Hello, The list of ciphers seems OK (it is the one showed on the debug logs: " TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: enabled"), and also the SSL version range is from TLS1.0 to TLS1.3. I have also added lines with 'ERR' or 'WARN': [10/Jan/2020:08:53:57.993429356 +0100] - ERR - oc_check_allowed_sv - Entry "cn=encryption,cn=config" -- attribute "CACertExtractFile" not allowed [10/Jan/2020:08:53:57.999532781 +0100] - WARN - Security Initialization - SSL alert: Sending pin request to SVRCore. You may need to run systemd-tty-ask-password-agent to provide the password. [10/Jan/2020:08:53:58.005282229 +0100] - INFO - slapd_extract_cert - SERVER CERT NAME: Server-Cert [10/Jan/2020:08:53:58.013492586 +0100] - INFO - Security Initialization - SSL info: Enabling default cipher set. [10/Jan/2020:08:53:58.021112518 +0100] - INFO - Security Initialization - SSL info: Configured NSS Ciphers [10/Jan/2020:08:53:58.023818570 +0100] - INFO - Security Initialization - SSL info: TLS_AES_128_GCM_SHA256: enabled [10/Jan/2020:08:53:58.025012562 +0100] - INFO - Security Initialization - SSL info: TLS_CHACHA20_POLY1305_SHA256: enabled [10/Jan/2020:08:53:58.026865854 +0100] - INFO - Security Initialization - SSL info: TLS_AES_256_GCM_SHA384: enabled [10/Jan/2020:08:53:58.027909825 +0100] - INFO - Security Initialization - SSL info: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: enabled [10/Jan/2020:08:53:58.028910559 +0100] - INFO - Security Initialization - SSL info: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: enabled [10/Jan/2020:08:53:58.030192210 +0100] - INFO - Security Initialization - SSL info: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: enabled [10/Jan/2020:08:53:58.032707645 +0100] - INFO - Security Initialization - SSL info: TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256: enabled [10/Jan/2020:08:53:58.038511038 +0100] - INFO - Security Initialization - SSL info: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: enabled [10/Jan/2020:08:53:58.042101912 +0100] - INFO - Security Initialization - SSL info: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: enabled [10/Jan/2020:08:53:58.047331242 +0100] - INFO - Security Initialization - SSL info: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: enabled [10/Jan/2020:08:53:58.053222255 +0100] - INFO - Security Initialization - SSL info: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: enabled [10/Jan/2020:08:53:58.059417443 +0100] - INFO - Security Initialization - SSL info: TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256: enabled [10/Jan/2020:08:53:58.065215952 +0100] - INFO - Security Initialization - SSL info: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: enabled [10/Jan/2020:08:53:58.066816630 +0100] - INFO - Security Initialization - SSL info: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: enabled [10/Jan/2020:08:53:58.070814501 +0100] - INFO - Security Initialization - SSL info: TLS_DHE_RSA_WITH_AES_256_CBC_SHA: enabled [10/Jan/2020:08:53:58.076808934 +0100] - INFO - Security Initialization - SSL info: TLS_DHE_DSS_WITH_AES_256_CBC_SHA: enabled [10/Jan/2020:08:53:58.082326398 +0100] - INFO - Security Initialization - SSL info: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: enabled [10/Jan/2020:08:53:58.085812594 +0100] - INFO - Security Initialization - SSL info: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: enabled [10/Jan/2020:08:53:58.088603987 +0100] - INFO - Security Initialization - SSL info: TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256: enabled [10/Jan/2020:08:53:58.095429780 +0100] - INFO - Security Initialization - SSL info: TLS_DHE_RSA_WITH_AES_128_CBC_SHA: enabled [10/Jan/2020:08:53:58.097605520 +0100] - INFO - Security Initialization - SSL info: TLS_DHE_DSS_WITH_AES_128_CBC_SHA: enabled [10/Jan/2020:08:53:58.099003065 +0100] - INFO - Security Initialization - SSL info: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: enabled [10/Jan/2020:08:53:58.101106312 +0100] - INFO - Security Initialization - SSL info: TLS_RSA_WITH_AES_256_GCM_SHA384: enabled [10/Jan/2020:08:53:58.102701393 +0100] - INFO - Security Initialization - SSL info: TLS_RSA_WITH_AES_256_CBC_SHA: enabled [10/Jan/2020:08:53:58.105723970 +0100] - INFO - Security Initialization - SSL info: TLS_RSA_WITH_AES_256_CBC_SHA256: enabled [10/Jan/2020:08:53:58.107107490 +0100] - INFO - Security Initialization - SSL info: TLS_RSA_WITH_AES_128_GCM_SHA256: enabled [10/Jan/2020:08:53:58.110522147 +0100] - INFO - Security Initialization - SSL info: TLS_RSA_WITH_AES_128_CBC_SHA: enabled [10/Jan/2020:08:53:58.113200222 +0100] - INFO - Security Initialization - SSL info: TLS_RSA_WITH_AES_128_CBC_SHA256: enabled [10/Jan/2020:08:53:58.126201090 +0100] - INFO - Security Initialization - slapd_ssl_init2 - Configured SSL version range: min: TLS1.0, max: TLS1.3 ... [10/Jan/2020:08:54:02.128378609 +0100] - WARN - default_mr_indexer_create - Plugin [caseIgnoreIA5Match] does not handle caseExactIA5Match ... [10/Jan/2020:08:54:02.268900495 +0100] - ERR - schema-compat-plugin - scheduled schema-compat-plugin tree scan in about 5 seconds after the server startup! [10/Jan/2020:08:54:02.283005210 +0100] - WARN - NSACLPlugin - acl_parse - The ACL target cn=ng,cn=compat,dc=ipa,dc=domain,dc=org does not exist [10/Jan/2020:08:54:02.284850029 +0100] - WARN - NSACLPlugin - acl_parse - The ACL target ou=sudoers,dc=ipa,dc=domain,dc=org does not exist [10/Jan/2020:08:54:02.291534216 +0100] - WARN - NSACLPlugin - acl_parse - The ACL target cn=users,cn=compat,dc=ipa,dc=domain,dc=org does not exist [10/Jan/2020:08:54:02.296575693 +0100] - WARN - NSACLPlugin - acl_parse - The ACL target cn=vaults,cn=kra,dc=ipa,dc=domain,dc=org does not exist [10/Jan/2020:08:54:02.300672868 +0100] - WARN - NSACLPlugin - acl_parse - The ACL target cn=vaults,cn=kra,dc=ipa,dc=domain,dc=org does not exist [10/Jan/2020:08:54:02.306498604 +0100] - WARN - NSACLPlugin - acl_parse - The ACL target cn=vaults,cn=kra,dc=ipa,dc=domain,dc=org does not exist [10/Jan/2020:08:54:02.312925397 +0100] - WARN - NSACLPlugin - acl_parse - The ACL target cn=vaults,cn=kra,dc=ipa,dc=domain,dc=org does not exist [10/Jan/2020:08:54:02.316251285 +0100] - WARN - NSACLPlugin - acl_parse - The ACL target cn=vaults,cn=kra,dc=ipa,dc=domain,dc=org does not exist [10/Jan/2020:08:54:02.318903023 +0100] - WARN - NSACLPlugin - acl_parse - The ACL target cn=vaults,cn=kra,dc=ipa,dc=domain,dc=org does not exist [10/Jan/2020:08:54:02.324020591 +0100] - WARN - NSACLPlugin - acl_parse - The ACL target cn=vaults,cn=kra,dc=ipa,dc=domain,dc=org does not exist [10/Jan/2020:08:54:02.327893713 +0100] - WARN - NSACLPlugin - acl_parse - The ACL target cn=vaults,cn=kra,dc=ipa,dc=domain,dc=org does not exist [10/Jan/2020:08:54:02.334512981 +0100] - WARN - NSACLPlugin - acl_parse - The ACL target cn=vaults,cn=kra,dc=ipa,dc=domain,dc=org does not exist [10/Jan/2020:08:54:02.338954980 +0100] - WARN - NSACLPlugin - acl_parse - The ACL target cn=vaults,cn=kra,dc=ipa,dc=domain,dc=org does not exist [10/Jan/2020:08:54:02.341830396 +0100] - WARN - NSACLPlugin - acl_parse - The ACL target cn=vaults,cn=kra,dc=ipa,dc=domain,dc=org does not exist [10/Jan/2020:08:54:02.343118609 +0100] - WARN - NSACLPlugin - acl_parse - The ACL target cn=computers,cn=compat,dc=ipa,dc=domain,dc=org does not exist [10/Jan/2020:08:54:02.346506279 +0100] - WARN - NSACLPlugin - acl_parse - The ACL target cn=groups,cn=compat,dc=ipa,dc=domain,dc=org does not exist [10/Jan/2020:08:54:02.359003489 +0100] - WARN - NSACLPlugin - acl_parse - The ACL target cn=casigningcert cert-pki-ca,cn=ca_renewal,cn=ipa,cn=etc,dc=ipa,dc=domain,dc=org does not exist [10/Jan/2020:08:54:02.361548258 +0100] - WARN - NSACLPlugin - acl_parse - The ACL target cn=casigningcert cert-pki-ca,cn=ca_renewal,cn=ipa,cn=etc,dc=ipa,dc=domain,dc=org does not exist [10/Jan/2020:08:54:02.449783407 +0100] - WARN - NSACLPlugin - acl_parse - The ACL target cn=automember rebuild membership,cn=tasks,cn=config does not exist [10/Jan/2020:08:54:02.489813637 +0100] - INFO - slapd_daemon - slapd started. Listening on All Interfaces port 389 for LDAP requests [10/Jan/2020:08:54:02.498610374 +0100] - INFO - slapd_daemon - Listening on All Interfaces port 636 for LDAPS requests [10/Jan/2020:08:54:02.502099316 +0100] - INFO - slapd_daemon - Listening on /var/run/slapd-IPA-DOMAIN-ORG.socket for LDAPI requests [10/Jan/2020:08:54:02.506101255 +0100] - ERR - set_krb5_creds - Could not get initial credentials for principal [ldap/server2.ipa.domain....@ipa.domain.org] in keytab [FILE:/etc/dirsrv/ds.keytab]: -1765328324 (Generic error (see e-text)) [10/Jan/2020:08:54:02.560926332 +0100] - ERR - schema-compat-plugin - schema-compat-plugin tree scan will start in about 5 seconds! [10/Jan/2020:08:54:11.584790390 +0100] - ERR - schema-compat-plugin - warning: no entries set up under cn=computers, cn=compat,dc=ipa,dc=domain,dc=org [10/Jan/2020:08:54:11.592447129 +0100] - ERR - schema-compat-plugin - Finished plugin initialization.
On the client side, seems it is also abailabe: [root@client01 ~]# openssl ciphers -v | grep ECDHE-RSA-AES256-GCM ECDHE-RSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH Au=RSA Enc=AESGCM(256) Mac=AEAD Thanks & Regards. -----Original Message----- From: Florence Blanc-Renaud <f...@redhat.com> Sent: Thursday, January 09, 2020 21:06 To: FreeIPA users list <freeipa-users@lists.fedorahosted.org> Cc: SOLER SANGUESA Miguel <sol...@unicc.org> Subject: Re: [Freeipa-users] Problem adding a RHEL 8.1 client On 1/9/20 4:07 PM, SOLER SANGUESA Miguel via FreeIPA-users wrote: > Hello, > > I'm trying to add a RHEL 8.1 client with the following spec: > > OS: RHEL 8.1 (Ootpa) > > IPA: ipa-client-4.8.0-10 > > SSSD: sssd-2.2.0-19.el8.x86_64 > > My IDM server has: > > OS: RHEL 7.7 (Maipo) > > IPA: ipa-server-4.6.5-11.el7_7.3 > > SSSD: sssd-1.16.4-21.el7_7.1 > > When I try to add the client using "ipa-client-install" I get the error: > > This program will set up IPA client. > > Version 4.8.0 > > Discovery was successful! > > Do you want to configure chrony with NTP server or pool address? [no]: > > Client hostname: client01.svc.domain.org > > Realm: IPA.DOMAIN.ORG > > DNS Domain: ipa.domain.org > > IPA Server: icidmpdc1.ipa.domain.org > > BaseDN: dc=ipa,dc=domain,dc=org > > Continue to configure the system with these values? [no]: yes > > Synchronizing time > > Configuration of chrony was changed by installer. > > Attempting to sync time with chronyc. > > Time synchronization was successful. > > Successfully retrieved CA cert > > Subject: CN=Certificate Authority,O=IPA.DOMAIN.ORG > > Issuer: CN=Certificate Authority,O=IPA.DOMAIN.ORG > > Valid From: 2016-03-04 15:13:38 > > Valid Until: 2036-03-04 15:13:38 > > Joining realm failed: Unable to initialize STARTTLS session > > Failed to bind to server! > > Retrying with pre-4.0 keytab retrieval method... > > Unable to initialize STARTTLS session > > Failed to bind to server! > > Failed to get keytab > > child exited with 9 > > Installation failed. Rolling back changes. > > Disabling client Kerberos and LDAP configurations > > Restoring client configuration files > > nslcd daemon is not installed, skip configuration > > Client uninstall complete. > > The ipa-client-install command failed. See > /var/log/ipaclient-install.log for more information > > The entire debug log is attached. It fails doing the "join". It > doesn't happened when I add a client with RHEL 7.X, also I think it > was also working with RHEL 8.0. > > Can anyone please, let me know why it is not working? > Hi, can you paste the content of /var/log/dirsrv/slapd-<DOMAIN>/errors (on the master) that is related to SSL: - INFO - Security Initialization - SSL info: Enabling default cipher set. - INFO - Security Initialization - SSL info: Configured NSS Ciphers - INFO - Security Initialization - SSL info: TLS_AES_128_GCM_SHA256: enabled [... list of all ciphers] - INFO - Security Initialization - SSL info: TLS_RSA_WITH_AES_128_CBC_SHA256: enabled - INFO - Security Initialization - slapd_ssl_init2 - Configured SSL version range: min: TLS1.0, max: TLS1.3 The full list of ciphers and the SSL range may help understand the issue. flo > Thanks & Regards. > > > _______________________________________________ > FreeIPA-users mailing list -- freeipa-users@lists.fedorahosted.org > To unsubscribe send an email to > freeipa-users-le...@lists.fedorahosted.org > Fedora Code of Conduct: > https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdocs > .fedoraproject.org%2Fen-US%2Fproject%2Fcode-of-conduct%2F&data=02% > 7C01%7Csolerm%40unicc.org%7C572ac438c3f44f353f6208d7953f57d3%7Ca33def5 > 739f8400593ede80266830257%7C0%7C0%7C637141971601947392&sdata=%2FXm > p17T3G8G6HelhTlBMbbwk2Z0XRRbk1JOMsEZAfXM%3D&reserved=0 > List Guidelines: > https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Ffedo > raproject.org%2Fwiki%2FMailing_list_guidelines&data=02%7C01%7Csole > rm%40unicc.org%7C572ac438c3f44f353f6208d7953f57d3%7Ca33def5739f8400593 > ede80266830257%7C0%7C0%7C637141971601957347&sdata=KCpN67a3VP%2B7W1 > TWNLSjIjlcJTioY6phCrJPjIWB%2BFE%3D&reserved=0 > List Archives: > https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Flist > s.fedorahosted.org%2Farchives%2Flist%2Ffreeipa-users%40lists.fedorahos > ted.org&data=02%7C01%7Csolerm%40unicc.org%7C572ac438c3f44f353f6208 > d7953f57d3%7Ca33def5739f8400593ede80266830257%7C0%7C0%7C63714197160195 > 7347&sdata=ayLDi6PUsROquosBP%2Bkbh9KGoPGGHL4PyIabw3FloKQ%3D&re > served=0 > _______________________________________________ FreeIPA-users mailing list -- freeipa-users@lists.fedorahosted.org To unsubscribe send an email to freeipa-users-le...@lists.fedorahosted.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedorahosted.org/archives/list/freeipa-users@lists.fedorahosted.org