[SSSD-users] Re: SSSD/AD Issues After 1.14 to 1.15 upgrade in CentOS 7

2018-02-02 Thread Jakub Hrozek
The preffered place is https://pagure.io/SSSD/sssd/new_issue

On Fri, Feb 02, 2018 at 05:59:18PM +, Simon Engelbert wrote:
> Sure, where is the proper place to file tickets?
> 
> - Simon
> On 2018-02-02, 10:20 AM, "Jakub Hrozek"  wrote:
> 
> If you can reproduce this with a recent build, please file a ticket..
> 
> On Fri, Feb 02, 2018 at 05:01:25PM +, Simon Engelbert wrote:
> > We updated to the latest copr repo and it does not seem to make a 
> difference, we are seeing the exact same issues.
> > 
> > We have noticed a weird pattern that is, honestly, not always 
> consistent but looks like this…
> > 
> > ## Login attempt 1 ##
> > *local*
> > u...@domain.ad@local: ~$ ssh server
> > Permission denied (publickey,gssapi-keyex,gssapi-with-mic).
> > 
> > *on server*
> > root@server: ~$ /usr/bin/sss_ssh_authorizedkeys user
> > 
> > root@server: ~$ /usr/bin/sss_ssh_authorizedkeys u...@domain.ad
> > 
> > root@server: ~$ sss_cache -E
> > root@server: ~$ /usr/bin/sss_ssh_authorizedkeys u...@domain.ad
> > 
> > root@server: ~$ /usr/bin/sss_ssh_authorizedkeys user
> > 
> > root@server: ~$ exit
> > 
> > ## Login attempt 2 ##
> > *local*
> > u...@domain.ad@local: ~$ ssh server
> > Last login: Fri Feb  2 16:31:23 2018 from local
> > 
> > user@server: ~$
> > 
> > *on server*
> > root@server: ~$ /usr/bin/sss_ssh_authorizedkeys user
> > 
> > root@server: ~$ /usr/bin/sss_ssh_authorizedkeys u...@domain.ad
> > 
> > 
> > ## Login attempt 3 ##
> > *local*
> > u...@domain.ad@local: ~$ ssh server
> > Permission denied (publickey,gssapi-keyex,gssapi-with-mic).
> > 
> > *on server*
> > root@server: ~$ /usr/bin/sss_ssh_authorizedkeys user
> > 
> > root@server: ~$ /usr/bin/sss_ssh_authorizedkeys u...@domain.ad
> > 
> > 
> > It appears as though clearing the cache clears or resets the cache 
> correctly and then a successful login clears or resets the cache incorrectly.
> > 
> > Also here are our configs…
> > 
> > [sssd]
> > config_file_version = 2
> > #wmb - added ssh to the following line
> > services = ssh, nss, pam
> > domains = DOMAIN.AD
> > #wmb added next line
> > default_domain_suffix = DOMAIN.AD
> > debug_level = 0x3ff0
> > 
> > #wmb added the following line
> > [ssh]
> > 
> > [nss]
> > override_homedir = /users/%u
> > default_shell = /bin/bash
> > use_fully_qualified_names = True
> > fallback_homedir = /users/%u@%d
> > reconnection_retries = 3
> > 
> > [pam]
> > reconnection_retries = 3
> > #wmb added the following line - Keep user credentials in cache for 7 
> days
> > offline_credentials_expiration = 7
> > 
> > [domain/DOMAIN.AD]
> > #wmb - added next line
> > ad_domain = DOMAIN.AD
> > debug_level = 0x3ff0
> > enumerate = false
> > #wmb - Do not return group members for group lookups. Default false
> > #ignore_group_members = true
> > id_provider = ad
> > chpass_provider = ad
> > auth_provider = ad
> > access_provider = simple
> > #simple_allow_groups = hadoop_admins, hadoop_users
> > ad_server =  ADSERVER1.DOMAIN.AD
> > #wmb activated next line
> > ad_backup_server =  ADSERVER2.DOMAIN.AD
> > ldap_schema = ad
> > ldap_user_principal = sAMAccountName
> > #wmb added the next 2 lines for SSH keys
> > ldap_user_extra_attrs = User-sshPublicKey:User-sshPublicKey
> > ldap_user_ssh_public_key = User-sshPublicKey
> > ldap_id_mapping = true
> > ldap_force_upper_case_realm = true
> > case_sensitive = false
> > krb5_realm = DOMAIN.AD
> > #wmb  tags stored by the realmd configuration service for this domain
> > realmd_tags = manages-system joined-with-samba
> > #wmb Save user passwd if they log in offline. Do kinit when they com 
> online
> > #krb5_store_password_if_offline = true
> > ldap_access_order = filter,expire
> > ldap_account_expire_policy = ad
> > cache_credentials = true
> > account_cache_expiration = 15
> > enum_cache_timeout = 120
> > entry_cache_nowait_percentage = 50
> > entry_cache_nowait_timeout = 28800
> > #wmb add if you want to restrict access to a certain group
> > ldap_group_search_base = DC=DOMAIN,DC=AD
> > ldap_sasl_authid = host/ser...@domain.ad
> > #wmb - enable AD client to update its DNS record
> > dyndns_update = True
> > dyndns_update_ptr = True
> > dyndns_refresh_interval = 43200
> > dyndns_ttl = 3600
> > 
> > - Simon
> > On 2018-02-02, 4:07 AM, "Lukas Slebodnik"  wrote:
> > 
> > On (02/02/18 11:54), Jakub Hrozek wrote:
> > >In the non-working cases, I see the name qualified where it 
> shouldn't be
> > >e.g:
> > 
> >[(&(sAMAccountName=u...@domain.ad)(objectclass=user)(sAMAccountNam

