Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 690917 Details for
Bug 906363
ipa-client-install succeeds but the client is not functional
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
ipa-client installation log
ipaclient-install.log (text/plain), 25.43 KB, created by
Maxim Egorushkin
on 2013-01-31 14:09:10 UTC
(
hide
)
Description:
ipa-client installation log
Filename:
MIME Type:
Creator:
Maxim Egorushkin
Created:
2013-01-31 14:09:10 UTC
Size:
25.43 KB
patch
obsolete
>2013-01-31T13:35:26Z DEBUG /usr/sbin/ipa-client-install was invoked with options: {'domain': 'xyz.com', 'force': False, 'krb5_offline_passwords': True, 'primary': False, 'mkhomedir': True, 'create_sshfp': False, 'conf_sshd': True, 'on_master': False, 'conf_ntp': False, 'ntp_server': None, 'principal': None, 'hostname': None, 'no_ac': False, 'unattended': None, 'sssd': True, 'trust_sshfp': False, 'dns_updates': False, 'realm_name': None, 'conf_ssh': True, 'server': ['linux01.xyz.com'], 'prompt_password': False, 'permit': False, 'debug': False, 'preserve_sssd': False, 'uninstall': False} >2013-01-31T13:35:26Z DEBUG missing options might be asked for interactively later >2013-01-31T13:35:26Z DEBUG Loading Index file from '/var/lib/ipa-client/sysrestore/sysrestore.index' >2013-01-31T13:35:26Z DEBUG Loading StateFile from '/var/lib/ipa-client/sysrestore/sysrestore.state' >2013-01-31T13:35:26Z DEBUG [IPA Discovery] >2013-01-31T13:35:26Z DEBUG Starting IPA discovery with domain=xyz.com, server=['linux01.xyz.com'], hostname=fixnetixmd.xyz.com >2013-01-31T13:35:26Z DEBUG Server and domain forced >2013-01-31T13:35:26Z DEBUG [Kerberos realm search] >2013-01-31T13:35:26Z DEBUG Search DNS for TXT record of _kerberos.xyz.com. >2013-01-31T13:35:26Z DEBUG No DNS record found >2013-01-31T13:35:26Z DEBUG [LDAP server check] >2013-01-31T13:35:26Z DEBUG Verifying that linux01.xyz.com (realm None) is an IPA server >2013-01-31T13:35:26Z DEBUG args=/usr/bin/wget -O /tmp/tmpSxohxr/ca.crt -T 15 -t 2 http://linux01.xyz.com/ipa/config/ca.crt >2013-01-31T13:35:26Z DEBUG stdout= >2013-01-31T13:35:26Z DEBUG stderr=--2013-01-31 13:35:26-- http://linux01.xyz.com/ipa/config/ca.crt >Resolving linux01.xyz.com... 10.0.0.135 >Connecting to linux01.xyz.com|10.0.0.135|:80... connected. >HTTP request sent, awaiting response... 200 OK >Length: 1361 (1.3K) [application/x-x509-ca-cert] >Saving to: â/tmp/tmpSxohxr/ca.crtâ > > 0K . 100% 159M=0s > >2013-01-31 13:35:26 (159 MB/s) - â/tmp/tmpSxohxr/ca.crtâ saved [1361/1361] > > >2013-01-31T13:35:26Z DEBUG Init LDAP connection with: ldap://linux01.xyz.com:389 >2013-01-31T13:35:26Z DEBUG Search LDAP server for IPA base DN >2013-01-31T13:35:26Z DEBUG Check if naming context 'dc=xyz,dc=com' is for IPA >2013-01-31T13:35:26Z DEBUG Naming context 'dc=xyz,dc=com' is a valid IPA context >2013-01-31T13:35:26Z DEBUG Search for (objectClass=krbRealmContainer) in dc=xyz,dc=com (sub) >2013-01-31T13:35:26Z DEBUG Found: cn=XYZ.COM,cn=kerberos,dc=xyz,dc=com >2013-01-31T13:35:26Z DEBUG Discovery result: Success; server=linux01.xyz.com, domain=xyz.com, kdc=None, basedn=dc=xyz,dc=com >2013-01-31T13:35:26Z DEBUG will use discovered domain: xyz.com >2013-01-31T13:35:26Z DEBUG Using servers from command line, disabling DNS discovery >2013-01-31T13:35:26Z DEBUG will use provided server: linux01.xyz.com >2013-01-31T13:35:26Z INFO Autodiscovery of servers for failover cannot work with this configuration. >2013-01-31T13:35:26Z INFO If you proceed with the installation, services will be configured to always access the discovered server for all operations and will not fail over to other servers in case of failure. >2013-01-31T13:35:28Z DEBUG will use discovered realm: XYZ.COM >2013-01-31T13:35:28Z DEBUG will use discovered basedn: dc=xyz,dc=com >2013-01-31T13:35:28Z INFO Hostname: fixnetixmd.xyz.com >2013-01-31T13:35:28Z DEBUG Hostname source: Machine's FQDN >2013-01-31T13:35:28Z INFO Realm: XYZ.COM >2013-01-31T13:35:28Z DEBUG Realm source: Discovered from LDAP DNS records in linux01.xyz.com >2013-01-31T13:35:28Z INFO DNS Domain: xyz.com >2013-01-31T13:35:28Z DEBUG DNS Domain source: Forced >2013-01-31T13:35:28Z INFO IPA Server: linux01.xyz.com >2013-01-31T13:35:28Z DEBUG IPA Server source: Provided as option >2013-01-31T13:35:28Z INFO BaseDN: dc=xyz,dc=com >2013-01-31T13:35:28Z DEBUG BaseDN source: From IPA server ldap://linux01.xyz.com:389 >2013-01-31T13:35:33Z DEBUG args=/usr/sbin/ipa-rmkeytab -k /etc/krb5.keytab -r XYZ.COM >2013-01-31T13:35:33Z DEBUG stdout= >2013-01-31T13:35:33Z DEBUG stderr=realm not found > >2013-01-31T13:35:38Z DEBUG will use principal provided as option: admin >2013-01-31T13:35:38Z DEBUG args=/usr/bin/wget -O /etc/ipa/ca.crt http://linux01.xyz.com/ipa/config/ca.crt >2013-01-31T13:35:38Z DEBUG stdout= >2013-01-31T13:35:38Z DEBUG stderr=--2013-01-31 13:35:38-- http://linux01.xyz.com/ipa/config/ca.crt >Resolving linux01.xyz.com... 10.0.0.135 >Connecting to linux01.xyz.com|10.0.0.135|:80... connected. >HTTP request sent, awaiting response... 200 OK >Length: 1361 (1.3K) [application/x-x509-ca-cert] >Saving to: â/etc/ipa/ca.crtâ > > 0K . 100% 142M=0s > >2013-01-31 13:35:38 (142 MB/s) - â/etc/ipa/ca.crtâ saved [1361/1361] > > >2013-01-31T13:35:38Z INFO Synchronizing time with KDC... >2013-01-31T13:35:38Z DEBUG Search DNS for SRV record of _ntp._udp.xyz.com. >2013-01-31T13:35:38Z DEBUG No DNS record found >2013-01-31T13:35:39Z DEBUG args=/usr/sbin/ntpdate -U ntp -s -b -v linux01.xyz.com >2013-01-31T13:35:39Z DEBUG stdout= >2013-01-31T13:35:39Z DEBUG stderr= >2013-01-31T13:35:39Z DEBUG Writing Kerberos configuration to /tmp/tmpmR5SaP: >2013-01-31T13:35:39Z DEBUG #File modified by ipa-client-install > >[libdefaults] > default_realm = XYZ.COM > dns_lookup_realm = false > dns_lookup_kdc = false > rdns = false > ticket_lifetime = 24h > forwardable = yes > >[realms] > XYZ.COM = { > kdc = linux01.xyz.com:88 > master_kdc = linux01.xyz.com:88 > admin_server = linux01.xyz.com:749 > default_domain = xyz.com > pkinit_anchors = FILE:/etc/ipa/ca.crt > } > >[domain_realm] > .xyz.com = XYZ.COM > xyz.com = XYZ.COM > >2013-01-31T13:35:47Z DEBUG args=kinit admin@XYZ.COM >2013-01-31T13:35:47Z DEBUG stdout=Password for admin@XYZ.COM: > >2013-01-31T13:35:47Z DEBUG stderr= >2013-01-31T13:35:47Z DEBUG args=/usr/sbin/ipa-join -s linux01.xyz.com -b dc=xyz,dc=com >2013-01-31T13:35:47Z DEBUG stdout= >2013-01-31T13:35:47Z DEBUG stderr=Keytab successfully retrieved and stored in: /etc/krb5.keytab >Certificate subject base is: O=XYZ.COM > >2013-01-31T13:35:47Z INFO Enrolled in IPA realm XYZ.COM >2013-01-31T13:35:47Z DEBUG args=kdestroy >2013-01-31T13:35:47Z DEBUG stdout= >2013-01-31T13:35:47Z DEBUG stderr= >2013-01-31T13:35:47Z DEBUG args=/usr/bin/kinit -k -t /etc/krb5.keytab host/fixnetixmd.xyz.com@XYZ.COM >2013-01-31T13:35:47Z DEBUG stdout= >2013-01-31T13:35:47Z DEBUG stderr= >2013-01-31T13:35:47Z DEBUG Backing up system configuration file '/etc/ipa/default.conf' >2013-01-31T13:35:47Z DEBUG -> Not backing up - '/etc/ipa/default.conf' doesn't exist >2013-01-31T13:35:47Z INFO Created /etc/ipa/default.conf >2013-01-31T13:35:47Z DEBUG importing all plugin modules in '/usr/lib/python2.6/site-packages/ipalib/plugins'... >2013-01-31T13:35:47Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/aci.py' >2013-01-31T13:35:47Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/automember.py' >2013-01-31T13:35:47Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/automount.py' >2013-01-31T13:35:47Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/baseldap.py' >2013-01-31T13:35:47Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/batch.py' >2013-01-31T13:35:47Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/cert.py' >2013-01-31T13:35:48Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/config.py' >2013-01-31T13:35:48Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/delegation.py' >2013-01-31T13:35:48Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/dns.py' >2013-01-31T13:35:48Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/group.py' >2013-01-31T13:35:48Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/hbacrule.py' >2013-01-31T13:35:48Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/hbacsvc.py' >2013-01-31T13:35:48Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/hbacsvcgroup.py' >2013-01-31T13:35:48Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/hbactest.py' >2013-01-31T13:35:48Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/host.py' >2013-01-31T13:35:48Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/hostgroup.py' >2013-01-31T13:35:48Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/idrange.py' >2013-01-31T13:35:48Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/internal.py' >2013-01-31T13:35:48Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/kerberos.py' >2013-01-31T13:35:48Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/krbtpolicy.py' >2013-