Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

WARNING - Could not identify object type for object: 3 #660

Open
twelvepencils opened this issue Jan 28, 2022 · 0 comments
Open

WARNING - Could not identify object type for object: 3 #660

twelvepencils opened this issue Jan 28, 2022 · 0 comments

Comments

@twelvepencils
Copy link

I'm using PyKIMP with vSphere 6.7 in a lab environment and I've hit a issue when trying to unlock my encrypted VMs. I used this guide to get it setup and working.

After a power cycle I am no longer able to unlock these VMs in vSphere. I get a "The operation is not allowed in the current state. Key 3/pykmip not found"

I tailed /var/log/pykkmip/server.log while in debug mode and it looks like the server cannot identify object type for this VM. See Line 87 below. Looking for help on this error.

    51  2022-01-28 15:59:27,608 - kmip.server - INFO - Receiving incoming connection from: 192.168.98.164:44546
    52  2022-01-28 15:59:27,609 - kmip.server - INFO - Dedicating session 00000040 to 192.168.98.164:44546
    53  2022-01-28 15:59:27,609 - kmip.server.session.00000040 - INFO - Starting session: 00000040
    54  2022-01-28 15:59:27,625 - kmip.server.session.00000040 - DEBUG - Request encoding: b'4200780100000060'
    55  2022-01-28 15:59:27,625 - kmip.server.session.00000040 - DEBUG - Request encoding: b'4200770100000038420069010000002042006a0200000004000000010000000042006b0200000004000000010000000042000d0200000004000000010000000042000f010000001842005c05000000040000001e000000004200790100000000'
    56  2022-01-28 15:59:27,625 - kmip.server.session.00000040 - DEBUG - Possible session ciphers: 6
    57  2022-01-28 15:59:27,625 - kmip.server.session.00000040 - DEBUG - ('TLS_AES_256_GCM_SHA384', 'TLSv1.3', 256)
    58  2022-01-28 15:59:27,625 - kmip.server.session.00000040 - DEBUG - ('TLS_CHACHA20_POLY1305_SHA256', 'TLSv1.3', 256)
    59  2022-01-28 15:59:27,625 - kmip.server.session.00000040 - DEBUG - ('TLS_AES_128_GCM_SHA256', 'TLSv1.3', 128)
    60  2022-01-28 15:59:27,625 - kmip.server.session.00000040 - DEBUG - ('AES256-SHA256', 'TLSv1.2', 256)
    61  2022-01-28 15:59:27,625 - kmip.server.session.00000040 - DEBUG - ('AES128-SHA256', 'TLSv1.2', 128)
    62  2022-01-28 15:59:27,625 - kmip.server.session.00000040 - DEBUG - ('ECDHE-ECDSA-AES256-SHA384', 'TLSv1.2', 256)
    63  2022-01-28 15:59:27,626 - kmip.server.session.00000040 - DEBUG - Session cipher selected: ('AES256-SHA256', 'TLSv1.2', 256)
    64  2022-01-28 15:59:27,626 - kmip.server.session.00000040 - DEBUG - No authentication plugins are enabled. The client identity will be extracted from the client certificate.
    65  2022-01-28 15:59:27,626 - kmip.server.session.00000040 - DEBUG - Extraction succeeded for client identity: 192.168.98.211
    66  2022-01-28 15:59:27,626 - kmip.server.session.00000040 - INFO - Session client identity: 192.168.98.211
    67  2022-01-28 15:59:27,627 - kmip.server.engine - DEBUG - Request specified KMIP version: 1.1
    68  2022-01-28 15:59:27,627 - kmip.server.engine - INFO - Received request at time: 2022-01-28 20:59:27
    69  2022-01-28 15:59:27,627 - kmip.server.engine - INFO - Processing operation: DiscoverVersions
    70  2022-01-28 15:59:27,627 - kmip.server.session.00000040 - DEBUG - Response encoding: b'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'
    71  2022-01-28 15:59:27,629 - kmip.server.session.00000040 - DEBUG - Request encoding: b'42007801000000d8'
    72  2022-01-28 15:59:27,629 - kmip.server.session.00000040 - DEBUG - Request encoding: b'4200770100000090420069010000002042006a0200000004000000010000000042006b0200000004000000010000000042000c0100000050420023010000004842002405000000040000000100000000420025010000003042009907000000086b6d732d757365724200a107000000182e3a5869673779404e682c26424c44335a26232e533a333642000d0200000004000000010000000042000f010000003842005c05000000040000000a000000004200930800000008514c4b4301000000420079010000001042009407000000013300000000000000'
    73  2022-01-28 15:59:27,629 - kmip.server.session.00000040 - DEBUG - Possible session ciphers: 6
    74  2022-01-28 15:59:27,629 - kmip.server.session.00000040 - DEBUG - ('TLS_AES_256_GCM_SHA384', 'TLSv1.3', 256)
    75  2022-01-28 15:59:27,629 - kmip.server.session.00000040 - DEBUG - ('TLS_CHACHA20_POLY1305_SHA256', 'TLSv1.3', 256)
    76  2022-01-28 15:59:27,629 - kmip.server.session.00000040 - DEBUG - ('TLS_AES_128_GCM_SHA256', 'TLSv1.3', 128)
    77  2022-01-28 15:59:27,629 - kmip.server.session.00000040 - DEBUG - ('AES256-SHA256', 'TLSv1.2', 256)
    78  2022-01-28 15:59:27,629 - kmip.server.session.00000040 - DEBUG - ('AES128-SHA256', 'TLSv1.2', 128)
    79  2022-01-28 15:59:27,629 - kmip.server.session.00000040 - DEBUG - ('ECDHE-ECDSA-AES256-SHA384', 'TLSv1.2', 256)
    80  2022-01-28 15:59:27,629 - kmip.server.session.00000040 - DEBUG - Session cipher selected: ('AES256-SHA256', 'TLSv1.2', 256)
    81  2022-01-28 15:59:27,630 - kmip.server.session.00000040 - DEBUG - No authentication plugins are enabled. The client identity will be extracted from the client certificate.
    82  2022-01-28 15:59:27,630 - kmip.server.session.00000040 - DEBUG - Extraction succeeded for client identity: 192.168.98.211
    83  2022-01-28 15:59:27,630 - kmip.server.session.00000040 - INFO - Session client identity: 192.168.98.211
    84  2022-01-28 15:59:27,630 - kmip.server.engine - DEBUG - Request specified KMIP version: 1.1
    85  2022-01-28 15:59:27,630 - kmip.server.engine - INFO - Received request at time: 2022-01-28 20:59:27
    86  2022-01-28 15:59:27,630 - kmip.server.engine - INFO - Processing operation: Get
    87  2022-01-28 15:59:27,632 - kmip.server.engine - WARNING - Could not identify object type for object: 3
    88  2022-01-28 15:59:27,632 - kmip.server.session.00000040 - DEBUG - Response encoding: b'42007b01000000c042007a0100000048420069010000002042006a0200000004000000010000000042006b0200000004000000010000000042009209000000080000000061f4592f42000d0200000004000000010000000042000f010000006842005c05000000040000000a000000004200930800000008514c4b430100000042007f0500000004000000010000000042007e0500000004000000010000000042007d070000001a436f756c64206e6f74206c6f63617465206f626a6563743a2033000000000000'
    89  2022-01-28 15:59:27,632 - kmip.server.session.00000040 - INFO - Stopping session: 00000040
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant