Hey,

Do we have any docs regarding this?

Also where to set tuning settings like suppose if i want to make any
changes on ipa server how frequently it will apply the changes to clients?

Coz once i remove the users public key first its allowing him into ssh
server first and second attempt he is not able to ssh later i did sss_cache
-E option fixed it though.

Second issue i faced even if ipa server is down still i am able to
communicate via ssh keys.
I want to know how its communicating and how long it wjll allow us to ssh.


On Wed, 11 Oct 2023 at 5:45 PM, Pradeep KNS <kns.prad...@alpha-grep.com>
wrote:

> Hi,
>
> Thanks for the links Alexander,I tried to setup as per the documents it is
> working without any issues.
>
> Problem:
> I tried to bring the ipa server down and I am still able to communicate
> with ssh-key mechanism.How it is possible and how it is allowing me to
> communicate.Ideally when the ipa server is down! it shouldn't connect. as
> all my public keys are located on ipa server.
> Is there any way to fix this issue?
>
> ###################
> ─pradeep@sys-blr1-dsk04 ~
> ╰─$ ping 10.40.1.67
> PING 10.40.1.67 (10.40.1.67) 56(84) bytes of data.
> ^C
> --- 10.40.1.67 ping statistics ---
> 3 packets transmitted, 0 received, 100% packet loss, time 2033ms
>
> ####################
> ─pradeep@sys-blr1-dsk04 ~
> ╰─$ ssh kns@10.40.1.200 -vv
>
>                                                                        1 ↵
> OpenSSH_8.9p1 Ubuntu-3ubuntu0.3, OpenSSL 3.0.2 15 Mar 2022
> debug1: Reading configuration data /etc/ssh/ssh_config
> debug1: Reading configuration data /etc/ssh/ssh_config.d/my.conf
> debug1: /etc/ssh/ssh_config line 21: Applying options for *
> debug2: resolve_canonicalize: hostname 10.40.1.200 is address
> debug1: Connecting to 10.40.1.200 [10.40.1.200] port 22.
> debug1: Connection established.
> debug1: identity file /home/pradeep/.ssh/id_rsa type 0
> debug1: identity file /home/pradeep/.ssh/id_rsa-cert type -1
> debug1: identity file /home/pradeep/.ssh/id_ecdsa type -1
> debug1: identity file /home/pradeep/.ssh/id_ecdsa-cert type -1
> debug1: identity file /home/pradeep/.ssh/id_ecdsa_sk type -1
> debug1: identity file /home/pradeep/.ssh/id_ecdsa_sk-cert type -1
> debug1: identity file /home/pradeep/.ssh/id_ed25519 type -1
> debug1: identity file /home/pradeep/.ssh/id_ed25519-cert type -1
> debug1: identity file /home/pradeep/.ssh/id_ed25519_sk type -1
> debug1: identity file /home/pradeep/.ssh/id_ed25519_sk-cert type -1
> debug1: identity file /home/pradeep/.ssh/id_xmss type -1
> debug1: identity file /home/pradeep/.ssh/id_xmss-cert type -1
> debug1: identity file /home/pradeep/.ssh/id_dsa type -1
> debug1: identity file /home/pradeep/.ssh/id_dsa-cert type -1
> debug1: Local version string SSH-2.0-OpenSSH_8.9p1 Ubuntu-3ubuntu0.3
> debug1: Remote protocol version 2.0, remote software version OpenSSH_8.7
> debug1: compat_banner: match: OpenSSH_8.7 pat OpenSSH* compat 0x04000000
> debug2: fd 3 setting O_NONBLOCK
> debug1: Authenticating to 10.40.1.200:22 as 'kns'
> debug1: SSH2_MSG_KEXINIT sent
> debug1: SSH2_MSG_KEXINIT received
> debug2: local client KEXINIT proposal
> debug2: KEX algorithms: curve25519-sha256,curve25519-sha...@libssh.org
> ,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,
> sntrup761x25519-sha...@openssh.com
> ,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,ext-info-c
> debug2: host key algorithms: ssh-rsa
> debug2: ciphers ctos: chacha20-poly1...@openssh.com
> ,aes128-ctr,aes192-ctr,aes256-ctr,aes128-...@openssh.com,
> aes256-...@openssh.com
> debug2: ciphers stoc: chacha20-poly1...@openssh.com
> ,aes128-ctr,aes192-ctr,aes256-ctr,aes128-...@openssh.com,
> aes256-...@openssh.com
> debug2: MACs ctos: umac-64-...@openssh.com,umac-128-...@openssh.com,
> hmac-sha2-256-...@openssh.com,hmac-sha2-512-...@openssh.com,
> hmac-sha1-...@openssh.com,umac...@openssh.com,umac-...@openssh.com
> ,hmac-sha2-256,hmac-sha2-512,hmac-sha1
> debug2: MACs stoc: umac-64-...@openssh.com,umac-128-...@openssh.com,
> hmac-sha2-256-...@openssh.com,hmac-sha2-512-...@openssh.com,
> hmac-sha1-...@openssh.com,umac...@openssh.com,umac-...@openssh.com
> ,hmac-sha2-256,hmac-sha2-512,hmac-sha1
> debug2: compression ctos: none,z...@openssh.com,zlib
> debug2: compression stoc: none,z...@openssh.com,zlib
> debug2: languages ctos:
> debug2: languages stoc:
> debug2: first_kex_follows 0
> debug2: reserved 0
> debug2: peer server KEXINIT proposal
> debug2: KEX algorithms: curve25519-sha256,curve25519-sha...@libssh.org
> ,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1
> debug2: host key algorithms:
> rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256,ssh-ed25519
> debug2: ciphers ctos: aes256-...@openssh.com,chacha20-poly1...@openssh.com
> ,aes256-ctr,aes128-...@openssh.com,aes128-ctr
> debug2: ciphers stoc: aes256-...@openssh.com,chacha20-poly1...@openssh.com
> ,aes256-ctr,aes128-...@openssh.com,aes128-ctr
> debug2: MACs ctos: hmac-sha2-256-...@openssh.com,hmac-sha1-...@openssh.com
> ,umac-128-...@openssh.com,hmac-sha2-512-...@openssh.com
> ,hmac-sha2-256,hmac-sha1,umac-...@openssh.com,hmac-sha2-512
> debug2: MACs stoc: hmac-sha2-256-...@openssh.com,hmac-sha1-...@openssh.com
> ,umac-128-...@openssh.com,hmac-sha2-512-...@openssh.com
> ,hmac-sha2-256,hmac-sha1,umac-...@openssh.com,hmac-sha2-512
> debug2: compression ctos: none,z...@openssh.com
> debug2: compression stoc: none,z...@openssh.com
> debug2: languages ctos:
> debug2: languages stoc:
> debug2: first_kex_follows 0
> debug2: reserved 0
> debug1: kex: algorithm: curve25519-sha256
> debug1: kex: host key algorithm: ssh-rsa
> debug1: kex: server->client cipher: chacha20-poly1...@openssh.com MAC:
> <implicit> compression: none
> debug1: kex: client->server cipher: chacha20-poly1...@openssh.com MAC:
> <implicit> compression: none
> debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
> debug1: SSH2_MSG_KEX_ECDH_REPLY received
> debug1: Server host key: ssh-rsa
> SHA256:wWKt87w2Wzv40Bhcbp533kOCLCJFXeogYcqycugoHSM
> debug1: load_hostkeys: fopen /home/pradeep/.ssh/known_hosts2: No such file
> or directory
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or
> directory
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or
> directory
> debug1: Host '10.40.1.200' is known and matches the RSA host key.
