<div dir="ltr"><div><div><div><div>Sorry for the typo. here is the correct output:<br>ldapsearch -h <a href="http://id-management-1.internal.emerlyn.com">id-management-1.internal.emerlyn.com</a><br>SASL/EXTERNAL authentication started<br>ldap_sasl_interactive_bind_s: Unknown authentication method (-6)<br> additional info: SASL(-4): no mechanism available:<br><br><br><br><br>When I look at the certificates I get errors regarding a host service in the keytab. Here is the output:<br><br>[root@id-management-1 ca]# getcert list<br>Number of certificates and requests being tracked: 8.<br>Request ID '20150116161829':<br> status: MONITORING<br> ca-error: Error setting up ccache for "host" service on client using default keytab: Keytab contains no suitable keys for host/<a href="mailto:id-management-1.internal.emerlyn.com@INTERNAL.EMERLYN.COM">id-management-1.internal.emerlyn.com@INTERNAL.EMERLYN.COM</a>.<br> stuck: no<br> key pair storage: type=NSSDB,location='/etc/dirsrv/slapd-INTERNAL-EMERLYN-COM',nickname='Server-Cert',token='NSS Certificate DB',pinfile='/etc/dirsrv/slapd-INTERNAL-EMERLYN-COM/pwdfile.txt'<br> certificate: type=NSSDB,location='/etc/dirsrv/slapd-INTERNAL-EMERLYN-COM',nickname='Server-Cert',token='NSS Certificate DB'<br> CA: IPA<br> issuer: CN=Certificate Authority,O=<a href="http://INTERNAL.EMERLYN.COM">INTERNAL.EMERLYN.COM</a><br> subject: CN=<a href="http://id-management-1.internal.emerlyn.com">id-management-1.internal.emerlyn.com</a>,O=<a href="http://INTERNAL.EMERLYN.COM">INTERNAL.EMERLYN.COM</a><br> expires: 2017-01-16 16:18:29 UTC<br> key usage: digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment<br> eku: id-kp-serverAuth,id-kp-clientAuth<br> pre-save command:<br> post-save command: /usr/lib64/ipa/certmonger/restart_dirsrv INTERNAL-EMERLYN-COM<br> track: yes<br> auto-renew: yes<br>Request ID '20150116162120':<br> status: MONITORING<br> ca-error: Error setting up ccache for "host" service on client using default keytab: Keytab contains no suitable keys for host/<a href="mailto:id-management-1.internal.emerlyn.com@INTERNAL.EMERLYN.COM">id-management-1.internal.emerlyn.com@INTERNAL.EMERLYN.COM</a>.<br> stuck: no<br> key pair storage: type=NSSDB,location='/etc/httpd/alias',nickname='Server-Cert',token='NSS Certificate DB',pinfile='/etc/httpd/alias/pwdfile.txt'<br> certificate: type=NSSDB,location='/etc/httpd/alias',nickname='Server-Cert',token='NSS Certificate DB'<br> CA: IPA<br> issuer: CN=Certificate Authority,O=<a href="http://INTERNAL.EMERLYN.COM">INTERNAL.EMERLYN.COM</a><br> subject: CN=<a href="http://id-management-1.internal.emerlyn.com">id-management-1.internal.emerlyn.com</a>,O=<a href="http://INTERNAL.EMERLYN.COM">INTERNAL.EMERLYN.COM</a><br> expires: 2017-01-16 16:21:20 UTC<br> key usage: digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment<br> eku: id-kp-serverAuth,id-kp-clientAuth<br> pre-save command:<br> post-save command: /usr/lib64/ipa/certmonger/restart_httpd<br> track: yes<br> auto-renew: yes<br>Request ID '20151217174142':<br> status: CA_UNREACHABLE<br> ca-error: Internal error<br> stuck: no<br> key pair storage: type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='auditSigningCert cert-pki-ca',token='NSS Certificate DB',pin set<br> certificate: type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='auditSigningCert cert-pki-ca',token='NSS Certificate DB'<br> CA: dogtag-ipa-ca-renew-agent<br> issuer: CN=Certificate Authority,O=<a href="http://INTERNAL.EMERLYN.COM">INTERNAL.EMERLYN.COM</a><br> subject: CN=CA Audit,O=<a href="http://INTERNAL.EMERLYN.COM">INTERNAL.EMERLYN.COM</a><br> expires: 2017-01-05 16:18:01 UTC<br> key usage: digitalSignature,nonRepudiation<br> pre-save command: /usr/lib64/ipa/certmonger/stop_pkicad<br> post-save command: /usr/lib64/ipa/certmonger/renew_ca_cert "auditSigningCert cert-pki-ca"<br> track: yes<br> auto-renew: yes<br>Request ID '20151217174143':<br> status: CA_UNREACHABLE<br> ca-error: Internal error<br> stuck: no<br> key pair storage: type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='ocspSigningCert cert-pki-ca',token='NSS Certificate DB',pin set<br> certificate: type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='ocspSigningCert cert-pki-ca',token='NSS Certificate DB'<br> CA: dogtag-ipa-ca-renew-agent<br> issuer: CN=Certificate Authority,O=<a href="http://INTERNAL.EMERLYN.COM">INTERNAL.EMERLYN.COM</a><br> subject: CN=OCSP Subsystem,O=<a href="http://INTERNAL.EMERLYN.COM">INTERNAL.EMERLYN.COM</a><br> expires: 2017-01-05 16:17:58 UTC<br> key usage: digitalSignature,nonRepudiation,keyCertSign,cRLSign<br> eku: id-kp-OCSPSigning<br> pre-save command: /usr/lib64/ipa/certmonger/stop_pkicad<br> post-save command: /usr/lib64/ipa/certmonger/renew_ca_cert "ocspSigningCert cert-pki-ca"<br> track: yes<br> auto-renew: yes<br>Request ID '20151217174144':<br> status: CA_UNREACHABLE<br> ca-error: Internal error<br> stuck: no<br> key pair storage: type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='subsystemCert cert-pki-ca',token='NSS Certificate DB',pin set<br> certificate: type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='subsystemCert cert-pki-ca',token='NSS Certificate DB'<br> CA: dogtag-ipa-ca-renew-agent<br> issuer: CN=Certificate Authority,O=<a href="http://INTERNAL.EMERLYN.COM">INTERNAL.EMERLYN.COM</a><br> subject: CN=CA Subsystem,O=<a href="http://INTERNAL.EMERLYN.COM">INTERNAL.EMERLYN.COM</a><br> expires: 2017-01-05 16:17:59 UTC<br> key usage: digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment<br> eku: id-kp-serverAuth,id-kp-clientAuth<br> pre-save command: /usr/lib64/ipa/certmonger/stop_pkicad<br> post-save command: /usr/lib64/ipa/certmonger/renew_ca_cert "subsystemCert cert-pki-ca"<br> track: yes<br> auto-renew: yes<br>Request ID '20151217174145':<br> status: CA_UNREACHABLE<br> ca-error: Internal error<br> stuck: no<br> key pair storage: type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='caSigningCert cert-pki-ca',token='NSS Certificate DB',pin set<br> certificate: type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='caSigningCert