On 12/14/2016 07:49 PM, beeth beeth wrote:
Hi Flo,

Thanks for the great hint! I reran the ipa-client-install on the rhel6
box(ipadev6), and monitored the access log file you mentioned on the
replica:

# ipa-client-install --domain=ipa.example.com <http://ipa.example.com>
--server=ipaprd2.example.com <http://ipaprd2.example.com>
 --hostname=ipadev6.example.com <http://ipadev6.example.com> -d

( ipaprd2 = primary IPA server on RHEL7; ipadev6 = replica on RHEL6 )

AFTER about 3 seconds, I saw these on the replica ipaprd2:
[14/Dec/2016:13:11:41.071421132 -0500] conn=1040 fd=73 slot=73
connection from <IP of ipadev6> to <IP of ipaprd2>
[14/Dec/2016:13:11:41.071880026 -0500] conn=1040 op=0 EXT
oid="1.3.6.1.4.1.1466.20037"
[14/Dec/2016:13:11:41.071964217 -0500] conn=1040 op=0 RESULT err=2
tag=120 nentries=0 etime=0
[14/Dec/2016:13:11:41.073275674 -0500] conn=1040 op=1 UNBIND
[14/Dec/2016:13:11:41.073307101 -0500] conn=1040 op=1 fd=73 closed - U1
[14/Dec/2016:13:11:41.074782496 -0500] conn=1041 fd=73 slot=73
connection from <IP of ipadev6> to <IP of ipaprd2>
[14/Dec/2016:13:11:41.074985233 -0500] conn=1041 op=0 EXT
oid="1.3.6.1.4.1.1466.20037"
[14/Dec/2016:13:11:41.075022849 -0500] conn=1041 op=0 RESULT err=2
tag=120 nentries=0 etime=0
[14/Dec/2016:13:11:41.075448887 -0500] conn=1041 op=1 UNBIND
[14/Dec/2016:13:11:41.075460964 -0500] conn=1041 op=1 fd=73 closed - U1
[14/Dec/2016:13:11:49.006146850 -0500] conn=1029 op=8 UNBIND
[14/Dec/2016:13:11:49.006181982 -0500] conn=1029 op=8 fd=66 closed - U1

So I did see the err=2, and oid="1.3.6.1.4.1.1466.20037", I checked the
oid and got:

1.3.6.1.4.1.1466.20037: StartTLS Request (RFC 4511)

It looked to be related with TLS... pease advise. Thanks!


Hi,

when the replica got installed, the installer must have configured the directory server for SSL and start TLS. I tend to suspect an expired certificate issue rather than a misconfiguration. Could you please check that dirsrv certificate is still valid?

$ certutil -L -d /etc/dirsrv/slapd-DOMAIN-COM/ -n Server-Cert |grep Not
            Not Before: Wed Dec 14 16:56:02 2016
            Not After : Sat Dec 15 16:56:02 2018

If the certificate is still valid, you may want to read 389-ds How-To to make sure that SSL is properly setup:
http://directory.fedoraproject.org/docs/389ds/howto/howto-ssl.html#deploy-the-settings

Flo.


On Wed, Dec 14, 2016 at 7:57 AM, Florence Blanc-Renaud <f...@redhat.com
<mailto:f...@redhat.com>> wrote:

    On 12/14/2016 01:08 PM, beeth beeth wrote:

        Thanks David. I installed both the master and replica IPA
        servers with
        third-party certificates(Verisign), but I doubt that could be
        the issue,
        because I had no problem to run the same ipa-client-install
        command on a
        RHEL7 machine(of course, the --hostname used a different
        hostname of the
        server). And I had no problem to run the ipa-client-install
        command with
        --server=<master> on such RHEL6 machine. So what could cause the
        LDAP
        communication failed during the client enrollment with the
        replica? Is
        there a way I can troubleshoot this by running some commands? So
        far I
        did telnet to check the open ports, as well as run the ldapsearch
        towards the replica. Thanks again!


