Ilya Kogan via FreeIPA-users wrote:
> Thanks for that info, I don't see any suspicious errors in startup that
> I haven't seen before. Just the following:
> 
> - Token named "NSS Generic Crypto Services", not "NSS Certificate DB",
> skipping.
> - Error opening "/etc/httpd/alias/pwdfile.txt": No such file or directory.
> 
> I don't think either of these are really an issue but I could be wrong.

You're right.

> 
> Grepping the request files does indeed show those ca-error values
> though. They don't really bother me if they won't cause issues. It seems
> like it's just the last error it got from the CA, which just won't be
> updated until it tries to request something next time.

That's probably true as well. The error won't clear until certmonger
tries the request again.

rob
> 
> On Wed, Jul 8, 2020, 2:41 PM Rob Crittenden <[email protected]
> <mailto:[email protected]>> wrote:
> 
>     Ilya Kogan wrote:
>     > Wow ok, that was easy. `getcert list` now reports correct expiration
>     > dates for those certificates and they're all in MONITORING. It
>     still has
>     > that ca-error field although it's no longer trying to renew. Is that
>     > going to be an issue or is it just going to try again when it's
>     time to
>     > renew and succeed?
> 
>     I don't know. I'd check the journal to see if it logged any errors
>     post-restart. I don't believe that the ca-error is stored between
>     restarts. You could grep in /var/lib/certmonger/requests to see I
>     suppose.
> 
>     rob
> 
>     >
>     > On Wed, Jul 8, 2020, 9:43 AM Florence Blanc-Renaud <[email protected]
>     <mailto:[email protected]>
>     > <mailto:[email protected] <mailto:[email protected]>>> wrote:
>     >
>     >     On 7/6/20 7:59 PM, Ilya Kogan via FreeIPA-users wrote:
>     >     > Hi,
>     >     >
>     >     > Thanks for the help so far! I've actually run `ipa-cert-fix`
>     on both
>     >     > nodes, it says everything is ok on both nodes. When I run it
>     with
>     >     > verbose mode, it spits out the command it's running and the
>     >     certificate
>     >     > it got, for example:
>     >     >
>     >     >     ```
>     >     >     ipapython.ipautil: DEBUG: args=['/usr/bin/certutil', '-d',
>     >     >     'sql:/etc/pki/pki-tomcat/alias', '-L', '-n', 'storageCert
>     >     >     cert-pki-kra', '-a', '-f',
>     >     '/etc/pki/pki-tomcat/alias/pwdfile.txt']
>     >     >     ```
>     >     >
>     >     >
>     >     > If I then take that cert and ask what `openssl x509 -text
>     -noout`
>     >     thinks
>     >     > about it, it tells me that it's valid from 2020-06-29 to
>     2022-06-29.
>     >     > Strangely, though, when I ask `getcert list`, it shows that the
>     >     certificate:
>     >     >
>     >     >     ```
>     >     >     certificate:
>     >     >   
>     >   
>       type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='storageCert
>     >     cert-pki-kra',token='NSS
>     >     >     Certificate DB'
>     >     >     ```
>     >     >
>     >     >
>     >     > expires on 2020-06-27. It's almost as if this node's
>     certificate has
>     >     > _already_ been renewed but certmonger (I think) doesn't know
>     about
>     >     it,
>     >     > which might be why it's having trouble renewing it.
