Bug 1434992
| Summary: | Wrong pam return code for user from subdomain with ad_access_filter | |||
|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux 7 | Reporter: | Jakub Hrozek <jhrozek> | |
| Component: | sssd | Assignee: | SSSD Maintainers <sssd-maint> | |
| Status: | CLOSED ERRATA | QA Contact: | shridhar <sgadekar> | |
| Severity: | urgent | Docs Contact: | ||
| Priority: | urgent | |||
| Version: | 7.3 | CC: | grajaiya, jhrozek, lslebodn, mkosek, mzidek, pbrezina, sgoveas, tscherf | |
| Target Milestone: | rc | Keywords: | Regression, ZStream | |
| Target Release: | --- | |||
| Hardware: | Unspecified | |||
| OS: | Unspecified | |||
| Whiteboard: | ||||
| Fixed In Version: | sssd-1.15.2-24.el7 | Doc Type: | If docs needed, set a value | |
| Doc Text: | Story Points: | --- | ||
| Clone Of: | ||||
| : | 1450125 (view as bug list) | Environment: | ||
| Last Closed: | 2017-08-01 09:04:18 UTC | Type: | --- | |
| Regression: | --- | Mount Type: | --- | |
| Documentation: | --- | CRM: | ||
| Verified Versions: | Category: | --- | ||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
| Cloudforms Team: | --- | Target Upstream Version: | ||
| Embargoed: | ||||
| Bug Depends On: | ||||
| Bug Blocks: | 1450125 | |||
|
Description
Jakub Hrozek
2017-03-22 20:47:36 UTC
master: * df4b24bed15f45bf286fb0102fd397218fdd4186 sssd-1-14: * 4540d9f6817c78eef7b6e2d79245434811b59ad9 verified ad_forest job (ad_access_filter) [root@qe-blade-11 ~]# rpm -q sssd sssd-1.15.2-24.el7.x86_64 [root@qe-blade-11 ~]# ls anaconda-ks.cfg NETBOOT_METHOD.TXT original-ks.cfg RECIPE.TXT [root@qe-blade-11 ~]# cat /etc/sssd/sssd.conf [sssd] config_file_version = 2 services = nss, pam domains = sssdad.com [domain/sssdad.com] debug_level = 0x0180 id_provider = ad use_fully_qualified_names = True krb5_auth_timeout = 15 access_provider=ad ad_access_filter=(cn=user1_dom1-1860200) [root@qe-blade-11 ~]# cat /var/log/secure May 17 06:09:26 localhost su: pam_unix(su:session): session opened for user nobody by (uid=0) May 17 06:09:27 localhost su: pam_sss(su:auth): authentication success; logname= uid=99 euid=0 tty=pts/1 ruser=nobody rhost= user=user1_dom1-1860200 May 17 06:09:27 localhost su: pam_unix(su:session): session opened for user user1_dom1-1860200 by (uid=99) May 17 06:09:27 localhost su: pam_unix(su:session): session closed for user user1_dom1-1860200 May 17 06:09:27 localhost su: pam_unix(su:session): session closed for user nobody May 17 06:09:27 localhost su: pam_unix(su:session): session opened for user nobody by (uid=0) May 17 06:09:28 localhost su: pam_sss(su:auth): authentication success; logname= uid=99 euid=0 tty=pts/1 ruser=nobody rhost= user=user2_dom1-1860200 May 17 06:09:28 localhost su: pam_sss(su:account): Access denied for user user2_dom1-1860200: 6 (Permission denied) May 17 06:09:29 localhost su: pam_unix(su:session): session closed for user nobody May 17 06:09:29 localhost su: pam_unix(su:session): session opened for user nobody by (uid=0) May 17 06:09:30 localhost su: pam_unix(su:session): session closed for user nobody May 17 06:09:30 localhost su: pam_unix(su:session): session opened for user nobody by (uid=0) May 17 06:09:31 localhost su: pam_sss(su:auth): authentication success; logname= uid=99 euid=0 tty=pts/1 ruser=nobody rhost= user=user1_dom3-1860200.com May 17 06:09:32 localhost su: pam_sss(su:account): Access denied for user user1_dom3-1860200.com: 6 (Permission denied) May 17 06:09:33 localhost su: pam_unix(su:session): session closed for user nobody Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHEA-2017:2294 |