Comments in-line.

Dmitry Krasov via FreeIPA-users wrote:
> it's ubuntu 16.04.7. Freeipa 4.3.1-0ubuntu1
> which packages do you need else?

That's enough.

I'm was under the impression that Ubuntu never worked with renewal
though your certificates seem to have been renewed at least once so
maybe there is a glimmer of hope.

I forget if you tried ipa-cert-fix or not. If not I'd give that a shot.
It will attempt to renew the CA subsystem certificates off-line. I
assume you tried going back in time to November 18, 2024 and that seems
to have renewed two certificates but no the CA subsystem certificates.

If you want to try that again you can. You need to stop any time
service, go back in time, restart all of IPA, then certmonger, then give
certmonger a chance to try to renew the certificates. If it fails then
I'd need to see the journal and PKI debug log.

If it ends up being unrecoverable there is no "get a new CA" option. The
only option is a re-install which will be very intrusive. For that you
have three main options.

1. Use ipa migrate-ds to migrate only users and groups to a new IPA
server. This is documented in the official docs but it isn't ideal
because you lose all HBAC, sudo rules, private groups become POSIX
groups and more.

2. Export to LDIF, manually massage the data and re-import into a newly
installed IPA server. This requires pretty deep understanding of the
data but mostly you need to remove any private key material and need to
be careful not to overwrite certain entries. It can be prone to error
and it's unlikely something we would work out over an e-mail.

3. Install a replacement server in Fedora 41 and use the ipa-migrate
command to pull all the data over that way. It is also overwhelming
because you'll need to re-enroll all clients, migrate all user passwords
and depending on how custom your environment is potentially re-create
some manual keytabs and certificates.

#3 is the recommendation if you can't get your server working.

If you do somehow get it working then the recommendation would be to get
off Ubuntu as quickly as possible. It was not well supported in 2016
much less today.

