Bug 1605781
Summary: | gdm smart card authentication does not work shortly after disconnecting from network. | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Product: | [Fedora] Fedora | Reporter: | Orion Poplawski <orion> | ||||||||||||
Component: | sssd | Assignee: | Sumit Bose <sbose> | ||||||||||||
Status: | CLOSED ERRATA | QA Contact: | Fedora Extras Quality Assurance <extras-qa> | ||||||||||||
Severity: | high | Docs Contact: | |||||||||||||
Priority: | unspecified | ||||||||||||||
Version: | 31 | CC: | abokovoy, atikhono, jhrozek, lslebodn, mzidek, pbrezina, rharwood, sbose, ssorce | ||||||||||||
Target Milestone: | --- | ||||||||||||||
Target Release: | --- | ||||||||||||||
Hardware: | All | ||||||||||||||
OS: | Linux | ||||||||||||||
Whiteboard: | |||||||||||||||
Fixed In Version: | sssd-2.3.1-2.fc32 | Doc Type: | If docs needed, set a value | ||||||||||||
Doc Text: | Story Points: | --- | |||||||||||||
Clone Of: | Environment: | ||||||||||||||
Last Closed: | 2020-07-30 18:56:41 UTC | Type: | Bug | ||||||||||||
Regression: | --- | Mount Type: | --- | ||||||||||||
Documentation: | --- | CRM: | |||||||||||||
Verified Versions: | Category: | --- | |||||||||||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||||||||||
Cloudforms Team: | --- | Target Upstream Version: | |||||||||||||
Embargoed: | |||||||||||||||
Attachments: |
|
Description
Orion Poplawski
2018-07-20 16:57:53 UTC
Once sssd fully goes into offline mode, I'm able to log in. The result code '9' is not send directly to gdm but it is returned by the SSSD backend to the PAM responder to indicate the offline state and the PAM responder then tries local Smartcard authentication which looks successful. Are there no other messages in the domain log between '10:17:15' and '10:17:38'? I would expect a SSS_PAM_ACCT_MGMT request in the PAM responder and domain logs after the successful authentication to check is the user is authorized. sssd logs sent privately. From private discussion, it appears that the pam handler is hitting the 60s client_idle_timeout (60s) because the backend has a long ldap timeout: (Mon Sep 10 15:51:15 2018) [sssd[be[nwra.com]]] [sdap_get_generic_ext_step] (0x2000): ldap_search_ext called, msgid = 14 (Mon Sep 10 15:51:15 2018) [sssd[be[nwra.com]]] [sdap_op_add] (0x2000): New operation 14 timeout 60 It also brought up the question as to why the ldap_search_ext timeout is the ldap_enumeration_search_timeout (60s) rather than ldap_search_timeout (6s). I tried dropping ldap_enumeration_search_timeout to 6s, but now either authentication fails with: Oct 10 11:09:06 bld-pc1.cora.nwra.com gdm-password][12346]: pam_sss(gdm-password:auth): received for user orion: 10 (User not known to the underlying authentication module) or access fails with: Oct 10 11:17:22 bld-pc1.cora.nwra.com gdm-password][12839]: pam_sss(gdm-password:auth): authentication success; logname= uid=0 euid=0 tty=/dev/tty1 ruser= rhost= user=orion Oct 10 11:17:28 bld-pc1.cora.nwra.com gdm-password][12839]: pam_sss(gdm-password:account): Access denied for user orion: 4 (System error) For the latter: It appears that the AD domain gets marked as down, but not the IPA domain: (Wed Oct 10 11:17:21 2018) [sssd[be[nwra.com]]] [fo_resolve_service_send] (0x0100): Trying to resolve service 'IPA' (Wed Oct 10 11:17:21 2018) [sssd[be[nwra.com]]] [get_server_status] (0x1000): Status of server 'europa.nwra.com' is 'working' (Wed Oct 10 11:17:21 2018) [sssd[be[nwra.com]]] [get_port_status] (0x1000): Port status of port 0 for server 'europa.nwra.com' is 'not working' (Wed Oct 10 11:17:21 2018) [sssd[be[nwra.com]]] [get_port_status] (0x0080): SSSD is unable to complete the