Bug 2216872
| Summary: | User authentication failing on OTP validation using multiple tokens, succeeds with password only | |||
|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux 9 | Reporter: | Marco Rhodes <mrhodes> | |
| Component: | ipa | Assignee: | Florence Blanc-Renaud <frenaud> | |
| Status: | CLOSED ERRATA | QA Contact: | anuja <amore> | |
| Severity: | high | Docs Contact: | ||
| Priority: | urgent | |||
| Version: | 9.1 | CC: | amore, dshaikh, gkaihoro, jobuckle, jverreng, mjurasek, msauton, rcritten, tmihinto, tscherf, vvanhaft | |
| Target Milestone: | rc | Keywords: | Triaged, ZStream | |
| Target Release: | --- | Flags: | pm-rhel:
mirror+
|
|
| Hardware: | s390x | |||
| OS: | Linux | |||
| Whiteboard: | ||||
| Fixed In Version: | ipa-4.10.2-2.el9 | Doc Type: | No Doc Update | |
| Doc Text: | Story Points: | --- | ||
| Clone Of: | ||||
| : | 2218293 2223556 (view as bug list) | Environment: | ||
| Last Closed: | 2023-11-07 08:34:14 UTC | Type: | Bug | |
| Regression: | --- | Mount Type: | --- | |
| Documentation: | --- | CRM: | ||
| Verified Versions: | Category: | --- | ||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
| Cloudforms Team: | --- | Target Upstream Version: | ||
| Embargoed: | ||||
| Bug Depends On: | ||||
| Bug Blocks: | 2218293, 2223556 | |||
|
Comment 1
Florence Blanc-Renaud
2023-06-26 15:49:51 UTC
Upstream ticket: https://pagure.io/freeipa/issue/9402 is this similar to an older issue with https://github.com/python-ldap/python-ldap/pull/416 https://bugzilla.redhat.com/show_bug.cgi?id=1931865#c68 ? (In reply to Marc Sauton from comment #4) > is this similar to an older issue with > https://github.com/python-ldap/python-ldap/pull/416 > Partnerhttps://bugzilla.redhat.com/show_bug.cgi?id=1931865#c68 > ? It's similar in the fact that casting a ber_tag_t or ber_len_t to an int on s390x would produces unwanted result. But the issue was in a different part of the code. Fixed upstream master: https://pagure.io/freeipa/c/7060e3a031fb4e4cdf85f616f1e1a3435d61e696 Fixed upstream ipa-4-10: https://pagure.io/freeipa/c/631dd72369385b0793e5bc0e019c088b4f1e2bb3 Fixed upstream ipa-4-9: https://pagure.io/freeipa/c/a7e167154b889f75463ccc9cd91a75c1afb22da9 Test results without fix: Using : ipa-server-4.10.2-1.el9.s390x .... 2023-07-04T12:40:11+0000 FAILED src/otp/test_0004_authentication_indicators.py::TestAuthIndent::test002 2023-07-04T12:40:11+0000 FAILED src/otp/test_0004_authentication_indicators.py::TestAuthIndent::test003 2023-07-04T12:40:11+0000 FAILED src/otp/test_0004_authentication_indicators.py::TestAuthIndent::test004 2023-07-04T12:40:11+0000 FAILED src/otp/test_0004_authentication_indicators.py::TestAuthIndent::test013 2023-07-04T12:40:11+0000 ====== 4 failed, 29 passed, 25 xfailed, 10 warnings in 685.95s (0:11:25) ======= ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Test results with test compose: Using :ipa-server-4.10.2-2.el9.s390x 2023-07-04T10:17:36+0000 =========================== short test summary info ============================ 2023-07-04T10:17:36+0000 PASSED src/otp/test_0002_radius_master_tests.py::TestRadiusfunction::test_radius_0001 ... ... ... 2023-07-04T10:17:36+0000 PASSED src/otp/test_0004_authentication_indicators.py::TestAuthIndent::test016 2023-07-04T10:17:36+0000 XFAIL src/otp/test_0001_otp_master_tests.py::TestOTPfunction::test_otp_0001 ... ... 2023-07-04T10:17:36+0000 XFAIL src/otp/test_0001_otp_master_tests.py::TestOTPfunction::test_otp_0047 2023-07-04T10:17:36+0000 reason: oathtool package installation failed, check repo links for further debugging 2023-07-04T10:17:36+0000 =========== 33 passed, 25 xfailed, 10 warnings in 745.46s (0:12:25) ============ Based on this marking bug as verified tested. Verified using nightly build ipa-server-4.10.2-2.el9.s390x Test result: ... ... 2023-07-11T10:20:45+0000 src/otp/test_0004_authentication_indicators.py::TestAuthIndent::test002 PASSED [ 75%] 2023-07-11T10:21:17+0000 src/otp/test_0004_authentication_indicators.py::TestAuthIndent::test003 PASSED [ 77%] 2023-07-11T10:21:44+0000 src/otp/test_0004_authentication_indicators.py::TestAuthIndent::test004 PASSED [ 79%] ... ... 2023-07-11T10:22:45+0000 src/otp/test_0004_authentication_indicators.py::TestAuthIndent::test013 PASSED [ 94%] 2023-07-11T10:22:46+0000 src/otp/test_0004_authentication_indicators.py::TestAuthIndent::test014 PASSED [ 96%] 2023-07-11T10:22:46+0000 src/otp/test_0004_authentication_indicators.py::TestAuthIndent::test015 PASSED [ 98%] 2023-07-11T10:22:47+0000 src/otp/test_0004_authentication_indicators.py::TestAuthIndent::test016 PASSED [100%] 2023-07-11T10:22:47+0000 =========== 33 passed, 25 xfailed, 10 warnings in 709.79s (0:11:49) ============ 2023-07-11T10:22:49+0000 AVC not found 2023-07-11T10:22:49+0000 AVC not found 2023-07-11T10:22:49+0000 RETURN CODE: 0 Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (ipa bug fix and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2023:6477 |