Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 687526 Details for
Bug 904162
"Unable to sync time with IPA NTP server" while installing ipa-client on IPv6-only network
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
ipaclient-install.log
ipaclient-install.log (text/x-log), 28.93 KB, created by
Steeve Goveas
on 2013-01-25 16:08:49 UTC
(
hide
)
Description:
ipaclient-install.log
Filename:
MIME Type:
Creator:
Steeve Goveas
Created:
2013-01-25 16:08:49 UTC
Size:
28.93 KB
patch
obsolete
>[root@ratchet log]# cat ipaclient-install.log > >2013-01-25T10:25:39Z DEBUG /usr/sbin/ipa-client-install was invoked with options: {'domain': None, 'force': False, 'krb5_offline_passwords': True, 'primary': False, 'mkhomedir': False, 'create_sshfp': True, 'conf_sshd': True, 'on_master': False, 'conf_ntp': True, 'ca_cert_file': None, 'ntp_server': None, 'principal': None, 'hostname': None, 'no_ac': False, 'unattended': None, 'sssd': True, 'trust_sshfp': False, 'dns_updates': False, 'realm_name': None, 'conf_ssh': True, 'server': None, 'prompt_password': False, 'permit': False, 'debug': False, 'preserve_sssd': False, 'uninstall': False} >2013-01-25T10:25:39Z DEBUG missing options might be asked for interactively later >2013-01-25T10:25:39Z DEBUG Loading Index file from '/var/lib/ipa-client/sysrestore/sysrestore.index' >2013-01-25T10:25:39Z DEBUG Loading StateFile from '/var/lib/ipa-client/sysrestore/sysrestore.state' >2013-01-25T10:25:39Z DEBUG [IPA Discovery] >2013-01-25T10:25:39Z DEBUG Starting IPA discovery with domain=None, server=None, hostname=ratchet.testrelm.com >2013-01-25T10:25:39Z DEBUG Start searching for LDAP SRV record in "testrelm.com" (domain of the hostname) and its sub-domains >2013-01-25T10:25:39Z DEBUG Search DNS for SRV record of _ldap._tcp.testrelm.com. >2013-01-25T10:25:39Z DEBUG DNS record found: DNSResult::name:_ldap._tcp.testrelm.com.,type:33,class:1,rdata={priority:0,port:389,weight:100,server:sideswipe.testrelm.com.} >2013-01-25T10:25:39Z DEBUG [Kerberos realm search] >2013-01-25T10:25:39Z DEBUG Search DNS for TXT record of _kerberos.testrelm.com. >2013-01-25T10:25:39Z DEBUG DNS record found: DNSResult::name:_kerberos.testrelm.com.,type:16,class:1,rdata={data:TESTRELM.COM} >2013-01-25T10:25:39Z DEBUG Search DNS for SRV record of _kerberos._udp.testrelm.com. >2013-01-25T10:25:39Z DEBUG DNS record found: DNSResult::name:_kerberos._udp.testrelm.com.,type:33,class:1,rdata={priority:0,port:88,weight:100,server:sideswipe.testrelm.com.} >2013-01-25T10:25:39Z DEBUG [LDAP server check] >2013-01-25T10:25:39Z DEBUG Verifying that sideswipe.testrelm.com (realm TESTRELM.COM) is an IPA server >2013-01-25T10:25:39Z DEBUG Init LDAP connection with: ldap://sideswipe.testrelm.com:389 >2013-01-25T10:25:39Z DEBUG Search LDAP server for IPA base DN >2013-01-25T10:25:39Z DEBUG Check if naming context 'dc=testrelm,dc=com' is for IPA >2013-01-25T10:25:39Z DEBUG Naming context 'dc=testrelm,dc=com' is a valid IPA context >2013-01-25T10:25:39Z DEBUG Search for (objectClass=krbRealmContainer) in dc=testrelm,dc=com (sub) >2013-01-25T10:25:39Z DEBUG Found: cn=TESTRELM.COM,cn=kerberos,dc=testrelm,dc=com >2013-01-25T10:25:39Z DEBUG Discovery result: Success; server=sideswipe.testrelm.com, domain=testrelm.com, kdc=sideswipe.testrelm.com, basedn=dc=testrelm,dc=com >2013-01-25T10:25:39Z DEBUG will use discovered domain: testrelm.com >2013-01-25T10:25:39Z DEBUG Start searching for LDAP SRV record in "testrelm.com" (Validating DNS Discovery) and its sub-domains >2013-01-25T10:25:39Z DEBUG Search DNS for SRV record of _ldap._tcp.testrelm.com. >2013-01-25T10:25:39Z DEBUG DNS record found: DNSResult::name:_ldap._tcp.testrelm.com.,type:33,class:1,rdata={priority:0,port:389,weight:100,server:sideswipe.testrelm.com.