Note: This bug is displayed in read-only format because the product is no longer active in Red Hat Bugzilla.
RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.

Bug 1046949

Summary: Client enrollment fails with ipa-client-install; client enrollment works fine by hand.
Product: Red Hat Enterprise Linux 6 Reporter: corpitsysadmins
Component: ipaAssignee: Martin Kosek <mkosek>
Status: CLOSED NOTABUG QA Contact: Namita Soman <nsoman>
Severity: medium Docs Contact:
Priority: unspecified    
Version: 6.5CC: abokovoy, corpitsysadmins, mkosek, pviktori, rcritten, ssorce
Target Milestone: rc   
Target Release: 6.5   
Hardware: x86_64   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2014-01-15 09:38:32 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Attachments:
Description Flags
See name
none
Logs
none
Logs none

Description corpitsysadmins 2013-12-27 16:52:25 UTC
Description of problem:
We are unable to enroll clients by running ipa-client-install; client enrollment works fine by hand (followed guide at https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/html-single/Identity_Management_Guide/#linux-manual). OS is CentOS release 6.5 (Final). Error message follows:

args=keyctl search @s user ipa_session_cookie:host/ovirt-two.corp.modmed.com.COM
stdout=
stderr=keyctl_search: Required key not available

args=keyctl search @s user ipa_session_cookie:host/ovirt-two.corp.modmed.com.COM
stdout=
stderr=keyctl_search: Required key not available

failed to find session_cookie in persistent storage for principal 'host/ovirt-two.corp.modmed.com.COM'
trying https://freeipa-one.corp.modmed.com/ipa/xml
NSSConnection init freeipa-one.corp.modmed.com
Connecting: 10.10.2.46:0
Connection to https://freeipa-one.corp.modmed.com/ipa/xml failed with KerbTransport instance has no attribute '_conn'
trying https://freeipa-two.corp.modmed.com/ipa/xml
NSSConnection init freeipa-two.corp.modmed.com
Connection to https://freeipa-two.corp.modmed.com/ipa/xml failed with [Errno -8053] (SEC_ERROR_BUSY) NSS could not shutdown. Objects are still in use.
Cannot connect to the server due to generic error: cannot connect to Gettext('any of the configured servers', domain='ipa', localedir=None): https://freeipa-one.corp.modmed.com/ipa/xml, https://freeipa-two.corp.modmed.com/ipa/xml
Installation failed. Rolling back changes.


Things we tried:
Enrolling other Linux hosts. All failed with same error messages.
Following http://www.freeipa.org/page/Troubleshooting
Making sure all appropriate ports were open with nc, and that we had no DNS problems.
Googling (including just a link that might be related to this issue): https://www.redhat.com/archives/freeipa-users/2013-November/msg00094.html


Version-Release number of selected component (if applicable):
Primary server: freeipa-one.corp.modmed.com, ipa-server-3.0.0-37.el6.x86_64
Replica server: freeipa-two.corp.modmed.com, ipa-server-3.0.0-37.el6.x86_64
Linux client: ipa-client-3.0.0-37.el6.x86_64


How reproducible:
ipa-client-install will fail from any Linux host in our network.


Steps to Reproduce:
1. Run ipa-client-install on a Linux host. 


Actual results:
Client enrollment fails.


Expected results:
Client enrollment works.


Additional info:
[fredy.sanchez@ovirt-two ~]$ sudo ipa-client-install --debug
[sudo] password for fredy.sanchez: 
/usr/sbin/ipa-client-install was invoked with options: {'domain': None, 'force': False, 'krb5_offline_passwords': True, 'primary': False, 'mkhomedir': False, 'create_sshfp': True, 'conf_sshd': True, 'on_master': False, 'conf_ntp': True, 'ca_cert_file': None, 'ntp_server': None, 'principal': None, 'hostname': None, 'no_ac': False, 'unattended': None, 'sssd': True, 'trust_sshfp': False, 'dns_updates': False, 'realm_name': None, 'conf_ssh': True, 'force_join': False, 'server': None, 'prompt_password': False, 'permit': False, 'debug': True, 'preserve_sssd': False, 'uninstall': False}
missing options might be asked for interactively later
Loading Index file from '/var/lib/ipa-client/sysrestore/sysrestore.index'
Loading StateFile from '/var/lib/ipa-client/sysrestore/sysrestore.state'
[IPA Discovery]
Starting IPA discovery with domain=None, servers=None, hostname=ovirt-two.corp.modmed.com
Start searching for LDAP SRV record in "corp.modmed.com" (domain of the hostname) and its sub-domains
Search DNS for SRV record of _ldap._tcp.corp.modmed.com.
DNS record found: DNSResult::name:_ldap._tcp.corp.modmed.com.,type:33,class:1,rdata={priority:0,port:389,weight:100,server:freeipa-one.corp.modmed.com.}
DNS record found: DNSResult::name:_ldap._tcp.corp.modmed.com.,type:33,class:1,rdata={priority:0,port:389,weight:100,server:freeipa-two.corp.modmed.com.}
[Kerberos realm search]
Search DNS for TXT record of _kerberos.corp.modmed.com.
DNS record found: DNSResult::name:_kerberos.corp.modmed.com.,type:16,class:1,rdata={data:CORP.MODMED.COM}
Search DNS for SRV record of _kerberos._udp.corp.modmed.com.
DNS record found: DNSResult::name:_kerberos._udp.corp.modmed.com.,type:33,class:1,rdata={priority:0,port:88,weight:100,server:freeipa-one.corp.modmed.com.}
DNS record found: DNSResult::name:_kerberos._udp.corp.modmed.com.,type:33,class:1,rdata={priority:0,port:88,weight:100,server:freeipa-two.corp.modmed.com.}
[LDAP server check]
Verifying that freeipa-one.corp.modmed.com (realm CORP.MODMED.COM) is an IPA server
Init LDAP connection with: ldap://freeipa-one.corp.modmed.com:389
Search LDAP server for IPA base DN
Check if naming context 'dc=corp,dc=modmed,dc=com' is for IPA
Naming context 'dc=corp,dc=modmed,dc=com' is a valid IPA context
Search for (objectClass=krbRealmContainer) in dc=corp,dc=modmed,dc=com (sub)
Found: cn=CORP.MODMED.COM,cn=kerberos,dc=corp,dc=modmed,dc=com
Discovery result: Success; server=freeipa-one.corp.modmed.com, domain=corp.modmed.com, kdc=freeipa-one.corp.modmed.com,freeipa-two.corp.modmed.com, basedn=dc=corp,dc=modmed,dc=com
Validated servers: freeipa-one.corp.modmed.com
will use discovered domain: corp.modmed.com
Start searching for LDAP SRV record in "corp.modmed.com" (Validating DNS Discovery) and its sub-domains
Search DNS for SRV record of _ldap._tcp.corp.modmed.com.
DNS record found: DNSResult::name:_ldap._tcp.corp.modmed.com.,type:33,class:1,rdata={priority:0,port:389,weight:100,server:freeipa-two.corp.modmed.com.}
DNS record found: DNSResult::name:_ldap._tcp.corp.modmed.com.,type:33,class:1,rdata={priority:0,port:389,weight:100,server:freeipa-one.corp.modmed.com.}
DNS validated, enabling discovery
will use discovered server: freeipa-one.corp.modmed.com
Discovery was successful!
will use discovered realm: CORP.MODMED.COM
will use discovered basedn: dc=corp,dc=modmed,dc=com
Hostname: ovirt-two.corp.modmed.com
Hostname source: Machine's FQDN
Realm: CORP.MODMED.COM
Realm source: Discovered from LDAP DNS records in freeipa-one.corp.modmed.com
DNS Domain: corp.modmed.com
DNS Domain source: Discovered LDAP SRV records from corp.modmed.com (domain of the hostname)
IPA Server: freeipa-one.corp.modmed.com
IPA Server source: Discovered from LDAP DNS records in freeipa-one.corp.modmed.com
BaseDN: dc=corp,dc=modmed,dc=com
BaseDN source: From IPA server ldap://freeipa-one.corp.modmed.com:389