cert-pki-ca',token='NSS Certificate DB'<br> CA: dogtag-ipa-ca-renew-agent<br> issuer: CN=Certificate Authority,O=<a href="http://INTERNAL.EMERLYN.COM">INTERNAL.EMERLYN.COM</a><br> subject: CN=Certificate Authority,O=<a href="http://INTERNAL.EMERLYN.COM">INTERNAL.EMERLYN.COM</a><br> expires: 2035-01-16 16:17:57 UTC<br> key usage: digitalSignature,nonRepudiation,keyCertSign,cRLSign<br> pre-save command: /usr/lib64/ipa/certmonger/stop_pkicad<br> post-save command: /usr/lib64/ipa/certmonger/renew_ca_cert "caSigningCert cert-pki-ca"<br> track: yes<br> auto-renew: yes<br>Request ID '20151217174146':<br> status: CA_UNREACHABLE<br> ca-error: Internal error<br> stuck: no<br> key pair storage: type=NSSDB,location='/etc/httpd/alias',nickname='ipaCert',token='NSS Certificate DB',pinfile='/etc/httpd/alias/pwdfile.txt'<br> certificate: type=NSSDB,location='/etc/httpd/alias',nickname='ipaCert',token='NSS Certificate DB'<br> CA: dogtag-ipa-ca-renew-agent<br> issuer: CN=Certificate Authority,O=<a href="http://INTERNAL.EMERLYN.COM">INTERNAL.EMERLYN.COM</a><br> subject: CN=IPA RA,O=<a href="http://INTERNAL.EMERLYN.COM">INTERNAL.EMERLYN.COM</a><br> expires: 2017-01-05 16:18:23 UTC<br> key usage: digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment<br> eku: id-kp-serverAuth,id-kp-clientAuth<br> pre-save command: /usr/lib64/ipa/certmonger/renew_ra_cert_pre<br> post-save command: /usr/lib64/ipa/certmonger/renew_ra_cert<br> track: yes<br> auto-renew: yes<br>Request ID '20151217174147':<br> status: CA_UNREACHABLE<br> ca-error: Error 60 connecting to <a href="https://id-management-1.internal.emerlyn.com:8443/ca/agent/ca/profileReview">https://id-management-1.internal.emerlyn.com:8443/ca/agent/ca/profileReview</a>: Peer certificate cannot be authenticated with given CA certificates.<br> stuck: no<br> key pair storage: type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='Server-Cert cert-pki-ca',token='NSS Certificate DB',pin set<br> certificate: type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='Server-Cert cert-pki-ca',token='NSS Certificate DB'<br> CA: dogtag-ipa-renew-agent<br> issuer: CN=Certificate Authority,O=<a href="http://INTERNAL.EMERLYN.COM">INTERNAL.EMERLYN.COM</a><br> subject: CN=<a href="http://id-management-1.internal.emerlyn.com">id-management-1.internal.emerlyn.com</a>,O=<a href="http://INTERNAL.EMERLYN.COM">INTERNAL.EMERLYN.COM</a><br> expires: 2017-01-05 16:17:59 UTC<br> key usage: digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment<br> eku: id-kp-serverAuth<br> pre-save command: /usr/lib64/ipa/certmonger/stop_pkicad<br> post-save command: /usr/lib64/ipa/certmonger/renew_ca_cert "Server-Cert cert-pki-ca"<br> track: yes<br> auto-renew: yes<br><br></div>Looking at the content of /etc/krb5.keytab results in no host entry found:<br><br>ktutil<br>ktutil: read_kt /etc/krb5.keytab<br>ktutil: list<br>slot KVNO Principal<br>---- ---- ---------------------------------------------------------------------<br> 1 1 cifs/<a