full connection request, this internal status does not necessarily indicate network port issues. (Wed Oct 10 11:17:21 2018) [sssd[be[nwra.com]]] [get_server_status] (0x1000): Status of server 'ipa-boulder2.nwra.com' is 'not working' (Wed Oct 10 11:17:21 2018) [sssd[be[nwra.com]]] [get_port_status] (0x1000): Port status of port 0 for server '(no name)' is 'not working' (Wed Oct 10 11:17:21 2018) [sssd[be[nwra.com]]] [get_port_status] (0x0080): SSSD is unable to complete the full connection request, this internal status does not necessarily indicate network port issues. (Wed Oct 10 11:17:21 2018) [sssd[be[nwra.com]]] [fo_resolve_service_send] (0x0020): No available servers for service 'IPA' (Wed Oct 10 11:17:21 2018) [sssd[be[nwra.com]]] [be_resolve_server_done] (0x1000): Server resolution failed: [5]: Input/output error (Wed Oct 10 11:17:21 2018) [sssd[be[nwra.com]]] [be_mark_dom_offline] (0x1000): Marking subdomain ad.nwra.com offline (Wed Oct 10 11:17:21 2018) [sssd[be[nwra.com]]] [be_mark_subdom_offline] (0x1000): Marking subdomain ad.nwra.com as inactive (Wed Oct 10 11:17:21 2018) [sssd[be[nwra.com]]] [fo_set_port_status] (0x0100): Marking port 0 of server 'europa.nwra.com' as 'working' (Wed Oct 10 11:17:21 2018) [sssd[be[nwra.com]]] [set_server_common_status] (0x0100): Marking server 'europa.nwra.com' as 'working' (Wed Oct 10 11:17:21 2018) [sssd[be[nwra.com]]] [fo_set_port_status] (0x0400): Marking port 0 of duplicate server 'europa.nwra.com' as 'working' (Wed Oct 10 11:17:21 2018) [sssd[be[nwra.com]]] [sysdb_set_entry_attr] (0x0200): Entry [name=orion.com,cn=users,cn=ad.nwra.com,cn=sysdb] has set [ts_cache] attrs. (Wed Oct 10 11:17:21 2018) [sssd[be[nwra.com]]] [krb5_auth_done] (0x0100): Backend is marked offline, retry later! Now comes the access request: (Wed Oct 10 11:17:22 2018) [sssd[pam]] [pam_print_data] (0x0100): command: SSS_PAM_ACCT_MGMT (Wed Oct 10 11:17:22 2018) [sssd[pam]] [pam_print_data] (0x0100): domain: ad.nwra.com (Wed Oct 10 11:17:22 2018) [sssd[be[nwra.com]]] [sss_domain_get_state] (0x1000): Domain nwra.com is Active (Wed Oct 10 11:17:22 2018) [sssd[be[nwra.com]]] [sss_domain_get_state] (0x1000): Domain ad.nwra.com is Inactive (Wed Oct 10 11:17:22 2018) [sssd[be[nwra.com]]] [sdap_access_send] (0x0400): Performing access check for user [orion.com] (Wed Oct 10 11:17:22 2018) [sssd[be[nwra.com]]] [sdap_account_expired_rhds] (0x0400): Performing RHDS access check for user [orion.com] (Wed Oct 10 11:17:22 2018) [sssd[be[nwra.com]]] [sdap_account_expired] (0x0400): IPA access control succeeded, checking AD access control (Wed Oct 10 11:17:22 2018) [sssd[be[nwra.com]]] [sdap_account_expired_ad] (0x0400): Performing AD access check for user [orion.com] (Wed Oct 10 11:17:22 2018) [sssd[be[nwra.com]]] [sdap_print_server] (0x2000): Searching <europa.nwra.com>:389 (Wed Oct 10 11:17:22 2018) [sssd[be[nwra.com]]] [sdap_get_generic_ext_step] (0x0400): calling ldap_search_ext with [(&(objectClass=ipaHost)(fqdn=bld-pc1.cora.nwra.com))][cn=accounts,dc=nwra,dc=com]. ... (Wed Oct 10 11:17:22 2018) [sssd[be[nwra.com]]] [sdap_get_generic_ext_step] (0x2000): ldap_search_ext called, msgid = 20 (Wed Oct 10 11:17:22 2018) [sssd[be[nwra.com]]] [sdap_op_add] (0x2000): New operation 20 timeout 6 (Wed Oct 10 11:17:22 2018) [sssd[pam]] [pam_dom_forwarder] (0x0100): pam_dp_send_req returned 0 (Wed Oct 10 11:17:26 2018) [sssd[pam]] [pam_initgr_cache_remove] (0x2000): [orion] removed from PAM initgroup cache (Wed Oct 10 11:17:27 2018) [sssd[pam]] [pam_initgr_cache_remove] (0x2000): [orion] removed from PAM initgroup cache this now times out in 6s: (Wed Oct 10 11:17:28 2018) [sssd[be[nwra.com]]] [sdap_op_timeout] (0x1000): Issuing