Continue to configure the system with these values? [no]: yes
args=/usr/sbin/ipa-rmkeytab -k /etc/krb5.keytab -r CORP.MODMED.COM
stdout=
stderr=realm not found

User authorized to enroll computers: fredy.sanchez
will use principal provided as option: fredy.sanchez
Synchronizing time with KDC...
Search DNS for SRV record of _ntp._udp.corp.modmed.com.
DNS record found: DNSResult::name:_ntp._udp.corp.modmed.com.,type:33,class:1,rdata={priority:0,port:123,weight:100,server:freeipa-two.corp.modmed.com.}
DNS record found: DNSResult::name:_ntp._udp.corp.modmed.com.,type:33,class:1,rdata={priority:0,port:123,weight:100,server:freeipa-one.corp.modmed.com.}
args=/usr/sbin/ntpdate -U ntp -s -b -v freeipa-two.corp.modmed.com
stdout=
stderr=
args=/usr/sbin/ntpdate -U ntp -s -b -v freeipa-two.corp.modmed.com
stdout=
stderr=
args=/usr/sbin/ntpdate -U ntp -s -b -v freeipa-two.corp.modmed.com
stdout=
stderr=
args=/usr/sbin/ntpdate -U ntp -s -b -v freeipa-one.corp.modmed.com
stdout=
stderr=
Writing Kerberos configuration to /tmp/tmpcRGcsa:
#File modified by ipa-client-install

includedir /var/lib/sss/pubconf/krb5.include.d/

[libdefaults]
  default_realm = CORP.MODMED.COM
  dns_lookup_realm = false
  dns_lookup_kdc = false
  rdns = false
  ticket_lifetime = 24h
  forwardable = yes

[realms]
  CORP.MODMED.COM = {
    kdc = freeipa-one.corp.modmed.com:88
    master_kdc = freeipa-one.corp.modmed.com:88
    admin_server = freeipa-one.corp.modmed.com:749
    default_domain = corp.modmed.com
    pkinit_anchors = FILE:/etc/ipa/ca.crt
  }

[domain_realm]
  .corp.modmed.com = CORP.MODMED.COM
  corp.modmed.com = CORP.MODMED.COM

Password for fredy.sanchez.COM: 
args=kinit fredy.sanchez.COM
stdout=Password for fredy.sanchez.COM: 

stderr=
trying to retrieve CA cert via LDAP from ldap://freeipa-one.corp.modmed.com
Existing CA cert and Retrieved CA cert are identical
args=/usr/sbin/ipa-join -s freeipa-one.corp.modmed.com -b dc=corp,dc=modmed,dc=com -d
stdout=
stderr=XML-RPC CALL:

<?xml version="1.0" encoding="UTF-8"?>\r\n
<methodCall>\r\n
<methodName>join</methodName>\r\n
<params>\r\n
<param><value><array><data>\r\n
<value><string>ovirt-two.corp.modmed.com</string></value>\r\n
</data></array></value></param>\r\n
<param><value><struct>\r\n
<member><name>nsosversion</name>\r\n
<value><string>2.6.32-431.1.2.0.1.el6.x86_64</string></value></member>\r\n
<member><name>nshardwareplatform</name>\r\n
<value><string>x86_64</string></value></member>\r\n
</struct></value></param>\r\n
</params>\r\n
</methodCall>\r\n

* About to connect() to freeipa-one.corp.modmed.com port 443 (#0)
*   Trying 10.10.2.46... * Connected to freeipa-one.corp.modmed.com (10.10.2.46) port 443 (#0)
* Initializing NSS with certpath: sql:/etc/pki/nssdb
*   CAfile: /etc/ipa/ca.crt
  CApath: none
* SSL connection using TLS_RSA_WITH_AES_256_CBC_SHA
* Server certificate:
* 	subject: CN=freeipa-one.corp.modmed.com,O=CORP.MODMED.COM
* 	start date: Nov 06 17:12:46 2013 GMT
* 	expire date: Nov 07 17:12:46 2015 GMT
* 	common name: freeipa-one.corp.modmed.com
* 	issuer: CN=Certificate Authority,O=CORP.MODMED.COM
> POST /ipa/xml HTTP/1.1
Host: freeipa-one.corp.modmed.com
Accept: */*
Content-Type: text/xml
User-Agent: ipa-join/3.0.0
Referer: https://freeipa-one.corp.modmed.com/ipa/xml
X-Original-User-Agent: Xmlrpc-c/1.16.24 Curl/1.1.1
Content-Length: 489

