Bug 1860129

Summary: ipa trust-add fails when FIPS enabled
Product: Red Hat Enterprise Linux 8 Reporter: Scott Poore <spoore>
Component: ipaAssignee: Thomas Woerner <twoerner>
Status: CLOSED ERRATA QA Contact: ipa-qe <ipa-qe>
Severity: unspecified Docs Contact:
Priority: high    
Version: 8.3CC: abokovoy, awestbro, dhellard, dkarpele, dpal, frenaud, kfrankli, ksiddiqu, mpolovka, myusuf, ndehadra, pasik, pcech, pvoborni, rcritten, sorlov, ssidhaye, tscherf
Target Milestone: rcKeywords: Triaged
Target Release: 8.0   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: ipa-4.9.1-1 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-05-18 15:48:21 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1793411, 1894575    

Description Scott Poore 2020-07-23 18:20:52 UTC
Description of problem:

When FIPS is enabled on a RHEL8 IPA Server, I cannot add an AD trust:

# echo Secret123 | ipa trust-add adcs19.test    --two-way True --admin Administrator --password
ipa: ERROR: CIFS server communication error: code "3221225495", message "{Not Enough Quota} Not enough virtual memory or paging file quota is available to complete the specified operation." (both may be "None")


Version-Release number of selected component (if applicable):
ipa-server-4.8.7-7.module+el8.3.0+7376+c83e4fcd.x86_64

How reproducible:
always


Steps to Reproduce:
1.  Enable FIPS mode on server
2.  Install IPA
3.  setup DNS as necessary for IPA and AD
4.  ipa trust-add

Actual results:
Error as shown above

Expected results:
Adds trust with AD server.

Additional info:

Comment 4 Kaleem 2020-09-08 12:17:11 UTC
*** Bug 1874396 has been marked as a duplicate of this bug. ***

Comment 22 Michal Polovka 2021-02-02 11:36:57 UTC
Verified using ipa-server-4.9.1-1.module+el8.4.0+9665+c9815399.x86_64 and ipa-server-trust-ad-4.9.1-1.module+el8.4.0+9665+c9815399.x86_64 in RHEL8.4 nightly build running in FIPS mode.

Passed 	test_integration/test_trust.py::TestTrust::()::test_establish_nonposix_trust 	
Passed 	test_integration/test_trust.py::TestTrust::()::test_trustdomains_found_in_nonposix_trust 	 	
Passed 	test_integration/test_trust.py::TestTrust::()::test_range_properties_in_nonposix_trust 		
Passed 	test_integration/test_trust.py::TestTrust::()::test_user_gid_uid_resolution_in_nonposix_trust 		
Passed 	test_integration/test_trust.py::TestTrust::()::test_ipa_commands_run_as_aduser 	
Passed 	test_integration/test_trust.py::TestTrust::()::test_ipa_management_run_as_aduser 	
Passed 	test_integration/test_trust.py::TestTrust::()::test_password_login_as_aduser 	
Passed 	test_integration/test_trust.py::TestTrust::()::test_ipauser_authentication_with_nonposix_trust 	
Passed 	test_integration/test_trust.py::TestTrust::()::test_upn_in_nonposix_trust 	
Passed 	test_integration/test_trust.py::TestTrust::()::test_upn_user_resolution_in_nonposix_trust 		
Passed 	test_integration/test_trust.py::TestTrust::()::test_upn_user_authentication_in_nonposix_trust 	 	
Passed 	test_integration/test_trust.py::TestTrust::()::test_sudorules_ad_users 		
Passed 	test_integration/test_trust.py::TestTrust::()::test_sudorules_ad_groups 	 	
Passed 	test_integration/test_trust.py::TestTrust::()::test_sudorules_ad_runasuser 	
Passed 	test_integration/test_trust.py::TestTrust::()::test_sudorules_ad_runasuser_group 	
Passed 	test_integration/test_trust.py::TestTrust::()::test_sudorules_ad_runasgroup 		
Passed 	test_integration/test_trust.py::TestTrust::()::test_remove_nonposix_trust 	 	
Passed 	test_integration/test_trust.py::TestTrust::()::test_remove_subordinate_suffixes_trust 	 	
Passed 	test_integration/test_trust.py::TestTrust::()::test_establish_posix_trust 	
Passed 	test_integration/test_trust.py::TestTrust::()::test_trustdomains_found_in_posix_trust 	
Passed 	test_integration/test_trust.py::TestTrust::()::test_range_properties_in_posix_trust 	
Passed 	test_integration/test_trust.py::TestTrust::()::test_user_uid_gid_resolution_in_posix_trust 	
Passed 	test_integration/test_trust.py::TestTrust::()::test_user_without_posix_attributes_not_visible 	
Passed 	test_integration/test_trust.py::TestTrust::()::test_override_homedir 	
Passed 	test_integration/test_trust.py::TestTrust::()::test_extdom_plugin 	
Passed 	test_integration/test_trust.py::TestTrust::()::test_remove_posix_trust 	
Passed 	test_integration/test_trust.py::TestTrust::()::test_invalid_range_types 	
Passed 	test_integration/test_trust.py::TestTrust::()::test_establish_external_subdomain_trust 	
Passed 	test_integration/test_trust.py::TestTrust::()::test_trustdomains_found_in_external_subdomain_trust 	 	
Passed 	test_integration/test_trust.py::TestTrust::()::test_user_gid_uid_resolution_in_external_subdomain_trust 	
Passed 	test_integration/test_trust.py::TestTrust::()::test_remove_external_subdomain_trust 	
Passed 	test_integration/test_trust.py::TestTrust::()::test_establish_nonexternal_subdomain_trust 	
Passed 	test_integration/test_trust.py::TestTrust::()::test_establish_external_treedomain_trust 	
Passed 	test_integration/test_trust.py::TestTrust::()::test_trustdomains_found_in_external_treedomain_trust 		
Passed 	test_integration/test_trust.py::TestTrust::()::test_user_gid_uid_resolution_in_external_treedomain_trust 
Passed 	test_integration/test_trust.py::TestTrust::()::test_remove_external_treedomain_trust
Passed 	test_integration/test_trust.py::TestTrust::()::test_establish_nonexternal_treedomain_trust 
Passed 	test_integration/test_trust.py::TestTrust::()::test_establish_external_rootdomain_trust	
Passed 	test_integration/test_trust.py::TestTrust::()::test_trustdomains_found_in_external_rootdomain_trust
Passed 	test_integration/test_trust.py::TestTrust::()::test_remove_external_rootdomain_trust

There are failures in other test cases in this test class, however those are unrelated to this BZ. 
Full test log is an attachment of this BZ.

Comment 27 errata-xmlrpc 2021-05-18 15:48:21 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Moderate: idm:DL1 and idm:client security, bug fix, and enhancement update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2021:1846

Comment 28 Red Hat Bugzilla 2023-09-15 00:34:37 UTC
The needinfo request[s] on this closed bug have been removed as they have been unresolved for 500 days