timeout for 20 (Wed Oct 10 11:17:28 2018) [sssd[be[nwra.com]]] [sdap_op_destructor] (0x1000): Abandoning operation 20 (Wed Oct 10 11:17:28 2018) [sssd[be[nwra.com]]] [generic_ext_search_handler] (0x0040): sdap_get_generic_ext_recv failed [110]: Connection timed out (Wed Oct 10 11:17:28 2018) [sssd[be[nwra.com]]] [ipa_pam_access_handler_done] (0x0020): Unable to fetch HBAC rules [110]: Connection timed out (Wed Oct 10 11:17:28 2018) [sssd[be[nwra.com]]] [dp_req_done] (0x0400): DP Request [PAM Account #8]: Request handler finished [0]: Success (Wed Oct 10 11:17:28 2018) [sssd[be[nwra.com]]] [_dp_req_recv] (0x0400): DP Request [PAM Account #8]: Receiving request data. (Wed Oct 10 11:17:28 2018) [sssd[be[nwra.com]]] [dp_req_destructor] (0x0400): DP Request [PAM Account #8]: Request removed. (Wed Oct 10 11:17:28 2018) [sssd[be[nwra.com]]] [dp_req_destructor] (0x0400): Number of active DP request: 0 But we return system error: (Wed Oct 10 11:17:28 2018) [sssd[be[nwra.com]]] [dp_pam_reply] (0x1000): DP Request [PAM Account #8]: Sending result [4][ad.nwra.com] (Wed Oct 10 11:17:28 2018) [sssd[pam]] [sbus_remove_timeout] (0x2000): 0x55a557d37f00 (Wed Oct 10 11:17:28 2018) [sssd[pam]] [pam_dp_process_reply] (0x0200): received: [4 (System error)][ad.nwra.com] (Wed Oct 10 11:17:28 2018) [sssd[pam]] [pam_reply] (0x0200): pam_reply called with result [4]: System error. I tried a couple more times but they all failed. europa.nwra.com stays marked as 'working'. It seems to stay "resolved"? (Wed Oct 10 11:17:51 2018) [sssd[be[nwra.com]]] [fo_resolve_service_activate_timeout] (0x2000): Resolve timeout set to 6 seconds (Wed Oct 10 11:17:51 2018) [sssd[be[nwra.com]]] [get_server_status] (0x1000): Status of server 'europa.nwra.com' is 'working' (Wed Oct 10 11:17:51 2018) [sssd[be[nwra.com]]] [be_resolve_server_process] (0x1000): Saving the first resolved server (Wed Oct 10 11:17:51 2018) [sssd[be[nwra.com]]] [be_resolve_server_process] (0x0200): Found address for server europa.nwra.com: [X.X.X.X] TTL 86400 and the sdap_account_expired_ad check that queries it and times out does not appear to affect its status. As an aside - I see sssd reacting to network links coming up, but not going down. I would think that if there were now active network links you could assume off-line status. Are the logs from above taken when the system was not connected to the network or was the system still connected? If it was not connected, did you run an authentication for the same user while the system was online to make sure all needed data for the user are available in the cache? bye, Sumit Network cable had been removed. User had logged in and back out prior to make sure cache was fresh. This message is a reminder that Fedora 28 is nearing its end of life. On 2019-May-28 Fedora will stop maintaining and issuing updates for Fedora 28. It is Fedora's policy to close all bug reports from releases that are no longer maintained. At that time this bug will be closed as EOL if it remains open with a Fedora 'version' of '28'. Package Maintainer: If you wish for this bug to remain open because you plan to fix it in a currently maintained version, simply change the 'version' to a later Fedora version. Thank you for reporting this issue and we are sorry that we were not able to fix it before Fedora 28 is end of life. If you would still like to see this bug fixed and are able to reproduce it against a later version of Fedora, you are encouraged change the 'version' to a later Fedora version prior this bug is closed as described in the policy above. Although we aim to fix as many bugs as possible during every release's lifetime, sometimes