href="mailto:shares-01.internal.emerlyn.com@INTERNAL.EMERLYN.COM">shares-01.internal.emerlyn.com@INTERNAL.EMERLYN.COM</a><br> 2 1 cifs/<a href="mailto:shares-01.internal.emerlyn.com@INTERNAL.EMERLYN.COM">shares-01.internal.emerlyn.com@INTERNAL.EMERLYN.COM</a><br> 3 1 cifs/<a href="mailto:shares-01.internal.emerlyn.com@INTERNAL.EMERLYN.COM">shares-01.internal.emerlyn.com@INTERNAL.EMERLYN.COM</a><br> 4 1 cifs/<a href="mailto:shares-01.internal.emerlyn.com@INTERNAL.EMERLYN.COM">shares-01.internal.emerlyn.com@INTERNAL.EMERLYN.COM</a><br> 5 1 cifs/<a href="mailto:files-01.internal.emerlyn.com@INTERNAL.EMERLYN.COM">files-01.internal.emerlyn.com@INTERNAL.EMERLYN.COM</a><br> 6 1 cifs/<a href="mailto:files-01.internal.emerlyn.com@INTERNAL.EMERLYN.COM">files-01.internal.emerlyn.com@INTERNAL.EMERLYN.COM</a><br> 7 1 cifs/<a href="mailto:files-01.internal.emerlyn.com@INTERNAL.EMERLYN.COM">files-01.internal.emerlyn.com@INTERNAL.EMERLYN.COM</a><br> 8 1 cifs/<a href="mailto:files-01.internal.emerlyn.com@INTERNAL.EMERLYN.COM">files-01.internal.emerlyn.com@INTERNAL.EMERLYN.COM</a><br> 9 2 host/<a href="mailto:files-01.internal.emerlyn.com@INTERNAL.EMERLYN.COM">files-01.internal.emerlyn.com@INTERNAL.EMERLYN.COM</a><br> 10 2 host/<a href="mailto:files-01.internal.emerlyn.com@INTERNAL.EMERLYN.COM">files-01.internal.emerlyn.com@INTERNAL.EMERLYN.COM</a><br> 11 2 host/<a href="mailto:files-01.internal.emerlyn.com@INTERNAL.EMERLYN.COM">files-01.internal.emerlyn.com@INTERNAL.EMERLYN.COM</a><br> 12 2 host/<a href="mailto:files-01.internal.emerlyn.com@INTERNAL.EMERLYN.COM">files-01.internal.emerlyn.com@INTERNAL.EMERLYN.COM</a><br></div><br><br></div>Trying to add a host entry:<br>kadmin -q "ktadd -k /etc/krb5.keytab host/<a href="http://id-management-1.internal.emerlyn.com">id-management-1.internal.emerlyn.com</a>"<br>Authenticating as principal admin/<a href="mailto:admin@INTERNAL.EMERLYN.COM">admin@INTERNAL.EMERLYN.COM</a> with password.<br>kadmin: Client 'admin/<a href="mailto:admin@INTERNAL.EMERLYN.COM">admin@INTERNAL.EMERLYN.COM</a>' not found in Kerberos database while initializing kadmin interface<br><br></div>Yet if I issue kinit admin I get a password prompt and appear to get a ticket. What am I missing? <br><div><div><br><div><div><div><br><br><br><div class="gmail_extra"><br><div class="gmail_quote">On Fri, Jan 6, 2017 at 10:19 AM, Rob Crittenden <span dir="ltr"><<a href="mailto:rcritten@redhat.com" target="_blank">rcritten@redhat.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">Jeff Goddard wrote:<br>
> My environment is freeipa 4.4; centos 7.3. This system was upgraded as<br>
> of yesterday afternoon. I'm unable to start pki-tomcat. The debug log<br>
> show this entry:<br>
><br>
> Internal Database Error encountered: Could not connect to LDAP server<br>
> host <a href="http://id-management-1.internal.emerlyn.com" rel="noreferrer" target="_blank">id-management-1.internal.<wbr>emerlyn.com</a><br>
> <<a href="http://id-management-1.internal.emerlyn.com" rel="noreferrer" target="_blank">http://id-management-1.<wbr>internal.emerlyn.com</a>> port 636 Error<br>