> -----------------------------------
> ------------------------------------
> getcert list:
> ------------
> Request ID '20221130052539':
>         status: MONITORING
>         ca-error: Server at 
> "https://ipa.dom.loc:8443/ca/agent/ca/profileProcess"; replied: 1: You did not 
> provide a valid certificate for this operation
>         stuck: no
>         key pair storage: 
> type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='auditSigningCert 
> cert-pki-ca',token='NSS Certificate DB',pin set
>         certificate: 
> type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='auditSigningCert 
> cert-pki-ca',token='NSS Certificate DB'
>         CA: dogtag-ipa-ca-renew-agent
>         issuer: CN=Certificate Authority,O=DOM.LOC
>         subject: CN=CA Audit,O=DOM.LOC
>         expires: 2024-11-19 05:25:15 UTC
>         key usage: digitalSignature,nonRepudiation
>         pre-save command: /usr/lib/ipa/certmonger/stop_pkicad
>         post-save command: /usr/lib/ipa/certmonger/renew_ca_cert 
> "auditSigningCert cert-pki-ca"
>         track: yes
>         auto-renew: yes
> Request ID '20221130052540':
>         status: MONITORING
>         stuck: no
>         key pair storage: 
> type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='ocspSigningCert 
> cert-pki-ca',token='NSS Certificate DB',pin set
>         certificate: 
> type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='ocspSigningCert 
> cert-pki-ca',token='NSS Certificate DB'
>         CA: dogtag-ipa-ca-renew-agent
>         issuer: CN=Certificate Authority,O=DOM.LOC
>         subject: CN=OCSP Subsystem,O=DOM.LOC
>         expires: 2024-11-19 05:25:14 UTC
>         key usage: digitalSignature,nonRepudiation,keyCertSign,cRLSign
>         eku: id-kp-OCSPSigning
>         pre-save command: /usr/lib/ipa/certmonger/stop_pkicad
>         post-save command: /usr/lib/ipa/certmonger/renew_ca_cert 
> "ocspSigningCert cert-pki-ca"
>         track: yes
>         auto-renew: yes
> Request ID '20221130052541':
>         status: MONITORING
>         ca-error: Server at 
> "https://ipa.dom.loc:8443/ca/agent/ca/profileProcess"; replied: 1: You did not 
> provide a valid certificate for this operation
>         stuck: no
>         key pair storage: 
> type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='subsystemCert 
> cert-pki-ca',token='NSS Certificate DB',pin set
>         certificate: 
> type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='subsystemCert 
> cert-pki-ca',token='NSS Certificate DB'
>         CA: dogtag-ipa-ca-renew-agent
>         issuer: CN=Certificate Authority,O=DOM.LOC
>         subject: CN=CA Subsystem,O=DOM.LOC
>         expires: 2024-11-19 05:25:14 UTC
>         key usage: 
> digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment
>         eku: id-kp-serverAuth,id-kp-clientAuth
>         pre-save command: /usr/lib/ipa/certmonger/stop_pkicad
>         post-save command: /usr/lib/ipa/certmonger/renew_ca_cert 
> "subsystemCert cert-pki-ca"
>         track: yes
>         auto-renew: yes
> Request ID '20221130052542':
>         status: MONITORING
>         ca-error: Server at 
> "https://ipa.dom.loc:8443/ca/agent/ca/profileProcess"; replied: 1: You did not 
> provide a valid certificate for this operation
>         stuck: no
>         key pair storage: 
> type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='caSigningCert 
> cert-pki-ca',token='NSS Certificate DB',pin set
>         certificate: 
> type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='caSigningCert 
> cert-pki-ca',token='NSS Certificate DB'
>         CA: dogtag-ipa-ca-renew-agent
