Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 1482330 Details for
Bug 1602410
IPA client installtion fails with error " KerberosError: No valid Negotiate header in server response".
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
IPA client install log with verbose=3 parameter in /etc/ipa/cli_installer.conf and modified verbosity in schema.py
ipa-client-install_v2.log (text/plain), 18.70 KB, created by
Jaroslav Kučera
on 2018-09-11 10:21:31 UTC
(
hide
)
Description:
IPA client install log with verbose=3 parameter in /etc/ipa/cli_installer.conf and modified verbosity in schema.py
Filename:
MIME Type:
Creator:
Jaroslav Kučera
Created:
2018-09-11 10:21:31 UTC
Size:
18.70 KB
patch
obsolete
>Logging to /var/log/ipaclient-install.log >ipa-client-install was invoked with arguments [] and options: {'no_dns_sshfp': False, 'force': False, 'verbose': True, 'ip_addresses': None, 'configure_firefox': False, 'realm_name': 'COMVERSE.COM', 'force_ntpd': False, 'on_master': False, 'no_nisdomain': False, 'ssh_trust_dns': False, 'principal': 'admin', 'keytab': None, 'no_ntp': False, 'domain_name': 'comverse.com', 'request_cert': False, 'fixed_primary': False, 'no_ac': False, 'no_sudo': False, 'ca_cert_files': None, 'all_ip_addresses': False, 'kinit_attempts': None, 'ntp_servers': None, 'enable_dns_updates': False, 'no_sshd': False, 'no_sssd': False, 'no_krb5_offline_passwords': False, 'servers': ['ntp-ipaserver.comverse.com'], 'no_ssh': False, 'force_join': False, 'firefox_dir': None, 'unattended': True, 'quiet': False, 'nisdomain': None, 'prompt_password': False, 'host_name': None, 'permit': False, 'automount_location': None, 'preserve_sssd': False, 'mkhomedir': True, 'log_file': None, 'uninstall': False} >IPA version 4.5.4-10.el7_5.3 >Loading Index file from '/var/lib/ipa-client/sysrestore/sysrestore.index' >Starting external process >args=/usr/sbin/selinuxenabled >Process finished, return code=0 >stdout= >stderr= >Starting external process >args=/bin/systemctl is-enabled chronyd.service >Process finished, return code=1 >stdout= >stderr=Failed to get unit file state for chronyd.service: No such file or directory > >Starting external process >args=/bin/systemctl is-active chronyd.service >Process finished, return code=3 >stdout=unknown > >stderr= >[IPA Discovery] >Starting IPA discovery with domain=comverse.com, servers=['ntp-ipaserver.comverse.com'], hostname=rnd-vm-11-246.cz.intinfra.com >Server and domain forced >[Kerberos realm search] >Kerberos realm forced >[LDAP server check] >Verifying that ntp-ipaserver.comverse.com (realm COMVERSE.COM) is an IPA server >Init LDAP connection to: ldap://ntp-ipaserver.comverse.com:389 >Search LDAP server for IPA base DN >Check if naming context 'dc=comverse,dc=com' is for IPA >LDAP Error: Anonymous access not allowed >Generated basedn from realm: dc=comverse,dc=com >Discovery result: NO_ACCESS_TO_LDAP; server=None, domain=comverse.com, kdc=ntp-ipaserver.comverse.com, basedn=dc=comverse,dc=com >Validated servers: ntp-ipaserver.comverse.com >will use discovered domain: comverse.com >Using servers from command line, disabling DNS discovery >will use provided server: ntp-ipaserver.comverse.com >will use discovered realm: COMVERSE.COM >will use discovered basedn: dc=comverse,dc=com >Client hostname: rnd-vm-11-246.cz.intinfra.com >Hostname source: Machine's FQDN >Realm: COMVERSE.COM >Realm source: Forced >DNS Domain: comverse.com >DNS Domain source: Forced >IPA Server: ntp-ipaserver.comverse.com >IPA Server source: Provided as option >BaseDN: dc=comverse,dc=com >BaseDN source: Generated from Kerberos realm >Loading Index file from '/var/lib/ipa-client/sysrestore/sysrestore.index' >Loading StateFile from '/var/lib/ipa-client/sysrestore/sysrestore.state' >Starting external process >args=/usr/sbin/ipa-rmkeytab -k /etc/krb5.keytab -r COMVERSE.COM >Process finished, return code=5 >stdout= >stderr=realm not found > >Synchronizing time with KDC... >Search DNS for SRV record of _ntp._udp.comverse.com >DNS record not found: NXDOMAIN >Attempting to sync time using ntpd. Will timeout after 15 seconds >Starting external process >args=/usr/bin/timeout 15 /usr/sbin/ntpd -qgc /tmp/tmpj3qKW5 >Process finished, return code=1 >stdout= >stderr= >Unable to sync time with NTP server, assuming the time is in sync. Please check that 123 UDP port is opened. >Starting external process >args=keyctl get_persistent @s 0 >Process finished, return code=0 >stdout=214346827 > >stderr= >Enabling persistent keyring CCACHE >Writing Kerberos configuration to /tmp/tmp2PXuCi: >#File modified by ipa-client-install > >includedir /etc/krb5.conf.d/ >includedir /var/lib/sss/pubconf/krb5.include.d/ > >[libdefaults] > default_realm = COMVERSE.COM > dns_lookup_realm = false > dns_lookup_kdc = false > rdns = false > dns_canonicalize_hostname = false > ticket_lifetime = 24h > forwardable = true > udp_preference_limit = 0 > default_ccache_name = KEYRING:persistent:%{uid} > > >[realms] > COMVERSE.COM = { > kdc = ntp-ipaserver.comverse.com:88 > master_kdc = ntp-ipaserver.comverse.com:88 > admin_server = ntp-ipaserver.comverse.com:749 > kpasswd_server = ntp-ipaserver.comverse.com:464 > default_domain = comverse.com > pkinit_anchors = FILE:/var/lib/ipa-client/pki/kdc-ca-bundle.pem > pkinit_pool = FILE:/var/lib/ipa-client/pki/ca-bundle.pem > > } > > >[domain_realm] > .comverse.com = COMVERSE.COM > comverse.com = COMVERSE.COM > rnd-vm-11-246.cz.intinfra.com = COMVERSE.COM > .cz.intinfra.com = COMVERSE.COM > cz.intinfra.com = COMVERSE.COM > > > >Initializing principal admin@COMVERSE.COM using password >Starting external process >args=/usr/bin/kinit admin@COMVERSE.COM -c /tmp/krbccR79mr7/ccache >Process finished, return code=0 >stdout=Password for admin@COMVERSE.COM: > >stderr= >trying to retrieve CA cert via LDAP from ntp-ipaserver.comverse.com >retrieving schema for SchemaCache url=ldap://ntp-ipaserver.comverse.com:389 conn=<ldap.ldapobject.SimpleLDAPObject instance at 0x7fb78999c1b8> >Successfully retrieved CA cert > Subject: CN=Certificate Authority,O=COMVERSE.COM > Issuer: CN=Certificate Authority,O=COMVERSE.COM > Valid From: 2018-02-22 09:41:24 > Valid Until: 2038-02-22 09:41:24 > >Starting external process >args=/usr/sbin/ipa-join -s ntp-ipaserver.comverse.com -b dc=comverse,dc=com -h rnd-vm-11-246.cz.intinfra.com >Process finished, return code=0 >stdout= >stderr=Failed to parse result: unsupported extended operation >Retrying with pre-4.0 keytab retrieval method... >Failed to retrieve encryption type Triple DES cbc mode with HMAC/sha1 (#16) >Failed to retrieve encryption type ArcFour with HMAC/md5 (#23) >Failed to retrieve encryption type Camellia-128 CTS mode with CMAC (#25) >Failed to retrieve encryption type Camellia-256 CTS mode with CMAC (#26) >Keytab successfully retrieved and stored in: /etc/krb5.keytab >Certificate subject base is: O=COMVERSE.COM > >Enrolled in IPA realm COMVERSE.COM >Starting external process >args=kdestroy >Process finished, return code=0 >stdout= >stderr= >Initializing principal host/rnd-vm-11-246.cz.intinfra.com@COMVERSE.COM using keytab /etc/krb5.keytab >using ccache /etc/ipa/.dns_ccache >Attempt 1/5: success >Backing up system configuration file '/etc/ipa/default.conf' > -> Not backing up - '/etc/ipa/default.conf' doesn't