On Thu, 2020-07-09 at 06:13 +0000, Tony Brian Albers via FreeIPA-users
wrote:
> Hi guys,
> 
> This is a new install, software used is:
> ipa-server.x86_64    4.8.4-7.module+el8.2.0+6046+aaa49f96
> 389-ds-base.x86_64   1.4.2.4-8.module+el8.2.0+5959+cfcaedbd
> 
> I followed the install instructions in the documentation, and
> everything went fine. I haven't added any users or groups yet.
> 
> I have a master and a replica. The master dies, but the replica seems
> totally happy.
> 
> I restarted the master yesterday at 13:25. However, after a short
> time
> running, the log files in /var/log/pki/pki-tomcat/ca/debug.. starts
> filling up with java SocketExceptions like these:
> 
> 2020-07-08 13:57:49 [profileChangeMonitor] SEVERE: Profile change
> monitor: Caught exception: netscape.ldap.LDAPException: Server or
> network error (81)
> netscape.ldap.LDAPException: Server or network error (81)
>         at netscape.ldap.LDAPConnThread.networkError(Unknown Source)
>         at netscape.ldap.LDAPConnThread.run(Unknown Source)
>         at java.lang.Thread.run(Thread.java:748)
> 
> 2020-07-08 13:57:49 [AuthorityMonitor] WARNING: AuthorityMonitor:
> Failed to execute LDAP search for lightweight CAs:
> netscape.ldap.LDAPException: Server or network error (81)
> netscape.ldap.LDAPException: Server or network error (81)
>         at netscape.ldap.LDAPConnThread.networkError(Unknown Source)
>         at netscape.ldap.LDAPConnThread.run(Unknown Source)
>         at java.lang.Thread.run(Thread.java:748)
> 
> 2020-07-08 13:57:49 [profileChangeMonitor] SEVERE: Unable to create
> socket: java.net.SocketException: Network is unreachable (connect
> failed)
> java.net.SocketException: Network is unreachable (connect failed)
> ...
> 
> So it's pretty obvious that the LDAP server is not working properly.
> 
> In /var/log/dirsrv/slapd-YAK2-NET/errors I see:
> 
>         389-Directory/1.4.2.4 B2020.121.2358
>         fipa001.yak2.net:636 (/etc/dirsrv/slapd-YAK2-NET)
> 
> [08/Jul/2020:13:25:36.982866396 +0200] - INFO - slapd_extract_cert -
> CA
> CERT NAME: YAK2.NET IPA CA
> [08/Jul/2020:13:25:37.002136210 +0200] - WARN - Security
> Initialization
> - SSL alert: Sending pin request to SVRCore. You may need to run
> systemd-tty-ask-password-agent to provide the password.
> [08/Jul/2020:13:25:37.030257707 +0200] - INFO - slapd_extract_cert -
> SERVER CERT NAME: Server-Cert
> [08/Jul/2020:13:25:37.049921505 +0200] - INFO - Security
> Initialization
> - SSL info: Enabling default cipher set.
> [08/Jul/2020:13:25:37.074564197 +0200] - INFO - Security
> Initialization
> - SSL info: Configured NSS Ciphers
> [08/Jul/2020:13:25:37.091262372 +0200] - INFO - Security
> Initialization
> - SSL info:     TLS_AES_128_GCM_SHA256: enabled
> ...
> All ciphers enabled
> ...
> [08/Jul/2020:13:25:37.601009917 +0200] - INFO - Security
> Initialization
> - slapd_ssl_init2 - Configured SSL version range: min: TLS1.0, ma
> x: TLS1.2
> [08/Jul/2020:13:25:37.616336615 +0200] - INFO - Security
> Initialization
> - slapd_ssl_init2 - NSS adjusted SSL version range: min: TLS1.2,
> max: TLS1.2
> ...
> [08/Jul/2020:13:25:38.547791102 +0200] - NOTICE - bdb_start -
> Detected
> Disorderly Shutdown last time Directory Server was running,
> recovering
> database.
> [08/Jul/2020:13:25:38.792474100 +0200] - ERR - attrcrypt_unwrap_key -
> Failed to unwrap key for cipher AES
> [08/Jul/2020:13:25:38.817182778 +0200] - ERR - attrcrypt_cipher_init
> -
> Symmetric key failed to unwrap with the private key; Cert might have
> been renewed since the key is wrapped.  To recover the encrypted
> contents, keep the wrapped symmetric key value.
> [08/Jul/2020:13:25:38.852524974 +0200] - ERR - attrcrypt_unwrap_key -
> Failed to unwrap key for cipher 3DES
> [08/Jul/2020:13:25:38.871423186 +0200] - ERR - attrcrypt_cipher_init
> -
> Symmetric key failed to unwrap with the private key; Cert might have
> been renewed since the key is wrapped.  To recover the encrypted
> contents, keep the wrapped symmetric key value.
> [08/Jul/2020:13:25:38.880537833 +0200] - ERR - attrcrypt_init - All
> prepared ciphers are not available. Please disable attribute
> encryption.
> [08/Jul/2020:13:25:38.891681971 +0200] - ERR - attrcrypt_unwrap_key -
> Failed to unwrap key for cipher AES
> [08/Jul/2020:13:25:38.916694998 +0200] - ERR - attrcrypt_cipher_init
> -
> Symmetric key failed to unwrap with the private key; Cert might have
> been renewed since the key is wrapped.  To recover the encrypted
> contents, keep the wrapped symmetric key value.
> [08/Jul/2020:13:25:38.925787580 +0200] - ERR - attrcrypt_unwrap_key -
> Failed to unwrap key for cipher 3DES
> [08/Jul/2020:13:25:38.934688993 +0200] - ERR - attrcrypt_cipher_init
> -
> Symmetric key failed to unwrap with the private key; Cert might have
> been renewed since the key is wrapped.  To recover the encrypted
> contents, keep the wrapped symmetric key value.
> [08/Jul/2020:13:25:38.943696327 +0200] - ERR - attrcrypt_init - All
> prepared ciphers are not available. Please disable attribute
> encryption.


