Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 925498 Details for
Bug 1128420
adding cifs Kerberos principal: Operation failed! PrincipalName not found.
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
Log of adtrust installation attempt
adtrust.log (text/x-c), 34.32 KB, created by
William Brown
on 2014-08-10 11:26:20 UTC
(
hide
)
Description:
Log of adtrust installation attempt
Filename:
MIME Type:
Creator:
William Brown
Created:
2014-08-10 11:26:20 UTC
Size:
34.32 KB
patch
obsolete
>[root@lorna ~]# ipa-adtrust-install -d > >The log file for this installation can be found in /var/log/ipaserver-install.log >ipa : DEBUG /sbin/ipa-adtrust-install was invoked with options: {'enable_compat': False, 'unattended': False, 'no_msdcs': False, 'rid_base': 1000, 'secondary_rid_base': 100000000, 'netbios_name': None, 'debug': True, 'add_sids': False, 'ip_address': None} >ipa : DEBUG missing options might be asked for interactively later > >ipa : DEBUG Loading Index file from '/var/lib/ipa/sysrestore/sysrestore.index' >ipa : DEBUG Loading Index file from '/var/lib/ipa/sysrestore/sysrestore.index' >============================================================================== >This program will setup components needed to establish trust to AD domains for >the FreeIPA Server. > >This includes: > * Configure Samba > * Add trust related objects to FreeIPA LDAP server > >To accept the default shown in brackets, press the Enter key. > >ipa : DEBUG importing all plugin modules in '/usr/lib/python2.7/site-packages/ipalib/plugins'... >ipa : DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/aci.py' >ipa : DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/automember.py' >ipa : DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/automount.py' >ipa : DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/baseldap.py' >ipa : DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/batch.py' >ipa : DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/cert.py' >ipa : DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/config.py' >ipa : DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/delegation.py' >ipa : DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/dns.py' >ipa : DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/group.py' >ipa : DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/hbacrule.py' >ipa : DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/hbacsvc.py' >ipa : DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/hbacsvcgroup.py' >ipa : DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/hbactest.py' >ipa : DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/host.py' >ipa : DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/hostgroup.py' >ipa : DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/idrange.py' >ipa : DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/internal.py' >ipa : DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/kerberos.py' >ipa : DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/krbtpolicy.py' >ipa : DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/migration.py' >ipa : DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/misc.py' >ipa : DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/netgroup.py' >ipa : DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/passwd.py' >ipa : DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/permission.py' >ipa : DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/ping.py' >ipa : DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/pkinit.py' >ipa : DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/privilege.py' >ipa : DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/pwpolicy.py' >ipa : DEBUG Starting external process >ipa : DEBUG args=klist -V >ipa : DEBUG Process finished, return code=0 >ipa : DEBUG stdout=Kerberos 5 version 1.11.5 > >ipa : DEBUG stderr= >ipa : DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/realmdomains.py' >ipa : DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/role.py' >ipa : DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/selfservice.py' >ipa : DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/selinuxusermap.py' >ipa : DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/service.py' >ipa : DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/sudocmd.py' >ipa : DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/sudocmdgroup.py' >ipa : DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/sudorule.py' >ipa : DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/trust.py' >ipa : DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/user.py' >ipa : DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/virtual.py' >ipa : DEBUG importing plugin module '/usr/lib/python2.7/site-packages/ipalib/plugins/xmlclient.py' >Do you want to enable support for trusted domains in Schema Compatibility plugin? >This will allow clients older than SSSD 1.9 and non-Linux clients to work with trusted users. > >Enable trusted domains support in slapi-nis? [no]: > >The server hostname resolves to more than one address: > 2001:44b8:16a:5::249 > 172.24.5.249 >Please provide the IP address to be used for this host name: 2001:44b8:16a:5::249 >ipa : DEBUG Starting external process >ipa : DEBUG args=/sbin/ip -family inet6 -oneline address show >ipa : DEBUG Process finished, return code=0 >ipa : DEBUG stdout=1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever >2: eth0 inet6 2001:44b8:16a:5::249/64 scope global \ valid_lft forever preferred_lft forever >2: eth0 inet6 fe80::5054:ff:fe85:30a/64 scope link \ valid_lft forever preferred_lft forever > >ipa : DEBUG stderr= >ipa : DEBUG will use ip_address: 2001:44b8:16a:5::249 > >Configuring cross-realm trusts for IPA server requires password for user 'admin'. >This user is a regular system account used for IPA server administration. > >admin password: > >ipa : DEBUG Starting external process >ipa : DEBUG args=kinit admin >ipa : DEBUG Process finished, return code=0 >ipa : DEBUG stdout=Password for admin@DEV.BLACKHATS.NET.AU: > >ipa : DEBUG stderr= >ipa.ipaserver.plugins.ldap2.ldap2: DEBUG Created connection context.ldap2 >ipa.ipalib.plugins.user.user_show: DEBUG raw: user_show(u'admin') >ipa.ipalib.plugins.user.user_show: DEBUG user_show(u'admin', rights=False, all=False, raw=False, no_members=False) >ipa.ipapython.ipaldap.SchemaCache: DEBUG retrieving schema for SchemaCache url=ldapi://%2fvar%2frun%2fslapd-DEV-BLACKHATS-NET-AU.socket conn=<ldap.ldapobject.SimpleLDAPObject instance at 0x35b0290> >ipa.ipaserver.plugins.ldap2.ldap2: DEBUG get_memberof: entry_dn=uid=admin,cn=users,cn=accounts,dc=dev,dc=blackhats,dc=net,dc=au memberof=[ipapython.dn.DN('cn=admins,cn=groups,cn=accounts,dc=dev,dc=blackhats,dc=net,dc=au'), ipapython.dn.DN('cn=replication administrators,cn=privileges,cn=pbac,dc=dev,dc=blackhats,dc=net,dc=au'), ipapython.dn.DN('cn=add replication agreements,cn=permissions,cn=pbac,dc=dev,dc=blackhats,dc=net,dc=au'), ipapython.dn.DN('cn=modify replication agreements,cn=permissions,cn=pbac,dc=dev,dc=blackhats,dc=net,dc=au'), ipapython.dn.DN('cn=remove replication agreements,cn=permissions,cn=pbac,dc=dev,dc=blackhats,dc=net,dc=au'), ipapython.dn.DN('cn=modify dna range,cn=permissions,cn=pbac,dc=dev,dc=blackhats,dc=net,dc=au'), ipapython.dn.DN('cn=host enrollment,cn=privileges,cn=pbac,dc=dev,dc=blackhats,dc=net,dc=au'), ipapython.dn.DN('cn=manage host keytab,cn=permissions,cn=pbac,dc=dev,dc=blackhats,dc=net,dc=au'), ipapython.dn.DN('cn=enroll a host,cn=permissions,cn=pbac,dc=dev,dc=blackhats,dc=net,dc=au'), ipapython.dn.DN('cn=add krbprincipalname to a host,cn=permissions,cn=pbac,dc=dev,dc=blackhats,dc=net,dc=au'), ipapython.dn.DN('cn=unlock user accounts,cn=permissions,cn=pbac,dc=dev,dc=blackhats,dc=net,dc=au'), ipapython.dn.DN('cn=manage service keytab,cn=permissions,cn=pbac,dc=dev,dc=blackhats,dc=net,dc=au'), ipapython.dn.DN('cn=trust