Hi all, 

Promising, but https://pagure.io/freeipa/issue/2496 is 12 (!) years old;
8 years ago commented with _"I can perform a kdestroy and kinit for this
user. Also restarted all IPA services and tried again. The KDC appears
to support passwords with expirations beyond 2038 now._" 

Well, maybe it is regresion, but the error is (again?) there... 

Winfried 

Florence Blanc-Renaud schreef op 03-03-2025 13:48:

> Hi, 
> 
> On Mon, Mar 3, 2025 at 12:20 PM Winfried de Heiden via FreeIPA-users 
> <[email protected]> wrote: 
> 
>> Hi all,
>> 
>> It seems we hit a "year 2038" related problem in the IPA-client 
>> (krb5_child). We're using IPA for service accounts and to be shure these 
>> accounts will not expire, we created a password policy:
>> 
>> ipa pwpolicy-show service_accounts
>> Group: service_accounts
>> Max lifetime (days): 9999
>> ...
>> 
>> To be on the safe site, the max life time is set to 9999 days. That's well 
>> beyond 19 January 2038 03:14:07 UTC...
>> 
>> Now, in case a service accounts will login, the krb5_child.log on the IPA 
>> client will show errors like:
>> 
>> (2025-03-03 11:55:12): [krb5_child[2058626]] [sss_krb5_expire_callback_func] 
>> (0x0020): [RID#5037] Time to expire out of range.
>> ********************** PREVIOUS MESSAGE WAS TRIGGERED BY THE FOLLOWING 
>> BACKTRACE:
>> *  (2025-03-03 11:55:12): [krb5_child[2058626]] [main] (0x0400): [RID#5037] 
>> krb5_child started.
>> *  (2025-03-03 11:55:12): [krb5_child[2058626]] [unpack_buffer] (0x1000): 
>> [RID#5037] total buffer size: [144]
>> *  (2025-03-03 11:55:12): [krb5_child[2058626]] [unpack_buffer] (0x0100): 
>> [RID#5037] cmd [241 (auth)] uid [100045] gid [100045] validate [true] 
>> enterprise principal [false] offline [false] UPN 
>> [[email protected]]
>> *  (2025-03-03 11:55:12): [krb5_child[2058626]] [unpack_buffer] (0x0100): 
>> [RID#5037] ccname: [KCM:] old_ccname: [KCM:] keytab: [/etc/krb5.keytab]
>> *  (2025-03-03 11:55:12): [krb5_child[2058626]] [switch_creds] (0x0200): 
>> [RID#5037] Switch user to [100045][100045].
>> *  (2025-03-03 11:55:12): [krb5_child[2058626]] [switch_creds] (0x0200): 
>> [RID#5037] Switch user to [0][0].
>> *  (2025-03-03 11:55:12): [krb5_child[2058626]] [k5c_check_old_ccache] 
>> (0x4000): [RID#5037] Ccache_file is [KCM:] and is not active and TGT is  
>> valid.
>> *  (2025-03-03 11:55:12): [krb5_child[2058626]] [k5c_precreate_ccache] 
>> (0x4000): [RID#5037] Recreating ccache
>> *  (2025-03-03 11:55:12): [krb5_child[2058626]] [k5c_setup_fast] (0x0100): 
>> [RID#5037] Fast principal is set to 
>> [host/[email protected]]
>> *  (2025-03-03 11:55:12): [krb5_child[2058626]] [find_principal_in_keytab] 
>> (0x4000): [RID#5037] Trying to find principal 
>> host/[email protected] in keytab.
>> *  (2025-03-03 11:55:12): [krb5_child[2058626]] [match_principal] (0x1000): 
>> [RID#5037] Principal matched to the sample 
>> (host/[email protected]).
>> *  (2025-03-03 11:55:12): [krb5_child[2058626]] [check_fast_ccache] 
>> (0x0200): [RID#5037] FAST TGT is still valid.
>> *  (2025-03-03 11:55:12): [krb5_child[2058626]] [become_user] (0x0200): 
>> [RID#5037] Trying to become user [100045][100045].
>> *  (2025-03-03 11:55:12): [krb5_child[2058626]] [main] (0x2000): [RID#5037] 
>> Running as [100045][100045].
>> *  (2025-03-03 11:55:12): [krb5_child[2058626]] [set_lifetime_options] 
>> (0x0100): [RID#5037] No specific renewable lifetime requested.
>> *  (2025-03-03 11:55:12): [krb5_child[2058626]] [set_lifetime_options] 
>> (0x0100): [RID#5037] No specific lifetime requested.
>> *  (2025-03-03 11:55:12): [krb5_child[2058626]] [set_canonicalize_option] 
>> (0x0100): [RID#5037] Canonicalization is set to [true]
>> *  (2025-03-03 11:55:12): [krb5_child[2058626]] [main] (0x0400): [RID#5037] 
>> Will perform auth
>> *  (2025-03-03 11:55:12): [krb5_child[2058626]] [main] (0x0400): [RID#5037] 
>> Will perform online auth
>> *  (2025-03-03 11:55:12): [krb5_child[2058626]] [tgt_req_child] (0x1000): 
>> [RID#5037] Attempting to get a TGT
>> *  (2025-03-03 11:55:12): [krb5_child[2058626]] [get_and_save_tgt] (0x0400): 
>> [RID#5037] Attempting kinit for realm [SOME-DOMAIN.LAN]
>> *  (2025-03-03 11:55:12): [krb5_child[2058626]] [sss_krb5_responder] 
>> (0x4000): [RID#5037] Got question [password].
>> *  (2025-03-03 11:55:12): [krb5_child[2058626]] 
>> [sss_krb5_expire_callback_func] (0x0020): [RID#5037] Time to expire out of 
>> range.
>> ********************** BACKTRACE DUMP ENDS HERE 
>> *********************************
>> 
>> Doing some more testing:
>> 
>> ipa user-mod some_service_account --password-expiration='2038-01-19 
>> 03:14:06Z'    --> de errors will disappear (one second before the 
>> "Epochalypse")
>> 
>> ipa user-mod some_service_account --password-expiration='2038-01-19 
>> 03:14:08Z'  --> the error returns! (one second after the "Epochalypse")
>> 
>> For now, setting the expiry date below January 19 2038 is OK, but it smells 
>> like a bug, doesn't it...?
>> Should a bug report created on this topic? Where?
> 
> We already have a pagure ticket for this issue: 
> https://pagure.io/freeipa/issue/2496 
> flo 
> 
>> Kind regards, 
>> 
>> Winfried -- 
>> _______________________________________________
>> FreeIPA-users mailing list -- [email protected]
>> To unsubscribe send an email to [email protected]
>> Fedora Code of Conduct: 
>> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
>> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
>> List Archives: 
>> https://lists.fedorahosted.org/archives/list/[email protected]
>> Do not reply to spam, report it: 
>> https://pagure.io/fedora-infrastructure/new_issue
-- 
_______________________________________________
FreeIPA-users mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedorahosted.org/archives/list/[email protected]
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue

Reply via email to