Hello,

I still not sure of what is happening but, I got some interesting error message 
on ipa-healthcheck:

[root@neumann2 keytabs]# ipa-healthcheck --failures-only --output-type human
CRITICAL: ipahealthcheck.ipa.dna.IPADNARangeCheck: Insufficient access:  
Invalid credentials
ERROR: ipahealthcheck.system.filesystemspace.FileSystemSpaceCheck: 
/var/lib/ipa/backup/: free space percentage under threshold: 16% < 20%
ERROR: ipahealthcheck.system.filesystemspace.FileSystemSpaceCheck: /tmp: free 
space percentage under threshold: 16% < 20%
ERROR: ipahealthcheck.system.filesystemspace.FileSystemSpaceCheck: 
/var/lib/dirsrv/: free space percentage under threshold: 16% < 20%
ERROR: ipahealthcheck.system.filesystemspace.FileSystemSpaceCheck: /var/log/: 
free space percentage under threshold: 16% < 20%
ERROR: ipahealthcheck.system.filesystemspace.FileSystemSpaceCheck: /var/tmp/: 
free space percentage under threshold: 16% < 20%
ERROR: ipahealthcheck.system.filesystemspace.FileSystemSpaceCheck: 
/var/log/audit/: free space percentage under threshold: 16% < 20%

I tried to search for the critical message but nothing comes up. There’s a lot 
of GSSAPI errors on all logs.

I tried to regenerate all keytabs of the system but it was a no go either:
# gssproxy
ipa-getkeytab -D "cn=directory manager" -w 86dNCxFFCpNMLEf6kr -s 
neumann2.cluster.cetene.gov.br<http://neumann2.cluster.cetene.gov.br> -p 
'HTTP/neumann2.cluster.cetene.gov.br<http://neumann2.cluster.cetene.gov.br>' -r 
-k /var/lib/ipa/gssproxy/http.keytab

# Dogtag
ipa-getkeytab -D "cn=directory manager" -w 86dNCxFFCpNMLEf6kr -s 
neumann2.cluster.cetene.gov.br<http://neumann2.cluster.cetene.gov.br> -p 
'dogtag/neumann2.cluster.cetene.gov.br<http://neumann2.cluster.cetene.gov.br>' 
-r -k /etc/pki/pki-tomcat/dogtag.keytab

# DNSKeySync
ipa-getkeytab -D "cn=directory manager" -w 86dNCxFFCpNMLEf6kr -s 
neumann2.cluster.cetene.gov.br<http://neumann2.cluster.cetene.gov.br> -p 
'ipa-dnskeysyncd/neumann2.cluster.cetene.gov.br<http://neumann2.cluster.cetene.gov.br>'
 -r -k /etc/ipa/dnssec/ipa-dnskeysyncd.keytab

# Host Keytab
ipa-getkeytab -D "cn=directory manager" -w 86dNCxFFCpNMLEf6kr -s 
neumann2.cluster.cetene.gov.br<http://neumann2.cluster.cetene.gov.br> -p 
'host/neumann2.cluster.cetene.gov.br<http://neumann2.cluster.cetene.gov.br>' -r 
-k /etc/krb5.keytab

# named
ipa-getkeytab -D "cn=directory manager" -w 86dNCxFFCpNMLEf6kr -s 
neumann2.cluster.cetene.gov.br<http://neumann2.cluster.cetene.gov.br> -p 
'DNS/neumann2.cluster.cetene.gov.br<http://neumann2.cluster.cetene.gov.br>' -r 
-k /etc/named.keytab

# 389ds
ipa-getkeytab -D "cn=directory manager" -w 86dNCxFFCpNMLEf6kr -s 
neumann2.cluster.cetene.gov.br<http://neumann2.cluster.cetene.gov.br> -p 
'ldap/neumann2.cluster.cetene.gov.br<http://neumann2.cluster.cetene.gov.br>' -r 
-k /etc/dirsrv/ds.keytab

Some error messages:

[10/Feb/2021:23:05:57.501853962 -0300] conn=92 op=1 RESULT err=49 tag=97 
nentries=0 etime=0.001927716 - SASL(-1): generic failure: GSSAPI Error: 
Unspecified GSS failure.  Minor code may provide more information (Cannot 
create replay cache file /var/tmp/ldap_389: Operation not permitted)

