| Summary: | [RHEVM][hosted engine] SSH authentication failed during install | ||||||
|---|---|---|---|---|---|---|---|
| Product: | Red Hat Enterprise Virtualization Manager | Reporter: | Martin Pavlik <mpavlik> | ||||
| Component: | ovirt-hosted-engine-setup | Assignee: | Sandro Bonazzola <sbonazzo> | ||||
| Status: | CLOSED ERRATA | QA Contact: | movciari | ||||
| Severity: | high | Docs Contact: | |||||
| Priority: | high | ||||||
| Version: | 3.3.0 | CC: | alonbl, dfediuck, didi, gklein, iheim, jbelka, lyarwood, oschreib, pablo.iranzo, pstehlik, scohen | ||||
| Target Milestone: | --- | Keywords: | Triaged | ||||
| Target Release: | 3.3.0 | ||||||
| Hardware: | Unspecified | ||||||
| OS: | Unspecified | ||||||
| Whiteboard: | integration | ||||||
| Fixed In Version: | ovirt-hosted-engine-setup-1.0.0-0.10.1.rc.el6ev | Doc Type: | Bug Fix | ||||
| Doc Text: | Story Points: | --- | |||||
| Clone Of: | Environment: | ||||||
| Last Closed: | 2014-01-21 16:55:49 UTC | Type: | Bug | ||||
| Regression: | --- | Mount Type: | --- | ||||
| Documentation: | --- | CRM: | |||||
| Verified Versions: | Category: | --- | |||||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
| Cloudforms Team: | --- | Target Upstream Version: | |||||
| Attachments: |
|
||||||
|
Description
Martin Pavlik
2013-11-26 14:04:41 UTC
This seems to be a change in rhel 6.5 behavior. The reason is that sshd is unable to access the root authorized_keys which so far had 0600 permissions. It is missing a read permission for others to make it work: [26/11/2013 15:02:26] <doron> Before" [26/11/2013 15:02:29] <doron> -rw-------. 1 root root 409 Nov 26 14:59 /root/.ssh/authorized_keys [26/11/2013 15:02:31] <doron> After: [26/11/2013 15:02:37] <doron> -rw-r--r--. 1 root root 409 Nov 26 14:59 /root/.ssh/authorized_keys [26/11/2013 15:02:42] <doron> now: [26/11/2013 15:02:59] <doron> root@hosted-doron ~]# ssh -i /etc/pki/ovirt-engine/keys/engine_id_rsa root.com [26/11/2013 15:02:59] <doron> Last login: Tue Nov 26 15:00:40 2013 from hosted-doron.redhat.com [26/11/2013 15:02:59] <doron> [root@sla-xxx ~] type=AVC msg=audit(1385478716.042:4900): avc: denied { read } for pid=32586 comm="sshd" name="authorized_keys" dev=dm-0 ino=3801109 scontext=unconfined_u:sy
stem_r:sshd_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:admin_home_t:s0 tclass=file
# restorecon -RFv /root restorecon reset /root/.rnd context unconfined_u:object_r:admin_home_t:s0->system_u:object_r:admin_home_t:s0 restorecon reset /root/.lesshst context unconfined_u:object_r:admin_home_t:s0->system_u:object_r:admin_home_t:s0 restorecon reset /root/.Xauthority context unconfined_u:object_r:xauth_home_t:s0->system_u:object_r:xauth_home_t:s0 restorecon reset /root/.bash_history context unconfined_u:object_r:admin_home_t:s0->system_u:object_r:admin_home_t:s0 restorecon reset /root/answerfile context unconfined_u:object_r:admin_home_t:s0->system_u:object_r:admin_home_t:s0 restorecon reset /root/.ssh context unconfined_u:object_r:admin_home_t:s0->system_u:object_r:ssh_home_t:s0 restorecon reset /root/.ssh/authorized_keys context unconfined_u:object_r:admin_home_t:s0->system_u:object_r:ssh_home_t:s0 restorecon reset /root/.recently-used.xbel context unconfined_u:object_r:admin_home_t:s0->system_u:object_r:admin_home_t:s0 and it works now. (In reply to Jiri Belka from comment #3) > # restorecon -RFv /root [cut] > restorecon reset /root/.ssh context > unconfined_u:object_r:admin_home_t:s0->system_u:object_r:ssh_home_t:s0 > restorecon reset /root/.ssh/authorized_keys context > unconfined_u:object_r:admin_home_t:s0->system_u:object_r:ssh_home_t:s0 thanks! so it's a selinux issue not an access mode issue. We'll need to check also AIO plugin for ensuring it's not affected too. Patches merged on upstream master and 1.0 branches. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. http://rhn.redhat.com/errata/RHBA-2014-0083.html |