Bug 1194302

Summary: With empty ipaselinuxusermapdefault security context on client is staff_u
Product: Red Hat Enterprise Linux 6 Reporter: Martin Kosek <mkosek>
Component: sssdAssignee: SSSD Maintainers <sssd-maint>
Status: CLOSED ERRATA QA Contact: Kaushik Banerjee <kbanerje>
Severity: unspecified Docs Contact:
Priority: medium    
Version: 6.7CC: grajaiya, jgalipea, jhrozek, kbanerje, lmiksik, lslebodn, mkosek, mvarun, mzidek, nsoman, pbrezina, preichl, rcritten, sgoveas
Target Milestone: rcKeywords: Regression
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: sssd-1.12.4-7.el6 Doc Type: Bug Fix
Doc Text:
No documentation needed
Story Points: ---
Clone Of: 1192314 Environment:
Last Closed: 2015-07-22 06:43:12 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1192314, 1198480    
Bug Blocks:    

Comment 3 Martin Kosek 2015-03-04 09:58:17 UTC
*** Bug 1198480 has been marked as a duplicate of this bug. ***

Comment 4 Jakub Hrozek 2015-03-04 19:00:59 UTC
* master: 01f78f755fde63997ccfded71fb8395569b11430
* sssd-1-12: 90efb3c2a48146d7b6cc81fe8422e9024144402a

Comment 6 Varun Mylaraiah 2015-04-14 08:36:41 UTC
Verified in version
sssd-1.12.4-25.el6.x86_64

::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
:: [   LOG    ] :: ipa_trust_func_selinuxusermap_master_008_setup: AD user associated with empty selinuxusermap on Master
::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

:: [  BEGIN   ] :: Running 'kdestroy -A'
:: [   PASS   ] :: Command 'kdestroy -A' (Expected 0, got 0)
:: [  BEGIN   ] :: Running 'echo Secret123 | kinit admin'
Password for admin: 
:: [   PASS   ] :: Command 'echo Secret123 | kinit admin' (Expected 0, got 0)
:: [  BEGIN   ] :: Running 'ipa config-mod --ipaselinuxusermapdefault='
  Maximum username length: 32
  Home directory base: /home
  Default shell: /bin/sh
  Default users group: ipausers
  Default e-mail domain: slnx2k12r2.test
  Search time limit: 2
  Search size limit: 100
  User search fields: uid,givenname,sn,telephonenumber,ou,title
  Group search fields: cn,description
  Enable migration mode: FALSE
  Certificate Subject base: O=SLNX2K12R2.TEST
  Password Expiration Notification (days): 4
  Password plugin features: AllowNThash
  SELinux user map order: guest_u:s0$xguest_u:s0$user_u:s0$staff_u:s0-s0:c0.c1023$unconfined_u:s0-s0:c0.c1023
  Default PAC types: nfs:NONE, MS-PAC
:: [   PASS   ] :: Command 'ipa config-mod --ipaselinuxusermapdefault=' (Expected 0, got 0)
:: [  BEGIN   ] :: Running 'ipa config-show > /tmp/tmpout.txt 2>&1'
:: [   PASS   ] :: Command 'ipa config-show > /tmp/tmpout.txt 2>&1' (Expected 0, got 0)
:: [   PASS   ] :: File '/tmp/tmpout.txt' should not contain 'Default SELinux user' 
:: [  BEGIN   ] :: Running 'ssh -o StrictHostKeyChecking=no root.test         'service sssd stop; rm -rf /var/lib/sssd/{db,mc}/*; service sssd start''
Redirecting to /bin/systemctl stop  sssd.service
Redirecting to /bin/systemctl start  sssd.service
:: [   PASS   ] :: Command 'ssh -o StrictHostKeyChecking=no root.test         'service sssd stop; rm -rf /var/lib/sssd/{db,mc}/*; service sssd start'' (Expected 0, got 0)
:: [  BEGIN   ] :: Running 'ssh -o StrictHostKeyChecking=no root.test         'service sssd stop; rm -rf /var/lib/sssd/{db,mc}/*; service sssd start''
Stopping sssd: [  OK  ]
Starting sssd: [  OK  ]
:: [   PASS   ] :: Command 'ssh -o StrictHostKeyChecking=no root.test         'service sssd stop; rm -rf /var/lib/sssd/{db,mc}/*; service sssd start'' (Expected 0, got 0)
:: [  BEGIN   ] :: Running 'ssh -o StrictHostKeyChecking=no root.test         'service sssd stop; rm -rf /var/lib/sssd/{db,mc}/*; service sssd start''
Stopping sssd: [  OK  ]
Starting sssd: [  OK  ]
:: [   PASS   ] :: Command 'ssh -o StrictHostKeyChecking=no root.test         'service sssd stop; rm -rf /var/lib/sssd/{db,mc}/*; service sssd start'' (Expected 0, got 0)
:: [  BEGIN   ] :: Running 'sleep 10'
:: [   PASS   ] :: Command 'sleep 10' (Expected 0, got 0)
:: [ 18:28:12 ] :: Running remotehost-sync-set -s '75.' -m ipaqavmf.idmqe.lab.eng.bos.redhat.com
:: [  BEGIN   ] :: Running 'remotehost-sync-set -s '75.' -m ipaqavmf.idmqe.lab.eng.bos.redhat.com'
remotehost-sync-set -s 75. -m ipaqavmf.idmqe.lab.eng.bos.redhat.com
root     22993 13317  0 16:32 ?        00:00:02 python -m SimpleHTTPServer 8907
:: [   PASS   ] :: Command 'remotehost-sync-set -s '75.' -m ipaqavmf.idmqe.lab.eng.bos.redhat.com' (Expected 0, got 0)
'0b3577b5-6d4d-42da-939f-ca2eb6fe0a03'
ipa-trust-func-selinuxusermap-master-008-setup-AD-user-associated-with-empty-selinuxusermap-on-Master result: PASS
   metric: 0
   Log: /var/tmp/beakerlib-29737519/journal.txt
    Info: Searching AVC errors produced since 1428964068.98 (Mon Apr 13 18:27:48 2015)
     Searching logs...
     Info: No AVC messages found.
 Writing to /mnt/testarea/tmp.XoTKtp
:
   AvcLog: /mnt/testarea/tmp.XoTKtp