} >2013-01-25T10:25:39Z DEBUG DNS validated, enabling discovery >2013-01-25T10:25:39Z DEBUG will use discovered server: sideswipe.testrelm.com >2013-01-25T10:25:39Z INFO Discovery was successful! >2013-01-25T10:25:39Z DEBUG will use discovered realm: TESTRELM.COM >2013-01-25T10:25:39Z DEBUG will use discovered basedn: dc=testrelm,dc=com >2013-01-25T10:25:39Z INFO Hostname: ratchet.testrelm.com >2013-01-25T10:25:39Z DEBUG Hostname source: Machine's FQDN >2013-01-25T10:25:39Z INFO Realm: TESTRELM.COM >2013-01-25T10:25:39Z DEBUG Realm source: Discovered from LDAP DNS records in sideswipe.testrelm.com >2013-01-25T10:25:39Z INFO DNS Domain: testrelm.com >2013-01-25T10:25:39Z DEBUG DNS Domain source: Discovered LDAP SRV records from testrelm.com (domain of the hostname) >2013-01-25T10:25:39Z INFO IPA Server: sideswipe.testrelm.com >2013-01-25T10:25:39Z DEBUG IPA Server source: Discovered from LDAP DNS records in sideswipe.testrelm.com >2013-01-25T10:25:39Z INFO BaseDN: dc=testrelm,dc=com >2013-01-25T10:25:39Z DEBUG BaseDN source: From IPA server ldap://sideswipe.testrelm.com:389 >2013-01-25T10:25:41Z DEBUG args=/usr/sbin/ipa-rmkeytab -k /etc/krb5.keytab -r TESTRELM.COM >2013-01-25T10:25:41Z DEBUG stdout= >2013-01-25T10:25:41Z DEBUG stderr=realm not found > >2013-01-25T10:25:44Z DEBUG will use principal provided as option: admin >2013-01-25T10:25:44Z INFO Synchronizing time with KDC... >2013-01-25T10:25:44Z DEBUG Search DNS for SRV record of _ntp._udp.testrelm.com. >2013-01-25T10:25:44Z DEBUG DNS record found: DNSResult::name:_ntp._udp.testrelm.com.,type:33,class:1,rdata={priority:0,port:123,weight:100,server:sideswipe.testrelm.com.} >2013-01-25T10:25:44Z DEBUG args=/usr/sbin/ntpdate -U ntp -s -b -v sideswipe.testrelm.com >2013-01-25T10:25:44Z DEBUG stdout= >2013-01-25T10:25:44Z DEBUG stderr= >2013-01-25T10:25:44Z DEBUG args=/usr/sbin/ntpdate -U ntp -s -b -v sideswipe.testrelm.com >2013-01-25T10:25:44Z DEBUG stdout= >2013-01-25T10:25:44Z DEBUG stderr= >2013-01-25T10:25:44Z DEBUG args=/usr/sbin/ntpdate -U ntp -s -b -v sideswipe.testrelm.com >2013-01-25T10:25:44Z DEBUG stdout= >2013-01-25T10:25:44Z DEBUG stderr= >2013-01-25T10:25:44Z DEBUG args=/usr/sbin/ntpdate -U ntp -s -b -v sideswipe.testrelm.com >2013-01-25T10:25:44Z DEBUG stdout= >2013-01-25T10:25:44Z DEBUG stderr= >2013-01-25T10:25:44Z DEBUG args=/usr/sbin/ntpdate -U ntp -s -b -v sideswipe.testrelm.com >2013-01-25T10:25:44Z DEBUG stdout= >2013-01-25T10:25:44Z DEBUG stderr= >2013-01-25T10:25:44Z DEBUG args=/usr/sbin/ntpdate -U ntp -s -b -v sideswipe.testrelm.com >2013-01-25T10:25:44Z DEBUG stdout= >2013-01-25T10:25:44Z DEBUG stderr= >2013-01-25T10:25:44Z WARNING Unable to sync time with IPA NTP server, assuming the time is in sync. Please check that 123 UDP port is opened. >2013-01-25T10:25:44Z DEBUG Writing Kerberos configuration to /tmp/tmpv33N7s: >2013-01-25T10:25:44Z DEBUG #File modified by ipa-client-install > >includedir /var/lib/sss/pubconf/krb5.include.d/ > >[libdefaults] > default_realm = TESTRELM.COM > dns_lookup_realm = false > dns_lookup_kdc = false > rdns = false > ticket_lifetime = 24h > forwardable = yes > >[realms] > TESTRELM.COM = { > kdc = sideswipe.testrelm.com:88 > master_kdc = sideswipe.testrelm.com:88 > admin_server = sideswipe.testrelm.com:749 > default_domain = testrelm.com > pkinit_anchors = FILE:/etc/ipa/ca.crt > } > >[domain_realm] > .testrelm.com = TESTRELM.COM > testrelm.com = TESTRELM.COM > >2013-01-25T10:26:45Z DEBUG args=kinit admin@TESTRELM.COM >2013-01-25T10:26:45Z DEBUG stdout=Password for admin@TESTRELM.COM: > >2013-01-25T10:26:45Z DEBUG stderr= >2013-01-25T10:26:45Z DEBUG trying to retrieve CA cert via LDAP from ldap://sideswipe.testrelm.com >2013-01-25T10:26:45Z DEBUG Existing CA cert and Retrieved CA cert are identical >2013-01-25T10:26:46Z DEBUG args=/usr/sbin/ipa-join -s sideswipe.testrelm.com -b dc=testrelm,dc=com >2013-01-25T10:26:46Z DEBUG stdout= >2013-01-25T10:26:46Z DEBUG stderr=Keytab successfully retrieved and stored in: /etc/krb5.keytab >Certificate subject base is: O=TESTRELM.COM > >2013-01-25T10:26:46Z INFO Enrolled in IPA realm TESTRELM.COM >2013-01-25T10:26:46Z DEBUG args=kdestroy >2013-01-25T10:26:46Z DEBUG stdout= >2013-01-25T10:26:46Z DEBUG stderr= >2013-01-25T10:26:46Z DEBUG args=/usr/bin/kinit -k -t /etc/krb5.keytab host/ratchet.testrelm.com@TESTRELM.COM >2013-01-25T10:26:46Z DEBUG stdout= >2013-01-25T10:26:46Z DEBUG stderr= >2013-01-25T10:26:46Z DEBUG Backing up system configuration file '/etc/ipa/default.conf' >2013-01-25T10:26:46Z DEBUG -> Not backing up - '/etc/ipa/default.conf' doesn't exist >2013-01-25T10:26:46Z INFO Created /etc/ipa/default.conf >2013-01-25T10:26:46Z DEBUG importing all plugin modules in '/usr/lib/python2.6/site-packages/ipalib/plugins'... >2013-01-25T10:26:46Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/aci.py' >2013-01-25T10:26:46Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/automember.py' >2013-01-25T10:26:46Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/automount.py' >2013-01-25T10:26:46Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/baseldap.py' >2013-01-25T10:26:46Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/batch.py' >2013-01-25T10:26:46Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/cert.py' >2013-01-25T10:26:46Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/config.py' >2013-01-25T10:26:46Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/delegation.py' >2013-01-25T10:26:46Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/dns.py' >2013-01-25T10:26:47Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/group.py' >2013-01-25T10:26:47Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/hbacrule.py' >2013-01-25T10:26:47Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/hbacsvc.py' >2013-01-25T10:26:47Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/hbacsvcgroup.py' >2013-01-25T10:26:47Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/hbactest.py' >2013-01-25T10:26:47Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/host.py' >2013-01-25T10:26:47Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/hostgroup.py' >2013-01-25T10:26:47Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/idrange.py' >2013-01-25T10:26:47Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/internal.py' >2013-01-25T10:26:47Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/kerberos.py' >2013-01-25T10:26:47Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/krbtpolicy.py' >2013-01-25T10:26:47Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/migration.py' >2013-01-25T10:26:47Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/misc.py' >2013-01-25T10:26:47Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/netgroup.py' >2013-01-25T10:26:47Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/passwd.py' >2013-01-25T10:26:47Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/permission.py' >2013-01-25T10:26:47Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/ping.py' >2013-01-25T10:26:47Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/privilege.py' >2013-01-25T10:26:47Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/pwpolicy.py' >2013-01-25T10:26:47Z DEBUG args=klist -V >2013-01-25T10:26:47Z DEBUG stdout=Kerberos 5 version 1.10.3 > >2013-01-25T10:26:47Z DEBUG stderr= >2013-01-25T10:26:47Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/role.py' >2013-01-25T10:26:47Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/selfservice.py' >2013-01-25T10:26:47Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/selinuxusermap.py' >2013-01-25T10:26:47Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/service.py' >2013-01-25T10:26:47Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/sudocmd.py' >2013-01-25T10:26:47Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/sudocmdgroup.py' >2013-01-25T10:26:47Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/sudorule.py' >2013-01-25T10:26:47Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/trust.py' >2013-01-25T10:26:47Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/user.py' >2013-01-25T10:26:47Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/virtual.py' >2013-01-25T10:26:47Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/xmlclient.py' >2013-01-25T10:26:48Z DEBUG Backing up system configuration file '/etc/sssd/sssd.conf' >2013-01-25T10:26:48Z DEBUG -> Not backing up - '/etc/sssd/sssd.conf' doesn't exist >2013-01-25T10:26:48Z INFO New SSSD config will be created >2013-01-25T10:26:48Z INFO Configured /etc/sssd/sssd.conf >2013-01-25T10:26:48Z DEBUG args=/usr/bin/certutil -A -d /etc/pki/nssdb -n IPA CA -t CT,C,C -a -i /etc/ipa/ca.crt >2013-01-25T10:26:48Z DEBUG stdout= >2013-01-25T10:26:48Z DEBUG stderr= >2013-01-25T10:26:48Z DEBUG Backing up system configuration file '/etc/krb5.conf' >2013-01-25T10:26:48Z DEBUG Saving Index File to '/var/lib/ipa-client/sysrestore/sysrestore.index' >2013-01-25T10:26:48Z DEBUG Writing Kerberos configuration to /etc/krb5.conf: >2013-01-25T10:26:48Z DEBUG #File modified by ipa-client-install > >includedir /var/lib/sss/pubconf/krb5.include.d/ > >[libdefaults] > default_realm = TESTRELM.COM > dns_lookup_realm = true > dns_lookup_kdc = true > rdns = false > ticket_lifetime = 24h > forwardable = yes > >[realms] > TESTRELM.COM = { > pkinit_anchors = FILE:/etc/ipa/ca.crt > } > >[domain_realm] > .testrelm.com = TESTRELM.COM > testrelm.com = TESTRELM.COM > >2013-01-25T10:26:48Z INFO Configured /etc/krb5.conf for IPA realm TESTRELM.COM >2013-01-25T10:26:48Z DEBUG args=keyctl search @s user ipa_session_cookie:host/ratchet.testrelm.com@TESTRELM.COM >2013-01-25T10:26:48Z DEBUG stdout= >2013-01-25T10:26:48Z DEBUG stderr=keyctl_search: Required key not available > >2013-01-25T10:26:48Z DEBUG args=keyctl search @s user ipa_session_cookie:host/ratchet.testrelm.com@TESTRELM.COM >2013-01-25T10:26:48Z DEBUG