[SSSD-users] Re: SSSD/AD Issues After 1.14 to 1.15 upgrade in CentOS 7

2018-02-02 Thread Simon Engelbert
Sure, where is the proper place to file tickets?

- Simon
On 2018-02-02, 10:20 AM, "Jakub Hrozek"  wrote:

If you can reproduce this with a recent build, please file a ticket..

On Fri, Feb 02, 2018 at 05:01:25PM +, Simon Engelbert wrote:
> We updated to the latest copr repo and it does not seem to make a 
difference, we are seeing the exact same issues.
> 
> We have noticed a weird pattern that is, honestly, not always consistent 
but looks like this…
> 
> ## Login attempt 1 ##
> *local*
> u...@domain.ad@local: ~$ ssh server
> Permission denied (publickey,gssapi-keyex,gssapi-with-mic).
> 
> *on server*
> root@server: ~$ /usr/bin/sss_ssh_authorizedkeys user
> 
> root@server: ~$ /usr/bin/sss_ssh_authorizedkeys u...@domain.ad
> 
> root@server: ~$ sss_cache -E
> root@server: ~$ /usr/bin/sss_ssh_authorizedkeys u...@domain.ad
> 
> root@server: ~$ /usr/bin/sss_ssh_authorizedkeys user
> 
> root@server: ~$ exit
> 
> ## Login attempt 2 ##
> *local*
> u...@domain.ad@local: ~$ ssh server
> Last login: Fri Feb  2 16:31:23 2018 from local
> 
> user@server: ~$
> 
> *on server*
> root@server: ~$ /usr/bin/sss_ssh_authorizedkeys user
> 
> root@server: ~$ /usr/bin/sss_ssh_authorizedkeys u...@domain.ad
> 
> 
> ## Login attempt 3 ##
> *local*
> u...@domain.ad@local: ~$ ssh server
> Permission denied (publickey,gssapi-keyex,gssapi-with-mic).
> 
> *on server*
> root@server: ~$ /usr/bin/sss_ssh_authorizedkeys user
> 
> root@server: ~$ /usr/bin/sss_ssh_authorizedkeys u...@domain.ad
> 
> 
> It appears as though clearing the cache clears or resets the cache 
correctly and then a successful login clears or resets the cache incorrectly.
> 
> Also here are our configs…
> 
> [sssd]
> config_file_version = 2
> #wmb - added ssh to the following line
> services = ssh, nss, pam
> domains = DOMAIN.AD
> #wmb added next line
> default_domain_suffix = DOMAIN.AD
> debug_level = 0x3ff0
> 
> #wmb added the following line
> [ssh]
> 
> [nss]
> override_homedir = /users/%u
> default_shell = /bin/bash
> use_fully_qualified_names = True
> fallback_homedir = /users/%u@%d
> reconnection_retries = 3
> 
> [pam]
> reconnection_retries = 3
> #wmb added the following line - Keep user credentials in cache for 7 days
> offline_credentials_expiration = 7
> 
> [domain/DOMAIN.AD]
> #wmb - added next line
> ad_domain = DOMAIN.AD
> debug_level = 0x3ff0
> enumerate = false
> #wmb - Do not return group members for group lookups. Default false
> #ignore_group_members = true
> id_provider = ad
> chpass_provider = ad
> auth_provider = ad
> access_provider = simple
> #simple_allow_groups = hadoop_admins, hadoop_users
> ad_server =  ADSERVER1.DOMAIN.AD
> #wmb activated next line
> ad_backup_server =  ADSERVER2.DOMAIN.AD
> ldap_schema = ad
> ldap_user_principal = sAMAccountName
> #wmb added the next 2 lines for SSH keys
> ldap_user_extra_attrs = User-sshPublicKey:User-sshPublicKey
> ldap_user_ssh_public_key = User-sshPublicKey
> ldap_id_mapping = true
> ldap_force_upper_case_realm = true
> case_sensitive = false
> krb5_realm = DOMAIN.AD
> #wmb  tags stored by the realmd configuration service for this domain
> realmd_tags = manages-system joined-with-samba
> #wmb Save user passwd if they log in offline. Do kinit when they com 
online
> #krb5_store_password_if_offline = true
> ldap_access_order = filter,expire
> ldap_account_expire_policy = ad
> cache_credentials = true
> account_cache_expiration = 15
> enum_cache_timeout = 120
> entry_cache_nowait_percentage = 50
> entry_cache_nowait_timeout = 28800
> #wmb add if you want to restrict access to a certain group
> ldap_group_search_base = DC=DOMAIN,DC=AD
> ldap_sasl_authid = host/ser...@domain.ad
> #wmb - enable AD client to update its DNS record
> dyndns_update = True
> dyndns_update_ptr = True
> dyndns_refresh_interval = 43200
> dyndns_ttl = 3600
> 
> - Simon
> On 2018-02-02, 4:07 AM, "Lukas Slebodnik"  wrote:
> 
> On (02/02/18 11:54), Jakub Hrozek wrote:
> >In the non-working cases, I see the name qualified where it 
shouldn't be
> >e.g:
> 
>[(&(sAMAccountName=u...@domain.ad)(objectclass=user)(sAMAccountName=*)(objectSID=*))][DC=DOMAIN,DC=AD].
 