< HTTP/1.1 401 Authorization Required
< Date: Fri, 27 Dec 2013 15:08:47 GMT
< Server: Apache/2.2.15 (CentOS)
< WWW-Authenticate: Negotiate
< Last-Modified: Sat, 23 Nov 2013 00:00:48 GMT
< ETag: "583-55a-4ebccd2b86c00"
< Accept-Ranges: bytes
< Content-Length: 1370
< Connection: close
< Content-Type: text/html; charset=UTF-8
< 
* Closing connection #0
* Issue another request to this URL: 'https://freeipa-one.corp.modmed.com:443/ipa/xml'
* About to connect() to freeipa-one.corp.modmed.com port 443 (#0)
*   Trying 10.10.2.46... * Connected to freeipa-one.corp.modmed.com (10.10.2.46) port 443 (#0)
*   CAfile: /etc/ipa/ca.crt
  CApath: none
* SSL connection using TLS_RSA_WITH_AES_256_CBC_SHA
* Server certificate:
* 	subject: CN=freeipa-one.corp.modmed.com,O=CORP.MODMED.COM
* 	start date: Nov 06 17:12:46 2013 GMT
* 	expire date: Nov 07 17:12:46 2015 GMT
* 	common name: freeipa-one.corp.modmed.com
* 	issuer: CN=Certificate Authority,O=CORP.MODMED.COM
* Server auth using GSS-Negotiate with user ''
> POST /ipa/xml HTTP/1.1
Authorization: Negotiate YIIFTgYJKoZIhvcSAQICAQBuggU9MIIFOaADAgEFoQMCAQ6iBwMFAAAAAACjggF0YYIBcDCCAWygAwIBBaERGw9DT1JQLk1PRE1FRC5DT02iLjAsoAMCAQOhJTAjGwRIVFRQGxtmcmVlaXBhLW9uZS5jb3JwLm1vZG1lZC5jb22jggEgMIIBHKADAgESoQMCAQKiggEOBIIBCuxgxhJK3cXoGD3RnOno9AjKKRlZ9Ty0yK8vP803AdqoTV5XQBHdTR3AZuauqysGb3Q6myny8rrSzugkMWdDuFqGYqtI/SD8pNfrjYviUVOLIl2jUGho7bC7SNFFLnyydacPehZeaJqeO4ITq16gpFcGWZJbJBqVbHD3Ysx9O2itAZhHItreESDyYrHXOKokPBazcy+7U3kYhJ2v3VauATsGQ6H6FZ38a8jKtV/UnEiecesTnmAKlZwpH2yBdHipy2JtBOyZY5e0jIWLiNBAuo9TrnhPGATeGam6UzuxhnHgK0ZcZoZFIr6VqlQynhDgpjkVd0WaKz9R+jqimordvc9f2K5Cp9Tklw4wpIIDqjCCA6agAwIBEqKCA50EggOZtv5DwMPoZVZRcd1J1vLbH7czUN4NkDghyvtuz/f4HCQAVvegXClfQKxkEm8vJf3h+S5UnAcIQkF1D/n/WeMXjCSWDLoG9BoUBAMgKTCt8W9GYxRlXdugQHQ0+tX+jFKr6pGWFZAY+ierkDdtjWS7oAepAikSaR6+ZDFQy8pKM8dAkZXKs97+lEAjBrbiJ3TBZwmjg0CTp/nJKdlP/LCcGVCuaFxk6F9Q9IwYxCnO3KmPpDMaav9IzYeJNwd4sjf9xFP5MalU0rD5c36Eing/8Mc9BuNa9leDAgbQ1SyO0M5EHWRX6FqTJHN8YSZAZHyOYjvo5pkEGhLH4Fc5HKK39Riubf7UVUik6EnOuN0oDf/5kNKSK8sd8wM6SxbFIYhvLj1qXaB/9dr8E2W7vB/WiMrK/4BC3jl+8meDpFv0j8ElwwO4notETcvV5oDKK6GrsBAuSilQ010sfvf2/LNGDFT0u0t+MEUobt/En+6/b6LCKl8KQcJ12vwFvdSWOdyWy2hQlABss6vcRoHt4pgiSD/ka2dP/iERejzdlOIwvLhnl8NHiM1noSD6qzVSboUgS7ZKtxTzcmQLMILi3Lh2PIdRx3DK9JxRYZ4/OtrqBszyW5MhG0ldG1FT2M53ifelVQsYsmIYm6A3N9V/wkDnsoeihOjSOxfJcG9lwrwEy6vLJPRWtvm/FXGxdwM++Cxty2zaZEd0fY7fejQfno3FnA8Ei/TVsHtpnQfaaIz7CWaJE94s2Mk+FqotZvPuhkRZDQo28tkPjKudlFZZFF/WFrjj+F6lxWAzkKmsTnMcrCohDR7VEZ/TdpOceaiORWqtoFztTjPm2utvzrtKA436ZnnMzilyYQqg5B4aKi1DqHJlxKrf8VEcazuUGlioc6zV/U+DFEstH8wVQZDSTVV7ekMUgv6kbjEjrbR+AsY9q/xgUK8+EZ4XOFpccQsARJpamTSuzgwRfGiDXg37NcrcyoewWIP07J9PXagJHNVGYWYghNTiApBjwEhra4u921XhSOSIzlSQuGC7a0M6XATaiRrjHtD8wwE+fBeKoc764KO/fHW7qJ3Na69+Psno4Rgeb716fBLzqSu+fOzWg7qK1CudDNZ2b8X7OXxm50BUFRLA7Ogzita+QoXERTiASsV+HTTVMdyP1hoHxY7aiF8XIAqYgFT51qUeSpyTCEXbptx7ZH0G+BwGyD3yUrWkRko18tFZwvozaFer
Host: freeipa-one.corp.modmed.com
Accept: */*
Content-Type: text/xml
User-Agent: ipa-join/3.0.0
Referer: https://freeipa-one.corp.modmed.com/ipa/xml
X-Original-User-Agent: Xmlrpc-c/1.16.24 Curl/1.1.1
Content-Length: 489

< HTTP/1.1 200 Success
< Date: Fri, 27 Dec 2013 15:09:02 GMT
< Server: Apache/2.2.15 (CentOS)
* Added cookie ipa_session="8ee07efb695eb6ffc4d3673ba2c9f9df" for domain freeipa-one.corp.modmed.com, path /ipa, expire 1388158142
< Set-Cookie: ipa_session=8ee07efb695eb6ffc4d3673ba2c9f9df; Domain=freeipa-one.corp.modmed.com; Path=/ipa; Expires=Fri, 27 Dec 2013 15:29:02 GMT; Secure; HttpOnly
< Connection: close
< Transfer-Encoding: chunked
< Content-Type: text/xml; charset=utf-8
< 
* Expire cleared
* Closing connection #0
XML-RPC RESPONSE:

<?xml version='1.0' encoding='UTF-8'?>\n
<methodResponse>\n
<params>\n
<param>\n
<value><array><data>\n
<value><string>fqdn=ovirt-two.corp.modmed.com,cn=computers,cn=accounts,dc=corp,dc=modmed,dc=com</string></value>\n
<value><struct>\n
<member>\n
<name>dn</name>\n
<value><string>fqdn=ovirt-two.corp.modmed.com,cn=computers,cn=accounts,dc=corp,dc=modmed,dc=com</string></value>\n
</member>\n
<member>\n
<name>ipacertificatesubjectbase</name>\n
<value><array><data>\n
<value><string>O=CORP.MODMED.COM</string></value>\n
</data></array></value>\n
</member>\n
<member>\n
<name>has_keytab</name>\n
<value><boolean>0</boolean></value>\n
</member>\n
<member>\n
<name>objectclass</name>\n
<value><array><data>\n
<value><string>ipaobject</string></value>\n
<value><string>nshost</string></value>\n
<value><string>ipahost</string></value>\n
<value><string>pkiuser</string></value>\n
<value><string>ipaservice</string></value>\n
<value><string>krbprincipalaux</string></value>\n
<value><string>krbprincipal</string></value>\n
<value><string>ieee802device</string></value>\n
<value><string>ipasshhost</string></value>\n
<value><string>top</string></value>\n
<value><string>ipaSshGroupOfPubKeys</string></value>\n
</data></array></value>\n
</member>\n
<member>\n
<name>fqdn</name>\n
<value><array><data>\n
<value><string>ovirt-two.corp.modmed.com</string></value>\n
</data></array></value>\n
</member>\n
<member>\n
<name>has_password</name>\n
<value><boolean>0</boolean></value>\n
</member>\n
<member>\n
<name>ipauniqueid</name>\n
<value><array><data>\n
<value><string>d204acc0-6f08-11e3-a14d-080027212a55</string></value>\n
</data></array></value>\n
</member>\n
<member>\n
<name>krbprincipalname</name>\n
<value><array><data>\n
<value><string>host/ovirt-two.corp.modmed.com.COM</string></value>\n
</data></array></value>\n
</member>\n
<member>\n
<name>managedby_host</name>\n
<value><array><data>\n
<value><string>ovirt-two.corp.modmed.com</string></value>\n
</data></array></value>\n
</member>\n
</struct></value>\n
</data></array></value>\n
</param>\n
</params>\n
</methodResponse>\n

Keytab successfully retrieved and stored in: /etc/krb5.keytab
Certificate subject base is: O=CORP.MODMED.COM

Enrolled in IPA realm CORP.MODMED.COM
args=kdestroy
stdout=
stderr=
args=/usr/bin/kinit -k -t /etc/krb5.keytab host/ovirt-two.corp.modmed.com.COM
stdout=
stderr=
Backing up system configuration file '/etc/ipa/default.conf'
  -> Not backing up - '/etc/ipa/default.conf' doesn't exist
Created /etc/ipa/default.conf
importing all plugin modules in '/usr/lib/python2.6/site-packages/ipalib/plugins'...
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/aci.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/automember.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/automount.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/baseldap.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/batch.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/cert.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/config.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/delegation.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/dns.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/group.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/hbacrule.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/hbacsvc.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/hbacsvcgroup.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/hbactest.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/host.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/hostgroup.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/idrange.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/internal.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/kerberos.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/krbtpolicy.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/migration.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/misc.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/netgroup.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/passwd.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/permission.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/ping.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/privilege.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/pwpolicy.py'
args=klist -V
stdout=Kerberos 5 version 1.10.3

stderr=
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/role.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/selfservice.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/selinuxusermap.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/service.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/sudocmd.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/sudocmdgroup.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/sudorule.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/trust.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/user.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/virtual.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/xmlclient.py'
Backing up system configuration file '/etc/sssd/sssd.conf'
  -> Not backing up - '/etc/sssd/sssd.conf' doesn't exist
New SSSD config will be created
Configured /etc/sssd/sssd.conf
args=/usr/bin/certutil -A -d /etc/pki/nssdb -n IPA CA -t CT,C,C -a -i /etc/ipa/ca.crt
stdout=
stderr=
Backing up system configuration file '/etc/krb5.conf'
Saving Index File to '/var/lib/ipa-client/sysrestore/sysrestore.index'
Writing Kerberos configuration to /etc/krb5.conf:
#File modified by ipa-client-install

includedir /var/lib/sss/pubconf/krb5.include.d/

[libdefaults]
  default_realm = CORP.MODMED.COM
  dns_lookup_realm = true
  dns_lookup_kdc = true
  rdns = false
  ticket_lifetime = 24h
  forwardable = yes

[realms]
  CORP.MODMED.COM = {
    pkinit_anchors = FILE:/etc/ipa/ca.crt
  }

[domain_realm]
  .corp.modmed.com = CORP.MODMED.COM
  corp.modmed.com = CORP.MODMED.COM

Configured /etc/krb5.conf for IPA realm CORP.MODMED.COM
args=keyctl search @s user ipa_session_cookie:host/ovirt-two.corp.modmed.com.COM
stdout=
stderr=keyctl_search: Required key not available

args=keyctl search @s user ipa_session_cookie:host/ovirt-two.corp.modmed.com.COM
stdout=
stderr=keyctl_search: Required key not available

failed to find session_cookie in persistent storage for principal 'host/ovirt-two.corp.modmed.com.COM'
trying https://freeipa-one.corp.modmed.com/ipa/xml
NSSConnection init freeipa-one.corp.modmed.com
Connecting: 10.10.2.46:0
Connection to https://freeipa-one.corp.modmed.com/ipa/xml failed with KerbTransport instance has no attribute '_conn'
trying https://freeipa-two.corp.modmed.com/ipa/xml
NSSConnection init freeipa-two.corp.modmed.com
Connection to https://freeipa-two.corp.modmed.com/ipa/xml failed with [Errno -8053] (SEC_ERROR_BUSY) NSS could not shutdown. Objects are still in use.
Cannot connect to the server due to generic error: cannot connect to Gettext('any of the configured servers', domain='ipa', localedir=None): https://freeipa-one.corp.modmed.com/ipa/xml, https://freeipa-two.corp.modmed.com/ipa/xml
Installation failed. Rolling back changes.
Loading Index file from '/var/lib/ipa/sysrestore/sysrestore.index'
args=ipa-client-automount --uninstall --debug
stdout=Restoring configuration

stderr=importing all plugin modules in '/usr/lib/python2.6/site-packages/ipalib/plugins'...
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/aci.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/automember.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/automount.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/baseldap.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/batch.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/cert.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/config.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/delegation.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/dns.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/group.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/hbacrule.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/hbacsvc.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/hbacsvcgroup.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/hbactest.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/host.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/hostgroup.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/idrange.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/internal.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/kerberos.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/krbtpolicy.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/migration.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/misc.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/netgroup.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/passwd.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/permission.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/ping.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/privilege.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/pwpolicy.py'
args=klist -V
stdout=Kerberos 5 version 1.10.3

stderr=
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/role.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/selfservice.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/selinuxusermap.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/service.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/sudocmd.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/sudocmdgroup.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/sudorule.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/trust.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/user.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/virtual.py'
importing plugin module '/usr/lib/python2.6/site-packages/ipalib/plugins/xmlclient.py'

