We see random user permission denied issues on RHEL8 client, that resolves 
itself after about 10 minutes. In this case, the user is authenticating using 
the remote desktop software NoMachine (nx).

journalctl:

Sep 26 12:41:35 server1.id.int nxexec[3011890]: pam_sss(nx:auth): 
authentication failure; logname= uid=969 euid=0 tty= ruser= 
rhost=192.168.55.202 user=rsmith
Sep 26 12:41:35 server1.id.int nxexec[3011890]: pam_sss(nx:auth): received for 
user rsmith: 6 (Permission denied)
Sep 26 12:41:47 server1.id.int krb5_child[3011927]: Client's credentials have 
been revoked
Sep 26 12:41:47 server1.id.int krb5_child[3011927]: Client's credentials have 
been revoked
Sep 26 12:41:47 server1.id.int nxexec[3011925]: pam_sss(nx:auth): 
authentication failure; logname= uid=969 euid=0 tty= ruser= 
rhost=192.168.55.202 user=rsmith
Sep 26 12:41:47 server1.id.int nxexec[3011925]: pam_sss(nx:auth): received for 
user rsmith: 6 (Permission denied)
Sep 26 12:42:11 server1.id.int krb5_child[3011965]: Client's credentials have 
been revoked
Sep 26 12:42:11 server1.id.int krb5_child[3011965]: Client's credentials have 
been revoked
Sep 26 12:42:11 server1.id.int nxexec[3011963]: pam_sss(nx:auth): 
authentication failure; logname= uid=969 euid=0 tty= ruser= 
rhost=192.168.55.202 user=rsmith
Sep 26 12:42:11 server1.id.int nxexec[3011963]: pam_sss(nx:auth): received for 
user rsmith: 6 (Permission denied)
Sep 26 12:43:35 server1.id.int nxexec[3012022]: pam_sss(nx:auth): 
authentication success; logname= uid=969 euid=0 tty= ruser= 
rhost=192.168.55.202 user=rsmith
Sep 26 12:45:15 server1.id.int systemd-logind[4695]: New session 526 of user 
rsmith.
Sep 26 12:45:15 server1.id.int systemd[1]: Started Session 526 of user rsmith.
Sep 26 12:45:15 server1.id.int nxexec[3012073]: pam_unix(nx:session): session 
opened for user rsmith by (uid=969)

krb5_child.log:

(2024-09-26 12:41:24): [krb5_child[3011820]] [map_krb5_error] (0x0020): 
[RID#12745] 2399: [-1765328366][Client's credentials have been revoked]
(2024-09-26 12:41:35): [krb5_child[3011892]] [get_and_save_tgt] (0x0020): 
[RID#12751] 2270: [-1765328366][Client's credentials have been revoked]
********************** PREVIOUS MESSAGE WAS TRIGGERED BY THE FOLLOWING 
BACKTRACE:
*  (2024-09-26 12:41:35): [krb5_child[3011892]] [main] (0x0400): [RID#12751] 
krb5_child started.
*  (2024-09-26 12:41:35): [krb5_child[3011892]] [unpack_buffer] (0x1000): 
[RID#12751] total buffer size: [124] *  (2024-09-26 12:41:35): 
[krb5_child[3011892]] [unpack_buffer] (0x0100): [RID#12751] cmd [241 (auth)] 
uid [866900186] gid [2070] validate [true] enterprise principal [false] offline 
[false] UPN [[email protected]]
   *  (2024-09-26 12:41:35): [krb5_child[3011892]] [unpack_buffer] (0x0100): 
[RID#12751] ccname: [KCM:] old_ccname: [KCM:] keytab: [/etc/krb5.keytab]
   *  (2024-09-26 12:41:35): [krb5_child[3011892]] [switch_creds] (0x0200): 
[RID#12751] Switch user to [866900186][2070].
   *  (2024-09-26 12:41:35): [krb5_child[3011892]] [switch_creds] (0x0200): 
[RID#12751] Switch user to [0][0].
   *  (2024-09-26 12:41:35): [krb5_child[3011892]] [k5c_check_old_ccache] 
(0x4000): [RID#12751] Ccache_file is [KCM:] and is  active and TGT is  valid.
   *  (2024-09-26 12:41:35): [krb5_child[3011892]] [k5c_setup_fast] (0x0100): 
[RID#12751] Fast principal is set to [host/[email protected]]
   *  (2024-09-26 12:41:35): [krb5_child[3011892]] [find_principal_in_keytab] 
(0x4000): [RID#12751] Trying to find principal 
host/[email protected]<mailto:host/[email protected]> in keytab.
   *  (2024-09-26 12:41:35): [krb5_child[3011892]] [match_principal] (0x1000): 
[RID#12751] Principal matched to the sample 
(host/[email protected]<mailto:host/[email protected]>).
   *  (2024-09-26 12:41:35): [krb5_child[3011892]] [check_fast_ccache] 
(0x0200): [RID#12751] FAST TGT is still valid.
   *  (2024-09-26 12:41:35): [krb5_child[3011892]] [become_user] (0x0200): 
[RID#12751] Trying to become user [866900186][2070].
   *  (2024-09-26 12:41:35): [krb5_child[3011892]] [main] (0x2000): [RID#12751] 
Running as [866900186][2070].
   *  (2024-09-26 12:41:35): [krb5_child[3011892]] [set_lifetime_options] 
(0x0100): [RID#12751] No specific renewable lifetime requested.
   *  (2024-09-26 12:41:35): [krb5_child[3011892]] [set_lifetime_options] 
(0x0100): [RID#12751] No specific lifetime requested.
   *  (2024-09-26 12:41:35): [krb5_child[3011892]] [set_canonicalize_option] 
(0x0100): [RID#12751] Canonicalization is set to [true]
   *  (2024-09-26 12:41:35): [krb5_child[3011892]] [main] (0x0400): [RID#12751] 
Will perform auth
   *  (2024-09-26 12:41:35): [krb5_child[3011892]] [main] (0x0400): [RID#12751] 
Will perform online auth
   *  (2024-09-26 12:41:35): [krb5_child[3011892]] [tgt_req_child] (0x1000): 
[RID#12751] Attempting to get a TGT
   *  (2024-09-26 12:41:35): [krb5_child[3011892]] [get_and_save_tgt] (0x0400): 
[RID#12751] Attempting kinit for realm [ID.INT]
   *  (2024-09-26 12:41:35): [krb5_child[3011892]] [get_and_save_tgt] (0x0020): 
[RID#12751] 2270: [-1765328366][Client's credentials have been revoked]
********************** BACKTRACE DUMP ENDS HERE 
*********************************

Any help would be appreciated.



-- 
_______________________________________________
FreeIPA-users mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedorahosted.org/archives/list/[email protected]
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue

Reply via email to