Bug 1007469 - When in IPA server mode, SSSD should map trusted forest subdomains to root domain realm
Summary: When in IPA server mode, SSSD should map trusted forest subdomains to root do...
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: None
Product: Red Hat Enterprise Linux 7
Classification: Red Hat
Component: sssd
Version: 7.0
Hardware: Unspecified
OS: Unspecified
medium
unspecified
Target Milestone: rc
: ---
Assignee: Jakub Hrozek
QA Contact: Kaushik Banerjee
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2013-09-12 14:37 UTC by Dmitri Pal
Modified: 2020-05-02 17:28 UTC (History)
8 users (show)

Fixed In Version: sssd-1.11.1-1.el7
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2014-06-13 11:19:16 UTC
Target Upstream Version:


Attachments (Terms of Use)


Links
System ID Priority Status Summary Last Updated
Github SSSD sssd issues 3122 None closed When in IPA server mode, SSSD should map trusted forest subdomains to root domain realm 2020-05-25 11:15:10 UTC

Description Dmitri Pal 2013-09-12 14:37:04 UTC
This bug is created as a clone of upstream ticket:
https://fedorahosted.org/sssd/ticket/2080

SSSD writes down domain/realm mapping information for Kerberos-enabled applications. This information should include mapping from subdomains' DNS domains to the trusted forest Kerberos realm. Right now only DNS domain of the forest root domain is mapped to the trusted forest Kerberos realm.

This is needed for IPA KDC to correctly issue referrals to the trusted forest root domain when handling access to services in the trusted forest subdomains.

Comment 1 Jakub Hrozek 2013-09-26 09:15:43 UTC
Sumit is actively working on this bug.

Comment 2 Jakub Hrozek 2013-09-27 08:53:13 UTC
master
    ce29aa8998332fd3c2e4e4b81e7302d41c461893
    bbd43fbcd8f70eedeac4e4ce01c36256cde82ab1
    c5711b0279ea85d69fe3c77dfb194360c346e1d7 
sssd-1-11:
    2ad333640cdd48e64ffb3183dcdede747285dcd1
    0ee14e804e5a6ef6c0fbcc006c376d7cd51a960f
    a091e5b7831ea84c739493dc20a84ad834f6df7e

Comment 4 Jakub Hrozek 2013-10-04 13:25:31 UTC
Temporarily moving bugs to MODIFIED to work around errata tool bug

Comment 6 Sumit Bose 2014-01-30 10:53:25 UTC
To verify this ticket you should check the SSSD-generated krb5.conf include file /var/lib/sss/pubconf/krb5.include.d/domain_realm_IPA_REALM on a FreeIPA host with trust to an AD forest with more than one domain.

In this file all domain-REALM pairs of the AD forest should be listed in the [domain_realm] section and in the [capaths] section should see entries like

FOREST.MEMBER = {
  IPA.REALM = FOREST.ROOT

IPA.REALM = {
  FOREST.MEMBER = FOREST.ROOT
}

for every domain in the forest except the forest root.

Comment 7 Steeve Goveas 2014-01-30 13:18:08 UTC
[root@dhcp207-218 ~]# echo Secret123 | ipa trust-add adtest.qe --type ad --admin administrator --password
--------------------------------------------------
Added Active Directory trust for realm "adtest.qe"
--------------------------------------------------
  Realm name: adtest.qe
  Domain NetBIOS name: ADTEST
  Domain Security Identifier: S-1-5-21-1910160501-511572375-3625658879
  SID blacklist incoming: S-1-0, S-1-1, S-1-2, S-1-3, S-1-5-1, S-1-5-2, S-1-5-3, S-1-5-4, S-1-5-5, S-1-5-6, S-1-5-7, S-1-5-8, S-1-5-9, S-1-5-10, S-1-5-11, S-1-5-12, S-1-5-13, S-1-5-14, S-1-5-15, S-1-5-16,
                          S-1-5-17, S-1-5-18, S-1-5-19, S-1-5-20
  SID blacklist outgoing: S-1-0, S-1-1, S-1-2, S-1-3, S-1-5-1, S-1-5-2, S-1-5-3, S-1-5-4, S-1-5-5, S-1-5-6, S-1-5-7, S-1-5-8, S-1-5-9, S-1-5-10, S-1-5-11, S-1-5-12, S-1-5-13, S-1-5-14, S-1-5-15, S-1-5-16,
                          S-1-5-17, S-1-5-18, S-1-5-19, S-1-5-20
  Trust direction: Two-way trust
  Trust type: Active Directory domain
  Trust status: Established and verified

[root@dhcp207-218 ~]# cat /var/lib/sss/pubconf/krb5.include.d/domain_realm_newdom_qe
[domain_realm]

[root@dhcp207-218 ~]# ipa trustdomain-find adtest.qe
  Domain name: adtest.qe
  Domain NetBIOS name: ADTEST
  Domain Security Identifier: S-1-5-21-1910160501-511572375-3625658879
  Domain enabled: True

  Domain name: pune.adtest.qe
  Domain NetBIOS name: PUNE
  Domain Security Identifier: S-1-5-21-91314187-2404433721-1858927112
  Domain enabled: True
----------------------------
Number of entries returned 2
----------------------------

[root@dhcp207-218 ~]# cat /var/lib/sss/pubconf/krb5.include.d/domain_realm_newdom_qe
[domain_realm]

[root@dhcp207-218 ~]# getent passwd testu1@pune.adtest.qe
testu1@pune.adtest.qe:*:839001108:839001108:testu1 user:/home/pune.adtest.qe/testu1:

* File contents get added as expected after a while or when a lookup is done for a user in trusted domain

[root@dhcp207-218 ~]# cat /var/lib/sss/pubconf/krb5.include.d/domain_realm_newdom_qe
[domain_realm]
.adtest.qe = ADTEST.QE
adtest.qe = ADTEST.QE
.pune.adtest.qe = PUNE.ADTEST.QE
pune.adtest.qe = PUNE.ADTEST.QE
[capaths]
PUNE.ADTEST.QE = {
  NEWDOM.QE = ADTEST.QE
}
NEWDOM.QE = {
  PUNE.ADTEST.QE = ADTEST.QE
}

Comment 8 Ludek Smid 2014-06-13 11:19:16 UTC
This request was resolved in Red Hat Enterprise Linux 7.0.

Contact your manager or support representative in case you have further questions about the request.


Note You need to log in before you can comment on or make changes to this bug.