> netscape.ldap.LDAPException: Authentication failed (48)<br>
> at com.netscape.cmscore.dbs.<wbr>DBSubsystem.init(DBSubsystem.<wbr>java:676)<br>
> at<br>
> com.netscape.cmscore.apps.<wbr>CMSEngine.initSubsystem(<wbr>CMSEngine.java:1169)<br>
> at<br>
> com.netscape.cmscore.apps.<wbr>CMSEngine.initSubsystems(<wbr>CMSEngine.java:1075)<br>
> at com.netscape.cmscore.apps.<wbr>CMSEngine.init(CMSEngine.java:<wbr>571)<br>
> at com.netscape.certsrv.apps.CMS.<wbr>init(CMS.java:187)<br>
> at com.netscape.certsrv.apps.CMS.<wbr>start(CMS.java:1616)<br>
> at<br>
> com.netscape.cms.servlet.base.<wbr>CMSStartServlet.init(<wbr>CMSStartServlet.java:114)<br>
> at javax.servlet.GenericServlet.<wbr>init(GenericServlet.java:158)<br>
> at sun.reflect.<wbr>NativeMethodAccessorImpl.<wbr>invoke0(Native Method)<br>
> at<br>
> sun.reflect.<wbr>NativeMethodAccessorImpl.<wbr>invoke(<wbr>NativeMethodAccessorImpl.java:<wbr>62)<br>
> at<br>
> sun.reflect.<wbr>DelegatingMethodAccessorImpl.<wbr>invoke(<wbr>DelegatingMethodAccessorImpl.<wbr>java:43)<br>
> at java.lang.reflect.Method.<wbr>invoke(Method.java:498)<br>
> at<br>
> org.apache.catalina.security.<wbr>SecurityUtil$1.run(<wbr>SecurityUtil.java:288)<br>
> at<br>
> org.apache.catalina.security.<wbr>SecurityUtil$1.run(<wbr>SecurityUtil.java:285)<br>
> at java.security.<wbr>AccessController.doPrivileged(<wbr>Native Method)<br>
> at javax.security.auth.Subject.<wbr>doAsPrivileged(Subject.java:<wbr>549)<br>
> at<br>
> org.apache.catalina.security.<wbr>SecurityUtil.execute(<wbr>SecurityUtil.java:320)<br>
> at<br>
> org.apache.catalina.security.<wbr>SecurityUtil.doAsPrivilege(<wbr>SecurityUtil.java:175)<br>
> at<br>
> org.apache.catalina.security.<wbr>SecurityUtil.doAsPrivilege(<wbr>SecurityUtil.java:124)<br>
> at<br>
> org.apache.catalina.core.<wbr>StandardWrapper.initServlet(<wbr>StandardWrapper.java:1270)<br>
> at<br>
> org.apache.catalina.core.<wbr>StandardWrapper.loadServlet(<wbr>StandardWrapper.java:1195)<br>
> at<br>
> org.apache.catalina.core.<wbr>StandardWrapper.load(<wbr>StandardWrapper.java:1085)<br>
> at<br>
> org.apache.catalina.core.<wbr>StandardContext.loadOnStartup(<wbr>StandardContext.java:5318)<br>
> at<br>
> org.apache.catalina.core.<wbr>StandardContext.startInternal(<wbr>StandardContext.java:5610)<br>
> at<br>
> org.apache.catalina.util.<wbr>LifecycleBase.start(<wbr>LifecycleBase.java:147)<br>
> at<br>
> org.apache.catalina.core.<wbr>ContainerBase.<wbr>addChildInternal(<wbr>ContainerBase.java:899)<br>
> at<br>
> org.apache.catalina.core.<wbr>ContainerBase.access$000(<wbr>ContainerBase.java:133)<br>
> at<br>
> org.apache.catalina.core.<wbr>ContainerBase$<wbr>PrivilegedAddChild.run(<wbr>ContainerBase.java:156)<br>
> at<br>
> org.apache.catalina.core.<wbr>ContainerBase$<wbr>PrivilegedAddChild.run(<wbr>ContainerBase.java:145)<br>
> at java.security.<wbr>AccessController.doPrivileged(<wbr>Native Method)<br>
> at<br>
> org.apache.catalina.core.<wbr>ContainerBase.addChild(<wbr>ContainerBase.java:873)<br>
> at<br>