those efforts are overtaken by events. Often a more recent Fedora release includes newer upstream software that fixes bugs or makes them obsolete. Does it work for you on f29 ? No. Again authentication is okay but authorization fails: May 06 15:22:42 ares.cora.nwra.com gdm-password][9478]: pam_sss(gdm-password:account): Access denied for user orion: 4 (System error) May 06 15:22:42 ares.cora.nwra.com gdm-password][9478]: GdmSessionWorker: user is not authorized to log in: System error (Mon May 6 15:21:42 2019) [sssd[pam]] [pam_dp_send_req] (0x0100): Sending request with the following data: (Mon May 6 15:21:42 2019) [sssd[pam]] [pam_print_data] (0x0100): command: SSS_PAM_ACCT_MGMT (Mon May 6 15:21:42 2019) [sssd[pam]] [pam_print_data] (0x0100): domain: ad.nwra.com (Mon May 6 15:21:42 2019) [sssd[pam]] [pam_print_data] (0x0100): user: orion.com (Mon May 6 15:21:42 2019) [sssd[pam]] [pam_print_data] (0x0100): service: gdm-password (Mon May 6 15:21:42 2019) [sssd[pam]] [pam_print_data] (0x0100): tty: /dev/tty1 (Mon May 6 15:21:42 2019) [sssd[pam]] [pam_print_data] (0x0100): ruser: not set (Mon May 6 15:21:42 2019) [sssd[pam]] [pam_print_data] (0x0100): rhost: not set (Mon May 6 15:21:42 2019) [sssd[pam]] [pam_print_data] (0x0100): authtok type: 0 (Mon May 6 15:21:42 2019) [sssd[pam]] [pam_print_data] (0x0100): newauthtok type: 0 (Mon May 6 15:21:42 2019) [sssd[pam]] [pam_print_data] (0x0100): priv: 1 (Mon May 6 15:21:42 2019) [sssd[pam]] [pam_print_data] (0x0100): cli_pid: 9478 (Mon May 6 15:21:42 2019) [sssd[pam]] [pam_print_data] (0x0100): logon name: orion (Mon May 6 15:21:42 2019) [sssd[pam]] [pam_print_data] (0x0100): flags: 0 (Mon May 6 15:21:42 2019) [sssd[pam]] [pam_dom_forwarder] (0x0100): pam_dp_send_req returned 0 (Mon May 6 15:22:42 2019) [sssd[pam]] [pam_dp_send_req_done] (0x0200): received: [4 (System error)][ad.nwra.com] (Mon May 6 15:22:42 2019) [sssd[pam]] [pam_reply] (0x0200): pam_reply called with result [4]: System error. (Mon May 6 15:21:42 2019) [sssd[be[nwra.com]]] [dp_pam_handler_send] (0x0100): Got request with the following data (Mon May 6 15:21:42 2019) [sssd[be[nwra.com]]] [pam_print_data] (0x0100): command: SSS_PAM_ACCT_MGMT (Mon May 6 15:21:42 2019) [sssd[be[nwra.com]]] [pam_print_data] (0x0100): domain: ad.nwra.com (Mon May 6 15:21:42 2019) [sssd[be[nwra.com]]] [pam_print_data] (0x0100): user: orion.com (Mon May 6 15:21:42 2019) [sssd[be[nwra.com]]] [pam_print_data] (0x0100): service: gdm-password (Mon May 6 15:21:42 2019) [sssd[be[nwra.com]]] [pam_print_data] (0x0100): tty: /dev/tty1 (Mon May 6 15:21:42 2019) [sssd[be[nwra.com]]] [pam_print_data] (0x0100): ruser: (Mon May 6 15:21:42 2019) [sssd[be[nwra.com]]] [pam_print_data] (0x0100): rhost: (Mon May 6 15:21:42 2019) [sssd[be[nwra.com]]] [pam_print_data] (0x0100): authtok type: 0 (Mon May 6 15:21:42 2019) [sssd[be[nwra.com]]] [pam_print_data] (0x0100): newauthtok type: 0 (Mon May 6 15:21:42 2019) [sssd[be[nwra.com]]] [pam_print_data] (0x0100): priv: 1 (Mon May 6 15:21:42 2019) [sssd[be[nwra.com]]] [pam_print_data] (0x0100): cli_pid: 9478 (Mon May 6 15:21:42 2019) [sssd[be[nwra.com]]] [pam_print_data] (0x0100): logon name: not set (Mon May 6 15:21:42 2019) [sssd[be[nwra.com]]] [pam_print_data] (0x0100): flags: 0 (Mon May 6 15:22:42 2019) [sssd[be[nwra.com]]] [generic_ext_search_handler] (0x0040): sdap_get_generic_ext_recv failed [110]: Connection timed out (Mon May 6 15:22:42 2019) [sssd[be[nwra.com]]] [ipa_pam_access_handler_done] (0x0020): Unable to fetch HBAC rules [110]: Connection timed out (Mon May 6 15:22:44 2019) [sssd[be[nwra.com]]] [dp_get_account_info_send] (0x0200): Got request for [0x14][BE_REQ_BY_CERT][cert=MIIIBT... (In