Bug 1404750
| Summary: | ipa-client-install fails to get CA cert via LDAP when non-FQDN name of IPA server is first in /etc/hosts | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux 7 | Reporter: | Jan Pazdziora (Red Hat) <jpazdziora> |
| Component: | ipa | Assignee: | IPA Maintainers <ipa-maint> |
| Status: | CLOSED ERRATA | QA Contact: | Mohammad Rizwan <myusuf> |
| Severity: | unspecified | Docs Contact: | Aneta Šteflová Petrová <apetrova> |
| Priority: | unspecified | ||
| Version: | 7.3 | CC: | jpazdziora, mbabinsk, myusuf, pvoborni, rcritten |
| Target Milestone: | rc | ||
| Target Release: | --- | ||
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | |||
| Fixed In Version: | ipa-4.5.0-1.el7 | Doc Type: | Enhancement |
| Doc Text: |
Improved security of DNS lookups and robustness of service principal lookups in Identity Management
The Kerberos client library no longer attempts to canonicalize host names when issuing ticket-granting server (TGS) requests. This feature improves:
* Security because DNS lookups, which were previously required during canonicalization, are no longer performed
* Robustness of service principal lookups in more complex DNS environments, such as clouds or containerized applications
Make sure you specify the correct fully qualified domain name (FQDN) in host and service principals. Due to this change in behavior, Kerberos does not attempt to resolve any other form of names in principals, such as short names.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | 2017-08-01 09:44:33 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
|
Description
Jan Pazdziora (Red Hat)
2016-12-14 14:44:56 UTC
When the /etc/hosts line for the IPA server on the client starts with yet another string, like 10.11.12.13 abc ipa ipa.example.test that string is used for principal name: 2016-12-14T14:44:32Z DEBUG trying to retrieve CA cert via LDAP from ipa.example.test 2016-12-14T14:44:32Z DEBUG get_ca_certs_from_ldap() error: Insufficient access: SASL(-1): generic failure: GSSAPI Error: Unspecified GSS failure. Minor code may provide more information (Server ldap/abc not found in Kerberos database) 2016-12-14T14:44:32Z DEBUG Insufficient access: SASL(-1): generic failure: GSSAPI Error: Unspecified GSS failure. Minor code may provide more information (Server ldap/abc not found in Kerberos database) 2016-12-14T14:44:32Z ERROR In unattended mode without a One Time Password (OTP) or without --ca-cert-file So the client knows it is retrieving from ipa.example.test but uses some sort of reverse lookup to arrive at wrong hostname and thus wrong principal name. Upstream ticket: https://fedorahosted.org/freeipa/ticket/6584 Fixed upstream master: https://fedorahosted.org/freeipa/changeset/566c86a782bfd7d50938866e9f89faf56cea773f LGTM. Version:
ipa-server-4.5.0-13.el7.x86_64
IPA Server:
[root@bkr-hv03-guest19 ~]# cat /etc/hosts
127.0.0.1 localhost localhost.localdomain localhost4 localhost4.localdomain4
::1 localhost localhost.localdomain localhost6 localhost6.localdomain6
10.19.41.49 bkr-hv03-guest19.testrelm.test
10.19.41.53 bkr-hv03-guest23.testrelm.test
[root@bkr-hv03-guest19 ~]# hostname
bkr-hv03-guest19.testrelm.test
IPA Client Machine:
[root@bkr-hv03-guest23 ~]# cat /etc/hosts
127.0.0.1 localhost localhost.localdomain localhost4 localhost4.localdomain4
::1 localhost localhost.localdomain localhost6 localhost6.localdomain6
10.19.41.49 ipa bkr-hv03-guest19.testrelm.test
10.19.41.53 bkr-hv03-guest23.testrelm.test
[root@bkr-hv03-guest23 ~]# hostname
bkr-hv03-guest23.testrelm.test
[root@bkr-hv03-guest23 ~]# ipa-client-install -U -p admin -w Secret123
WARNING: ntpd time&date synchronization service will not be configured as
conflicting service (chronyd) is enabled
Use --force-ntpd option to disable it and force configuration of ntpd
Discovery was successful!
Client hostname: bkr-hv03-guest23.testrelm.test
Realm: TESTRELM.TEST
DNS Domain: testrelm.test
IPA Server: bkr-hv03-guest19.testrelm.test
BaseDN: dc=testrelm,dc=test
Skipping synchronizing time with NTP server.
Successfully retrieved CA cert
Subject: CN=Certificate Authority,O=TESTRELM.TEST
Issuer: CN=Certificate Authority,O=TESTRELM.TEST
Valid From: 2017-05-30 09:04:50
Valid Until: 2037-05-30 09:04:50
Enrolled in IPA realm TESTRELM.TEST
Created /etc/ipa/default.conf
New SSSD config will be created
Configured sudoers in /etc/nsswitch.conf
Configured /etc/sssd/sssd.conf
Configured /etc/krb5.conf for IPA realm TESTRELM.TEST
trying https://bkr-hv03-guest19.testrelm.test/ipa/json
Forwarding 'ping' to json server 'https://bkr-hv03-guest19.testrelm.test/ipa/json'
Forwarding 'ca_is_enabled' to json server 'https://bkr-hv03-guest19.testrelm.test/ipa/json'
Systemwide CA database updated.
