RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
Bug 1290378 - Smart Cards: Certificate in the ID View
Summary: Smart Cards: Certificate in the ID View
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Linux 7
Classification: Red Hat
Component: sssd
Version: 7.0
Hardware: Unspecified
OS: Unspecified
high
medium
Target Milestone: rc
: ---
Assignee: Sumit Bose
QA Contact: Namita Soman
URL:
Whiteboard:
Depends On:
Blocks: 1292074 1296125 1313485 1442703
TreeView+ depends on / blocked
 
Reported: 2015-12-10 11:19 UTC by Jakub Hrozek
Modified: 2020-05-02 18:15 UTC (History)
11 users (show)

Fixed In Version: sssd-1.14.0-0.1.alpha.el7
Doc Type: Bug Fix
Doc Text:
Clone Of:
: 1442703 (view as bug list)
Environment:
Last Closed: 2016-11-04 07:13:11 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Github SSSD sssd issues 3938 0 None closed Smart Cards: Certificate in the ID View 2020-05-02 18:15:05 UTC
Red Hat Product Errata RHEA-2016:2476 0 normal SHIPPED_LIVE sssd bug fix and enhancement update 2016-11-03 14:08:11 UTC

Description Jakub Hrozek 2015-12-10 11:19:46 UTC
This bug is created as a clone of upstream ticket:
https://fedorahosted.org/sssd/ticket/2897

It should be possible to add Smart Card certificates for AD user ID Views, in AD Trust case.
Note: AD User Self-Service is not required, pkinit is also not required.
Note 2: certificate in AD should work already to some extent

Please also see https://fedorahosted.org/freeipa/ticket/4955 for more details

Comment 2 Jakub Hrozek 2016-06-09 14:30:38 UTC
 master:
 * 9c88f837ffacf6548c13825589b327de1a5525f3
 * 1a45124f3f300f9afdcb08eab0938e5e7d0534d9
 * 21513e51a4a2eb08f245333bf8f223713a3d7cb3
 * 2f90ec2e16f0c14c789d9ed20e008e3103337210
 * 8822520e6552bbf5ad1b62a4f88dd31a9c8475f1
 * ffe2522a208cddd415d7c3498dcc73ffda863b6f
 * cf89f552f06b95bd69d8c61aaa55a330a5d9f6e6
 * dc936929c01647c0fc116a112cee200156328037
 * a1210c8db81a1cc0b45eb62a8450abcdea3afc7b
 * cdc3e9dc42e13f01d8e2623e92dd046a5bb169f1
 * 6cb34580ee6e9e2c9190b77b10db8a3c43e3c9c8
 * 6cdeb0923c16e3fafe21aaadca6dac1d71474c31

Comment 4 Petr Vobornik 2016-09-13 15:09:00 UTC
Adjusting the state according to Sumit's update in bug 1298966, comment 15:
"""
Yes, it makes more sense to report this issues in a SSSD related ticket, e.g. https://bugzilla.redhat.com/show_bug.cgi?id=1290378 .

Roshni, can you copy the logs to #1290378 and switch this ticket back to QA because this ticket is for the IPA server side which only includes adding and removing certificates to the id-overrides, which is unrelated to the issue you see.
"""

There, Roshni reported:
Seeing authentication failure when a smartcard has a cert issued by AD CA. Seeing the following in p11_child log