reply to Orion Poplawski from comment #10) > No. Again authentication is okay but authorization fails: > > May 06 15:22:42 ares.cora.nwra.com gdm-password][9478]: > pam_sss(gdm-password:account): Access denied for user orion: 4 (System error) > May 06 15:22:42 ares.cora.nwra.com gdm-password][9478]: GdmSessionWorker: > user is not authorized to log in: System error > > (Mon May 6 15:21:42 2019) [sssd[pam]] [pam_dp_send_req] (0x0100): Sending > request with the following data: > (Mon May 6 15:21:42 2019) [sssd[pam]] [pam_print_data] (0x0100): command: > SSS_PAM_ACCT_MGMT > (Mon May 6 15:21:42 2019) [sssd[pam]] [pam_print_data] (0x0100): domain: > ad.nwra.com > (Mon May 6 15:21:42 2019) [sssd[pam]] [pam_print_data] (0x0100): user: > orion.com > (Mon May 6 15:21:42 2019) [sssd[pam]] [pam_print_data] (0x0100): service: > gdm-password > (Mon May 6 15:21:42 2019) [sssd[pam]] [pam_print_data] (0x0100): tty: > /dev/tty1 > (Mon May 6 15:21:42 2019) [sssd[pam]] [pam_print_data] (0x0100): ruser: not > set > (Mon May 6 15:21:42 2019) [sssd[pam]] [pam_print_data] (0x0100): rhost: not > set > (Mon May 6 15:21:42 2019) [sssd[pam]] [pam_print_data] (0x0100): authtok > type: 0 > (Mon May 6 15:21:42 2019) [sssd[pam]] [pam_print_data] (0x0100): newauthtok > type: 0 > (Mon May 6 15:21:42 2019) [sssd[pam]] [pam_print_data] (0x0100): priv: 1 > (Mon May 6 15:21:42 2019) [sssd[pam]] [pam_print_data] (0x0100): cli_pid: > 9478 > (Mon May 6 15:21:42 2019) [sssd[pam]] [pam_print_data] (0x0100): logon > name: orion > (Mon May 6 15:21:42 2019) [sssd[pam]] [pam_print_data] (0x0100): flags: 0 > (Mon May 6 15:21:42 2019) [sssd[pam]] [pam_dom_forwarder] (0x0100): > pam_dp_send_req returned 0 > (Mon May 6 15:22:42 2019) [sssd[pam]] [pam_dp_send_req_done] (0x0200): > received: [4 (System error)][ad.nwra.com] > (Mon May 6 15:22:42 2019) [sssd[pam]] [pam_reply] (0x0200): pam_reply > called with result [4]: System error. > > (Mon May 6 15:21:42 2019) [sssd[be[nwra.com]]] [dp_pam_handler_send] > (0x0100): Got request with the following data > (Mon May 6 15:21:42 2019) [sssd[be[nwra.com]]] [pam_print_data] (0x0100): > command: SSS_PAM_ACCT_MGMT > (Mon May 6 15:21:42 2019) [sssd[be[nwra.com]]] [pam_print_data] (0x0100): > domain: ad.nwra.com > (Mon May 6 15:21:42 2019) [sssd[be[nwra.com]]] [pam_print_data] (0x0100): > user: orion.com > (Mon May 6 15:21:42 2019) [sssd[be[nwra.com]]] [pam_print_data] (0x0100): > service: gdm-password > (Mon May 6 15:21:42 2019) [sssd[be[nwra.com]]] [pam_print_data] (0x0100): > tty: /dev/tty1 > (Mon May 6 15:21:42 2019) [sssd[be[nwra.com]]] [pam_print_data] (0x0100): > ruser: > (Mon May 6 15:21:42 2019) [sssd[be[nwra.com]]] [pam_print_data] (0x0100): > rhost: > (Mon May 6 15:21:42 2019) [sssd[be[nwra.com]]] [pam_print_data] (0x0100): > authtok type: 0 > (Mon May 6 15:21:42 2019) [sssd[be[nwra.com]]] [pam_print_data] (0x0100): > newauthtok type: 0 > (Mon May 6 15:21:42 2019) [sssd[be[nwra.com]]] [pam_print_data] (0x0100): > priv: 1 > (Mon May 6 15:21:42 2019) [sssd[be[nwra.com]]] [pam_print_data] (0x0100): > cli_pid: 9478 > (Mon May 6 15:21:42 2019) [sssd[be[nwra.com]]] [pam_print_data] (0x0100): > logon name: not set > (Mon May 6 15:21:42 2019) [sssd[be[nwra.com]]] [pam_print_data] (0x0100): > flags: 0 > (Mon May 6 15:22:42 2019) [sssd[be[nwra.com]]] [generic_ext_search_handler] > (0x0040): sdap_get_generic_ext_recv failed [110]: Connection timed out > (Mon May 6 15:22:42 2019) [sssd[be[nwra.com]]] > [ipa_pam_access_handler_done] (0x0020): Unable to fetch HBAC rules [110]: > Connection timed out > (Mon May 6 15:22:44 2019) [sssd[be[nwra.com]]] [dp_get_account_info_send] > (0x0200): Got request for [0x14][BE_REQ_BY_CERT][cert=MIIIBT... Hi, looks like in this code patch SSSD does not switch into offline mode properly. I'll investigate. bye, Sumit Hi, would it be possible to attach the pam and backend logs which cover the time of the SSS_PAM_PREAUTH and SSS_PAM_AUTHENTICATE steps as well? I would like to see if and how the backend switches into offline mode during this steps. In the access control step it is expected that the backend is either online and the authentication was done online as well or that the system was offline and e.g. the authentication step already switched the backend into offline mode. bye, Sumit Created attachment 1565310 [details]
domain log
Created attachment 1565311 [details]
pam log
Hi, can you repeat the test with debug_level=10 in the [domain/...] section and resend the logs? bye, Sumit Created attachment 1568551 [details]
domain log with debug = 10
retried with debug=10
This message is a reminder that Fedora 29 is nearing its end of life. Fedora will stop maintaining and issuing updates for Fedora 29 on 2019-11-26. It is Fedora's policy to close all bug reports from releases that are no longer maintained. At that time this bug will be closed as EOL if it remains open with a Fedora 'version' of '29'. Package Maintainer: If you wish for this bug to remain open because you plan to fix it in a currently maintained version, simply change the 'version' to a later Fedora version. Thank you for reporting this issue and we are sorry that we were not able to fix it before Fedora 29 is end of life. If you would still like to see this bug fixed and are able to reproduce it against a later version of Fedora, you are encouraged change the 'version' to a later Fedora version prior this bug is closed as described in the policy above. Although we aim to fix as many bugs as possible during every release's lifetime, sometimes those efforts are overtaken by events. Often a more recent Fedora release includes newer upstream software that fixes bugs or makes them obsolete. Still present with sssd-2.2.2-3.fc31.x86_64 Created attachment 1632713 [details]
sssd logs with debug_level 9
Hi, thank you for your patience. I think I found the reason for the issue and it should be fixed by https://github.com/SSSD/sssd/pull/5196. If you let me know which version of SSSD you are currently using I can prepare a test build. bye, Sumit Nice. Test machine is running latest F31 - so: 2.2.3-13.fc31 Thanks! Created attachment 1695975 [details]
test build
Hi,
please find attached a tar-ball with a test-build based on sssd-2.2.3-13.
If there are still issues please attach new logs files.
bye,
Sumit
Sumit - LGTM. Thanks! (In reply to Orion Poplawski from comment #23) > Sumit - LGTM. Thanks! Thanks for the feedback. bye, Sumit Pushed PR: https://github.com/SSSD/sssd/pull/5196 * `master` * df632eec450791559a4a7644f241964397c10ff9 - ipa: add failover to subdomain override lookups * `sssd-1-16` * 510f154b02f2c059aeb0c1a28f3a5f83ceca662c - ipa: add failover to subdomain override lookups FEDORA-2020-63a418c824 has been submitted as an update to Fedora 32. https://bodhi.fedoraproject.org/updates/FEDORA-2020-63a418c824 FEDORA-2020-63a418c824 has been pushed to the Fedora 32 testing repository. In short time you'll be able to install the update with the following command: `sudo dnf upgrade --enablerepo=updates-testing --advisory=FEDORA-2020-63a418c824` You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2020-63a418c824 See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates. FEDORA-2020-63a418c824 has been pushed to the Fedora 32 stable repository. If problem still persists, please make note of it in this bug report. |