Red Hat Bugzilla – Bug 683860
sssd 1.5.1-9 breaks AD authentication
Last modified: 2015-01-04 18:47:04 EST
+++ This bug was initially created as a clone of Bug #683267 +++
Created attachment 483062 [details]
Requested sssd logs, with debug level set to 9
Description of problem:
On upgrade to 1.5.1-9, AD authentication stops working. Reverting to 1.5.1-3 fixes the issue, using identical configuration files.
Version-Release number of selected component (if applicable):
Steps to Reproduce:
1. Upgrade sssd and sssd-client to 1.5.1-9
2. Attempt to login using one of the AD accounts.
Works with 1.5.1-3.
See attached logs.
--- Additional comment from email@example.com on 2011-03-09 12:12:41 EST ---
Can you try running the following command from your Linux client and tell me what you get?
ldapsearch -x -W -D -H ldap://DC=srvr501.some.domainname.org \
I want to see if this lookup is succeeding (obviously substitute the correct values for the OUs etc.)
--- Additional comment from firstname.lastname@example.org on 2011-03-09 15:32:02 EST ---
Can you also attach the log files of a successful authentication with 1.5.1-3 ?
--- Additional comment from email@example.com on 2011-03-10 08:03:05 EST ---
Sorry about the delay. Work stuff. Will try getting this to you tomorrow.
--- Additional comment from firstname.lastname@example.org on 2011-03-10 08:05:26 EST ---
Re-setting the NeedInfo flag
--- Additional comment from email@example.com on 2011-03-10 08:35:46 EST ---
Also, can you let us know which Active Directory server it is? 2003R2 or 2008?
Steps to test:
1. Create a group "group1" with unix attributes.
2. Create a user "user1" with unix attributes, add this as a member of to group "group1".
3. Set "group1" as the primary group of "user1".
4. Create another group "group2" without any unix attributes. Add "user1" as member of this group(so that group2 becomes a supplementary group of user1).
5. Enumerate and Auth as user1.
Enumeration(id -G -n user1) should show the primary group.
and Authentication(ssh -l user1 localhost) for user1 should be successful.
# id -G -n user1
# ssh -l user1 localhost
Last login: Fri Apr 8 15:14:31 2011 from localhost
Verified that if the unix user is a member of a non-unix group, the group should just be ignored.
rpm -qi sssd | head
Name : sssd Relocations: (not relocatable)
Version : 1.5.1 Vendor: Red Hat, Inc.
Release : 24.el6 Build Date: Sat 02 Apr 2011 01:24:54 AM IST
Install Date: Wed 06 Apr 2011 07:17:24 PM IST Build Host: x86-012.build.bos.redhat.com
Group : Applications/System Source RPM: sssd-1.5.1-24.el6.src.rpm
Size : 3462740 License: GPLv3+
Signature : (none)
Packager : Red Hat, Inc. <http://bugzilla.redhat.com/bugzilla>
URL : http://fedorahosted.org/sssd/
Summary : System Security Services Daemon
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on therefore solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.