(Sun Sep 11 12:16:34 2016) [[sssd[p11_child[4078]]]] [main] (0x0400): p11_child started.
(Sun Sep 11 12:16:34 2016) [[sssd[p11_child[4078]]]] [main] (0x2000): Running in [auth] mode.
(Sun Sep 11 12:16:34 2016) [[sssd[p11_child[4078]]]] [main] (0x2000): Running with effective IDs: [0][0].
(Sun Sep 11 12:16:34 2016) [[sssd[p11_child[4078]]]] [main] (0x2000): Running with real IDs [0][0].
(Sun Sep 11 12:16:35 2016) [[sssd[p11_child[4078]]]] [do_work] (0x4000): Default Module List:
(Sun Sep 11 12:16:35 2016) [[sssd[p11_child[4078]]]] [do_work] (0x4000): common name: [NSS Internal PKCS #11 Module].
(Sun Sep 11 12:16:35 2016) [[sssd[p11_child[4078]]]] [do_work] (0x4000): dll name: [(null)].
(Sun Sep 11 12:16:35 2016) [[sssd[p11_child[4078]]]] [do_work] (0x4000): common name: [opensc module].
(Sun Sep 11 12:16:35 2016) [[sssd[p11_child[4078]]]] [do_work] (0x4000): dll name: [/usr/lib64/opensc-pkcs11.so].
(Sun Sep 11 12:16:35 2016) [[sssd[p11_child[4078]]]] [do_work] (0x4000): Dead Module List:
(Sun Sep 11 12:16:35 2016) [[sssd[p11_child[4078]]]] [do_work] (0x4000): DB Module List:
(Sun Sep 11 12:16:35 2016) [[sssd[p11_child[4078]]]] [do_work] (0x4000): common name: [NSS Internal Module].
(Sun Sep 11 12:16:35 2016) [[sssd[p11_child[4078]]]] [do_work] (0x4000): dll name: [(null)].
(Sun Sep 11 12:16:35 2016) [[sssd[p11_child[4078]]]] [do_work] (0x4000): Description [NSS User Private Key and Certificate Services                   Mozilla Foundation              ] Manufacturer [Mozilla Foundation              ] flags [1].
(Sun Sep 11 12:16:35 2016) [[sssd[p11_child[4078]]]] [do_work] (0x4000): Description [NSS Internal Cryptographic Services                             Mozilla Foundation              ] Manufacturer [Mozilla Foundation              ] flags [1].
(Sun Sep 11 12:16:35 2016) [[sssd[p11_child[4078]]]] [do_work] (0x4000): Description [OMNIKEY AG CardMan 3021 00 00                                   OpenSC (www.opensc-project.org) ] Manufacturer [OpenSC (www.opensc-project.org) ] flags [7].
(Sun Sep 11 12:16:35 2016) [[sssd[p11_child[4078]]]] [do_work] (0x4000): Found [OpenSC Card (scuser1] in slot [OMNIKEY AG CardMan 3021 00 00][1] of module [2].
(Sun Sep 11 12:16:35 2016) [[sssd[p11_child[4078]]]] [do_work] (0x4000): Token is NOT friendly.
(Sun Sep 11 12:16:35 2016) [[sssd[p11_child[4078]]]] [do_work] (0x4000): Login required.
(Sun Sep 11 12:16:35 2016) [[sssd[p11_child[4078]]]] [do_work] (0x4000): found cert[OpenSC Card (scuser1:Certificate][CN=smartcard user1,CN=Users,DC=ipaad2012,DC=test]
(Sun Sep 11 12:16:35 2016) [[sssd[p11_child[4078]]]] [do_work] (0x4000): Filtered certificates:
(Sun Sep 11 12:16:35 2016) [[sssd[p11_child[4078]]]] [do_work] (0x4000): found cert[OpenSC Card (scuser1:Certificate][CN=smartcard user1,CN=Users,DC=ipaad2012,DC=test]
(Sun Sep 11 12:16:35 2016) [[sssd[p11_child[4078]]]] [do_work] (0x0040): VFY_VerifyData failed [-8182].
(Sun Sep 11 12:16:35 2016) [[sssd[p11_child[4078]]]] [main] (0x0040): do_work failed.
(Sun Sep 11 12:16:35 2016) [[sssd[p11_child[4078]]]] [main] (0x0020): p11_child failed!


When the cert on the smartcard is issued by an external CA, su and gdm login were successful but ssh was failing. log messages

