Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 613699 Details for
Bug 857688
ipa-client-install fails
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
Install Log
install.log (text/x-log), 7.93 KB, created by
Erinn Looney-Triggs
on 2012-09-17 14:59:32 UTC
(
hide
)
Description:
Install Log
Filename:
MIME Type:
Creator:
Erinn Looney-Triggs
Created:
2012-09-17 14:59:32 UTC
Size:
7.93 KB
patch
obsolete
>2012-09-16T09:15:49Z DEBUG /sbin/ipa-client-install was invoked with options: {'domain': None, 'force': False, 'krb5_offline_passwords': True, 'primary': False, 'mkhomedir': False, 'create_sshfp': True, 'conf_sshd': True, 'on_master': False, 'conf_ntp': True, 'ntp_server': None, 'principal': None, 'hostname': None, 'no_ac': False, 'unattended': None, 'sssd': True, 'trust_sshfp': False, 'dns_updates': False, 'realm_name': None, 'server': None, 'prompt_password': False, 'permit': False, 'debug': False, 'preserve_sssd': False, 'uninstall': False} >2012-09-16T09:15:49Z DEBUG missing options might be asked for interactively later >2012-09-16T09:15:49Z DEBUG Loading Index file from '/var/lib/ipa-client/sysrestore/sysrestore.index' >2012-09-16T09:15:49Z DEBUG Loading StateFile from '/var/lib/ipa-client/sysrestore/sysrestore.state' >2012-09-16T09:15:49Z DEBUG [IPA Discovery] >2012-09-16T09:15:49Z DEBUG Starting IPA discovery with domain=None, server=None, hostname=thin-mint.foo.com >2012-09-16T09:15:49Z DEBUG Start searching for LDAP SRV record in "foo.com" (domain of the hostname) and its sub-domains >2012-09-16T09:15:49Z DEBUG Search DNS for SRV record of _ldap._tcp.foo.com >2012-09-16T09:15:49Z DEBUG DNS record found: 0 100 389 ipa.foo.com. >2012-09-16T09:15:49Z DEBUG [Kerberos realm search] >2012-09-16T09:15:49Z DEBUG Search DNS for TXT record of _kerberos.foo.com >2012-09-16T09:15:49Z DEBUG DNS record found: "FOO.COM" >2012-09-16T09:15:49Z DEBUG Search DNS for SRV record of _kerberos._udp.foo.com >2012-09-16T09:15:49Z DEBUG DNS record found: 0 100 88 ipa2.foo.com. >2012-09-16T09:15:49Z DEBUG DNS record found: 0 100 88 ipa.foo.com. >2012-09-16T09:15:49Z DEBUG [LDAP server check] >2012-09-16T09:15:49Z DEBUG Verifying that ipa.foo.com (realm FOO.COM) is an IPA server >2012-09-16T09:15:49Z DEBUG args=/usr/bin/wget -O /tmp/tmppsJVs1/ca.crt -T 15 -t 2 http://ipa.foo.com/ipa/config/ca.crt >2012-09-16T09:15:49Z DEBUG stdout= >2012-09-16T09:15:49Z DEBUG stderr=--2012-09-16 01:15:49-- http://ipa.foo.com/ipa/config/ca.crt >Resolving ipa.foo.com... 66.162.103.233, 2001:4870:800e:301:f24d:a2ff:fe09:ae0 >Connecting to ipa.foo.com|66.162.103.233|:80... connected. >HTTP request sent, awaiting response... 200 OK >Length: 3108 (3.0K) [application/x-x509-ca-cert] >Saving to: '/tmp/tmppsJVs1/ca.crt' > > 0K ... 