>         issuer: CN=Certificate Authority,O=DOM.LOC
>         subject: CN=Certificate Authority,O=DOM.LOC
>         expires: 2042-11-30 05:25:14 UTC
>         key usage: digitalSignature,nonRepudiation,keyCertSign,cRLSign
>         pre-save command: /usr/lib/ipa/certmonger/stop_pkicad
>         post-save command: /usr/lib/ipa/certmonger/renew_ca_cert 
> "caSigningCert cert-pki-ca"
>         track: yes
>         auto-renew: yes
> Request ID '20221130052543':
>         status: MONITORING
>         ca-error: Server at 
> "https://ipa.dom.loc:8443/ca/agent/ca/profileProcess"; replied: 1: You did not 
> provide a valid certificate for this operation
>         stuck: no
>         key pair storage: 
> type=NSSDB,location='/etc/apache2/nssdb',nickname='ipaCert',token='NSS 
> Certificate DB',pinfile='/etc/apache2/nssdb/pwdfile.txt'
>         certificate: 
> type=NSSDB,location='/etc/apache2/nssdb',nickname='ipaCert',token='NSS 
> Certificate DB'
>         CA: dogtag-ipa-ca-renew-agent
>         issuer: CN=Certificate Authority,O=DOM.LOC
>         subject: CN=IPA RA,O=DOM.LOC
>         expires: 2024-11-19 05:25:36 UTC
>         key usage: 
> digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment
>         eku: id-kp-serverAuth,id-kp-clientAuth
>         pre-save command: /usr/lib/ipa/certmonger/renew_ra_cert_pre
>         post-save command: /usr/lib/ipa/certmonger/renew_ra_cert
>         track: yes
>         auto-renew: yes
> Request ID '20221130052544':
>         status: MONITORING
>         ca-error: Server at 
> "https://ipa.dom.loc:8443/ca/agent/ca/profileProcess"; replied: 1: You did not 
> provide a valid certificate for this operation
>         stuck: no
>         key pair storage: 
> type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='Server-Cert 
> cert-pki-ca',token='NSS Certificate DB',pin set
>         certificate: 
> type=NSSDB,location='/etc/pki/pki-tomcat/alias',nickname='Server-Cert 
> cert-pki-ca',token='NSS Certificate DB'
>         CA: dogtag-ipa-ca-renew-agent
>         issuer: CN=Certificate Authority,O=DOM.LOC
>         subject: CN=ipa.dom.loc,O=DOM.LOC
>         expires: 2024-11-19 05:25:14 UTC
>         key usage: 
> digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment
>         eku: id-kp-serverAuth
>         pre-save command: /usr/lib/ipa/certmonger/stop_pkicad
>         post-save command: /usr/lib/ipa/certmonger/renew_ca_cert "Server-Cert 
> cert-pki-ca"
>         track: yes
>         auto-renew: yes
> Request ID '20221130052605':
>         status: MONITORING
>         stuck: no
>         key pair storage: 
> type=NSSDB,location='/etc/dirsrv/slapd-DOM-LOC',nickname='Server-Cert',token='NSS
>  Certificate DB',pinfile='/etc/dirsrv/slapd-DOM-LOC/pwdfile.txt'
>         certificate: 
> type=NSSDB,location='/etc/dirsrv/slapd-DOM-LOC',nickname='Server-Cert',token='NSS
>  Certificate DB'
>         CA: IPA
>         issuer: CN=Certificate Authority,O=DOM.LOC
>         subject: CN=ipa.dom.loc,O=DOM.LOC
>         expires: 2026-11-18 20:02:32 UTC
>         principal name: ldap/[email protected]
>         key usage: 
> digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment
>         eku: id-kp-serverAuth,id-kp-clientAuth
>         pre-save command:
>         post-save command: /usr/lib/ipa/certmonger/restart_dirsrv DOM-LOC
>         track: yes
>         auto-renew: yes
> Request ID '20221130052625':
>         status: MONITORING
>         stuck: no
>         key pair storage: 
> type=NSSDB,location='/etc/apache2/nssdb',nickname='Server-Cert',token='NSS 
> Certificate DB',pinfile='/etc/apache2/nssdb/pwdfile.txt'
>         certificate: 
