RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
Bug 1475085 - [RFE] Migration capabilities between non-FIPS IDM to FIPS IDM
Summary: [RFE] Migration capabilities between non-FIPS IDM to FIPS IDM
Keywords:
Status: CLOSED WONTFIX
Alias: None
Product: Red Hat Enterprise Linux 8
Classification: Red Hat
Component: ipa
Version: 8.0
Hardware: All
OS: Linux
unspecified
high
Target Milestone: rc
: ---
Assignee: Thomas Woerner
QA Contact: ipa-qe
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2017-07-26 01:42 UTC by Chinmay Paradkar
Modified: 2024-02-04 04:25 UTC (History)
12 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2020-06-16 07:05:20 UTC
Type: Bug
Target Upstream Version:
Embargoed:
cheimes: needinfo-


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Issue Tracker FREEIPA-7249 0 None None None 2021-11-08 15:42:59 UTC
Red Hat Issue Tracker RHELPLAN-34512 0 None None None 2021-11-08 15:42:54 UTC

Description Chinmay Paradkar 2017-07-26 01:42:59 UTC
Description of problem:

As per the Doc Text for bug https://bugzilla.redhat.com/show_bug.cgi?id=1125174, the text leads mentions that there is no transition from an IPA instance that is not FIPS to a new FIPS enabled environment short of re-installing everything. 

This is unacceptable as customers would have to redo the entire trust domain as the solution. 

Version-Release number of selected component (if applicable):

ipa-4.5.0-1.el7

Additional info:

In the case that this is "the only way" then we may need some really good documentation on how to migrate everything. IPA is woven throughout the entire Red Hat product line and transitioning the various products (RHV, Satellite, etc) to a new trust domain is likely not trivial.

Comment 2 Petr Vobornik 2017-08-04 22:12:54 UTC
Upstream ticket:
https://pagure.io/freeipa/issue/7090

Comment 10 Christian Heimes 2020-04-23 07:36:55 UTC
No, it is *not* possible to migrate an existing IDM installation from a non-FIPS environment to a FIPS compliant installation. This is not a technical problem but a legal and regulatory restriction.

I discussed the matter internally with our FIPS expert. He confirmed what I already suspected. It's not permitted to enable FIPS mode on a non-FIPS machine and then claim to be FIPS compliant. To be FIPS compliant any and all cryptographic key material *must* be created in FIPS mode. Further more this cryptographic key material must never leave FIPS environment unless it's securely wrapped and never unwrapped in non-FIPS environments.

Simply speaking: as soon as a key is created or comes in contact with a non-FIPS environment, it becomes tainted and violates FIPS compliance.

The best we could do is:

* create a new IPA realm in FIPS mode
* perform a data migration from non-FIPS realm to new FIPS realm with a filter to block all key material

The migration must block:
* KDC master key, keytabs, and all related Kerberos key material
* user passwords
* all certificates including CA, service, and user certificates
* OTP tokens
* SSH keys and fingerprints
* DNSSEC KSK and ZSK
* all vault entries
* AD trust-related key material

Effectively the new FIPS installation is a different installation. You'd have to replace all host keytabs, service keytabs, service certs, and CA cert on all clients. Any trust with AD realms have to be re-established, too.

Even with rigorous filtering we aren't sure if this migration is going to pass FIPS muster. Your FIPS auditor may flag this migration.

Comment 13 Petr Čech 2020-06-16 07:05:20 UTC
Based on https://bugzilla.redhat.com/show_bug.cgi?id=1475085#c10 we closed this RFE as WONTFIX.

Comment 15 Steven Mercurio 2023-05-18 15:00:19 UTC
What about a new feature added to the ipa-backup that will allow you to backup everything that is *NOT* affected by a change to FIPS like users, groups, DNS, etc. so then you are still essentially starting over with a new install BUT you can restore at least some things.

Another other option is add a feature to the installer that reads everything it can from one master in the post install process of a new IPA server and creates everything it can to match the old system into the new system.

Or a really good option is a tool that just reads the configuration (This could be done in Ansible fairly easily) and creates a list of ipa commands or an ansible yaml file that can be used to create/recreate the same setup similar to how a DB does a dump of SQL commands that can be replayed on a DBV to restore it.

In all 3 methods you are essentially starting over BUT you are GREATLY limiting the amount of loss!  The added benefit of this is it can be used to solve *MANY* issues like:

1. perform in-place upgrades like from CentOS to RHEL
2. Migrate from non-FIPS to FIPS
3. fixing a corrupted IPA install
4. install a new system that does not have certain things like ad trusts
5. install a new system that is for testing, replicating issues, or a new environment that must match an existing environment

In all these cases any of these methods are basically starting over on a new install and would NOT interfere with FIPS in ANY way.  There would be some loss like user passwords, certs, etc. but that is a FAR better fate than loosing EVERYTHING and starting over!

Comment 16 Alexander Bokovoy 2023-05-19 05:56:09 UTC
We have a plan for IPA-IPA migration: https://freeipa.readthedocs.io/en/latest/designs/ipa_to_ipa_migration.html

This is not implemented yet, but it is pretty much along the same lines.

Comment 17 Red Hat Bugzilla 2024-02-04 04:25:05 UTC
The needinfo request[s] on this closed bug have been removed as they have been unresolved for 120 days


Note You need to log in before you can comment on or make changes to this bug.