> debug1: Found key in /home/pradeep/.ssh/known_hosts:5
> debug2: ssh_set_newkeys: mode 1
> debug1: rekey out after 134217728 blocks
> debug1: SSH2_MSG_NEWKEYS sent
> debug1: expecting SSH2_MSG_NEWKEYS
> debug1: SSH2_MSG_NEWKEYS received
> debug2: ssh_set_newkeys: mode 0
> debug1: rekey in after 134217728 blocks
> debug1: get_agent_identities: bound agent to hostkey
> debug1: get_agent_identities: agent returned 1 keys
> debug1: Will attempt key: /home/pradeep/.ssh/id_rsa RSA
> SHA256:o1zUnwlDUPSy/1/aPXOqFRt+DLKQaCw5BehTjDhNVGU agent
> debug1: Will attempt key: /home/pradeep/.ssh/id_ecdsa
> debug1: Will attempt key: /home/pradeep/.ssh/id_ecdsa_sk
> debug1: Will attempt key: /home/pradeep/.ssh/id_ed25519
> debug1: Will attempt key: /home/pradeep/.ssh/id_ed25519_sk
> debug1: Will attempt key: /home/pradeep/.ssh/id_xmss
> debug1: Will attempt key: /home/pradeep/.ssh/id_dsa
> debug2: pubkey_prepare: done
> debug1: SSH2_MSG_EXT_INFO received
> debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,
> sk-ssh-ed25...@openssh.com
> ,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,
> sk-ecdsa-sha2-nistp...@openssh.com,
> webauthn-sk-ecdsa-sha2-nistp...@openssh.com>
> debug2: service_accept: ssh-userauth
> debug1: SSH2_MSG_SERVICE_ACCEPT received
> debug1: Authentications that can continue:
> publickey,gssapi-keyex,gssapi-with-mic,password,keyboard-interactive
> debug1: Next authentication method: gssapi-with-mic
> debug1: No credentials were supplied, or the credentials were unavailable
> or inaccessible
> No Kerberos credentials available (default cache: FILE:/tmp/krb5cc_1001)
>
>
> debug1: No credentials were supplied, or the credentials were unavailable
> or inaccessible
> No Kerberos credentials available (default cache: FILE:/tmp/krb5cc_1001)
>
>
> debug2: we did not send a packet, disable method
> debug1: Next authentication method: publickey
> debug1: Offering public key: /home/pradeep/.ssh/id_rsa RSA
> SHA256:o1zUnwlDUPSy/1/aPXOqFRt+DLKQaCw5BehTjDhNVGU agent
> debug2: we sent a publickey packet, wait for reply
> debug1: Server accepts key: /home/pradeep/.ssh/id_rsa RSA
> SHA256:o1zUnwlDUPSy/1/aPXOqFRt+DLKQaCw5BehTjDhNVGU agent
> Authenticated to 10.40.1.200 ([10.40.1.200]:22) using "publickey".
> debug1: channel 0: new [client-session]
> debug2: channel 0: send open
> debug1: Requesting no-more-sessi...@openssh.com
> debug1: Entering interactive session.
> debug1: pledge: filesystem
> debug1: client_input_global_request: rtype hostkeys...@openssh.com
> want_reply 0
> debug1: client_input_hostkeys: searching /home/pradeep/.ssh/known_hosts
> for 10.40.1.200 / (none)
> debug1: client_input_hostkeys: searching /home/pradeep/.ssh/known_hosts2
> for 10.40.1.200 / (none)
> debug1: client_input_hostkeys: hostkeys file
> /home/pradeep/.ssh/known_hosts2 does not exist
> debug1: client_input_hostkeys: no new or deprecated keys from server
> debug1: Remote: /usr/bin/sss_ssh_authorizedkeys:1: key options:
> agent-forwarding port-forwarding pty user-rc x11-forwarding
> debug1: Remote: /usr/bin/sss_ssh_authorizedkeys:1: key options:
> agent-forwarding port-forwarding pty user-rc x11-forwarding
> debug2: channel_input_open_confirmation: channel 0: callback start
> debug2: fd 3 setting TCP_NODELAY
> debug2: client_session2_setup: id 0
> debug2: channel 0: request pty-req confirm 1
> debug1: Sending environment.
