Re: [Freeipa-users] replica_generate_next_csn messages in dirsrv error logs

2016-08-19 Thread John Desantis
Ludwig,

> you still only grep the replication connection, but before being replicated
> the entry has to be added by some client connection, can you get all
> references to the entry ?
> the log snippet you provide shows also csns with tag=103, which indicate a
> MOD, are these MODs for the added entries ? or other mods ?

.

I can't believe I did that!

Ok, so the logs have been rotated (I didn't think to adjust
logrotate..), so there aren't any logs to peruse for the case I've
presented so far.  However, I was able to reproduce the errors by
"bulk" deleting 39 DNS entries, and only the MASTER reported
"replica_generate_next_csn" entries.

Given the size of the logs, I think it would be pointless to do any
kind of sanitization.  I'll go ahead and gzip them for you and email
you off-list.

I've labeled them as MASTER and REPLICA.

John DeSantis


2016-08-19 9:18 GMT-04:00 Ludwig Krispenz :
>
> On 08/18/2016 05:28 PM, John Desantis wrote:
>>
>> Ludwig,
>>
>>> unfortunately this is not enough to determine what is going on. The
>>> intersting generated/used csn is only logged in the
>>> corresponding RESULT message and these are only the replication
>>> connections,
>>> it would be necessary to see the
>>> original ADD operation, was it added once or twice by a client ?
>>> you could pick one entry eg server-6-3-sp and grep for all references in
>>> the
>>> access logs of both servers  (maybe there are mods as well) and then
>>> get also get the RESULT line for the ops found
>>
>> Here are the updated log snippets looking for ADD and RESULT:
>
> you still only grep the replication connection, but before being replicated
> the entry has to be added by some client connection, can you get all
> references to the entry ?
> the log snippet you provide shows also csns with tag=103, which indicate a
> MOD, are these MODs for the added entries ? or other mods ?
>
>>
>> PROD:11:20:13-root@REPLICA:/var/log/dirsrv/slapd-DOM-DOM-DOM
>> # grep -E '17/Aug/2016:13:50:4.*conn=602.*(RESULT|ADD)' access.2016081*
>> access.20160817-124811:[17/Aug/2016:13:50:41 -0400] conn=602 op=4139
>> RESULT err=0 tag=120 nentries=0 etime=0
>> access.20160817-124811:[17/Aug/2016:13:50:41 -0400] conn=602 op=4140
>> RESULT err=0 tag=120 nentries=0 etime=0
>> access.20160817-124811:[17/Aug/2016:13:50:42 -0400] conn=602 op=4141
>> RESULT err=0 tag=120 nentries=0 etime=0
>> access.20160817-124811:[17/Aug/2016:13:50:42 -0400] conn=602 op=4142
>> RESULT err=0 tag=120 nentries=0 etime=0
>> access.20160817-124811:[17/Aug/2016:13:50:42 -0400] conn=602 op=4143
>> ADD
>> dn="idnsname=server-6-3-sp,idnsname=dom.dom.dom,cn=dns,dc=dom,dc=dom,dc=dom"
>> access.20160817-124811:[17/Aug/2016:13:50:42 -0400] conn=602 op=4143
>> RESULT err=0 tag=105 nentries=0 etime=0 csn=57b4a4bb00030004
>> access.20160817-124811:[17/Aug/2016:13:50:44 -0400] conn=602 op=4144
>> RESULT err=0 tag=103 nentries=0 etime=0 csn=57b4a4bb00040004
>> access.20160817-124811:[17/Aug/2016:13:50:44 -0400] conn=602 op=4145
>> RESULT err=0 tag=103 nentries=0 etime=0
>> access.20160817-124811:[17/Aug/2016:13:50:47 -0400] conn=602 op=4146
>> RESULT err=0 tag=120 nentries=0 etime=0
>> access.20160817-124811:[17/Aug/2016:13:50:47 -0400] conn=602 op=4147
>> RESULT err=0 tag=120 nentries=0 etime=0
>> access.20160817-124811:[17/Aug/2016:13:50:47 -0400] conn=602 op=4148
>> ADD
>> dn="idnsname=server-6-4-sp,idnsname=dom.dom.dom,cn=dns,dc=dom,dc=dom,dc=dom"
>> access.20160817-124811:[17/Aug/2016:13:50:47 -0400] conn=602 op=4148
>> RESULT err=0 tag=105 nentries=0 etime=0 csn=57b4a4bb00080004
>> access.20160817-124811:[17/Aug/2016:13:50:49 -0400] conn=602 op=4149
>> RESULT err=0 tag=103 nentries=0 etime=0 csn=57b4a4bc00010004
>> access.20160817-124811:[17/Aug/2016:13:50:49 -0400] conn=602 op=4150
>> RESULT err=0 tag=103 nentries=0 etime=0
>> access.20160817-124811:[17/Aug/2016:13:50:49 -0400] conn=602 op=4151
>> ADD
>> dn="idnsname=server-6-5-sp,idnsname=dom.dom.dom,cn=dns,dc=dom,dc=dom,dc=dom"
>> access.20160817-124811:[17/Aug/2016:13:50:49 -0400] conn=602 op=4151
>> RESULT err=0 tag=105 nentries=0 etime=0 csn=57b4a4c100050004
>> access.20160817-124811:[17/Aug/2016:13:50:49 -0400] conn=602 op=4152
>> RESULT err=0 tag=103 nentries=0 etime=0 csn=57b4a4c100060004
>>
>> PROD:11:19:54-root@MASTER:/var/log/dirsrv/slapd-DOM-DOM-DOM
>> # grep -E '17/Aug/2016:13:50:4.*conn=1395.*(RESULT|ADD)' access.2016081*
>> access.20160817-111940:[17/Aug/2016:13:50:41 -0400] conn=1395 op=4148
>> RESULT err=0 tag=120 nentries=0 etime=0
>> access.20160817-111940:[17/Aug/2016:13:50:41 -0400] conn=1395 op=4149
>> RESULT err=0 tag=120 nentries=0 etime=0
>> access.20160817-111940:[17/Aug/2016:13:50:41 -0400] conn=1395 op=4150
>> RESULT err=0 tag=103 nentries=0 etime=0 csn=57b4a4b900050016
>> access.20160817-111940:[17/Aug/2016:13:50:43 -0400] conn=1395 op=4151
>> ADD
>> dn="idnsname=server-6-3-sp,idnsname=dom.dom.dom,cn=dns,dc=dom,dc=dom,dc=dom"
>> access.20160817-111940:[17/Aug/2016:13:50:43 -0400] 

Re: [Freeipa-users] Freeipa 4.2.0 hangs intermittently

2016-08-19 Thread Rakesh Rajasekharan
I am running my set up on AWS cloud, and entropy is low at around 180 .

I plan to increase it bu installing haveged . But, would low entropy by any
chance cause this issue of intermittent hang .
Also, the hang is mostly observed when registering around 20 clients
together

On Fri, Aug 19, 2016 at 7:24 PM, Rakesh Rajasekharan <
rakesh.rajasekha...@gmail.com> wrote:

> yes there seems to be something thats worrying.. I have faced this today
> as well.
> There are few hosts around 280 odd left and when i try adding them to IPA
> , the slowness begins..
>
> all the ipa commands like ipa user-find.. etc becomes very slow in
> responding.
>
> the SYNC_RECV are not many though just around 80-90 and today that was
> around 20 only
>
>
> I have for now increased tcp_max_syn_backlog to 5000.
> For now the slowness seems to have gone.. but I will do a try adding the
> clients again tomorrow and see how it goes
>
> Thanks
> Rakesh
>
> The issues
>
> On Fri, Aug 19, 2016 at 12:58 PM, Petr Spacek  wrote:
>
>> On 18.8.2016 17:23, Rakesh Rajasekharan wrote:
>> > Hi
>> >
>> > I am migrating to freeipa from openldap and have around 4000 clients
>> >
>> > I had openned a another thread on that, but chose to start a new one
>> here
>> > as its a separate issue
>> >
>> > I was able to change the nssslapd-maxdescriptors adding an ldif file
>> >
>> > cat nsslapd-modify.ldif
>> > dn: cn=config
>> > changetype: modify
>> > replace: nsslapd-maxdescriptors
>> > nsslapd-maxdescriptors: 17000
>> >
>> > and running the ldapmodify command
>> >
>> > I have now started moving clients running an openldap to Freeipa and
>> have
>> > today moved close to 2000 clients
>> >
>> > However, I have noticed that IPA hangs intermittently.
>> >
>> > running a kinit admin returns the below error
>> > kinit: Generic error (see e-text) while getting initial credentials
>> >
>> > from the /var/log/messages, I see this entry
>> >
>> >  prod-ipa-master-int kernel: [104090.315801] TCP: request_sock_TCP:
>> > Possible SYN flooding on port 88. Sending cookies.  Check SNMP counters.
>>
>> I would be worried about this message. Maybe kernel/firewall is doing
>> something fishy behind your back and blocking some connections or so.
>>
>> Petr^2 Spacek
>>
>>
>> > Aug 18 13:00:01 prod-ipa-master-int systemd[1]: Started Session 4885 of
>> > user root.
>> > Aug 18 13:00:01 prod-ipa-master-int systemd[1]: Starting Session 4885 of
>> > user root.
>> > Aug 18 13:01:01 prod-ipa-master-int systemd[1]: Started Session 4886 of
>> > user root.
>> > Aug 18 13:01:01 prod-ipa-master-int systemd[1]: Starting Session 4886 of
>> > user root.
>> > Aug 18 13:02:40 prod-ipa-master-int python[28984]: ansible-command
>> Invoked
>> > with creates=None executable=None shell=True args= removes=None
>> warn=True
>> > chdir=None
>> > Aug 18 13:04:37 prod-ipa-master-int sssd_be: GSSAPI Error: Unspecified
>> GSS
>> > failure.  Minor code may provide more information (KDC returned error
>> > string: PROCESS_TGS)
>> >
>> > Could it be possible that its due to the initial load of adding the
>> clients
>> > or is there something else that I need to take care of.
>> >
>> > Thanks,
>> >
>> > Rakesh
>>
>> --
>> Manage your subscription for the Freeipa-users mailing list:
>> https://www.redhat.com/mailman/listinfo/freeipa-users
>> Go to http://freeipa.org for more info on the project
>>
>
>
-- 
Manage your subscription for the Freeipa-users mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-users
Go to http://freeipa.org for more info on the project

[Freeipa-users] Announcing SSSD 1.14.1

2016-08-19 Thread Jakub Hrozek
 === SSSD 1.14.1 ===

The SSSD team is proud to announce the release of version 1.14.1 of
the System Security Services Daemon.

As always, the source is available from https://fedorahosted.org/sssd

RPM packages will be made available for Fedora shortly.

== Feedback ==
Please provide comments, bugs and other feedback via the sssd-devel
or sssd-users mailing lists:
https://lists.fedorahosted.org/mailman/listinfo/sssd-devel
https://lists.fedorahosted.org/mailman/listinfo/sssd-users

== Highlights ==
 * The IPA provider now supports logins with enterprise principals (also
   known as additional UPN suffixes). This functionality also enabled Active
   Directory users from trusted AD domains who use an additional UPN suffix
   to log in. Please note that this feature requires a recent IPA server.
 * When a user name is overriden in an IPA domain, resolving a group these
   users are a member of now returns the overriden user names
 * Users can be looked up by and log in with their e-mail address as an
   identifier. In order to do so, an attribute that represents the user's
   e-mail address is fetched by default. This attribute can by customized
   by setting the ldap_user_email configuration option.
 * A new ad_enabled_domains option was added. This option lets the
   administrator select domains that SSSD should attempt to reach in the
   AD forest SSSD is joined to. This option is useful for deployments where
   not all domains are reachable on the network level, yet the administrator
   needs to access some trusted domains and therefore disabling the subdomains
   provider completely is not desirable.
 * The sssctl tool has two new commands active-server and servers that
   allow the administrator to observe the server that SSSD is bound to and
   the servers that SSSD autodiscovered
 * SSSD used to fail to start when an attribute name is present in both
   the default SSSD attribute map and the custom ldap_user_extra_attrs map
 * GPO policy procesing no longer fails if the gPCMachineExtensionNames
   attribute only contains whitespaces
 * Several commits fix regressions related to switching all user and group
   names to fully qualified format, such as running initgroups for a user
   who is only a member of a primary group
 * Several patches fix regressions caused by splitting the database into
   two ldb files, such as when user attributes change without increasing
   the modifyTimestamp attribute value
 * systemd unit files are now shipped for the sssd-secrets responder,
   allowing the responder to be socket-activated. To do so, administrators
   should enable the sssd-secrets.socket and sssd-secrets.service systemd
   units.
 * The sssd binary has a new switch --disable-netlink that lets sssd skip
   messages from the kernel's netlink interface.
 * A crash when entries with special characters such as '(' were requested
   was fixed
 * The ldap_rfc_2307_fallback_to_local_users option was broken in the
   previous version. This release fixes the functionality.

== Packaging Changes ==
 * The NFS ID-mapping plugin was moved to its own subpackage 

== Documentation Changes ==
 * A new option ad_enabled_domains was added
 * A new LDAP attribute mapping for e-mail addresses called ldap_user_email
   was added

== Tickets Fixed ==
https://fedorahosted.org/sssd/ticket/2789
Warn if ad_server contains IP address
https://fedorahosted.org/sssd/ticket/2828
Add an option to disable checking for trusted domains in the subdomains 
provider
https://fedorahosted.org/sssd/ticket/2856
[RFE] Allow users to authenticate with alternative names
https://fedorahosted.org/sssd/ticket/2860
Add support for disabling netlink use
https://fedorahosted.org/sssd/ticket/2948
Handle overriden name of members in the memberUid attribute
https://fedorahosted.org/sssd/ticket/2958
Support multiple principals for IPA users
https://fedorahosted.org/sssd/ticket/2978
pid file name decalration is duplicated
https://fedorahosted.org/sssd/ticket/2987
Improve information about krb5_keytab & ldap_krb5_keytab option in sssd man 
pages
https://fedorahosted.org/sssd/ticket/3009
sssd fails to mark a connection as bad on searches that time out
https://fedorahosted.org/sssd/ticket/3018
Detect of IPA server can handle enterprise principals
https://fedorahosted.org/sssd/ticket/3024
sssd-common brings in nfs-utils
https://fedorahosted.org/sssd/ticket/3064
incorrect dataExpireTimestamp setting in the timestamps cache
https://fedorahosted.org/sssd/ticket/3068
fixes to the initial config schema implementation
https://fedorahosted.org/sssd/ticket/3069
The sssctl tool should provide information about active and available 
servers
https://fedorahosted.org/sssd/ticket/3072
task: Add a 1.14 upstream repo
https://fedorahosted.org/sssd/ticket/3077
sssd does not work under non-root user
https://fedorahosted.org/sssd/ticket/3084
DP: Don't pass empty string, but NULL to provi

Re: [Freeipa-users] dns/ldap failing after temporary storage problem

2016-08-19 Thread Petr Spacek
On 19.8.2016 16:13, Tiemen Ruiten wrote:
> I did actually use a local dse.ldif in the end, but I forgot to stop dirsrv
> while replacing it, so maybe the nsslapd-localhost line got updated by the
> running dirsrv?