01-31T13:35:48Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/migration.py' >2013-01-31T13:35:48Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/misc.py' >2013-01-31T13:35:48Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/netgroup.py' >2013-01-31T13:35:48Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/passwd.py' >2013-01-31T13:35:48Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/permission.py' >2013-01-31T13:35:48Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/ping.py' >2013-01-31T13:35:48Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/privilege.py' >2013-01-31T13:35:48Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/pwpolicy.py' >2013-01-31T13:35:48Z DEBUG args=klist -V >2013-01-31T13:35:48Z DEBUG stdout=Kerberos 5 version 1.10.3 > >2013-01-31T13:35:48Z DEBUG stderr= >2013-01-31T13:35:48Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/role.py' >2013-01-31T13:35:48Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/selfservice.py' >2013-01-31T13:35:48Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/selinuxusermap.py' >2013-01-31T13:35:48Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/service.py' >2013-01-31T13:35:48Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/sudocmd.py' >2013-01-31T13:35:48Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/sudocmdgroup.py' >2013-01-31T13:35:48Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/sudorule.py' >2013-01-31T13:35:48Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/trust.py' >2013-01-31T13:35:48Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/user.py' >2013-01-31T13:35:48Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/virtual.py' >2013-01-31T13:35:48Z DEBUG importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/xmlclient.py' >2013-01-31T13:35:49Z DEBUG Backing up system configuration file '/etc/sssd/sssd.conf' >2013-01-31T13:35:49Z DEBUG -> Not backing up - '/etc/sssd/sssd.conf' doesn't exist >2013-01-31T13:35:49Z INFO New SSSD config will be created >2013-01-31T13:35:49Z INFO Configured /etc/sssd/sssd.conf >2013-01-31T13:35:49Z DEBUG args=/usr/bin/certutil -A -d /etc/pki/nssdb -n IPA CA -t CT,C,C -a -i /etc/ipa/ca.crt >2013-01-31T13:35:49Z DEBUG stdout= >2013-01-31T13:35:49Z DEBUG stderr= >2013-01-31T13:35:49Z DEBUG Backing up system configuration file '/etc/krb5.conf' >2013-01-31T13:35:49Z DEBUG Saving Index File to '/var/lib/ipa-client/sysrestore/sysrestore.index' >2013-01-31T13:35:49Z DEBUG Writing Kerberos configuration to /etc/krb5.conf: >2013-01-31T13:35:49Z DEBUG #File modified by ipa-client-install > >[libdefaults] > default_realm = XYZ.COM > dns_lookup_realm = false > dns_lookup_kdc = false > rdns = false > ticket_lifetime = 24h > forwardable = yes > >[realms] > XYZ.COM = { > kdc = linux01.xyz.com:88 > master_kdc = linux01.xyz.com:88 > admin_server = linux01.xyz.com:749 > default_domain = xyz.com > pkinit_anchors = FILE:/etc/ipa/ca.crt > } > >[domain_realm] > .xyz.com = XYZ.COM > xyz.com = XYZ.COM > >2013-01-31T13:35:49Z INFO Configured /etc/krb5.conf for IPA realm XYZ.COM >2013-01-31T13:35:49Z DEBUG args=keyctl search @s user ipa_session_cookie:host/fixnetixmd.xyz.com@XYZ.COM >2013-01-31T13:35:49Z DEBUG stdout= >2013-01-31T13:35:49Z DEBUG stderr=keyctl_search: Required key not available > >2013-01-31T13:35:49Z DEBUG args=keyctl search @s user ipa_session_cookie:host/fixnetixmd.xyz.com@XYZ.COM >2013-01-31T13:35:49Z DEBUG stdout= >2013-01-31T13:35:49Z DEBUG stderr=keyctl_search: Required key not available > >2013-01-31T13:35:49Z INFO trying https://linux01.xyz.com/ipa/xml >2013-01-31T13:35:49Z DEBUG Created connection context.xmlclient >2013-01-31T13:35:49Z WARNING Hostname (fixnetixmd.xyz.com) not found in DNS >2013-01-31T13:35:49Z DEBUG Writing nsupdate commands to /etc/ipa/.dns_update.txt: >2013-01-31T13:35:49Z DEBUG >zone xyz.com. >update delete fixnetixmd.xyz.com. IN A >send >update add fixnetixmd.xyz.com. 1200 IN A 10.128.82.132 >send > >2013-01-31T13:36:09Z DEBUG args=/usr/bin/nsupdate -g /etc/ipa/.dns_update.txt >2013-01-31T13:36:09Z DEBUG stdout= >2013-01-31T13:36:09Z DEBUG stderr=; Communication with 127.0.0.1#53 failed: timed out >could not talk to any default name server > >2013-01-31T13:36:09Z DEBUG nsupdate failed: Command '/usr/bin/nsupdate -g /etc/ipa/.dns_update.txt' returned non-zero exit status 1 >2013-01-31T13:36:09Z ERROR Failed to update DNS records. >2013-01-31T13:36:09Z DEBUG args=/sbin/service messagebus start >2013-01-31T13:36:09Z DEBUG stdout=Starting system message bus: > >2013-01-31T13:36:09Z DEBUG stderr= >2013-01-31T13:36:09Z DEBUG args=/sbin/service messagebus status >2013-01-31T13:36:09Z DEBUG stdout=messagebus (pid 1521) is running... > >2013-01-31T13:36:09Z DEBUG stderr= >2013-01-31T13:36:09Z DEBUG args=/sbin/service certmonger restart >2013-01-31T13:36:09Z DEBUG stdout=Stopping certmonger: [60G[[0;31mFAILED[0;39m] >Starting certmonger: [60G[[0;32m OK [0;39m] > >2013-01-31T13:36:09Z DEBUG stderr= >2013-01-31T13:36:09Z DEBUG args=/sbin/service certmonger status >2013-01-31T13:36:09Z DEBUG stdout=certmonger (pid 1968) is running... > >2013-01-31T13:36:09Z DEBUG stderr= >2013-01-31T13:36:09Z DEBUG args=/sbin/service certmonger restart >2013-01-31T13:36:09Z DEBUG stdout=Stopping certmonger: [60G[[0;32m OK [0;39m] >Starting certmonger: [60G[[0;32m OK [0;39m] > >2013-01-31T13:36:09Z DEBUG stderr= >2013-01-31T13:36:09Z DEBUG args=/sbin/service certmonger status >2013-01-31T13:36:09Z DEBUG stdout=certmonger (pid 2019) is running... > >2013-01-31T13:36:09Z DEBUG stderr= >2013-01-31T13:36:09Z DEBUG args=/sbin/chkconfig certmonger on >2013-01-31T13:36:09Z DEBUG stdout= >2013-01-31T13:36:09Z DEBUG stderr= >2013-01-31T13:36:09Z DEBUG args=ipa-getcert request -d /etc/pki/nssdb -n IPA Machine Certificate - fixnetixmd.xyz.com -N CN=fixnetixmd.xyz.com,O=XYZ.COM -K host/fixnetixmd.xyz.com@XYZ.COM >2013-01-31T13:36:09Z DEBUG stdout=New signing request "20130131133609" added. > >2013-01-31T13:36:09Z DEBUG stderr= >2013-01-31T13:36:09Z INFO Adding SSH public key from /etc/ssh/ssh_host_dsa_key.pub >2013-01-31T13:36:09Z INFO Adding SSH public key from /etc/ssh/ssh_host_rsa_key.pub >2013-01-31T13:36:09Z DEBUG raw: host_mod(u'fixnetixmd.xyz.com', ipasshpubkey=[u'ssh-dss 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', u'ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAxAZEAAantcRxQScC4R2UpemWnNFX/8teiOVJI5bOQk6bNNEzA2HBdKyF4nyeL4/A9AEUJ+i6TRLTBMZzwwDmXrgwrw4XfgIUREVyxNWzxN7B0V0wVixC2qUPCw+jOAz8/iOaCeiMvqwT//WxYlLj1VcRDbkeRyl6aRgzKlAMiYYuyZt8Hc2BjONoHqJIAlmI3F7c1HUND2Xn8b7SBH8/dszOsNIxTKyrx5clIqOwuBN1b0wZ+MT+nxGzqYjZ/uLglvLvrtKfk7Hkngmt92Vky7J/pabHW8wh0ALEPDhHnId67bN4kX9ixang2wzOQQtA52kwegpt1tpNLA0uLPwXpw=='], updatedns=False) >2013-01-31T13:36:09Z DEBUG host_mod(u'fixnetixmd.xyz.com', random=False, ipasshpubkey=(u'ssh-dss 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', u'ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAxAZEAAantcRxQScC4R2UpemWnNFX/8teiOVJI5bOQk6bNNEzA2HBdKyF4nyeL4/A9AEUJ+i6TRLTBMZzwwDmXrgwrw4XfgIUREVyxNWzxN7B0V0wVixC2qUPCw+jOAz8/iOaCeiMvqwT//WxYlLj1VcRDbkeRyl6aRgzKlAMiYYuyZt8Hc2BjONoHqJIAlmI3F7c1HUND2Xn8b7SBH8/dszOsNIxTKyrx5clIqOwuBN1b0wZ+MT+nxGzqYjZ/uLglvLvrtKfk7Hkngmt92Vky7J/pabHW8wh0ALEPDhHnId67bN4kX9ixang2wzOQQtA52kwegpt1tpNLA0uLPwXpw=='), rights=False, updatedns=False, all=False, raw=False) >2013-01-31T13:36:09Z INFO Forwarding 'host_mod' to server u'http://linux01.xyz.com/ipa/xml' >2013-01-31T13:36:09Z DEBUG NSSConnection init linux01.xyz.com >2013-01-31T13:36:09Z DEBUG Connecting: 10.0.0.135:0 >2013-01-31T13:36:10Z DEBUG auth_certificate_callback: check_sig=True is_server=False >Data: > Version: 3 (0x2) > Serial Number: 10 (0xa) > Signature Algorithm: > Algorithm: PKCS #1 SHA-256 With RSA Encryption > Issuer: CN=Certificate Authority,O=XYZ.COM > Validity: > Not Before: Mon Dec 17 11:04:48 2012 UTC > Not After: Thu Dec 18 11:04:48 2014 UTC > Subject: CN=linux01.xyz.com,O=XYZ.COM > Subject Public Key Info: > Public Key Algorithm: > Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > b5:f3:f2:4a:9c:48:c0:d3:32:90:07:18:58:51:b4:cd: > b2:35:72:50:7c:65:43:f6:1e:22:ae:8d:78:f9:fc:3b: > 24:6e:5b:5e:28:44:ad:00:68:a4:0c:f1:06:4e:17:5f: > 4f:d0:e4:8d:31:9f:bc:fb:c8:a1:19:af:2d:03:9c:45: > 3a:c7:ba:c9:bc:f8:c5:4b:c3:0f:f4:19:07:88:a7:79: > 78:09:ac:0f:26:72:63:f1:cb:a2:2e:50:86:9f:f8:2c: > 3d:ef:54:f7:d3:64:a5:b7:62:64:c6:88:ce:44:ce:2a: > 74:35:de:2e:ad:b3:5a:7d:13:2e:c5:f9:77:64:30:5c: > 93:63:10:7d:7c:78:a7:78:98:aa:1c:a3:48:63:ad:1d: > e2:48:02:87:e2:aa:08:4e:fb:1a:d4:67:9c:40:86:18: > 29:8d:4d:03:dc:f0:36:9c:b1:6c:69:8b:4b:61:74:cc: > 05:db:e6:98:50:ec:bc:92:b1:f2:5d:8d:ea:3f:1c:87: > 7a:b5:c6:24:b3:3b:2c:da:3b:b3:72:7b:fa:aa:03:f1: > c5:25:b0:37:84:9b:17:3f:d7:04:b9:05:bd:b1:cd:5b: > 88:2c:1b:77:2b:13:a7:76:d4:51:e0:91:d8:bf:7d:d6: > 9c:89:8e:b8:e0:ee:0e:aa:f3:d7:42:31:78:f8:b2:a7 > Exponent: > 65537 (0x10001) > Signed Extensions: (5) > Name: Certificate Authority Key Identifier > Critical: False > Key ID: > 02:2c:03:d9:05:d7:de:70:ce:87:5d:13:b9:b6:d7:af: > dd:e0:45:24 > Serial Number: None > General Names: [0 total] > > Name: Authority Information Access > Critical: False > > Name: Certificate Key Usage > Critical: True > Usages: > Digital Signature > Non-Repudiation > Key Encipherment > Data Encipherment > > Name: Extended Key Usage > Critical: False > Usages: > TLS Web Server Authentication Certificate > TLS Web Client Authentication Certificate > > Name: Certificate Subject Key ID > Critical: False > Data: > 17:85:92:05:0b:7c:e8:4a:47:bd:86:82:ab:b5:07:98: > 41:4b:1f:6d > > Signature: > Signature Algorithm: > Algorithm: PKCS #1 SHA-256 With RSA Encryption > Signature: > d3:68:13:7f:02:f1:ff:7b:a7:55:bf:7c:ba:d2:1f:0c: > 47:35:0f:dd:ca:c2:34:c6:44:af:0e:15:fd:1c:f7:68: > ba:9d:4e:aa:24:19:53:0c:47:14:9c:e8:ce:e2:c2:d8: > 35:1c:ea:1b:1c:b1:54:a5:f3:c6:1d:55:64:f5:f8:c8: > d8:3f:f0:ae:54:bf:3b:9f:a9:00:f0:f3:6b:06:3d:7e: > 96:4b:b2:fe:f5:b1:85:40:d0:10:11:5b:aa:c6:ad:1b: > 76:59:fd:f6:17:01:29:47:bb:53:a8:b2:f3:45:d2:9c: > 3f:49:b4:2d:f1:b4:0c:8f:f4:87:3e:1a:00:3c:38:42: > a2:5d:57:9f:b7:32:2b:ed:fc:59:49:6c:de:3c:85:69: > e9:c5:a2:4a:89:7f:0e:71:88:41:a4:30:4c:5c:37:e3: > 4e:a9:3c:0a:aa:c8:88:fc:97:63:3a:cd:40:8d:76:ea: > 7f:88:47:19:58:f7:bb:bb:70:48:ed:ca:af:88:3d:14: > b6:ef:45:86:d2:ad:5b:b3:81:53:0a:1b:4f:dc:3e:c7: > 72:b2:5e:d6:a8:46:06:e6:6c:d0:0b:1f:f5:ab:a3:8c: > 06:83:a6:8c:a2:b5:2e:66:c4:a5:ed:ec:d3:f9:a4:74: > 8a:89:37:d3:eb:87:2c:b4:89:d0:5c:4a:4a:54:ce:b9 > Fingerprint (MD5): > 52:0d:43:1e:a8:c3:ab:67:69:b3:7e:72:9a:ad:cc:01 > Fingerprint (SHA1): > ec:82:d5:f3:40:fa:94:dd:65:a3:8e:62:8e:48:b0:36: > 12:71:99:e0 >2013-01-31T13:36:10Z DEBUG approved_usage = SSLServer intended_usage = SSLServer >2013-01-31T13:36:10Z DEBUG cert valid True for "CN=linux01.xyz.com,O=XYZ.COM" >2013-01-31T13:36:10Z DEBUG handshake complete, peer = 10.0.0.135:443 >2013-01-31T13:36:10Z DEBUG Caught fault 3009 from server http://linux01.xyz.com/ipa/xml: invalid 'sshpubkey': invalid SSH public key >2013-01-31T13:36:10Z INFO host_mod: invalid 'sshpubkey': invalid SSH public key >2013-01-31T13:36:10Z WARNING Failed to upload host SSH public keys. >2013-01-31T13:36:10Z DEBUG args=/sbin/service nscd status >2013-01-31T13:36:10Z DEBUG stdout= >2013-01-31T13:36:10Z DEBUG stderr=nscd: unrecognized service > >2013-01-31T13:36:10Z DEBUG Saving StateFile to '/var/lib/ipa-client/sysrestore/sysrestore.state' >2013-01-31T13:36:10Z DEBUG Saving StateFile to '/var/lib/ipa-client/sysrestore/sysrestore.state' >2013-01-31T13:36:10Z DEBUG Saving StateFile to '/var/lib/ipa-client/sysrestore/sysrestore.state' >2013-01-31T13:36:11Z DEBUG args=/usr/sbin/authconfig --enablesssdauth --enablemkhomedir --update --enablesssd >2013-01-31T13:36:11Z DEBUG stdout=Starting oddjobd: [60G[[0;32m OK [0;39m] > >2013-01-31T13:36:11Z DEBUG stderr= >2013-01-31T13:36:11Z INFO SSSD enabled >2013-01-31T13:36:11Z DEBUG