::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
:: [   LOG    ] :: ipa_trust_func_selinuxusermap_client1_008: AD user associated with empty selinuxusermap on Master
::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

:: [  BEGIN   ] :: Running 'kdestroy -A'
:: [   PASS   ] :: Command 'kdestroy -A' (Expected 0, got 0)
:: [  BEGIN   ] :: Running 'echo Secret123 | kinit admin'
Password for admin: 
:: [   PASS   ] :: Command 'echo Secret123 | kinit admin' (Expected 0, got 0)
:: [  BEGIN   ] :: Running 'getent -s sss passwd au104131712'
au104131712:*:346202185:346202185:au104131712:/home/ipaad2012r2.test/au104131712:
:: [   PASS   ] :: Command 'getent -s sss passwd au104131712' (Expected 0, got 0)
:: [  BEGIN   ] :: Running 'sleep 10'
:: [   PASS   ] :: Command 'sleep 10' (Expected 0, got 0)
:: [  BEGIN   ] :: Running 'verify_ssh_auth_success_selinuxuser au104131712 Secret123 ipaqavmf.slnx2k12r2.test unconfined_u:.*s0-s0:c0.c1023'
:: [   PASS   ] :: Authentication successful for au104131712 
:: [  BEGIN   ] :: Running 'cat /tmp/tmpfile.out'
spawn ssh -l au104131712 ipaqavmf.slnx2k12r2.test id -Z
au104131712@ipaqavmf.slnx2k12r2.test's password: 
unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023
:: [   PASS   ] :: Command 'cat /tmp/tmpfile.out' (Expected 0, got 0)
unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023
:: [   PASS   ] :: Selinuxuser unconfined_u:.*s0-s0:c0.c1023 as expected 
:: [   PASS   ] :: Command 'verify_ssh_auth_success_selinuxuser au104131712 Secret123 ipaqavmf.slnx2k12r2.test unconfined_u:.*s0-s0:c0.c1023' (Expected 0, got 0)
:: [  BEGIN   ] :: Running 'verify_ssh_auth_success_selinuxuser au104131712 Secret123 ipaqa64vmc.slnx2k12r2.test unconfined_u:.*s0-s0:c0.c1023'
:: [   PASS   ] :: Authentication successful for au104131712 
:: [  BEGIN   ] :: Running 'cat /tmp/tmpfile.out'
spawn ssh -l au104131712 ipaqa64vmc.slnx2k12r2.test id -Z
au104131712@ipaqa64vmc.slnx2k12r2.test's password: 
unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023
:: [   PASS   ] :: Command 'cat /tmp/tmpfile.out' (Expected 0, got 0)
unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023
:: [   PASS   ] :: Selinuxuser unconfined_u:.*s0-s0:c0.c1023 as expected 
:: [   PASS   ] :: Command 'verify_ssh_auth_success_selinuxuser au104131712 Secret123 ipaqa64vmc.slnx2k12r2.test unconfined_u:.*s0-s0:c0.c1023' (Expected 0, got 0)
:: [  BEGIN   ] :: Running 'getent -s sss passwd au204131712'
au204131712:*:346202186:346202186:au204131712:/home/ipaad2012r2.test/au204131712:
