Hi Sumit & FreeIPA Users-

Your suggestion on updating the version of sssd worked like a charm.
Consider this issue solved.

Thanks Everyone,
-Andrew

On Mon, Feb 16, 2015 at 12:32 PM, Andrew Egelhofer <
aegelho...@rubiconproject.com> wrote:

> ‚ÄčThank you for the reply Sumit - I will look into updating the version of
> sssd. If that doesn't work, I will also try adding the
> ‚Äč'sourceHostCategory' attribute to rules. Though, I would imagine I would
> have to do this for *all* rules if I want them to work as intended. I'll
> report back my findings tomorrow.
>
> Thanks,
> -Andrew
>
> On Mon, Feb 16, 2015 at 12:40 AM, Sumit Bose <sb...@redhat.com> wrote:
>
>> On Sat, Feb 14, 2015 at 12:52:10PM -0800, Andrew Egelhofer wrote:
>> > Hi FreeIPA Users-
>> >
>> > I've deployed a FreeIPA instance in my Lab, and enrolled a single host,
>> and
>> > a single user ('testuser'). The only HBAC rule I currently have is the
>> > stock allow_all. Yet, when I attempt to log into the host via ssh, it
>> > closes the connection.
>> >
>> > $ ssh testuser@<host>
>> > Warning: Permanently added '<host>,<host-ip>' (RSA) to the list of known
>> > hosts.
>> > testuser@<host>'s password:
>> > Connection closed by <host-ip>
>> >
>> > The host I'm attempting to login to can correctly look up the user using
>> > getent:
>> >
>> > # getent passwd testuser
>> > testuser:*:168400003:168400003:Test User:/home/testuser:/bin/bash
>> >
>> > Scanning /var/log/secure, I see these entries:
>> >
>> > Feb 14 12:01:50 <host> sshd[6528]: pam_unix(sshd:auth): authentication
>> > failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.30.3.58
>> >  user=testuser
>> > Feb 14 12:01:51 <host> sshd[6528]: pam_sss(sshd:auth): authentication
>> > success; logname= uid=0 euid=0 tty=ssh ruser=
>> > rhost=172.30.3.58 user=testuser
>> > Feb 14 12:01:51 <host> sshd[6528]: pam_sss(sshd:account): Access denied
>> for
>> > user testuser: 6 (Permission denied)
>> >
>> > That tells me (From reading online) the user / password was correctly
>> > authenticated, but failed authorization due to HBAC rules. I've tested
>> the
>> > rule using the 'hbactest' utility and it passes
>> >
>> > [root@<Master> ~]# ipa hbactest --user=testuser --host=<host>
>> --service=sshd
>> > --------------------
>> > Access granted: True
>> > --------------------
>> >   Matched rules: allow_all
>> >
>> > I'm at a loss here, because If I comment out the line:
>> >
>> > account     [default=bad success=ok user_unknown=ignore] pam_sss.so
>> >
>> > in /etc/pam.d/system-auth, the user is able to login.
>> >
>> > So what am I missing here? Is there a way I can debug HBAC rules? I've
>> > already set debug_level = 10 in /etc/sssd/sssd.conf, and I see its able
>> to
>> > access the HBAC 'allow_all' rule in the log
>> /var/log/sssd/sssd_<domain>.<dc>
>> > .log:
>> >
>> > (Fri Feb 13 21:38:15 2015) [sssd[be[<domain>.<dc>]]]
>> > [sdap_get_generic_done] (7): Total count [0]
>> > (Fri Feb 13 21:38:15 2015) [sssd[be[<domain>.<dc>]]]
>> [hbac_attrs_to_rule]
>> > (7): Processing rule [allow_all]
>> > (Fri Feb 13 21:38:15 2015) [sssd[be[<domain>.<dc>]]]
>> > [hbac_user_attrs_to_rule] (7): Processing users for rule [allow_all]
>> > (Fri Feb 13 21:38:15 2015) [sssd[be[<domain>.<dc>]]] [hbac_get_category]
>> > (5): Category is set to 'all'.
>> > (Fri Feb 13 21:38:15 2015) [sssd[be[<domain>.<dc>]]]
>> > [hbac_service_attrs_to_rule] (7): Processing PAM services for rule
>> > [allow_all]
>> > (Fri Feb 13 21:38:15 2015) [sssd[be[<domain>.<dc>]]] [hbac_get_category]
>> > (5): Category is set to 'all'.
>> > (Fri Feb 13 21:38:15 2015) [sssd[be[<domain>.<dc>]]]
>> > [hbac_thost_attrs_to_rule] (7): Processing target hosts for rule
>> [allow_all]
>> > (Fri Feb 13 21:38:15 2015) [sssd[be[<domain>.<dc>]]] [hbac_get_category]
>> > (5): Category is set to 'all'.
>> > (Fri Feb 13 21:38:15 2015) [sssd[be[<domain>.<dc>]]]
>> > [hbac_shost_attrs_to_rule] (7): Processing source hosts for rule
>> [allow_all]
>> > (Fri Feb 13 21:38:15 2015) [sssd[be[<domain>.<dc>]]]
>> > [hbac_host_attrs_to_rule] (4): No host specified, rule will never apply.
>> > (Fri Feb 13 21:38:15 2015) [sssd[be[<domain>.<dc>]]]