> debug1: channel 0: setting env LANG = "en_IN"
> debug2: channel 0: request env confirm 0
> debug2: channel 0: request shell confirm 1
> debug2: channel_input_open_confirmation: channel 0: callback done
> debug2: channel 0: open confirm rwindow 0 rmax 32768
> debug2: channel_input_status_confirm: type 99 id 0
> debug2: PTY allocation request accepted on channel 0
> debug2: channel 0: rcvd adjust 2097152
> debug2: channel_input_status_confirm: type 99 id 0
> debug2: shell request accepted on channel 0
> Register this system with Red Hat Insights: insights-client --register
> Create an account or view all your systems at
> https://red.ht/insights-dashboard
> Last login: Wed Oct 11 17:37:13 2023 from 10.80.101.53
> [kns@ts-mum1-pve01 ~]$ ^C
> [kns@ts-mum1-pve01 ~]$
>
>
>
>
> On Tue, Oct 3, 2023 at 2:33 PM Pradeep KNS <kns.prad...@alpha-grep.com>
> wrote:
>
>> Thanks Alexander,Thanks for the info
>>
>> On Tue, 3 Oct 2023 at 2:21 PM, Alexander Bokovoy <aboko...@redhat.com>
>> wrote:
>>
>>> On Аўт, 03 кас 2023, Pradeep KNS wrote:
>>> >Thanks for the information.
>>> >Will go through the document.
>>> >
>>> >But if i add the public key i am able authenticate from server A to
>>> server
>>> >B and C from same Server A.
>>> >
>>> >But if i want to communicate in-between Server B to Server C how this
>>> ipa
>>> >will work? should i want to copy my pvt key?? Across all the hosts so
>>> that
>>> >internal communication will happens?
>>>
>>> It happens exactly same way as you'd do that without IPA. Something
>>> should provide access to that private key. Typically people achieve that
>>> by forwarding SSH authentication agent connection. Look at man page for
>>> ssh about authentication agent.
>>>
>>> >
>>> >
>>> >On Tue, 3 Oct 2023 at 2:11 PM, Alexander Bokovoy <aboko...@redhat.com>
>>> >wrote:
>>> >
>>> >> On Аўт, 03 кас 2023, Pradeep KNS wrote:
>>> >> >Hi Alexander,
>>> >> >
>>> >> >Thanks for your email,
>>> >> >Like this i need to add all servers? As my dns is located in internal
>>> >> >different server.
>>> >>
>>> >> Only if you need to use Kerberos authentication.
>>> >>
>>> >> >
>>> >> >Also if i want to jump from one server to another server on ipa
>>> clients
>>> >> >using sshkeybased? How this mechanism works? here
>>> >>
>>> >> If you are using SSH keypairs, you are not using Kerberos and thus
>>> don't
>>> >> need these aliases at all.
>>> >>
>>> >> If you want to use SSH keypair to authenticate, then upload public SSH
>>> >> key for that user to IPA.
>>> >>
>>> >> In general, almost all these details covered in the RHEL IdM
>>> >> documentation:
>>> >>
>>> >>
>>> https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/managing_idm_users_groups_hosts_and_access_control_rules/managing-public-ssh-keys_managing-users-groups-hosts
>>> >>
>>> >> >
>>> >> >
>>> >> >
>>> >> >
>>> >> >On Tue, 3 Oct 2023 at 1:45 PM, Pradeep KNS <
>>> kns.prad...@alpha-grep.com>
>>> >> >wrote:
>>> >> >
>>> >> >> Awesome, thanks for the info!
>>> >> >>
>>> >> >> On Tue, 3 Oct 2023 at 1:44 PM, Alexander Bokovoy <
>>> aboko...@redhat.com>
>>> >> >> wrote:
>>> >> >>
>>> >> >>> On Аўт, 03 кас 2023, Pradeep KNS via FreeIPA-users wrote:
>>> >> >>> >Hi Rob,
>>> >> >>> >
>>> >> >>> >Thanks for your email,
>>> >> >>> >
>>> >> >>> >Yeah true FQDN is working without any issues.But is there any
>>> way to
>>> >> ssh
>>> >> >>> >via IP as well rather than hostname
>>> >> >>>
>>> >> >>> Kerberos authentication is based on names of services known to
>>> your
>>> >> KDC.