        On Tue, Dec 13, 2016 at 8:46 AM, David Kupka <dku...@redhat.com
        <mailto:dku...@redhat.com>
        <mailto:dku...@redhat.com <mailto:dku...@redhat.com>>> wrote:

            On 13/12/16 05:44, beeth beeth wrote:

                I have two IPA servers ipaprd1.example.com
        <http://ipaprd1.example.com>
                <http://ipaprd1.example.com> and ipaprd2.example.com
        <http://ipaprd2.example.com>
                <http://ipaprd2.example.com>, running
                ipa 4.4 on RHEL7. When I tried to install/configure the
        client
                on a RHEL6
                system(called ipadev6), I had issue when I tried to
        enroll it
                with the
                replica(ipaprd2), while no issue with the primary(ipaprd1):

                # ipa-client-install --domain=ipa.example.com
        <http://ipa.example.com>
                <http://ipa.example.com> --server=ipaprd1.example.com
        <http://ipaprd1.example.com>
                <http://ipaprd1.example.com>
                --server=ipaprd2.example.com
        <http://ipaprd2.example.com> <http://ipaprd2.example.com>
                --hostname=ipadev6.example.com
        <http://ipadev6.example.com> <http://ipadev6.example.com>
                LDAP Error: Protocol error: unsupported extended operation
                Autodiscovery of servers for failover cannot work with this
                configuration.
                If you proceed with the installation, services will be
                configured to always
                access the discovered server for all operations and will not
                fail over to
                other servers in case of failure.
                Proceed with fixed values and no DNS discovery? [no]

                Then I tried to run ipa-client-install to enroll with the
                replica(ipaprd2),
                with debug mode, I got this:

                # ipa-client-install --domain=ipa.example.com
        <http://ipa.example.com>
                <http://ipa.example.com> --server=ipaprd2.example.com
        <http://ipaprd2.example.com>
                <http://ipaprd2.example.com>
                 --hostname=ipadev6.example.com
        <http://ipadev6.example.com> <http://ipadev6.example.com> -d
                /usr/sbin/ipa-client-install was invoked with options:
        {'domain': '
                ipa.example.com <http://ipa.example.com>
        <http://ipa.example.com>', 'force': False,
                'realm_name': None,
                'krb5_offline_passwords': True, 'primary': False,
        'mkhomedir':
                False,
                'create_sshfp': True, 'conf_sshd': True, 'conf_ntp': True,
                'on_master':
                False, 'ntp_server': None, 'nisdomain': None,
        'no_nisdomain': False,
                'principal': None, 'hostname': 'ipadev6.example.com
        <http://ipadev6.example.com>
                <http://ipadev6.example.com>', 'no_ac': False,
                'unattended': None, 'sssd': True, 'trust_sshfp': False,
                'kinit_attempts':
                5, 'dns_updates': False, 'conf_sudo': True, 'conf_ssh':
        True,
                'force_join':
                False, 'ca_cert_file': None, 'server':
        ['ipaprd2.example.com <http://ipaprd2.example.com>
                <http://ipaprd2.example.com>'],
                'prompt_password': False, 'permit': False, 'debug': True,
                'preserve_sssd':
                False, 'uninstall': False}
                missing options might be asked for interactively later
                Loading Index file from
                '/var/lib/ipa-client/sysrestore/sysrestore.index'
                Loading StateFile from
                '/var/lib/ipa-client/sysrestore/sysrestore.state'
                [IPA Discovery]
                Starting IPA discovery with domain=ipa.example.com
        <http://ipa.example.com>
                <http://ipa.example.com>, servers=['
                ipaprd2.example.com <http://ipaprd2.example.com>
        <http://ipaprd2.example.com>'],
                hostname=ipadev6.example.com
        <http://ipadev6.example.com> <http://ipadev6.example.com>
                Server and domain forced
                [Kerberos realm search]
                Search DNS for TXT record of _kerberos.ipa.example.com
        <http://kerberos.ipa.example.com>
                <http://kerberos.ipa.example.com
        <http://kerberos.ipa.example.com>>.
                No DNS record found
                Search DNS for SRV record of
        _kerberos._udp.ipa.example.com <http://udp.ipa.example.com>
                <http://udp.ipa.example.com>.
                No DNS record found
                SRV record for KDC not found! Domain: ipa.example.com
        <http://ipa.example.com>
                <http://ipa.example.com>
                [LDAP server check]
                Verifying that ipaprd2.example.com
        <http://ipaprd2.example.com> <http://ipaprd2.example.com>
                (realm None) is an IPA server
                Init LDAP connection with:
        ldap://ipaprd2.example.com:389 <http://ipaprd2.example.com:389>
                <http://ipaprd2.example.com:389
        <http://ipaprd2.example.com:389>>
                LDAP Error: Protocol error: unsupported extended operation
                Discovery result: UNKNOWN_ERROR; server=None,
                domain=ipa.example.com <http://ipa.example.com>
        <http://ipa.example.com>,
                kdc=None, basedn=None
                Validated servers:
                will use discovered domain: ipa.example.com
        <http://ipa.example.com> <http://ipa.example.com>
                IPA Server not found
                [IPA Discovery]
                Starting IPA discovery with domain=ipa.example.com
        <http://ipa.example.com>
                <http://ipa.example.com>, servers=['
                ipaprd2.example.com <http://ipaprd2.example.com>
        <http://ipaprd2.example.com>'],
                hostname=ipadev6.example.com
        <http://ipadev6.example.com> <http://ipadev6.example.com>
                Server and domain forced
                [Kerberos realm search]
                Search DNS for TXT record of _kerberos.ipa.example.com
        <http://kerberos.ipa.example.com>
                <http://kerberos.ipa.example.com
        <http://kerberos.ipa.example.com>>.
                No DNS record found
                Search DNS for SRV record of
        _kerberos._udp.ipa.example.com <http://udp.ipa.example.com>
                <http://udp.ipa.example.com>.
                No DNS record found
                SRV record for KDC not found! Domain: ipa.example.com
        <http://ipa.example.com>
                <http://ipa.example.com>
                [LDAP server check]
                Verifying that ipaprd2.example.com
        <http://ipaprd2.example.com> <http://ipaprd2.example.com>
                (realm None) is an IPA server
                Init LDAP connection with:
        ldap://ipaprd2.example.com:389 <http://ipaprd2.example.com:389>
                <http://ipaprd2.example.com:389
        <http://ipaprd2.example.com:389>>
                LDAP Error: Protocol error: unsupported extended operation
                Discovery result: UNKNOWN_ERROR; server=None,
                domain=ipa.example.com <http://ipa.example.com>
        <http://ipa.example.com>,
                kdc=None, basedn=None
                Validated servers:
                Failed to verify that ipaprd2.example.com
        <http://ipaprd2.example.com>
                <http://ipaprd2.example.com> is an IPA Server.
                This may mean that the remote server is not up or is not
                reachable due to
                network or firewall settings.
                Please make sure the following ports are opened in the
        firewall
                settings:
                     TCP: 80, 88, 389
                     UDP: 88 (at least one of TCP/UDP ports 88 has to be
        open)
                Also note that following ports are necessary for
        ipa-client working
                properly after enrollment:
                     TCP: 464
                     UDP: 464, 123 (if NTP enabled)
                (ipaprd2.example.com <http://ipaprd2.example.com>
        <http://ipaprd2.example.com>: Provided as
                option)
                Installation failed. Rolling back changes.
                IPA client is not configured on this system.