stdout= >2013-01-25T10:26:48Z DEBUG stderr=keyctl_search: Required key not available > >2013-01-25T10:26:48Z DEBUG failed to find session_cookie in persistent storage for principal 'host/ratchet.testrelm.com@TESTRELM.COM' >2013-01-25T10:26:48Z INFO trying https://sideswipe.testrelm.com/ipa/xml >2013-01-25T10:26:48Z DEBUG Created connection context.xmlclient >2013-01-25T10:26:48Z DEBUG args=/sbin/service messagebus start >2013-01-25T10:26:48Z DEBUG stdout=Starting system message bus: > >2013-01-25T10:26:48Z DEBUG stderr= >2013-01-25T10:26:48Z DEBUG args=/sbin/service messagebus status >2013-01-25T10:26:48Z DEBUG stdout=messagebus (pid 1450) is running... > >2013-01-25T10:26:48Z DEBUG stderr= >2013-01-25T10:26:48Z DEBUG args=/sbin/service certmonger restart >2013-01-25T10:26:48Z DEBUG stdout=Stopping certmonger: [FAILED] >Starting certmonger: [ OK ] > >2013-01-25T10:26:48Z DEBUG stderr= >2013-01-25T10:26:48Z DEBUG args=/sbin/service certmonger status >2013-01-25T10:26:48Z DEBUG stdout=certmonger (pid 13963) is running... > >2013-01-25T10:26:48Z DEBUG stderr= >2013-01-25T10:26:48Z DEBUG args=/sbin/service certmonger restart >2013-01-25T10:26:48Z DEBUG stdout=Stopping certmonger: [ OK ] >Starting certmonger: [ OK ] > >2013-01-25T10:26:48Z DEBUG stderr= >2013-01-25T10:26:48Z DEBUG args=/sbin/service certmonger status >2013-01-25T10:26:48Z DEBUG stdout=certmonger (pid 13987) is running... > >2013-01-25T10:26:48Z DEBUG stderr= >2013-01-25T10:26:48Z DEBUG args=/sbin/chkconfig certmonger on >2013-01-25T10:26:48Z DEBUG stdout= >2013-01-25T10:26:48Z DEBUG stderr= >2013-01-25T10:26:48Z DEBUG args=ipa-getcert request -d /etc/pki/nssdb -n IPA Machine Certificate - ratchet.testrelm.com -N CN=ratchet.testrelm.com,O=TESTRELM.COM -K host/ratchet.testrelm.com@TESTRELM.COM >2013-01-25T10:26:48Z DEBUG stdout=New signing request "20130125102648" added. > >2013-01-25T10:26:48Z DEBUG stderr= >2013-01-25T10:26:48Z INFO Adding SSH public key from /etc/ssh/ssh_host_dsa_key.pub >2013-01-25T10:26:48Z INFO Adding SSH public key from /etc/ssh/ssh_host_rsa_key.pub >2013-01-25T10:26:48Z DEBUG raw: host_mod(u'ratchet.testrelm.com', ipasshpubkey=[u'ssh-dss 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', u'ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEA9nsxbs+6xIh0fBvSFD+BB/IJpI4szgXd9skj/tKBF2EiExasHbkNhP7k4WcrjLI+YBo4a9mq+TYo4ySezcyYUDrsSOkTsVt2/umc0N2kXsKgQyDXXx83KkD/RehkznqpWI+JX319d9Jx0XPaprScjzgngK8T14wES0inRa5opeXZ5UUqzidxQmhX3C18MDkHgWc9mmb0qYjGhTOTZYwoeCf0tadg60iprH3iGle8HR6/XL1aResinie6mqoqBvjKpGUFCJJgqr81s1IF26nJPx7QEDI0avaFu6+iJRea9Rup+ipc6zPaLkBr2NgLNfJ2SMeyP3BrtcG1Eze7uwsgTQ=='], updatedns=False) >2013-01-25T10:26:48Z DEBUG host_mod(u'ratchet.testrelm.com', random=False, ipasshpubkey=(u'ssh-dss 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', u'ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEA9nsxbs+6xIh0fBvSFD+BB/IJpI4szgXd9skj/tKBF2EiExasHbkNhP7k4WcrjLI+YBo4a9mq+TYo4ySezcyYUDrsSOkTsVt2/umc0N2kXsKgQyDXXx83KkD/RehkznqpWI+JX319d9Jx0XPaprScjzgngK8T14wES0inRa5opeXZ5UUqzidxQmhX3C18MDkHgWc9mmb0qYjGhTOTZYwoeCf0tadg60iprH3iGle8HR6/XL1aResinie6mqoqBvjKpGUFCJJgqr81s1IF26nJPx7QEDI0avaFu6+iJRea9Rup+ipc6zPaLkBr2NgLNfJ2SMeyP3BrtcG1Eze7uwsgTQ=='), rights=False, updatedns=False, all=False, raw=False) >2013-01-25T10:26:48Z INFO Forwarding 'host_mod' to server u'https://sideswipe.testrelm.com/ipa/xml' >2013-01-25T10:26:48Z DEBUG NSSConnection init sideswipe.testrelm.com >2013-01-25T10:26:48Z DEBUG Connecting: [2620:52:0:41ce:5054:ff:fe3b:c68b]:0 >2013-01-25T10:26:48Z DEBUG auth_certificate_callback: check_sig=True is_server=False >Data: > Version: 3 (0x2) > Serial Number: 10 (0xa) > Signature Algorithm: > Algorithm: PKCS #1 SHA-256 With RSA Encryption > Issuer: CN=Certificate Authority,O=TESTRELM.COM > Validity: > Not Before: Thu Jan 24 10:46:01 2013 UTC > Not After: Sun Jan 25 10:46:01 2015 UTC > Subject: CN=sideswipe.testrelm.com,O=TESTRELM.COM > Subject Public Key Info: > Public Key Algorithm: > Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > c9:e3:2c:c3:08:01:82:ed:6a:f8:3e:4d:20:d0:1a:7d: > 62:8e:fc:ba:bd:84:cd:11:1a:92:2b:d7:bd:b2:62:20: > f8:86:a8:62:17:5f:66:65:ae:45:be:14:8d:ec:6c:11: > 09:07:2e:fe:f3:ee:42:49:bc:73:d4:c1:5c:ed:07:b3: > 8b:2d:0e:68:15:42:fb:d6:d5:be:dc:09:b2:11:2c:34: > 28:61:22:40:62:32:33:c3:5a:28:1b:3f:7d:e9:e2:73: > 93:1c:40:69:bd:90:36:40:4d:28:ef:4e:a3:3c:d5:3f: > 30:e9:53:be:59:fe:5b:f1:5f:91:73:4d:e9:93:81:81: > 86:0b:3f:b9:f5:8a:54:48:fe:bf:f2:fa:43:19:1d:aa: > 4c:46:f1:4f:3b:b9:2b:36:c0:8b:ab:35:c8:18:40:10: > f9:d6:b2:34:19:cb:b5:f9:97:1a:a6:6e:d9:db:68:37: > ab:ee:1a:fe:46:5c:9d:df:32:b9:9a:1f:75:e5:62:e2: > f7:2c:52:a9:0b:94:61:6b:f9:6c:a1:91:68:09:c4:6f: > 68:dd:4f:a0:6b:be:39:f1:64:99:01:b3:39:5d:a3:0c: > 3b:c7:73:c8:dd:fe:f8:30:ea:74:d2:9d:3c:7d:c7:9a: > 84:f8:e4:dd:6e:af:f7:ab:9d:ec:a7:8d:66:82:e2:71 > Exponent: > 65537 (0x10001) > Signed Extensions: (5) > Name: Certificate Authority Key Identifier > Critical: False > Key ID: > 47:62:bf:1d:3c:d1:f5:3d:35:62:e5:e9:82:23:2f:45: > 10:42:f7:fb > Serial Number: None > General Names: [0 total] > > Name: Authority Information Access > Critical: False > > Name: Certificate Key Usage > Critical: True > Usages: > Digital Signature > Non-Repudiation > Key Encipherment > Data Encipherment > > Name: Extended Key Usage > Critical: False > Usages: > TLS Web Server Authentication Certificate > TLS Web Client Authentication Certificate > > Name: Certificate Subject Key ID > Critical: False > Data: > 5b:82:c4:28:46:f9:c0:29:73:13:c0:dc:f2:fe:37:4c: > 9d:9f:6b:b4 > > Signature: > Signature Algorithm: > Algorithm: PKCS #1 SHA-256 With RSA Encryption > Signature: > 20:ec:c8:2d:ec:f0:34:9d:5b:0e:8d:ee:df:66:12:c1: > c2:84:3b:e5:98:be:b1:74:0a:54:e1:a7:6d:96:da:b9: > 78:2d:b6:8c:ac:f8:46:00:5f:50:7e:c0:ae:45:99:6a: > a5:ec:34:d4:65:cb:5d:8b:2d:9e:a4:80:26:0d:0b:66: > 9e:b0:05:c2:84:2a:9e:2f:05:6d:80:0c:4a:d4:52:bd: > 9d:f1:39:06:4b:73:89:5c:a5:b2:e5:24:55:2b:d7:62: > da:de:23:c0:cb:14:85:16:fe:30:ca:a6:e7:94:80:22: > 87:a2:43:f0:9b:a2:05:9b:bb:a7:0c:1d:35:7e:63:d0: > 11:15:a4:58:f9:c6:97:13:92:98:f0:a6:e8:e8:e3:e4: > 02:85:4d:43:89:db:3b:5b:20:c8:b4:e3:3f:7d:2a:3e: > 40:6c:38:4c:7e:96:ca:19:30:5b:60:21:cf:df:67:2d: > 89:4d:7c:3f:8f:e2:9d:df:31:55:dc:4c:eb:78:e5:f3: > 56:12:33:23:e0:33:5c:8b:9a:9d:f4:89:62:94:92:0c: > 88:68:7f:c2:bc:eb:b0:39:99:b7:52:88:21:62:d7:3b: > 2f:84:0a:0c:2b:2d:9a:a0:33:f4:8e:aa:e7:38:b3:85: > d9:f7:ae:52:e4:14:f8:e6:95:dc:95:97:c5:b0:da:e0 > Fingerprint (MD5): > 57:54:9f:c6:ec:f1:3f:bc:7c:68:d1:77:51:27:d4:b3 > Fingerprint (SHA1): > 62:d5:ec:a9:3b:56:7e:36:64:5b:5e:f7:70:38:fe:36: > 1d:05:5f:c1 >2013-01-25T10:26:48Z DEBUG approved_usage = SSLServer intended_usage = SSLServer >2013-01-25T10:26:48Z DEBUG cert valid True for "CN=sideswipe.testrelm.com,O=TESTRELM.COM" >2013-01-25T10:26:48Z DEBUG handshake complete, peer = [2620:52:0:41ce:5054:ff:fe3b:c68b]:443 >2013-01-25T10:26:48Z DEBUG received Set-Cookie 'ipa_session=59e31b07b83f4e217463917378026a02; Domain=sideswipe.testrelm.com; Path=/ipa; Expires=Fri, 25 Jan 2013 10:46:32 GMT; Secure; HttpOnly' >2013-01-25T10:26:48Z DEBUG storing cookie 'ipa_session=59e31b07b83f4e217463917378026a02; Domain=sideswipe.testrelm.com; Path=/ipa; Expires=Fri, 25 Jan 2013 10:46:32 GMT; Secure; HttpOnly' for principal host/ratchet.testrelm.com@TESTRELM.COM >2013-01-25T10:26:48Z DEBUG args=keyctl search @s user ipa_session_cookie:host/ratchet.testrelm.com@TESTRELM.COM >2013-01-25T10:26:48Z DEBUG stdout= >2013-01-25T10:26:48Z DEBUG stderr=keyctl_search: Required key not available > >2013-01-25T10:26:48Z DEBUG args=keyctl search @s user ipa_session_cookie:host/ratchet.testrelm.com@TESTRELM.COM >2013-01-25T10:26:48Z DEBUG stdout= >2013-01-25T10:26:48Z DEBUG stderr=keyctl_search: Required key not available > >2013-01-25T10:26:48Z DEBUG args=keyctl padd user ipa_session_cookie:host/ratchet.testrelm.com@TESTRELM.COM @s >2013-01-25T10:26:48Z DEBUG stdout=378853636 > >2013-01-25T10:26:48Z DEBUG stderr= >2013-01-25T10:26:48Z DEBUG Caught fault 4202 from server https://sideswipe.testrelm.com/ipa/xml: no modifications to be performed >2013-01-25T10:26:48Z DEBUG Writing nsupdate commands to /etc/ipa/.dns_update.txt: >2013-01-25T10:26:48Z DEBUG zone testrelm.com. >update delete ratchet.testrelm.com. IN SSHFP >send >update add ratchet.testrelm.com. 1200 IN SSHFP 2 1 930649CD612878CF654D8693918DC9CDA44636A9 >update add ratchet.testrelm.com. 1200 IN SSHFP 1 1 F64C6FAFAADC0494E92567F164A32B05EC613E06 >send > >2013-01-25T10:26:49Z DEBUG args=/usr/bin/nsupdate -g /etc/ipa/.dns_update.txt >2013-01-25T10:26:49Z DEBUG stdout= >2013-01-25T10:26:49Z DEBUG stderr= >2013-01-25T10:26:49Z DEBUG args=/sbin/service nscd status >2013-01-25T10:26:49Z DEBUG stdout= >2013-01-25T10:26:49Z DEBUG stderr=nscd: unrecognized service > >2013-01-25T10:26:49Z DEBUG Saving StateFile to '/var/lib/ipa-client/sysrestore/sysrestore.state' >2013-01-25T10:26:49Z DEBUG Saving StateFile to '/var/lib/ipa-client/sysrestore/sysrestore.state' >2013-01-25T10:26:50Z DEBUG args=/usr/sbin/authconfig --enablesssdauth --update --enablesssd >2013-01-25T10:26:50Z DEBUG stdout= >2013-01-25T10:26:50Z DEBUG stderr= >2013-01-25T10:26:50Z INFO SSSD enabled >2013-01-25T10:26:51Z DEBUG args=/sbin/service sssd restart >2013-01-25T10:26:51Z DEBUG stdout=Stopping sssd: [FAILED] >Starting sssd: [ OK ] > >2013-01-25T10:26:51Z DEBUG stderr=cat: /var/run/sssd.pid: No such file or directory > >2013-01-25T10:26:51Z DEBUG args=/sbin/service sssd status >2013-01-25T10:26:51Z DEBUG stdout=sssd (pid 14059) is running... > >2013-01-25T10:26:51Z DEBUG stderr= >2013-01-25T10:26:51Z DEBUG args=/sbin/chkconfig sssd on >2013-01-25T10:26:51Z DEBUG stdout= >2013-01-25T10:26:51Z DEBUG stderr= >2013-01-25T10:26:51Z DEBUG Backing up system configuration file '/etc/openldap/ldap.conf' >2013-01-25T10:26:51Z DEBUG Saving Index File to '/var/lib/ipa-client/sysrestore/sysrestore.index' >2013-01-25T10:26:51Z INFO Configured /etc/openldap/ldap.conf >2013-01-25T10:26:51Z DEBUG args=getent passwd admin >2013-01-25T10:26:51Z DEBUG stdout=admin:*:423400000:423400000:Administrator:/home/admin:/bin/bash > >2013-01-25T10:26:51Z DEBUG stderr= >2013-01-25T10:26:51Z DEBUG Backing up system configuration file '/etc/ntp/step-tickers' >2013-01-25T10:26:51Z