Hi all,
Promising, but https://pagure.io/freeipa/issue/2496 is 12 (!) years old;
8 years ago commented with _"I can perform a kdestroy and kinit for this
user. Also restarted all IPA services and tried again. The KDC appears
to support passwords with expirations beyond 2038 now._"
Well, maybe it is regresion, but the error is (again?) there...
Winfried
Florence Blanc-Renaud schreef op 03-03-2025 13:48:
> Hi,
>
> On Mon, Mar 3, 2025 at 12:20 PM Winfried de Heiden via FreeIPA-users
> <[email protected]> wrote:
>
>> Hi all,
>>
>> It seems we hit a "year 2038" related problem in the IPA-client
>> (krb5_child). We're using IPA for service accounts and to be shure these
>> accounts will not expire, we created a password policy:
>>
>> ipa pwpolicy-show service_accounts
>> Group: service_accounts
>> Max lifetime (days): 9999
>> ...
>>
>> To be on the safe site, the max life time is set to 9999 days. That's well
>> beyond 19 January 2038 03:14:07 UTC...
>>
>> Now, in case a service accounts will login, the krb5_child.log on the IPA
>> client will show errors like:
>>
>> (2025-03-03 11:55:12): [krb5_child[2058626]] [sss_krb5_expire_callback_func]
>> (0x0020): [RID#5037] Time to expire out of range.
>> ********************** PREVIOUS MESSAGE WAS TRIGGERED BY THE FOLLOWING
>> BACKTRACE:
>> * (2025-03-03 11:55:12): [krb5_child[2058626]] [main] (0x0400): [RID#5037]
>> krb5_child started.
>> * (2025-03-03 11:55:12): [krb5_child[2058626]] [unpack_buffer] (0x1000):
>> [RID#5037] total buffer size: [144]
>> * (2025-03-03 11:55:12): [krb5_child[2058626]] [unpack_buffer] (0x0100):
>> [RID#5037] cmd [241 (auth)] uid [100045] gid [100045] validate [true]
>> enterprise principal [false] offline [false] UPN
>> [[email protected]]
>> * (2025-03-03 11:55:12): [krb5_child[2058626]] [unpack_buffer] (0x0100):
>> [RID#5037] ccname: [KCM:] old_ccname: [KCM:] keytab: [/etc/krb5.keytab]
>> * (2025-03-03 11:55:12): [krb5_child[2058626]] [switch_creds] (0x0200):
>> [RID#5037] Switch user to [100045][100045].
>> * (2025-03-03 11:55:12): [krb5_child[2058626]] [switch_creds] (0x0200):
>> [RID#5037] Switch user to [0][0].
>> * (2025-03-03 11:55:12): [krb5_child[2058626]] [k5c_check_old_ccache]
>> (0x4000): [RID#5037] Ccache_file is [KCM:] and is not active and TGT is
>> valid.
>> * (2025-03-03 11:55:12): [krb5_child[2058626]] [k5c_precreate_ccache]
>> (0x4000): [RID#5037] Recreating ccache
>> * (2025-03-03 11:55:12): [krb5_child[2058626]] [k5c_setup_fast] (0x0100):
>> [RID#5037] Fast principal is set to
>> [host/[email protected]]
>> * (2025-03-03 11:55:12): [krb5_child[2058626]] [find_principal_in_keytab]
>> (0x4000): [RID#5037] Trying to find principal
>> host/[email protected] in keytab.
>> * (2025-03-03 11:55:12): [krb5_child[2058626]] [match_principal] (0x1000):
>> [RID#5037] Principal matched to the sample
>> (host/[email protected]).
>> * (2025-03-03 11:55:12): [krb5_child[2058626]] [check_fast_ccache]
>> (0x0200): [RID#5037] FAST TGT is still valid.
>> * (2025-03-03 11:55:12): [krb5_child[2058626]] [become_user] (0x0200):
>> [RID#5037] Trying to become user [100045][100045].
>> * (2025-03-03 11:55:12): [krb5_child[2058626]] [main] (0x2000): [RID#5037]
>> Running as [100045][100045].
>> * (2025-03-03 11:55:12): [krb5_child[2058626]] [set_lifetime_options]
>> (0x0100): [RID#5037] No specific renewable lifetime requested.
>> * (2025-03-03 11:55:12): [krb5_child[2058626]] [set_lifetime_options]
>> (0x0100): [RID#5037] No specific lifetime requested.
>> * (2025-03-03 11:55:12): [krb5_child[2058626]] [set_canonicalize_option]
>> (0x0100): [RID#5037] Canonicalization is set to [true]
>> * (2025-03-03 11:55:12): [krb5_child[2058626]] [main] (0x0400): [RID#5037]
>> Will perform auth
>> * (2025-03-03 11:55:12): [krb5_child[2058626]] [main] (0x0400): [RID#5037]
>> Will perform online auth
>> * (2025-03-03 11:55:12): [krb5_child[2058626]] [tgt_req_child] (0x1000):
>> [RID#5037] Attempting to get a TGT
>> * (2025-03-03 11:55:12): [krb5_child[2058626]] [get_and_save_tgt] (0x0400):
>> [RID#5037] Attempting kinit for realm [SOME-DOMAIN.LAN]
>> * (2025-03-03 11:55:12): [krb5_child[2058626]] [sss_krb5_responder]
>> (0x4000): [RID#5037] Got question [password].
>> * (2025-03-03 11:55:12): [krb5_child[2058626]]
>> [sss_krb5_expire_callback_func] (0x0020): [RID#5037] Time to expire out of
>> range.
>> ********************** BACKTRACE DUMP ENDS HERE
>> *********************************
>>
>> Doing some more testing:
>>
>> ipa user-mod some_service_account --password-expiration='2038-01-19
>> 03:14:06Z' --> de errors will disappear (one second before the
>> "Epochalypse")
>>
>> ipa user-mod some_service_account --password-expiration='2038-01-19
>> 03:14:08Z' --> the error returns! (one second after the "Epochalypse")
>>
>> For now, setting the expiry date below January 19 2038 is OK, but it smells
>> like a bug, doesn't it...?
>> Should a bug report created on this topic? Where?
>
> We already have a pagure ticket for this issue:
> https://pagure.io/freeipa/issue/2496
> flo
>
>> Kind regards,
>>
>> Winfried --
>> _______________________________________________
>> FreeIPA-users mailing list -- [email protected]
>> To unsubscribe send an email to [email protected]
>> Fedora Code of Conduct:
>> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
>> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
>> List Archives:
>> https://lists.fedorahosted.org/archives/list/[email protected]
>> Do not reply to spam, report it:
>> https://pagure.io/fedora-infrastructure/new_issue
--
_______________________________________________
FreeIPA-users mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Fedora Code of Conduct:
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives:
https://lists.fedorahosted.org/archives/list/[email protected]
Do not reply to spam, report it:
https://pagure.io/fedora-infrastructure/new_issue