                I double checked the services running on the replica,
        all looked
                well:
                ports are listening, and I could telnet the ports from the
                client(ipadev6).
                I could run "ldapserach" command to talk to the
        replica(ipaprd2)
                from this
                client(ipadev6), with pulling out all the LDAP records.

                Also, I have another test box running RHEL7, and no
        issue at all
                to run the
                exact same ipa-client-install command on that RHEL7 box. So
                could there be
                a bug on the ipa-client software on RHEL6, to talk to
        IPA sever
                running on
                RHEL7? Please advise. Thank you!

    Hi Beeth,

    you may want to check the access and errors log of the Directory
    Server in /var/log/dirsrv/slapd-DOMAIN. The extended operations are
    logged in the access log with the tag "EXT oid=...", but a failing
    operation related to unsupported extended operation will probably
    log a "RESULT err=2".

    So I would first check access log and look for such a failure. With
    the OID we will be able to understand which operation is failing and
    which part could be misconfigured.

    HTH,
    Flo.

                Best regards,
                Beeth



            Hello Beeth,
            I've tried to reproduce the problem you described with 7.3
            (ipa-server 4.4.0-12) on master and replica and 6.9 (ipa-client
            3.0.0-51) on client and it worked for me as expected.
            I've done these steps:
            [master] # ipa-server-install -a Secret123 -p Secret123 --domain
            example.test --realm EXAMPLE.TEST --setup-dns
        --auto-forwarders -U
            [replica] # ipa-client-install -p admin -w Secret123 --domain
            example.test --server master.example.test -U
            [replica] # ipa-replica-install
            [client] # ipa-client-install -p admin -w Secret123 --domain
            example.test --server replica.example.test -U
            [client] # id admin

            Is there anything you've done differently?

            --
            David Kupka







--
Manage your subscription for the Freeipa-users mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-users
Go to http://freeipa.org for more info on the project

Reply via email to