> >while in the working case, the name in the filter is just 
'samaccoutnname=user'.
> >
> >This is a bug, but at the same time, there's been a number of 
commits in
> >that area that might fix the bug..
> >
> >Since you are running CentOS, I guess you are not worried about 
losing a
> >support contract :-) s

[SSSD-users] Re: SSSD/AD Issues After 1.14 to 1.15 upgrade in CentOS 7

2018-02-02 Thread Jakub Hrozek
If you can reproduce this with a recent build, please file a ticket..

On Fri, Feb 02, 2018 at 05:01:25PM +, Simon Engelbert wrote:
> We updated to the latest copr repo and it does not seem to make a difference, 
> we are seeing the exact same issues.
> 
> We have noticed a weird pattern that is, honestly, not always consistent but 
> looks like this…
> 
> ## Login attempt 1 ##
> *local*
> u...@domain.ad@local: ~$ ssh server
> Permission denied (publickey,gssapi-keyex,gssapi-with-mic).
> 
> *on server*
> root@server: ~$ /usr/bin/sss_ssh_authorizedkeys user
> 
> root@server: ~$ /usr/bin/sss_ssh_authorizedkeys u...@domain.ad
> 
> root@server: ~$ sss_cache -E
> root@server: ~$ /usr/bin/sss_ssh_authorizedkeys u...@domain.ad
> 
> root@server: ~$ /usr/bin/sss_ssh_authorizedkeys user
> 
> root@server: ~$ exit
> 
> ## Login attempt 2 ##
> *local*
> u...@domain.ad@local: ~$ ssh server
> Last login: Fri Feb  2 16:31:23 2018 from local
> 
> user@server: ~$
> 
> *on server*
> root@server: ~$ /usr/bin/sss_ssh_authorizedkeys user
> 
> root@server: ~$ /usr/bin/sss_ssh_authorizedkeys u...@domain.ad
> 
> 
> ## Login attempt 3 ##
> *local*
> u...@domain.ad@local: ~$ ssh server
> Permission denied (publickey,gssapi-keyex,gssapi-with-mic).
> 
> *on server*
> root@server: ~$ /usr/bin/sss_ssh_authorizedkeys user
> 
> root@server: ~$ /usr/bin/sss_ssh_authorizedkeys u...@domain.ad
> 
> 
> It appears as though clearing the cache clears or resets the cache correctly 
> and then a successful login clears or resets the cache incorrectly.
> 
> Also here are our configs…
> 
> [sssd]
> config_file_version = 2
> #wmb - added ssh to the following line
> services = ssh, nss, pam
> domains = DOMAIN.AD
> #wmb added next line
> default_domain_suffix = DOMAIN.AD
> debug_level = 0x3ff0
> 
> #wmb added the following line
> [ssh]
> 
> [nss]
> override_homedir = /users/%u
> default_shell = /bin/bash
> use_fully_qualified_names = True
> fallback_homedir = /users/%u@%d
> reconnection_retries = 3
> 
> [pam]
> reconnection_retries = 3
> #wmb added the following line - Keep user credentials in cache for 7 days
> offline_credentials_expiration = 7
> 
> [domain/DOMAIN.AD]
> #wmb - added next line
> ad_domain = DOMAIN.AD
> debug_level = 0x3ff0
> enumerate = false
> #wmb - Do not return group members for group lookups. Default false
> #ignore_group_members = true
