RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
Bug 1928154 - Authentication is required to access the PC/SC daemon
Summary: Authentication is required to access the PC/SC daemon
Keywords:
Status: CLOSED ERRATA
Alias: None
Deadline: 2022-01-25
Product: Red Hat Enterprise Linux 8
Classification: Red Hat
Component: pcsc-lite
Version: 8.6
Hardware: All
OS: Linux
medium
medium
Target Milestone: rc
: 8.6
Assignee: Jakub Jelen
QA Contact: Ivan Nikolchev
Jan Fiala
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2021-02-12 13:49 UTC by Paulo Andrade
Modified: 2022-05-10 16:52 UTC (History)
9 users (show)

Fixed In Version: pcsc-lite-1.9.5-1.el8
Doc Type: Bug Fix
Doc Text:
.Remote users are no longer repetitively prompted to access smart cards Previously, the `polkit` policy for the `pcscd` daemon incorrectly requested user interaction. As a consequence, non-local and non-privileged users could not access smart cards and encountered large numbers of prompts. With this update, the `pcsc-lite` package policy no longer includes the interactive prompts. As a result, remote card users are no longer repeatedly asked for privilege escalation. For additional information about adjusting the policy to escalate privileges of non-privileged users, see link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/security_hardening/assembly_controlling-access-to-smart-cards-using-polkit_security-hardening[Controlling access to smart cards using polkit] in link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/security_hardening/index[Security hardening] in RHEL product documentation.
Clone Of:
Environment:
Last Closed: 2022-05-10 15:29:26 UTC
Type: Bug
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Issue Tracker CRYPTO-5978 0 None None None 2022-01-06 17:48:38 UTC
Red Hat Product Errata RHBA-2022:2089 0 None None None 2022-05-10 15:29:31 UTC

Description Paulo Andrade 2021-02-12 13:49:54 UTC
When connecting to gnome 3 desktop on RHEL 8.3, a password prompt
is shown requiring authentication and showing the @subject message.

Experiments made to attempt to remove the prompt were:

o disable pscd service

o Add:
  polkit.addRule(function(action, subject) {
      if (action.id == "org.debian.pcsc-lite.access_pcsc" &&
          subject.isInGroup("{the-user-grop}")) {
              return polkit.Result.YES;
      }
  });
  to  /etc/polkit-1/rules.d/03-allow-pcscd.rules with and without {}
  around the group.

o Changed the above to not check for subject.isInGroup to make sure
  there was no bug in the rule.

o Several experiments in /usr/share/polkit-1/actions/org.debian.pcsc-lite.policy
  Like replacing all ocurrences of
  <allow_any>auth_admin</allow_any>
  with:
  <allow_any>auth_self</allow_any>

o Also following the above, attempted changing
      <allow_any>auth_self</allow_any>
      <allow_inactive>auth_self</allow_inactive>
      <allow_active>yes</allow_active>
  to
      <allow_any>no</allow_any>
      <allow_inactive>no</allow_inactive>
      <allow_active>no</allow_active>

o Last attempts were to check/verify
  $ gsettings get org.gnome.login-screen enable-smartcard-authentication
  that as expected returns 'false', and validate
  /etc/dconf/db/distro.d/20-authselect had the line
  'enable-smartcard-authentication=false' in the section
  '[org/gnome/login-screen]'


  Neither of the above did help. Need some extra input of possible ways
to debug and resolve the issue.

  RHEL8 server is accessed using Microsoft's Remote Desktop and MoboXterm.

Comment 1 Bob Relyea 2021-02-12 20:34:14 UTC
pscs-lite does not have any UI prompts. I'm at a loss to understand why gnome3-desktop needs to authenticate to access it (I'm running rhel8, with pcsc-lite and a smart card reader installed and do not get thoses prompts).

Reassigning to gnome3-desktop, which is probably wrong because it's probably coming from some other gnome3 application, but it's the best guess.

It's almost certainly something going on with the reporter's setup.

bob

Comment 10 Jakub Jelen 2021-04-06 08:30:38 UTC
I do not follow how changes to sshd_config can fix neither of the issues they were seeing. But given that they no longer see the issues, there is nothing to fix on our side.

Comment 11 David Ward 2021-12-03 15:05:06 UTC
@jjelen

This is bug 1928154. It needs to be fixed in RHEL, just like it was in Fedora.

Please re-open and update version to 8.5.

Comment 12 David Ward 2021-12-03 15:05:37 UTC
err, bug 1478345...

Comment 13 Jakub Jelen 2021-12-06 12:07:46 UTC
I will try plan it for next releases.

Comment 23 Jakub Jelen 2022-03-24 20:00:17 UTC
Looks good. But still, I think the link to the documentation should be there as it is relevant to the users who used the functionality to escalate privileges of non-privileged users. They will need to adjust the policy according to that guide.

Comment 29 errata-xmlrpc 2022-05-10 15:29:26 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (pcsc-lite bug fix and enhancement update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2022:2089


Note You need to log in before you can comment on or make changes to this bug.