> type=NSSDB,location='/etc/apache2/nssdb',nickname='Server-Cert',token='NSS 
> Certificate DB'
>         CA: IPA
>         issuer: CN=Certificate Authority,O=DOM.LOC
>         subject: CN=ipa.dom.loc,O=DOM.LOC
>         expires: 2026-11-18 20:02:42 UTC
>         principal name: HTTP/[email protected]
>         key usage: 
> digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment
>         eku: id-kp-serverAuth,id-kp-clientAuth
>         pre-save command:
>         post-save command: /usr/lib/ipa/certmonger/restart_httpd
>         track: yes
>         auto-renew: yes
> -------------------------------
> 
> ipa-cacert-manage renew -v:
> -------------------------------
> 
> ipa: DEBUG: Loading Index file from '/var/lib/ipa/sysrestore/sysrestore.index'
> ipa.ipaserver.install.ipa_cacert_manage.CACertManage: DEBUG: Not logging to a 
> file
> ipa: DEBUG: importing all plugin modules in ipalib.plugins...
> ipa: DEBUG: importing plugin module ipalib.plugins.aci
> ipa: DEBUG: importing plugin module ipalib.plugins.automember
> ipa: DEBUG: importing plugin module ipalib.plugins.automount
> ipa: DEBUG: importing plugin module ipalib.plugins.baseldap
> ipa: DEBUG: importing plugin module ipalib.plugins.baseuser
> ipa: DEBUG: importing plugin module ipalib.plugins.batch
> ipa: DEBUG: importing plugin module ipalib.plugins.caacl
> ipa: DEBUG: importing plugin module ipalib.plugins.cert
> ipa: DEBUG: importing plugin module ipalib.plugins.certprofile
> ipa: DEBUG: importing plugin module ipalib.plugins.config
> ipa: DEBUG: importing plugin module ipalib.plugins.delegation
> ipa: DEBUG: importing plugin module ipalib.plugins.dns
> ipa: DEBUG: importing plugin module ipalib.plugins.domainlevel
> ipa: DEBUG: importing plugin module ipalib.plugins.group
> ipa: DEBUG: importing plugin module ipalib.plugins.hbacrule
> ipa: DEBUG: importing plugin module ipalib.plugins.hbacsvc
> ipa: DEBUG: importing plugin module ipalib.plugins.hbacsvcgroup
> ipa: DEBUG: importing plugin module ipalib.plugins.hbactest
> ipa: DEBUG: importing plugin module ipalib.plugins.host
> ipa: DEBUG: importing plugin module ipalib.plugins.hostgroup
> ipa: DEBUG: importing plugin module ipalib.plugins.idrange
> ipa: DEBUG: importing plugin module ipalib.plugins.idviews
> ipa: DEBUG: importing plugin module ipalib.plugins.internal
> ipa: DEBUG: importing plugin module ipalib.plugins.krbtpolicy
> ipa: DEBUG: importing plugin module ipalib.plugins.migration
> ipa: DEBUG: importing plugin module ipalib.plugins.misc
> ipa: DEBUG: importing plugin module ipalib.plugins.netgroup
> ipa: DEBUG: importing plugin module ipalib.plugins.otpconfig
> ipa: DEBUG: importing plugin module ipalib.plugins.otptoken
> ipa: DEBUG: importing plugin module ipalib.plugins.otptoken_yubikey
> ipa: DEBUG: importing plugin module ipalib.plugins.passwd
> ipa: DEBUG: importing plugin module ipalib.plugins.permission
> ipa: DEBUG: importing plugin module ipalib.plugins.ping
> ipa: DEBUG: importing plugin module ipalib.plugins.pkinit
> ipa: DEBUG: importing plugin module ipalib.plugins.privilege
> ipa: DEBUG: importing plugin module ipalib.plugins.pwpolicy
> ipa: DEBUG: Starting external process
> ipa: DEBUG: args=klist -V
> ipa: DEBUG: Process finished, return code=0
> ipa: DEBUG: stdout=Kerberos 5 version 1.13.2
> 
> ipa: DEBUG: stderr=
> ipa: DEBUG: importing plugin module ipalib.plugins.radiusproxy
> ipa: DEBUG: importing plugin module ipalib.plugins.realmdomains
> ipa: DEBUG: importing plugin module ipalib.plugins.role
> ipa: DEBUG: importing plugin module ipalib.plugins.rpcclient
> ipa: DEBUG: importing plugin module ipalib.plugins.selfservice