admins,cn=groups,cn=accounts,dc=dev,dc=blackhats,dc=net,dc=au')] >ipa.ipaserver.plugins.ldap2.ldap2: DEBUG get_memberof: result direct=[ipapython.dn.DN('cn=admins,cn=groups,cn=accounts,dc=dev,dc=blackhats,dc=net,dc=au'), ipapython.dn.DN('cn=trust admins,cn=groups,cn=accounts,dc=dev,dc=blackhats,dc=net,dc=au')] indirect=[ipapython.dn.DN('cn=replication administrators,cn=privileges,cn=pbac,dc=dev,dc=blackhats,dc=net,dc=au'), ipapython.dn.DN('cn=add replication agreements,cn=permissions,cn=pbac,dc=dev,dc=blackhats,dc=net,dc=au'), ipapython.dn.DN('cn=modify replication agreements,cn=permissions,cn=pbac,dc=dev,dc=blackhats,dc=net,dc=au'), ipapython.dn.DN('cn=remove replication agreements,cn=permissions,cn=pbac,dc=dev,dc=blackhats,dc=net,dc=au'), ipapython.dn.DN('cn=modify dna range,cn=permissions,cn=pbac,dc=dev,dc=blackhats,dc=net,dc=au'), ipapython.dn.DN('cn=host enrollment,cn=privileges,cn=pbac,dc=dev,dc=blackhats,dc=net,dc=au'), ipapython.dn.DN('cn=manage host keytab,cn=permissions,cn=pbac,dc=dev,dc=blackhats,dc=net,dc=au'), ipapython.dn.DN('cn=enroll a host,cn=permissions,cn=pbac,dc=dev,dc=blackhats,dc=net,dc=au'), ipapython.dn.DN('cn=add krbprincipalname to a host,cn=permissions,cn=pbac,dc=dev,dc=blackhats,dc=net,dc=au'), ipapython.dn.DN('cn=unlock user accounts,cn=permissions,cn=pbac,dc=dev,dc=blackhats,dc=net,dc=au'), ipapython.dn.DN('cn=manage service keytab,cn=permissions,cn=pbac,dc=dev,dc=blackhats,dc=net,dc=au')] >ipa.ipalib.plugins.group.group_show: DEBUG raw: group_show(u'admins') >ipa.ipalib.plugins.group.group_show: DEBUG group_show(u'admins', rights=False, all=False, raw=False, no_members=False) >ipa.ipaserver.plugins.ldap2.ldap2: DEBUG get_members: group_dn=cn=admins,cn=groups,cn=accounts,dc=dev,dc=blackhats,dc=net,dc=au members=[ipapython.dn.DN('uid=admin,cn=users,cn=accounts,dc=dev,dc=blackhats,dc=net,dc=au')] membertype=2 >ipa.ipaserver.plugins.ldap2.ldap2: DEBUG get_members: result=[] >ipa.ipaserver.plugins.ldap2.ldap2: DEBUG get_memberof: entry_dn=cn=admins,cn=groups,cn=accounts,dc=dev,dc=blackhats,dc=net,dc=au memberof=[ipapython.dn.DN('cn=replication administrators,cn=privileges,cn=pbac,dc=dev,dc=blackhats,dc=net,dc=au'), ipapython.dn.DN('cn=add replication agreements,cn=permissions,cn=pbac,dc=dev,dc=blackhats,dc=net,dc=au'), ipapython.dn.DN('cn=modify replication agreements,cn=permissions,cn=pbac,dc=dev,dc=blackhats,dc=net,dc=au'), ipapython.dn.DN('cn=remove replication agreements,cn=permissions,cn=pbac,dc=dev,dc=blackhats,dc=net,dc=au'), ipapython.dn.DN('cn=modify dna range,cn=permissions,cn=pbac,dc=dev,dc=blackhats,dc=net,dc=au'), ipapython.dn.DN('cn=host enrollment,cn=privileges,cn=pbac,dc=dev,dc=blackhats,dc=net,dc=au'), ipapython.dn.DN('cn=manage host keytab,cn=permissions,cn=pbac,dc=dev,dc=blackhats,dc=net,dc=au'), ipapython.dn.DN('cn=enroll a host,cn=permissions,cn=pbac,dc=dev,dc=blackhats,dc=net,dc=au'), ipapython.dn.DN('cn=add krbprincipalname to a host,cn=permissions,cn=pbac,dc=dev,dc=blackhats,dc=net,dc=au'), ipapython.dn.DN('cn=unlock user accounts,cn=permissions,cn=pbac,dc=dev,dc=blackhats,dc=net,dc=au'), ipapython.dn.DN('cn=manage service keytab,cn=permissions,cn=pbac,dc=dev,dc=blackhats,dc=net,dc=au')] >ipa.ipaserver.plugins.ldap2.ldap2: DEBUG get_memberof: result direct=[ipapython.dn.DN('cn=Replication Administrators,cn=privileges,cn=pbac,dc=dev,dc=blackhats,dc=net,dc=au'), ipapython.dn.DN('cn=Host Enrollment,cn=privileges,cn=pbac,dc=dev,dc=blackhats,dc=net,dc=au'), ipapython.dn.DN('cn=Unlock user accounts,cn=permissions,cn=pbac,dc=dev,dc=blackhats,dc=net,dc=au'), ipapython.dn.DN('cn=Manage service keytab,cn=permissions,cn=pbac,dc=dev,dc=blackhats,dc=net,dc=au')] indirect=[ipapython.dn.DN('cn=add replication agreements,cn=permissions,cn=pbac,dc=dev,dc=blackhats,dc=net,dc=au'), ipapython.dn.DN('cn=modify replication agreements,cn=permissions,cn=pbac,dc=dev,dc=blackhats,dc=net,dc=au'), ipapython.dn.DN('cn=remove replication