RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
Bug 723622 - Need an arch-specific Requires on cyrus-sasl-gssapi
Summary: Need an arch-specific Requires on cyrus-sasl-gssapi
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Linux 6
Classification: Red Hat
Component: ipa
Version: 6.1
Hardware: Unspecified
OS: Unspecified
high
unspecified
Target Milestone: rc
: ---
Assignee: Rob Crittenden
QA Contact: Chandrasekar Kannan
URL:
Whiteboard:
Depends On: 723620
Blocks:
TreeView+ depends on / blocked
 
Reported: 2011-07-20 17:47 UTC by Rob Crittenden
Modified: 2015-01-04 23:50 UTC (History)
3 users (show)

Fixed In Version: ipa-2.1.0-1.el6
Doc Type: Bug Fix
Doc Text:
Cause: ipa-getkeytab fails with a bind error. Consequence: Client enrollment fails: ipa-getkeytab is not successful in retrieving keytabs for a client. Fix: If 32-bit packages are used on a 64-bit system then 32-bit cyrus-sasl-gssapi is required. Add architecture-specific Requires to the rpm spec file. Result: The right packages are installed on the right architectures.
Clone Of: 723620
Environment:
Last Closed: 2011-12-06 18:41:30 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2011:1533 0 normal SHIPPED_LIVE Moderate: ipa security and bug fix update 2011-12-06 01:23:31 UTC

Description Rob Crittenden 2011-07-20 17:47:24 UTC
+++ This bug was initially created as a clone of Bug #723620 +++

Description of problem:

cyrus-sasl-gssapi is a soft dependency needed by some IPA client tools (ipa-getkeytab for one). It is loaded by other packages (ldap, krb5) but if the 32-bit version of ipa-client is installed on a 64-bit platform there is no explicit requirement on the 32-bit version of cyrus-sasl-gssapi. The result is that ipa-getkeytab fails with: SASL Bind failed. This is because the 32-bit GSSAPI SASL mechanism isn't available.

Version-Release number of selected component (if applicable):

ipa-client-2.0-14.el5

Steps to Reproduce:
1. Install 32-bit ipa-client package on 64-bit machine
2. ipa-client-install
  
Actual results:

SASL Bind failed!

Expected results:

Host enrollment with a host service principal in /etc/krb5.keytab.

Comment 1 Rob Crittenden 2011-07-20 17:52:33 UTC
https://fedorahosted.org/freeipa/ticket/1499

Comment 2 Rob Crittenden 2011-07-25 15:03:21 UTC
master: 3fe36a63b6747ef1d961e1ffd287177d7341f1f9

ipa-2-0: 99a18c3ac258b47f949b301fe09ed1a01fed28cf

Comment 6 Rob Crittenden 2011-10-31 21:03:03 UTC
    Technical note added. If any revisions are required, please edit the "Technical Notes" field
    accordingly. All revisions will be proofread by the Engineering Content Services team.
    
    New Contents:
Cause: ipa-getkeytab fails with a bind error.
Consequence: Client enrollment fails: ipa-getkeytab is not successful in retrieving keytabs for a client.
Fix: If 32-bit packages are used on a 64-bit system then 32-bit cyrus-sasl-gssapi is required. Add architecture-specific Requires to the rpm spec file.
Result: The right packages are installed on the right architectures.

Comment 7 Gowrishankar Rajaiyan 2011-11-07 10:36:07 UTC
[root@ipaqa64vmc ~]# arch
x86_64
[root@ipaqa64vmc ~]# 


[root@ipaqa64vmc ~]# yum localinstall ipa-admintools-2.1.3-8.el6.i686.rpm ipa-client-2.1.3-8.el6.i686.rpm 
...
Dependencies Resolved

===========================================================================
 Package                              Arch                   Version       
===========================================================================
Installing:
 ipa-admintools                       i686                   2.1.3-8.el6   
 ipa-client                           i686                   2.1.3-8.el6   
Installing for dependencies:
 cyrus-sasl-gssapi                    i686                   2.1.23-13.el6 
 cyrus-sasl-lib                       i686                   2.1.23-13.el6 
...


[root@ipaqa64vmc ~]# yum install nss-sysinit-3.12.10-15.el6.i686.rpm 
Dependency requirement for nss-sysinit is tracked at https://bugzilla.redhat.com/show_bug.cgi?id=751694

[root@ipaqa64vmc ~]# ipa-client-install 
DNS discovery failed to determine your DNS domain
Provide the domain name of your IPA server (ex: example.com): rhts.eng.bos.redhat.com
DNS discovery failed to find the IPA Server
Provide your IPA server name (ex: ipa.example.com): hp-dl580g5-01.rhts.eng.bos.redhat.com

The failure to use DNS to find your IPA server indicates that your
resolv.conf file is not properly configured.

Autodiscovery of servers for failover cannot work with this configuration.

If you proceed with the installation, services will be configured to always
access the discovered server for all operation and will not fail over to
other servers in case of failure.