Yes, that is possible. dirsrv can write to dse.ldif at run-time.

> 
> On 19 August 2016 at 15:59, Petr Spacek  wrote:
> 
>> On 19.8.2016 15:26, Tiemen Ruiten wrote:
>>> Managed to fix it: had to stop dirsrv@IPA-RDMEDIA-COM and put the
>> server's
>>> hostname on the line with nsslapd-localhost
>>
>> Uh, this is quite brutal. There might be some other server-specific
>> options.
>>
>> If you can dig up older dse.ldif from the same server, I would rather
>> restore
>> that version. You never know what will silently break.
>>
>> Petr^2 Spacek
>>
>>>
>>> Then run ipa-replica-manage re-initialize --from
>>> other-master.ipa.rdmedia.com

-- 
Manage your subscription for the Freeipa-users mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-users
Go to http://freeipa.org for more info on the project


Re: [Freeipa-users] dns/ldap failing after temporary storage problem

2016-08-19 Thread Tiemen Ruiten
I did actually use a local dse.ldif in the end, but I forgot to stop dirsrv
while replacing it, so maybe the nsslapd-localhost line got updated by the
running dirsrv?

On 19 August 2016 at 15:59, Petr Spacek  wrote:

> On 19.8.2016 15:26, Tiemen Ruiten wrote:
> > Managed to fix it: had to stop dirsrv@IPA-RDMEDIA-COM and put the
> server's
> > hostname on the line with nsslapd-localhost
>
> Uh, this is quite brutal. There might be some other server-specific
> options.
>
> If you can dig up older dse.ldif from the same server, I would rather
> restore
> that version. You never know what will silently break.
>
> Petr^2 Spacek
>
> >
> > Then run ipa-replica-manage re-initialize --from
> > other-master.ipa.rdmedia.com
> >
> > On 19 August 2016 at 12:14, Tiemen Ruiten  wrote:
> >
> >> I see lots of messages /var/log/dirsrv/slapd-IPA-RDMEDIA-COM/errors,
> >> looks definitely like an issue with dirsrv.
> >>
> >> On 19 August 2016 at 11:43, Tiemen Ruiten  wrote:
> >>
> >>> I see I didn't use the right terminology: all four of my FreeIPA
> servers
> >>> are masters.
> >>>
> >>> On 19 August 2016 at 11:36, Tiemen Ruiten 
> wrote:
> >>>
>  Hello,
> 
>  I need some help getting one of my replica's to work. Assistance would
>  be much appreciated.
> 
>  After the iSCSI volumes of two replicas of were briefly unavailable,
> on
>  one of them DNS and LDAP stopped working and replication seems to have
>  stopped. The ipa service failed with a message that an upgrade was
>  required, so I ran ipa-server-upgrade, but it failed due to an empty
>  dse.ldif.
> 
>  Then I probably made a mistake by copying a dse.ldif from another
>  replica and trying to run the upgrade. It worked more or less, but DNS
>  still didn't work.
> 
>  Next I replaced it with an older backup file (from Aug 4) ran the
>  upgrade command again and after some fiddling all services started
>  normally, except ipa-dnskeysyncd:
> 
>  journalctl -u ipa-dnskeysyncd
> 
>  Aug 19 11:28:52 promethium.ipa.rdmedia.com systemd[1]:
>  ipa-dnskeysyncd.service holdoff time over, scheduling restart.
>  Aug 19 11:28:52 promethium.ipa.rdmedia.com systemd[1]: Started IPA
> key
>  daemon.
>  Aug 19 11:28:52 promethium.ipa.rdmedia.com systemd[1]: Starting IPA
> key
>  daemon...
>  Aug 19 11:28:52 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]:
> ipa:
>  WARNING: session memcached servers not running
>  Aug 19 11:28:53 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]: ipa
>    : INFO LDAP bind...
>  Aug 19 11:28:53 promethium.ipa.rdmedia.com python2[3756]: GSSAPI
> client
>  step 1
>  Aug 19 11:28:54 promethium.ipa.rdmedia.com python2[3756]: GSSAPI
> client
>  step 1
>  Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]: ipa
>    : ERRORLogin to LDAP server failed: {'info': 'SASL(-1):
> generic
>  failure: GSSAPI Error: Unspecified GSS failure.  Minor code may
> provide
>  more information (No key table entry found matching
>  ldap/praseodymium.ipa.rdmedia.com@)', 'desc': 'Invalid credentials'}
>  Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]:
>  Traceback (most recent call last):
>  Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]:
> File
>  "/usr/libexec/ipa/ipa-dnskeysyncd", line 92, in 
>  Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]:
>  ldap_connection.sasl_interactive_bind_s("", ipaldap.SASL_GSSAPI)
>  Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]:
> File
>  "/usr/lib64/python2.7/site-packages/ldap/ldapobject.py", line 850, in
>  sasl_interactive_bind_s
>  Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]:
> res =
>  self._apply_method_s(SimpleLDAPObject.sasl_interactive_bind_
>  s,*args,**kwargs)
>  Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]:
> File
>  "/usr/lib64/python2.7/site-packages/ldap/ldapobject.py", line 818, in
>  _apply_method_s
>  Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]:
>  return func(self,*args,**kwargs)
>  Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]:
> File
>  "/usr/lib64/python2.7/site-packages/ldap/ldapobject.py", line 229, in
>  sasl_interactive_bind_s
>  Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]:
>  return self._ldap_call(self._l.sasl_interactive_bind_s,who,auth,Req
>  uestControlTuples(serverctrls),RequestControlTuples(clientct
>  rls),sasl_flags)
>  Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]:
> File
>  "/usr/lib64/python2.7/site-packages/ldap/ldapobject.py", line 99, in
>  _ldap_call
>  Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]:
>  result = func(*args,**kwargs)
>  Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysync

Re: [Freeipa-users] Freeipa 4.2.0 hangs intermittently

2016-08-19 Thread Rakesh Rajasekharan
yes there seems to be something thats worrying.. I have faced this today as
well.
There are few hosts around 280 odd left and when i try adding them to IPA ,
the slowness begins..

all the ipa commands like ipa user-find.. etc becomes very slow in
responding.

the SYNC_RECV are not many though just around 80-90 and today that was
around 20 only


I have for now increased tcp_max_syn_backlog to 5000.
For now the slowness seems to have gone.. but I will do a try adding the
clients again tomorrow and see how it goes

Thanks
Rakesh

The issues

On Fri, Aug 19, 2016 at 12:58 PM, Petr Spacek  wrote:

> On 18.8.2016 17:23, Rakesh Rajasekharan wrote:
> > Hi
> >
> > I am migrating to freeipa from openldap and have around 4000 clients
> >
> > I had openned a another thread on that, but chose to start a new one here
> > as its a separate issue
> >
> > I was able to change the nssslapd-maxdescriptors adding an ldif file
> >
> > cat nsslapd-modify.ldif
> > dn: cn=config
> > changetype: modify
> > replace: nsslapd-maxdescriptors
> > nsslapd-maxdescriptors: 17000
> >
> > and running the ldapmodify command
> >
> > I have now started moving clients running an openldap to Freeipa and have
> > today moved close to 2000 clients
> >
> > However, I have noticed that IPA hangs intermittently.
> >
> > running a kinit admin returns the below error
> > kinit: Generic error (see e-text) while getting initial credentials
> >
> > from the /var/log/messages, I see this entry
> >
> >  prod-ipa-master-int kernel: [104090.315801] TCP: request_sock_TCP:
> > Possible SYN flooding on port 88. Sending cookies.  Check SNMP counters.
>
> I would be worried about this message. Maybe kernel/firewall is doing
> something fishy behind your back and blocking some connections or so.
>
> Petr^2 Spacek
>
>
> > Aug 18 13:00:01 prod-ipa-master-int systemd[1]: Started Session 4885 of
> > user root.
> > Aug 18 13:00:01 prod-ipa-master-int systemd[1]: Starting Session 4885 of
> > user root.
> > Aug 18 13:01:01 prod-ipa-master-int systemd[1]: Started Session 4886 of
> > user root.
> > Aug 18 13:01:01 prod-ipa-master-int systemd[1]: Starting Session 4886 of
> > user root.
> > Aug 18 13:02:40 prod-ipa-master-int python[28984]: ansible-command
> Invoked
> > with creates=None executable=None shell=True args= removes=None warn=True
> > chdir=None
> > Aug 18 13:04:37 prod-ipa-master-int sssd_be: GSSAPI Error: Unspecified
> GSS
> > failure.  Minor code may provide more information (KDC returned error
> > string: PROCESS_TGS)
> >
> > Could it be possible that its due to the initial load of adding the
> clients
> > or is there something else that I need to take care of.
> >
> > Thanks,
> >
> > Rakesh
>
> --
> Manage your subscription for the Freeipa-users mailing list:
> https://www.redhat.com/mailman/listinfo/freeipa-users
> Go to http://freeipa.org for more info on the project
>
-- 
Manage your subscription for the Freeipa-users mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-users
Go to http://freeipa.org for more info on the project

Re: [Freeipa-users] dns/ldap failing after temporary storage problem

2016-08-19 Thread Petr Spacek
On 19.8.2016 15:26, Tiemen Ruiten wrote:
> Managed to fix it: had to stop dirsrv@IPA-RDMEDIA-COM and put the server's
> hostname on the line with nsslapd-localhost

Uh, this is quite brutal. There might be some other server-specific options.

If you can dig up older dse.ldif from the same server, I would rather restore
that version. You never know what will silently break.

Petr^2 Spacek

> 
> Then run ipa-replica-manage re-initialize --from
> other-master.ipa.rdmedia.com
> 
> On 19 August 2016 at 12:14, Tiemen Ruiten  wrote:
> 
>> I see lots of messages /var/log/dirsrv/slapd-IPA-RDMEDIA-COM/errors,
>> looks definitely like an issue with dirsrv.
>>
>> On 19 August 2016 at 11:43, Tiemen Ruiten  wrote:
>>
>>> I see I didn't use the right terminology: all four of my FreeIPA servers
>>> are masters.
>>>
>>> On 19 August 2016 at 11:36, Tiemen Ruiten  wrote:
>>>
 Hello,

 I need some help getting one of my replica's to work. Assistance would
 be much appreciated.

 After the iSCSI volumes of two replicas of were briefly unavailable, on
 one of them DNS and LDAP stopped working and replication seems to have
 stopped. The ipa service failed with a message that an upgrade was
 required, so I ran ipa-server-upgrade, but it failed due to an empty
 dse.ldif.

 Then I probably made a mistake by copying a dse.ldif from another
 replica and trying to run the upgrade. It worked more or less, but DNS
 still didn't work.

 Next I replaced it with an older backup file (from Aug 4) ran the
 upgrade command again and after some fiddling all services started
 normally, except ipa-dnskeysyncd:

 journalctl -u ipa-dnskeysyncd

 Aug 19 11:28:52 promethium.ipa.rdmedia.com systemd[1]:
 ipa-dnskeysyncd.service holdoff time over, scheduling restart.
 Aug 19 11:28:52 promethium.ipa.rdmedia.com systemd[1]: Started IPA key
 daemon.
 Aug 19 11:28:52 promethium.ipa.rdmedia.com systemd[1]: Starting IPA key
 daemon...
 Aug 19 11:28:52 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]: ipa:
 WARNING: session memcached servers not running
 Aug 19 11:28:53 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]: ipa
   : INFO LDAP bind...
 Aug 19 11:28:53 promethium.ipa.rdmedia.com python2[3756]: GSSAPI client
 step 1
 Aug 19 11:28:54 promethium.ipa.rdmedia.com python2[3756]: GSSAPI client
 step 1
 Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]: ipa
   : ERRORLogin to LDAP server failed: {'info': 'SASL(-1): generic
 failure: GSSAPI Error: Unspecified GSS failure.  Minor code may provide
 more information (No key table entry found matching
 ldap/praseodymium.ipa.rdmedia.com@)', 'desc': 'Invalid credentials'}
 Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]:
 Traceback (most recent call last):
 Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]: File
 "/usr/libexec/ipa/ipa-dnskeysyncd", line 92, in 
 Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]:
 ldap_connection.sasl_interactive_bind_s("", ipaldap.SASL_GSSAPI)
 Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]: File
 "/usr/lib64/python2.7/site-packages/ldap/ldapobject.py", line 850, in
 sasl_interactive_bind_s
 Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]: res =
 self._apply_method_s(SimpleLDAPObject.sasl_interactive_bind_
 s,*args,**kwargs)
 Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]: File
 "/usr/lib64/python2.7/site-packages/ldap/ldapobject.py", line 818, in
 _apply_method_s
 Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]:
 return func(self,*args,**kwargs)
 Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]: File
 "/usr/lib64/python2.7/site-packages/ldap/ldapobject.py", line 229, in
 sasl_interactive_bind_s
 Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]:
 return self._ldap_call(self._l.sasl_interactive_bind_s,who,auth,Req
 uestControlTuples(serverctrls),RequestControlTuples(clientct
 rls),sasl_flags)
 Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]: File
 "/usr/lib64/python2.7/site-packages/ldap/ldapobject.py", line 99, in
 _ldap_call
 Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]:
 result = func(*args,**kwargs)
 Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]:
 INVALID_CREDENTIALS: {'info': 'SASL(-1): generic failure: GSSAPI Error:
 Unspecified GSS failure.  Minor code may provide more information (No key
 table entry found matching ldap/praseodymium.ipa.rdmedia.com@)',
 'desc': 'Invalid credentials'}

 praseodymium.ipa.rdmedia.com is the replica I copied the dse.ldif from.
 DNS and logins to the webinterface on this host are still not working.

 Wha

Re: [Freeipa-users] dns/ldap failing after temporary storage problem

2016-08-19 Thread Tiemen Ruiten
Managed to fix it: had to stop dirsrv@IPA-RDMEDIA-COM and put the server's
hostname on the line with nsslapd-localhost

Then run ipa-replica-manage re-initialize --from
other-master.ipa.rdmedia.com

On 19 August 2016 at 12:14, Tiemen Ruiten  wrote:

> I see lots of messages /var/log/dirsrv/slapd-IPA-RDMEDIA-COM/errors,
> looks definitely like an issue with dirsrv.
>
> On 19 August 2016 at 11:43, Tiemen Ruiten  wrote:
>
>> I see I didn't use the right terminology: all four of my FreeIPA servers
>> are masters.
>>
>> On 19 August 2016 at 11:36, Tiemen Ruiten  wrote:
>>
>>> Hello,
>>>
>>> I need some help getting one of my replica's to work. Assistance would
>>> be much appreciated.
>>>
>>> After the iSCSI volumes of two replicas of were briefly unavailable, on
>>> one of them DNS and LDAP stopped working and replication seems to have
>>> stopped. The ipa service failed with a message that an upgrade was
>>> required, so I ran ipa-server-upgrade, but it failed due to an empty
>>> dse.ldif.
>>>
>>> Then I probably made a mistake by copying a dse.ldif from another
>>> replica and trying to run the upgrade. It worked more or less, but DNS
>>> still didn't work.
>>>
>>> Next I replaced it with an older backup file (from Aug 4) ran the
>>> upgrade command again and after some fiddling all services started
>>> normally, except ipa-dnskeysyncd:
>>>
>>> journalctl -u ipa-dnskeysyncd
>>>
>>> Aug 19 11:28:52 promethium.ipa.rdmedia.com systemd[1]:
>>> ipa-dnskeysyncd.service holdoff time over, scheduling restart.
>>> Aug 19 11:28:52 promethium.ipa.rdmedia.com systemd[1]: Started IPA key
>>> daemon.
>>> Aug 19 11:28:52 promethium.ipa.rdmedia.com systemd[1]: Starting IPA key
>>> daemon...
>>> Aug 19 11:28:52 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]: ipa:
>>> WARNING: session memcached servers not running
>>> Aug 19 11:28:53 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]: ipa
>>>   : INFO LDAP bind...
>>> Aug 19 11:28:53 promethium.ipa.rdmedia.com python2[3756]: GSSAPI client
>>> step 1
>>> Aug 19 11:28:54 promethium.ipa.rdmedia.com python2[3756]: GSSAPI client
>>> step 1
>>> Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]: ipa
>>>   : ERRORLogin to LDAP server failed: {'info': 'SASL(-1): generic
>>> failure: GSSAPI Error: Unspecified GSS failure.  Minor code may provide
>>> more information (No key table entry found matching
>>> ldap/praseodymium.ipa.rdmedia.com@)', 'desc': 'Invalid credentials'}
>>> Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]:
>>> Traceback (most recent call last):
>>> Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]: File
>>> "/usr/libexec/ipa/ipa-dnskeysyncd", line 92, in 
>>> Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]:
>>> ldap_connection.sasl_interactive_bind_s("", ipaldap.SASL_GSSAPI)
>>> Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]: File
>>> "/usr/lib64/python2.7/site-packages/ldap/ldapobject.py", line 850, in
>>> sasl_interactive_bind_s
>>> Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]: res =
>>> self._apply_method_s(SimpleLDAPObject.sasl_interactive_bind_
>>> s,*args,**kwargs)
>>> Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]: File
>>> "/usr/lib64/python2.7/site-packages/ldap/ldapobject.py", line 818, in
>>> _apply_method_s
>>> Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]:
>>> return func(self,*args,**kwargs)
>>> Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]: File
>>> "/usr/lib64/python2.7/site-packages/ldap/ldapobject.py", line 229, in
>>> sasl_interactive_bind_s
>>> Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]:
>>> return self._ldap_call(self._l.sasl_interactive_bind_s,who,auth,Req
>>> uestControlTuples(serverctrls),RequestControlTuples(clientct
>>> rls),sasl_flags)
>>> Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]: File
>>> "/usr/lib64/python2.7/site-packages/ldap/ldapobject.py", line 99, in
>>> _ldap_call
>>> Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]:
>>> result = func(*args,**kwargs)
>>> Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]:
>>> INVALID_CREDENTIALS: {'info': 'SASL(-1): generic failure: GSSAPI Error:
>>> Unspecified GSS failure.  Minor code may provide more information (No key
>>> table entry found matching ldap/praseodymium.ipa.rdmedia.com@)',
>>> 'desc': 'Invalid credentials'}
>>>
>>> praseodymium.ipa.rdmedia.com is the replica I copied the dse.ldif from.
>>> DNS and logins to the webinterface on this host are still not working.
>>>
>>> What can I do to get this replica in working order again?
>>>
>>> --
>>> Tiemen Ruiten
>>> Systems Engineer
>>> R&D Media
>>>
>>
>>
>>
>> --
>> Tiemen Ruiten
>> Systems Engineer
>> R&D Media
>>
>
>
>
> --
> Tiemen Ruiten
> Systems Engineer
> R&D Media
>



-- 
Tiemen Ruiten
Systems Engineer
R&D Media
-- 
Manage your subscription for the Freeipa-users mailing list:
https://ww

Re: [Freeipa-users] replica_generate_next_csn messages in dirsrv error logs

2016-08-19 Thread Ludwig Krispenz


On 08/18/2016 05:28 PM, John Desantis wrote:

Ludwig,


unfortunately this is not enough to determine what is going on. The
intersting generated/used csn is only logged in the
corresponding RESULT message and these are only the replication connections,
it would be necessary to see the
original ADD operation, was it added once or twice by a client ?
you could pick one entry eg server-6-3-sp and grep for all references in the
access logs of both servers  (maybe there are mods as well) and then
get also get the RESULT line for the ops found

Here are the updated log snippets looking for ADD and RESULT:
you still only grep the replication connection, but before being 
replicated the entry has to be added by some client connection, can you 
get all references to the entry ?
the log snippet you provide shows also csns with tag=103, which indicate 
a MOD, are these MODs for the added entries ? or other mods ?


PROD:11:20:13-root@REPLICA:/var/log/dirsrv/slapd-DOM-DOM-DOM
# grep -E '17/Aug/2016:13:50:4.*conn=602.*(RESULT|ADD)' access.2016081*
access.20160817-124811:[17/Aug/2016:13:50:41 -0400] conn=602 op=4139
RESULT err=0 tag=120 nentries=0 etime=0
access.20160817-124811:[17/Aug/2016:13:50:41 -0400] conn=602 op=4140
RESULT err=0 tag=120 nentries=0 etime=0
access.20160817-124811:[17/Aug/2016:13:50:42 -0400] conn=602 op=4141
RESULT err=0 tag=120 nentries=0 etime=0
access.20160817-124811:[17/Aug/2016:13:50:42 -0400] conn=602 op=4142
RESULT err=0 tag=120 nentries=0 etime=0
access.20160817-124811:[17/Aug/2016:13:50:42 -0400] conn=602 op=4143
ADD dn="idnsname=server-6-3-sp,idnsname=dom.dom.dom,cn=dns,dc=dom,dc=dom,dc=dom"
access.20160817-124811:[17/Aug/2016:13:50:42 -0400] conn=602 op=4143
RESULT err=0 tag=105 nentries=0 etime=0 csn=57b4a4bb00030004
access.20160817-124811:[17/Aug/2016:13:50:44 -0400] conn=602 op=4144
RESULT err=0 tag=103 nentries=0 etime=0 csn=57b4a4bb00040004
access.20160817-124811:[17/Aug/2016:13:50:44 -0400] conn=602 op=4145
RESULT err=0 tag=103 nentries=0 etime=0
access.20160817-124811:[17/Aug/2016:13:50:47 -0400] conn=602 op=4146
RESULT err=0 tag=120 nentries=0 etime=0
access.20160817-124811:[17/Aug/2016:13:50:47 -0400] conn=602 op=4147
RESULT err=0 tag=120 nentries=0 etime=0
access.20160817-124811:[17/Aug/2016:13:50:47 -0400] conn=602 op=4148
ADD dn="idnsname=server-6-4-sp,idnsname=dom.dom.dom,cn=dns,dc=dom,dc=dom,dc=dom"
access.20160817-124811:[17/Aug/2016:13:50:47 -0400] conn=602 op=4148
RESULT err=0 tag=105 nentries=0 etime=0 csn=57b4a4bb00080004
access.20160817-124811:[17/Aug/2016:13:50:49 -0400] conn=602 op=4149
RESULT err=0 tag=103 nentries=0 etime=0 csn=57b4a4bc00010004
access.20160817-124811:[17/Aug/2016:13:50:49 -0400] conn=602 op=4150
RESULT err=0 tag=103 nentries=0 etime=0
access.20160817-124811:[17/Aug/2016:13:50:49 -0400] conn=602 op=4151
ADD dn="idnsname=server-6-5-sp,idnsname=dom.dom.dom,cn=dns,dc=dom,dc=dom,dc=dom"
access.20160817-124811:[17/Aug/2016:13:50:49 -0400] conn=602 op=4151
RESULT err=0 tag=105 nentries=0 etime=0 csn=57b4a4c100050004
access.20160817-124811:[17/Aug/2016:13:50:49 -0400] conn=602 op=4152
RESULT err=0 tag=103 nentries=0 etime=0 csn=57b4a4c100060004

