Hello, I had to reinstall our IPA server since we had Filesystem corruption beyond repair on it.
After the reinstall (with ipa-replica-install) AD Trust does not seems to be working anymore. I tried to delete the trust and them re add it but there's no effect. Here's the outputs: [root@idm1 ~]# ipa-adtrust-install --add-agents The log file for this installation can be found in /var/log/ipaserver-adtrust-install.log ============================================================================== This program will setup components needed to establish trust to AD domains for the IPA Server. This includes: * Configure Samba * Add trust related objects to IPA LDAP server To accept the default shown in brackets, press the Enter key. Configuring cross-realm trusts for IPA server requires password for user 'admin'. This user is a regular system account used for IPA server administration. admin password: IPA generated smb.conf detected. Overwrite smb.conf? [no]: yes Do you want to enable support for trusted domains in Schema Compatibility plugin? This will allow clients older than SSSD 1.9 and non-Linux clients to work with trusted users. Enable trusted domains support in slapi-nis? [no]: yes The following operations may take some minutes to complete. Please wait until the prompt is returned. Configuring CIFS [1/24]: validate server hostname [2/24]: stopping smbd [3/24]: creating samba domain object Samba domain object already exists [4/24]: retrieve local idmap range [5/24]: writing samba config file [6/24]: creating samba config registry [7/24]: adding cifs Kerberos principal [8/24]: adding cifs and host Kerberos principals to the adtrust agents group [9/24]: check for cifs services defined on other replicas [10/24]: adding cifs principal to S4U2Proxy targets cifs principal already targeted, nothing to do. [11/24]: adding admin(group) SIDs Admin SID already set, nothing to do Admin group SID already set, nothing to do [12/24]: adding RID bases RID bases already set, nothing to do [13/24]: updating Kerberos config 'dns_lookup_kdc' already set to 'true', nothing to do. [14/24]: activating CLDAP plugin CLDAP plugin already configured, nothing to do [15/24]: activating sidgen task Sidgen task plugin already configured, nothing to do [16/24]: map BUILTIN\Guests to nobody group [17/24]: configuring smbd to start on boot [18/24]: enabling trusted domains support for older clients via Schema Compatibility plugin [19/24]: restarting Directory Server to take MS PAC and LDAP plugins changes into account [20/24]: adding fallback group Fallback group already set, nothing to do [21/24]: adding Default Trust View Default Trust View already exists. [22/24]: setting SELinux booleans [23/24]: starting CIFS services [24/24]: restarting smbd Done configuring CIFS. ============================================================================= Setup complete You must make sure these network ports are open: TCP Ports: * 135: epmap * 138: netbios-dgm * 139: netbios-ssn * 445: microsoft-ds * 1024..1300: epmap listener range * 3268: msft-gc UDP Ports: * 138: netbios-dgm * 139: netbios-ssn * 389: (C)LDAP * 445: microsoft-ds See the ipa-adtrust-install(1) man page for more details ============================================================================= Doing the trust add since the last command didn't added it: [root@idm1 ~]# ipa trust-add win.versatushpc.com.br<http://win.versatushpc.com.br> Active Directory domain administrator: Administrator Active Directory domain administrator's password: --------------------------------------------------------------- Added Active Directory trust for realm "win.versatushpc.com.br<http://win.versatushpc.com.br>" --------------------------------------------------------------- Realm name: win.versatushpc.com.br<http://win.versatushpc.com.br> Domain NetBIOS name: VersatusHPC Domain Security Identifier: S-1-5-21-3644117338-1171143469-618167831 Trust direction: Trusting forest Trust type: Active Directory domain Trust status: Established and verified Fetch domains return 0: [root@idm1 ~]# ipa trust-fetch-domains win.versatushpc.com.br<http://win.versatushpc.com.br> ---------------------------------------------------------------------------------------- List of trust domains successfully refreshed. Use trustdomain-find command to list them. ---------------------------------------------------------------------------------------- ---------------------------- Number of entries returned 0 ---------------------------- But trustdomain-find is able to find the domain: [root@idm1 ~]# ipa trustdomain-find Realm name: win.versatushpc.com.br<http://win.versatushpc.com.br> Domain name: win.versatushpc.com.br<http://win.versatushpc.com.br> Domain NetBIOS name: VersatusHPC Domain Security Identifier: S-1-5-21-3644117338-1171143469-618167831 Domain enabled: True ---------------------------- Number of entries returned 1 ---------------------------- Healthcheck complains about those issues: [root@idm1 ~]# ipa-healthcheck --all --output-type human | grep -v SUCCESS WARNING: ipahealthcheck.ipa.trust.IPATrustCatalogCheck.S-1-5-21-3644117338-1171143469-618167831: Look up of S-1-5-21-3644117338-1171143469-618167831 returned nothing ERROR: ipahealthcheck.ipa.trust.IPATrustCatalogCheck.AD Global Catalog: AD Global Catalog not found in /usr/sbin/sssctl 'domain-status' output: Active servers: IPA: idm1.nix.versatushpc.com.br<http://idm1.nix.versatushpc.com.br> ERROR: ipahealthcheck.ipa.trust.IPATrustCatalogCheck.AD Domain Controller: AD Domain Controller not found in /usr/sbin/sssctl 'domain-status' output: Active servers: IPA: idm1.nix.versatushpc.com.br<http://idm1.nix.versatushpc.com.br> And finally we had an DNA Range issue, but I was able to solve it with this guide: https://rcritten.wordpress.com/2015/01/05/freeipa-and-no-dna-range/ [root@idm2 ~]# ipa-replica-manage dnarange-show idm1.nix.versatushpc.com.br<http://idm1.nix.versatushpc.com.br>: 1278400006-1278499999 idm2.nix.versatushpc.com.br<http://idm2.nix.versatushpc.com.br>: 1278400000-1278499999 Seems to be OK, I think... I'm running IPA on RHEL 8.4. If it's easier to just remove IPA and reinstall from scratch, that's OK. This is a development system, the same goes for the Windows domain. Thank you all.
_______________________________________________ FreeIPA-users mailing list -- freeipa-users@lists.fedorahosted.org To unsubscribe send an email to freeipa-users-le...@lists.fedorahosted.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedorahosted.org/archives/list/freeipa-users@lists.fedorahosted.org Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure