Bug 1856861

Summary: False errors/warnings are logged in sssd.log file after enabling 2FA prompting settings in sssd.conf
Product: Red Hat Enterprise Linux 8 Reporter: Akshay Sakure <asakure>
Component: sssdAssignee: Iker Pedrosa <ipedrosa>
Status: CLOSED ERRATA QA Contact: sssd-qe <sssd-qe>
Severity: medium Docs Contact:
Priority: low    
Version: 8.2CC: atikhono, grajaiya, ipedrosa, jhrozek, lslebodn, mupadhye, mzidek, pbrezina, sgoveas, tscherf
Target Milestone: rcKeywords: Triaged
Target Release: 8.0Flags: pm-rhel: mirror+
Hardware: x86_64   
OS: Linux   
Whiteboard: sync-to-jira
Fixed In Version: sssd-2.3.0-8.el8 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2020-11-04 02:05:29 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Akshay Sakure 2020-07-14 15:16:21 UTC
Description of problem:
False errors/warnings are logged in sssd.log file after enabling 2FA prompting settings in sssd.conf


Version-Release number of selected component (if applicable):
sssd-2.2.3-20.el8.x86_64


How reproducible:
Always


Steps to Reproduce:
1. Enable 2FA prompting settings in sssd.conf
2. Restart sssd service
3. Check /var/log/sssd/sssd.log file


Actual results:
False errors/warnings are observed in /var/log/sssd/sssd.log file after restarting sssd service post enabling 2FA prompting settings in sssd.conf.
---
(Tue Jul 14 11:01:17:259149 2020) [sssd] [sss_ini_call_validators] (0x0020): [rule/allowed_sections]: Section [prompting/password] is not allowed. Check for typos.
(Tue Jul 14 11:01:17:259335 2020) [sssd] [sss_ini_call_validators] (0x0020): [rule/allowed_sections]: Section [prompting/2fa] is not allowed. Check for typos.
---


Expected results:
There shouldn't be any warnings/errors in /var/log/sssd/sssd.log


Additional info:
These seem to be false errors/warnings and can be ignored. 
2FA prompting actually works as expected.
'sssctl config-check' shows these warnings too:
---
# sssctl config-check
Issues identified by validators: 2
[rule/allowed_sections]: Section [prompting/password] is not allowed. Check for typos.
[rule/allowed_sections]: Section [prompting/2fa] is not allowed. Check for typos.

Messages generated during configuration merging: 0

Used configuration snippet files: 0
---

Comment 3 Iker Pedrosa 2020-08-04 13:50:48 UTC
Upstream ticket:
https://github.com/SSSD/sssd/issues/5259

Comment 4 Pavel Březina 2020-08-20 09:47:48 UTC
Pushed PR: https://github.com/SSSD/sssd/pull/5260

* `master`
    * 4526858adb58736066a0b2cf2dc793ddfe671b2b - config: allow prompting options in configuration

Comment 8 Madhuri 2020-09-03 06:56:27 UTC
Verified wih:

[root@ci-vm-10-0-154-254 ~]# rpm -qa sssd sssd-tools
sssd-tools-2.3.0-8.el8.x86_64
sssd-2.3.0-8.el8.x86_64

Verifications steps:
1) Install sssd and sssd-tools package

2) Enable 2FA prompting settings in sssd.conf

[root@ci-vm-10-0-154-254 ~]# tail -9 /etc/sssd/sssd.conf 
[prompting/2fa/sshd]
#first_prompt=Enter OTP Token Value:
single_prompt=true

[prompting/2fa]
single_prompt = True
first_prompt = Prompt1
second_prompt = Prompt2

3) change the permission and ownership to 600 and root, restart sssd service.

4) Check the static analysis of sssd.conf using # sssctl config-check command

[root@ci-vm-10-0-154-254 ~]# sssctl config-check
Issues identified by validators: 0

Messages generated during configuration merging: 0

Used configuration snippet files: 0


Not showing any warning messages, thus from above
marking this verified.

Comment 11 errata-xmlrpc 2020-11-04 02:05:29 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (sssd bug fix and enhancement update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2020:4569