Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 592965 - getent returns the login shell of the users even though the remote LDAP server has no such entry.
getent returns the login shell of the users even though the remote LDAP serve...
Product: Red Hat Enterprise Linux 6
Classification: Red Hat
Component: nss-pam-ldapd (Show other bugs)
All Linux
medium Severity medium
: rc
: ---
Assigned To: Nalin Dahyabhai
Ondrej Moriš
: 592488 (view as bug list)
Depends On: 592411
Blocks: 592488
  Show dependency treegraph
Reported: 2010-05-17 09:54 EDT by Dmitri Pal
Modified: 2015-12-22 01:13 EST (History)
5 users (show)

See Also:
Fixed In Version: nss-pam-ldapd-0.7.5-3
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: 592411
Last Closed: 2010-11-10 16:15:20 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description Dmitri Pal 2010-05-17 09:54:12 EDT
+++ This bug was initially created as a clone of Bug #592411 +++

Description of problem:
getent returns the login shell of the users (puser1 & puser2 in this case) even though the remote LDAP server has no such entry.

Version-Release number of selected component (if applicable):

How reproducible:

Steps to Reproduce:

1. Make sure there exists no "loginshell" attribute for the users on the ldap server.

2. Configure /etc/nslcd.conf:
# cat /etc/nslcd.conf
uid nslcd
gid ldap
uri ldaps://shanksldap.idm.lab.bos.redhat.com:636
base dc=example,dc=com
tls_cacertdir /etc/openldap/cacerts

3. getent -s ldap passwd. Observe that the loginshell is returned for puser1 and puser2.

Actual results:

/# /usr/bin/ldapsearch -x -h shanksldap.idm.lab.bos.redhat.com -p 389 -D "cn=Directory Manager" -w Secret123 -b "uid=puser1,ou=People,dc=example,dc=com"
# extended LDIF
# LDAPv3
# base <uid=puser1,ou=People,dc=example,dc=com> with scope subtree
# filter: (objectclass=*)
# requesting: ALL

# puser1, People, example.com
dn: uid=puser1,ou=People,dc=example,dc=com
uidNumber: 1001
gidNumber: 1001
objectClass: top
objectClass: posixAccount
uid: puser1
cn: Posix User1
homeDirectory: /export/puser1

# getent -s ldap passwd 
puser1:*:1001:1001:Posix User1:/export/puser1:/bin/bash  <===========
puser2:*:1002:1002:Posix User2:/export/puser2:/bin/bash  <===========
puser3:*:999:999:Posix User3:/export/puser3:/bin/bash

Expected results:

Should not return missing attributes.

Additional info:

--- Additional comment from updates@fedoraproject.org on 2010-05-14 18:21:23 EDT ---

nss-pam-ldapd-0.7.5-2.fc13 has been submitted as an update for Fedora 13.

--- Additional comment from updates@fedoraproject.org on 2010-05-15 16:21:13 EDT ---

nss-pam-ldapd-0.7.5-2.fc13 has been pushed to the Fedora 13 testing repository.  If problems still persist, please make note of it in this bug report.
 If you want to test the update, you can install it with 
 su -c 'yum --enablerepo=updates-testing update nss-pam-ldapd'.  You can provide feedback for this update here: http://admin.fedoraproject.org/updates/nss-pam-ldapd-0.7.5-2.fc13

--- Additional comment from grajaiya@redhat.com on 2010-05-17 00:37:43 EDT ---

Tests were completed successfully using nss-pam-ldapd-0.7.5-2.fc13.
Comment 2 Nalin Dahyabhai 2010-05-17 10:51:43 EDT
*** Bug 592488 has been marked as a duplicate of this bug. ***
Comment 3 RHEL Product and Program Management 2010-05-17 11:45:27 EDT
This request was evaluated by Red Hat Product Management for inclusion in a Red
Hat Enterprise Linux major release.  Product Management has requested further
review of this request by Red Hat Engineering, for potential inclusion in a Red
Hat Enterprise Linux Major release.  This request is not yet committed for
Comment 6 releng-rhel@redhat.com 2010-11-10 16:15:20 EST
Red Hat Enterprise Linux 6.0 is now available and should resolve
the problem described in this bug report. This report is therefore being closed
with a resolution of CURRENTRELEASE. You may reopen this bug report if the
solution does not work for you.

Note You need to log in before you can comment on or make changes to this bug.