>>> >> >>> IP address is not a name in this context and is not associated
>>> with the
>>> >> >>> service host/$FQDN, hence it is not found in the Kerberos
>>> database.
>>> >> >>>
>>> >> >>> You can add such service name alias using 'ipa host-add-principal'
>>> >> >>> command. It is, however, not always enough because most Kerberos
>>> >> >>> services do not expect to operate with multiple aliases. Luckily,
>>> SSH
>>> >> >>> works fine with such tickets in IPA environment.
>>> >> >>>
>>> >> >>> $ ipa host-add-principal server.ipa.example host/10.40.1.201
>>> >> >>> ---------------------------------------
>>> >> >>> Added new aliases to host "server.ipa.example"
>>> >> >>> ---------------------------------------
>>> >> >>>    Host name: server.ipa.example
>>> >> >>>    Principal alias: host/server.ipa.example@IPA.EXAMPLE,
>>> >> >>> host/10.40.1.201@IPA.EXAMPLE
>>> >> >>>
>>> >> >>>
>>> >> >>>
>>> >> >>> >
>>> >> >>> >On Tue, 3 Oct 2023 at 2:22 AM, Rob Crittenden <
>>> rcrit...@redhat.com>
>>> >> >>> wrote:
>>> >> >>> >
>>> >> >>> >> Pradeep KNS wrote:
>>> >> >>> >> > ssh kns@10.40.1.201 -v
>>> >> >>> >>
>>> >> >>> >> [snip]
>>> >> >>> >>
>>> >> >>> >> > SHA256:1BAWa9F52c6u26qe8T9ZQsin3lk+VTFeRYBDtkOzNMU
>>> >> >>> >> > debug1: load_hostkeys: fopen /home/kns/.ssh/known_hosts: No
>>> such
>>> >> >>> file or
>>> >> >>> >> > directory
>>> >> >>> >> > debug1: load_hostkeys: fopen /home/kns/.ssh/known_hosts2: No
>>> such
>>> >> >>> file
>>> >> >>> >> > or directory
>>> >> >>> >> > debug1: Host '10.40.1.201' is known and matches the ED25519
>>> host
>>> >> key.
>>> >> >>> >> > debug1: Found key in /var/lib/sss/pubconf/known_hosts:2
>>> >> >>> >>
>>> >> >>> >> The SSSD ssh integration was used to to validate that the
>>> host's SSH
>>> >> >>> key
>>> >> >>> >> matched what was received so you avoided the "do you trust this
>>> >> host"
>>> >> >>> >> prompt. So that's good.
>>> >> >>> >>
>>> >> >>> >> > debug1: rekey out after 4294967296 blocks
>>> >> >>> >> > debug1: SSH2_MSG_NEWKEYS sent
>>> >> >>> >> > debug1: expecting SSH2_MSG_NEWKEYS
>>> >> >>> >> > debug1: SSH2_MSG_NEWKEYS received
>>> >> >>> >> > debug1: rekey in after 4294967296 blocks
>>> >> >>> >> > debug1: Will attempt key: /home/kns/.ssh/id_rsa
>>> >> >>> >> > debug1: Will attempt key: /home/kns/.ssh/id_dsa
>>> >> >>> >> > debug1: Will attempt key: /home/kns/.ssh/id_ecdsa
>>> >> >>> >> > debug1: Will attempt key: /home/kns/.ssh/id_ecdsa_sk
>>> >> >>> >> > debug1: Will attempt key: /home/kns/.ssh/id_ed25519
>>> >> >>> >> > debug1: Will attempt key: /home/kns/.ssh/id_ed25519_sk
>>> >> >>> >> > debug1: Will attempt key: /home/kns/.ssh/id_xmss
>>> >> >>> >> > debug1: SSH2_MSG_EXT_INFO received
>>> >> >>> >> > debug1: kex_input_ext_info:
>>> >> >>> >> > server-sig-algs=<ssh-ed25519,sk-ssh-ed25...@openssh.com
>>> >> >>> >> > <mailto:sk-ssh-ed25...@openssh.com
>>> >> >>> >>
>>> >> >>>
>>> >>
>>> >,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,
