Found a discussion of this here: https://frasertweedale.github.io/blog-redhat/posts/2019-02-18-freeipa-san-ip.html

Summary: Unless freeipa's DNS is in use, even if the sysadmins know the IPS to be correct owing to dnssec supported resolvers, freeipa can't issue certificates with IP's in the SAN.   There exists no --force option for instances where the sysadmins do know the off-host resolvers are complete and correct.  It also appears freeipa won't even allow freeipa dns to be installed but to use forwarders in this case.  According to the 2019 blog entry, there MUST be dns records in the LDAP or freeipa can't issue certs with IP's in the SAN.

I think either a  --permit-offhost-resolver or --skip-san-ip-check flag for ipa-cert-request would put appropriate control in the local sysadmin's hands.

The alternative is either to migrate away from freeipa for certificates, leaving it only a kerberos/ldap Idm provider, or to create some cron job that populates freeipa's dns from the authoritative offhost source (a reverse-double-bind-dyn-ldap??)?? Or hack a custom ipaserver/plugins/cert.py

If we knew a flag in ipa-cert-request to allow local judgement to control this situation was in the works, the temporary hack to ipaserver/plugins/cert.py would be the best approach.   The alternatives are not very attractive.

Has all this been fixed in some newer version?  Hopefully?

Thanks

Harry

---

Hi Freeipa Team


Am I correct that only if freeipa's internal DNS is active and current that freeipa can issue certificates if IP addresses are in the SAN part of the cert?   Even if DNSSec supported resolvers with accurate info are on the same RFC1918 subnet as freeipa and nslookup / dig report proper answers?

I hit a wall trying to re-issue a certificate.  We had freeipa's DNS running a few years ago, when the certs were first issued. then migrated to another resolver with better HA dnssec support.

Would freeipa be able to issue IPs in certificates if I enabled freeipa's dns system but pointed it off-host for all resolutions? Or is it required the DNS records be in local LDAP 'no matter what'.

Or perhaps a 'force because I actually do know what I'm doing' command to issue such certificates with IPs in the SAN?

I feel like I'm missing something obvious here, so please help me out.

Thanks

Harry




--
_______________________________________________
FreeIPA-users mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedorahosted.org/archives/list/[email protected]
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue

Reply via email to