> id_provider = ad
> chpass_provider = ad
> auth_provider = ad
> access_provider = simple
> #simple_allow_groups = hadoop_admins, hadoop_users
> ad_server =  ADSERVER1.DOMAIN.AD
> #wmb activated next line
> ad_backup_server =  ADSERVER2.DOMAIN.AD
> ldap_schema = ad
> ldap_user_principal = sAMAccountName
> #wmb added the next 2 lines for SSH keys
> ldap_user_extra_attrs = User-sshPublicKey:User-sshPublicKey
> ldap_user_ssh_public_key = User-sshPublicKey
> ldap_id_mapping = true
> ldap_force_upper_case_realm = true
> case_sensitive = false
> krb5_realm = DOMAIN.AD
> #wmb  tags stored by the realmd configuration service for this domain
> realmd_tags = manages-system joined-with-samba
> #wmb Save user passwd if they log in offline. Do kinit when they com online
> #krb5_store_password_if_offline = true
> ldap_access_order = filter,expire
> ldap_account_expire_policy = ad
> cache_credentials = true
> account_cache_expiration = 15
> enum_cache_timeout = 120
> entry_cache_nowait_percentage = 50
> entry_cache_nowait_timeout = 28800
> #wmb add if you want to restrict access to a certain group
> ldap_group_search_base = DC=DOMAIN,DC=AD
> ldap_sasl_authid = host/ser...@domain.ad
> #wmb - enable AD client to update its DNS record
> dyndns_update = True
> dyndns_update_ptr = True
> dyndns_refresh_interval = 43200
> dyndns_ttl = 3600
> 
> - Simon
> On 2018-02-02, 4:07 AM, "Lukas Slebodnik"  wrote:
> 
> On (02/02/18 11:54), Jakub Hrozek wrote:
> >In the non-working cases, I see the name qualified where it shouldn't be
> >e.g:
> 
> >[(&(sAMAccountName=u...@domain.ad)(objectclass=user)(sAMAccountName=*)(objectSID=*))][DC=DOMAIN,DC=AD].
>  
> >while in the working case, the name in the filter is just 
> 'samaccoutnname=user'.
> >
> >This is a bug, but at the same time, there's been a number of commits in
> >that area that might fix the bug..
> >
> >Since you are running CentOS, I guess you are not worried about losing a
> >support contract :-) so I'm wondering if you could test the 1.16.x 
> release
> >from our test repos?
> >
> >That said, I don't see our 1.16 release in the
> >https://copr.fedorainfracloud.org/groups/g/sssd/coprs/ repositories.
> >
> >Lukas, is building the 1.16 release something we just forgot to do?
> >
> Actually not.
> 
> 1.15 continuously moved to 1.16 and there is not any upstream branch for 
> 1.15
> Therefore we have 1.16 in copr sssd-1-15
> 
> https://copr.fedorainfracloud.org/coprs/g/sssd/sssd-1-15/builds/
> 
> I know it might be a little bit confusing.
> 
> LS
> _

[SSSD-users] Re: SSSD/AD Issues After 1.14 to 1.15 upgrade in CentOS 7

2018-02-02 Thread Simon Engelbert
We updated to the latest copr repo and it does not seem to make a difference, 
we are seeing the exact same issues.