:: [   PASS   ] :: Command 'getent -s sss passwd au204131712' (Expected 0, got 0)
:: [  BEGIN   ] :: Running 'sleep 10'
:: [   PASS   ] :: Command 'sleep 10' (Expected 0, got 0)
:: [  BEGIN   ] :: Running 'verify_ssh_auth_success_selinuxuser au204131712 Secret123 ipaqa64vmc.slnx2k12r2.test unconfined_u:.*s0-s0:c0.c1023'
:: [   PASS   ] :: Authentication successful for au204131712 
:: [  BEGIN   ] :: Running 'cat /tmp/tmpfile.out'
spawn ssh -l au204131712 ipaqa64vmc.slnx2k12r2.test id -Z
au204131712@ipaqa64vmc.slnx2k12r2.test's password: 
unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023
:: [   PASS   ] :: Command 'cat /tmp/tmpfile.out' (Expected 0, got 0)
unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023
:: [   PASS   ] :: Selinuxuser unconfined_u:.*s0-s0:c0.c1023 as expected 
:: [   PASS   ] :: Command 'verify_ssh_auth_success_selinuxuser au204131712 Secret123 ipaqa64vmc.slnx2k12r2.test unconfined_u:.*s0-s0:c0.c1023' (Expected 0, got 0)
:: [  BEGIN   ] :: Running 'verify_ssh_auth_success_selinuxuser au204131712 Secret123 ipaqavmf.slnx2k12r2.test unconfined_u:.*s0-s0:c0.c1023'
:: [   PASS   ] :: Authentication successful for au204131712 
:: [  BEGIN   ] :: Running 'cat /tmp/tmpfile.out'
spawn ssh -l au204131712 ipaqavmf.slnx2k12r2.test id -Z
au204131712@ipaqavmf.slnx2k12r2.test's password: 
unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023
:: [   PASS   ] :: Command 'cat /tmp/tmpfile.out' (Expected 0, got 0)
unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023
:: [   PASS   ] :: Selinuxuser unconfined_u:.*s0-s0:c0.c1023 as expected 
:: [   PASS   ] :: Command 'verify_ssh_auth_success_selinuxuser au204131712 Secret123 ipaqavmf.slnx2k12r2.test unconfined_u:.*s0-s0:c0.c1023' (Expected 0, got 0)
:: [ 18:30:24 ] :: Running remotehost-sync-set -s '77.' -m ivanova.idmqe.lab.eng.bos.redhat.com
:: [  BEGIN   ] :: Running 'remotehost-sync-set -s '77.' -m ivanova.idmqe.lab.eng.bos.redhat.com'
remotehost-sync-set -s 77. -m ivanova.idmqe.lab.eng.bos.redhat.com
root      9247  8779  0 16:26 ?        00:00:03 python -m SimpleHTTPServer 8907
:: [   PASS   ] :: Command 'remotehost-sync-set -s '77.' -m ivanova.idmqe.lab.eng.bos.redhat.com' (Expected 0, got 0)
'1c461cc5-8da6-4066-af33-364f496bbabe'
ipa-trust-func-selinuxusermap-client1-008-AD-user-associated-with-empty-selinuxusermap-on-Master result: PASS

Comment 8 errata-xmlrpc 2015-07-22 06:43:12 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://rhn.redhat.com/errata/RHBA-2015-1448.html