>     >     >
>     >     Hi,
>     >
>     >     you may want to restart certmonger to force it re-reading the
>     >     certificate information:
>     >     # sudo systemctl restart certmonger
>     >
>     >     flo
>     >
>     >     > Here's what the two nodes say about replication:
>     >     >
>     >     >  From node one:
>     >     >
>     >     >     ```
>     >     >     ipa-two.mydomain.org <http://ipa-two.mydomain.org>
>     <http://ipa-two.mydomain.org>
>     >     <http://ipa-two.mydomain.org>
>     >     >        last update status: Error (0) Replica acquired
>     successfully:
>     >     >     Incremental update succeeded
>     >     >        last update ended: 2020-07-06 17:46:17+00:00
>     >     >     ```
>     >     >
>     >     >
>     >     >  From node two:
>     >     >
>     >     >     ```
>     >     >     ipa-one.gaea.mythicnet.org
>     <http://ipa-one.gaea.mythicnet.org> <http://ipa-one.gaea.mythicnet.org>
>     >     <http://ipa-one.gaea.mythicnet.org>
>     >     >        last update status: Error (0) Replica acquired
>     successfully:
>     >     >     Incremental update succeeded
>     >     >        last update ended: 2020-07-06 17:46:17+00:00
>     >     >     ```
>     >     >
>     >     >
>     >     > I suppose this might be a good time to mention that this is a
>     >     simple two
>     >     > node multi-master setup. Finally, I'm not sure if I'm doing this
>     >     > correctly, but to make absolutely sure about which node is the
>     >     renewal
>     >     > master, I ran this on both nodes:
>     >     >
>     >     >     ```
>     >     >     ldapsearch -H ldap://ipa-one.gaea.mythicnet.org
>     <http://ipa-one.gaea.mythicnet.org>
>     >     <http://ipa-one.gaea.mythicnet.org>
>     >     >     <http://ipa-one.gaea.mythicnet.org> -D 'cn=Directory
>     Manager'
>     >     -W -b
>     >     >     'cn=masters,cn=ipa,cn=etc,dc=mydomain,dc=org'
>     >     >     '(&(cn=CA)(ipaConfigString=caRenewalMaster))' dn
>     >     >     ldapsearch -H ldap://ipa-two.gaea.mythicnet.org
>     <http://ipa-two.gaea.mythicnet.org>
>     >     <http://ipa-two.gaea.mythicnet.org>
>     >     >     <http://ipa-two.gaea.mythicnet.org> -D 'cn=Directory
>     Manager'
>     >     -W -b
>     >     >     'cn=masters,cn=ipa,cn=etc,dc=mydomain,dc=org'
>     >     >     '(&(cn=CA)(ipaConfigString=caRenewalMaster))' dn
>     >     >     ```
>     >     >
>     >     >
>     >     > The result for both is:
>     >     >
>     >     >     ```
>     >     >     dn: cn=CA,cn=ipa-one.gaea.mythicnet.org
>     <http://ipa-one.gaea.mythicnet.org>
>     >     <http://ipa-one.gaea.mythicnet.org>
>     >     >   
>     >   
>       
> <http://ipa-one.gaea.mythicnet.org>,cn=masters,cn=ipa,cn=etc,dc=mydomain,dc=org
>     >     >     ```
>     >     >
>     >     >
>     >     > So it looks like the renewal master is the one having this
>     problem.
>     >     >
>     >     >       
>     >     > Ilya Kogan
>     >     > w:    github.com/ikogan <http://github.com/ikogan>
>     <http://github.com/ikogan>
>     >     <http://github.com/ikogan> e: [email protected]
>     <mailto:[email protected]>
>     >     <mailto:[email protected] <mailto:[email protected]>>
>     >     > <mailto:[email protected] <mailto:[email protected]>
>     <mailto:[email protected] <mailto:[email protected]>>>
>     >     > <http://twitter.com/ilkogan>
>     <https://www.linkedin.com/in/ilyakogan/>
>     >     >
>     >     >
>     >     >
>     >     > On Mon, Jul 6, 2020 at 1:25 PM Rob Crittenden
>     <[email protected] <mailto:[email protected]>
>     >     <mailto:[email protected] <mailto:[email protected]>>
>     >     > <mailto:[email protected] <mailto:[email protected]>
>     <mailto:[email protected] <mailto:[email protected]>>>> wrote:
>     >     >
>     >     >     Florence Blanc-Renaud via FreeIPA-users wrote:
>     >     >      > On 7/5/20 2:23 AM, Ilya Kogan via FreeIPA-users wrote:
>     >     >      >> Hi,
>     >     >      >>
>     >     >      >> I seem to be facing a similar issue with one of my KRAs.