exist >Created /etc/ipa/default.conf >Backing up system configuration file '/etc/sssd/sssd.conf' > -> Not backing up - '/etc/sssd/sssd.conf' doesn't exist >New SSSD config will be created >Backing up system configuration file '/etc/nsswitch.conf' >Saving Index File to '/var/lib/ipa-client/sysrestore/sysrestore.index' >Configured sudoers in /etc/nsswitch.conf >Configured /etc/sssd/sssd.conf >Backing up system configuration file '/etc/krb5.conf' >Saving Index File to '/var/lib/ipa-client/sysrestore/sysrestore.index' >Starting external process >args=keyctl get_persistent @s 0 >Process finished, return code=0 >stdout=214346827 > >stderr= >Enabling persistent keyring CCACHE >Writing Kerberos configuration to /etc/krb5.conf: >#File modified by ipa-client-install > >includedir /etc/krb5.conf.d/ >includedir /var/lib/sss/pubconf/krb5.include.d/ > >[libdefaults] > default_realm = COMVERSE.COM > dns_lookup_realm = false > dns_lookup_kdc = false > rdns = false > dns_canonicalize_hostname = false > ticket_lifetime = 24h > forwardable = true > udp_preference_limit = 0 > default_ccache_name = KEYRING:persistent:%{uid} > > >[realms] > COMVERSE.COM = { > kdc = ntp-ipaserver.comverse.com:88 > master_kdc = ntp-ipaserver.comverse.com:88 > admin_server = ntp-ipaserver.comverse.com:749 > kpasswd_server = ntp-ipaserver.comverse.com:464 > default_domain = comverse.com > pkinit_anchors = FILE:/var/lib/ipa-client/pki/kdc-ca-bundle.pem > pkinit_pool = FILE:/var/lib/ipa-client/pki/ca-bundle.pem > > } > > >[domain_realm] > .comverse.com = COMVERSE.COM > comverse.com = COMVERSE.COM > rnd-vm-11-246.cz.intinfra.com = COMVERSE.COM > .cz.intinfra.com = COMVERSE.COM > cz.intinfra.com = COMVERSE.COM > > > >Configured /etc/krb5.conf for IPA realm COMVERSE.COM >Starting external process >args=/usr/bin/certutil -d /tmp/tmp5qtL_t -N -f /tmp/tmp5qtL_t/pwdfile.txt -f /tmp/tmp5qtL_t/pwdfile.txt >Process finished, return code=0 >stdout= >stderr= >Starting external process >args=/usr/bin/certutil -d /tmp/tmp5qtL_t -A -n CA certificate 1 -t C,, -f /tmp/tmp5qtL_t/pwdfile.txt >Process finished, return code=0 >stdout= >stderr= >Error retrieving cookie from the persistent storage: expected string or buffer >failed to find session_cookie in persistent storage for principal 'host/rnd-vm-11-246.cz.intinfra.com@COMVERSE.COM' >trying https://ntp-ipaserver.comverse.com/ipa/json >Request: { > "id": 0, > "method": "ping", > "params": [ > [], > {} > ] >} >New HTTP connection (ntp-ipaserver.comverse.com) >received Set-Cookie (<type 'list'>)'[]' >Response: { > "error": null, > "id": 0, > "principal": "host/rnd-vm-11-246.cz.intinfra.com@COMVERSE.COM", > "result": { > "summary": "IPA server version 3.0.0. API version 2.49" > }, > "version": "3.0.0" >} >Created connection context.rpcclient_140426226454096 >[try 1]: Forwarding 'schema' to json server 'https://ntp-ipaserver.comverse.com/ipa/json' >Request: { > "id": 0, > "method": "schema", > "params": [ > [], > { > "version": "2.170" > } > ] >} >HTTP connection keep-alive (ntp-ipaserver.comverse.com) >HTTP connection destroyed (ntp-ipaserver.comverse.com) >Traceback (most recent call last): > File "/usr/lib/python2.7/site-packages/ipalib/rpc.py", line 706, in single_request > if not self._auth_complete(response): > File "/usr/lib/python2.7/site-packages/ipalib/rpc.py", line 657, in _auth_complete > message=u"No valid Negotiate header in server response") >KerberosError: No valid Negotiate header in server response >Destroyed connection context.rpcclient_140426226454096 > File "/usr/lib/python2.7/site-packages/ipapython/admintool.py", line 172, in execute > return_value = self.run() > File "/usr/lib/python2.7/site-packages/ipapython/install/cli.py", line 333, in run > cfgr.run() > File "/usr/lib/python2.7/site-packages/ipapython/install/core.py", line 368, in run > self.execute() > File "/usr/lib/python2.7/site-packages/ipapython/install/core.py", line 392, in execute > for _nothing in self._executor(): > File "/usr/lib/python2.7/site-packages/ipapython/install/core.py", line 434, in __runner > exc_handler(exc_info) > File "/usr/lib/python2.7/site-packages/ipapython/install/core.py", line 463, in _handle_execute_exception > self._handle_exception(exc_info) > File "/usr/lib/python2.7/site-packages/ipapython/install/core.py", line 453, in _handle_exception > six.reraise(*exc_info) > File "/usr/lib/python2.7/site-packages/ipapython/install/core.py", line 424, in __runner > step() > File "/usr/lib/python2.7/site-packages/ipapython/install/core.py", line 421, in <lambda> > step = lambda: next(self.__gen) > File "/usr/lib/python2.7/site-packages/ipapython/install/util.py", line 81, in run_generator_with_yield_from > six.reraise(*exc_info) > File "/usr/lib/python2.7/site-packages/ipapython/install/util.py", line 59, in run_generator_with_yield_from > value = gen.send(prev_value) > File "/usr/lib/python2.7/site-packages/ipapython/install/core.py", line 658, in _configure > next(executor) > File "/usr/lib/python2.7/site-packages/ipapython/install/core.py", line 434, in __runner > exc_handler(exc_info) > File "/usr/lib/python2.7/site-packages/ipapython/install/core.py", line 463, in _handle_execute_exception > self._handle_exception(exc_info) > File "/usr/lib/python2.7/site-packages/ipapython/install/core.py", line 521, in _handle_exception > self.__parent._handle_exception(exc_info) > File "/usr/lib/python2.7/site-packages/ipapython/install/core.py", line 453, in _handle_exception > six.reraise(*exc_info) > File "/usr/lib/python2.7/site-packages/ipapython/install/core.py", line 518, in _handle_exception > super(ComponentBase, self)._handle_exception(exc_info) > File "/usr/lib/python2.7/site-packages/ipapython/install/core.py", line 453, in _handle_exception > six.reraise(*exc_info) > File "/usr/lib/python2.7/site-packages/ipapython/install/core.py", line 424, in __runner > step() > File "/usr/lib/python2.7/site-packages/ipapython/install/core.py", line 421, in <lambda> > step = lambda: next(self.__gen) > File "/usr/lib/python2.7/site-packages/ipapython/install/util.py", line 81, in run_generator_with_yield_from > six.reraise(*exc_info) > File "/usr/lib/python2.7/site-packages/ipapython/install/util.py", line 59, in run_generator_with_yield_from > value = gen.send(prev_value) > File "/usr/lib/python2.7/site-packages/ipapython/install/common.py", line 63, in _install > for _nothing in self._installer(self.parent): > File "/usr/lib/python2.7/site-packages/ipaclient/install/client.py", line 3628, in main > install(self) > File "/usr/lib/python2.7/site-packages/ipaclient/install/client.py", line 2348, in install > _install(options) > File "/usr/lib/python2.7/site-packages/ipaclient/install/client.py", line 2694, in _install > api.finalize() > File "/usr/lib/python2.7/site-packages/ipalib/plugable.py", line 714, in finalize > self.