Bug 846029
Summary: | ldap change passwd failed to be propagated to master in chain-update configuration | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 6 | Reporter: | Dawei Wang <daweiwang> |
Component: | sssd | Assignee: | Stephen Gallagher <sgallagh> |
Status: | CLOSED WONTFIX | QA Contact: | IDM QE LIST <seceng-idm-qe-list> |
Severity: | high | Docs Contact: | |
Priority: | unspecified | ||
Version: | 6.3 | CC: | grajaiya, jgalipea |
Target Milestone: | rc | ||
Target Release: | --- | ||
Hardware: | x86_64 | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2012-08-06 15:23:08 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Dawei Wang
2012-08-06 15:09:57 UTC
Bugs against CentOS packages should not be submitted to the Red Hat Bugzilla. Please file them at http://bugs.centos.org Furthermore, this bug is irrelevant to SSSD. If the password-change succeeded against the slave LDAP server (and can be viewed there), then the issue can only be with replication. The client cannot impact this in any way. Closing this bug as WONTFIX because the issue is in centos-ds, which is not a Red Hat Enterprise Linux package. If you think, it's not the client os problem, then why RHEL5 works perfectly. (In reply to comment #3) > If you think, it's not the client os problem, then why RHEL5 works perfectly. At a guess, I'd say you're probably using pam_ldap on RHEL 5 using the less-secure method of writing the password attribute directly on a password-change. SSSD requires the use of the (more secure) password-change extended-operation, which you may not have configured properly with replication. yes, that seems the case i guess chain-on-update cannot chain password extended operation. |