>     >     My KRA
>     >     >      >> certificates were, for some reason, not automatically
>     >     renewed when
>     >     >      >> they expired last month. Using `ipa-cert-fix`
>     correctly fixed
>     >     >     them on
>     >     >      >> _one_ host. On the other, they seem to be stuck in the
>     >     renewal state
>     >     >      >> and `ipa-cert-fix` claims there's nothing to do:
>     >     >      >>
>     >     >      >> ```
>     >     >      >> Request ID '20191031183458':
>     >     >      >>          status: MONITORING
>     >     >      >>          ca-error: Server at
>     >     >      >>
>     "http://ipa-one.mydomain.org:8080/ca/ee/ca/profileSubmit";
>     >     replied:
>     >     >      >> Missing credential: sessionID
>     >     >      >>          stuck: no
>     >     >      >>          key pair storage:
>     >     >      >>
>     >     >   
>     >   
>       
> type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='auditSigningCert
>     >     >      >> cert-pki-kra',token='NSS Certificate DB',pin set
>     >     >      >>          certificate:
>     >     >      >>
>     >     >   
>     >   
>       
> type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='auditSigningCert
>     >     >      >> cert-pki-kra',token='NSS Certificate DB'
>     >     >      >>          CA: dogtag-ipa-ca-renew-agent
>     >     >      >>          issuer: CN=Certificate
>     Authority,O=MYDOMAIN.ORG <http://MYDOMAIN.ORG>
>     >     <http://MYDOMAIN.ORG>
>     >     >     <http://MYDOMAIN.ORG>
>     >     >      >> <http://MYDOMAIN.ORG>
>     >     >      >>          subject: CN=KRA Audit,O=MYDOMAIN.ORG
>     <http://MYDOMAIN.ORG>
>     >     <http://MYDOMAIN.ORG>
>     >     >     <http://MYDOMAIN.ORG> <http://MYDOMAIN.ORG>
>     >     >      >>          expires: 2020-06-27 01:54:34 EDT
>     >     >      >>          key usage: digitalSignature,nonRepudiation
>     >     >      >>          pre-save command:
>     >     /usr/libexec/ipa/certmonger/stop_pkicad
>     >     >      >>          post-save command:
>     >     >     /usr/libexec/ipa/certmonger/renew_ca_cert
>     >     >      >> "auditSigningCert cert-pki-kra"
>     >     >      >>          track: yes
>     >     >      >>          auto-renew: yes
>     >     >      >> Request ID '20191031183459':
>     >     >      >>          status: MONITORING
>     >     >      >>          ca-error: Server at
>     >     >      >>
>     "http://ipa-one.mydomain.org:8080/ca/ee/ca/profileSubmit";
>     >     replied:
>     >     >      >> Missing credential: sessionID
>     >     >      >>          stuck: no
>     >     >      >>          key pair storage:
>     >     >      >>
>     >     >   
>     >   
>       type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='transportCert
>     >     >     cert-pki-kra',token='NSS
>     >     >      >> Certificate DB',pin set
>     >     >      >>          certificate:
>     >     >      >>
>     >     >   
>     >   
>       type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='transportCert
>     >     >     cert-pki-kra',token='NSS
>     >     >      >> Certificate DB'
>     >     >      >>          CA: dogtag-ipa-ca-renew-agent
>     >     >      >>          issuer: CN=Certificate
>     Authority,O=MYDOMAIN.ORG <http://MYDOMAIN.ORG>
>     >     <http://MYDOMAIN.ORG>
>     >     >     <http://MYDOMAIN.ORG>
>     >     >      >> <http://MYDOMAIN.ORG>
>     >     >      >>          subject: CN=KRA Transport
>     >     Certificate,O=MYDOMAIN.ORG <http://MYDOMAIN.ORG>
>     <http://MYDOMAIN.ORG>
>     >     >     <http://MYDOMAIN.ORG>
>     >     >      >> <http://MYDOMAIN.ORG>
>     >     >      >>          expires: 2020-06-27 01:54:30 EDT
>     >     >      >>          key usage:
>     >     >      >>
>     >     digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment
>     >     >      >>          eku: id-kp-clientAuth
>     >     >      >>          pre-save command:
>     >     /usr/libexec/ipa/certmonger/stop_pkicad
>     >     >      >>          post-save command:
>     >     >     /usr/libexec/ipa/certmonger/renew_ca_cert
>     >     >      >> "transportCert cert-pki-kra"
>     >     >      >>          track: yes
>     >     >      >>          auto-renew: yes
>     >     >      >> Request ID '20191031183500':
>     >     >      >>          status: MONITORING
>     >     >      >>          ca-error: Server at