Proceed with fixed values and no DNS discovery? [no]: yes
Hostname: ipaqa64vmc.idm.lab.bos.redhat.com
Realm: RHTS.ENG.BOS.REDHAT.COM
DNS Domain: rhts.eng.bos.redhat.com
IPA Server: hp-dl580g5-01.rhts.eng.bos.redhat.com
BaseDN: dc=rhts,dc=eng,dc=bos,dc=redhat,dc=com


Continue to configure the system with these values? [no]: yes
User authorized to enroll computers: admin
Synchronizing time with KDC...
Unable to sync time with IPA NTP server, assuming the time is in sync.
Password for admin.BOS.REDHAT.COM: 

Enrolled in IPA realm RHTS.ENG.BOS.REDHAT.COM
Created /etc/ipa/default.conf
Configured /etc/sssd/sssd.conf
Configured /etc/krb5.conf for IPA realm RHTS.ENG.BOS.REDHAT.COM
SSSD enabled
NTP enabled
Client configuration complete.
[root@ipaqa64vmc ~]#

[root@ipaqa64vmc ~]# klist -ekt /etc/krb5.keytab 
Keytab name: WRFILE:/etc/krb5.keytab
KVNO Timestamp         Principal
---- ----------------- --------------------------------------------------------
   1 11/07/11 05:28:48 host/ipaqa64vmc.idm.lab.bos.redhat.com.BOS.REDHAT.COM (aes256-cts-hmac-sha1-96) 
   1 11/07/11 05:28:48 host/ipaqa64vmc.idm.lab.bos.redhat.com.BOS.REDHAT.COM (aes128-cts-hmac-sha1-96) 
   1 11/07/11 05:28:48 host/ipaqa64vmc.idm.lab.bos.redhat.com.BOS.REDHAT.COM (des3-cbc-sha1) 
   1 11/07/11 05:28:48 host/ipaqa64vmc.idm.lab.bos.redhat.com.BOS.REDHAT.COM (arcfour-hmac) 
[root@ipaqa64vmc ~]# 


[root@ipaqa64vmc ~]# ipa-getkeytab --server=hp-dl580g5-01.rhts.eng.bos.redhat.com --principal=HTTP/hp-dl580g5-01.rhts.eng.bos.redhat.com.BOS.REDHAT.COM  --keytab=/etc/krb5.keytab --binddn="cn=directory manager" --bindpw=Secret123
Keytab successfully retrieved and stored in: /etc/krb5.keytab


[root@ipaqa64vmc ~]# klist -ekt /etc/krb5.keytab 
Keytab name: WRFILE:/etc/krb5.keytab
KVNO Timestamp         Principal
---- ----------------- --------------------------------------------------------
   1 11/07/11 05:28:48 host/ipaqa64vmc.idm.lab.bos.redhat.com.BOS.REDHAT.COM (aes256-cts-hmac-sha1-96) 
   1 11/07/11 05:28:48 host/ipaqa64vmc.idm.lab.bos.redhat.com.BOS.REDHAT.COM (aes128-cts-hmac-sha1-96) 
   1 11/07/11 05:28:48 host/ipaqa64vmc.idm.lab.bos.redhat.com.BOS.REDHAT.COM (des3-cbc-sha1) 
   1 11/07/11 05:28:48 host/ipaqa64vmc.idm.lab.bos.redhat.com.BOS.REDHAT.COM (arcfour-hmac) 
   3 11/07/11 05:33:36 HTTP/hp-dl580g5-01.rhts.eng.bos.redhat.com.BOS.REDHAT.COM (aes256-cts-hmac-sha1-96) 
   3 11/07/11 05:33:36 HTTP/hp-dl580g5-01.rhts.eng.bos.redhat.com.BOS.REDHAT.COM (aes128-cts-hmac-sha1-96) 
   3 11/07/11 05:33:36 HTTP/hp-dl580g5-01.rhts.eng.bos.redhat.com.BOS.REDHAT.COM (des3-cbc-sha1) 
   3 11/07/11 05:33:36 HTTP/hp-dl580g5-01.rhts.eng.bos.redhat.com.BOS.REDHAT.COM (arcfour-hmac) 
[root@ipaqa64vmc ~]# 


[root@ipaqa64vmc ~]# rpm -qi ipa-client
Name        : ipa-client                   Relocations: (not relocatable)
Version     : 2.1.3                             Vendor: Red Hat, Inc.
Release     : 8.el6                         Build Date: Tue 01 Nov 2011 05:50:44 PM EDT
Install Date: Mon 07 Nov 2011 05:22:55 AM EST      Build Host: x86-004.build.bos.redhat.com
Group       : System Environment/Base       Source RPM: ipa-2.1.3-8.el6.src.rpm
Size        : 220595                           License: GPLv3+
Signature   : (none)
Packager    : Red Hat, Inc. <http://bugzilla.redhat.com/bugzilla>
URL         : http://www.freeipa.org/
Summary     : IPA authentication for use on clients

Comment 8 errata-xmlrpc 2011-12-06 18:41:30 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

http://rhn.redhat.com/errata/RHSA-2011-1533.html


Note You need to log in before you can comment on or make changes to this bug.