==> /var/log/messages <==
Feb 10 23:05:14 neumann2 systemd: ipa-dnskeysyncd.service holdoff time over, 
scheduling restart.
Feb 10 23:05:14 neumann2 systemd: Stopped IPA key daemon.
Feb 10 23:05:14 neumann2 systemd: Started IPA key daemon.
Feb 10 23:05:16 neumann2 ipa-dnskeysyncd: ipa-dnskeysyncd: INFO     LDAP bind...
Feb 10 23:05:16 neumann2 ipa-dnskeysyncd: ipa-dnskeysyncd: ERROR    Login to 
LDAP server failed: {'desc': 'Invalid credentials'}
Feb 10 23:05:16 neumann2 ipa-dnskeysyncd: Traceback (most recent call last):
Feb 10 23:05:16 neumann2 ipa-dnskeysyncd: File 
"/usr/libexec/ipa/ipa-dnskeysyncd", line 96, in <module>
Feb 10 23:05:16 neumann2 ipa-dnskeysyncd: 
ldap_connection.sasl_interactive_bind_s("", ipaldap.SASL_GSSAPI)
Feb 10 23:05:16 neumann2 ipa-dnskeysyncd: File 
"/usr/lib64/python2.7/site-packages/ldap/ldapobject.py", line 850, in 
sasl_interactive_bind_s
Feb 10 23:05:16 neumann2 ipa-dnskeysyncd: res = 
self._apply_method_s(SimpleLDAPObject.sasl_interactive_bind_s,*args,**kwargs)
Feb 10 23:05:16 neumann2 ipa-dnskeysyncd: File 
"/usr/lib64/python2.7/site-packages/ldap/ldapobject.py", line 818, in 
_apply_method_s
Feb 10 23:05:16 neumann2 ipa-dnskeysyncd: return func(self,*args,**kwargs)
Feb 10 23:05:16 neumann2 ipa-dnskeysyncd: File 
"/usr/lib64/python2.7/site-packages/ldap/ldapobject.py", line 229, in 
sasl_interactive_bind_s
Feb 10 23:05:16 neumann2 ipa-dnskeysyncd: return 
self._ldap_call(self._l.sasl_interactive_bind_s,who,auth,RequestControlTuples(serverctrls),RequestControlTuples(clientctrls),sasl_flags)
Feb 10 23:05:16 neumann2 ipa-dnskeysyncd: File 
"/usr/lib64/python2.7/site-packages/ldap/ldapobject.py", line 99, in _ldap_call
Feb 10 23:05:16 neumann2 ipa-dnskeysyncd: result = func(*args,**kwargs)
Feb 10 23:05:16 neumann2 ipa-dnskeysyncd: INVALID_CREDENTIALS: {'desc': 
'Invalid credentials'}
Feb 10 23:05:16 neumann2 systemd: ipa-dnskeysyncd.service: main process exited, 
code=exited, status=1/FAILURE
Feb 10 23:05:16 neumann2 systemd: Unit ipa-dnskeysyncd.service entered failed 
state.
Feb 10 23:05:16 neumann2 systemd: ipa-dnskeysyncd.service failed.

Thanks,

On 10 Feb 2021, at 02:01, Vinícius Ferrão via FreeIPA-users 
<[email protected]<mailto:[email protected]>>
 wrote:

Hello,

FreeIPA on CentOS 7.8 just stopped working and I’m unable to fix it by myself. 
After reading a lot of threads here on the list, it appears that I’ve the same 
issue as this topic: 
https://www.mail-archive.com/[email protected]/msg05501.html

Since Kerberos is apparently not working as expected, I cannot use FreeIPA and 
none of the services are working correctly. Following the debug guide I was 
able to at least start named with single authentication to further debug. 
(Workaround 1 of 
https://docs.pagure.org/bind-dyndb-ldap/BIND9/NamedCannotStart.html)

And now I’m stuck on item 5 of the same manual.