>     >     >      >>
>     "http://ipa-one.mydomain.org:8080/ca/ee/ca/profileSubmit";
>     >     replied:
>     >     >      >> Missing credential: sessionID
>     >     >      >>          stuck: no
>     >     >      >>          key pair storage:
>     >     >      >>
>     >     >   
>     >   
>       type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='storageCert
>     >     >      >> cert-pki-kra',token='NSS Certificate DB',pin set
>     >     >      >>          certificate:
>     >     >      >>
>     >     >   
>     >   
>       type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='storageCert
>     >     >      >> cert-pki-kra',token='NSS Certificate DB'
>     >     >      >>          CA: dogtag-ipa-ca-renew-agent
>     >     >      >>          issuer: CN=Certificate
>     Authority,O=MYDOMAIN.ORG <http://MYDOMAIN.ORG>
>     >     <http://MYDOMAIN.ORG>
>     >     >     <http://MYDOMAIN.ORG>
>     >     >      >> <http://MYDOMAIN.ORG>
>     >     >      >>          subject: CN=KRA Storage
>     >     Certificate,O=MYDOMAIN.ORG <http://MYDOMAIN.ORG>
>     <http://MYDOMAIN.ORG>
>     >     >     <http://MYDOMAIN.ORG>
>     >     >      >> <http://MYDOMAIN.ORG>
>     >     >      >>          expires: 2020-06-27 01:54:32 EDT
>     >     >      >>          key usage:
>     >     >      >>
>     >     digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment
>     >     >      >>          eku: id-kp-clientAuth
>     >     >      >>          pre-save command:
>     >     /usr/libexec/ipa/certmonger/stop_pkicad
>     >     >      >>          post-save command:
>     >     >     /usr/libexec/ipa/certmonger/renew_ca_cert
>     >     >      >> "storageCert cert-pki-kra"
>     >     >      >>          track: yes
>     >     >      >>          auto-renew: yes
>     >     >      >> ```
>     >     >      >>
>     >     >      >> Here are the sequence of events that seem to have
>     led to this:
>     >     >      >>
>     >     >      >> 1. Install FreeIPA Master many years ago and continue to
>     >     upgrade it
>     >     >      >> from time to time.
>     >     >      >> 2. Install FreeIPA Replica a few years after and
>     continue
>     >     to upgrade
>     >     >      >> it from time to time.
>     >     >      >> 3. Allow the certificates to expire on both nodes.
>     >     >      >> 4. Attempt to patch the replica via `yum upgrade` on the
>     >     second
>     >     >     node.
>     >     >      >> 5. Notice after reboot that `pki-tomcatd` is having
>     >     trouble and
>     >     >      >> discover certificate issues.
>     >     >      >> 5. Issue `ipa-cert-fix`, reboot again, and notice that
>     >     things are
>     >     >      >> working. Try and create a key in the vault.
>     >     >      >> 6. Attempt to patch the master via `yum upgrade` on the
>     >     first node.
>     >     >      >> 7. Notice after reboot that everything seems to be
>     ok. Try and
>     >     >     create
>     >     >      >> a key in the vault.
>     >     >      >> 8. Notice a few days later that renewal seems to be
>     broken
>     >     on the
>     >     >      >> first node.
>     >     >      >>
>     >     >      >> At this point `ipa-cert-fix` just shows that
>     everything is
>     >     fine.
>     >     >     If I
>     >     >      >> run it with -v, and then check the "storageCert
>     cert-pki-kra"
>     >     >      >> certificate with `openssl x509 -text -in`, I'm shown:
>     >     >      >
>     >     >      > Hi,
>     >     >      > just double-checking, but did you run ipa-cert-fix on the
>     >     replica
>     >     >     that
>     >     >      > was repaired in step 5? If that's the case, it's
>     normal that
>     >     >      > ipa-cert-fix does not see any issue as it's running only
>     >     locally and
>     >     >      > does not attempt to repair remote nodes.
>     >     >      >
>     >     >      > You will need to login to the node with expired certs
>     and run
>     >     >      > ipa-cert-fix there.
>     >     >
>     >     >     I'd also look to see which one is the renewal master.
>     That is
>     >     the one
>     >     >     that should renew the cert. I'm too curious why the renewal
>     >     raised an
>     >     >     error (as if it actually tried to renew) rather than
>     either go
>     >     into
>     >     >     CA_WORKING or pick up the updated cert.
