Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 855045 Details for
Bug 1057686
ipa-client-install ends with traceback
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
ipaclient-install log
ipaclient-install.log (text/plain), 72.21 KB, created by
Tomáš Hozza
on 2014-01-24 15:35:03 UTC
(
hide
)
Description:
ipaclient-install log
Filename:
MIME Type:
Creator:
Tomáš Hozza
Created:
2014-01-24 15:35:03 UTC
Size:
72.21 KB
patch
obsolete
>2014-01-24T15:30:51Z DEBUG /usr/sbin/ipa-client-install was invoked with options: {'domain': None, 'force': False, 'krb5_offline_passwords': True, 'primary': False, 'realm_name': None, 'force_ntpd': True, 'create_sshfp': True, 'conf_sshd': True, 'conf_ntp': True, 'on_master': False, 'ntp_server': None, 'ca_cert_file': None, 'principal': None, 'keytab': None, 'hostname': 'client.example128.com', 'no_ac': False, 'unattended': None, 'sssd': True, 'trust_sshfp': False, 'dns_updates': True, 'mkhomedir': False, 'conf_ssh': True, 'force_join': True, 'server': None, 'prompt_password': False, 'permit': False, 'debug': False, 'preserve_sssd': False, 'uninstall': False} >2014-01-24T15:30:51Z DEBUG missing options might be asked for interactively later >2014-01-24T15:30:51Z DEBUG Loading Index file from '/var/lib/ipa-client/sysrestore/sysrestore.index' >2014-01-24T15:30:51Z DEBUG Loading StateFile from '/var/lib/ipa-client/sysrestore/sysrestore.state' >2014-01-24T15:30:51Z DEBUG [IPA Discovery] >2014-01-24T15:30:51Z DEBUG Starting IPA discovery with domain=None, servers=None, hostname=client.example128.com >2014-01-24T15:30:51Z DEBUG Start searching for LDAP SRV record in "example128.com" (domain of the hostname) and its sub-domains >2014-01-24T15:30:51Z DEBUG Search DNS for SRV record of _ldap._tcp.example128.com >2014-01-24T15:30:51Z DEBUG DNS record found: 0 100 389 ipa.example128.com. >2014-01-24T15:30:51Z DEBUG [Kerberos realm search] >2014-01-24T15:30:51Z DEBUG Search DNS for TXT record of _kerberos.example128.com >2014-01-24T15:30:51Z DEBUG DNS record found: "EXAMPLE128.COM" >2014-01-24T15:30:51Z DEBUG Search DNS for SRV record of _kerberos._udp.example128.com >2014-01-24T15:30:51Z DEBUG DNS record found: 0 100 88 ipa.example128.com. >2014-01-24T15:30:51Z DEBUG [LDAP server check] >2014-01-24T15:30:51Z DEBUG Verifying that ipa.example128.com (realm EXAMPLE128.COM) is an IPA server >2014-01-24T15:30:51Z DEBUG Init LDAP connection to: ipa.example128.com >2014-01-24T15:30:52Z DEBUG Search LDAP server for IPA base DN >2014-01-24T15:30:52Z DEBUG Check if naming context 'dc=example128,dc=com' is for IPA >2014-01-24T15:30:52Z DEBUG Naming context 'dc=example128,dc=com' is a valid IPA context >2014-01-24T15:30:52Z DEBUG Search for (objectClass=krbRealmContainer) in dc=example128,dc=com (sub) >2014-01-24T15:30:52Z DEBUG Found: cn=EXAMPLE128.COM,cn=kerberos,dc=example128,dc=com >2014-01-24T15:30:52Z DEBUG Discovery result: Success; server=ipa.example128.com, domain=example128.com, kdc=ipa.example128.com, basedn=dc=example128,dc=com >2014-01-24T15:30:52Z DEBUG Validated servers: ipa.example128.com >2014-01-24T15:30:52Z DEBUG will use discovered domain: example128.com >2014-01-24T15:30:52Z DEBUG Start searching for LDAP SRV record in "example128.com" (Validating DNS Discovery) and its sub-domains >2014-01-24T15:30:52Z DEBUG Search DNS for SRV record of _ldap._tcp.example128.com >2014-01-24T15:30:52Z DEBUG DNS record found: 0 100 389 ipa.example128.com. >2014-01-24T15:30:52Z DEBUG DNS validated, enabling discovery >2014-01-24T15:30:52Z DEBUG will use discovered server: ipa.example128.com >2014-01-24T15:30:52Z INFO Discovery was successful! >2014-01-24T15:30:52Z DEBUG will use discovered realm: EXAMPLE128.COM >2014-01-24T15:30:52Z DEBUG will use discovered basedn: dc=example128,dc=com >2014-01-24T15:30:52Z INFO Hostname: client.example128.com >2014-01-24T15:30:52Z DEBUG Hostname source: Provided as option >2014-01-24T15:30:52Z INFO Realm: EXAMPLE128.COM >2014-01-24T15:30:52Z DEBUG Realm source: Discovered from LDAP DNS records in ipa.example128.com >2014-01-24T15:30:52Z INFO DNS Domain: example128.com >2014-01-24T15:30:52Z DEBUG DNS Domain source: Discovered LDAP SRV records from example128.com (domain of the hostname) >2014-01-24T15:30:52Z INFO IPA Server: ipa.example128.com >2014-01-24T15:30:52Z DEBUG IPA Server source: Discovered from LDAP DNS records in ipa.example128.com >2014-01-24T15:30:52Z INFO BaseDN: dc=example128,dc=com >2014-01-24T15:30:52Z DEBUG BaseDN source: From IPA server ldap://ipa.example128.com:389 >2014-01-24T15:30:54Z DEBUG Starting external process >2014-01-24T15:30:54Z DEBUG args=/usr/sbin/ipa-rmkeytab -k /etc/krb5.keytab -r EXAMPLE128.COM >2014-01-24T15:30:54Z DEBUG Process finished, return code=5 >2014-01-24T15:30:54Z DEBUG stdout= >2014-01-24T15:30:54Z DEBUG stderr=realm not found > >2014-01-24T15:30:54Z DEBUG Starting external process >2014-01-24T15:30:54Z DEBUG args=/bin/hostname client.example128.com >2014-01-24T15:30:54Z DEBUG Process finished, return code=0 >2014-01-24T15:30:54Z DEBUG stdout= >2014-01-24T15:30:54Z DEBUG stderr= >2014-01-24T15:30:54Z DEBUG Backing up system configuration file '/etc/hostname' >2014-01-24T15:30:54Z DEBUG Saving Index File to '/var/lib/ipa-client/sysrestore/sysrestore.index' >2014-01-24T15:30:54Z DEBUG Starting external process >2014-01-24T15:30:54Z DEBUG args=/usr/sbin/selinuxenabled >2014-01-24T15:30:54Z DEBUG Process finished, return code=0 >2014-01-24T15:30:54Z DEBUG stdout= >2014-01-24T15:30:54Z DEBUG stderr= >2014-01-24T15:30:54Z DEBUG Starting external process >2014-01-24T15:30:54Z DEBUG args=/usr/sbin/restorecon /etc/hostname >2014-01-24T15:30:54Z DEBUG Process finished, return code=0 >2014-01-24T15:30:54Z DEBUG stdout= >2014-01-24T15:30:54Z DEBUG stderr= >2014-01-24T15:30:54Z DEBUG Saving StateFile to '/var/lib/ipa-client/sysrestore/sysrestore.state' >2014-01-24T15:30:58Z DEBUG will use principal provided as option: admin >2014-01-24T15:30:58Z INFO Synchronizing time with KDC... >2014-01-24T15:30:58Z DEBUG Search DNS for SRV record of _ntp._udp.example128.com >2014-01-24T15:30:58Z DEBUG DNS record found: 0 100 123 ipa.example128.com. >2014-01-24T15:30:58Z DEBUG Starting external process >2014-01-24T15:30:58Z DEBUG args=/usr/sbin/ntpdate -U ntp -s -b -v ipa.example128.com >2014-01-24T15:31:05Z DEBUG Process finished, return code=0 >2014-01-24T15:31:05Z DEBUG stdout= >2014-01-24T15:31:05Z DEBUG stderr= >2014-01-24T15:31:05Z DEBUG Writing Kerberos configuration to /tmp/tmp1UYmwL: >2014-01-24T15:31:05Z DEBUG #File modified by ipa-client-install > >includedir /var/lib/sss/pubconf/krb5.include.d/ > >[libdefaults] > default_realm = EXAMPLE128.COM > dns_lookup_realm = false > dns_lookup_kdc = false > rdns = false > ticket_lifetime = 24h > forwardable = yes > >[realms] > EXAMPLE128.COM = { > kdc = ipa.example128.com:88 > master_kdc = ipa.example128.com:88 > admin_server = ipa.example128.com:749 > default_domain = example128.com > pkinit_anchors = FILE:/etc/ipa/ca.crt > } > >[domain_realm] > .example128.com = EXAMPLE128.COM > example128.com = EXAMPLE128.COM > >2014-01-24T15:31:07Z DEBUG Starting external process >2014-01-24T15:31:07Z DEBUG args=kinit admin@EXAMPLE128.COM >2014-01-24T15:31:07Z DEBUG Process finished, return code=0 >2014-01-24T15:31:07Z DEBUG stdout=Password for admin@EXAMPLE128.COM: > >2014-01-24T15:31:07Z DEBUG stderr= >2014-01-24T15:31:07Z DEBUG trying to retrieve CA cert via LDAP from ipa.example128.com >2014-01-24T15:31:08Z DEBUG flushing ldap://ipa.example128.com:389 from SchemaCache >2014-01-24T15:31:08Z DEBUG retrieving schema for SchemaCache url=ldap://ipa.example128.com:389 conn=<ldap.ldapobject.SimpleLDAPObject instance at 0x173f0e0> >2014-01-24T15:31:08Z INFO Successfully retrieved CA cert > Subject: CN=Certificate Authority,O=EXAMPLE128.COM > Issuer: CN=Certificate Authority,O=EXAMPLE128.COM > Valid From: Thu Dec 05 16:16:28 2013 UTC > Valid Until: Mon Dec 05 16:16:28 2033 UTC > >2014-01-24T15:31:08Z DEBUG Starting external process >2014-01-24T15:31:08Z DEBUG args=/usr/sbin/ipa-join -s ipa.example128.com -b dc=example128,dc=com -h client.example128.com -f >2014-01-24T15:31:10Z DEBUG Process finished, return