>> > [hbac_eval_user_element] (7): [12] groups for [admin]
>> > (Fri Feb 13 21:38:15 2015) [sssd[be[<domain>.<dc>]]]
>> > [hbac_eval_user_element] (7): Added group [admins] for user [admin]
>> > (Fri Feb 13 21:38:15 2015) [sssd[be[<domain>.<dc>]]]
>> > [hbac_eval_user_element] (8): Skipping non-group memberOf
>> [cn=replication
>> > administrators,cn=privileges,cn=pbac,dc=<domain>,dc=<dc>]
>> > (Fri Feb 13 21:38:15 2015) [sssd[be[<domain>.<dc>]]]
>> > [hbac_eval_user_element] (8): Skipping non-group memberOf [cn=add
>> > replication agreements,cn=permissions,cn=pbac,dc=<domain>,dc=<dc>]
>> > (Fri Feb 13 21:38:15 2015) [sssd[be[<domain>.<dc>]]]
>> > [hbac_eval_user_element] (8): Skipping non-group memberOf [cn=modify
>> > replication agreements,cn=permissions,cn=pbac,dc=<domain>,dc=<dc>]
>> > (Fri Feb 13 21:38:15 2015) [sssd[be[<domain>.<dc>]]]
>> > [hbac_eval_user_element] (8): Skipping non-group memberOf [cn=remove
>> > replication agreements,cn=permissions,cn=pbac,dc=<domain>,dc=<dc>]
>> > (Fri Feb 13 21:38:15 2015) [sssd[be[<domain>.<dc>]]]
>> > [hbac_eval_user_element] (8): Skipping non-group memberOf [cn=host
>> > enrollment,cn=privileges,cn=pbac,dc=<domain>,dc=<dc>]
>> > (Fri Feb 13 21:38:15 2015) [sssd[be[<domain>.<dc>]]]
>> > [hbac_eval_user_element] (8): Skipping non-group memberOf [cn=manage
>> host
>> > keytab,cn=permissions,cn=pbac,dc=<domain>,dc=<dc>]
>> > (Fri Feb 13 21:38:15 2015) [sssd[be[<domain>.<dc>]]]
>> > [hbac_eval_user_element] (8): Skipping non-group memberOf [cn=enroll a
>> > host,cn=permissions,cn=pbac,dc=<domain>,dc=<dc>]
>> > (Fri Feb 13 21:38:15 2015) [sssd[be[<domain>.<dc>]]]
>> > [hbac_eval_user_element] (8): Skipping non-group memberOf [cn=add
>> > krbprincipalname to a host,cn=permissions,cn=pbac,dc=<domain>,dc=<dc>]
>> > (Fri Feb 13 21:38:15 2015) [sssd[be[<domain>.<dc>]]]
>> > [hbac_eval_user_element] (8): Skipping non-group memberOf [cn=unlock
>> user
>> > accounts,cn=permissions,cn=pbac,dc=<domain>,dc=<dc>]
>> > (Fri Feb 13 21:38:15 2015) [sssd[be[<domain>.<dc>]]]
>> > [hbac_eval_user_element] (8): Skipping non-group memberOf [cn=manage
>> > service keytab,cn=permissions,cn=pbac,dc=<domain>,dc=<dc>]
>> > (Fri Feb 13 21:38:15 2015) [sssd[be[<domain>.<dc>]]]
>> > [hbac_eval_user_element] (7): Added group [trust admins] for user
>> [admin]
>> > (Fri Feb 13 21:38:15 2015) [sssd[be[<domain>.<dc>]]]
>> > [ipa_hbac_evaluate_rules] (3): Access denied by HBAC rules
>> >
>> > IPA server:
>> > # rpm -q ipa-server sssd
>> > ipa-server-3.0.0-42.el6.centos.x86_64
>> > sssd-1.11.6-30.el6_6.3.x86_64
>> > # cat /etc/redhat-release
>> > CentOS release 6.5 (Final)
>> >
>> > Client:
>> > # cat /etc/redhat-release
>> > CentOS release 5.8 (Final)
>> > # rpm -q sssd
>> > sssd-1.5.1-49.el5_8.1
>>
>> This version is quite old and I guess
>>
>> > (Fri Feb 13 21:38:15 2015) [sssd[be[<domain>.<dc>]]] >
>> [hbac_shost_attrs_to_rule] (7): Processing source hosts for rule [allow_all]
>> > (Fri Feb 13 21:38:15 2015) [sssd[be[<domain>.<dc>]]] >
>> [hbac_host_attrs_to_rule] (4): No host specified, rule will never apply.
>>
>> is causing the issue. At that time it was possible to specific source
>> hosts in HBAC rules. But since there is no reliable way to determine
>> the source host (we have to rely on the data libpam is able to give us).
>> we removed this in later versions. If you started with an old IPA server
>> the related attributes are kept during updates, but newer versions like
>> ipa v3 do not set them anymore.
>>
>> First I would recommend to update SSSD. If there is really no wy to
>> update SSSD adding an attribute 'sourceHostCategory: all' to the LDAP
>> object of the allow_all rule might help.
>>
>> HTH
>>
>> bye,
>> Sumit
>> >
>> > Any help is appreciated.
>> >
>> > Thanks,
>> > -Andrew
>>
>> > --
>> > Manage your subscription for the Freeipa-users mailing list:
>> > https://www.redhat.com/mailman/listinfo/freeipa-users
>> > Go To http://freeipa.org for more info on the project
>>
>>
>
-- 
Manage your subscription for the Freeipa-users mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-users
Go To http://freeipa.org for more info on the project

Reply via email to