> ipa: DEBUG: importing plugin module ipalib.plugins.selinuxusermap
> ipa: DEBUG: importing plugin module ipalib.plugins.server
> ipa: DEBUG: importing plugin module ipalib.plugins.service
> ipa: DEBUG: importing plugin module ipalib.plugins.servicedelegation
> ipa: DEBUG: importing plugin module ipalib.plugins.session
> ipa: DEBUG: importing plugin module ipalib.plugins.stageuser
> ipa: DEBUG: importing plugin module ipalib.plugins.sudocmd
> ipa: DEBUG: importing plugin module ipalib.plugins.sudocmdgroup
> ipa: DEBUG: importing plugin module ipalib.plugins.sudorule
> ipa: DEBUG: importing plugin module ipalib.plugins.topology
> ipa: DEBUG: importing plugin module ipalib.plugins.trust
> ipa: DEBUG: importing plugin module ipalib.plugins.user
> ipa: DEBUG: importing plugin module ipalib.plugins.vault
> ipa: DEBUG: importing plugin module ipalib.plugins.virtual
> ipa: DEBUG: importing all plugin modules in ipaserver.plugins...
> ipa: DEBUG: importing plugin module ipaserver.plugins.dogtag
> ipa: DEBUG: importing plugin module ipaserver.plugins.join
> ipa: DEBUG: importing plugin module ipaserver.plugins.ldap2
> ipa: DEBUG: importing plugin module ipaserver.plugins.rabase
> ipa: DEBUG: importing plugin module ipaserver.plugins.xmlserver
> ipa.ipalib.session.SessionAuthManager: DEBUG: SessionAuthManager.register: 
> name=jsonserver_session_140159754316752
> ipa.ipalib.session.SessionAuthManager: DEBUG: SessionAuthManager.register: 
> name=xmlserver_session_140159754359568
> ipa.ipaserver.rpcserver.wsgi_dispatch: DEBUG: Mounting 
> ipaserver.rpcserver.xmlserver() at '/xml'
> ipa.ipaserver.rpcserver.xmlserver: DEBUG: session_auth_duration: 0:20:00
> ipa.ipaserver.rpcserver.wsgi_dispatch: DEBUG: Mounting 
> ipaserver.rpcserver.xmlserver_session() at '/session/xml'
> ipa.ipaserver.rpcserver.xmlserver_session: DEBUG: session_auth_duration: 
> 0:20:00
> ipa.ipaserver.rpcserver.xmlserver_session: DEBUG: session_auth_duration: 
> 0:20:00
> ipa.ipaserver.rpcserver.wsgi_dispatch: DEBUG: Mounting 
> ipaserver.rpcserver.login_password() at '/session/login_password'
> ipa.ipaserver.rpcserver.login_password: DEBUG: session_auth_duration: 0:20:00
> ipa.ipaserver.rpcserver.wsgi_dispatch: DEBUG: Mounting 
> ipaserver.rpcserver.change_password() at '/session/change_password'
> ipa.ipaserver.rpcserver.wsgi_dispatch: DEBUG: Mounting 
> ipaserver.rpcserver.jsonserver_session() at '/session/json'
> ipa.ipaserver.rpcserver.jsonserver_session: DEBUG: session_auth_duration: 
> 0:20:00
> ipa.ipaserver.rpcserver.wsgi_dispatch: DEBUG: Mounting 
> ipaserver.rpcserver.sync_token() at '/session/sync_token'
> ipa.ipaserver.rpcserver.wsgi_dispatch: DEBUG: Mounting 
> ipaserver.rpcserver.jsonserver_kerb() at '/json'
> ipa.ipaserver.rpcserver.jsonserver_kerb: DEBUG: session_auth_duration: 0:20:00
> ipa.ipaserver.rpcserver.wsgi_dispatch: DEBUG: Mounting 
> ipaserver.rpcserver.login_kerberos() at '/session/login_kerberos'
> ipa.ipaserver.rpcserver.login_kerberos: DEBUG: session_auth_duration: 0:20:00
> ipa: DEBUG: Loading StateFile from '/var/lib/ipa/sysrestore/sysrestore.state'
> ipa.ipaserver.install.ipa_cacert_manage.CACertManage: DEBUG: Found certmonger 
> request id dbus.String(u'20221130052542', variant_level=1)
> ipa: DEBUG: Loading Index file from '/var/lib/ipa/sysrestore/sysrestore.index'
> ipa: DEBUG: Starting external process
> ipa: DEBUG: args=/usr/bin/certutil -d /etc/pki/pki-tomcat/alias -L -n 
> caSigningCert cert-pki-ca -a
> ipa: DEBUG: Process finished, return code=0
> ipa: DEBUG: stdout=-----BEGIN CERTIFICATE-----
> MIIDfzCCAmegAwIBAgIBATANBgkqhkiG9w0BAQsFADAyMRAwDgYDVQQKDAdET00u