DEBUG Saving Index File to '/var/lib/ipa-client/sysrestore/sysrestore.index' >2013-01-25T10:26:51Z DEBUG args=/usr/sbin/selinuxenabled >2013-01-25T10:26:51Z DEBUG stdout= >2013-01-25T10:26:51Z DEBUG stderr= >2013-01-25T10:26:51Z DEBUG args=/sbin/restorecon /etc/ntp/step-tickers >2013-01-25T10:26:51Z DEBUG stdout= >2013-01-25T10:26:51Z DEBUG stderr= >2013-01-25T10:26:51Z DEBUG args=/sbin/chkconfig ntpd >2013-01-25T10:26:51Z DEBUG stdout= >2013-01-25T10:26:51Z DEBUG stderr= >2013-01-25T10:26:51Z DEBUG Saving StateFile to '/var/lib/ipa-client/sysrestore/sysrestore.state' >2013-01-25T10:26:51Z DEBUG Saving StateFile to '/var/lib/ipa-client/sysrestore/sysrestore.state' >2013-01-25T10:26:51Z DEBUG Backing up system configuration file '/etc/ntp.conf' >2013-01-25T10:26:51Z DEBUG Saving Index File to '/var/lib/ipa-client/sysrestore/sysrestore.index' >2013-01-25T10:26:51Z DEBUG args=/usr/sbin/selinuxenabled >2013-01-25T10:26:51Z DEBUG stdout= >2013-01-25T10:26:51Z DEBUG stderr= >2013-01-25T10:26:51Z DEBUG args=/sbin/restorecon /etc/ntp.conf >2013-01-25T10:26:51Z DEBUG stdout= >2013-01-25T10:26:51Z DEBUG stderr= >2013-01-25T10:26:51Z DEBUG Backing up system configuration file '/etc/sysconfig/ntpd' >2013-01-25T10:26:51Z DEBUG Saving Index File to '/var/lib/ipa-client/sysrestore/sysrestore.index' >2013-01-25T10:26:51Z DEBUG args=/usr/sbin/selinuxenabled >2013-01-25T10:26:51Z DEBUG stdout= >2013-01-25T10:26:51Z DEBUG stderr= >2013-01-25T10:26:52Z DEBUG args=/sbin/restorecon /etc/sysconfig/ntpd >2013-01-25T10:26:52Z DEBUG stdout= >2013-01-25T10:26:52Z DEBUG stderr= >2013-01-25T10:26:52Z DEBUG args=/sbin/chkconfig ntpd on >2013-01-25T10:26:52Z DEBUG stdout= >2013-01-25T10:26:52Z DEBUG stderr= >2013-01-25T10:26:52Z DEBUG args=/sbin/service ntpd restart >2013-01-25T10:26:52Z DEBUG stdout=Shutting down ntpd: [ OK ] >Starting ntpd: [ OK ] > >2013-01-25T10:26:52Z DEBUG stderr= >2013-01-25T10:26:52Z DEBUG args=/sbin/service ntpd status >2013-01-25T10:26:52Z DEBUG stdout=ntpd (pid 14099) is running... > >2013-01-25T10:26:52Z DEBUG stderr= >2013-01-25T10:26:52Z INFO NTP enabled >2013-01-25T10:26:52Z DEBUG Backing up system configuration file '/etc/ssh/ssh_config' >2013-01-25T10:26:52Z DEBUG Saving Index File to '/var/lib/ipa-client/sysrestore/sysrestore.index' >2013-01-25T10:26:52Z INFO Configured /etc/ssh/ssh_config >2013-01-25T10:26:52Z DEBUG Backing up system configuration file '/etc/ssh/sshd_config' >2013-01-25T10:26:52Z DEBUG Saving Index File to '/var/lib/ipa-client/sysrestore/sysrestore.index' >2013-01-25T10:26:52Z DEBUG args=sshd -t -f /dev/null -o AuthorizedKeysCommand= >2013-01-25T10:26:52Z DEBUG stdout= >2013-01-25T10:26:52Z DEBUG stderr= >2013-01-25T10:26:52Z INFO Configured /etc/ssh/sshd_config >2013-01-25T10:26:52Z DEBUG args=/sbin/service sshd status >2013-01-25T10:26:52Z DEBUG stdout=openssh-daemon (pid 13891) is running... > >2013-01-25T10:26:52Z DEBUG stderr= >2013-01-25T10:26:52Z DEBUG args=/sbin/service sshd restart >2013-01-25T10:26:52Z DEBUG stdout=Stopping sshd: [ OK ] >Starting sshd: [ OK ] > >2013-01-25T10:26:52Z DEBUG stderr= >2013-01-25T10:26:52Z DEBUG args=/sbin/service sshd status >2013-01-25T10:26:52Z DEBUG stdout=openssh-daemon (pid 14138) is running... > >2013-01-25T10:26:52Z DEBUG stderr= >2013-01-25T10:26:52Z INFO Client configuration complete.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 904162
: 687526 |
687527
|
687529
|
687532