(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [get_client_cred] (0x4000): Client creds: euid[1000] egid[1000] pid[18753].
(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [reset_idle_timer] (0x4000): Idle timer re-set for client [0x7f7c3835e880][20]
(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [accept_fd_handler] (0x0400): Client connected!
(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [reset_idle_timer] (0x4000): Idle timer re-set for client [0x7f7c3835e880][20]
(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [sss_cmd_get_version] (0x0200): Received client version [0].
(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [sss_cmd_get_version] (0x0200): Offered version [0].
(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [reset_idle_timer] (0x4000): Idle timer re-set for client [0x7f7c3835e880][20]
(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [reset_idle_timer] (0x4000): Idle timer re-set for client [0x7f7c3835e880][20]
(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [ssh_cmd_parse_request] (0x0400): Requested domain [<ALL>]
(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [sss_ssh_cmd_get_host_pubkeys] (0x0400): Requesting SSH host public keys for [localhost][] from [<ALL>]
(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [sss_dp_issue_request] (0x0400): Issuing request for [0x7f7c37260650:localhost]
(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [sss_dp_get_ssh_host_msg] (0x0400): Creating SSH host request for [ipa1sc0817.test][0][localhost][-]
(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [sbus_add_timeout] (0x2000): 0x7f7c38361740
(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [sss_dp_internal_get_send] (0x0400): Entering request [0x7f7c37260650:localhost]
(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [sbus_remove_timeout] (0x2000): 0x7f7c38361740
(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [sbus_dispatch] (0x4000): dbus conn: 0x7f7c38353740
(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [sbus_dispatch] (0x4000): Dispatching.
(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [sss_dp_get_reply] (0x1000): Got reply from Data Provider - DP error code: 3 errno: 22 error message: Invalid argument
(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [ssh_host_pubkeys_search_dp_callback] (0x0040): Unable to get information from Data Provider
Error: 3, 22, Invalid argument
(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [ssh_host_pubkeys_search_next] (0x0400): Requesting SSH host public keys for [localhost]
(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [ldb] (0x4000): Added timed event "ltdb_callback": 0x7f7c3835ff70

(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [ldb] (0x4000): Added timed event "ltdb_timeout": 0x7f7c383cc0e0

(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [ldb] (0x4000): Running timer event 0x7f7c3835ff70 "ltdb_callback"

(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [ldb] (0x4000): Destroying timer event 0x7f7c383cc0e0 "ltdb_timeout"

(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [ldb] (0x4000): Ending timer event 0x7f7c3835ff70 "ltdb_callback"

(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [sysdb_search_ssh_hosts] (0x0400): No such host
(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [ssh_host_pubkeys_search] (0x0040): No matching domain found for [localhost], fail!
(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [ldb] (0x4000): Added timed event "ltdb_callback": 0x7f7c3836b4a0

(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [ldb] (0x4000): Added timed event "ltdb_timeout": 0x7f7c3836b560

(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [ldb] (0x4000): Running timer event 0x7f7c3836b4a0 "ltdb_callback"

(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [ldb] (0x4000): Destroying timer event 0x7f7c3836b560 "ltdb_timeout"

(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [ldb] (0x4000): Ending timer event 0x7f7c3836b4a0 "ltdb_callback"

(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [sysdb_search_ssh_hosts] (0x0400): No such host
(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [unique_filename_destructor] (0x2000): Unlinking [/var/lib/sss/pubconf/.known_hosts.FOqLeS]
(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [unlink_dbg] (0x2000): File already removed: [/var/lib/sss/pubconf/.known_hosts.FOqLeS]
(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [sss_dp_req_destructor] (0x0400): Deleting request: [0x7f7c37260650:localhost]
(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [reset_idle_timer] (0x4000): Idle timer re-set for client [0x7f7c3835e880][20]
(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [reset_idle_timer] (0x4000): Idle timer re-set for client [0x7f7c3835e880][20]
(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [client_recv] (0x0200): Client disconnected!
(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [client_close_fn] (0x2000): Terminated client [0x7f7c3835e880][20]
(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [get_client_cred] (0x4000): Client creds: euid[99] egid[99] pid[18758].
(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [reset_idle_timer] (0x4000): Idle timer re-set for client [0x7f7c383b6ad0][20]
(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [accept_fd_handler] (0x0400): Client connected!
(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [reset_idle_timer] (0x4000): Idle timer re-set for client [0x7f7c383b6ad0][20]
(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [sss_cmd_get_version] (0x0200): Received client version [0].
(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [sss_cmd_get_version] (0x0200): Offered version [0].
(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [reset_idle_timer] (0x4000): Idle timer re-set for client [0x7f7c383b6ad0][20]
(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [reset_idle_timer] (0x4000): Idle timer re-set for client [0x7f7c383b6ad0][20]
(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [ssh_cmd_parse_request] (0x0400): Requested domain [<ALL>]
(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [ssh_cmd_parse_request] (0x0400): Parsing name [scuser1][<ALL>]
(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [sss_parse_name_for_domains] (0x0200): name 'scuser1' matched expression for domain 'ipaad2012.test', user is scuser1
(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [sss_ssh_cmd_get_user_pubkeys] (0x0400): Requesting SSH user public keys for [scuser1] from [ipaad2012.test]
(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [sss_dp_issue_request] (0x0400): Issuing request for [0x7f7c37268c10:1:scuser1@ipaad2012.test]
(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [sss_dp_get_account_msg] (0x0400): Creating request for [ipaad2012.test][0x1][BE_REQ_USER][1][name=scuser1:-]
(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [sbus_add_timeout] (0x2000): 0x7f7c38357f40
(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [sss_dp_internal_get_send] (0x0400): Entering request [0x7f7c37268c10:1:scuser1@ipaad2012.test]
(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [sbus_remove_timeout] (0x2000): 0x7f7c38357f40
(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [sbus_dispatch] (0x4000): dbus conn: 0x7f7c38353740
(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [sbus_dispatch] (0x4000): Dispatching.
(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [sss_dp_get_reply] (0x1000): Got reply from Data Provider - DP error code: 0 errno: 0 error message: Success
(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [ssh_user_pubkeys_search_next] (0x0400): Requesting SSH user public keys for [scuser1]
(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [ldb] (0x4000): Added timed event "ltdb_callback": 0x7f7c38359bb0