Adding SSH public key from /etc/ssh/ssh_host_rsa_key.pub
Adding SSH public key from /etc/ssh/ssh_host_ecdsa_key.pub
Adding SSH public key from /etc/ssh/ssh_host_ed25519_key.pub
Forwarding 'host_mod' to json server 'https://bkr-hv03-guest19.testrelm.test/ipa/json'
SSSD enabled
Configured /etc/openldap/ldap.conf
Configured /etc/ssh/ssh_config
Configured /etc/ssh/sshd_config
Configuring testrelm.test as NIS domain.
Client configuration complete.
The ipa-client-install command was successful
[root@bkr-hv03-guest23 ~]#
[root@bkr-hv03-guest23 ~]# ipa host-show
Host name: bkr-hv03-guest23.testrelm.test
Host name: bkr-hv03-guest23.testrelm.test
Principal name: host/bkr-hv03-guest23.testrelm.test
Principal alias: host/bkr-hv03-guest23.testrelm.test
SSH public key fingerprint: SHA256:6lRIus6lvLUrdHBcYVvls6TR37PVkySu0WPf2rww0FY (ssh-rsa), SHA256:4SS2veeIxmlSmgljGk2d2qo24JEPe/ECqLfxgQvah3s (ecdsa-sha2-nistp256),
SHA256:FmpMEIAfuSdi0jLPYes5ss2v+H6c+tNxq8ztpPgnMxM (ssh-ed25519)
Password: False
Keytab: True
Managed by: bkr-hv03-guest23.testrelm.test
[root@bkr-hv03-guest23 ~]#
Making an /etc/hosts as described in https://bugzilla.redhat.com/show_bug.cgi?id=1404750#c1
[root@bkr-hv03-guest23 ~]# cat /etc/hosts
127.0.0.1 localhost localhost.localdomain localhost4 localhost4.localdomain4
::1 localhost localhost.localdomain localhost6 localhost6.localdomain6
10.19.41.49 abc ipa bkr-hv03-guest19.testrelm.test
10.19.41.53 bkr-hv03-guest23.testrelm.test
[root@bkr-hv03-guest23 ~]# ipa-client-install -U -p admin -w Secret123
WARNING: ntpd time&date synchronization service will not be configured as
conflicting service (chronyd) is enabled
Use --force-ntpd option to disable it and force configuration of ntpd
Discovery was successful!
Client hostname: bkr-hv03-guest23.testrelm.test
Realm: TESTRELM.TEST
DNS Domain: testrelm.test
IPA Server: bkr-hv03-guest19.testrelm.test
BaseDN: dc=testrelm,dc=test
Skipping synchronizing time with NTP server.
Successfully retrieved CA cert
Subject: CN=Certificate Authority,O=TESTRELM.TEST
Issuer: CN=Certificate Authority,O=TESTRELM.TEST
Valid From: 2017-05-30 09:04:50
Valid Until: 2037-05-30 09:04:50
Enrolled in IPA realm TESTRELM.TEST
Created /etc/ipa/default.conf
New SSSD config will be created
Configured sudoers in /etc/nsswitch.conf
Configured /etc/sssd/sssd.conf
Configured /etc/krb5.conf for IPA realm TESTRELM.TEST
trying https://bkr-hv03-guest19.testrelm.test/ipa/json
Forwarding 'ping' to json server 'https://bkr-hv03-guest19.testrelm.test/ipa/json'
Forwarding 'ca_is_enabled' to json server 'https://bkr-hv03-guest19.testrelm.test/ipa/json'
Systemwide CA database updated.
Adding SSH public key from /etc/ssh/ssh_host_rsa_key.pub
Adding SSH public key from /etc/ssh/ssh_host_ecdsa_key.pub
Adding SSH public key from /etc/ssh/ssh_host_ed25519_key.pub
Forwarding 'host_mod' to json server 'https://bkr-hv03-guest19.testrelm.test/ipa/json'
SSSD enabled
Configured /etc/openldap/ldap.conf
Configured /etc/ssh/ssh_config
Configured /etc/ssh/sshd_config
Configuring testrelm.test as NIS domain.
Client configuration complete.
The ipa-client-install command was successful
[root@bkr-hv03-guest23 ~]# ipa host-show bkr-hv03-guest23.testrelm.test
Host name: bkr-hv03-guest23.testrelm.test
Principal name: host/bkr-hv03-guest23.testrelm.test
Principal alias: host/bkr-hv03-guest23.testrelm.test
SSH public key fingerprint: SHA256:6lRIus6lvLUrdHBcYVvls6TR37PVkySu0WPf2rww0FY (ssh-rsa), SHA256:4SS2veeIxmlSmgljGk2d2qo24JEPe/ECqLfxgQvah3s (ecdsa-sha2-nistp256),
SHA256:FmpMEIAfuSdi0jLPYes5ss2v+H6c+tNxq8ztpPgnMxM (ssh-ed25519)
Password: False
Keytab: True
Managed by: bkr-hv03-guest23.testrelm.test
[root@bkr-hv03-guest23 ~]# cat /etc/hosts
verified using following entry in the /etc/hosts on client machine. Client installation was successful. 101.191.411.561 abc ipa bkr-hv03-guest26 As per comment #9 and #10, marking it as verified. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2017:2304 |