RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
Bug 1311470 - ipa trust-add succeded but after that ipa trust-find returns "0 trusts matched"
Summary: ipa trust-add succeded but after that ipa trust-find returns "0 trusts matched"
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Linux 7
Classification: Red Hat
Component: ipa
Version: 7.2
Hardware: All
OS: Linux
urgent
urgent
Target Milestone: rc
: ---
Assignee: IPA Maintainers
QA Contact: Namita Soman
URL:
Whiteboard:
Depends On: 1305533
Blocks:
TreeView+ depends on / blocked
 
Reported: 2016-02-24 10:25 UTC by Jan Kurik
Modified: 2019-09-12 09:57 UTC (History)
12 users (show)

Fixed In Version: ipa-4.2.0-15.el7_2.11
Doc Type: Bug Fix
Doc Text:
When upgrading an IdM server to version 4.2 or installing the 4.2 version, AD trusts created on the server did not work, even though the server reported the trust status as established and verified. This update fixes the configuration of the sidgen and extdom plug-ins, thus eliminating the problem. If you experienced this problem, recreate all trusts using the ipa trust-add utility.
Clone Of: 1305533
Environment:
Last Closed: 2016-05-12 09:58:38 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2016:1036 0 normal SHIPPED_LIVE ipa bug fix update 2016-05-12 13:53:44 UTC

Description Jan Kurik 2016-02-24 10:25:23 UTC
This bug has been copied from bug #1305533 and has been proposed
to be backported to 7.2 z-stream (EUS).

Comment 4 Petr Vobornik 2016-03-01 16:52:07 UTC
Patch related to this bz was incorrectly backported and causes install issue.

Comment 6 Petr Vobornik 2016-03-02 09:45:18 UTC
upstream fix:

master:
    fcc540bbdc5daa24990940124ec3bd439b05257d Fix connections to DS during installation 

ipa-4-3:
    c14fb0b9e0f4cb977e897645126ef7d1bbf9aa9e Fix connections to DS during installation 

ipa-4-2:
    e2ef561375c63a375710254f159f75d7318c514d Insure the admin_conn is disconnected on stop
    0af81913258b2f4c9841c5baddda146667282b2c Fix connections to DS during installation

Comment 8 Varun Mylaraiah 2016-03-11 15:05:36 UTC
Verified

Version
ipa-server-4.2.0-15.el7_2.10.x86_64

# ipa trust-add pne.qe --range-type='ipa-ad-trust' --two-way=true 
Active Directory domain administrator: Administrator
Active Directory domain administrator's password: 
-----------------------------------------------
Added Active Directory trust for realm "pne.qe"
-----------------------------------------------
  Realm name: pne.qe
  Domain NetBIOS name: PNE
  Domain Security Identifier: S-1-5-21-2828791737-1866347024-3967946728
  SID blacklist incoming: S-1-5-20, S-1-5-3, S-1-5-2, S-1-5-1, S-1-5-7, S-1-5-6, S-1-5-5, S-1-5-4, S-1-5-9, S-1-5-8, S-1-5-17, S-1-5-16, S-1-5-15, S-1-5-14, S-1-5-13, S-1-5-12, S-1-5-11, S-1-5-10, S-1-3, S-1-2, S-1-1, S-1-0, S-1-5-19,
                          S-1-5-18
  SID blacklist outgoing: S-1-5-20, S-1-5-3, S-1-5-2, S-1-5-1, S-1-5-7, S-1-5-6, S-1-5-5, S-1-5-4, S-1-5-9, S-1-5-8, S-1-5-17, S-1-5-16, S-1-5-15, S-1-5-14, S-1-5-13, S-1-5-12, S-1-5-11, S-1-5-10, S-1-3, S-1-2, S-1-1, S-1-0, S-1-5-19,
                          S-1-5-18
  Trust direction: Two-way trust
  Trust type: Active Directory domain
  Trust status: Established and verified


[root@apollo ~]# ipa trust-find
----------------
3 trusts matched
----------------
  Realm name: chd.pne.qe
  Domain NetBIOS name: CHD
  Domain Security Identifier: S-1-5-21-2165991969-2769796915-1516482243

  Realm name: pne.qe
  Domain NetBIOS name: PNE
  Domain Security Identifier: S-1-5-21-2828791737-1866347024-3967946728
  Trust type: Active Directory domain

  Realm name: test.qa
  Domain NetBIOS name: TEST101
  Domain Security Identifier: S-1-5-21-3329144650-2588454953-1484820794
----------------------------
Number of entries returned 3
----------------------------

Comment 9 Petr Vobornik 2016-03-15 15:08:53 UTC
There is a regression, see bug 1317635 for details but fix it here.

Comment 10 Martin Bašti 2016-03-15 15:16:29 UTC
Upstream ticket:
https://fedorahosted.org/freeipa/ticket/5737

Comment 15 Martin Bašti 2016-03-16 16:33:24 UTC
It should be POST, my bad

Comment 17 Varun Mylaraiah 2016-03-17 13:03:56 UTC
Verified using 
ipa-server-4.2.0-15.el7_2.11.x86_64

[root@apollo yum.repos.d]# ipa trust-find
----------------
3 trusts matched
----------------
  Realm name: ipa.in
  Domain NetBIOS name: IPA
  Domain Security Identifier: S-1-5-21-4079490025-2129455549-2000505884
  Trust type: Active Directory domain

  Realm name: ipaad2008r2.test
  Domain NetBIOS name: IPAAD2008R2
  Domain Security Identifier: S-1-5-21-1765444267-4284514389-3232425237
  Trust type: Active Directory domain

  Realm name: ipasub2008r2-1.ipaad2008r2.test
  Domain NetBIOS name: IPASUB2008R2-1
  Domain Security Identifier: S-1-5-21-469193889-4273894478-2486872656
----------------------------
Number of entries returned 3
----------------------------

Comment 19 errata-xmlrpc 2016-05-12 09:58:38 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://rhn.redhat.com/errata/RHBA-2016-1036.html


Note You need to log in before you can comment on or make changes to this bug.