100% 199K=0.02s > >2012-09-16 01:15:49 (199 KB/s) - '/tmp/tmppsJVs1/ca.crt' saved [3108/3108] > > >2012-09-16T09:15:49Z DEBUG Init LDAP connection with: ldap://ipa.foo.com:389 >2012-09-16T09:15:50Z DEBUG LDAP Error: Anonymous acces not allowed >2012-09-16T09:15:50Z DEBUG Generated basedn from realm: dc=foo,dc=com >2012-09-16T09:15:50Z DEBUG Discovery result: NO_ACCESS_TO_LDAP; server=ipa.foo.com, domain=foo.com, kdc=ipa2.foo.com,ipa.foo.com, basedn=dc=foo,dc=com >2012-09-16T09:15:50Z DEBUG will use discovered domain: foo.com >2012-09-16T09:15:50Z DEBUG Start searching for LDAP SRV record in "foo.com" (Validating DNS Discovery) and its sub-domains >2012-09-16T09:15:50Z DEBUG Search DNS for SRV record of _ldap._tcp.foo.com >2012-09-16T09:15:50Z DEBUG DNS record found: 0 100 389 ipa2.foo.com. >2012-09-16T09:15:50Z DEBUG DNS validated, enabling discovery >2012-09-16T09:15:50Z DEBUG will use discovered server: ipa.foo.com >2012-09-16T09:15:50Z WARNING Anonymous access to the LDAP server is disabled. >2012-09-16T09:15:50Z INFO Proceeding without strict verification. >2012-09-16T09:15:50Z INFO Note: This is not an error if anonymous access has been explicitly restricted. >2012-09-16T09:15:50Z INFO Discovery was successful! >2012-09-16T09:15:50Z DEBUG will use discovered realm: FOO.COM >2012-09-16T09:15:50Z DEBUG will use discovered basedn: dc=foo,dc=com >2012-09-16T09:15:50Z INFO Hostname: thin-mint.foo.com >2012-09-16T09:15:50Z DEBUG Hostname source: Machine's FQDN >2012-09-16T09:15:50Z INFO Realm: FOO.COM >2012-09-16T09:15:50Z DEBUG Realm source: Discovered Kerberos DNS records from foo.com >2012-09-16T09:15:50Z INFO DNS Domain: foo.com >2012-09-16T09:15:50Z DEBUG DNS Domain source: Discovered LDAP SRV records from foo.com (domain of the hostname) >2012-09-16T09:15:50Z INFO IPA Server: ipa.foo.com >2012-09-16T09:15:50Z DEBUG IPA Server source: Discovered LDAP SRV records from foo.com (domain of the hostname) >2012-09-16T09:15:50Z INFO BaseDN: dc=foo,dc=com >2012-09-16T09:15:50Z DEBUG BaseDN source: Generated from Kerberos realm >2012-09-16T09:15:52Z DEBUG args=/usr/sbin/ipa-rmkeytab -k /etc/krb5.keytab -r FOO.COM >2012-09-16T09:15:52Z DEBUG stdout= >2012-09-16T09:15:52Z DEBUG stderr=Removing principal host/thin-mint.foo.com@FOO.COM > >2012-09-16T09:15:52Z INFO Removed old keys for realm FOO.COM from /etc/krb5.keytab >2012-09-16T09:15:54Z DEBUG will use principal provided as option: erinn >2012-09-16T09:15:55Z DEBUG args=/usr/bin/wget -O /etc/ipa/ca.crt http://ipa.foo.com/ipa/config/ca.crt >2012-09-16T09:15:55Z DEBUG stdout= >2012-09-16T09:15:55Z DEBUG stderr=--2012-09-16 01:15:54-- http://ipa.foo.com/ipa/config/ca.crt >Resolving ipa.foo.com... 66.162.103.233, 2001:4870:800e:301:f24d:a2ff:fe09:ae0 >Connecting to ipa.foo.com|66.162.103.233|:80... connected. >HTTP request sent, awaiting response... 200 OK >Length: 3108 (3.0K) [application/x-x509-ca-cert] >Saving to: '/etc/ipa/ca.crt' > > 0K ... 