Loading Index file from '/var/lib/ipa-client/sysrestore/sysrestore.index'
Loading StateFile from '/var/lib/ipa-client/sysrestore/sysrestore.state'
args=/usr/bin/certutil -L -d /etc/pki/nssdb -n IPA CA
stdout=Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Certificate Authority,O=CORP.MODMED.COM"
        Validity:
            Not Before: Wed Nov 06 17:08:29 2013
            Not After : Sun Nov 06 17:08:29 2033
        Subject: "CN=Certificate Authority,O=CORP.MODMED.COM"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:dd:ed:41:76:eb:53:f6:33:38:12:02:57:19:dc:cd:
                    73:a1:7b:36:6a:55:ed:59:72:f0:1c:bc:fb:d5:7d:15:
                    2d:ff:0b:54:3e:4d:95:8d:29:03:9f:43:53:82:1f:94:
                    fe:ca:cd:89:46:51:81:d3:fa:ff:4a:d8:ec:ce:df:6d:
                    b8:db:50:34:22:fb:41:a4:bd:d4:2c:8a:6a:3b:9c:ad:
                    9d:e1:23:ac:5d:ca:b6:ba:fb:06:fb:5f:31:2f:6d:9a:
                    a5:93:9d:ca:72:42:ab:36:06:69:94:b7:d0:b1:f8:c9:
                    76:9f:db:07:50:62:fe:7e:67:e6:bc:7b:3c:e4:f3:e8:
                    0c:55:39:43:9e:1f:80:18:0f:a3:8b:8b:8a:db:ff:0e:
                    95:d8:b5:8a:1b:7d:71:cf:d0:42:2d:89:4f:74:c2:2a:
                    50:f9:22:55:7c:d8:e6:c4:16:b1:a8:c8:53:d5:28:12:
                    f6:42:3f:ce:5f:2d:8e:bd:64:89:9f:78:f0:d1:0d:ca:
                    53:08:8c:2e:ef:8f:95:2f:8d:b3:e9:34:f1:d5:02:f5:
                    8f:b8:33:41:02:6e:4a:ab:c7:11:ed:a8:e5:85:83:d8:
                    62:11:c9:91:86:b3:f4:24:e9:1e:3b:ad:61:8e:3a:3d:
                    04:5e:32:7d:92:9d:39:8d:2e:9a:94:39:37:db:91:4f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Authority Key Identifier
            Key ID:
                f4:d0:ba:dc:17:f2:9e:95:99:94:2b:fc:b9:03:29:35:
                13:90:45:70

            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Critical: True
            Usages: Digital Signature
                    Non-Repudiation
                    Certificate Signing
                    CRL Signing

            Name: Certificate Subject Key ID
            Data:
                f4:d0:ba:dc:17:f2:9e:95:99:94:2b:fc:b9:03:29:35:
                13:90:45:70

            Name: Authority Information Access
            Method: PKIX Online Certificate Status Protocol
            Location: 
                URI: "http://freeipa-one.corp.modmed.com:80/ca/ocsp"

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        09:ed:5b:a5:64:b6:56:9b:6f:fe:4f:8e:d8:ca:46:2b:
        1f:ef:c5:77:e6:c1:a8:ca:7d:d2:43:84:bf:34:d9:d0:
        30:93:46:a0:4e:14:21:be:a2:40:a7:05:b3:85:7b:a6:
        20:e6:af:ec:40:b1:f9:6c:98:25:a5:c6:ae:cc:36:61:
        c6:2d:75:d2:f7:e4:ab:ec:95:28:32:c9:09:77:ad:3c:
        17:52:9f:9c:64:89:b0:02:e3:d9:91:2c:58:d3:db:5d:
        f2:17:98:99:9a:8e:a0:9b:b5:d7:87:f8:b9:96:6e:14:
        d8:6c:df:ea:af:19:ad:fc:e5:9a:65:a7:fa:4c:d6:d4:
        61:53:97:ee:d9:22:24:dc:6b:9d:67:22:52:4b:27:9a:
        ad:25:d8:23:77:4a:c0:c7:b1:9e:9c:4f:0e:59:a6:b9:
        10:dc:a3:64:d0:b8:25:c1:48:66:95:a6:34:2a:cd:f4:
        fd:ec:09:de:cb:66:b1:c9:7f:75:13:e5:3a:df:32:ca:
        2d:5b:4a:6c:91:7c:cc:b6:42:63:b1:f6:53:b1:b8:d7:
        a6:c5:1e:9c:14:b7:1a:53:48:c6:e0:a5:81:40:b8:0b:
        3e:cf:6b:cf:b1:9f:99:79:48:bf:e6:f5:a5:54:d2:05:
        9f:6f:c2:7e:cf:34:c8:74:16:dd:59:52:da:f7:d3:f4
    Fingerprint (MD5):
        9C:EF:4F:5A:F1:3F:D8:D2:0C:BD:6B:F8:9C:C0:8A:29
    Fingerprint (SHA1):
        BA:85:E3:78:E3:3F:A0:F3:0E:0D:5E:D4:0D:B0:F3:DA:44:6E:C0:BE

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA


stderr=
args=/usr/bin/certutil -D -d /etc/pki/nssdb -n IPA CA
stdout=
stderr=
args=/sbin/service messagebus start 
stdout=Starting system message bus: 

stderr=
args=/sbin/service messagebus status 
stdout=messagebus (pid  1372) is running...

stderr=
args=/sbin/service certmonger start 
stdout=Starting certmonger:                                [  OK  ]

stderr=
args=/sbin/service certmonger status 
stdout=certmonger (pid  1644) is running...

stderr=
args=/usr/bin/certutil -L -d /etc/pki/nssdb -n IPA Machine Certificate - ovirt-two.corp.modmed.com
stdout=
stderr=certutil: Could not find cert: IPA Machine Certificate - ovirt-two.corp.modmed.com
: PR_FILE_NOT_FOUND_ERROR: File not found

args=/sbin/service certmonger stop 
stdout=Stopping certmonger:                                [  OK  ]

stderr=
args=/sbin/chkconfig certmonger off
stdout=
stderr=
Unenrolling client from IPA server
args=/usr/sbin/ipa-join --unenroll -h ovirt-two.corp.modmed.com -d
stdout=
stderr=XML-RPC CALL:

<?xml version="1.0" encoding="UTF-8"?>\r\n
<methodCall>\r\n
<methodName>host_disable</methodName>\r\n
<params>\r\n
<param><value><array><data>\r\n
<value><string>ovirt-two.corp.modmed.com</string></value>\r\n
</data></array></value></param>\r\n
</params>\r\n
</methodCall>\r\n

