Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1322963 - Errors from AD when trying to sign ipa.csr, conflicting template on
Errors from AD when trying to sign ipa.csr, conflicting template on
Status: CLOSED ERRATA
Product: Red Hat Enterprise Linux 7
Classification: Red Hat
Component: ipa (Show other bugs)
7.2
All Linux
high Severity high
: rc
: ---
Assigned To: IPA Maintainers
Sudhir Menon
:
Depends On:
Blocks: 1396494 1399979
  Show dependency treegraph
 
Reported: 2016-03-31 15:01 EDT by Amy Farley
Modified: 2017-08-01 05:37 EDT (History)
11 users (show)

See Also:
Fixed In Version: ipa-4.5.0-12.el7
Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2017-08-01 05:37:23 EDT
Type: Bug
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)
Verification Steps (12.89 KB, text/plain)
2017-05-17 10:06 EDT, Sudhir Menon
no flags Details


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Knowledge Base (Solution) 2258081 None None None 2016-04-14 04:46 EDT
Red Hat Product Errata RHBA-2017:2304 normal SHIPPED_LIVE ipa bug fix and enhancement update 2017-08-01 08:41:35 EDT

  None (edit)
Comment 2 Jan Cholasta 2016-04-06 04:52:49 EDT
See bug 1129558, comment 3 for a workaround.
Comment 3 Jan Cholasta 2016-04-06 06:53:06 EDT
Alternative workaround would be to manually create an AD-compatible CSR:

# echo -e -n '\x1E\x0A\x00\x53\x00\x75\x00\x62\x00\x43\x00\x41' >ext-value
# certutil -R -d /etc/pki/pki-tomcat/alias -f <(grep -Po '(?<=internal=).*' /etc/pki/pki-tomcat/password.conf) -k 'caSigningCert cert-pki-ca' --extGeneric=1.3.6.1.4.1.311.20.2:not-critical:ext-value -o ipa.csr -a
Comment 5 Petr Vobornik 2016-04-11 04:55:48 EDT
Upstream ticket:
https://fedorahosted.org/freeipa/ticket/5799
Comment 14 aheverle 2017-04-10 17:04:46 EDT
From Thorsten:  The issue reported by the customer (CA installed on replica is always configured as renewal master) has been fixed with this errata:

https://access.redhat.com/errata/RHBA-2016:1256

In c#225 the customer mentioned, that they do their installs using a RHEL-7.2 DVD image. The fix has been released for RHEL-7.3 and as an async update for RHEL-7.2.z. It's not part of RHEL-7.2 GA release though. This means, they need to install at least the following package to get rid of the issue: ipa-4.2.0-15.el7_2.17. (or later). 

See this BZ for details: 

CA installed on replica is always marked as renewal master
https://bugzilla.redhat.com/show_bug.cgi?id=1339304

From customer:  That bugzilla does appear to describe the behavior. As both projects (using 7.1 and 7.2 respectively) are in a phase where package updates are not possible, is running "ipa-csreplica-manage set-renewal-master" on the master a viable workaround? It has corrected the LDAP entries every time I've run it, and the CS.cfg files on the master and replica already appear to be okay. Are there any other parts related to this that were fixed that require the updated packages?
Comment 18 Jan Cholasta 2017-05-16 07:39:07 EDT
Upstream ticket:
https://pagure.io/freeipa/issue/6950
Comment 21 Sudhir Menon 2017-05-17 10:04:37 EDT
Verified on RHEL7.4 using 
ipa-server-4.5.0-11.el7.x86_64
sssd-1.15.2-29.el7.x86_64
krb5-server-1.15.1-8.el7.x86_64
selinux-policy-3.13.1-148.el7.noarch
pki-ca-10.4.1-4.el7.noarch

Attaching the steps used for verification.
Comment 22 Sudhir Menon 2017-05-17 10:06 EDT
Created attachment 1279705 [details]
Verification Steps
Comment 23 errata-xmlrpc 2017-08-01 05:37:23 EDT
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2017:2304

Note You need to log in before you can comment on or make changes to this bug.