> org.apache.catalina.core.<wbr>StandardHost.addChild(<wbr>StandardHost.java:652)<br>
> at<br>
> org.apache.catalina.startup.<wbr>HostConfig.deployDescriptor(<wbr>HostConfig.java:679)<br>
> at<br>
> org.apache.catalina.startup.<wbr>HostConfig$DeployDescriptor.<wbr>run(HostConfig.java:1966)<br>
> at<br>
> java.util.concurrent.<wbr>Executors$RunnableAdapter.<wbr>call(Executors.java:511)<br>
> at java.util.concurrent.<wbr>FutureTask.run(FutureTask.<wbr>java:266)<br>
> at<br>
> java.util.concurrent.<wbr>ThreadPoolExecutor.runWorker(<wbr>ThreadPoolExecutor.java:1142)<br>
> at<br>
> java.util.concurrent.<wbr>ThreadPoolExecutor$Worker.run(<wbr>ThreadPoolExecutor.java:617)<br>
> at java.lang.Thread.run(Thread.<wbr>java:745)<br>
><br>
><br>
> I'm able to get a kerberos ticket using kinit but ldap search gives this<br>
> error:<br>
><br>
> ldapsearch -h <a href="http://id-manaement-1.internal.emerlyn.com" rel="noreferrer" target="_blank">id-manaement-1.internal.<wbr>emerlyn.com</a><br>
> <<a href="http://id-manaement-1.internal.emerlyn.com" rel="noreferrer" target="_blank">http://id-manaement-1.<wbr>internal.emerlyn.com</a>> -x -b<br>
> "cn=CAcert,cn=ipa,cn=etc,dc=<wbr>internal,dc=emerlyn,dc=com"<br>
> ldap_sasl_bind(SIMPLE): Can't contact LDAP server (-1)<br>
><br>
> adding the -d1 debugging tag results in:<br>
><br>
> ldap_create<br>
> ldap_url_parse_ext(ldap://<a href="http://id-manaement-1.internal.emerlyn.com" rel="noreferrer" target="_blank">id-<wbr>manaement-1.internal.emerlyn.<wbr>com</a><br>
> <<a href="http://id-manaement-1.internal.emerlyn.com" rel="noreferrer" target="_blank">http://id-manaement-1.<wbr>internal.emerlyn.com</a>>)<br>
> ldap_sasl_bind<br>
> ldap_send_initial_request<br>
> ldap_new_connection 1 1 0<br>
> ldap_int_open_connection<br>
> ldap_connect_to_host: TCP <a href="http://id-manaement-1.internal.emerlyn.com:389" rel="noreferrer" target="_blank">id-manaement-1.internal.<wbr>emerlyn.com:389</a><br>
> <<a href="http://id-manaement-1.internal.emerlyn.com:389" rel="noreferrer" target="_blank">http://id-manaement-1.<wbr>internal.emerlyn.com:389</a>><br>
> ldap_connect_to_host: getaddrinfo failed: Name or service not known<br>
> ldap_err2string<br>
> ldap_sasl_bind(SIMPLE): Can't contact LDAP server (-1)<br>
><br>
> I'm able to resolve the hostname via nslookup and /etc/hosts has the<br>
> correct mapping entry.<br>
><br>
> I'm kind of lost at this point and could use some help.<br>
><br>
> Thanks in advance.<br>
<br>
You have a typo in the hostname you're trying to connect to, missing the<br>
'g' in management.<br>
<br>
I have a vague memory from other reports of this issue that the problem<br>
may be that the value of the certificate(s) in CS.cfg is different from<br>
the dogtag NSS database. I'd see if those line up.<br>
<span class="gmail-HOEnZb"><font color="#888888"><br>
rob<br>
</font></span></blockquote></div><br><br clear="all"><br>-- <br><div class="gmail_signature"><div dir="ltr"><div>Jeff<br></div><br></div></div>
</div></div></div></div></div></div></div>