code=0 >2014-01-24T15:31:10Z DEBUG stdout= >2014-01-24T15:31:10Z DEBUG stderr=Keytab successfully retrieved and stored in: /etc/krb5.keytab >Certificate subject base is: O=EXAMPLE128.COM > >2014-01-24T15:31:10Z INFO Enrolled in IPA realm EXAMPLE128.COM >2014-01-24T15:31:10Z DEBUG Starting external process >2014-01-24T15:31:10Z DEBUG args=kdestroy >2014-01-24T15:31:10Z DEBUG Process finished, return code=0 >2014-01-24T15:31:10Z DEBUG stdout= >2014-01-24T15:31:10Z DEBUG stderr= >2014-01-24T15:31:10Z DEBUG Starting external process >2014-01-24T15:31:10Z DEBUG args=/usr/bin/kinit -k -t /etc/krb5.keytab host/client.example128.com@EXAMPLE128.COM >2014-01-24T15:31:10Z DEBUG Process finished, return code=0 >2014-01-24T15:31:10Z DEBUG stdout= >2014-01-24T15:31:10Z DEBUG stderr= >2014-01-24T15:31:10Z DEBUG Backing up system configuration file '/etc/ipa/default.conf' >2014-01-24T15:31:10Z DEBUG -> Not backing up - '/etc/ipa/default.conf' doesn't exist >2014-01-24T15:31:10Z INFO Created /etc/ipa/default.conf >2014-01-24T15:31:10Z DEBUG importing all plugin modules in '/usr/lib/python2.7/site-packages/ipalib/plugins'... >2014-01-24T15:31:10Z DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/aci.py' >2014-01-24T15:31:10Z DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/automember.py' >2014-01-24T15:31:10Z DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/automount.py' >2014-01-24T15:31:10Z DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/baseldap.py' >2014-01-24T15:31:10Z DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/batch.py' >2014-01-24T15:31:10Z DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/cert.py' >2014-01-24T15:31:10Z DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/config.py' >2014-01-24T15:31:10Z DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/delegation.py' >2014-01-24T15:31:10Z DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/dns.py' >2014-01-24T15:31:10Z DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/group.py' >2014-01-24T15:31:10Z DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/hbacrule.py' >2014-01-24T15:31:10Z DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/hbacsvc.py' >2014-01-24T15:31:10Z DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/hbacsvcgroup.py' >2014-01-24T15:31:10Z DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/hbactest.py' >2014-01-24T15:31:10Z DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/host.py' >2014-01-24T15:31:10Z DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/hostgroup.py' >2014-01-24T15:31:10Z DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/idrange.py' >2014-01-24T15:31:10Z DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/internal.py' >2014-01-24T15:31:10Z DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/kerberos.py' >2014-01-24T15:31:10Z DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/krbtpolicy.py' >2014-01-24T15:31:10Z DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/migration.py' >2014-01-24T15:31:10Z DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/misc.py' >2014-01-24T15:31:10Z DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/netgroup.py' >2014-01-24T15:31:10Z DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/passwd.py' >2014-01-24T15:31:10Z DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/permission.py' >2014-01-24T15:31:10Z DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/ping.py' >2014-01-24T15:31:10Z DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/pkinit.py' >2014-01-24T15:31:10Z DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/privilege.py' >2014-01-24T15:31:10Z DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/pwpolicy.py' >2014-01-24T15:31:10Z DEBUG Starting external process >2014-01-24T15:31:10Z DEBUG args=klist -V >2014-01-24T15:31:10Z DEBUG Process finished, return code=0 >2014-01-24T15:31:10Z DEBUG stdout=Kerberos 5 version 1.11.3 > >2014-01-24T15:31:10Z DEBUG stderr= >2014-01-24T15:31:10Z DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/realmdomains.py' >2014-01-24T15:31:10Z DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/role.py' >2014-01-24T15:31:10Z DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/selfservice.py' >2014-01-24T15:31:10Z DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/selinuxusermap.py' >2014-01-24T15:31:10Z DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/service.py' >2014-01-24T15:31:10Z DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/sudocmd.py' >2014-01-24T15:31:10Z DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/sudocmdgroup.py' >2014-01-24T15:31:10Z DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/sudorule.py' >2014-01-24T15:31:10Z DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/trust.py' >2014-01-24T15:31:10Z DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/user.py' >2014-01-24T15:31:10Z DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/virtual.py' >2014-01-24T15:31:10Z DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/xmlclient.py' >2014-01-24T15:31:11Z DEBUG Backing up system configuration file '/etc/sssd/sssd.conf' >2014-01-24T15:31:11Z DEBUG -> Not backing up - '/etc/sssd/sssd.conf' doesn't exist >2014-01-24T15:31:11Z INFO New SSSD config will be created >2014-01-24T15:31:11Z INFO Configured /etc/sssd/sssd.conf >2014-01-24T15:31:11Z DEBUG Starting external process >2014-01-24T15:31:11Z DEBUG args=/usr/bin/certutil -A -d /etc/pki/nssdb -n IPA CA -t CT,C,C -a -i /etc/ipa/ca.crt >2014-01-24T15:31:11Z DEBUG Process finished, return code=0 >2014-01-24T15:31:11Z DEBUG stdout= >2014-01-24T15:31:11Z DEBUG stderr= >2014-01-24T15:31:11Z DEBUG Backing up system configuration file '/etc/krb5.conf' >2014-01-24T15:31:11Z DEBUG Saving Index File to '/var/lib/ipa-client/sysrestore/sysrestore.index' >2014-01-24T15:31:11Z DEBUG Writing Kerberos configuration to /etc/krb5.conf: >2014-01-24T15:31:11Z DEBUG #File modified by ipa-client-install > >includedir /var/lib/sss/pubconf/krb5.include.d/ > >[libdefaults] > default_realm = EXAMPLE128.COM > dns_lookup_realm = true > dns_lookup_kdc = true > rdns = false > ticket_lifetime = 24h > forwardable = yes > >[realms] > EXAMPLE128.COM = { > pkinit_anchors = FILE:/etc/ipa/ca.crt > } > >[domain_realm] > .example128.com = EXAMPLE128.COM > example128.com = EXAMPLE128.COM > >2014-01-24T15:31:11Z INFO Configured /etc/krb5.conf for IPA realm EXAMPLE128.COM >2014-01-24T15:31:11Z DEBUG Starting external process >2014-01-24T15:31:11Z DEBUG args=keyctl search @s user ipa_session_cookie:host/client.example128.com@EXAMPLE128.COM >2014-01-24T15:31:11Z DEBUG Process finished, return code=0 >2014-01-24T15:31:11Z DEBUG stdout=229603411 > >2014-01-24T15:31:11Z DEBUG stderr= >2014-01-24T15:31:11Z DEBUG Starting external process >2014-01-24T15:31:11Z DEBUG args=keyctl unlink 229603411 @s >2014-01-24T15:31:11Z DEBUG Process finished, return code=0 >2014-01-24T15:31:11Z DEBUG stdout= >2014-01-24T15:31:11Z DEBUG stderr= >2014-01-24T15:31:11Z DEBUG Starting external process >2014-01-24T15:31:11Z DEBUG args=keyctl search @s user ipa_session_cookie:host/client.example128.com@EXAMPLE128.COM >2014-01-24T15:31:11Z DEBUG Process finished, return code=1 >2014-01-24T15:31:11Z DEBUG stdout= >2014-01-24T15:31:11Z DEBUG stderr=keyctl_search: Required key not available > >2014-01-24T15:31:11Z DEBUG failed to find session_cookie in persistent storage for principal 'host/client.example128.com@EXAMPLE128.COM' >2014-01-24T15:31:11Z DEBUG trying https://ipa.example128.com/ipa/xml >2014-01-24T15:31:11Z DEBUG Created connection context.xmlclient >2014-01-24T15:31:11Z DEBUG Try RPC connection >2014-01-24T15:31:11Z DEBUG Forwarding 'ping' to server 'https://ipa.example128.com/ipa/xml' >2014-01-24T15:31:12Z DEBUG NSSConnection init ipa.example128.com >2014-01-24T15:31:12Z DEBUG Connecting: 192.168.122.97:0 >2014-01-24T15:31:12Z DEBUG auth_certificate_callback: check_sig=True is_server=False >Data: > Version: 3 (0x2) > Serial Number: 9 (0x9) > Signature Algorithm: > Algorithm: PKCS #1 SHA-256 With RSA Encryption > Issuer: CN=Certificate Authority,O=EXAMPLE128.COM > Validity: > Not Before: Thu