PROD:11:19:54-root@MASTER:/var/log/dirsrv/slapd-DOM-DOM-DOM
# grep -E '17/Aug/2016:13:50:4.*conn=1395.*(RESULT|ADD)' access.2016081*
access.20160817-111940:[17/Aug/2016:13:50:41 -0400] conn=1395 op=4148
RESULT err=0 tag=120 nentries=0 etime=0
access.20160817-111940:[17/Aug/2016:13:50:41 -0400] conn=1395 op=4149
RESULT err=0 tag=120 nentries=0 etime=0
access.20160817-111940:[17/Aug/2016:13:50:41 -0400] conn=1395 op=4150
RESULT err=0 tag=103 nentries=0 etime=0 csn=57b4a4b900050016
access.20160817-111940:[17/Aug/2016:13:50:43 -0400] conn=1395 op=4151
ADD dn="idnsname=server-6-3-sp,idnsname=dom.dom.dom,cn=dns,dc=dom,dc=dom,dc=dom"
access.20160817-111940:[17/Aug/2016:13:50:43 -0400] conn=1395 op=4151
RESULT err=0 tag=105 nentries=0 etime=0
access.20160817-111940:[17/Aug/2016:13:50:44 -0400] conn=1395 op=4152
RESULT err=0 tag=103 nentries=0 etime=1 csn=57b4a4bc0016
access.20160817-111940:[17/Aug/2016:13:50:46 -0400] conn=1395 op=4153
RESULT err=0 tag=120 nentries=0 etime=0
access.20160817-111940:[17/Aug/2016:13:50:47 -0400] conn=1395 op=4154
RESULT err=0 tag=120 nentries=0 etime=0
access.20160817-111940:[17/Aug/2016:13:50:47 -0400] conn=1395 op=4155
RESULT err=0 tag=120 nentries=0 etime=0
access.20160817-111940:[17/Aug/2016:13:50:47 -0400] conn=1395 op=4156
RESULT err=0 tag=120 nentries=0 etime=0
access.20160817-111940:[17/Aug/2016:13:50:48 -0400] conn=1395 op=4157
RESULT err=0 tag=103 nentries=0 etime=1 csn=57b4a4c100010016
access.20160817-111940:[17/Aug/2016:13:50:49 -0400] conn=1395 op=4158
ADD dn="idnsname=server-6-5-sp,idnsname=dom.dom.dom,cn=dns,dc=dom,dc=dom,dc=dom"
access.20160817-111940:[17/Aug/2016:13:50:49 -0400] conn=1395 op=4158
RESULT err=0 tag=105 nentries=0 etime=0
access.20160817-111940:[17/Aug/2016:13:50:49 -0400] conn=1395 op=4159
RESULT err=0 tag=103 nentries

Re: [Freeipa-users] Login problems

2016-08-19 Thread Christophe TREFOIS
Hi Jakub,

The web UI, and also services that are connected to FreeIPA via LDAP gave me an 
invalid credentials error.

I have this 2-3 times in the past days.

I can not see anything in error log or any other log for the times i tried to 
connect.
I have no idea what could go wrong….

Thanks,
  

> On 19 Aug 2016, at 13:24, Jakub Hrozek  wrote:
> 
> On Fri, Aug 19, 2016 at 10:20:48AM +, Christophe TREFOIS wrote:
>> Hi,
>> 
>> We have a 3 way replica against one master. So there is only agreements 
>> between 1 and 2 and 1 and 3.
>> 
>> Since recently sometimes the master does not allow me to login anymore, 
>> whereas I can login fine to 2 and 3. After a few minutes everything comes 
>> back to normal and it works. 
>> 
>> The master is on centos 7 v4.2 and is still connected to an old 3 replica 
>> running F21. We plan to disconnect this agreement in the coming weeks.
>> 
>> Does anybody have seen this before or have a clue what could be going on 
>> here?
> 
> Login where, the web UI or to the machine itself?
> 
> -- 
> Manage your subscription for the Freeipa-users mailing list:
> https://www.redhat.com/mailman/listinfo/freeipa-users
> Go to http://freeipa.org for more info on the project


-- 
Manage your subscription for the Freeipa-users mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-users
Go to http://freeipa.org for more info on the project

Re: [Freeipa-users] Login problems

2016-08-19 Thread Jakub Hrozek
On Fri, Aug 19, 2016 at 10:20:48AM +, Christophe TREFOIS wrote:
> Hi,
> 
> We have a 3 way replica against one master. So there is only agreements 
> between 1 and 2 and 1 and 3.
> 
> Since recently sometimes the master does not allow me to login anymore, 
> whereas I can login fine to 2 and 3. After a few minutes everything comes 
> back to normal and it works. 
> 
> The master is on centos 7 v4.2 and is still connected to an old 3 replica 
> running F21. We plan to disconnect this agreement in the coming weeks.
> 
> Does anybody have seen this before or have a clue what could be going on here?

Login where, the web UI or to the machine itself?

-- 
Manage your subscription for the Freeipa-users mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-users
Go to http://freeipa.org for more info on the project


[Freeipa-users] Login problems

2016-08-19 Thread Christophe TREFOIS
Hi,

We have a 3 way replica against one master. So there is only agreements between 
1 and 2 and 1 and 3.

Since recently sometimes the master does not allow me to login anymore, whereas 
I can login fine to 2 and 3. After a few minutes everything comes back to 
normal and it works. 

The master is on centos 7 v4.2 and is still connected to an old 3 replica 
running F21. We plan to disconnect this agreement in the coming weeks.

Does anybody have seen this before or have a clue what could be going on here?

Any help is welcome.

Thank you,
Christophe 

Sent from my iPhone

smime.p7s
Description: S/MIME cryptographic signature
-- 
Manage your subscription for the Freeipa-users mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-users
Go to http://freeipa.org for more info on the project

Re: [Freeipa-users] dns/ldap failing after temporary storage problem

2016-08-19 Thread Tiemen Ruiten
I see lots of messages /var/log/dirsrv/slapd-IPA-RDMEDIA-COM/errors, looks
definitely like an issue with dirsrv.

