‚ÄčThank you for the reply Sumit - I will look into updating the version of
sssd. If that doesn't work, I will also try adding the
‚Äč'sourceHostCategory' attribute to rules. Though, I would imagine I would
have to do this for *all* rules if I want them to work as intended. I'll
report back my findings tomorrow.

Thanks,
-Andrew

On Mon, Feb 16, 2015 at 12:40 AM, Sumit Bose <sb...@redhat.com> wrote:

> On Sat, Feb 14, 2015 at 12:52:10PM -0800, Andrew Egelhofer wrote:
> > Hi FreeIPA Users-
> >
> > I've deployed a FreeIPA instance in my Lab, and enrolled a single host,
> and
> > a single user ('testuser'). The only HBAC rule I currently have is the
> > stock allow_all. Yet, when I attempt to log into the host via ssh, it
> > closes the connection.
> >
> > $ ssh testuser@<host>
> > Warning: Permanently added '<host>,<host-ip>' (RSA) to the list of known
> > hosts.
> > testuser@<host>'s password:
> > Connection closed by <host-ip>
> >
> > The host I'm attempting to login to can correctly look up the user using
> > getent:
> >
> > # getent passwd testuser
> > testuser:*:168400003:168400003:Test User:/home/testuser:/bin/bash
> >
> > Scanning /var/log/secure, I see these entries:
> >
> > Feb 14 12:01:50 <host> sshd[6528]: pam_unix(sshd:auth): authentication
> > failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.30.3.58
> >  user=testuser
> > Feb 14 12:01:51 <host> sshd[6528]: pam_sss(sshd:auth): authentication
> > success; logname= uid=0 euid=0 tty=ssh ruser=
> > rhost=172.30.3.58 user=testuser
> > Feb 14 12:01:51 <host> sshd[6528]: pam_sss(sshd:account): Access denied
> for
> > user testuser: 6 (Permission denied)
> >
> > That tells me (From reading online) the user / password was correctly
> > authenticated, but failed authorization due to HBAC rules. I've tested
> the
> > rule using the 'hbactest' utility and it passes
> >
> > [root@<Master> ~]# ipa hbactest --user=testuser --host=<host>
> --service=sshd
> > --------------------
> > Access granted: True
> > --------------------
> >   Matched rules: allow_all
> >
> > I'm at a loss here, because If I comment out the line:
> >
> > account     [default=bad success=ok user_unknown=ignore] pam_sss.so
> >
> > in /etc/pam.d/system-auth, the user is able to login.
> >
> > So what am I missing here? Is there a way I can debug HBAC rules? I've
> > already set debug_level = 10 in /etc/sssd/sssd.conf, and I see its able
> to
> > access the HBAC 'allow_all' rule in the log
> /var/log/sssd/sssd_<domain>.<dc>
> > .log:
> >
> > (Fri Feb 13 21:38:15 2015) [sssd[be[<domain>.<dc>]]]
> > [sdap_get_generic_done] (7): Total count [0]
> > (Fri Feb 13 21:38:15 2015) [sssd[be[<domain>.<dc>]]] [hbac_attrs_to_rule]
> > (7): Processing rule [allow_all]
> > (Fri Feb 13 21:38:15 2015) [sssd[be[<domain>.<dc>]]]
> > [hbac_user_attrs_to_rule] (7): Processing users for rule [allow_all]
> > (Fri Feb 13 21:38:15 2015) [sssd[be[<domain>.<dc>]]] [hbac_get_category]
> > (5): Category is set to 'all'.
> > (Fri Feb 13 21:38:15 2015) [sssd[be[<domain>.<dc>]]]
> > [hbac_service_attrs_to_rule] (7): Processing PAM services for rule
> > [allow_all]
> > (Fri Feb 13 21:38:15 2015) [sssd[be[<domain>.<dc>]]] [hbac_get_category]
> > (5): Category is set to 'all'.
> > (Fri Feb 13 21:38:15 2015) [sssd[be[<domain>.<dc>]]]
> > [hbac_thost_attrs_to_rule] (7): Processing target hosts for rule
> [allow_all]
> > (Fri Feb 13 21:38:15 2015) [sssd[be[<domain>.<dc>]]] [hbac_get_category]
> > (5): Category is set to 'all'.
> > (Fri Feb 13 21:38:15 2015) [sssd[be[<domain>.<dc>]]]
> > [hbac_shost_attrs_to_rule] (7): Processing source hosts for rule
> [allow_all]
> > (Fri Feb 13 21:38:15 2015) [sssd[be[<domain>.<dc>]]]
> > [hbac_host_attrs_to_rule] (4): No host specified, rule will never apply.
> > (Fri Feb 13 21:38:15 2015) [sssd[be[<domain>.<dc>]]]
> > [hbac_eval_user_element] (7): [12] groups for [admin]
> > (Fri Feb 13 21:38:15 2015) [sssd[be[<domain>.<dc>]]]
> > [hbac_eval_user_element] (7): Added group [admins] for user [admin]
