| Summary: | UsePAM prevents ssh logins when LDAP is used for authentication with TLS enabled | ||
|---|---|---|---|
| Product: | [Fedora] Fedora | Reporter: | Slawomir Czarko <slawomir.czarko> |
| Component: | pam | Assignee: | Tomas Mraz <tmraz> |
| Status: | CLOSED NOTABUG | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
| Severity: | unspecified | Docs Contact: | |
| Priority: | unspecified | ||
| Version: | 15 | CC: | tmraz |
| Target Milestone: | --- | ||
| Target Release: | --- | ||
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | Bug Fix | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2011-10-17 15:11:14 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
|
Description
Slawomir Czarko
2011-10-17 12:49:26 UTC
'UsePAM no' is unsupported and will not work correctly. Is there anything else related in /var/log/secure besides the message above? What is in your /etc/pam.d/password-auth file? In /var/log/secure I get: Oct 17 16:14:05 larch sshd[28492]: pam_ldap: ldap_starttls_s: Operations error Oct 17 14:14:05 larch sshd[28493]: fatal: Access denied for user xxx by PAM account configuration cat /etc/pam.d/password-auth #%PAM-1.0 # This file is auto-generated. # User changes will be destroyed the next time authconfig is run. auth required pam_env.so auth sufficient pam_unix.so nullok try_first_pass auth requisite pam_succeed_if.so uid >= 500 quiet auth sufficient pam_sss.so use_first_pass auth sufficient pam_ldap.so use_first_pass auth required pam_deny.so account required pam_access.so account required pam_unix.so broken_shadow account sufficient pam_localuser.so account sufficient pam_succeed_if.so uid < 500 quiet account [default=bad success=ok user_unknown=ignore] pam_sss.so account [default=bad success=ok user_unknown=ignore] pam_ldap.so account required pam_permit.so password requisite pam_cracklib.so try_first_pass retry=3 type= password sufficient pam_unix.so md5 shadow nullok try_first_pass use_authtok password sufficient pam_sss.so use_authtok password sufficient pam_ldap.so use_authtok password required pam_deny.so session optional pam_keyinit.so revoke session required pam_limits.so -session optional pam_systemd.so session [success=1 default=ignore] pam_succeed_if.so service in crond quiet use_uid session required pam_unix.so session optional pam_sss.so session optional pam_ldap.so Not sure if that's the source of this problem but in /etc/pam_ldap.conf I had: uri ldaps://ldap ssl start_tls These lines were inserted by authconfig. It works after changing second line to: ssl no Actually, I'm not sure if I should be using --enableldaptls here at all since the LDAP URL is ldaps://ldap Yes, you should not be using the --enableldaptls for the ldaps URLs. |