(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [ldb] (0x4000): Added timed event "ltdb_timeout": 0x7f7c38359c70

(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [ldb] (0x4000): Running timer event 0x7f7c38359bb0 "ltdb_callback"

(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [ldb] (0x4000): Destroying timer event 0x7f7c38359c70 "ltdb_timeout"

(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [ldb] (0x4000): Ending timer event 0x7f7c38359bb0 "ltdb_callback"

(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [ldb] (0x4000): Added timed event "ltdb_callback": 0x7f7c383af420

(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [ldb] (0x4000): Added timed event "ltdb_timeout": 0x7f7c383595a0

(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [ldb] (0x4000): Running timer event 0x7f7c383af420 "ltdb_callback"

(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [ldb] (0x4000): Destroying timer event 0x7f7c383595a0 "ltdb_timeout"

(Fri Sep  9 12:56:53 2016) [sssd[ssh]] [ldb] (0x4000): Ending timer event 0x7f7c383af420 "ltdb_callback"

(Fri Sep  9 12:56:57 2016) [sssd[ssh]] [cert_to_ssh_key] (0x0020): CERT_VerifyCertificateNow failed [-8179].
(Fri Sep  9 12:56:57 2016) [sssd[ssh]] [get_valid_certs_keys] (0x0040): cert_to_ssh_key failed, ignoring.
(Fri Sep  9 12:56:57 2016) [sssd[ssh]] [decode_and_add_base64_data] (0x4000): Mssing element, nothing to do.
(Fri Sep  9 12:56:57 2016) [sssd[ssh]] [decode_and_add_base64_data] (0x4000): Mssing element, nothing to do.
(Fri Sep  9 12:56:57 2016) [sssd[ssh]] [decode_and_add_base64_data] (0x4000): Mssing element, nothing to do.
(Fri Sep  9 12:56:57 2016) [sssd[ssh]] [sss_dp_req_destructor] (0x0400): Deleting request: [0x7f7c37268c10:1:scuser1@ipaad2012.test]
(Fri Sep  9 12:56:57 2016) [sssd[ssh]] [reset_idle_timer] (0x4000): Idle timer re-set for client [0x7f7c383b6ad0][20]
(Fri Sep  9 12:56:58 2016) [sssd[ssh]] [reset_idle_timer] (0x4000): Idle timer re-set for client [0x7f7c383b6ad0][20]
(Fri Sep  9 12:56:58 2016) [sssd[ssh]] [client_recv] (0x0200): Client disconnected!
(Fri Sep  9 12:56:58 2016) [sssd[ssh]] [client_close_fn] (0x2000): Terminated client [0x7f7c383b6ad0][20]
(Fri Sep  9 12:57:00 2016) [sssd[ssh]] [get_client_cred] (0x4000): Client creds: euid[99] egid[99] pid[18772].
(Fri Sep  9 12:57:00 2016) [sssd[ssh]] [reset_idle_timer] (0x4000): Idle timer re-set for client [0x7f7c3835e880][20]
(Fri Sep  9 12:57:00 2016) [sssd[ssh]] [accept_fd_handler] (0x0400): Client connected!