__do_if_not_done('load_plugins') > File "/usr/lib/python2.7/site-packages/ipalib/plugable.py", line 421, in __do_if_not_done > getattr(self, name)() > File "/usr/lib/python2.7/site-packages/ipalib/plugable.py", line 592, in load_plugins > for package in self.packages: > File "/usr/lib/python2.7/site-packages/ipalib/__init__.py", line 948, in packages > ipaclient.remote_plugins.get_package(self), > File "/usr/lib/python2.7/site-packages/ipaclient/remote_plugins/__init__.py", line 126, in get_package > plugins = schema.get_package(server_info, client) > File "/usr/lib/python2.7/site-packages/ipaclient/remote_plugins/schema.py", line 537, in get_package > schema = Schema(client) > File "/usr/lib/python2.7/site-packages/ipaclient/remote_plugins/schema.py", line 385, in __init__ > fingerprint, ttl = self._fetch(client, ignore_cache=read_failed) > File "/usr/lib/python2.7/site-packages/ipaclient/remote_plugins/schema.py", line 410, in _fetch > schema = client.forward(u'schema', **kwargs)['result'] > File "/usr/lib/python2.7/site-packages/ipalib/rpc.py", line 1116, in forward > return self._call_command(command, params) > File "/usr/lib/python2.7/site-packages/ipalib/rpc.py", line 1092, in _call_command > return command(*params) > File "/usr/lib/python2.7/site-packages/ipalib/rpc.py", line 1246, in _call > return self.__request(name, args) > File "/usr/lib/python2.7/site-packages/ipalib/rpc.py", line 1213, in __request > verbose=self.__verbose >= 3, > File "/usr/lib64/python2.7/xmlrpclib.py", line 1273, in request > return self.single_request(host, handler, request_body, verbose) > File "/usr/lib/python2.7/site-packages/ipalib/rpc.py", line 706, in single_request > if not self._auth_complete(response): > File "/usr/lib/python2.7/site-packages/ipalib/rpc.py", line 657, in _auth_complete > message=u"No valid Negotiate header in server response") > >The ipa-client-install command failed, exception: KerberosError: No valid Negotiate header in server response >No valid Negotiate header in server response >The ipa-client-install command failed. See /var/log/ipaclient-install.log for more information > >send: u'POST /ipa/json HTTP/1.1\r\nHost: ntp-ipaserver.comverse.com\r\nAccept-Encoding: gzip\r\nAccept-Language: cs-cz\r\nReferer: https://ntp-ipaserver.comverse.com/ipa/xml\r\nAuthorization: negotiate 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\r\nUser-Agent: xmlrpclib.py/1.0.1 (by www.pythonware.com)\r\nContent-Type: application/json\r\nContent-Length: 86\r\n\r\n{\n "id": 0, \n "method": "ping", \n "params": [\n [], \n {}\n ]\n}' >reply: 'HTTP/1.1 200 Success\r\n' >header: Date: Tue, 11 Sep 2018 07:22:52 GMT >header: Server: Apache >header: WWW-Authenticate: Negotiate YIGZBgkqhkiG9xIBAgICAG+BiTCBhqADAgEFoQMCAQ+iejB4oAMCARKicQRvrXyuiQkCco8hJCVlkRqZ6YLnVOFdL9koiQ8Wsqj24Cae4cRkBCNeXuJo5k3xeW41sTTNTJHPmlCHyqKETDL3V/Ax/M8uE7sMekinKwHdcvPlqLiZV4AZMuWYCGK8H2DGjWTVfHduCHqPtrKaftYE >header: Transfer-Encoding: chunked >header: Content-Type: application/json; charset=utf-8 >body: '{\n "error": null, \n "id": 0, \n "principal": "host/rnd-vm-11-246.cz.intinfra.com@COMVERSE.COM", \n "result": {\n "summary": "IPA server version 3.0.0. API version 2.49"\n }, \n "version": "3.0.0"\n}' >send: u'POST /ipa/json HTTP/1.1\r\nHost: ntp-ipaserver.comverse.com\r\nAccept-Encoding: gzip\r\nAccept-Language: cs-cz\r\nReferer: https://ntp-ipaserver.comverse.com/ipa/xml\r\nAuthorization: negotiate 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\r\nUser-Agent: xmlrpclib.py/1.0.1 (by www.pythonware.com)\r\nContent-Type: application/json\r\nContent-Length: 128\r\n\r\n{\n "id": 0, \n "method": "schema", \n "params": [\n [], \n {\n "version": "2.170"\n }\n ]\n}' >reply: 'HTTP/1.1 200 Success\r\n' >header: Date: Tue, 11 Sep 2018 07:22:52 GMT >header: Server: Apache >header: Transfer-Encoding: chunked >header: Content-Type: application/json; charset=utf-8
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1602410
:
1460010
|
1472640
|
1472641
|
1473859
|
1473860
|
1482008
| 1482330 |
1483315
|
1483316
|
1483319
|
1483320