Dec 05 16:21:14 2013 UTC > Not After: Sun Dec 06 16:21:14 2015 UTC > Subject: CN=ipa.example128.com,O=EXAMPLE128.COM > Subject Public Key Info: > Public Key Algorithm: > Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > d0:ac:ee:12:a9:a3:1b:eb:02:74:15:bd:4b:ba:f0:91: > ae:44:f5:67:17:49:4f:13:29:b0:0d:40:1f:e3:6a:9e: > 5b:85:17:1b:46:02:ca:51:75:f2:9d:a9:90:ae:f4:51: > aa:64:cd:96:ef:35:a6:3a:60:8a:f4:2e:32:be:bc:13: > cb:3c:18:08:06:74:b5:fe:6e:13:54:3e:00:7c:a6:05: > 8a:87:dc:e2:51:a9:f7:3f:4b:be:18:25:ad:6e:72:64: > 89:76:ed:ab:f7:17:ae:33:72:fd:33:59:16:7a:69:cd: > d8:12:0f:23:6a:26:41:d3:74:36:c2:57:e0:2a:db:4a: > 24:a8:e9:98:d1:81:8f:43:f8:f9:ae:9d:e0:94:2a:60: > 11:71:53:78:01:58:8a:4b:06:74:2f:07:53:31:b9:39: > fc:bd:51:b2:f2:de:c6:5e:3a:6f:bb:8c:7b:76:8e:0c: > b3:cb:94:f2:b8:a5:8c:c3:d1:ba:a3:8b:7f:65:ec:c9: > 87:41:70:79:20:38:82:f5:40:40:a5:ac:3b:36:64:27: > d3:d1:91:fc:7e:12:c7:1b:02:3c:21:a7:88:06:73:a9: > 9a:a2:55:3b:e1:b3:fe:08:1b:4f:5b:f8:73:cb:44:7d: > a8:4a:ff:55:9c:c9:7d:a1:bb:91:c7:65:9a:48:b1:1b > Exponent: > 65537 (0x10001) > Signed Extensions: (6) > Name: Certificate Authority Key Identifier > Critical: False > Key ID: > f1:3c:d4:dc:f6:db:7c:4a:15:77:88:e6:69:32:8b:fd: > 25:70:6e:f9 > Serial Number: None > General Names: [0 total] > > Name: Authority Information Access > Critical: False > Authority Information Access: [1 total] > Info [1]: > Method: PKIX Online Certificate Status Protocol > Location: URI: http://ipa-ca.example128.com/ca/ocsp > > Name: Certificate Key Usage > Critical: True > Usages: > Digital Signature > Non-Repudiation > Key Encipherment > Data Encipherment > > Name: Extended Key Usage > Critical: False > Usages: > TLS Web Server Authentication Certificate > TLS Web Client Authentication Certificate > > Name: CRL Distribution Points > Critical: False > CRL Distribution Points: [1 total] > Point [1]: > General Names: [1 total] > http://ipa-ca.example128.com/ipa/crl/MasterCRL.bin > Issuer: Directory Name: CN=Certificate Authority,O=ipaca > Reasons: () > > Name: Certificate Subject Key ID > Critical: False > Data: > e2:73:a6:1e:2a:ad:d4:90:8e:9c:65:dd:8a:e6:37:37: > 47:dc:ea:c6 > > Signature: > Signature Algorithm: > Algorithm: PKCS #1 SHA-256 With RSA Encryption > Signature: > 78:a5:94:1b:d1:03:55:93:1d:a4:6d:3b:db:aa:4e:70: > e2:af:22:36:61:c0:94:0b:16:da:66:70:85:b1:cc:5e: > dc:fd:7d:18:73:82:eb:8e:cb:0c:1a:2c:50:13:d0:a0: > 19:a8:46:a1:4e:3f:e7:42:46:f2:c0:e0:85:8c:e5:aa: > 51:b9:1e:8b:f7:fb:e1:93:3d:f7:c4:a3:a6:0d:4b:6e: > 29:93:1b:86:3b:e6:3d:f2:12:40:fd:d7:19:de:73:71: > 09:e2:99:25:6d:bd:7e:a1:87:2a:e0:ee:04:d5:f0:25: > 87:ea:43:75:bb:d8:3c:4b:04:16:5c:df:48:68:ec:7d: > dd:9e:2d:21:02:64:8b:e4:3f:81:82:ca:d0:ec:f2:9e: > 68:84:7e:37:5a:f2:f3:49:7d:d1:c9:7f:85:30:2d:cc: > c9:88:b3:d6:d4:58:92:a5:75:13:ca:56:1b:2c:e2:e6: > c6:83:22:b7:83:61:51:4e:b6:d9:bd:9d:fe:42:c7:04: > cb:da:74:9c:2f:25:0f:0b:84:a0:ad:d0:c5:60:2e:c2: > ac:e0:64:eb:f7:77:46:78:a4:c0:ff:41:f8:9e:c7:01: > 8a:29:c4:87:c6:46:e4:4a:35:45:ae:d6:4a:90:05:cd: > 10:47:0a:1d:43:24:09:4b:cc:ac:58:c5:aa:5e:6b:02 > Fingerprint (MD5): > 82:fb:0f:3d:4e:24:80:23:35:cb:ae:58:fd:17:e0:37 > Fingerprint (SHA1): > a8:e4:10:70:f8:48:5c:f5:9e:91:72:1e:a3:b4:0f:7f: > 24:2a:f7:86 >2014-01-24T15:31:12Z DEBUG approved_usage = SSL Server intended_usage = SSL Server >2014-01-24T15:31:12Z DEBUG cert valid True for "CN=ipa.example128.com,O=EXAMPLE128.COM" >2014-01-24T15:31:12Z DEBUG handshake complete, peer = 192.168.122.97:443 >2014-01-24T15:31:12Z DEBUG received Set-Cookie 'ipa_session=36c9321a9e3c175da0793971dffcf9d4; Domain=ipa.example128.com; Path=/ipa; Expires=Fri, 24 Jan 2014 15:51:12 GMT; Secure; HttpOnly' >2014-01-24T15:31:12Z DEBUG storing cookie 'ipa_session=36c9321a9e3c175da0793971dffcf9d4; Domain=ipa.example128.com; Path=/ipa; Expires=Fri, 24 Jan 2014 15:51:12 GMT; Secure; HttpOnly' for principal host/client.example128.com@EXAMPLE128.COM >2014-01-24T15:31:12Z DEBUG Starting external process >2014-01-24T15:31:12Z DEBUG args=keyctl search @s user ipa_session_cookie:host/client.example128.com@EXAMPLE128.COM >2014-01-24T15:31:12Z DEBUG Process finished, return code=1 >2014-01-24T15:31:12Z DEBUG stdout= >2014-01-24T15:31:12Z DEBUG stderr=keyctl_search: Required key not available > >2014-01-24T15:31:12Z DEBUG Starting external process >2014-01-24T15:31:12Z DEBUG args=keyctl search @s user ipa_session_cookie:host/client.example128.com@EXAMPLE128.COM >2014-01-24T15:31:12Z DEBUG Process finished, return code=1 >2014-01-24T15:31:12Z DEBUG stdout= >2014-01-24T15:31:12Z DEBUG stderr=keyctl_search: Required key not available > >2014-01-24T15:31:12Z DEBUG Starting external process >2014-01-24T15:31:12Z DEBUG args=keyctl padd user ipa_session_cookie:host/client.example128.com@EXAMPLE128.COM @s >2014-01-24T15:31:12Z DEBUG Process finished, return code=0 >2014-01-24T15:31:12Z DEBUG stdout=991555063 > >2014-01-24T15:31:12Z DEBUG stderr= >2014-01-24T15:31:12Z DEBUG Forwarding 'env' to server 'https://ipa.example128.com/ipa/xml' >2014-01-24T15:31:12Z DEBUG NSSConnection init ipa.example128.com >2014-01-24T15:31:12Z DEBUG Connecting: 192.168.122.97:0 >2014-01-24T15:31:12Z DEBUG auth_certificate_callback: check_sig=True is_server=False >Data: > Version: 3 (0x2) > Serial Number: 9 (0x9) > Signature Algorithm: > Algorithm: PKCS #1 SHA-256 With RSA Encryption > Issuer: CN=Certificate Authority,O=EXAMPLE128.COM > Validity: > Not Before: Thu Dec 05 16:21:14 2013 UTC > Not After: Sun Dec 06 16:21:14 2015 UTC > Subject: CN=ipa.example128.com,O=EXAMPLE128.COM > Subject Public Key Info: > Public Key Algorithm: > Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > d0:ac:ee:12:a9:a3:1b:eb:02:74:15:bd:4b:ba:f0:91: > ae:44:f5:67:17:49:4f:13:29:b0:0d:40:1f:e3:6a:9e: > 5b:85:17:1b:46:02:ca:51:75:f2:9d:a9:90:ae:f4:51: > aa:64:cd:96:ef:35:a6:3a:60:8a:f4:2e:32:be:bc:13: > cb:3c:18:08:06:74:b5:fe:6e:13:54:3e:00:7c:a6:05: > 8a:87:dc:e2:51:a9:f7:3f:4b:be:18:25:ad:6e:72:64: > 89:76:ed:ab:f7:17:ae:33:72:fd:33:59:16:7a:69:cd: > d8:12:0f:23:6a:26:41:d3:74:36:c2:57:e0:2a:db:4a: > 24:a8:e9:98:d1:81:8f:43:f8:f9:ae:9d:e0:94:2a:60: > 11:71:53:78:01:58:8a:4b:06:74:2f:07:53:31:b9:39: > fc:bd:51:b2:f2:de:c6:5e:3a:6f:bb:8c:7b:76:8e:0c: > b3:cb:94:f2:b8:a5:8c:c3:d1:ba:a3:8b:7f:65:ec:c9: > 87:41:70:79:20:38:82:f5:40:40:a5:ac:3b:36:64:27: > d3:d1:91:fc:7e:12:c7:1b:02:3c:21:a7:88:06:73:a9: > 9a:a2:55:3b:e1:b3:fe:08:1b:4f:5b:f8:73:cb:44:7d: > a8:4a:ff:55:9c:c9:7d:a1:bb:91:c7:65:9a:48:b1:1b > Exponent: > 65537 (0x10001) > Signed Extensions: (6) > Name: Certificate Authority Key Identifier > Critical: False > Key ID: > f1:3c:d4:dc:f6:db:7c:4a:15:77:88:e6:69:32:8b:fd: > 25:70:6e:f9 > Serial Number: None > General Names: [0 total] > > Name: Authority Information Access > Critical: False > Authority Information Access: [1 total] > Info [1]: > Method: PKIX Online Certificate Status Protocol > Location: URI: http://ipa-ca.example128.com/ca/ocsp > > Name: Certificate Key Usage > Critical: True > Usages: > Digital Signature > Non-Repudiation > Key Encipherment > Data Encipherment > > Name: Extended Key Usage > Critical: False > Usages: > TLS Web Server Authentication Certificate > TLS Web Client Authentication Certificate > > Name: CRL Distribution Points > Critical: False > CRL Distribution Points: [1 total] > Point [1]: > General Names: [1 total] > http://ipa-ca.example128.com/ipa/crl/MasterCRL.bin > Issuer: Directory Name: CN=Certificate Authority,O=ipaca > Reasons: () > > Name: Certificate Subject Key ID > Critical: False > Data: > e2:73:a6:1e:2a:ad:d4:90:8e:9c:65:dd:8a:e6:37:37: > 47:dc:ea:c6 > > Signature: > Signature Algorithm: > Algorithm: PKCS #1 SHA-256 With RSA Encryption > Signature: > 78:a5:94:1b:d1:03:55:93:1d:a4:6d:3b:db:aa:4e:70: > e2:af:22:36:61:c0:94:0b:16:da:66:70:85:b1:cc:5e: > dc:fd:7d:18:73:82:eb:8e:cb:0c:1a:2c:50:13:d0:a0: > 19:a8:46:a1:4e:3f:e7:42:46:f2:c0:e0:85:8c:e5:aa: > 51:b9:1e:8b:f7:fb:e1:93:3d:f7:c4:a3:a6:0d:4b:6e: > 29:93:1b:86:3b:e6:3d:f2:12:40:fd:d7:19:de:73:71: > 09:e2:99:25:6d:bd:7e:a1:87:2a:e0:ee:04:d5:f0:25: > 87:ea:43:75:bb:d8:3c:4b:04:16:5c:df:48:68:ec:7d: > dd:9e:2d:21:02:64:8b:e4:3f:81:82:ca:d0:ec:f2:9e: > 68:84:7e:37:5a:f2:f3:49:7d:d1:c9:7f:85:30:2d:cc: > c9:88:b3:d6:d4:58:92:a5:75:13:ca:56:1b:2c:e2:e6: > c6:83:22:b7:83:61:51:4e:b6:d9:bd:9d:fe:42:c7:04: > cb:da:74:9c:2f:25:0f:0b:84:a0:ad:d0:c5:60:2e:c2: > ac:e0:64:eb:f7:77:46:78:a4:c0:ff:41:f8:9e:c7:01: > 8a:29:c4:87:c6:46:e4:4a:35:45:ae:d6:4a:90:05:cd: > 10:47:0a:1d:43:24:09:4b:cc:ac:58:c5:aa:5e:6b:02 > Fingerprint (MD5): > 82:fb:0f:3d:4e:24:80:23:35:cb:ae:58:fd:17:e0:37 > Fingerprint (SHA1): > a8:e4:10:70:f8:48:5c:f5:9e:91:72:1e:a3:b4:0f:7f: > 24:2a:f7:86 >2014-01-24T15:31:12Z DEBUG approved_usage = SSL Server intended_usage = SSL Server >2014-01-24T15:31:12Z DEBUG cert valid True for "CN=ipa.example128.com,O=EXAMPLE128.COM" >2014-01-24T15:31:12Z DEBUG handshake complete, peer = 192.168.122.97:443 >2014-01-24T15:31:12Z DEBUG received Set-Cookie 'ipa_session=42cb438698dbf01d050fced7316c89b7; Domain=ipa.example128.com; Path=/ipa; Expires=Fri, 24 Jan 2014 15:51:12 GMT; Secure; HttpOnly' >2014-01-24T15:31:12Z DEBUG storing cookie 'ipa_session=42cb438698dbf01d050fced7316c89b7; Domain=ipa.example128.com; Path=/ipa; Expires=Fri, 24 Jan 2014 15:51:12 GMT; Secure; HttpOnly' for principal host/client.example128.com@EXAMPLE128.COM >2014-01-24T15:31:12Z DEBUG Starting external process >2014-01-24T15:31:12Z DEBUG args=keyctl search @s user ipa_session_cookie:host/client.example128.com@EXAMPLE128.COM >2014-01-24T15:31:12Z DEBUG Process finished, return code=0 >2014-01-24T15:31:12Z DEBUG stdout=991555063 > >2014-01-24T15:31:12Z DEBUG stderr= >2014-01-24T15:31:12Z DEBUG Starting external process >2014-01-24T15:31:12Z DEBUG args=keyctl search @s user ipa_session_cookie:host/client.example128.com@EXAMPLE128.COM >2014-01-24T15:31:12Z DEBUG Process finished, return code=0 >2014-01-24T15:31:12Z DEBUG stdout=991555063 > >2014-01-24T15:31:12Z DEBUG stderr= >2014-01-24T15:31:12Z DEBUG Starting external process >2014-01-24T15:31:12Z DEBUG args=keyctl pupdate 991555063 >2014-01-24T15:31:12Z DEBUG Process finished, return code=0 >2014-01-24T15:31:12Z DEBUG stdout= >2014-01-24T15:31:12Z DEBUG stderr= >2014-01-24T15:31:12Z DEBUG Writing nsupdate commands to /etc/ipa/.dns_update.txt: >2014-01-24T15:31:12Z DEBUG >debug >zone example128.com. >update delete client.example128.com. IN A >show >send >update add client.example128.com. 1200 IN A 192.168.122.225 >show >send > >2014-01-24T15:31:12Z DEBUG Starting external process >2014-01-24T15:31:12Z DEBUG args=/usr/bin/nsupdate -g /etc/ipa/.dns_update.txt >2014-01-24T15:31:14Z DEBUG Process finished, return code=0 >2014-01-24T15:31:14Z DEBUG stdout=Outgoing update query: >;; ->>HEADER<<- opcode: UPDATE, status: NOERROR, id: 0 >;; flags:; ZONE: 0, PREREQ: 0, UPDATE: 0, ADDITIONAL: 0 >;; ZONE SECTION: >;example128.com. IN SOA > >;; UPDATE SECTION: >client.example128.com. 0 ANY A > >Outgoing update query: >;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 4741 >;; flags:; QUESTION: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1 >;; QUESTION SECTION: >;240599597.sig-ipa.example128.com. ANY TKEY > >;; ADDITIONAL SECTION: >240599597.sig-ipa.example128.com. 0 ANY TKEY gss-tsig. 1390577472 1390577472 3 NOERROR 656 YIICjAYJKoZIhvcSAQICAQBuggJ7MIICd6ADAgEFoQMCAQ6iBwMFACAA AACjggF2YYIBcjCCAW6gAwIBBaEQGw5FWEFNUExFMTI4LkNPTaIkMCKg AwIBAaEbMBkbA0ROUxsSaXBhLmV4YW1wbGUxMjguY29to4IBLTCCASmg AwIBEqEDAgECooIBGwSCARdm5N8jP4358brpGBpxa2rVor5tWafdnu8b 95d83pBKWAxfCwZIio1jImNfoD1yNzQVD5s7BXeUsa26phnvihj8SEIV Cr++PkY7OvbcOs0kaFhuFWo4FbuF7l2mLSyxFPZQ4Oj/nJ1P6BTk0U4o TLc7RtTRxebmUZHbr3Sxt+ATnPSUJt4hn0T8EKnesxT304X+P5H+mTBK VX1qmTLQtnlyDn7Y2/uWQWZoDrZveBKTpBvSAwRgx9XG2KizDePU0jL1 cWp2sXWCSKRvzalTAcbPec4wv24UrI6FThMK6gNHN8gkHkGNENxrLeKp TQ7Ji/1Axoy53UGNVsL1p1zMHeOVyOBAXjBVgytMey5yDOuKJeUbZWHG hG2kgecwgeSgAwIBEqKB3ASB2blcgyqt/NeaSHphCc3xma8vhuxZzqGy LVuJnCLyVkkflMYkkirsNfGN6DTLDPlFy6v6ssCO7D+Ali4nJe+3RV0g f/KiaaHvirT3wYPe0Y2EPaCbct10RLXjR+hRbSxCubAvbSN0Rwjra0sV BMawvhby23Ew1hEK9VdyjoCOKPY3vxxjkFD7IreYb5ZCyFekiaJN4Oal nSV+3Au8R4SszEDRkVwf6IMgpNQkIuE+NkclYkN49Hku4z3g0wBzuci+ NHG6syz/yLq5pCYbw/M1IFWJXaX19NlBMzg= 0 > >Outgoing update query: >;; ->>HEADER<<- opcode: UPDATE, status: NOERROR, id: 36620 >;; flags:; ZONE: 1, PREREQ: 0, UPDATE: 1, ADDITIONAL: 1 >;; ZONE SECTION: >;example128.com. IN SOA > >;; UPDATE SECTION: >client.example128.com. 0 ANY A > >;; TSIG PSEUDOSECTION: >240599597.sig-ipa.example128.com. 0 ANY TSIG gss-tsig. 1390577472 300 28 BAQE//////8AAAAACxhS3Fbvb5GIGNEUHoDV5g== 36620 NOERROR 0 > >Outgoing update query: >;; ->>HEADER<<- opcode: UPDATE, status: NOERROR, id: 0 >;; flags:; ZONE: 0, PREREQ: 0, UPDATE: 0, ADDITIONAL: 0 >;; ZONE SECTION: >;example128.com. IN SOA > >;; UPDATE SECTION: >client.example128.com. 1200 IN A 192.168.122.225 > >Outgoing update query: >;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 23736 >;; flags:; QUESTION: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1 >;; QUESTION SECTION: >;4028574070.sig-ipa.example128.com. ANY TKEY > >;; ADDITIONAL SECTION: >4028574070.sig-ipa.example128.com. 0 ANY TKEY gss-tsig. 1390577474 1390577474 3 NOERROR 656 YIICjAYJKoZIhvcSAQICAQBuggJ7MIICd6ADAgEFoQMCAQ6iBwMFACAA AACjggF2YYIBcjCCAW6gAwIBBaEQGw5FWEFNUExFMTI4LkNPTaIkMCKg AwIBAaEbMBkbA0ROUxsSaXBhLmV4YW1wbGUxMjguY29to4IBLTCCASmg AwIBEqEDAgECooIBGwSCARdm5N8jP4358brpGBpxa2rVor5tWafdnu8b 95d83pBKWAxfCwZIio1jImNfoD1yNzQVD5s7BXeUsa26phnvihj8SEIV Cr++PkY7OvbcOs0kaFhuFWo4FbuF7l2mLSyxFPZQ4Oj/nJ1P6BTk0U4o TLc7RtTRxebmUZHbr3Sxt+ATnPSUJt4hn0T8EKnesxT304X+P5H+mTBK VX1qmTLQtnlyDn7Y2/uWQWZoDrZveBKTpBvSAwRgx9XG2KizDePU0jL1 cWp2sXWCSKRvzalTAcbPec4wv24UrI6FThMK6gNHN8gkHkGNENxrLeKp TQ7Ji/1Axoy53UGNVsL1p1zMHeOVyOBAXjBVgytMey5yDOuKJeUbZWHG hG2kgecwgeSgAwIBEqKB3ASB2X5wUj+edKaTNqu628NUumzbPSa0rFA1 CGwvSqbC4+9HTnQ8o888J1gGirYILYOx9xowzSA+ZEalJPieqU3gOSV7 kfbdShCM5mzigjkGzRzjcHtyIX6i4+tRGF9rZ4PdHNCODmnVT8kMc+6q MCk+F+K2rjFd1BuGB6OKqi+jt/JJECL/xB1clcUN63ts9Ca7+61IKTM9 XtQ/WL2G6doYN0J+Qg3cC2jr4fTx8ur6lhTwW2SXxXjlmMvuz2tJ+RnG A7X7th38JNPFyVqxrjq7ocQwZh4tKRoYCo4= 0 > >Outgoing update query: >;; ->>HEADER<<- opcode: UPDATE, status: NOERROR, id: 51156 >;; flags:; ZONE: 1, PREREQ: 0, UPDATE: 1, ADDITIONAL: 1 >;; ZONE SECTION: >;example128.com. IN SOA > >;; UPDATE SECTION: >client.example128.com. 1200 IN A 192.168.122.225 > >;; TSIG PSEUDOSECTION: >4028574070.sig-ipa.example128.com. 0 ANY TSIG gss-tsig. 1390577474 300 28 BAQE//////8AAAAAEWISaBtT0n5/CzYPwFeAjQ== 51156 NOERROR 0 > > >2014-01-24T15:31:14Z DEBUG stderr=Reply from SOA query: >;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 2823 >;; flags: qr aa rd ra; QUESTION: 1, ANSWER: 1, AUTHORITY: 1, ADDITIONAL: 1 >;; QUESTION SECTION: >;example128.com. IN SOA > >;; ANSWER SECTION: >example128.com. 86400 IN SOA ipa.example128.com. hostmaster.example128.com. 1390577351 3600 900 1209600 3600 > >;; AUTHORITY SECTION: >example128.com. 86400 IN NS ipa.example128.com. > >;; ADDITIONAL SECTION: >ipa.example128.com. 1200 IN A 192.168.122.97 > >Found zone name: example128.com >The master is: ipa.example128.com >start_gssrequest >Found realm from ticket: EXAMPLE128.COM >send_gssrequest >recvmsg reply from GSS-TSIG query >;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 4741 >;; flags: qr ra; QUESTION: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0 >;; QUESTION SECTION: >;240599597.sig-ipa.example128.com. ANY TKEY > >;; ANSWER SECTION: >240599597.sig-ipa.example128.com. 0 ANY TKEY gss-tsig. 1390577472 1390581072 3 NOERROR 156 YIGZBgkqhkiG9xIBAgICAG+BiTCBhqADAgEFoQMCAQ+iejB4oAMCARKi cQRvle4dI9Ff3B/VTgCsimBtA4Ix6MgQeHSIiylj7WECGVWXyx1p5rTa VFWt+2rt9lX70uTH8LoFqf49q7gf1YR/Nrn6xFrPSHWJYNBV8JHA9HoA vPmwcfPsTkxZzylNoTiJUigUtLt7EZxFtmScuZaE 0 > >Sending update to 192.168.122.97#53 > >Reply from update query: >;; ->>HEADER<<- opcode: UPDATE, status: NOERROR, id: 36620 >;; flags: qr ra; ZONE: 1, PREREQ: 0, UPDATE: 0, ADDITIONAL: 1 >;; ZONE SECTION: >;example128.com. IN SOA > >;; TSIG PSEUDOSECTION: >240599597.sig-ipa.example128.com. 0 ANY TSIG gss-tsig. 1390577474 300 28 BAQF//////8AAAAAOBPzPnulsuDp5Y/PxMYj8g== 36620 NOERROR 0 > >Reply from SOA query: >;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 44175 >;; flags: qr aa rd ra; QUESTION: 1, ANSWER: 1, AUTHORITY: 1, ADDITIONAL: 1 >;; QUESTION SECTION: >;example128.com. IN SOA > >;; ANSWER SECTION: >example128.com. 86400 IN SOA ipa.example128.com. hostmaster.example128.com. 1390577473 3600 900 1209600 3600 > >;; AUTHORITY SECTION: >example128.com. 86400 IN NS ipa.example128.com. > >;; ADDITIONAL SECTION: >ipa.example128.com. 1200 IN A 192.168.122.97 > >Found zone name: example128.com >The master is: ipa.example128.com >start_gssrequest >send_gssrequest >recvmsg reply from GSS-TSIG query >;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 23736 >;; flags: qr ra; QUESTION: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0 >;; QUESTION SECTION: >;4028574070.sig-ipa.example128.com. ANY TKEY > >;; ANSWER SECTION: >4028574070.sig-ipa.example128.com. 0 ANY TKEY gss-tsig. 1390577474 1390581074 3 NOERROR 156 YIGZBgkqhkiG9xIBAgICAG+BiTCBhqADAgEFoQMCAQ+iejB4oAMCARKi cQRvFtofpAbNVICsGisSHj83sxxrBqvspvbIjKLIo6jpp6hpo4oGioBL ZIrNuifz5l+s5L+zE7xUBzCn3PngsJERfMmN7G9XzEPrXIqenpOQt6R1 9wy3dpN0lLAT24sXmW0z8MQd6AYUGqdnYG0AfYnU 0 > >Sending update to 192.168.122.97#53 > >Reply from update query: >;; ->>HEADER<<- opcode: UPDATE, status: NOERROR, id: 51156 >;; flags: qr ra; ZONE: 1, PREREQ: 0, UPDATE: 0, ADDITIONAL: 1 >;; ZONE SECTION: >;example128.com. IN SOA > >;; TSIG PSEUDOSECTION: >4028574070.sig-ipa.example128.com. 0 ANY TSIG gss-tsig. 1390577474 300 28 BAQF//////8AAAAAFTXK2E11J4ujlfXfpb8eGg== 51156 NOERROR 0 > > >2014-01-24T15:31:14Z INFO DNS server record set to: client.example128.com -> 192.168.122.225 >2014-01-24T15:31:14Z DEBUG Starting external process >2014-01-24T15:31:14Z DEBUG args=/bin/systemctl start messagebus.service >2014-01-24T15:31:14Z DEBUG Process finished, return code=0 >2014-01-24T15:31:14Z DEBUG stdout= >2014-01-24T15:31:14Z DEBUG stderr= >2014-01-24T15:31:14Z DEBUG Starting external process >2014-01-24T15:31:14Z DEBUG args=/bin/systemctl is-active messagebus.service >2014-01-24T15:31:14Z DEBUG Process finished, return code=0 >2014-01-24T15:31:14Z DEBUG stdout=active > >2014-01-24T15:31:14Z DEBUG stderr= >2014-01-24T15:31:14Z DEBUG Starting external process >2014-01-24T15:31:14Z DEBUG args=/bin/systemctl restart certmonger.service >2014-01-24T15:31:14Z DEBUG Process finished, return code=0 >2014-01-24T15:31:14Z DEBUG stdout= >2014-01-24T15:31:14Z DEBUG stderr= >2014-01-24T15:31:14Z DEBUG Starting external process >2014-01-24T15:31:14Z DEBUG args=/bin/systemctl is-active certmonger.service >2014-01-24T15:31:14Z DEBUG Process finished, return code=0 >2014-01-24T15:31:14Z DEBUG stdout=active > >2014-01-24T15:31:14Z DEBUG stderr= >2014-01-24T15:31:14Z DEBUG Starting external process >2014-01-24T15:31:14Z DEBUG args=/bin/systemctl stop certmonger.service >2014-01-24T15:31:14Z DEBUG Process finished, return code=0 >2014-01-24T15:31:14Z DEBUG stdout= >2014-01-24T15:31:14Z DEBUG stderr= >2014-01-24T15:31:15Z DEBUG Starting external process >2014-01-24T15:31:15Z DEBUG args=/bin/systemctl restart certmonger.service >2014-01-24T15:31:15Z DEBUG Process finished, return code=0 >2014-01-24T15:31:15Z DEBUG stdout= >2014-01-24T15:31:15Z DEBUG stderr= >2014-01-24T15:31:15Z DEBUG Starting external process >2014-01-24T15:31:15Z DEBUG args=/bin/systemctl is-active certmonger.service >2014-01-24T15:31:15Z DEBUG Process finished, return code=0 >2014-01-24T15:31:15Z DEBUG stdout=active > >2014-01-24T15:31:15Z DEBUG stderr= >2014-01-24T15:31:15Z DEBUG Starting external process >2014-01-24T15:31:15Z DEBUG args=/bin/systemctl enable certmonger.service >2014-01-24T15:31:15Z DEBUG Process finished, return code=0 >2014-01-24T15:31:15Z DEBUG stdout= >2014-01-24T15:31:15Z DEBUG stderr=ln -s '/usr/lib/systemd/system/certmonger.service' '/etc/systemd/system/multi-user.target.wants/certmonger.service' > >2014-01-24T15:31:15Z DEBUG Starting external process >2014-01-24T15:31:15Z DEBUG args=ipa-getcert request -d /etc/pki/nssdb -n IPA Machine Certificate - client.example128.com -N CN=client.example128.com,O=EXAMPLE128.COM -K host/client.example128.com@EXAMPLE128.COM >2014-01-24T15:31:15Z DEBUG Process finished, return code=0 >2014-01-24T15:31:15Z DEBUG stdout=New signing request "20140124153115" added. > >2014-01-24T15:31:15Z DEBUG stderr= >2014-01-24T15:31:15Z INFO Adding SSH public key from /etc/ssh/ssh_host_ecdsa_key.pub >2014-01-24T15:31:15Z INFO Adding SSH public key from /etc/ssh/ssh_host_rsa_key.pub >2014-01-24T15:31:15Z DEBUG Forwarding 'host_mod' to server 'https://ipa.example128.com/ipa/xml' >2014-01-24T15:31:15Z DEBUG NSSConnection init ipa.example128.com >2014-01-24T15:31:15Z DEBUG Connecting: 192.168.122.97:0 >2014-01-24T15:31:15Z DEBUG auth_certificate_callback: check_sig=True is_server=False >Data: > Version: 3 (0x2) > Serial Number: 9 (0x9) > Signature Algorithm: > Algorithm: PKCS #1 SHA-256 With RSA Encryption > Issuer: CN=Certificate Authority,O=EXAMPLE128.COM > Validity: > Not Before: Thu Dec 05 16:21:14 2013 UTC > Not After: Sun Dec 06 16:21:14 2015 UTC > Subject: CN=ipa.example128.com,O=EXAMPLE128.COM > Subject Public Key Info: > Public Key Algorithm: > Algorithm: PKCS #1 RSA Encryption > RSA Public Key: > Modulus: > d0:ac:ee:12:a9:a3:1b:eb:02:74:15:bd:4b:ba:f0:91: > ae:44:f5:67:17:49:4f:13:29:b0:0d:40:1f:e3:6a:9e: > 5b:85:17:1b:46:02:ca:51:75:f2:9d:a9:90:ae:f4:51: > aa:64:cd:96:ef:35:a6:3a:60:8a:f4:2e:32:be:bc:13: > cb:3c:18:08:06:74:b5:fe:6e:13:54:3e:00:7c:a6:05: > 8a:87:dc:e2:51:a9:f7:3f:4b:be:18:25:ad:6e:72:64: > 89:76:ed:ab:f7:17:ae:33:72:fd:33:59:16:7a:69:cd: > d8:12:0f:23:6a:26:41:d3:74:36:c2:57:e0:2a:db:4a: > 24:a8:e9:98:d1:81:8f:43:f8:f9:ae:9d:e0:94:2a:60: > 11:71:53:78:01:58:8a:4b:06:74:2f:07:53:31:b9:39: > fc:bd:51:b2:f2:de:c6:5e:3a:6f:bb:8c:7b:76:8e:0c: > b3:cb:94:f2:b8:a5:8c:c3:d1:ba:a3:8b:7f:65:ec:c9: > 87:41:70:79:20:38:82:f5:40:40:a5:ac:3b:36:64:27: > d3:d1:91:fc:7e:12:c7:1b:02:3c:21:a7:88:06:73:a9: > 9a:a2:55:3b:e1:b3:fe:08:1b:4f:5b:f8:73:cb:44:7d: > a8:4a:ff:55:9c:c9:7d:a1:bb:91:c7:65:9a:48:b1:1b > Exponent: > 65537 (0x10001) > Signed Extensions: (6) > Name: Certificate Authority Key Identifier > Critical: False > Key ID: > f1:3c:d4:dc:f6:db:7c:4a:15:77:88:e6:69:32:8b:fd: > 25:70:6e:f9 > Serial Number: None > General Names: [0 total] > > Name: Authority Information Access > Critical: False > Authority Information Access: [1 total] > Info [1]: > Method: PKIX Online Certificate Status Protocol > Location: URI: http://ipa-ca.example128.com/ca/ocsp > > Name: Certificate Key Usage > Critical: True > Usages: > Digital Signature > Non-Repudiation > Key Encipherment > Data Encipherment > > Name: Extended Key Usage > Critical: False > Usages: > TLS Web Server Authentication Certificate > TLS Web Client Authentication Certificate > > Name: CRL Distribution Points > Critical: False > CRL Distribution Points: [1 total] > Point [1]: > General Names: [1 total] > http://ipa-ca.example128.com/ipa/crl/MasterCRL.bin > Issuer: Directory Name: CN=Certificate Authority,O=ipaca > Reasons: () > > Name: Certificate Subject Key ID > Critical: False > Data: > e2:73:a6:1e:2a:ad:d4:90:8e:9c:65:dd:8a:e6:37:37: > 47:dc:ea:c6 > > Signature: > Signature Algorithm: > Algorithm: PKCS #1 SHA-256 With RSA Encryption > Signature: > 78:a5:94:1b:d1:03:55:93:1d:a4:6d:3b:db:aa:4e:70: > e2:af:22:36:61:c0:94:0b:16:da:66:70:85:b1:cc:5e: > dc:fd:7d:18:73:82:eb:8e:cb:0c:1a:2c:50:13:d0:a0: > 19:a8:46:a1:4e:3f:e7:42:46:f2:c0:e0:85:8c:e5:aa: > 51:b9:1e:8b:f7:fb:e1:93:3d:f7:c4:a3:a6:0d:4b:6e: > 29:93:1b:86:3b:e6:3d:f2:12:40:fd:d7:19:de:73:71: > 09:e2:99:25:6d:bd:7e:a1:87:2a:e0:ee:04:d5:f0:25: > 87:ea:43:75:bb:d8:3c:4b:04:16:5c:df:48:68:ec:7d: > dd:9e:2d:21:02:64:8b:e4:3f:81:82:ca:d0:ec:f2:9e: > 68:84:7e:37:5a:f2:f3:49:7d:d1:c9:7f:85:30:2d:cc: > c9:88:b3:d6:d4:58:92:a5:75:13:ca:56:1b:2c:e2:e6: > c6:83:22:b7:83:61:51:4e:b6:d9:bd:9d:fe:42:c7:04: > cb:da:74:9c:2f:25:0f:0b:84:a0:ad:d0:c5:60:2e:c2: > ac:e0:64:eb:f7:77:46:78:a4:c0:ff:41:f8:9e:c7:01: > 8a:29:c4:87:c6:46:e4:4a:35:45:ae:d6:4a:90:05:cd: > 10:47:0a:1d:43:24:09:4b:cc:ac:58:c5:aa:5e:6b:02 > Fingerprint (MD5): > 82:fb:0f:3d:4e:24:80:23:35:cb:ae:58:fd:17:e0:37 > Fingerprint (SHA1): > a8:e4:10:70:f8:48:5c:f5:9e:91:72:1e:a3:b4:0f:7f: > 24:2a:f7:86 >2014-01-24T15:31:15Z DEBUG approved_usage = SSL Server intended_usage = SSL Server >2014-01-24T15:31:15Z DEBUG cert