> TE9DMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHhcNMjIxMTMwMDUy
> NTE0WhcNNDIxMTMwMDUyNTE0WjAyMRAwDgYDVQQKDAdET00uTE9DMR4wHAYDVQQD
> DBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAw
> ggEKAoIBAQDScx6Ah9lD3MZ9Y/FnmC2BuM1l5mbaDo6n8ke07So+J2ryG13kKWf6
> eGyaMiFf3o6bi9zTB2gDlIWDAgjsjYeVo7dz3dO+DM4o57C8OYGecySsJ3VSsYTs
> utNNKxqMprOxqNB2ascwLiR6Oy2NWzOFtg0ZP4GBW1uqv26cYl0s28CcL1xU+Rnh
> FsXTtn5yGdkUKPj9vBFxiQI11ILV+mp58NmIddqjjzsXzHrAJ7+v7EcVS1tlZvLA
> bfgWVgaHE1GNdmL7DzkBtrIX6nwzVhbVFhKpYAAGJUPHFS9yMxgwGFejkVmyFOzG
> o/cwikq699YHujpgPLej98BM6e9VIpxvAgMBAAGjgZ8wgZwwHwYDVR0jBBgwFoAU
> CBaGdFi3XREanbDOr1fXZH4KKakwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8E
> BAMCAcYwHQYDVR0OBBYEFAgWhnRYt10RGp2wzq9X12R+CimpMDkGCCsGAQUFBwEB
> BC0wKzApBggrBgEFBQcwAYYdaHR0cDovL2lwYS5kb20ubG9jOjgwL2NhL29jc3Aw
> DQYJKoZIhvcNAQELBQADggEBAEDtgTehcANC+hTvgxXsV6tboYBAza6+Gvs+jQd4
> 2LfBwZNJClqTL0F2u2vUBH6m4gaUMWmPoP6bwqFJ7Yw+ZT04DlGpt0JyaVfP8zAU
> FV3k9fygY9Qk6+WGyIi172uB+7GR7CIDT90cGftq3RqF5kapnbRXmT46RHNIC2gB
> /Ld/fG4SPWwmSB91YPbiaRJcWdCC2QZsn7i2pikqyOfn7m9Oim8HZhd4/t1TMezD
> +AJcfwCkWyqaLZPGwvdt8gf6vk7DR+FYIvmLxGbhrmS3yfuBmcJ8LgCKK5QtMXUo
> FNc869oM4O6QoH87gzef9Lu9LrbWH23V7LH33G0aY1v5Jxs=
> -----END CERTIFICATE-----
> 
> ipa: DEBUG: stderr=
> Renewing CA certificate, please wait
> ipa.ipapython.ipaldap.SchemaCache: DEBUG: flushing 
> ldapi://%2fvar%2frun%2fslapd-DOM-LOC.socket from SchemaCache
> ipa.ipapython.ipaldap.SchemaCache: DEBUG: retrieving schema for SchemaCache 
> url=ldapi://%2fvar%2frun%2fslapd-DOM-LOC.socket 
> conn=<ldap.ldapobject.SimpleLDAPObject instance at 0x7f797c741248>
> ipa.ipaserver.install.ipa_cacert_manage.CACertManage: DEBUG: resubmitting 
> certmonger request '20221130052542'
> ipa: DEBUG: certmonger request is in state dbus.String(u'GENERATING_CSR', 
> variant_level=1)
> ipa: DEBUG: certmonger request is in state dbus.String(u'MONITORING', 
> variant_level=1)
> ipa.ipaserver.install.ipa_cacert_manage.CACertManage: DEBUG:   File 
> "/usr/lib/python2.7/dist-packages/ipapython/admintool.py", line 171, in 
> execute
>     return_value = self.run()
>   File 
> "/usr/lib/python2.7/dist-packages/ipaserver/install/ipa_cacert_manage.py", 
> line 114, in run
>     rc = self.renew()
>   File 
> "/usr/lib/python2.7/dist-packages/ipaserver/install/ipa_cacert_manage.py", 
> line 172, in renew
>     return self.renew_self_signed(ca)
>   File 
> "/usr/lib/python2.7/dist-packages/ipaserver/install/ipa_cacert_manage.py", 
> line 184, in renew_self_signed
>     self.resubmit_request(ca, 'caCACert')
>   File 
> "/usr/lib/python2.7/dist-packages/ipaserver/install/ipa_cacert_manage.py", 
> line 314, in resubmit_request
>     "please check the request manually" % self.request_id)
> 
> ipa.ipaserver.install.ipa_cacert_manage.CACertManage: DEBUG: The 
> ipa-cacert-manage command failed, exception: ScriptError: Error resubmitting 
> certmonger request '20221130052542', please check the request manually
> ipa.ipaserver.install.ipa_cacert_manage.CACertManage: ERROR: Error 
> resubmitting certmonger request '20221130052542', please check the request 
> manually
> ipa.ipaserver.install.ipa_cacert_manage.CACertManage: ERROR: The 
> ipa-cacert-manage command failed.
> 

This was the wrong command to run. It does not renew the subsystem
certs. It attempts to renew the CA. It is lucky that it failed.

rob

-- 
_______________________________________________
FreeIPA-users mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedorahosted.org/archives/list/[email protected]
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue

Reply via email to