Bug 911329
| Summary: | pwd_expiration_warning has wrong default for Kerberos | |||
|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux 6 | Reporter: | Jakub Hrozek <jhrozek> | |
| Component: | sssd | Assignee: | Jakub Hrozek <jhrozek> | |
| Status: | CLOSED ERRATA | QA Contact: | Kaushik Banerjee <kbanerje> | |
| Severity: | high | Docs Contact: | ||
| Priority: | high | |||
| Version: | 6.4 | CC: | amessina, dpal, grajaiya, jgalipea, jpallich, mkosek, pbrezina | |
| Target Milestone: | rc | Keywords: | Regression, ZStream | |
| Target Release: | --- | |||
| Hardware: | Unspecified | |||
| OS: | Unspecified | |||
| Whiteboard: | ||||
| Fixed In Version: | sssd-1.9.2-85.el6 | Doc Type: | Bug Fix | |
| Doc Text: |
Cause: The pam_pwd_expiration warning was errorneously set to 0 for the Kerberos provider, which means "always display password expiration warning if the server sends one".
Consequence: For some environments, such as AD or IPA, this resulted in a password expiration warning on each login
Fix: The default was fixed to be 7 days
Result: the warning is only displayed if the password expires in 7 or fewer days
|
Story Points: | --- | |
| Clone Of: | ||||
| : | 911331 912223 (view as bug list) | Environment: | ||
| Last Closed: | 2013-11-21 22:14:38 UTC | Type: | --- | |
| Regression: | --- | Mount Type: | --- | |
| Documentation: | --- | CRM: | ||
| Verified Versions: | Category: | --- | ||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
| Cloudforms Team: | --- | Target Upstream Version: | ||
| Embargoed: | ||||
| Bug Depends On: | ||||
| Bug Blocks: | 911331, 912223, 914671 | |||
|
Description
Jakub Hrozek
2013-02-14 18:17:53 UTC
Verified in version 1.9.2-123.el6 Output from beaker automation run: :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ LOG ] :: default pwd_expiration_warning :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ PASS ] :: Authentication successful, as expected :: [ PASS ] :: Running 'strict eval 'auth_success policy_user1 Secret123'' (Expected 0, got 0) :: [ PASS ] :: File '/var/log/secure' should not contain 'Your password will expire in ' :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ LOG ] :: pwd_expiration_warning=0 :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ PASS ] :: Authentication successful, as expected :: [ PASS ] :: Running 'strict eval 'auth_success policy_user1 Secret123'' (Expected 0, got 0) :: [ PASS ] :: File '/var/log/secure' should contain 'Your password will expire in ' :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ LOG ] :: pwd_expiration_warning=15 :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ PASS ] :: Authentication successful, as expected :: [ PASS ] :: Running 'strict eval 'auth_success policy_user1 Secret123'' (Expected 0, got 0) :: [ PASS ] :: File '/var/log/secure' should contain 'Your password will expire in ' :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ LOG ] :: pwd_expiration_warning=7 :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ PASS ] :: Authentication successful, as expected :: [ PASS ] :: Running 'strict eval 'auth_success policy_user1 Secret123'' (Expected 0, got 0) :: [ PASS ] :: File '/var/log/secure' should not contain 'Your password will expire in ' :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ LOG ] :: Default pwd_expiration_warning and password will expire in 6 days on server :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ PASS ] :: Authentication successful, as expected :: [ PASS ] :: Running 'strict eval 'auth_success policy_user1 Secret123'' (Expected 0, got 0) :: [ PASS ] :: File '/var/log/secure' should contain 'Your password will expire in ' Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. http://rhn.redhat.com/errata/RHBA-2013-1680.html |