>     >     >
>     >     >     I'd also make sure that replication is working. On each
>     master:
>     >     >
>     >     >     # ipa-csreplica-manage list -v `hostname`
>     >     >
>     >     >     rob
>     >     >
>     >     >      >
>     >     >      > HTH,
>     >     >      > flo
>     >     >      >
>     >     >      >>
>     >     >      >>          Validity
>     >     >      >>              Not Before: Jun 29 00:52:33 2020 GMT
>     >     >      >>              Not After : Jun 19 00:52:33 2022 GMT
>     >     >      >>
>     >     >      >> On the second known, `getcert list` shows correct
>     >     expirations for
>     >     >      >> those certificates:
>     >     >      >>
>     >     >      >> Request ID '20191206005909':
>     >     >      >>          status: MONITORING
>     >     >      >>          stuck: no
>     >     >      >>          key pair storage:
>     >     >      >>
>     >     >   
>     >   
>       type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='storageCert
>     >     >      >> cert-pki-kra',token='NSS Certificate DB',pin set
>     >     >      >>          certificate:
>     >     >      >>
>     >     >   
>     >   
>       type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='storageCert
>     >     >      >> cert-pki-kra',token='NSS Certificate DB'
>     >     >      >>          CA: dogtag-ipa-ca-renew-agent
>     >     >      >>          issuer: CN=Certificate
>     Authority,O=MYDOMAIN.ORG <http://MYDOMAIN.ORG>
>     >     <http://MYDOMAIN.ORG>
>     >     >     <http://MYDOMAIN.ORG>
>     >     >      >> <http://MYDOMAIN.ORG>
>     >     >      >>          subject: CN=KRA Storage
>     >     Certificate,O=MYDOMAIN.ORG <http://MYDOMAIN.ORG>
>     <http://MYDOMAIN.ORG>
>     >     >     <http://MYDOMAIN.ORG>
>     >     >      >> <http://MYDOMAIN.ORG>
>     >     >      >>          expires: 2022-06-18 20:52:33 EDT
>     >     >      >>          key usage:
>     >     >      >>
>     >     digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment
>     >     >      >>          eku: id-kp-clientAuth
>     >     >      >>          pre-save command:
>     >     /usr/libexec/ipa/certmonger/stop_pkicad
>     >     >      >>          post-save command:
>     >     >     /usr/libexec/ipa/certmonger/renew_ca_cert
>     >     >      >> "storageCert cert-pki-kra"
>     >     >      >>          track: yes
>     >     >      >>          auto-renew: yes
>     >     >      >>
>     >     >      >> It seems like _something_, perhaps `ipa-cert-fix`
>     somehow
>     >     renewed
>     >     >      >> these certificates but...outside of certmonger? Is this
>     >     some other
>     >     >      >> version of
>     >     https://bugzilla.redhat.com/show_bug.cgi?id=1788907? The
>     >     >      >> certificates are not in CA_WORKING though, they're in
>     >     MONITORING.
>     >     >      >>
>     >     >      >> What can I do to get myself out of this state as it
>     seems like
>     >     >     I'm in
>     >     >      >> a "this could explode at any moment" situation?
>     >     >      >>
>     >     >      >> This is on Fedora 30 with IP version:
>     >     >      >>
>     >     >      >> Last metadata expiration check: 0:23:05 ago on Sat
>     04 Jul 2020
>     >     >      >> 07:59:16 PM EDT.
>     >     >      >> Installed Packages
>     >     >      >> Name         : certmonger
>     >     >      >> Version      : 0.79.9
>     >     >      >> Release      : 1.fc30
>     >     >      >> Architecture : x86_64
>     >     >      >> Size         : 3.4 M
>     >     >      >> Source       : certmonger-0.79.9-1.fc30.src.rpm
>     >     >      >> Repository   : @System
>     >     >      >>  From repo    : updates
>     >     >      >>
>     >     >      >> .. snip ..
>     >     >      >>
>     >     >      >> Name         : freeipa-server
>     >     >      >> Version      : 4.8.3
>     >     >      >> Release      : 1.fc30
>     >     >      >> Architecture : x86_64
>     >     >      >> Size         : 1.3 M
>     >     >      >> Source       : freeipa-4.8.3-1.fc30.src.rpm
>     >     >      >> Repository   : @System
>     >     >      >>  From repo    : updates
>     >     >      >>
>     >     >      >> .. snip ..
>     >     >      >>
>     >     >      >> Thanks!