[root@neumann2 ~]# KRB5_TRACE=/dev/stderr ldapsearch -H 
'ldapi://%2fvar%2frun%2fslapd-CLUSTER-CETENE-GOV-BR.socket' -Y GSSAPI -b 
'cn=dns,dc=cluster,dc=cetene,dc=gov,dc=br<ldapi://%2fvar%2frun%2fslapd-CLUSTER-CETENE-GOV-BR.socket'%20-Y%20GSSAPI%20-b%20'cn=dns,dc=cluster,dc=cetene,dc=gov,dc=br>'
SASL/GSSAPI authentication started
[6588] 1612932571.244080: ccselect module realm chose cache 
KEYRING:persistent:0:krb_ccache_UuVdVRC with client principal 
DNS/[email protected]<mailto:DNS/[email protected]>
 for server principal 
ldap/[email protected]<mailto:ldap/[email protected]>
[6588] 1612932571.244081: Getting credentials 
DNS/[email protected]<mailto:DNS/[email protected]>
 -> 
ldap/[email protected]<mailto:ldap/[email protected]>
 using ccache KEYRING:persistent:0:krb_ccache_UuVdVRC
[6588] 1612932571.244082: Retrieving 
DNS/[email protected]<mailto:DNS/[email protected]>
 -> 
ldap/[email protected]<mailto:ldap/[email protected]>
 from KEYRING:persistent:0:krb_ccache_UuVdVRC with result: 0/Success
[6588] 1612932571.244084: Creating authenticator for 
DNS/[email protected]<mailto:DNS/[email protected]>
 -> 
ldap/[email protected]<mailto:ldap/[email protected]>,
 seqnum 1040975659, subkey aes256-cts/48E9, session key aes256-cts/DF1E
ldap_sasl_interactive_bind_s: Invalid credentials (49)

[root@neumann2 ~]# ipa privilege-show 'DNS Servers' --all --raw
ipa: ERROR: Insufficient access:  Invalid credentials

[root@neumann2 ~]# klist
Ticket cache: KEYRING:persistent:0:krb_ccache_UuVdVRC
Default principal: 
DNS/[email protected]<mailto:DNS/[email protected]>

Valid starting       Expires              Service principal
02/10/2021 01:52:43  02/11/2021 01:49:04  
HTTP/[email protected]<mailto:HTTP/[email protected]>
02/10/2021 01:49:16  02/11/2021 01:49:04  
ldap/[email protected]<mailto:ldap/[email protected]>
02/10/2021 01:49:04  02/11/2021 01:49:04  
krbtgt/[email protected]<mailto:krbtgt/[email protected]>

Any ideia on how to fix this?

Thanks,
Vinícius.

PS: Before the workaround named-pkcs11 fails to start with the following error:

Feb 10 01:40:46 neumann2 named-pkcs11[4532]: set up managed keys zone for view 
_default, file '/var/named/dynamic/managed-keys.bind'
Feb 10 01:40:46 neumann2 named-pkcs11[4532]: loading DynDB instance 'ipa' 
driver '/usr/lib64/bind/ldap.so'
Feb 10 01:40:46 neumann2 named-pkcs11[4532]: bind-dyndb-ldap version 11.1 
compiled at 02:16:24 Apr  1 2020, compiler 4.8.5 20150623 (Red Hat 4.8.5-39)
Feb 10 01:40:46 neumann2 named-pkcs11[4532]: LDAP error: Invalid credentials: 
bind to LDAP server failed
Feb 10 01:40:46 neumann2 named-pkcs11[4532]: couldn't establish connection in 
LDAP connection pool: permission denied
Feb 10 01:40:46 neumann2 named-pkcs11[4532]: dynamic database 'ipa' 
configuration failed: permission denied
Feb 10 01:40:46 neumann2 named-pkcs11[4532]: loading configuration: permission 
denied
Feb 10 01:40:46 neumann2 named-pkcs11[4532]: exiting (due to fatal error)
Feb 10 01:40:46 neumann2 systemd: named-pkcs11.service: control process exited, 
code=exited status=1
Feb 10 01:40:46 neumann2 systemd: Failed to start Berkeley Internet Name Domain 
(DNS) with native PKCS#11.

_______________________________________________
FreeIPA-users mailing list -- 
[email protected]<mailto:[email protected]>
To unsubscribe send an email to 
[email protected]<mailto:[email protected]>
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedorahosted.org/archives/list/[email protected]

_______________________________________________
FreeIPA-users mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedorahosted.org/archives/list/[email protected]
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure

Reply via email to