You say that you modified the file in a different way. It may be worth
checking file permissions as for some security functions files can be
ignored if they don't have the required permissions.

That said, that would show in the journal/ logs.

William

On Tue, 17 Jun 2025, 06:24 Ratnasamy, Fritz via slurm-users, <
slurm-users@lists.schedmd.com> wrote:

> Yes the file exists in /usr/lib64/security/.
> Best,
>
>
> *Fritz Ratnasamy*Data Scientist
> Information Technology
>
>
>
>
> On Tue, Jun 17, 2025 at 12:17 AM Sean Crosby <scro...@unimelb.edu.au>
> wrote:
>
>> Hi Fritz,
>>
>> Does pam_slurm_adopt.so exist in the right location on the node? Normally
>> on EL hosts it would be /usr/lib64/security/pam_slurm_adopt.so
>>
>> # ls /usr/lib64/security/pam_slurm_adopt.so -la
>> -rwxr-xr-x 1 root root 291936 Mar  4 12:44
>> /usr/lib64/security/pam_slurm_adopt.so
>>
>> If the file doesn't exist, pam would abnormally exit and not allow anyone
>> to log in.
>>
>> Sean
>> ------------------------------
>> *From:* Ratnasamy, Fritz via slurm-users <slurm-users@lists.schedmd.com>
>> *Sent:* Tuesday, 17 June 2025 14:55
>> *To:* Kevin Buckley <kevin.buckley.pawsey.org...@gmail.com>
>> *Cc:* slurm-users@lists.schedmd.com <slurm-users@lists.schedmd.com>
>> *Subject:* [EXT] [slurm-users] Re: slurm_pam_adopt module not working
>>
>> * External email: Please exercise caution *
>> ------------------------------
>> Thanks, for some reason I edited the /etc/pam.d/sshd via ansible but that
>> locked all users to the cluster.  That same file works on a different
>> cluster where the files are pushed via puppet but with ansible it looks
>> like it is locking all users to the cluster. See below config file sshd:
>>
>> auth       required     pam_sepermit.so
>> auth       substack     password-auth
>> auth       include      postlogin
>> # Used with polkit to reauthorize users in remote sessions
>> -auth      optional     pam_reauthorize.so prepare
>> account    required     pam_nologin.so
>> ##SLURM
>> account sufficient pam_slurm_adopt.so  action_no_jobs=deny
>> action_unknown=newest action_adopt_failure=deny action_generic_failure=deny
>> account    sufficient   pam_access.so
>> ##END SLURM
>> password   include      password-auth
>> # pam_selinux.so close should be the first session rule
>> session    required     pam_selinux.so close
>> session    required     pam_loginuid.so
>> # pam_selinux.so open should only be followed by sessions to be executed
>> in the user context
>> session    required     pam_selinux.so open env_params
>> session    required     pam_namespace.so
>> session    optional     pam_keyinit.so force revoke
>> session    include      password-auth
>> session    include      postlogin
>> # Used with polkit to reauthorize users in remote sessions
>> -session   optional     pam_reauthorize.so prepare
>>
>>
>>
>> *Fritz Ratnasamy *Data Scientist
>> Information Technology
>>
>>
>>
>>
>> On Wed, Jun 11, 2025 at 8:29 PM Kevin Buckley via slurm-users <
>> slurm-users@lists.schedmd.com> wrote:
>>
>> On 2025/06/11 12:46, Ratnasamy, Fritz via slurm-users wrote:
>> >
>> > We wanted to block users from ssh to a node where there are no jobs
>> > running however it looks like users are able to do so. We have installed
>> > the slurm_pam_adopt_module and set up the slurm.conf accordingly (the
>> same
>> > way we did on our first cluster where the pam module denies ssh access
>> > correctly).
>>
>> We saw a similar issue whereby the way that we had PAM setup, meant
>> that, and here I quote from SchedMD's Daniel Armengod:
>>
>> ----8<--------8<--------8<--------8<--------8<--------8<--------8<----
>> This is almost certainly caused by the fact that SSH's
>> `keyboard-interactive`
>> (not to be confused with `password`) AuthMethod forks a short-lived child
>> process that is involved in the authentication logic. Slurm's
>> pam_slurm_adopt
>> module latches on to that process (which is the wrong one, of course) and
>> things break in interesting ways from there.
>>
>> SSH authmethods `publickey` and `password` do not exhibit this behaviour
>> as SSH
>> does not fork a child process to offload the authentication
>> challenge-response
>> dialogue to.
>>
>> ...
>>
>> The key bit here is that in your last test you're forcing
>> `PreferredAuthentications=password`, which isn't actually the
>> `keyboard-interactive` AuthMethod that got picked before.
>> They work differently under the hood, even if as far as the
>> user is concerned, both methods just ask for a password.
>>
>> ...
>>
>> In summary: try disabling the `keyboard-interactive` authentication
>> method in
>> your compute nodes. pam_slurm_adopt should work correctly now.
>> ----8<--------8<--------8<--------8<--------8<--------8<--------8<----
>>
>> Maybe that's also your issue.
>>
>>
>> Daniel did say that SchedMD were going to update their documentation
>> to make that distinction, and it's effect, more explciit, so I would
>> expect it to be in the mainstream docs by now.
>>
>> HTH
>>
>> --
>> slurm-users mailing list -- slurm-users@lists.schedmd.com
>> To unsubscribe send an email to slurm-users-le...@lists.schedmd.com
>> CAUTION: This email has originated outside of University email systems.
>> Please do not click links or open attachments unless you recognize the
>> sender and trust the contents as safe.
>>
>> CAUTION: This email has originated outside of University email systems.
>> Please do not click links or open attachments unless you recognize the
>> sender and trust the contents as safe.
>>
>>
> --
> slurm-users mailing list -- slurm-users@lists.schedmd.com
> To unsubscribe send an email to slurm-users-le...@lists.schedmd.com
>
-- 
slurm-users mailing list -- slurm-users@lists.schedmd.com
To unsubscribe send an email to slurm-users-le...@lists.schedmd.com

Reply via email to