* About to connect() to freeipa-one.corp.modmed.com port 443 (#0)
*   Trying 10.10.2.46... * Connected to freeipa-one.corp.modmed.com (10.10.2.46) port 443 (#0)
* Initializing NSS with certpath: sql:/etc/pki/nssdb
*   CAfile: /etc/ipa/ca.crt
  CApath: none
* SSL connection using TLS_RSA_WITH_AES_256_CBC_SHA
* Server certificate:
* 	subject: CN=freeipa-one.corp.modmed.com,O=CORP.MODMED.COM
* 	start date: Nov 06 17:12:46 2013 GMT
* 	expire date: Nov 07 17:12:46 2015 GMT
* 	common name: freeipa-one.corp.modmed.com
* 	issuer: CN=Certificate Authority,O=CORP.MODMED.COM
> POST /ipa/xml HTTP/1.1
Host: freeipa-one.corp.modmed.com
Accept: */*
Content-Type: text/xml
User-Agent: ipa-join/3.0.0
Referer: https://freeipa-one.corp.modmed.com/ipa/xml
X-Original-User-Agent: Xmlrpc-c/1.16.24 Curl/1.1.1
Content-Length: 250

< HTTP/1.1 401 Authorization Required
< Date: Fri, 27 Dec 2013 15:10:33 GMT
< Server: Apache/2.2.15 (CentOS)
< WWW-Authenticate: Negotiate
< Last-Modified: Sat, 23 Nov 2013 00:00:48 GMT
< ETag: "583-55a-4ebccd2b86c00"
< Accept-Ranges: bytes
< Content-Length: 1370
< Connection: close
< Content-Type: text/html; charset=UTF-8
< 
* Closing connection #0
* Issue another request to this URL: 'https://freeipa-one.corp.modmed.com:443/ipa/xml'
* About to connect() to freeipa-one.corp.modmed.com port 443 (#0)
*   Trying 10.10.2.46... * Connected to freeipa-one.corp.modmed.com (10.10.2.46) port 443 (#0)
*   CAfile: /etc/ipa/ca.crt
  CApath: none
* SSL connection using TLS_RSA_WITH_AES_256_CBC_SHA
* Server certificate:
* 	subject: CN=freeipa-one.corp.modmed.com,O=CORP.MODMED.COM
* 	start date: Nov 06 17:12:46 2013 GMT
* 	expire date: Nov 07 17:12:46 2015 GMT
* 	common name: freeipa-one.corp.modmed.com
* 	issuer: CN=Certificate Authority,O=CORP.MODMED.COM
* Server auth using GSS-Negotiate with user ''
> POST /ipa/xml HTTP/1.1
Authorization: Negotiate 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
Host: freeipa-one.corp.modmed.com
Accept: */*
Content-Type: text/xml
User-Agent: ipa-join/3.0.0
Referer: https://freeipa-one.corp.modmed.com/ipa/xml
X-Original-User-Agent: Xmlrpc-c/1.16.24 Curl/1.1.1
Content-Length: 250

< HTTP/1.1 200 Success
< Date: Fri, 27 Dec 2013 15:10:53 GMT
< Server: Apache/2.2.15 (CentOS)
* Added cookie ipa_session="17f16d387faa67002ad429f5fb779fe7" for domain freeipa-one.corp.modmed.com, path /ipa, expire 1388158253
< Set-Cookie: ipa_session=17f16d387faa67002ad429f5fb779fe7; Domain=freeipa-one.corp.modmed.com; Path=/ipa; Expires=Fri, 27 Dec 2013 15:30:53 GMT; Secure; HttpOnly
< Connection: close
< Transfer-Encoding: chunked
< Content-Type: text/xml; charset=utf-8
< 
* Expire cleared
* Closing connection #0
XML-RPC RESPONSE:

<?xml version='1.0' encoding='UTF-8'?>\n
<methodResponse>\n
<params>\n
<param>\n
<value><struct>\n
<member>\n
<name>result</name>\n
<value><boolean>1</boolean></value>\n
</member>\n
<member>\n
<name>value</name>\n
<value><string>ovirt-two.corp.modmed.com</string></value>\n
</member>\n
<member>\n
<name>summary</name>\n
<value><string>Disabled host "ovirt-two.corp.modmed.com"</string></value>\n
</member>\n
</struct></value>\n
</param>\n
</params>\n
</methodResponse>\n

Unenrollment successful.

Removing Kerberos service principals from /etc/krb5.keytab
args=/usr/sbin/ipa-rmkeytab -k /etc/krb5.keytab -r CORP.MODMED.COM
stdout=
stderr=Removing principal host/ovirt-two.corp.modmed.com.COM

Disabling client Kerberos and LDAP configurations
args=/usr/sbin/authconfig --disablekrb5 --disablesssd --update --disablemkhomedir --disableldap --disablesssdauth
stdout=
stderr=
Redundant SSSD configuration file /etc/sssd/sssd.conf was moved to /etc/sssd/sssd.conf.deleted
args=/sbin/service sssd stop 
stdout=
stderr=
args=/sbin/chkconfig sssd off
stdout=
stderr=
Restoring client configuration files
args=/usr/sbin/selinuxenabled
stdout=
stderr=
args=/sbin/restorecon /etc/krb5.conf
stdout=
stderr=
Saving Index File to '/var/lib/ipa-client/sysrestore/sysrestore.index'
  -> no files, removing file
args=/sbin/service nscd status
stdout=
stderr=nscd: unrecognized service

nscd daemon is not installed, skip configuration
args=/sbin/service nslcd status
stdout=
stderr=nslcd: unrecognized service

nslcd daemon is not installed, skip configuration
Client uninstall complete.

Comment 1 Martin Kosek 2014-01-02 14:05:20 UTC
Thanks for the report (though please rather include the log as the attachement to the Bugzilla instead of pasting it directly - it allows more clarity).

This part seems indeed interesting:

~~~~~~~~
Connecting: 10.10.2.46:0
Connection to https://freeipa-one.corp.modmed.com/ipa/xml failed with KerbTransport instance has no attribute '_conn'
trying https://freeipa-two.corp.modmed.com/ipa/xml
NSSConnection init freeipa-two.corp.modmed.com
Connection to https://freeipa-two.corp.modmed.com/ipa/xml failed with [Errno -8053] (SEC_ERROR_BUSY) NSS could not shutdown. Objects are still in use.
Cannot connect to the server due to generic error: cannot connect to Gettext('any of the configured servers', domain='ipa', localedir=None): https://freeipa-one.corp.modmed.com/ipa/xml, https://freeipa-two.corp.modmed.com/ipa/xml
Installation failed. Rolling back changes.
~~~~~~~~

It looks like there was some cached certificate object left in NSS, causing ipa-client-install to fail. What is the version of the nss package?