> > (Fri Feb 13 21:38:15 2015) [sssd[be[<domain>.<dc>]]]
> > [hbac_eval_user_element] (8): Skipping non-group memberOf [cn=replication
> > administrators,cn=privileges,cn=pbac,dc=<domain>,dc=<dc>]
> > (Fri Feb 13 21:38:15 2015) [sssd[be[<domain>.<dc>]]]
> > [hbac_eval_user_element] (8): Skipping non-group memberOf [cn=add
> > replication agreements,cn=permissions,cn=pbac,dc=<domain>,dc=<dc>]
> > (Fri Feb 13 21:38:15 2015) [sssd[be[<domain>.<dc>]]]
> > [hbac_eval_user_element] (8): Skipping non-group memberOf [cn=modify
> > replication agreements,cn=permissions,cn=pbac,dc=<domain>,dc=<dc>]
> > (Fri Feb 13 21:38:15 2015) [sssd[be[<domain>.<dc>]]]
> > [hbac_eval_user_element] (8): Skipping non-group memberOf [cn=remove
> > replication agreements,cn=permissions,cn=pbac,dc=<domain>,dc=<dc>]
> > (Fri Feb 13 21:38:15 2015) [sssd[be[<domain>.<dc>]]]
> > [hbac_eval_user_element] (8): Skipping non-group memberOf [cn=host
> > enrollment,cn=privileges,cn=pbac,dc=<domain>,dc=<dc>]
> > (Fri Feb 13 21:38:15 2015) [sssd[be[<domain>.<dc>]]]
> > [hbac_eval_user_element] (8): Skipping non-group memberOf [cn=manage host
> > keytab,cn=permissions,cn=pbac,dc=<domain>,dc=<dc>]
> > (Fri Feb 13 21:38:15 2015) [sssd[be[<domain>.<dc>]]]
> > [hbac_eval_user_element] (8): Skipping non-group memberOf [cn=enroll a
> > host,cn=permissions,cn=pbac,dc=<domain>,dc=<dc>]
> > (Fri Feb 13 21:38:15 2015) [sssd[be[<domain>.<dc>]]]
> > [hbac_eval_user_element] (8): Skipping non-group memberOf [cn=add
> > krbprincipalname to a host,cn=permissions,cn=pbac,dc=<domain>,dc=<dc>]
> > (Fri Feb 13 21:38:15 2015) [sssd[be[<domain>.<dc>]]]
> > [hbac_eval_user_element] (8): Skipping non-group memberOf [cn=unlock user
> > accounts,cn=permissions,cn=pbac,dc=<domain>,dc=<dc>]
> > (Fri Feb 13 21:38:15 2015) [sssd[be[<domain>.<dc>]]]
> > [hbac_eval_user_element] (8): Skipping non-group memberOf [cn=manage
> > service keytab,cn=permissions,cn=pbac,dc=<domain>,dc=<dc>]
> > (Fri Feb 13 21:38:15 2015) [sssd[be[<domain>.<dc>]]]
> > [hbac_eval_user_element] (7): Added group [trust admins] for user [admin]
> > (Fri Feb 13 21:38:15 2015) [sssd[be[<domain>.<dc>]]]
> > [ipa_hbac_evaluate_rules] (3): Access denied by HBAC rules
> >
> > IPA server:
> > # rpm -q ipa-server sssd
> > ipa-server-3.0.0-42.el6.centos.x86_64
> > sssd-1.11.6-30.el6_6.3.x86_64
> > # cat /etc/redhat-release
> > CentOS release 6.5 (Final)
> >
> > Client:
> > # cat /etc/redhat-release
> > CentOS release 5.8 (Final)
> > # rpm -q sssd
> > sssd-1.5.1-49.el5_8.1
>
> This version is quite old and I guess
>
> > (Fri Feb 13 21:38:15 2015) [sssd[be[<domain>.<dc>]]] >
> [hbac_shost_attrs_to_rule] (7): Processing source hosts for rule [allow_all]
> > (Fri Feb 13 21:38:15 2015) [sssd[be[<domain>.<dc>]]] >
> [hbac_host_attrs_to_rule] (4): No host specified, rule will never apply.
>
> is causing the issue. At that time it was possible to specific source
> hosts in HBAC rules. But since there is no reliable way to determine
> the source host (we have to rely on the data libpam is able to give us).
> we removed this in later versions. If you started with an old IPA server
> the related attributes are kept during updates, but newer versions like
> ipa v3 do not set them anymore.
>
> First I would recommend to update SSSD. If there is really no wy to
> update SSSD adding an attribute 'sourceHostCategory: all' to the LDAP
> object of the allow_all rule might help.
>
> HTH
>
> bye,
> Sumit
> >
> > Any help is appreciated.
> >
> > Thanks,
> > -Andrew
>
> > --
> > Manage your subscription for the Freeipa-users mailing list:
> > https://www.redhat.com/mailman/listinfo/freeipa-users
> > Go To http://freeipa.org for more info on the project
>
>


-- 
Andrew "Ego" Egelhofer
Infrastructure Systems Engineer | Rubicon Project
aegelho...@rubiconproject.com | 831-331-7915
-- 
Manage your subscription for the Freeipa-users mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-users
Go To http://freeipa.org for more info on the project

Reply via email to