valid True for "CN=ipa.example128.com,O=EXAMPLE128.COM" >2014-01-24T15:31:15Z DEBUG handshake complete, peer = 192.168.122.97:443 >2014-01-24T15:31:16Z DEBUG received Set-Cookie 'ipa_session=1c6fa813cecc4de81e30310fa232d1a9; Domain=ipa.example128.com; Path=/ipa; Expires=Fri, 24 Jan 2014 15:51:16 GMT; Secure; HttpOnly' >2014-01-24T15:31:16Z DEBUG storing cookie 'ipa_session=1c6fa813cecc4de81e30310fa232d1a9; Domain=ipa.example128.com; Path=/ipa; Expires=Fri, 24 Jan 2014 15:51:16 GMT; Secure; HttpOnly' for principal host/client.example128.com@EXAMPLE128.COM >2014-01-24T15:31:16Z DEBUG Starting external process >2014-01-24T15:31:16Z DEBUG args=keyctl search @s user ipa_session_cookie:host/client.example128.com@EXAMPLE128.COM >2014-01-24T15:31:16Z DEBUG Process finished, return code=0 >2014-01-24T15:31:16Z DEBUG stdout=991555063 > >2014-01-24T15:31:16Z DEBUG stderr= >2014-01-24T15:31:16Z DEBUG Starting external process >2014-01-24T15:31:16Z DEBUG args=keyctl search @s user ipa_session_cookie:host/client.example128.com@EXAMPLE128.COM >2014-01-24T15:31:16Z DEBUG Process finished, return code=0 >2014-01-24T15:31:16Z DEBUG stdout=991555063 > >2014-01-24T15:31:16Z DEBUG stderr= >2014-01-24T15:31:16Z DEBUG Starting external process >2014-01-24T15:31:16Z DEBUG args=keyctl pupdate 991555063 >2014-01-24T15:31:16Z DEBUG Process finished, return code=0 >2014-01-24T15:31:16Z DEBUG stdout= >2014-01-24T15:31:16Z DEBUG stderr= >2014-01-24T15:31:16Z DEBUG Caught fault 4202 from server https://ipa.example128.com/ipa/xml: no modifications to be performed >2014-01-24T15:31:16Z DEBUG Writing nsupdate commands to /etc/ipa/.dns_update.txt: >2014-01-24T15:31:16Z DEBUG debug >zone example128.com. >update delete client.example128.com. IN SSHFP >show >send >update add client.example128.com. 1200 IN SSHFP 3 1 4FDA461F137A3A1A8F3201AA2A24BA8779E76F8F >update add client.example128.com. 1200 IN SSHFP 3 2 7F1F0325FAD181A1DB92DEEB20F1C7DD2007DDF2E876FC800ADDBEF94182B61B >update add client.example128.com. 1200 IN SSHFP 1 1 5AFE7DF324D7BC34F2EFF1448D87FD1393C988F5 >update add client.example128.com. 1200 IN SSHFP 1 2 8BE3244AAF4A6D5AF1BEE30038BD99277CAD53120F9C52374216061F16E1A8BC >show >send > >2014-01-24T15:31:16Z DEBUG Starting external process >2014-01-24T15:31:16Z DEBUG args=/usr/bin/nsupdate -g /etc/ipa/.dns_update.txt >2014-01-24T15:31:17Z DEBUG Process finished, return code=0 >2014-01-24T15:31:17Z DEBUG stdout=Outgoing update query: >;; ->>HEADER<<- opcode: UPDATE, status: NOERROR, id: 0 >;; flags:; ZONE: 0, PREREQ: 0, UPDATE: 0, ADDITIONAL: 0 >;; ZONE SECTION: >;example128.com. IN SOA > >;; UPDATE SECTION: >client.example128.com. 0 ANY SSHFP > >Outgoing update query: >;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 34878 >;; flags:; QUESTION: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1 >;; QUESTION SECTION: >;3773568901.sig-ipa.example128.com. ANY TKEY > >;; ADDITIONAL SECTION: >3773568901.sig-ipa.example128.com. 0 ANY TKEY gss-tsig. 1390577476 1390577476 3 NOERROR 656 YIICjAYJKoZIhvcSAQICAQBuggJ7MIICd6ADAgEFoQMCAQ6iBwMFACAA AACjggF2YYIBcjCCAW6gAwIBBaEQGw5FWEFNUExFMTI4LkNPTaIkMCKg AwIBAaEbMBkbA0ROUxsSaXBhLmV4YW1wbGUxMjguY29to4IBLTCCASmg AwIBEqEDAgECooIBGwSCARdm5N8jP4358brpGBpxa2rVor5tWafdnu8b 95d83pBKWAxfCwZIio1jImNfoD1yNzQVD5s7BXeUsa26phnvihj8SEIV Cr++PkY7OvbcOs0kaFhuFWo4FbuF7l2mLSyxFPZQ4Oj/nJ1P6BTk0U4o TLc7RtTRxebmUZHbr3Sxt+ATnPSUJt4hn0T8EKnesxT304X+P5H+mTBK VX1qmTLQtnlyDn7Y2/uWQWZoDrZveBKTpBvSAwRgx9XG2KizDePU0jL1 cWp2sXWCSKRvzalTAcbPec4wv24UrI6FThMK6gNHN8gkHkGNENxrLeKp TQ7Ji/1Axoy53UGNVsL1p1zMHeOVyOBAXjBVgytMey5yDOuKJeUbZWHG hG2kgecwgeSgAwIBEqKB3ASB2WG03v7VhjOYu/6tH9Qx26wMEbHDjR0r 3LgOuMulhqFq3er1HnVP6j2YdIZ4nIG0gShjUWoepwnsIlk/ifoNPL0Z 8zw91T5sHbTZukz32uEcrFKZgWwG2Y1sCY5IrCYsyq5LkEsln6UTP0Rp PIkN/YsyRY7awY91AM9qK+HNeesSaKD6fEOFVtuS8LF1N8GemNNyQU1X kS/txwEaqVvwhh2Vv6A2RxJ46r0l+doTp54l+LkNW8o2CUoWjqli4mH5 qnJhdMpnv0sDTw76OWvBsstXjbuTn0XHg04= 0 > >Outgoing update query: >;; ->>HEADER<<- opcode: UPDATE, status: NOERROR, id: 54017 >;; flags:; ZONE: 1, PREREQ: 0, UPDATE: 1, ADDITIONAL: 1 >;; ZONE SECTION: >;example128.com. IN SOA > >;; UPDATE SECTION: >client.example128.com. 0 ANY SSHFP > >;; TSIG PSEUDOSECTION: >3773568901.sig-ipa.example128.com. 0 ANY TSIG gss-tsig. 1390577476 300 28 BAQE//////8AAAAAOT9e31yeqseQ43A6DBsNTw== 54017 NOERROR 0 > >Outgoing update query: >;; ->>HEADER<<- opcode: UPDATE, status: NOERROR, id: 0 >;; flags:; ZONE: 0, PREREQ: 0, UPDATE: 0, ADDITIONAL: 0 >;; ZONE SECTION: >;example128.com. IN SOA > >;; UPDATE SECTION: >client.example128.com. 1200 IN SSHFP 3 1 4FDA461F137A3A1A8F3201AA2A24BA8779E76F8F >client.example128.com. 1200 IN SSHFP 3 2 7F1F0325FAD181A1DB92DEEB20F1C7DD2007DDF2E876FC800ADDBEF9 4182B61B >client.example128.com. 1200 IN SSHFP 1 1 5AFE7DF324D7BC34F2EFF1448D87FD1393C988F5 >client.example128.com. 1200 IN SSHFP 1 2 8BE3244AAF4A6D5AF1BEE30038BD99277CAD53120F9C52374216061F 16E1A8BC > >Outgoing update query: >;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 33847 >;; flags:; QUESTION: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1 >;; QUESTION SECTION: >;2376181507.sig-ipa.example128.com. ANY TKEY > >;; ADDITIONAL SECTION: >2376181507.sig-ipa.example128.com. 0 ANY TKEY gss-tsig. 1390577476 1390577476 3 NOERROR 656 YIICjAYJKoZIhvcSAQICAQBuggJ7MIICd6ADAgEFoQMCAQ6iBwMFACAA AACjggF2YYIBcjCCAW6gAwIBBaEQGw5FWEFNUExFMTI4LkNPTaIkMCKg AwIBAaEbMBkbA0ROUxsSaXBhLmV4YW1wbGUxMjguY29to4IBLTCCASmg AwIBEqEDAgECooIBGwSCARdm5N8jP4358brpGBpxa2rVor5tWafdnu8b 95d83pBKWAxfCwZIio1jImNfoD1yNzQVD5s7BXeUsa26phnvihj8SEIV Cr++PkY7OvbcOs0kaFhuFWo4FbuF7l2mLSyxFPZQ4Oj/nJ1P6BTk0U4o TLc7RtTRxebmUZHbr3Sxt+ATnPSUJt4hn0T8EKnesxT304X+P5H+mTBK VX1qmTLQtnlyDn7Y2/uWQWZoDrZveBKTpBvSAwRgx9XG2KizDePU0jL1 cWp2sXWCSKRvzalTAcbPec4wv24UrI6FThMK6gNHN8gkHkGNENxrLeKp TQ7Ji/1Axoy53UGNVsL1p1zMHeOVyOBAXjBVgytMey5yDOuKJeUbZWHG hG2kgecwgeSgAwIBEqKB3ASB2Qz4Kmf+373MQTm/0ijTFUvlBVzUEAQj 2mCRSAgkx/x92HKkoAe2gOq/q+Fws6nrGz8OYe9wgKpT3zHz9XSV/WBm OIfRGIttGO1o4mcVgX9QlDfV5HtT2XRYqGxzVNj+m0poOaxit/SWPRiH eBL0H4BdxmVi/oFO/jp/P64BtzGJt1Rs52/m803CIJMxXRxaijGAiggK OmodnP9WgHbuJQ1s5YGjqSCvhc3pczYwfPLTsRrQXYvRMU65TNks6k3h 9ailbAytqFkmEn4TtuFpHp+pTkqLLAV0j7s= 0 > >Outgoing update query: >;; ->>HEADER<<- opcode: UPDATE, status: NOERROR, id: 13348 >;; flags:; ZONE: 1, PREREQ: 0, UPDATE: 4, ADDITIONAL: 1 >;; ZONE SECTION: >;example128.com. IN SOA > >;; UPDATE SECTION: >client.example128.com. 1200 IN SSHFP 3 1 4FDA461F137A3A1A8F3201AA2A24BA8779E76F8F >client.example128.com. 1200 IN SSHFP 3 2 7F1F0325FAD181A1DB92DEEB20F1C7DD2007DDF2E876FC800ADDBEF9 4182B61B >client.example128.com. 1200 IN SSHFP 1 1 5AFE7DF324D7BC34F2EFF1448D87FD1393C988F5 >client.example128.com. 1200 IN SSHFP 1 2 8BE3244AAF4A6D5AF1BEE30038BD99277CAD53120F9C52374216061F 16E1A8BC > >;; TSIG PSEUDOSECTION: >2376181507.sig-ipa.example128.com. 0 ANY TSIG gss-tsig. 1390577476 300 28 BAQE//////8AAAAALeHRj7rmnWkz+EuLo5MEwA== 13348 NOERROR 0 > > >2014-01-24T15:31:17Z DEBUG stderr=Reply from SOA query: >;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 21632 >;; flags: qr aa rd ra; QUESTION: 1, ANSWER: 1, AUTHORITY: 1, ADDITIONAL: 1 >;; QUESTION SECTION: >;example128.com. IN SOA > >;; ANSWER SECTION: >example128.com. 86400 IN SOA ipa.example128.com. hostmaster.example128.com. 1390577474 3600 900 1209600 3600 > >;; AUTHORITY SECTION: >example128.com. 86400 IN NS ipa.example128.com. > >;; ADDITIONAL SECTION: >ipa.example128.com. 1200 IN A 192.168.122.97 > >Found zone name: example128.com >The master is: ipa.example128.com >start_gssrequest >Found realm from ticket: EXAMPLE128.COM >send_gssrequest >recvmsg reply from GSS-TSIG query >;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 34878 >;; flags: qr ra; QUESTION: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0 >;; QUESTION SECTION: >;3773568901.sig-ipa.example128.com. ANY TKEY > >;; ANSWER SECTION: >3773568901.sig-ipa.example128.com. 0 ANY TKEY gss-tsig. 1390577476 1390581076 3 NOERROR 156 YIGZBgkqhkiG9xIBAgICAG+BiTCBhqADAgEFoQMCAQ+iejB4oAMCARKi cQRvl9uFo8prA6kq/71+fKRth0frppq/7y/p3BahH4c9t7w9GTLU0FgB ClY5oBGCXbxL4jv4Ciburm965NwFz3bzHeOv0kI6jIgclc5vb3naDk+X G9fXSTYtylLnUjqia4AX+/r+kA/SXve/lHfvRNZ/ 0 > >Sending update to 192.168.122.97#53 > >Reply from update query: >;; ->>HEADER<<- opcode: UPDATE, status: NOERROR, id: 54017 >;; flags: qr ra; ZONE: 1, PREREQ: 0, UPDATE: 0, ADDITIONAL: 1 >;; ZONE SECTION: >;example128.com. IN SOA > >;; TSIG PSEUDOSECTION: >3773568901.sig-ipa.example128.com. 0 ANY TSIG gss-tsig. 1390577476 300 28 BAQF//////8AAAAAOLiGe9MZqaooJ+g8b5wV1g== 54017 NOERROR 0 > >Reply from SOA query: >;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 61105 >;; flags: qr aa rd ra; QUESTION: 1, ANSWER: 1, AUTHORITY: 1, ADDITIONAL: 1 >;; QUESTION SECTION: >;example128.com. IN SOA > >;; ANSWER SECTION: >example128.com. 86400 IN SOA ipa.example128.com. hostmaster.example128.com. 1390577477 3600 900 1209600 3600 > >;; AUTHORITY SECTION: >example128.com. 86400 IN NS ipa.example128.com. > >;; ADDITIONAL SECTION: >ipa.example128.com. 1200 IN A 192.168.122.97 > >Found zone name: example128.com >The master is: ipa.example128.com >start_gssrequest >send_gssrequest >recvmsg reply from GSS-TSIG query >;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 33847 >;; flags: qr ra; QUESTION: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0 >;; QUESTION SECTION: >;2376181507.sig-ipa.example128.com. ANY TKEY > >;; ANSWER SECTION: >2376181507.sig-ipa.example128.com. 0 ANY TKEY gss-tsig. 1390577476 1390581076 3 NOERROR 156 YIGZBgkqhkiG9xIBAgICAG+BiTCBhqADAgEFoQMCAQ+iejB4oAMCARKi cQRvV63+e1sg6PBhVYe22lNPtKwm8brn6lIa0O+VG0MzNKjKsK44ir3Z Yex7aw8W1mn+ZMHdKJ/Sl0MNjgUNWDyImvd44R+/xZTjk9ID7ckF7a6b j97yomeYcqcDjD/y8TdU/653umO1WnMk7IERg5YG 0 > >Sending update to 192.168.122.97#53 > >Reply from update query: >;; ->>HEADER<<- opcode: UPDATE, status: NOERROR, id: 13348 >;; flags: qr ra; ZONE: 1, PREREQ: 0, UPDATE: 0, ADDITIONAL: 1 >;; ZONE SECTION: >;example128.com. IN SOA > >;; TSIG PSEUDOSECTION: >2376181507.sig-ipa.example128.com. 0 ANY TSIG gss-tsig. 1390577476 300 28 BAQF//////8AAAAALMwzvxnRscNj3g2l1H0Kjw== 13348 NOERROR 0 > > >2014-01-24T15:31:17Z DEBUG Starting external process >2014-01-24T15:31:17Z DEBUG args=/bin/systemctl list-unit-files --full >2014-01-24T15:31:17Z DEBUG Process finished, return code=0 >2014-01-24T15:31:17Z DEBUG stdout=UNIT FILE STATE >proc-sys-fs-binfmt_misc.automount static >dev-hugepages.mount static >dev-mqueue.mount static >proc-fs-nfsd.mount static >proc-sys-fs-binfmt_misc.mount static >sys-fs-fuse-connections.mount static >sys-kernel-config.mount static >sys-kernel-debug.mount static >tmp.mount static >var-lib-nfs-rpc_pipefs.mount static >systemd-ask-password-console.path static >systemd-ask-password-plymouth.path static >systemd-ask-password-wall.path static >session-1.scope static >session-2.scope static >arp-ethers.service disabled >atd.service enabled >auditd.service enabled >autofs.service disabled >autovt@.service disabled >blk-availability.service disabled >certmonger.service enabled >chrony-wait.service disabled >chronyd.service enabled >console-getty.service disabled >console-shell.service disabled >crond.service enabled >cvs@.service static >dbus-org.fedoraproject.FirewallD1.service enabled >dbus-org.freedesktop.hostname1.service static >dbus-org.freedesktop.locale1.service static >dbus-org.freedesktop.login1.service static >dbus-org.freedesktop.machine1.service static >dbus-org.freedesktop.NetworkManager.service enabled >dbus-org.freedesktop.nm-dispatcher.service enabled >dbus-org.freedesktop.timedate1.service static >dbus.service static >debug-shell.service disabled >dm-event.service disabled >dnsmasq.service disabled >dracut-cmdline.service static >dracut-initqueue.service static >dracut-mount.service static >dracut-pre-mount.service static >dracut-pre-pivot.service static >dracut-pre-trigger.service static >dracut-pre-udev.service static >dracut-shutdown.service static >ebtables.service disabled >emergency.service static >fedora-autorelabel-mark.service static >fedora-autorelabel.service static >fedora-configure.service static >fedora-domainname.service disabled >fedora-import-state.service static >fedora-loadmodules.service static >fedora-readonly.service static >firewalld.service enabled >fprintd.service static >getty@.service enabled >halt-local.service static >initrd-cleanup.service static >initrd-parse-etc.service static >initrd-switch-root.service static >initrd-udevadm-cleanup-db.service static >irda.service disabled >irqbalance.service enabled >kmod-static-nodes.service static >lvm2-lvmetad.service disabled >lvm2-monitor.service enabled >lvm2-pvscan@.service static >mcelog.service enabled >mdmon@.service static >mdmonitor.service enabled >messagebus.service static >named-chroot-setup.service static >named-chroot.service disabled >named-sdb-chroot-setup.service static >named-sdb-chroot.service disabled >named-sdb.service disabled >named-setup-rndc.service static >named.service disabled >NetworkManager-dispatcher.service enabled >NetworkManager-wait-online.service disabled >NetworkManager.service enabled >nfs-blkmap.service disabled >nfs-idmap.service disabled >nfs-lock.service enabled >nfs-mountd.service disabled >nfs-rquotad.service disabled >nfs-secure-server.service disabled >nfs-secure.service disabled >nfs-server.service disabled >nfs.service disabled >nfslock.service disabled >ntpd.service disabled >ntpdate.service disabled >oddjobd.service disabled >packagekit-offline-update.service enabled >packagekit.service static >pcscd.service static >plymouth-halt.service disabled >plymouth-kexec.service disabled >plymouth-poweroff.service disabled >plymouth-quit-wait.service disabled >plymouth-quit.service disabled >plymouth-read-write.service disabled >plymouth-reboot.service disabled >plymouth-start.service disabled >plymouth-switch-root.service static >polkit.service static >psacct.service disabled >quotaon.service static >rc-local.service static >rdisc.service disabled >realmd.service static >rescue.service static >rngd.service enabled >rpcbind.service enabled >rpcgssd.service disabled >rpcidmapd.service disabled >rpcsvcgssd.service disabled >rsyncd.service disabled >rsyslog.service enabled >serial-getty@.service static >smartd.service enabled >sshd-keygen.service static >sshd.service enabled >sshd@.service static >sssd.service disabled >svnserve.service disabled >syslog.service enabled >systemd-ask-password-console.service static >systemd-ask-password-plymouth.service static >systemd-ask-password-wall.service static >systemd-backlight@.service static >systemd-binfmt.service static >systemd-fsck-root.service static >systemd-fsck@.service static >systemd-halt.service static >systemd-hibernate.service static >systemd-hostnamed.service static >systemd-hybrid-sleep.service static >systemd-initctl.service static >systemd-journal-flush.service static >systemd-journald.service static >systemd-kexec.service static >systemd-localed.service static >systemd-logind.service static >systemd-machined.service static >systemd-modules-load.service static >systemd-nspawn@.service disabled >systemd-poweroff.service static >systemd-quotacheck.service static >systemd-random-seed.service static >systemd-readahead-collect.service enabled >systemd-readahead-done.service static >systemd-readahead-drop.service enabled >systemd-readahead-replay.service enabled >systemd-reboot.service static >systemd-remount-fs.service static >systemd-shutdownd.service static >systemd-suspend.service static >systemd-sysctl.service static >systemd-timedated.service static >systemd-tmpfiles-clean.service static >systemd-tmpfiles-setup-dev.service static >systemd-tmpfiles-setup.service static >systemd-udev-settle.service static >systemd-udev-trigger.service static >systemd-udevd.service static >systemd-update-utmp-runlevel.service static >systemd-update-utmp.service static >systemd-user-sessions.service static >systemd-vconsole-setup.service static >user@.service static >wpa_supplicant.service disabled >yum-makecache.service static >-.slice static >machine.slice static >system.slice static >user.slice static >cvs.socket disabled >dbus.socket static >dm-event.socket enabled >lvm2-lvmetad.socket enabled >pcscd.socket enabled >rpcbind.socket enabled >rsyncd.socket disabled >sshd.socket disabled >syslog.socket static >systemd-initctl.socket