Bug 1280449
| Summary: | PAM xauth method does not work with pam_sss | ||||||
|---|---|---|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux 7 | Reporter: | Matt Rogers <mrogers> | ||||
| Component: | libreswan | Assignee: | Paul Wouters <pwouters> | ||||
| Status: | CLOSED ERRATA | QA Contact: | Ondrej Moriš <omoris> | ||||
| Severity: | high | Docs Contact: | Mirek Jahoda <mjahoda> | ||||
| Priority: | high | ||||||
| Version: | 7.1 | CC: | omoris, tmraz | ||||
| Target Milestone: | rc | ||||||
| Target Release: | --- | ||||||
| Hardware: | All | ||||||
| OS: | Linux | ||||||
| Whiteboard: | |||||||
| Fixed In Version: | Doc Type: | Bug Fix | |||||
| Doc Text: |
Cause: pluto IKE daemon did not have the CAP_DAC_READ_SEARCH capability
Consequence: pam based authentication using pam_sss would fail.
Fix: pluto gained the CAP_DAC_READ_SEARCH capability
Result: authentication with pam_sss works
|
Story Points: | --- | ||||
| Clone Of: | Environment: | ||||||
| Last Closed: | 2016-11-03 21:21:58 UTC | Type: | Bug | ||||
| Regression: | --- | Mount Type: | --- | ||||
| Documentation: | --- | CRM: | |||||
| Verified Versions: | Category: | --- | |||||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
| Cloudforms Team: | --- | Target Upstream Version: | |||||
| Embargoed: | |||||||
| Attachments: |
|
||||||
|
Description
Matt Rogers
2015-11-11 18:33:06 UTC
There is already pretty much work acked for 7.3.0, I am wondering how hard is this to fix and to test. Can't we postpone it to 7.4.0? Successfully verified that xauth=pam works fine with pam_sss (on x86_64). Old (libreswan-3.12-10.1.el7_1) =============================== From pluto log: XAUTH: Sending Username/Password request (XAUTH_R0) XAUTH: User Amy.qe: Attempting to login XAUTH: pam authentication being called to authenticate user Amy.qe XAUTH: pam_authenticate failed with 'Authentication failure' XAUTH: User Amy.qe: Authentication Failed: Incorrect Username or Password No pam_sss(pluto:auth) in /var/log/secure. New (libreswan-3.15-6.el7) ========================== From pluto log: XAUTH: Sending Username/Password request (XAUTH_R0) XAUTH: User Amy.qe: Attempting to login XAUTH: pam authentication being called to authenticate user Amy.qe XAUTH: User Amy.qe: Authentication Successful From /var/log/secure: pluto: pam_sss(pluto:auth): authentication success; logname= uid=0 euid=0 tty= ruser= rhost=10.34.88.62 user=Amy.qe For QE and future test automation, I am using the following: * VPN server/client XAUTH with PSK from [1] * SSSD & AD from /CoreOS/realmd/Sanity/AD-join-leave-sanity-test [1] https://libreswan.org/wiki/VPN_server_for_remote_clients_using_IKEv1_XAUTH_with_PSK Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://rhn.redhat.com/errata/RHSA-2016-2603.html |