RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
Bug 1758566 - negative cache does not use values from 'filter_users' config option for known domains [rhel-7.7.z]
Summary: negative cache does not use values from 'filter_users' config option for know...
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Linux 7
Classification: Red Hat
Component: sssd
Version: 7.7
Hardware: Unspecified
OS: Unspecified
high
high
Target Milestone: rc
: ---
Assignee: Michal Zidek
QA Contact: ipa-qe
URL:
Whiteboard:
Depends On: 1724088
Blocks:
TreeView+ depends on / blocked
 
Reported: 2019-10-04 14:15 UTC by RAD team bot copy to z-stream
Modified: 2020-05-04 11:12 UTC (History)
13 users (show)

Fixed In Version: sssd-1.16.4-21.el7_7.1
Doc Type: If docs needed, set a value
Doc Text:
Clone Of: 1724088
Environment:
Last Closed: 2019-11-26 13:57:38 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Github SSSD sssd issues 4950 0 None closed UPN negative cache does not use values from 'filter_users' config option 2021-02-02 12:25:36 UTC
Red Hat Product Errata RHBA-2019:3972 0 None None None 2019-11-26 13:57:40 UTC

Description RAD team bot copy to z-stream 2019-10-04 14:15:57 UTC
This bug has been copied from bug #1724088 and has been proposed to be backported to 7.7 z-stream (EUS).

Comment 5 anuja 2019-11-11 09:11:33 UTC
[root@master ~]#  rpm -qa sssd
sssd-1.16.4-21.el7_7.1.x86_64
[root@master ~]#  grep -B 3 "filter_users" /etc/sssd/sssd.conf
[nss]
memcache_timeout = 600
homedir_substring = /home
filter_users = aduser1
[root@master ~]# ipa config-show | grep resolution
  Domain resolution order: ipaad2k16cin.test:sssd77.test
[root@master ~]# ipactl stop
Stopping ipa-dnskeysyncd Service
Stopping ipa-otpd Service
Stopping pki-tomcatd Service
Stopping ntpd Service
Stopping ipa-custodia Service
Stopping httpd Service
Stopping named Service
Stopping kadmin Service
Stopping krb5kdc Service
Stopping Directory Service
ipa: INFO: The ipactl command was successful
[root@master ~]# service sssd stop; rm -rf /var/lib/sss/{db,mc}/*; service sssd start
Redirecting to /bin/systemctl stop sssd.service
Redirecting to /bin/systemctl start sssd.service
[root@master ~]# ipactl start
Starting Directory Service
Starting krb5kdc Service
Starting kadmin Service
Starting named Service
Starting httpd Service
Starting ipa-custodia Service
Starting ntpd Service
Starting pki-tomcatd Service
Starting smb Service
Starting winbind Service
Starting ipa-otpd Service
Starting ipa-dnskeysyncd Service
ipa: INFO: The ipactl command was successful
[root@master ~]#  sssctl domain-list | grep ipaad2k16cin.test
ipaad2k16cin.test
ipasubad2k16cin.ipaad2k16cin.test
[root@master ~]# 
[root@master ~]#  id aduser1
id: aduser1: no such user
[root@master ~]# date
Mon Nov 11 04:00:44 EST 2019
[root@master ~]# grep -F "Looking up [aduser1] in data provider" /var/log/sssd/sssd_nss.log
[root@master ~]# echo $?
1
[root@master ~]# grep -F "in data provider" /var/log/sssd/sssd_nss.log
(Mon Nov 11 03:58:12 2019) [sssd[nss]] [cache_req_search_dp] (0x0400): CR #0: Looking up [named] in data provider
(Mon Nov 11 03:58:13 2019) [sssd[nss]] [cache_req_search_dp] (0x0400): CR #1: Looking up [kdcproxy] in data provider
(Mon Nov 11 03:58:13 2019) [sssd[nss]] [cache_req_search_dp] (0x0400): CR #2: Looking up [kdcproxy] in data provider
(Mon Nov 11 03:58:13 2019) [sssd[nss]] [cache_req_search_dp] (0x0400): CR #3: Looking up [ipaapi] in data provider
(Mon Nov 11 03:58:13 2019) [sssd[nss]] [cache_req_search_dp] (0x0400): CR #4: Looking up [ipaapi] in data provider
(Mon Nov 11 03:58:13 2019) [sssd[nss]] [cache_req_search_dp] (0x0400): CR #5: Looking up [apache] in data provider
(Mon Nov 11 03:58:13 2019) [sssd[nss]] [cache_req_search_dp] (0x0400): CR #6: Looking up [apache] in data provider
(Mon Nov 11 03:58:13 2019) [sssd[nss]] [cache_req_search_dp] (0x0400): CR #7: Looking up [ipaapi] in data provider
(Mon Nov 11 03:58:13 2019) [sssd[nss]] [cache_req_search_dp] (0x0400): CR #8: Looking up [apache] in data provider
(Mon Nov 11 03:58:13 2019) [sssd[nss]] [cache_req_search_dp] (0x0400): CR #9: Looking up [apache] in data provider
(Mon Nov 11 03:58:13 2019) [sssd[nss]] [cache_req_search_dp] (0x0400): CR #10: Looking up [ipaapi] in data provider
(Mon Nov 11 03:58:13 2019) [sssd[nss]] [cache_req_search_dp] (0x0400): CR #11: Looking up [apache] in data provider
(Mon Nov 11 03:58:15 2019) [sssd[nss]] [cache_req_search_dp] (0x0400): CR #12: Looking up [pkiuser] in data provider
(Mon Nov 11 03:58:16 2019) [sssd[nss]] [cache_req_search_dp] (0x0400): CR #13: Looking up [ntp] in data provider
(Mon Nov 11 03:58:18 2019) [sssd[nss]] [cache_req_search_dp] (0x0400): CR #14: Looking up [pkiuser] in data provider
(Mon Nov 11 03:58:24 2019) [sssd[nss]] [cache_req_search_dp] (0x0400): CR #15: Looking up [ods] in data provider
[root@master ~]# 

In latest version there is no call log for known doamains like "Looking up [aduser] in data provider" messages in sssd_nss.log
Based on This moving bz to verified.

Comment 7 errata-xmlrpc 2019-11-26 13:57:38 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2019:3972


Note You need to log in before you can comment on or make changes to this bug.