agreements,cn=permissions,cn=pbac,dc=dev,dc=blackhats,dc=net,dc=au'), ipapython.dn.DN('cn=modify dna range,cn=permissions,cn=pbac,dc=dev,dc=blackhats,dc=net,dc=au'), ipapython.dn.DN('cn=manage host keytab,cn=permissions,cn=pbac,dc=dev,dc=blackhats,dc=net,dc=au'), ipapython.dn.DN('cn=enroll a host,cn=permissions,cn=pbac,dc=dev,dc=blackhats,dc=net,dc=au'), ipapython.dn.DN('cn=add krbprincipalname to a host,cn=permissions,cn=pbac,dc=dev,dc=blackhats,dc=net,dc=au')] >Enter the NetBIOS name for the IPA domain. >Only up to 15 uppercase ASCII letters and digits are allowed. >Example: EXAMPLE. > > >NetBIOS domain name [DEV]: DEVIPA > >ipa : DEBUG Searching for objects with missing SID with filter=(&(objectclass=ipaobject)(!(objectclass=mepmanagedentry))(|(objectclass=posixaccount)(objectclass=posixgroup)(objectclass=ipaidobject))(!(ipantsecurityidentifier=*))), base_dn=dc=dev,dc=blackhats,dc=net,dc=au > >WARNING: 3 existing users or groups do not have a SID identifier assigned. >Installer can run a task to have ipa-sidgen Directory Server plugin generate >the SID identifier for all these users. Please note, the in case of a high >number of users and groups, the operation might lead to high replication >traffic and performance degradation. Refer to ipa-adtrust-install(1) man page >for details. > >Do you want to run the ipa-sidgen task? [no]: yes > >The following operations may take some minutes to complete. >Please wait until the prompt is returned. > >ipa : DEBUG Loading StateFile from '/var/lib/ipa/sysrestore/sysrestore.state' >ipa.ipapython.ipaldap.SchemaCache: DEBUG flushing ldapi://%2fvar%2frun%2fslapd-DEV-BLACKHATS-NET-AU.socket from SchemaCache >ipa.ipapython.ipaldap.SchemaCache: DEBUG retrieving schema for SchemaCache url=ldapi://%2fvar%2frun%2fslapd-DEV-BLACKHATS-NET-AU.socket conn=<ldap.ldapobject.SimpleLDAPObject instance at 0x497d830> >ipa : DEBUG Configuring CIFS >Configuring CIFS >ipa : DEBUG [1/20]: stopping smbd > [1/20]: stopping smbd >ipa : DEBUG Starting external process >ipa : DEBUG args=/bin/systemctl is-active smb.service >ipa : DEBUG Process finished, return code=3 >ipa : DEBUG stdout=unknown > >ipa : DEBUG stderr= >ipa : DEBUG Saving StateFile to '/var/lib/ipa/sysrestore/sysrestore.state' >ipa : DEBUG Starting external process >ipa : DEBUG args=/bin/systemctl stop winbind.service >ipa : DEBUG Process finished, return code=0 >ipa : DEBUG stdout= >ipa : DEBUG stderr= >ipa : DEBUG Starting external process >ipa : DEBUG args=/bin/systemctl stop smb.service >ipa : DEBUG Process finished, return code=0 >ipa : DEBUG stdout= >ipa : DEBUG stderr= >ipa : DEBUG duration: 0 seconds >ipa : DEBUG [2/20]: creating samba domain object > [2/20]: creating samba domain object >ipa.ipapython.ipaldap.SchemaCache: DEBUG flushing ldapi://%2fvar%2frun%2fslapd-DEV-BLACKHATS-NET-AU.socket from SchemaCache >ipa.ipapython.ipaldap.SchemaCache: DEBUG retrieving schema for SchemaCache url=ldapi://%2fvar%2frun%2fslapd-DEV-BLACKHATS-NET-AU.socket conn=<ldap.ldapobject.SimpleLDAPObject instance at 0x4970680> >ipa : DEBUG duration: 0 seconds >ipa : DEBUG [3/20]: creating samba config registry > [3/20]: creating samba config registry >ipa : DEBUG Starting external process >ipa : DEBUG args=/usr/bin/net conf import /tmp/tmpnMdOdZ >ipa : DEBUG Process finished, return code=0 >ipa : DEBUG stdout= >ipa : DEBUG stderr= >ipa : DEBUG duration: 0 seconds >ipa : DEBUG [4/20]: writing samba config file > [4/20]: writing samba config file >ipa : DEBUG duration: 0 seconds >ipa : DEBUG [5/20]: adding cifs Kerberos principal > [5/20]: adding cifs Kerberos principal >ipa.ipalib.plugins.service.service_add: DEBUG raw: service_add(u'cifs/lorna.dev.blackhats.net.au@DEV.BLACKHATS.NET.AU') >ipa.ipalib.plugins.service.service_add: DEBUG service_add(u'cifs/lorna.dev.blackhats.net.au@DEV.BLACKHATS.NET.AU', force=False, all=False, raw=False, no_members=False) >ipa.ipalib.plugins.host.host_show: DEBUG raw: host_show(u'lorna.dev.blackhats.net.au') >ipa.ipalib.plugins.host.host_show: DEBUG host_show(u'lorna.dev.blackhats.net.au', rights=False, all=False, raw=False, no_members=False) >ipa.ipalib.plugins.service.service_add: DEBUG IPA: DNS A record lookup failed for lorna.dev.blackhats.net.au >ipa : DEBUG Starting external process >ipa : DEBUG args=ipa-getkeytab --server lorna.dev.blackhats.net.au --principal cifs/lorna.dev.blackhats.net.au@DEV.BLACKHATS.NET.AU -k /etc/samba/samba.keytab >ipa : DEBUG Process finished, return code=9 >ipa : DEBUG stdout= >ipa : DEBUG stderr=Operation failed! PrincipalName not found. > > >ipa : CRITICAL Failed to add key for cifs/lorna.dev.blackhats.net.au@DEV.BLACKHATS.NET.AU >ipa : DEBUG duration: 1 seconds >ipa : DEBUG [6/20]: check for cifs services defined on other replicas > [6/20]: check for cifs services defined on other replicas >ipa : CRITICAL Checking replicas for cifs principals failed with error 'no such entry' >ipa : DEBUG duration: 0 seconds >ipa : DEBUG [7/20]: adding cifs principal to S4U2Proxy targets > [7/20]: adding cifs principal to S4U2Proxy targets >ipa : DEBUG duration: 0 seconds >ipa : DEBUG [8/20]: adding admin(group) SIDs > [8/20]: adding admin(group) SIDs >ipa : DEBUG duration: 0 seconds >ipa : DEBUG [9/20]: adding RID bases > [9/20]: adding RID bases >ipa : DEBUG duration: 0 seconds >ipa : DEBUG [10/20]: updating Kerberos config > [10/20]: updating Kerberos config >ipa : DEBUG 'dns_lookup_kdc' already set to 'true', nothing to do. >'dns_lookup_kdc' already set to 'true', nothing to do. >ipa : DEBUG duration: 0 seconds >ipa : DEBUG [11/20]: activating CLDAP plugin > [11/20]: activating CLDAP plugin >ipa : DEBUG Starting external process >ipa : DEBUG args=/usr/bin/ldapmodify -v -f /tmp/tmpqdeeMb -H ldapi://%2fvar%2frun%2fslapd-DEV-BLACKHATS-NET-AU.socket >ipa : DEBUG Process finished, return code=0 >ipa : DEBUG stdout=add objectclass: > top > nsSlapdPlugin > extensibleObject >add cn: > ipa_cldap >add nsslapd-pluginpath: > libipa_cldap >add nsslapd-plugininitfunc: > ipa_cldap_init >add nsslapd-plugintype: > postoperation >add nsslapd-pluginenabled: > on >add nsslapd-pluginid: > ipa_cldap_init >add nsslapd-pluginversion: > @PACKAGE_VERSION@ >add nsslapd-pluginvendor: > RedHat >add nsslapd-plugindescription: > CLDAP Server to interoperate with AD >add nsslapd-plugin-depends-on-type: > database >add nsslapd-basedn: > dc=dev,dc=blackhats,dc=net,dc=au >adding new entry "cn=ipa_cldap,cn=plugins,cn=config" >modify complete > > >ipa : DEBUG stderr=ldap_initialize( ldapi://%2Fvar%2Frun%2Fslapd-DEV-BLACKHATS-NET-AU.socket/??base ) >SASL/EXTERNAL authentication started >SASL username: gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth >SASL SSF: 0 > >ipa : DEBUG duration: 0 seconds >ipa : DEBUG [12/20]: activating sidgen plugin and task > [12/20]: activating sidgen plugin and task >ipa : DEBUG Starting external process >ipa : DEBUG args=/usr/bin/ldapmodify -v -f /tmp/tmpV3pck_ -H ldapi://%2fvar%2frun%2fslapd-DEV-BLACKHATS-NET-AU.socket >ipa : DEBUG Process finished, return code=0 >ipa : DEBUG stdout=add objectclass: > top > nsSlapdPlugin > extensibleObject >add cn: > IPA SIDGEN >add nsslapd-pluginpath: > libipa_sidgen >add nsslapd-plugininitfunc: > ipa_sidgen_init >add nsslapd-plugintype: > postoperation >add nsslapd-pluginenabled: > on >add nsslapd-pluginid: > ipa_sidgen_postop >add nsslapd-pluginversion: > 1.0 >add nsslapd-pluginvendor: > Red Hat, Inc. >add nsslapd-plugindescription: > IPA SIDGEN post operation >add nsslapd-plugin-depends-on-type: > database >add nsslapd-basedn: > dc=dev,dc=blackhats,dc=net,dc=au >adding new entry "cn=IPA SIDGEN,cn=plugins,cn=config" >modify complete > > >ipa : DEBUG stderr=ldap_initialize( ldapi://%2Fvar%2Frun%2Fslapd-DEV-BLACKHATS-NET-AU.socket/??base ) >SASL/EXTERNAL authentication started >SASL username: gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth >SASL SSF: 0 > >ipa : DEBUG Starting external process >ipa : DEBUG