I also wonder, do you know why joining to freeipa-one.corp.modmed.com is failing in the first place? Maybe an expired or a custom untrusted SSL certificate on this IPA server? Does this issue occur on all clients (faulty freeipa-one)?

Comment 2 corpitsysadmins 2014-01-06 18:33:28 UTC
Hi Martin, thanks for the reply and the tips. I will attach the logs going forward.

NSS is nss.x86_64 3.15.3-3.el6_5

Not sure why the the join is failing in the first place. It works via ipa-client-install for some hosts, but no others (all running the same OS version, w/ the same firewall configs, etc). I will take a look at the SSL certs in the IPA server and report back. I don't think we have a problem with the IPA server though. Joining by "hand" always works in Linux, and we haven't had any issues joining Macs via a script we wrote for this.

Comment 3 Martin Kosek 2014-01-09 16:04:54 UTC
Moving to RHEL product, as you you packages based on this one, rather than on Fedora.

As for the bug itself, in the end, I managed to reproduce by damaging S4U2proxy on the server thus making the ipa-client-install failover in the same place as in your case (though with different error). There is a NSS resource leak somewhere, preventing it to failover to other server. I did not find though where the leak is, this code is quite complicated.

I am now wondering why it failed to connect to the first (freeipa-one) in the first place.

Are there any related logs in /var/log/krb5kdc.log or /var/log/httpd/error_log on freeipa-one?

Does the install succeed if you install directly against freeipa-two? i.e.

ipa-client-install --server freeipa-two.corp.modmed.com --domain corp.modmed.com ?

Comment 5 corpitsysadmins 2014-01-09 22:00:19 UTC
Created attachment 847844 [details]
See name

Comment 6 corpitsysadmins 2014-01-09 22:02:08 UTC
Thanks for the update Martin. We are using self-signed certs...not sure if this makes a difference; but if they did, all client enrollments would fail and that is not the case.  

Since we open the bug we've had to reinstall the OS in some of the client machines that were "broken" but I am attaching the freeipa-one logs you requested from 12/27/2013.

The good thing about rebuilding those systems is that we can now reproduce the problem. While connecting to freeipa-one

1. ipa-client-install (will succeed, no problems at all)
2. ipa-client-install --uninstall
3. Reboot
4. ipa-client-install (will fail in the same place as before, see attached logs)

Tried ipa-client-install --server freeipa-two.corp.modmed.com --domain corp.modmed.com too (see attached logs). NP here, even after uninstall / install. I wonder what's wrong w/ my primary server. The only diff between these two servers, that comes to mind, is that freeipa-one has a public IP; freeipa-two does not. I'll report back if I find the root cause.

Sorry for the amount of logs btw. I grepped/named them so they are easier to read. Thank you again.

Comment 7 corpitsysadmins 2014-01-09 22:04:09 UTC
Created attachment 847846 [details]
Logs

Comment 8 corpitsysadmins 2014-01-09 22:10:18 UTC
Created attachment 847871 [details]
Logs

Comment 9 Martin Kosek 2014-01-10 08:59:05 UTC
Thanks for the well prepared logs, I wish all our logs are prepared that great.

I am bit confused by following section:
(In reply to corpitsysadmins from comment #6)
> ...
> The good thing about rebuilding those systems is that we can now reproduce
> the problem. While connecting to freeipa-one
> 
> 1. ipa-client-install (will succeed, no problems at all)
> 2. ipa-client-install --uninstall
> 3. Reboot
> 4. ipa-client-install (will fail in the same place as before, see attached
> logs)

Does it mean that after reinstallation of a system, the first join to freeipa-one succeeded and the second install (after uninstall&reboot) to freeipa-one failed?

I still did not discover the root cause of the fail, the real root cause is unfortunately hidden behind

Connection to https://freeipa-one.corp.modmed.com/ipa/xml failed with KerbTransport instance has no attribute '_conn'\
trying https://freeipa-two.corp.modmed.com/ipa/xml\

hides the real exception.

As you mentioned DNS, let's do a little practice to rule out any potential DNS issue as that is in 90% the root cause of Kerberos system issues.

On freeipa-one, run:

# cat /etc/hosts
# hostname
# host `hostname`
# host $IP_ADDRESS_OF_THIS_HOSTNAME
# host ovirt-two.corp.modmed.com
# host $IP_ADDRESS_OF_OVIR_TWO

On ovirt-two:
# cat /etc/hosts
# hostname
# host `hostname`
# host $IP_ADDRESS_OF_THIS_HOSTNAME
# host freeipa-one.corp.modmed.com
# host $IP_ADDRESS_OF_FREEIPA_ONE

I also noticed one more issue related to DNS principal in the kerberos log:

Jan 09 16:14:22 freeipa-two.corp.modmed.com krb5kdc[1337](info): TGS_REQ (4 etypes {18 17 16 23}) 10.10.2.61: UNKNOWN_SERVER: authtime 0,  host/ovirt-two.corp.modmed.com.COM for DNS/dns-server-primary.corp.modmed.com.COM, Server not found in Kerberos database

Not sure what it is.

Comment 10 corpitsysadmins 2014-01-10 17:00:52 UTC
Thank you Martin!

Yes, it means that after reinstallation of a system, the first join to freeipa-one succeeds, and the second install (after uninstall&reboot) to freeipa-one fails. I verified this again today with two other CentOS clients.

Here is the info requested:

[fredy.sanchez@freeipa-one ~]$ sudo cat /etc/hosts 
127.0.0.1	localhost localhost.localdomain localhost4 localhost4.localdomain4
::1        	localhost localhost.localdomain localhost6 localhost6.localdomain6
10.10.2.46  	freeipa-one.corp.modmed.com freeipa-one
107.21.44.86 	m2inf-kerberos-01.corp.modmed.com m2inf-kerberos-01
[fredy.sanchez@freeipa-one ~]$ hostname
freeipa-one.corp.modmed.com
[fredy.sanchez@freeipa-one ~]$ host `hostname`
freeipa-one.corp.modmed.com has address 199.189.197.89
[fredy.sanchez@freeipa-one ~]$ host freeipa-one.corp.modmed.com
freeipa-one.corp.modmed.com has address 199.189.197.89
[fredy.sanchez@freeipa-one ~]$ host ovirt-two.corp.modmed.com
ovirt-two.corp.modmed.com has address 10.10.2.61
[fredy.sanchez@freeipa-one ~]$ host 10.10.2.61
61.2.10.10.in-addr.arpa domain name pointer ovirt-two.corp.modmed.com.

199.189.197.89 is the public IP of the server, 10.10.2.46 is the internal one.

