Bug 1944665
| Summary: | No gpo found and ad_gpo_implicit_deny set to True still permits user login | ||||||
|---|---|---|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux 8 | Reporter: | ttuffin | ||||
| Component: | sssd | Assignee: | Sumit Bose <sbose> | ||||
| Status: | CLOSED ERRATA | QA Contact: | Dan Lavu <dlavu> | ||||
| Severity: | high | Docs Contact: | |||||
| Priority: | unspecified | ||||||
| Version: | 8.3 | CC: | atikhono, dlavu, grajaiya, jhrozek, lslebodn, mzidek, pbrezina, sbose, tscherf | ||||
| Target Milestone: | rc | Keywords: | Triaged, ZStream | ||||
| Target Release: | --- | Flags: | pm-rhel:
mirror+
|
||||
| Hardware: | All | ||||||
| OS: | Linux | ||||||
| Whiteboard: | sync-to-jira | ||||||
| Fixed In Version: | sssd-2.5.0-1.el8 | Doc Type: | If docs needed, set a value | ||||
| Doc Text: | Story Points: | --- | |||||
| Clone Of: | |||||||
| : | 1945656 (view as bug list) | Environment: | |||||
| Last Closed: | 2021-11-09 19:47:10 UTC | Type: | Bug | ||||
| Regression: | --- | Mount Type: | --- | ||||
| Documentation: | --- | CRM: | |||||
| Verified Versions: | Category: | --- | |||||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
| Cloudforms Team: | --- | Target Upstream Version: | |||||
| Embargoed: | |||||||
| Bug Depends On: | |||||||
| Bug Blocks: | 1945656 | ||||||
| Attachments: |
|
||||||
|
Description
ttuffin
2021-03-30 12:49:57 UTC
Hi, thanks for the rigid testing, this is indeed a case which wasn't considered. I wonder if you can re-run your test with the build from http://brew-task-repos.usersys.redhat.com/repos/scratch/sbose/sssd/2.3.0/9.el8_3sb1/ ? bye, Sumit Hi Sumit, I re-ran my tests with this build and it appears the issue is resolved: (2021-03-30 14:12:16): [be[herge.local]] [ad_gpo_process_gpo_send] (0x0040): no gpos found (2021-03-30 14:12:16): [be[herge.local]] [ad_gpo_process_gpo_done] (0x0400): No GPOs found that apply to this system. (2021-03-30 14:12:16): [be[herge.local]] [ad_gpo_process_gpo_done] (0x0400): No applicable GPOs have been found and ad_gpo_implicit_deny is set to 'true'. The user will be denied access. (2021-03-30 14:12:16): [be[herge.local]] [ad_gpo_access_done] (0x0040): GPO-based access control failed. [root@ttuffin-vm-4 ~]# uname -r 4.18.0-240.el8.x86_64 [root@ttuffin-vm-4 ~]# rpm -qa | grep sssd sssd-common-2.3.0-9.el8_3sb1.x86_64 sssd-krb5-2.3.0-9.el8_3sb1.x86_64 sssd-ipa-2.3.0-9.el8_3sb1.x86_64 sssd-nfs-idmap-2.3.0-9.el8.x86_64 python3-sssdconfig-2.3.0-9.el8_3sb1.noarch sssd-client-2.3.0-9.el8_3sb1.x86_64 sssd-krb5-common-2.3.0-9.el8_3sb1.x86_64 sssd-ad-2.3.0-9.el8_3sb1.x86_64 sssd-ldap-2.3.0-9.el8_3sb1.x86_64 sssd-2.3.0-9.el8_3sb1.x86_64 sssd-common-pac-2.3.0-9.el8_3sb1.x86_64 sssd-proxy-2.3.0-9.el8_3sb1.x86_64 sssd-kcm-2.3.0-9.el8_3sb1.x86_64 Cheers, Thomas (In reply to ttuffin from comment #2) > Hi Sumit, > > I re-ran my tests with this build and it appears the issue is resolved: > > (2021-03-30 14:12:16): [be[herge.local]] [ad_gpo_process_gpo_send] (0x0040): > no gpos found > (2021-03-30 14:12:16): [be[herge.local]] [ad_gpo_process_gpo_done] (0x0400): > No GPOs found that apply