Red Hat Bugzilla – Bug 674141
Traceback call messages displayed while "sss_obfuscate" command is executed as a non-root user.
Last modified: 2015-01-04 18:46:01 EST
Description of problem: Traceback messages displayed on terminal while running "sss_obfuscate" command as a non-root user. Version-Release number of selected component (if applicable): sssd-1.5.1-3.el6.x86_64 How reproducible: Always. Steps to Reproduce: 1. su - gsr (where "gsr" is a non-root user) 2. execute "sss_obfuscate" 3. Enter passwords when prompted. Actual results: [root@rhel6-1 ~]# su - gsr [gsr@rhel6-1 ~]$ sss_obfuscate Enter password: Re-enter password: Traceback (most recent call last): File "/usr/sbin/sss_obfuscate", line 89, in <module> ret = main() File "/usr/sbin/sss_obfuscate", line 62, in main sssdconfig = SSSDConfig.SSSDConfig() File "/usr/lib/python2.6/site-packages/SSSDConfig.py", line 1165, in __init__ self.schema = SSSDConfigSchema(schemafile, schemaplugindir) File "/usr/lib/python2.6/site-packages/SSSDConfig.py", line 253, in __init__ fd = open(schemafile, 'r') IOError: [Errno 13] Permission denied: '/etc/sssd/sssd.api.conf' Expected results: "sss_obfuscate must be run as root" message should be displayed. Additional info:
The traceback messages are no longer seen. $ sss_obfuscate -d LDAP-KRB5 Enter password: Re-enter password: Permissions error reading config file Version: rpm -qi sssd-tools | head Name : sssd-tools Relocations: (not relocatable) Version : 1.5.1 Vendor: Red Hat, Inc. Release : 15.el6 Build Date: Fri 18 Mar 2011 12:01:51 AM IST Install Date: Mon 21 Mar 2011 10:26:42 AM IST Build Host: hs20-bc2-3.build.redhat.com Group : Applications/System Source RPM: sssd-1.5.1-15.el6.src.rpm Size : 1705258 License: GPLv3+ Signature : (none) Packager : Red Hat, Inc. <http://bugzilla.redhat.com/bugzilla> URL : http://fedorahosted.org/sssd/ Summary : Userspace tools for use with the SSSD
An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on therefore solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2011-0560.html