>     >     >      >>
>     >     >      >>
>     >     >      >> Ilya Kogan
>     >     >      >> w: github.com/ikogan <http://github.com/ikogan>
>     <http://github.com/ikogan>
>     >     <http://github.com/ikogan>
>     >     >     <http://github.com/ikogan> e:
>     >     >      >> [email protected] <mailto:[email protected]>
>     <mailto:[email protected] <mailto:[email protected]>>
>     >     <mailto:[email protected] <mailto:[email protected]>
>     <mailto:[email protected] <mailto:[email protected]>>>
>     >     >     <mailto:[email protected]
>     <mailto:[email protected]> <mailto:[email protected]
>     <mailto:[email protected]>>
>     >     <mailto:[email protected] <mailto:[email protected]>
>     <mailto:[email protected] <mailto:[email protected]>>>>
>     >     >      >> <http://twitter.com/ilkogan>
>     >     >     <https://www.linkedin.com/in/ilyakogan/>
>     >     >      >>
>     >     >      >>
>     >     >      >> _______________________________________________
>     >     >      >> FreeIPA-users mailing list --
>     >     >     [email protected]
>     <mailto:[email protected]>
>     >     <mailto:[email protected]
>     <mailto:[email protected]>>
>     >     >     <mailto:[email protected]
>     <mailto:[email protected]>
>     >     <mailto:[email protected]
>     <mailto:[email protected]>>>
>     >     >      >> To unsubscribe send an email to
>     >     >      >> [email protected]
>     <mailto:[email protected]>
>     >     <mailto:[email protected]
>     <mailto:[email protected]>>
>     >     >     <mailto:[email protected]
>     <mailto:[email protected]>
>     >     <mailto:[email protected]
>     <mailto:[email protected]>>>
>     >     >      >> Fedora Code of Conduct:
>     >     >      >>
>     https://docs.fedoraproject.org/en-US/project/code-of-conduct/
>     >     >      >> List Guidelines:
>     >     >     https://fedoraproject.org/wiki/Mailing_list_guidelines
>     >     >      >> List Archives:
>     >     >      >>
>     >     >   
>     >   
>       
> https://lists.fedorahosted.org/archives/list/[email protected]
>     >     >      >>
>     >     >      >>
>     >     >      > _______________________________________________
>     >     >      > FreeIPA-users mailing list --
>     >     >     [email protected]
>     <mailto:[email protected]>
>     >     <mailto:[email protected]
>     <mailto:[email protected]>>
>     >     >     <mailto:[email protected]
>     <mailto:[email protected]>
>     >     <mailto:[email protected]
>     <mailto:[email protected]>>>
>     >     >      > To unsubscribe send an email to
>     >     >     [email protected]
>     <mailto:[email protected]>
>     >     <mailto:[email protected]
>     <mailto:[email protected]>>
>     >     >     <mailto:[email protected]
>     <mailto:[email protected]>
>     >     <mailto:[email protected]
>     <mailto:[email protected]>>>
>     >     >      > Fedora Code of Conduct:
>     >     >      >
>     https://docs.fedoraproject.org/en-US/project/code-of-conduct/
>     >     >      > List Guidelines:
>     >     >     https://fedoraproject.org/wiki/Mailing_list_guidelines
>     >     >      > List Archives:
>     >     >      >
>     >     >   
>     >   
>       
> https://lists.fedorahosted.org/archives/list/[email protected]
>     >     >      >
>     >     >
>     >     >
>     >     > _______________________________________________
>     >     > FreeIPA-users mailing list --
>     [email protected]
>     <mailto:[email protected]>
>     >     <mailto:[email protected]
>     <mailto:[email protected]>>
>     >     > To unsubscribe send an email to
>     >     [email protected]
>     <mailto:[email protected]>
>     >     <mailto:[email protected]
>     <mailto:[email protected]>>
>     >     > Fedora Code of Conduct:
>     >     https://docs.fedoraproject.org/en-US/project/code-of-conduct/
>     >     > List Guidelines:
>     >     https://fedoraproject.org/wiki/Mailing_list_guidelines
>     >     > List Archives:
>     >   
>      
> https://lists.fedorahosted.org/archives/list/[email protected]
>     >     >
>     >
> 
> 
> _______________________________________________
> FreeIPA-users mailing list -- [email protected]
> To unsubscribe send an email to [email protected]
> Fedora Code of Conduct: 
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives: 
> https://lists.fedorahosted.org/archives/list/[email protected]
> 
_______________________________________________
FreeIPA-users mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedorahosted.org/archives/list/[email protected]

Reply via email to