[fredy.sanchez@ovirt-two ~]$ sudo cat /etc/hosts: 
127.0.0.1   localhost localhost.localdomain localhost4 localhost4.localdomain4
::1         localhost localhost.localdomain localhost6 localhost6.localdomain6
[fredy.sanchez@ovirt-two ~]$ hostname
ovirt-two.corp.modmed.com
[fredy.sanchez@ovirt-two ~]$ host `hostname`
ovirt-two.corp.modmed.com has address 10.10.2.61
[fredy.sanchez@ovirt-two ~]$ host 10.10.2.61
61.2.10.10.in-addr.arpa domain name pointer ovirt-two.corp.modmed.com.
[fredy.sanchez@ovirt-two ~]$ host freeipa-one.corp.modmed.com
freeipa-one.corp.modmed.com has address 199.189.197.89
[fredy.sanchez@ovirt-two ~]$ host 199.189.197.89
89.197.189.199.in-addr.arpa domain name pointer freeipa-one.corp.modmed.com.

To avoid any sort of "flakiness" I removed the 10.10.2.46 from /etc/hosts in freeipa-one, but this effectively broke freeipa for this is the NIC IP assigned to the server (the public one comes to it via firewall NAT). After fixing this, I tried to re-enroll our two dns servers, but they both failed in the same way as ovirt-two.

So I removed the public IP from the equation by forcing the clients to resolve freeipa-one to 10.10.2.46 and voila! The problem is gone. So there is probably a problem with the firewall that's doing the NAT translation, and I will get that fixed. I think this is the root cause, what's weird is that that enrollment would work once, and then fail after that; but this probably also related to the firewall's config. Complicating the problem all the right ports are open, and the Web GUI of freeipa-one resolves to the public IP and works fine.

Thanks a lot for your help Martin, and apologies for taking so much of your time. As far as I go you can go ahead close this ticket.

Comment 11 corpitsysadmins 2014-01-10 17:55:23 UTC
Might have spoken too soon. The internal IP does work, but I am not so sure anymore the firewall is to blame. Adding info showing the right firewall ports are open:

[fredy.sanchez@ovirt-two ~]$ sudo nc -zv 199.189.197.89 80
Connection to 199.189.197.89 80 port [tcp/http] succeeded!
[fredy.sanchez@ovirt-two ~]$ sudo nc -zv 199.189.197.89 443
Connection to 199.189.197.89 443 port [tcp/https] succeeded!
[fredy.sanchez@ovirt-two ~]$ sudo nc -zv 199.189.197.89 389
Connection to 199.189.197.89 389 port [tcp/ldap] succeeded!
[fredy.sanchez@ovirt-two ~]$ sudo nc -zv 199.189.197.89 636
Connection to 199.189.197.89 636 port [tcp/ldaps] succeeded!
[fredy.sanchez@ovirt-two ~]$ sudo nc -zv 199.189.197.89 88
Connection to 199.189.197.89 88 port [tcp/kerberos] succeeded!
[fredy.sanchez@ovirt-two ~]$ sudo nc -zv 199.189.197.89 464
Connection to 199.189.197.89 464 port [tcp/kpasswd] succeeded!
[fredy.sanchez@ovirt-two ~]$ sudo nc -zvu 199.189.197.89 88
Connection to 199.189.197.89 88 port [udp/kerberos] succeeded!
[fredy.sanchez@ovirt-two ~]$ sudo nc -zvu 199.189.197.89 464
Connection to 199.189.197.89 464 port [udp/kpasswd] succeeded!
[fredy.sanchez@ovirt-two ~]$ sudo nc -zvu 199.189.197.89 123
Connection to 199.189.197.89 123 port [udp/ntp] succeeded!


From another machine:
[fredy.sanchez@dns-server-secondary ~]$ sudo nc -zv 199.189.197.89 80
Connection to 199.189.197.89 80 port [tcp/http] succeeded!
[fredy.sanchez@dns-server-secondary ~]$ sudo nc -zv 199.189.197.89 443
Connection to 199.189.197.89 443 port [tcp/https] succeeded!
[fredy.sanchez@dns-server-secondary ~]$ sudo nc -zv 199.189.197.89 389
Connection to 199.189.197.89 389 port [tcp/ldap] succeeded!
[fredy.sanchez@dns-server-secondary ~]$ sudo nc -zv 199.189.197.89 636
Connection to 199.189.197.89 636 port [tcp/ldaps] succeeded!
[fredy.sanchez@dns-server-secondary ~]$ sudo nc -zv 199.189.197.89 88
Connection to 199.189.197.89 88 port [tcp/kerberos] succeeded!
[fredy.sanchez@dns-server-secondary ~]$ sudo nc -zvu 199.189.197.89 88
Connection to 199.189.197.89 88 port [udp/kerberos] succeeded!
[fredy.sanchez@dns-server-secondary ~]$ sudo nc -zv 199.189.197.89 464
Connection to 199.189.197.89 464 port [tcp/kpasswd] succeeded!
[fredy.sanchez@dns-server-secondary ~]$ sudo nc -zvu 199.189.197.89 464
Connection to 199.189.197.89 464 port [udp/kpasswd] succeeded!
[fredy.sanchez@dns-server-secondary ~]$ sudo nc -zvu 199.189.197.89 123
Connection to 199.189.197.89 123 port [udp/ntp] succeeded!

Comment 12 Martin Kosek 2014-01-13 08:06:08 UTC
Good investigation! It seems this issue is indeed related to DNS, though it may not be the firewall, as you suggested in Comment 11. But as we see, it is caused by the freeipa-one mixing the internal/external IP for the internal client, as it seems.

It is hard to tell, what was the exact root cause in your environment, if you find it, please share. But if you are satisfied with the current fixed state, I may close this bug, as indicated.

Comment 13 Martin Kosek 2014-01-15 09:38:32 UTC
I see no further reported issues, closing as NOTABUG.

Comment 14 corpitsysadmins 2014-01-15 14:26:00 UTC
Thank you Martin, just wanted to add that yesterday we spent a good deal of time trying to get our freeipa servers working w/ an external CA. We went thru many problems, but came across https://www.redhat.com/archives/freeipa-users/2013-May/msg00192.html, from which we run

# cd /etc/pki/nssdb/
# ln -s /usr/lib64/nss/libnssckbi.so .

to fix a couple of error messages we saw in the logs in the form of

...KerbTransport instance has no attribute '_conn'
ipa: ERROR: ...((SEC_ERROR_UNTRUSTED_ISSUER) Peer's certificate issuer has been
marked as not trusted by the user.)

Since then we haven't had the original problem, w/ the private or public IP. So you were probably right when you said "It looks like there was some cached certificate object left in NSS, causing ipa-client-install to fail."

This doesn't explain why were able to enroll at times. But checking for cached certs is a great troubleshooting step. Do keep the ticket closed, I agree that is not a bug. Thank you again!