100% 167K=0.02s > >2012-09-16 01:15:55 (167 KB/s) - '/etc/ipa/ca.crt' saved [3108/3108] > > >2012-09-16T09:15:55Z INFO Synchronizing time with KDC... >2012-09-16T09:15:55Z DEBUG Search DNS for SRV record of _ntp._udp.foo.com >2012-09-16T09:15:55Z DEBUG DNS record found: 0 100 123 ipa2.foo.com. >2012-09-16T09:15:55Z DEBUG DNS record found: 0 100 123 ipa.foo.com. >2012-09-16T09:16:01Z DEBUG args=/usr/sbin/ntpdate -U ntp -s -b -d ipa2.foo.com >2012-09-16T09:16:01Z DEBUG stdout=16 Sep 01:15:55 ntpdate[2981]: ntpdate 4.2.6p5@1.2349-o Tue Aug 7 20:03:25 UTC 2012 (1) >Looking for host ipa2.foo.com and service ntp >16 Sep 01:15:55 ntpdate[2981]: running as uid(38)/gid(38) euid(38)/egid(38). >transmit(66.162.103.229) >receive(66.162.103.229) >transmit(66.162.103.229) >receive(66.162.103.229) >transmit(66.162.103.229) >receive(66.162.103.229) >transmit(66.162.103.229) >receive(66.162.103.229) >server 66.162.103.229, port 123 >stratum 2, precision -23, leap 00, trust 000 >refid [66.162.103.229], delay 0.13242, dispersion 0.00014 >transmitted 4, in filter 4 >reference time: d400123c.ce787cd4 Sun, Sep 16 2012 0:54:20.806 >originate timestamp: d4001751.99619cff Sun, Sep 16 2012 1:16:01.599 >transmit timestamp: d4001751.8dbb8250 Sun, Sep 16 2012 1:16:01.553 >filter delay: 0.13324 0.13278 0.13245 0.13242 > 0.00000 0.00000 0.00000 0.00000 >filter offset: -0.00795 -0.00781 -0.00815 -0.00793 > 0.000000 0.000000 0.000000 0.000000 >delay 0.13242, dispersion 0.00014 >offset -0.007939 > >16 Sep 01:16:01 ntpdate[2981]: step time server 66.162.103.229 offset -0.007939 sec > >2012-09-16T09:16:01Z DEBUG stderr=host found : ipa2.foo.com > >2012-09-16T09:16:01Z DEBUG Writing Kerberos configuration to /tmp/tmp85CvZj: >2012-09-16T09:16:01Z DEBUG #File modified by ipa-client-install > >[libdefaults] > default_realm = FOO.COM > dns_lookup_realm = true > dns_lookup_kdc = true > rdns = false > ticket_lifetime = 24h > forwardable = yes > >[realms] > FOO.COM = { > pkinit_anchors = FILE:/etc/ipa/ca.crt > } > >[domain_realm] > .foo.com = FOO.COM > foo.com = FOO.COM > > >2012-09-16T09:16:07Z DEBUG args=kinit erinn@FOO.COM >2012-09-16T09:16:07Z DEBUG stdout=Password for erinn@FOO.COM: > >2012-09-16T09:16:07Z DEBUG stderr= >2012-09-16T09:16:13Z DEBUG args=/usr/sbin/ipa-join -s ipa.foo.com -b dc=foo,dc=com >2012-09-16T09:16:13Z DEBUG stdout= >2012-09-16T09:16:13Z DEBUG stderr=Keytab successfully retrieved and stored in: /etc/krb5.keytab >Certificate subject base is: O=FOO.COM > >2012-09-16T09:16:13Z INFO Enrolled in IPA realm FOO.COM >2012-09-16T09:16:13Z DEBUG args=kdestroy >2012-09-16T09:16:13Z DEBUG stdout= >2012-09-16T09:16:13Z DEBUG stderr= >2012-09-16T09:16:13Z DEBUG Backing up system configuration file '/etc/ipa/default.conf' >2012-09-16T09:16:13Z DEBUG Saving Index File to '/var/lib/ipa-client/sysrestore/sysrestore.index'
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 857688
: 613699 |
613794