(Fri Sep  9 12:57:00 2016) [sssd[ssh]] [reset_idle_timer] (0x4000): Idle timer re-set for client [0x7f7c3835e880][20]
(Fri Sep  9 12:57:00 2016) [sssd[ssh]] [sss_cmd_get_version] (0x0200): Received client version [0].
(Fri Sep  9 12:57:00 2016) [sssd[ssh]] [sss_cmd_get_version] (0x0200): Offered version [0].
(Fri Sep  9 12:57:00 2016) [sssd[ssh]] [reset_idle_timer] (0x4000): Idle timer re-set for client [0x7f7c3835e880][20]
(Fri Sep  9 12:57:00 2016) [sssd[ssh]] [reset_idle_timer] (0x4000): Idle timer re-set for client [0x7f7c3835e880][20]
(Fri Sep  9 12:57:00 2016) [sssd[ssh]] [ssh_cmd_parse_request] (0x0400): Requested domain [<ALL>]
(Fri Sep  9 12:57:00 2016) [sssd[ssh]] [ssh_cmd_parse_request] (0x0400): Parsing name [scuser1][<ALL>]
(Fri Sep  9 12:57:00 2016) [sssd[ssh]] [sss_parse_name_for_domains] (0x0200): name 'scuser1' matched expression for domain 'ipaad2012.test', user is scuser1
(Fri Sep  9 12:57:00 2016) [sssd[ssh]] [sss_ssh_cmd_get_user_pubkeys] (0x0400): Requesting SSH user public keys for [scuser1] from [ipaad2012.test]
(Fri Sep  9 12:57:00 2016) [sssd[ssh]] [sss_dp_issue_request] (0x0400): Issuing request for [0x7f7c37268c10:1:scuser1@ipaad2012.test]
(Fri Sep  9 12:57:00 2016) [sssd[ssh]] [sss_dp_get_account_msg] (0x0400): Creating request for [ipaad2012.test][0x1][BE_REQ_USER][1][name=scuser1:-]
(Fri Sep  9 12:57:00 2016) [sssd[ssh]] [sbus_add_timeout] (0x2000): 0x7f7c38361480
(Fri Sep  9 12:57:00 2016) [sssd[ssh]] [sss_dp_internal_get_send] (0x0400): Entering request [0x7f7c37268c10:1:scuser1@ipaad2012.test]
(Fri Sep  9 12:57:00 2016) [sssd[ssh]] [sbus_remove_timeout] (0x2000): 0x7f7c38361480
(Fri Sep  9 12:57:00 2016) [sssd[ssh]] [sbus_dispatch] (0x4000): dbus conn: 0x7f7c38353740
(Fri Sep  9 12:57:00 2016) [sssd[ssh]] [sbus_dispatch] (0x4000): Dispatching.
(Fri Sep  9 12:57:00 2016) [sssd[ssh]] [sss_dp_get_reply] (0x1000): Got reply from Data Provider - DP error code: 0 errno: 0 error message: Success
(Fri Sep  9 12:57:00 2016) [sssd[ssh]] [ssh_user_pubkeys_search_next] (0x0400): Requesting SSH user public keys for [scuser1]
(Fri Sep  9 12:57:00 2016) [sssd[ssh]] [ldb] (0x4000): Added timed event "ltdb_callback": 0x7f7c38359c70

(Fri Sep  9 12:57:00 2016) [sssd[ssh]] [ldb] (0x4000): Added timed event "ltdb_timeout": 0x7f7c3836b4a0

(Fri Sep  9 12:57:00 2016) [sssd[ssh]] [ldb] (0x4000): Running timer event 0x7f7c38359c70 "ltdb_callback"

(Fri Sep  9 12:57:00 2016) [sssd[ssh]] [ldb] (0x4000): Destroying timer event 0x7f7c3836b4a0 "ltdb_timeout"