static >systemd-journald.socket static >systemd-shutdownd.socket static >systemd-udevd-control.socket static >systemd-udevd-kernel.socket static >basic.target static >bluetooth.target static >cryptsetup.target static >ctrl-alt-del.target disabled >cvs.target static >default.target enabled >emergency.target static >final.target static >getty.target static >graphical.target disabled >halt.target disabled >hibernate.target static >hybrid-sleep.target static >initrd-fs.target static >initrd-root-fs.target static >initrd-switch-root.target static >initrd.target static >kexec.target disabled >local-fs-pre.target static >local-fs.target static >multi-user.target enabled >network-online.target static >network.target static >nfs.target enabled >nss-lookup.target static >nss-user-lookup.target static >paths.target static >poweroff.target disabled >printer.target static >reboot.target disabled >remote-fs-pre.target static >remote-fs.target enabled >rescue.target disabled >rpcbind.target static >runlevel0.target disabled >runlevel1.target disabled >runlevel2.target disabled >runlevel3.target disabled >runlevel4.target disabled >runlevel5.target disabled >runlevel6.target disabled >shutdown.target static >sigpwr.target static >sleep.target static >slices.target static >smartcard.target static >sockets.target static >sound.target static >suspend.target static >swap.target static >sysinit.target static >system-update.target static >time-sync.target static >timers.target static >umount.target static >systemd-readahead-done.timer static >systemd-tmpfiles-clean.timer static >yum-makecache.timer disabled > >254 unit files listed. > >2014-01-24T15:31:17Z DEBUG stderr= >2014-01-24T15:31:17Z DEBUG Saving StateFile to '/var/lib/ipa-client/sysrestore/sysrestore.state' >2014-01-24T15:31:17Z DEBUG Saving StateFile to '/var/lib/ipa-client/sysrestore/sysrestore.state' >2014-01-24T15:31:17Z DEBUG Starting external process >2014-01-24T15:31:17Z DEBUG args=/usr/sbin/authconfig --enablesssdauth --update --enablesssd >2014-01-24T15:31:18Z DEBUG Process finished, return code=0 >2014-01-24T15:31:18Z DEBUG stdout= >2014-01-24T15:31:18Z DEBUG stderr= >2014-01-24T15:31:18Z INFO SSSD enabled >2014-01-24T15:31:18Z DEBUG Starting external process >2014-01-24T15:31:18Z DEBUG args=/bin/systemctl restart sssd.service >2014-01-24T15:31:18Z DEBUG Process finished, return code=0 >2014-01-24T15:31:18Z DEBUG stdout= >2014-01-24T15:31:18Z DEBUG stderr= >2014-01-24T15:31:18Z DEBUG Starting external process >2014-01-24T15:31:18Z DEBUG args=/bin/systemctl is-active sssd.service >2014-01-24T15:31:18Z DEBUG Process finished, return code=0 >2014-01-24T15:31:18Z DEBUG stdout=active > >2014-01-24T15:31:18Z DEBUG stderr= >2014-01-24T15:31:18Z DEBUG Starting external process >2014-01-24T15:31:18Z DEBUG args=/bin/systemctl enable sssd.service >2014-01-24T15:31:18Z DEBUG Process finished, return code=0 >2014-01-24T15:31:18Z DEBUG stdout= >2014-01-24T15:31:18Z DEBUG stderr= >2014-01-24T15:31:18Z DEBUG Backing up system configuration file '/etc/openldap/ldap.conf' >2014-01-24T15:31:18Z DEBUG Saving Index File to '/var/lib/ipa-client/sysrestore/sysrestore.index' >2014-01-24T15:31:18Z INFO Configured /etc/openldap/ldap.conf >2014-01-24T15:31:18Z DEBUG Starting external process >2014-01-24T15:31:18Z DEBUG args=getent passwd admin@example128.com >2014-01-24T15:31:18Z DEBUG Process finished, return code=0 >2014-01-24T15:31:18Z DEBUG stdout=admin:*:1990200000:1990200000:Administrator:/home/admin:/bin/bash > >2014-01-24T15:31:18Z DEBUG stderr= >2014-01-24T15:31:18Z DEBUG Starting external process >2014-01-24T15:31:18Z DEBUG args=/bin/systemctl is-enabled chronyd.service >2014-01-24T15:31:18Z DEBUG Process finished, return code=0 >2014-01-24T15:31:18Z DEBUG stdout=enabled > >2014-01-24T15:31:18Z DEBUG stderr= >2014-01-24T15:31:18Z DEBUG Starting external process >2014-01-24T15:31:18Z DEBUG args=/bin/systemctl is-active chronyd.service >2014-01-24T15:31:18Z DEBUG Process finished, return code=0 >2014-01-24T15:31:18Z DEBUG stdout=active > >2014-01-24T15:31:18Z DEBUG stderr= >2014-01-24T15:31:18Z DEBUG Saving StateFile to '/var/lib/ipa-client/sysrestore/sysrestore.state' >2014-01-24T15:31:18Z DEBUG Saving StateFile to '/var/lib/ipa-client/sysrestore/sysrestore.state' >2014-01-24T15:31:18Z DEBUG Starting external process >2014-01-24T15:31:18Z DEBUG args=/bin/systemctl stop chronyd.service >2014-01-24T15:31:18Z DEBUG Process finished, return code=0 >2014-01-24T15:31:18Z DEBUG stdout= >2014-01-24T15:31:18Z DEBUG stderr= >2014-01-24T15:31:18Z DEBUG Starting external process >2014-01-24T15:31:18Z DEBUG args=/bin/systemctl disable chronyd.service >2014-01-24T15:31:18Z DEBUG Process finished, return code=0 >2014-01-24T15:31:18Z DEBUG stdout= >2014-01-24T15:31:18Z DEBUG stderr=rm '/etc/systemd/system/multi-user.target.wants/chronyd.service' > >2014-01-24T15:31:18Z DEBUG Backing up system configuration file '/etc/ntp/step-tickers' >2014-01-24T15:31:18Z DEBUG Saving Index File to '/var/lib/ipa-client/sysrestore/sysrestore.index' >2014-01-24T15:31:18Z DEBUG Starting external process >2014-01-24T15:31:18Z DEBUG args=/usr/sbin/selinuxenabled >2014-01-24T15:31:18Z DEBUG Process finished, return code=0 >2014-01-24T15:31:18Z DEBUG stdout= >2014-01-24T15:31:18Z DEBUG stderr= >2014-01-24T15:31:18Z DEBUG Starting external process >2014-01-24T15:31:18Z DEBUG args=/usr/sbin/restorecon /etc/ntp/step-tickers >2014-01-24T15:31:18Z DEBUG Process finished, return code=0 >2014-01-24T15:31:18Z DEBUG stdout= >2014-01-24T15:31:18Z DEBUG stderr= >2014-01-24T15:31:18Z DEBUG Starting external process >2014-01-24T15:31:18Z DEBUG args=/bin/systemctl is-enabled ntpd.service >2014-01-24T15:31:18Z DEBUG Process finished, return code=1 >2014-01-24T15:31:18Z DEBUG stdout=disabled > >2014-01-24T15:31:18Z DEBUG stderr= >2014-01-24T15:31:18Z DEBUG Saving StateFile to '/var/lib/ipa-client/sysrestore/sysrestore.state' >2014-01-24T15:31:18Z DEBUG Saving StateFile to '/var/lib/ipa-client/sysrestore/sysrestore.state' >2014-01-24T15:31:18Z DEBUG Backing up system configuration file '/etc/ntp.conf' >2014-01-24T15:31:18Z DEBUG Saving Index File to '/var/lib/ipa-client/sysrestore/sysrestore.index' >2014-01-24T15:31:18Z DEBUG Starting external process >2014-01-24T15:31:18Z DEBUG args=/usr/sbin/selinuxenabled >2014-01-24T15:31:18Z DEBUG Process finished, return code=0 >2014-01-24T15:31:18Z DEBUG stdout= >2014-01-24T15:31:18Z DEBUG stderr= >2014-01-24T15:31:18Z DEBUG Starting external process >2014-01-24T15:31:18Z DEBUG args=/usr/sbin/restorecon /etc/ntp.conf >2014-01-24T15:31:18Z DEBUG Process finished, return code=0 >2014-01-24T15:31:18Z DEBUG stdout= >2014-01-24T15:31:18Z DEBUG stderr= >2014-01-24T15:31:18Z DEBUG Backing up system configuration file '/etc/sysconfig/ntpd' >2014-01-24T15:31:18Z DEBUG Saving Index File to '/var/lib/ipa-client/sysrestore/sysrestore.index' >2014-01-24T15:31:18Z DEBUG Starting external process >2014-01-24T15:31:18Z DEBUG args=/usr/sbin/selinuxenabled >2014-01-24T15:31:18Z DEBUG Process finished, return code=0 >2014-01-24T15:31:18Z DEBUG stdout= >2014-01-24T15:31:18Z DEBUG stderr= >2014-01-24T15:31:18Z DEBUG Starting external process >2014-01-24T15:31:18Z DEBUG args=/usr/sbin/restorecon /etc/sysconfig/ntpd >2014-01-24T15:31:18Z DEBUG Process finished, return code=0 >2014-01-24T15:31:18Z DEBUG stdout= >2014-01-24T15:31:18Z DEBUG stderr= >2014-01-24T15:31:18Z DEBUG Starting external process >2014-01-24T15:31:18Z DEBUG args=/bin/systemctl enable ntpd.service >2014-01-24T15:31:18Z DEBUG Process finished, return code=0 >2014-01-24T15:31:18Z DEBUG stdout= >2014-01-24T15:31:18Z DEBUG stderr=ln -s '/usr/lib/systemd/system/ntpd.service' '/etc/systemd/system/multi-user.target.wants/ntpd.service' > >2014-01-24T15:31:18Z DEBUG Starting external process >2014-01-24T15:31:18Z DEBUG args=/bin/systemctl restart ntpd.service >2014-01-24T15:31:19Z DEBUG Process finished, return code=1 >2014-01-24T15:31:19Z DEBUG stdout= >2014-01-24T15:31:19Z DEBUG stderr=Job for ntpd.service failed. See 'systemctl status ntpd.service' and 'journalctl -xn' for details. >
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1057686
: 855045