Right, so I tried doing what it says here:
https://access.redhat.com/solutions/461893

Basically remove all entries starting with:
dn: cn=AES,cn=encrypted attribute keys,cn=NetscapeRoot,cn=ldbm
database,cn=plugins,cn=config

In /etc/dirsrv/sladp-instance/dse.ldif

And then I rebooted. But when it came back up, pki-tomcat was still
acting up and systemd quickly set it to "failed".

However, doing a 'systemctl restart [email protected]'
seemed to make it run. And soon I saw this in the dirsrv errors log:

[09/Jul/2020:08:50:45.683765835 +0200] - INFO - NSMMReplicationPlugin -
bind_and_check_pwp - agmt="cn=meTofipa002.yak2.net" (fipa002:389):
Replication bind with GSSAPI auth resumed

Seems that the communication with the replica is now ok.


Now pki-tomcat on the master has been running for 4 hours without any
errors.

So this looks good.


But after a reboot, it's back, pki-tomcat debug-log:

2020-07-09 13:23:33 [main] SEVERE: Unable to create socket:
java.net.SocketException: Network is unreachable (connect failed)
java.net.SocketException: Network is unreachable (connect failed)

And again, restarting [email protected] seems to fix it,
so it's like pki-tomcat tries to start before the LDAP server is ready
and then it just goes fubar.

Any good ideas anyone?

/tony

-- 
Tony Albers - Systems Architect - IT Development
Royal Danish Library, Victor Albecks Vej 1, 8000 Aarhus C, Denmark
Tel: +45 2566 2383 - CVR/SE: 2898 8842 - EAN: 5798000792142
_______________________________________________
FreeIPA-users mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedorahosted.org/archives/list/[email protected]

Reply via email to