(Fri Sep  9 12:57:00 2016) [sssd[ssh]] [ldb] (0x4000): Ending timer event 0x7f7c38359c70 "ltdb_callback"

(Fri Sep  9 12:57:00 2016) [sssd[ssh]] [ldb] (0x4000): Added timed event "ltdb_callback": 0x7f7c3838c5f0

(Fri Sep  9 12:57:00 2016) [sssd[ssh]] [ldb] (0x4000): Added timed event "ltdb_timeout": 0x7f7c383b7a40

(Fri Sep  9 12:57:00 2016) [sssd[ssh]] [ldb] (0x4000): Running timer event 0x7f7c3838c5f0 "ltdb_callback"

(Fri Sep  9 12:57:00 2016) [sssd[ssh]] [ldb] (0x4000): Destroying timer event 0x7f7c383b7a40 "ltdb_timeout"

(Fri Sep  9 12:57:00 2016) [sssd[ssh]] [ldb] (0x4000): Ending timer event 0x7f7c3838c5f0 "ltdb_callback"

(Fri Sep  9 12:57:05 2016) [sssd[ssh]] [cert_to_ssh_key] (0x0020): CERT_VerifyCertificateNow failed [-8179].
(Fri Sep  9 12:57:05 2016) [sssd[ssh]] [get_valid_certs_keys] (0x0040): cert_to_ssh_key failed, ignoring.
(Fri Sep  9 12:57:05 2016) [sssd[ssh]] [decode_and_add_base64_data] (0x4000): Mssing element, nothing to do.
(Fri Sep  9 12:57:05 2016) [sssd[ssh]] [decode_and_add_base64_data] (0x4000): Mssing element, nothing to do.
(Fri Sep  9 12:57:05 2016) [sssd[ssh]] [decode_and_add_base64_data] (0x4000): Mssing element, nothing to do.
(Fri Sep  9 12:57:05 2016) [sssd[ssh]] [sss_dp_req_destructor] (0x0400): Deleting request: [0x7f7c37268c10:1:scuser1@ipaad2012.test]
(Fri Sep  9 12:57:05 2016) [sssd[ssh]] [reset_idle_timer] (0x4000): Idle timer re-set for client [0x7f7c3835e880][20]
(Fri Sep  9 12:57:05 2016) [sssd[ssh]] [reset_idle_timer] (0x4000): Idle timer re-set for client [0x7f7c3835e880][20]
(Fri Sep  9 12:57:05 2016) [sssd[ssh]] [client_recv] (0x0200): Client disconnected!
(Fri Sep  9 12:57:05 2016) [sssd[ssh]] [client_close_fn] (0x2000): Terminated client [0x7f7c3835e880][20]

Comment 5 Sumit Bose 2016-09-16 16:40:01 UTC
The "VFY_VerifyData failed [-8182]." was caused by an invalid Smartcard which we fixed recently, please re-test.

Comment 6 Roshni 2016-09-18 20:57:05 UTC
[root@dhcp129-34 ~]# rpm -qi sssd
Name        : sssd
Version     : 1.14.0
Release     : 42.el7
Architecture: x86_64
Install Date: Sun 18 Sep 2016 12:54:23 PM EDT
Group       : Applications/System
Size        : 35147
License     : GPLv3+
Signature   : (none)
Source RPM  : sssd-1.14.0-42.el7.src.rpm
Build Date  : Fri 16 Sep 2016 09:48:09 AM EDT
Build Host  : x86-039.build.eng.bos.redhat.com
Relocations : (not relocatable)
Packager    : Red Hat, Inc. <http://bugzilla.redhat.com/bugzilla>
Vendor      : Red Hat, Inc.
URL         : http://fedorahosted.org/sssd/
Summary     : System Security Services Daemon

Tested using IPA client. Tested login using gdm, su and ssh when certificates on the card has certs associated with AD users. Smartcard authentication directly to AD server is successful. Smartcard authentication is successful when ipa has the override users for the AD users. Tested successfully using external CA and AD CA issued certificates on the smartcard.

Comment 9 errata-xmlrpc 2016-11-04 07:13:11 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://rhn.redhat.com/errata/RHEA-2016-2476.html


Note You need to log in before you can comment on or make changes to this bug.