Backing up system configuration file '/etc/openldap/ldap.conf' >2013-01-31T13:36:11Z DEBUG Saving Index File to '/var/lib/ipa-client/sysrestore/sysrestore.index' >2013-01-31T13:36:11Z INFO Configured /etc/openldap/ldap.conf >2013-01-31T13:36:11Z DEBUG args=getent passwd admin >2013-01-31T13:36:11Z DEBUG stdout= >2013-01-31T13:36:11Z DEBUG stderr= >2013-01-31T13:36:12Z DEBUG args=getent passwd admin >2013-01-31T13:36:12Z DEBUG stdout= >2013-01-31T13:36:12Z DEBUG stderr= >2013-01-31T13:36:13Z DEBUG args=getent passwd admin >2013-01-31T13:36:13Z DEBUG stdout= >2013-01-31T13:36:13Z DEBUG stderr= >2013-01-31T13:36:14Z DEBUG args=getent passwd admin >2013-01-31T13:36:14Z DEBUG stdout= >2013-01-31T13:36:14Z DEBUG stderr= >2013-01-31T13:36:15Z DEBUG args=getent passwd admin >2013-01-31T13:36:15Z DEBUG stdout= >2013-01-31T13:36:15Z DEBUG stderr= >2013-01-31T13:36:16Z DEBUG args=getent passwd admin >2013-01-31T13:36:16Z DEBUG stdout= >2013-01-31T13:36:16Z DEBUG stderr= >2013-01-31T13:36:17Z DEBUG args=getent passwd admin >2013-01-31T13:36:17Z DEBUG stdout= >2013-01-31T13:36:17Z DEBUG stderr= >2013-01-31T13:36:18Z DEBUG args=getent passwd admin >2013-01-31T13:36:18Z DEBUG stdout= >2013-01-31T13:36:18Z DEBUG stderr= >2013-01-31T13:36:19Z DEBUG args=getent passwd admin >2013-01-31T13:36:19Z DEBUG stdout= >2013-01-31T13:36:19Z DEBUG stderr= >2013-01-31T13:36:20Z DEBUG args=getent passwd admin >2013-01-31T13:36:20Z DEBUG stdout= >2013-01-31T13:36:20Z DEBUG stderr= >2013-01-31T13:36:21Z ERROR Unable to find 'admin' user with 'getent passwd admin'! >2013-01-31T13:36:21Z INFO Recognized configuration: SSSD >2013-01-31T13:36:21Z DEBUG Backing up system configuration file '/etc/ssh/ssh_config' >2013-01-31T13:36:21Z DEBUG Saving Index File to '/var/lib/ipa-client/sysrestore/sysrestore.index' >2013-01-31T13:36:21Z INFO Configured /etc/ssh/ssh_config >2013-01-31T13:36:21Z DEBUG Backing up system configuration file '/etc/ssh/sshd_config' >2013-01-31T13:36:21Z DEBUG Saving Index File to '/var/lib/ipa-client/sysrestore/sysrestore.index' >2013-01-31T13:36:21Z DEBUG args=sshd -t -f /dev/null -o AuthorizedKeysCommand= >2013-01-31T13:36:21Z DEBUG stdout= >2013-01-31T13:36:21Z DEBUG stderr= >2013-01-31T13:36:21Z INFO Configured /etc/ssh/sshd_config >2013-01-31T13:36:21Z DEBUG args=/sbin/service sshd status >2013-01-31T13:36:21Z DEBUG stdout=openssh-daemon (pid 1661) is running... > >2013-01-31T13:36:21Z DEBUG stderr= >2013-01-31T13:36:21Z DEBUG args=/sbin/service sshd restart >2013-01-31T13:36:21Z DEBUG stdout=Stopping sshd: [60G[[0;32m OK [0;39m] >Starting sshd: [60G[[0;32m OK [0;39m] > >2013-01-31T13:36:21Z DEBUG stderr= >2013-01-31T13:36:21Z DEBUG args=/sbin/service sshd status >2013-01-31T13:36:21Z DEBUG stdout=openssh-daemon (pid 2162) is running... > >2013-01-31T13:36:21Z DEBUG stderr= >2013-01-31T13:36:21Z INFO Client configuration complete.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 906363
: 690917 |
690939
|
690940
|
691031
|
691037