On 19 August 2016 at 11:43, Tiemen Ruiten  wrote:

> I see I didn't use the right terminology: all four of my FreeIPA servers
> are masters.
>
> On 19 August 2016 at 11:36, Tiemen Ruiten  wrote:
>
>> Hello,
>>
>> I need some help getting one of my replica's to work. Assistance would be
>> much appreciated.
>>
>> After the iSCSI volumes of two replicas of were briefly unavailable, on
>> one of them DNS and LDAP stopped working and replication seems to have
>> stopped. The ipa service failed with a message that an upgrade was
>> required, so I ran ipa-server-upgrade, but it failed due to an empty
>> dse.ldif.
>>
>> Then I probably made a mistake by copying a dse.ldif from another replica
>> and trying to run the upgrade. It worked more or less, but DNS still didn't
>> work.
>>
>> Next I replaced it with an older backup file (from Aug 4) ran the upgrade
>> command again and after some fiddling all services started normally, except
>> ipa-dnskeysyncd:
>>
>> journalctl -u ipa-dnskeysyncd
>>
>> Aug 19 11:28:52 promethium.ipa.rdmedia.com systemd[1]:
>> ipa-dnskeysyncd.service holdoff time over, scheduling restart.
>> Aug 19 11:28:52 promethium.ipa.rdmedia.com systemd[1]: Started IPA key
>> daemon.
>> Aug 19 11:28:52 promethium.ipa.rdmedia.com systemd[1]: Starting IPA key
>> daemon...
>> Aug 19 11:28:52 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]: ipa:
>> WARNING: session memcached servers not running
>> Aug 19 11:28:53 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]: ipa
>>   : INFO LDAP bind...
>> Aug 19 11:28:53 promethium.ipa.rdmedia.com python2[3756]: GSSAPI client
>> step 1
>> Aug 19 11:28:54 promethium.ipa.rdmedia.com python2[3756]: GSSAPI client
>> step 1
>> Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]: ipa
>>   : ERRORLogin to LDAP server failed: {'info': 'SASL(-1): generic
>> failure: GSSAPI Error: Unspecified GSS failure.  Minor code may provide
>> more information (No key table entry found matching
>> ldap/praseodymium.ipa.rdmedia.com@)', 'desc': 'Invalid credentials'}
>> Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]:
>> Traceback (most recent call last):
>> Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]: File
>> "/usr/libexec/ipa/ipa-dnskeysyncd", line 92, in 
>> Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]:
>> ldap_connection.sasl_interactive_bind_s("", ipaldap.SASL_GSSAPI)
>> Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]: File
>> "/usr/lib64/python2.7/site-packages/ldap/ldapobject.py", line 850, in
>> sasl_interactive_bind_s
>> Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]: res =
>> self._apply_method_s(SimpleLDAPObject.sasl_interactive_bind_
>> s,*args,**kwargs)
>> Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]: File
>> "/usr/lib64/python2.7/site-packages/ldap/ldapobject.py", line 818, in
>> _apply_method_s
>> Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]: return
>> func(self,*args,**kwargs)
>> Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]: File
>> "/usr/lib64/python2.7/site-packages/ldap/ldapobject.py", line 229, in
>> sasl_interactive_bind_s
>> Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]: return
>> self._ldap_call(self._l.sasl_interactive_bind_s,who,auth,Req
>> uestControlTuples(serverctrls),RequestControlTuples(clientct
>> rls),sasl_flags)
>> Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]: File
>> "/usr/lib64/python2.7/site-packages/ldap/ldapobject.py", line 99, in
>> _ldap_call
>> Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]: result
>> = func(*args,**kwargs)
>> Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]:
>> INVALID_CREDENTIALS: {'info': 'SASL(-1): generic failure: GSSAPI Error:
>> Unspecified GSS failure.  Minor code may provide more information (No key
>> table entry found matching ldap/praseodymium.ipa.rdmedia.com@)', 'desc':
>> 'Invalid credentials'}
>>
>> praseodymium.ipa.rdmedia.com is the replica I copied the dse.ldif from.
>> DNS and logins to the webinterface on this host are still not working.
>>
>> What can I do to get this replica in working order again?
>>
>> --
>> Tiemen Ruiten
>> Systems Engineer
>> R&D Media
>>
>
>
>
> --
> Tiemen Ruiten
> Systems Engineer
> R&D Media
>



-- 
Tiemen Ruiten
Systems Engineer
R&D Media


errors.gz
Description: GNU Zip compressed data
-- 
Manage your subscription for the Freeipa-users mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-users
Go to http://freeipa.org for more info on the project

Re: [Freeipa-users] dns/ldap failing after temporary storage problem

2016-08-19 Thread Tiemen Ruiten
I see I didn't use the right terminology: all four of my FreeIPA servers
are masters.

On 19 August 2016 at 11:36, Tiemen Ruiten  wrote:

> Hello,
>
> I need some help getting one of my replica's to work. Assistance would be
> much appreciated.
>
> After the iSCSI volumes of two replicas of were briefly unavailable, on
> one of them DNS and LDAP stopped working and replication seems to have
> stopped. The ipa service failed with a message that an upgrade was
> required, so I ran ipa-server-upgrade, but it failed due to an empty
> dse.ldif.
>
> Then I probably made a mistake by copying a dse.ldif from another replica
> and trying to run the upgrade. It worked more or less, but DNS still didn't
> work.
>
> Next I replaced it with an older backup file (from Aug 4) ran the upgrade
> command again and after some fiddling all services started normally, except
> ipa-dnskeysyncd:
>
> journalctl -u ipa-dnskeysyncd
>
> Aug 19 11:28:52 promethium.ipa.rdmedia.com systemd[1]:
> ipa-dnskeysyncd.service holdoff time over, scheduling restart.
> Aug 19 11:28:52 promethium.ipa.rdmedia.com systemd[1]: Started IPA key
> daemon.
> Aug 19 11:28:52 promethium.ipa.rdmedia.com systemd[1]: Starting IPA key
> daemon...
> Aug 19 11:28:52 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]: ipa:
> WARNING: session memcached servers not running
> Aug 19 11:28:53 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]: ipa
> : INFO LDAP bind...
> Aug 19 11:28:53 promethium.ipa.rdmedia.com python2[3756]: GSSAPI client
> step 1
> Aug 19 11:28:54 promethium.ipa.rdmedia.com python2[3756]: GSSAPI client
> step 1
> Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]: ipa
> : ERRORLogin to LDAP server failed: {'info': 'SASL(-1): generic
> failure: GSSAPI Error: Unspecified GSS failure.  Minor code may provide
> more information (No key table entry found matching
> ldap/praseodymium.ipa.rdmedia.com@)', 'desc': 'Invalid credentials'}
> Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]:
> Traceback (most recent call last):
> Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]: File
> "/usr/libexec/ipa/ipa-dnskeysyncd", line 92, in 
> Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]:
> ldap_connection.sasl_interactive_bind_s("", ipaldap.SASL_GSSAPI)
> Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]: File
> "/usr/lib64/python2.7/site-packages/ldap/ldapobject.py", line 850, in
> sasl_interactive_bind_s
> Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]: res =
> self._apply_method_s(SimpleLDAPObject.sasl_interactive_bind_s,*args,**
> kwargs)
> Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]: File
> "/usr/lib64/python2.7/site-packages/ldap/ldapobject.py", line 818, in
> _apply_method_s
> Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]: return
> func(self,*args,**kwargs)
> Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]: File
> "/usr/lib64/python2.7/site-packages/ldap/ldapobject.py", line 229, in
> sasl_interactive_bind_s
> Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]: return
> self._ldap_call(self._l.sasl_interactive_bind_s,who,auth,
> RequestControlTuples(serverctrls),RequestControlTuples(
> clientctrls),sasl_flags)
> Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]: File
> "/usr/lib64/python2.7/site-packages/ldap/ldapobject.py", line 99, in
> _ldap_call
> Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]: result
> = func(*args,**kwargs)
> Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]:
> INVALID_CREDENTIALS: {'info': 'SASL(-1): generic failure: GSSAPI Error:
> Unspecified GSS failure.  Minor code may provide more information (No key
> table entry found matching ldap/praseodymium.ipa.rdmedia.com@)', 'desc':
> 'Invalid credentials'}
>
> praseodymium.ipa.rdmedia.com is the replica I copied the dse.ldif from.
> DNS and logins to the webinterface on this host are still not working.
>
> What can I do to get this replica in working order again?
>
> --
> Tiemen Ruiten
> Systems Engineer
> R&D Media
>



-- 
Tiemen Ruiten
Systems Engineer
R&D Media
-- 
Manage your subscription for the Freeipa-users mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-users
Go to http://freeipa.org for more info on the project

[Freeipa-users] dns/ldap failing after temporary storage problem

2016-08-19 Thread Tiemen Ruiten
Hello,

I need some help getting one of my replica's to work. Assistance would be
much appreciated.

