Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 676401 - Remove HBAC time rules from SSSD
Remove HBAC time rules from SSSD
Status: CLOSED ERRATA
Product: Red Hat Enterprise Linux 6
Classification: Red Hat
Component: sssd (Show other bugs)
6.0
Unspecified Unspecified
urgent Severity urgent
: rc
: ---
Assigned To: Stephen Gallagher
Chandrasekar Kannan
:
Depends On:
Blocks: 678032
  Show dependency treegraph
 
Reported: 2011-02-09 13:20 EST by Stephen Gallagher
Modified: 2017-02-06 09:35 EST (History)
5 users (show)

See Also:
Fixed In Version: sssd-1.5.1-5.el6
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
: 678032 (view as bug list)
Environment:
Last Closed: 2011-05-19 07:39:45 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2011:0560 normal SHIPPED_LIVE Low: sssd security, bug fix, and enhancement update 2011-05-19 07:38:17 EDT

  None (edit)
Description Stephen Gallagher 2011-02-09 13:20:35 EST
Description of problem:
FreeIPA v2 was originally going to support time rules in the HBAC rules. However, this was dropped from the final version. However, SSSD in RHEL 6.0 expects these rules to be present and will cause unexpected denials if they are not.

We need to remove these rules.

Version-Release number of selected component (if applicable):
sssd-1.2.1-28.el6_0.4

How reproducible:
Every time

Steps to Reproduce:
1. Configure SSSD to use IPA as a back-end
2. Attempt to log in as any user.

  
Actual results:
User is denied because nonexistent time-rules is interpreted as "never allow"

Expected results:
The lack of time rules should be disregarded.

Additional info:
Comment 1 Stephen Gallagher 2011-02-09 13:22:30 EST
Proposing for Z-stream so that 6.0 clients will not have issues connecting to FreeIPA servers.
Comment 5 Jenny Galipeau 2011-02-28 17:04:37 EST
Default rule verified:

Server:
ipa-server-2.0.0-13.el6.x86_64

Client:
ipa-client-2.0.0-13.el6.x86_64

User added and successfully SSO SSH to client machine after getting credentials
We apply HBAC rules and test also.
Comment 6 Jenny Galipeau 2011-03-01 10:34:27 EST
[root@ipaqavmh ~]# ipa hbacrule-show testdenyssh
  Rule name: testdenyssh
  Rule type: deny
  Source host category: all
  Description: test deny
  Enabled: TRUE
  Users: mmouse
  Hosts: ipaqavmh.rhts.eng.bos.redhat.com
  Services: sshd


Mar  1 10:04:21 ipaqavmh sshd[13984]: pam_sss(sshd:auth): authentication success; logname= uid=0 euid=0 tty=ssh ruser= rhost=hp-dl180g6-01.rhts.eng.bos.redhat.com user=mmouse
Mar  1 10:04:21 ipaqavmh sshd[13984]: pam_sss(sshd:account): Access denied for user mmouse: 6 (Permission denied
Comment 7 errata-xmlrpc 2011-05-19 07:39:45 EDT
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on therefore solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.

http://rhn.redhat.com/errata/RHSA-2011-0560.html
Comment 8 errata-xmlrpc 2011-05-19 09:09:31 EDT
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on therefore solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.

http://rhn.redhat.com/errata/RHSA-2011-0560.html

Note You need to log in before you can comment on or make changes to this bug.