to this system. > (2021-03-30 14:12:16): [be[herge.local]] [ad_gpo_process_gpo_done] (0x0400): > No applicable GPOs have been found and ad_gpo_implicit_deny is set to > 'true'. The user will be denied access. > (2021-03-30 14:12:16): [be[herge.local]] [ad_gpo_access_done] (0x0040): > GPO-based access control failed. > > [root@ttuffin-vm-4 ~]# uname -r > 4.18.0-240.el8.x86_64 > > [root@ttuffin-vm-4 ~]# rpm -qa | grep sssd > sssd-common-2.3.0-9.el8_3sb1.x86_64 > sssd-krb5-2.3.0-9.el8_3sb1.x86_64 > sssd-ipa-2.3.0-9.el8_3sb1.x86_64 > sssd-nfs-idmap-2.3.0-9.el8.x86_64 > python3-sssdconfig-2.3.0-9.el8_3sb1.noarch > sssd-client-2.3.0-9.el8_3sb1.x86_64 > sssd-krb5-common-2.3.0-9.el8_3sb1.x86_64 > sssd-ad-2.3.0-9.el8_3sb1.x86_64 > sssd-ldap-2.3.0-9.el8_3sb1.x86_64 > sssd-2.3.0-9.el8_3sb1.x86_64 > sssd-common-pac-2.3.0-9.el8_3sb1.x86_64 > sssd-proxy-2.3.0-9.el8_3sb1.x86_64 > sssd-kcm-2.3.0-9.el8_3sb1.x86_64 > > Cheers, > Thomas Hi, thanks for the fast testing, I'll prepare an upstream pull-request. bye, Sumit Upstream ticket: https://github.com/SSSD/sssd/issues/5561 * `master`
* e865b008aa8947efca0116deb95e29cc2309256f - AD GPO: respect ad_gpo_implicit_deny if no GPO is present
Pushed PR: https://github.com/SSSD/sssd/pull/5562 * `master` * e865b008aa8947efca0116deb95e29cc2309256f - AD GPO: respect ad_gpo_implicit_deny if no GPO is present Created attachment 1788832 [details]
gpo_policy_report
Tested against sssd-2.5.0-1.el8.x86_64
##### sssd.conf #####
[sssd]
domains = domain.com
config_file_version = 2
services = nss, pam
[domain/domain.com]
ad_domain = domain.com
krb5_realm = DOMAIN.COM
realmd_tags = manages-system joined-with-adcli
cache_credentials = True
id_provider = ad
krb5_store_password_if_offline = True
default_shell = /bin/bash
ldap_id_mapping = True
use_fully_qualified_names = True
fallback_homedir = /home/%u@%d
access_provider = ad
ad_gpo_implicit_deny = True
ad_gpo_access_control = enforcing
##### gpo config #####
PS C:\cygwin64\home\Administrator> Get-GPInheritance -Target "ou=test_ou,dc=domain,dc=com"
Get-GPInheritance -Target "ou=test_ou,dc=domain,dc=com"
Name : test_ou
ContainerType : OU
Path : ou=test_ou,dc=domain,dc=com
GpoInheritanceBlocked : Yes
GpoLinks : {}
InheritedGpoLinks : {}
PS C:\cygwin64\home\Administrator> Get-GPInheritance -Target "dc=domain,dc=com"
Get-GPInheritance -Target "dc=domain,dc=com"
Name : domain.com
ContainerType : Domain
Path : dc=domain,dc=com
GpoInheritanceBlocked : No
GpoLinks : {Default Domain Policy, Disable-RC4-etype, hbac}
InheritedGpoLinks : {Default Domain Policy, Disable-RC4-etype, hbac}
##### output #####
[root@ci-vm-10-0-99-216 cloud-user]# ssh allowed_user@localhost
allowed_user@localhost's password:
Connection closed by ::1 port 22
[root@ci-vm-10-0-99-216 cloud-user]# ssh denied_user@localhost
denied_user@localhost's password:
Connection closed by ::1 port 22
[root@ci-vm-10-0-99-216 cloud-user]# ssh regular_user@localhost
regular_user@localhost's password:
Connection closed by ::1 port 22
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (sssd bug fix and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2021:4435 |