args=/usr/bin/ldapmodify -v -f /tmp/tmpYvSNf2 -H ldapi://%2fvar%2frun%2fslapd-DEV-BLACKHATS-NET-AU.socket >ipa : DEBUG Process finished, return code=0 >ipa : DEBUG stdout=add objectClass: > top > nsSlapdPlugin > extensibleObject >add cn: > ipa-sidgen-task >add nsslapd-pluginPath: > libipa_sidgen_task >add nsslapd-pluginInitfunc: > sidgen_task_init >add nsslapd-pluginType: > object >add nsslapd-pluginEnabled: > on >add nsslapd-pluginId: > ipa_sidgen_task >add nsslapd-pluginVersion: > 1.0 >add nsslapd-pluginVendor: > RedHat >add nsslapd-pluginDescription: > Generate SIDs for existing user and group entries >adding new entry "cn=ipa-sidgen-task,cn=plugins,cn=config" >modify complete > >add objectClass: > top > extensibleObject >add cn: > ipa-sidgen-task >adding new entry "cn=ipa-sidgen-task,cn=tasks,cn=config" >modify complete > > >ipa : DEBUG stderr=ldap_initialize( ldapi://%2Fvar%2Frun%2Fslapd-DEV-BLACKHATS-NET-AU.socket/??base ) >SASL/EXTERNAL authentication started >SASL username: gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth >SASL SSF: 0 > >ipa : DEBUG duration: 0 seconds >ipa : DEBUG [13/20]: activating extdom plugin > [13/20]: activating extdom plugin >ipa : DEBUG Starting external process >ipa : DEBUG args=/usr/bin/ldapmodify -v -f /tmp/tmp3e6UMk -H ldapi://%2fvar%2frun%2fslapd-DEV-BLACKHATS-NET-AU.socket >ipa : DEBUG Process finished, return code=0 >ipa : DEBUG stdout=add objectclass: > top > nsSlapdPlugin > extensibleObject >add cn: > ipa_extdom_extop >add nsslapd-pluginpath: > libipa_extdom_extop >add nsslapd-plugininitfunc: > ipa_extdom_init >add nsslapd-plugintype: > extendedop >add nsslapd-pluginenabled: > on >add nsslapd-pluginid: > ipa_extdom_extop >add nsslapd-pluginversion: > 1.0 >add nsslapd-pluginvendor: > RedHat >add nsslapd-plugindescription: > Support resolving IDs in trusted domains to names and back >add nsslapd-plugin-depends-on-type: > database >add nsslapd-basedn: > dc=dev,dc=blackhats,dc=net,dc=au >adding new entry "cn=ipa_extdom_extop,cn=plugins,cn=config" >modify complete > > >ipa : DEBUG stderr=ldap_initialize( ldapi://%2Fvar%2Frun%2Fslapd-DEV-BLACKHATS-NET-AU.socket/??base ) >SASL/EXTERNAL authentication started >SASL username: gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth >SASL SSF: 0 > >ipa : DEBUG duration: 0 seconds >ipa : DEBUG [14/20]: configuring smbd to start on boot > [14/20]: configuring smbd to start on boot >ipa : DEBUG Starting external process >ipa : DEBUG args=/bin/systemctl is-enabled smb.service >ipa : DEBUG Process finished, return code=1 >ipa : DEBUG stdout=disabled > >ipa : DEBUG stderr= >ipa : DEBUG Saving StateFile to '/var/lib/ipa/sysrestore/sysrestore.state' >ipa : DEBUG Starting external process >ipa : DEBUG args=/bin/systemctl disable smb.service >ipa : DEBUG Process finished, return code=0 >ipa : DEBUG stdout= >ipa : DEBUG stderr= >ipa : DEBUG Starting external process >ipa : DEBUG args=/bin/systemctl disable smb.service >ipa : DEBUG Process finished, return code=0 >ipa : DEBUG stdout= >ipa : DEBUG stderr= >ipa : DEBUG duration: 0 seconds >ipa : DEBUG [15/20]: adding special DNS service records > [15/20]: adding special DNS service records >ipa.ipalib.plugins.dns.dns_is_enabled: DEBUG raw: dns_is_enabled() >ipa.ipalib.plugins.dns.dns_is_enabled: DEBUG dns_is_enabled() >ipa : DEBUG DNS management was not enabled at install time. >DNS management was not enabled at install time. >ipa : DEBUG Add the following service records to your DNS server for DNS zone dev.blackhats.net.au: >Add the following service records to your DNS server for DNS zone dev.blackhats.net.au: >ipa : DEBUG - _ldap._tcp.Default-First-Site-Name._sites.dc._msdcs > - _ldap._tcp.Default-First-Site-Name._sites.dc._msdcs >ipa : DEBUG - _ldap._tcp.dc._msdcs > - _ldap._tcp.dc._msdcs >ipa : DEBUG - _kerberos._tcp.Default-First-Site-Name._sites.dc._msdcs > - _kerberos._tcp.Default-First-Site-Name._sites.dc._msdcs >ipa : DEBUG - _kerberos._tcp.dc._msdcs > - _kerberos._tcp.dc._msdcs >ipa : DEBUG - _kerberos._udp.Default-First-Site-Name._sites.dc._msdcs > - _kerberos._udp.Default-First-Site-Name._sites.dc._msdcs >ipa : DEBUG - _kerberos._udp.dc._msdcs > - _kerberos._udp.dc._msdcs >ipa : DEBUG duration: 0 seconds >ipa : DEBUG [16/20]: restarting Directory Server to take MS PAC and LDAP plugins changes into account > [16/20]: restarting Directory Server to take MS PAC and LDAP plugins changes into account >ipa : DEBUG Starting external process >ipa : DEBUG args=/bin/systemctl restart dirsrv.target >ipa : DEBUG Process finished, return code=0 >ipa : DEBUG stdout= >ipa : DEBUG stderr= >ipa : DEBUG Starting external process >ipa : DEBUG args=/bin/systemctl is-active dirsrv@DEV-BLACKHATS-NET-AU.service >ipa : DEBUG Process finished, return code=3 >ipa : DEBUG stdout=activating > >ipa : DEBUG stderr= >ipa : DEBUG Starting external process >ipa : DEBUG args=/bin/systemctl is-active dirsrv@DEV-BLACKHATS-NET-AU.service >ipa : DEBUG Process finished, return code=3 >ipa : DEBUG stdout=activating > >ipa : DEBUG stderr= >ipa : DEBUG Starting external process >ipa : DEBUG args=/bin/systemctl is-active dirsrv@DEV-BLACKHATS-NET-AU.service >ipa : DEBUG Process finished, return code=3 >ipa : DEBUG stdout=activating > >ipa : DEBUG stderr= >ipa : DEBUG Starting external process >ipa : DEBUG args=/bin/systemctl is-active dirsrv@DEV-BLACKHATS-NET-AU.service >ipa : DEBUG Process finished, return code=3 >ipa : DEBUG stdout=activating > >ipa : DEBUG stderr= >ipa : DEBUG Starting external process >ipa : DEBUG args=/bin/systemctl is-active dirsrv@DEV-BLACKHATS-NET-AU.service >ipa : DEBUG Process finished, return code=3 >ipa : DEBUG stdout=activating > >ipa : DEBUG stderr= >ipa : DEBUG Starting external process >ipa : DEBUG args=/bin/systemctl is-active dirsrv@DEV-BLACKHATS-NET-AU.service >ipa : DEBUG Process finished, return code=3 >ipa : DEBUG stdout=activating > >ipa : DEBUG stderr= >ipa : DEBUG Starting external process >ipa : DEBUG args=/bin/systemctl is-active dirsrv@DEV-BLACKHATS-NET-AU.service >ipa : DEBUG Process finished, return code=3 >ipa : DEBUG stdout=activating > >ipa : DEBUG stderr= >ipa : DEBUG Starting external process >ipa : DEBUG args=/bin/systemctl is-active dirsrv@DEV-BLACKHATS-NET-AU.service >ipa : DEBUG Process finished, return code=3 >ipa : DEBUG stdout=activating > >ipa : DEBUG stderr= >ipa : DEBUG Starting external process >ipa : DEBUG args=/bin/systemctl is-active dirsrv@DEV-BLACKHATS-NET-AU.service >ipa : DEBUG Process finished, return code=3 >ipa : DEBUG stdout=activating > >ipa : DEBUG stderr= >ipa : DEBUG Starting external process >ipa : DEBUG args=/bin/systemctl is-active dirsrv@DEV-BLACKHATS-NET-AU.service >ipa : DEBUG Process finished, return code=3 >ipa : DEBUG stdout=activating > >ipa : DEBUG stderr= >ipa : DEBUG Starting external process >ipa : DEBUG args=/bin/systemctl is-active dirsrv@DEV-BLACKHATS-NET-AU.service >ipa : DEBUG Process finished, return code=3 >ipa : DEBUG stdout=activating > >ipa : DEBUG stderr= >ipa : DEBUG Starting external process >ipa : DEBUG args=/bin/systemctl is-active dirsrv@DEV-BLACKHATS-NET-AU.service >ipa : DEBUG Process finished, return code=3 >ipa : DEBUG stdout=activating > >ipa : DEBUG stderr= >ipa : DEBUG Starting external process >ipa : DEBUG args=/bin/systemctl is-active dirsrv@DEV-BLACKHATS-NET-AU.service >ipa : DEBUG Process finished, return code=3 >ipa : DEBUG stdout=activating > >ipa : DEBUG stderr= >ipa : DEBUG Starting external process >ipa : DEBUG args=/bin/systemctl is-active dirsrv@DEV-BLACKHATS-NET-AU.service >ipa : DEBUG Process finished, return code=3 >ipa : DEBUG stdout=activating > >ipa : DEBUG stderr= >ipa : DEBUG Starting external process >ipa : DEBUG args=/bin/systemctl is-active dirsrv@DEV-BLACKHATS-NET-AU.service >ipa : DEBUG Process finished, return code=3 >ipa : DEBUG stdout=activating > >ipa : DEBUG stderr= >ipa : DEBUG Starting external process >ipa : DEBUG