After the iSCSI volumes of two replicas of were briefly unavailable, on one
of them DNS and LDAP stopped working and replication seems to have stopped.
The ipa service failed with a message that an upgrade was required, so I
ran ipa-server-upgrade, but it failed due to an empty dse.ldif.

Then I probably made a mistake by copying a dse.ldif from another replica
and trying to run the upgrade. It worked more or less, but DNS still didn't
work.

Next I replaced it with an older backup file (from Aug 4) ran the upgrade
command again and after some fiddling all services started normally, except
ipa-dnskeysyncd:

journalctl -u ipa-dnskeysyncd

Aug 19 11:28:52 promethium.ipa.rdmedia.com systemd[1]:
ipa-dnskeysyncd.service holdoff time over, scheduling restart.
Aug 19 11:28:52 promethium.ipa.rdmedia.com systemd[1]: Started IPA key
daemon.
Aug 19 11:28:52 promethium.ipa.rdmedia.com systemd[1]: Starting IPA key
daemon...
Aug 19 11:28:52 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]: ipa:
WARNING: session memcached servers not running
Aug 19 11:28:53 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]: ipa
  : INFO LDAP bind...
Aug 19 11:28:53 promethium.ipa.rdmedia.com python2[3756]: GSSAPI client
step 1
Aug 19 11:28:54 promethium.ipa.rdmedia.com python2[3756]: GSSAPI client
step 1
Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]: ipa
  : ERRORLogin to LDAP server failed: {'info': 'SASL(-1): generic
failure: GSSAPI Error: Unspecified GSS failure.  Minor code may provide
more information (No key table entry found matching
ldap/praseodymium.ipa.rdmedia.com@)', 'desc': 'Invalid credentials'}
Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]: Traceback
(most recent call last):
Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]: File
"/usr/libexec/ipa/ipa-dnskeysyncd", line 92, in 
Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]:
ldap_connection.sasl_interactive_bind_s("", ipaldap.SASL_GSSAPI)
Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]: File
"/usr/lib64/python2.7/site-packages/ldap/ldapobject.py", line 850, in
sasl_interactive_bind_s
Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]: res =
self._apply_method_s(SimpleLDAPObject.sasl_interactive_bind_s,*args,**kwargs)
Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]: File
"/usr/lib64/python2.7/site-packages/ldap/ldapobject.py", line 818, in
_apply_method_s
Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]: return
func(self,*args,**kwargs)
Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]: File
"/usr/lib64/python2.7/site-packages/ldap/ldapobject.py", line 229, in
sasl_interactive_bind_s
Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]: return
self._ldap_call(self._l.sasl_interactive_bind_s,who,auth,RequestControlTuples(serverctrls),RequestControlTuples(clientctrls),sasl_flags)
Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]: File
"/usr/lib64/python2.7/site-packages/ldap/ldapobject.py", line 99, in
_ldap_call
Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]: result =
func(*args,**kwargs)
Aug 19 11:28:55 promethium.ipa.rdmedia.com ipa-dnskeysyncd[3756]:
INVALID_CREDENTIALS: {'info': 'SASL(-1): generic failure: GSSAPI Error:
Unspecified GSS failure.  Minor code may provide more information (No key
table entry found matching ldap/praseodymium.ipa.rdmedia.com@)', 'desc':
'Invalid credentials'}

praseodymium.ipa.rdmedia.com is the replica I copied the dse.ldif from. DNS
and logins to the webinterface on this host are still not working.

What can I do to get this replica in working order again?

-- 
Tiemen Ruiten
Systems Engineer
R&D Media
-- 
Manage your subscription for the Freeipa-users mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-users
Go to http://freeipa.org for more info on the project

Re: [Freeipa-users] Freeipa 4.2.0 hangs intermittently

2016-08-19 Thread Petr Spacek
On 18.8.2016 17:23, Rakesh Rajasekharan wrote:
> Hi
> 
> I am migrating to freeipa from openldap and have around 4000 clients
> 
> I had openned a another thread on that, but chose to start a new one here
> as its a separate issue
> 
> I was able to change the nssslapd-maxdescriptors adding an ldif file
> 
> cat nsslapd-modify.ldif
> dn: cn=config
> changetype: modify
> replace: nsslapd-maxdescriptors
> nsslapd-maxdescriptors: 17000
> 
> and running the ldapmodify command
> 
> I have now started moving clients running an openldap to Freeipa and have
> today moved close to 2000 clients
> 
> However, I have noticed that IPA hangs intermittently.
> 
> running a kinit admin returns the below error
> kinit: Generic error (see e-text) while getting initial credentials
> 
> from the /var/log/messages, I see this entry
> 
>  prod-ipa-master-int kernel: [104090.315801] TCP: request_sock_TCP:
> Possible SYN flooding on port 88. Sending cookies.  Check SNMP counters.

I would be worried about this message. Maybe kernel/firewall is doing
something fishy behind your back and blocking some connections or so.

Petr^2 Spacek


> Aug 18 13:00:01 prod-ipa-master-int systemd[1]: Started Session 4885 of
> user root.
> Aug 18 13:00:01 prod-ipa-master-int systemd[1]: Starting Session 4885 of
> user root.
> Aug 18 13:01:01 prod-ipa-master-int systemd[1]: Started Session 4886 of
> user root.
> Aug 18 13:01:01 prod-ipa-master-int systemd[1]: Starting Session 4886 of
> user root.
> Aug 18 13:02:40 prod-ipa-master-int python[28984]: ansible-command Invoked
> with creates=None executable=None shell=True args= removes=None warn=True
> chdir=None
> Aug 18 13:04:37 prod-ipa-master-int sssd_be: GSSAPI Error: Unspecified GSS
> failure.  Minor code may provide more information (KDC returned error
> string: PROCESS_TGS)
> 
> Could it be possible that its due to the initial load of adding the clients
> or is there something else that I need to take care of.
> 
> Thanks,
> 
> Rakesh

-- 
Manage your subscription for the Freeipa-users mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-users
Go to http://freeipa.org for more info on the project


Re: [Freeipa-users] Admin password no more working

2016-08-19 Thread Martin Kosek
On 08/18/2016 04:16 PM, Deepak Dimri wrote:
> Hi All,
> 
> While trying to automate IPA client registration programatically, i seems 
> have 
> made my admin password out of sync between KDC and
> /etc/krb5.keytab.

This looks confusing, admin password and /etc/krb5.keytab do not look related.
The keytab is for host keytab.

> Now when i try login into ipa GUI via admin i am getting "The 
> password or username is incorrect" - though i am trying with the correct 
> password that i have been using. Is there anyway i can login to GUI in this 
> situation? Is there anyway i can get my admin password reseted or something? 
> i 
> can run my ansible playbooks w/out any issues on the linux host but cannot 
> login 
> to GUI any more...

Can you log in to GUI with other logins. If not, then check this page:
http://www.freeipa.org/page/Troubleshooting#Cannot_authenticate_to_Web_UI

Martin

-- 
Manage your subscription for the Freeipa-users mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-users
Go to http://freeipa.org for more info on the project