Problem with domain join after deployement
-
@benjamind Sorry, my fault. I went down the wrong road. CA cert should not be renewed (unless you specify so using command line options) but the server cert is renewed on FOG updates.
We might need to take a look into your database to see if there are tokens pending that you don’t see in the host settings.
-
@Sebastian-Roth What do you want to verify precisely on the database ?
-
@benjamind Try
SELECT hostID,hostName,hostSecToken FROM hosts WHERE hostName LIKE '%PC2409M%';
-
MariaDB [fog]> SELECT hostID,hostName,hostSecToken FROM hosts WHERE hostName LIKE ‘%PC2409M%’;
+------------+-------------------+-------------------------+ | hostID | hostName | hostSecToken | +------------+-------------------+-------------------------+ | 61 | PC2409M | | +------------+-------------------+-------------------------+
-
Hi @Sebastian-Roth,
Is the result of the command indicative ?
-
@benjamind Sorry for the deplay. Have been on travels over the weekend. The output is showing an empty sectoken field. So we need to look at other possibilites why this is going wrong.
We have not had much requests from people with the error message “Failed to decrypt data” lately. All the old ones were due to an issue in the FOG server as far as I know but that shouldn’t be the case with FOG version 1.5.5 (which we see you have in the logs).
Do you see that same error message on several (or all) of your clients?
Could you please install tcpdump on your FOG server. Then stop the FOGService on your client run
tcpdump -w fog-client.pcap host x.x.x.x and port 80
on your FOG server and start the FOGService on the client.Put in the client PC’s IP address instead of x.x.x.x and just leave the command for 30 seconds - then stop it with Ctrl+c and upload the resulting fog-client.pcap file to an online drive and post a link here. We should see the HTTP communication between FOG server and your client in that file. Hopefully we can figure out what’s going on.
-
@Sebastian-Roth We have the same error message on other clients. Here is the fog.log fog.log of an other client.
Thnak you for your help.
-
@benjamind Ohhh, I was on the wrong track again. I expected the error message to be from the fog-client source code but looking at the PCAP file I figured that the FOG server is actually sending this (same) message to the fog-client. I am still not really sure why the FOG server is failing with that error but at least the picture is a little different now. The fog-client encrypts the data and sends it over to the server and the server is unable to decrypt it.
Please run the following commands on your FOG server just to make sure certificate and private key match:
openssl x509 -noout -modulus -in /var/www/fog/management/other/ssl/srvpublic.crt | openssl md5 openssl rsa -noout -modulus -in /opt/fog/snapins/ssl/.srvprivate.key | openssl md5
-
root@fog-dev:~# openssl x509 -noout -modulus -in /var/www/fog/management/other/ssl/srvpublic.crt | openssl md5
(stdin)= 6bf7b33e8a206b266560c17350102ffa
root@fog-dev:~# openssl rsa -noout -modulus -in /opt/fog/snapins/ssl/.srvprivate.key | openssl md5
(stdin)= 240adcef143c7ba2a2b4551282f476f9 -
@benjamind Ok, here we’ve found it. The certificate (
srvpublic.crt
) and the private key (.srvprivate.key
) don’t match. I have no idea why that might have happened. But we should be able to manually create a new certificate for you and fix this issue. You just need to closely follow the instructions (run as root):Make sure you set the variables (first two commands) correctly!! IP address instead of x.x.x.x and the proper full qualified hostname of the FOG server.
export ipaddress=x.x.x.x export hostname=fog-dev.lan.esiee.fr mv /var/www/fog/management/other/ssl/srvpublic.crt /var/www/fog/management/other/ssl/srvpublic.crt.old cd /opt/fog/snapins/ssl/ cat > req.cnf << EOF [req] distinguished_name = req_distinguished_name req_extensions = v3_req prompt = yes [req_distinguished_name] CN = $ipaddress [v3_req] subjectAltName = @alt_names [alt_names] DNS.1 = $ipaddress DNS.2 = $hostname EOF cat > ca.cnf << EOF [v3_ca] subjectAltName = @alt_names [alt_names] DNS.1 = $ipaddress DNS.2 = $hostname EOF openssl req -new -sha512 -key .srvprivate.key -out fog.csr -config req.cnf openssl x509 -req -in fog.csr -CA CA/.fogCA.pem -CAkey CA/.fogCA.key -CAcreateserial -out /var/www/fog/management/other/ssl/srvpublic.crt -days 3650 -extensions v3_ca -extfile ca.cnf
After that check to see if the new certificate returns the same md5 hash as the private key file.
openssl x509 -noout -modulus -in /var/www/fog/management/other/ssl/srvpublic.crt | openssl md5 openssl rsa -noout -modulus -in /opt/fog/snapins/ssl/.srvprivate.key | openssl md5
-
It seems to be better :
root@fog-dev:~# openssl x509 -noout -modulus -in /var/www/fog/management/other/ssl/srvpublic.crt | openssl md5
(stdin)= 240adcef143c7ba2a2b4551282f476f9
root@fog-dev:~# openssl rsa -noout -modulus -in /opt/fog/snapins/ssl/.srvprivate.key | openssl md5
(stdin)= 240adcef143c7ba2a2b4551282f476f9I have started a new deployment i’ll keep you update.
Thank you.
-
@Sebastian-Roth The deployment is finished and the PC has correctly joined the domain.
Here is the logs file : fog.log.
Does everything seems good to you ?
Thank you very much for your help.
-
@benjamind Yes definitely looking better now. Seems all fine to me. Marking as solved.
-
@Sebastian-Roth Great !!! Thank you again.