<methodCall>\r\n<br>
<methodName>join</methodName>\r\n<br>
<params>\r\n<br>
<param><value><array><data>\r\n<br>
<value><string><a href="http://hostname.domain.com" rel="noreferrer" target="_blank">hostname.domain.com</a><br></span>
<<a href="http://hostname.domain.com" rel="noreferrer" target="_blank">http://hostname.domain.com</a>></string></value>\r\n<span class=""><br>
</data></array></value></param>\r\n<br>
<param><value><struct>\r\n<br>
<member><name>nsosversion</name>\r\n<br>
<value><string>2.6.32-573.18.1.el6.x86_64</string></value></member>\r\n<br>
<member><name>nshardwareplatform</name>\r\n<br>
<value><string>x86_64</string></value></member>\r\n<br>
</struct></value></param>\r\n<br>
</params>\r\n<br>
</methodCall>\r\n<br>
<br></span>
* About to connect() to <a href="http://ds02.domain.com" rel="noreferrer" target="_blank">ds02.domain.com</a> <<a href="http://ds02.domain.com" rel="noreferrer" target="_blank">http://ds02.domain.com</a>> port<span class=""><br>
443 (#0)<br>
*   Trying 192.168.150.2... * Connected to <a href="http://ds02.domain.com" rel="noreferrer" target="_blank">ds02.domain.com</a><br></span>
<<a href="http://ds02.domain.com" rel="noreferrer" target="_blank">http://ds02.domain.com</a>> (192.168.150.2) port 443 (#0)<span class=""><br>
* Initializing NSS with certpath: sql:/etc/pki/nssdb<br>
*   CAfile: /etc/ipa/ca.crt<br>
   CApath: none<br>
* NSS error -12190<br>
* Closing connection #0<br>
libcurl failed to execute the HTTP POST transaction.  SSL connect error<br>
<br>
Looking up that NSS error, it seems to indicate a SSL protocol error.<br>
Looking at my FreeIPA webserver configuration, I'm allowing TLSv1.0,<br>
TLSv1.1, TLSv1.2:<br>
</span></blockquote>
<br>
Right, it is SSL_ERROR_PROTOCOL_VERSION_ALERT. Can you show the NSSProtocols from /etc/httpd/conf.d/nss.conf on the server?<br>
<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><span class="">
The oddest part is that, from the client, I can use wget to connect to<br>
the IPA server, but can not use curl:<br>
<br>
[root@hostname ~]# wget --no-check-certificate <a href="https://ds02.domain.com" rel="noreferrer" target="_blank">https://ds02.domain.com</a><br>
--2016-04-05 17:42:50-- <a href="https://ds02.domain.com/" rel="noreferrer" target="_blank">https://ds02.domain.com/</a><br>
Resolving ds02.domain.com... 192.168.150.2<br>
Connecting to <a href="http://ds02.domain.com" rel="noreferrer" target="_blank">ds02.domain.com</a><br></span>
<<a href="http://ds02.domain.com" rel="noreferrer" target="_blank">http://ds02.domain.com</a>>|192.168.150.2|:443... connected.<br>
WARNING: cannot verify <a href="http://ds02.domain.com" rel="noreferrer" target="_blank">ds02.domain.com</a> <<a href="http://ds02.domain.com" rel="noreferrer" target="_blank">http://ds02.domain.com</a>>’s<br>
certificate, issued by “/O=<a href="http://IPA.DOMAIN.COM/CN=Certificate" rel="noreferrer" target="_blank">IPA.DOMAIN.COM/CN=Certificate</a><br>
<<a href="http://IPA.DOMAIN.COM/CN=Certificate" rel="noreferrer" target="_blank">http://IPA.DOMAIN.COM/CN=Certificate</a>> Authority”:<span class=""><br>
   Self-signed certificate encountered.<br>
HTTP request sent, awaiting response... 301 Moved Permanently<br>
Location: <a href="https://ds02.domain.com/ipa/ui" rel="noreferrer" target="_blank">https://ds02.domain.com/ipa/ui</a> [following]<br>
<br>
<br>
[root@hostname ~]# curl -v -k <a href="https://ds02.domain.com/" rel="noreferrer" target="_blank">https://ds02.domain.com/</a><br></span>
* About to connect() to <a href="http://ds02.domain.com" rel="noreferrer" target="_blank">ds02.domain.com</a> <<a href="http://ds02.domain.com" rel="noreferrer" target="_blank">http://ds02.domain.com</a>> port<span class=""><br>
443 (#0)<br>
*   Trying 192.168.150.2... connected<br></span>
* Connected to <a href="http://ds02.domain.com" rel="noreferrer" target="_blank">ds02.domain.com</a> <<a href="http://ds02.domain.com" rel="noreferrer" target="_blank">http://ds02.domain.com</a>> (192.168.150.2)<span class=""><br>
port 443 (#0)<br>
* Initializing NSS with certpath: sql:/etc/pki/nssdb<br>
* warning: ignoring value of ssl.verifyhost<br>
* NSS error -12190<br>
* Closing connection #0<br>
* SSL connect error<br>
curl: (35) SSL connect error<br>
</span></blockquote>
<br>
They are linked against different crypto providers (OpenSSL and NSS)<span class=""><br>
<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
However, the same curl command, run from another C7 host, works just<br>
fine.  Something incompatible in the NSS libraries maybe?<br>
</blockquote>
<br></span>
It might be helpful to look at the output of:<br>
<br>
$ openssl s_client -host <a href="http://ds02.domain.com" rel="noreferrer" target="_blank">ds02.domain.com</a> -port 443<br>
<br>
To test all the protocols you can do a test with each: -tls1, -tls1_1 and -tls1_2<span class="HOEnZb"><font color="#888888"><br>
<br>
rob<br>
</font></span></blockquote></div><br></div>