>>> >> >>> >> sk-ecdsa-sha2-nistp...@openssh.com
>>> >> >>> >> > <mailto:sk-ecdsa-sha2-nistp...@openssh.com>,
>>> >> >>> >> webauthn-sk-ecdsa-sha2-nistp...@openssh.com
>>> >> >>> >> > <mailto:webauthn-sk-ecdsa-sha2-nistp...@openssh.com>>
>>> >> >>> >> > debug1: SSH2_MSG_SERVICE_ACCEPT received
>>> >> >>> >> > debug1: Authentications that can continue:
>>> >> >>> >> >
>>> >> publickey,gssapi-keyex,gssapi-with-mic,password,keyboard-interactive
>>> >> >>> >> > debug1: Next authentication method: gssapi-with-mic
>>> >> >>> >> > *debug1: Unspecified GSS failure.  Minor code may provide
>>> more
>>> >> >>> >> information
>>> >> >>> >> > Server host/10.40.1....@alpha-grep.com
>>> >> >>> >> > <mailto:10.40.1....@alpha-grep.com> not found in Kerberos
>>> >> database*
>>> >> >>> >>
>>> >> >>> >> IPA keys on hostnames, not IP addresses, hence this message.
>>> You
>>> >> need
>>> >> >>> to
>>> >> >>> >> use a FQDN. AFAIK there is no workaround.
>>> >> >>> >>
>>> >> >>> >> > debug1: Authentications that can continue:
>>> >> >>> >> >
>>> >> publickey,gssapi-keyex,gssapi-with-mic,password,keyboard-interactive
>>> >> >>> >> > debug1: Next authentication method: publickey
>>> >> >>> >> > debug1: Trying private key: /home/kns/.ssh/id_rsa
>>> >> >>> >> > debug1: Trying private key: /home/kns/.ssh/id_dsa
>>> >> >>> >> > debug1: Trying private key: /home/kns/.ssh/id_ecdsa
>>> >> >>> >> > debug1: Trying private key: /home/kns/.ssh/id_ecdsa_sk
>>> >> >>> >> > debug1: Trying private key: /home/kns/.ssh/id_ed25519
>>> >> >>> >> > debug1: Trying private key: /home/kns/.ssh/id_ed25519_sk
>>> >> >>> >> > debug1: Trying private key: /home/kns/.ssh/id_xmss
>>> >> >>> >> > debug1: Next authentication method: keyboard-interactive
>>> >> >>> >> > (kns@10.40.1.201 <mailto:kns@10.40.1.201>) Password:
>>> >> >>> >>
>>> >> >>> >> It failed to do a Kerberos/GSSAPI auth so it fell back to
>>> password.
>>> >> >>> >>
>>> >> >>> >> rob
>>> >> >>> >>
>>> >> >>> >>
>>> >> >>>
>>> >> >>>
>>> >> >>>
>>> >> >>>
>>> >> >>> --
>>> >> >>> / Alexander Bokovoy
>>> >> >>> Sr. Principal Software Engineer
>>> >> >>> Security / Identity Management Engineering
>>> >> >>> Red Hat Limited, Finland
>>> >> >>>
>>> >> >>>
>>> >>
>>> >>
>>> >>
>>> >>
>>> >> --
>>> >> / Alexander Bokovoy
>>> >> Sr. Principal Software Engineer
>>> >> Security / Identity Management Engineering
>>> >> Red Hat Limited, Finland
>>> >>
>>> >>
>>>
>>>
>>>
>>>
>>> --
>>> / Alexander Bokovoy
>>> Sr. Principal Software Engineer
>>> Security / Identity Management Engineering
>>> Red Hat Limited, Finland
>>>
>>>
_______________________________________________
FreeIPA-users mailing list -- freeipa-users@lists.fedorahosted.org
To unsubscribe send an email to freeipa-users-le...@lists.fedorahosted.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedorahosted.org/archives/list/freeipa-users@lists.fedorahosted.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue

Reply via email to