args=/bin/systemctl is-active dirsrv@DEV-BLACKHATS-NET-AU.service >ipa : DEBUG Process finished, return code=3 >ipa : DEBUG stdout=activating > >ipa : DEBUG stderr= >ipa : DEBUG Starting external process >ipa : DEBUG args=/bin/systemctl is-active dirsrv@DEV-BLACKHATS-NET-AU.service >ipa : DEBUG Process finished, return code=3 >ipa : DEBUG stdout=activating > >ipa : DEBUG stderr= >ipa : DEBUG Starting external process >ipa : DEBUG args=/bin/systemctl is-active dirsrv@DEV-BLACKHATS-NET-AU.service >ipa : DEBUG Process finished, return code=3 >ipa : DEBUG stdout=activating > >ipa : DEBUG stderr= >ipa : DEBUG Starting external process >ipa : DEBUG args=/bin/systemctl is-active dirsrv@DEV-BLACKHATS-NET-AU.service >ipa : DEBUG Process finished, return code=3 >ipa : DEBUG stdout=activating > >ipa : DEBUG stderr= >ipa : DEBUG Starting external process >ipa : DEBUG args=/bin/systemctl is-active dirsrv@DEV-BLACKHATS-NET-AU.service >ipa : DEBUG Process finished, return code=3 >ipa : DEBUG stdout=activating > >ipa : DEBUG stderr= >ipa : DEBUG Starting external process >ipa : DEBUG args=/bin/systemctl is-active dirsrv@DEV-BLACKHATS-NET-AU.service >ipa : DEBUG Process finished, return code=3 >ipa : DEBUG stdout=activating > >ipa : DEBUG stderr= >ipa : DEBUG Starting external process >ipa : DEBUG args=/bin/systemctl is-active dirsrv@DEV-BLACKHATS-NET-AU.service >ipa : DEBUG Process finished, return code=3 >ipa : DEBUG stdout=activating > >ipa : DEBUG stderr= >ipa : DEBUG Starting external process >ipa : DEBUG args=/bin/systemctl is-active dirsrv@DEV-BLACKHATS-NET-AU.service >ipa : DEBUG Process finished, return code=0 >ipa : DEBUG stdout=active > >ipa : DEBUG stderr= >ipa : DEBUG wait_for_open_ports: localhost [389] timeout 300 >ipa : DEBUG duration: 3 seconds >ipa : DEBUG [17/20]: adding fallback group > [17/20]: adding fallback group >ipa.ipapython.ipaldap.SchemaCache: DEBUG flushing ldapi://%2fvar%2frun%2fslapd-DEV-BLACKHATS-NET-AU.socket from SchemaCache >ipa.ipapython.ipaldap.SchemaCache: DEBUG retrieving schema for SchemaCache url=ldapi://%2fvar%2frun%2fslapd-DEV-BLACKHATS-NET-AU.socket conn=<ldap.ldapobject.SimpleLDAPObject instance at 0x4982c68> >ipa : DEBUG Starting external process >ipa : DEBUG args=/usr/bin/ldapmodify -v -f /tmp/tmpGnQ9Wo -H ldapi://%2fvar%2frun%2fslapd-DEV-BLACKHATS-NET-AU.socket >ipa : DEBUG Process finished, return code=0 >ipa : DEBUG stdout=add cn: > Default SMB Group >add description: > Fallback group for primary group RID, do not add users to this group >add gidnumber: > -1 >add objectclass: > top > ipaobject > posixgroup >adding new entry "cn=Default SMB Group,cn=groups,cn=accounts,dc=dev,dc=blackhats,dc=net,dc=au" >modify complete > > >ipa : DEBUG stderr=ldap_initialize( ldapi://%2Fvar%2Frun%2Fslapd-DEV-BLACKHATS-NET-AU.socket/??base ) >SASL/EXTERNAL authentication started >SASL username: gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth >SASL SSF: 0 > >ipa : DEBUG duration: 0 seconds >ipa : DEBUG [18/20]: setting SELinux booleans > [18/20]: setting SELinux booleans >ipa : DEBUG Starting external process >ipa : DEBUG args=/usr/sbin/selinuxenabled >ipa : DEBUG Process finished, return code=0 >ipa : DEBUG stdout= >ipa : DEBUG stderr= >ipa : DEBUG Starting external process >ipa : DEBUG args=/usr/sbin/getsebool samba_portmapper >ipa : DEBUG Process finished, return code=0 >ipa : DEBUG stdout=samba_portmapper --> on > >ipa : DEBUG stderr= >ipa : DEBUG Saving StateFile to '/var/lib/ipa/sysrestore/sysrestore.state' >ipa : DEBUG Starting external process >ipa : DEBUG args=/usr/sbin/setsebool -P samba_portmapper=true >ipa : DEBUG Process finished, return code=0 >ipa : DEBUG stdout= >ipa : DEBUG stderr= >ipa : DEBUG duration: 16 seconds >ipa : DEBUG [19/20]: starting CIFS services > [19/20]: starting CIFS services >ipa : DEBUG Starting external process >ipa : DEBUG args=/bin/systemctl start smb.service > >
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1128420
: 925498