We have noticed a weird pattern that is, honestly, not always consistent but 
looks like this…

## Login attempt 1 ##
*local*
u...@domain.ad@local: ~$ ssh server
Permission denied (publickey,gssapi-keyex,gssapi-with-mic).

*on server*
root@server: ~$ /usr/bin/sss_ssh_authorizedkeys user

root@server: ~$ /usr/bin/sss_ssh_authorizedkeys u...@domain.ad

root@server: ~$ sss_cache -E
root@server: ~$ /usr/bin/sss_ssh_authorizedkeys u...@domain.ad

root@server: ~$ /usr/bin/sss_ssh_authorizedkeys user

root@server: ~$ exit

## Login attempt 2 ##
*local*
u...@domain.ad@local: ~$ ssh server
Last login: Fri Feb  2 16:31:23 2018 from local

user@server: ~$

*on server*
root@server: ~$ /usr/bin/sss_ssh_authorizedkeys user

root@server: ~$ /usr/bin/sss_ssh_authorizedkeys u...@domain.ad


## Login attempt 3 ##
*local*
u...@domain.ad@local: ~$ ssh server
Permission denied (publickey,gssapi-keyex,gssapi-with-mic).

*on server*
root@server: ~$ /usr/bin/sss_ssh_authorizedkeys user

root@server: ~$ /usr/bin/sss_ssh_authorizedkeys u...@domain.ad


It appears as though clearing the cache clears or resets the cache correctly 
and then a successful login clears or resets the cache incorrectly.

Also here are our configs…

[sssd]
config_file_version = 2
#wmb - added ssh to the following line
services = ssh, nss, pam
domains = DOMAIN.AD
#wmb added next line
default_domain_suffix = DOMAIN.AD
debug_level = 0x3ff0

#wmb added the following line
[ssh]

[nss]
override_homedir = /users/%u
default_shell = /bin/bash
use_fully_qualified_names = True
fallback_homedir = /users/%u@%d
reconnection_retries = 3

[pam]
reconnection_retries = 3
#wmb added the following line - Keep user credentials in cache for 7 days
offline_credentials_expiration = 7

[domain/DOMAIN.AD]
#wmb - added next line
ad_domain = DOMAIN.AD
debug_level = 0x3ff0
enumerate = false
#wmb - Do not return group members for group lookups. Default false
#ignore_group_members = true
id_provider = ad
chpass_provider = ad
auth_provider = ad
access_provider = simple
#simple_allow_groups = hadoop_admins, hadoop_users
ad_server =  ADSERVER1.DOMAIN.AD
#wmb activated next line
ad_backup_server =  ADSERVER2.DOMAIN.AD
ldap_schema = ad
ldap_user_principal = sAMAccountName
#wmb added the next 2 lines for SSH keys
ldap_user_extra_attrs = User-sshPublicKey:User-sshPublicKey
ldap_user_ssh_public_key = User-sshPublicKey
ldap_id_mapping = true
ldap_force_upper_case_realm = true
case_sensitive = false
krb5_realm = DOMAIN.AD
#wmb  tags stored by the realmd configuration service for this domain
realmd_tags = manages-system joined-with-samba
#wmb Save user passwd if they log in offline. Do kinit when they com online
#krb5_store_password_if_offline = true
ldap_access_order = filter,expire
ldap_account_expire_policy = ad
cache_credentials = true
account_cache_expiration = 15
enum_cache_timeout = 120
entry_cache_nowait_percentage = 50
entry_cache_nowait_timeout = 28800
#wmb add if you want to restrict access to a certain group
ldap_group_search_base = DC=DOMAIN,DC=AD
ldap_sasl_authid = host/ser...@domain.ad
#wmb - enable AD client to update its DNS record
dyndns_update = True
dyndns_update_ptr = True
dyndns_refresh_interval = 43200
dyndns_ttl = 3600

- Simon
On 2018-02-02, 4:07 AM, "Lukas Slebodnik"  wrote:

On (02/02/18 11:54), Jakub Hrozek wrote:
>In the non-working cases, I see the name qualified where it shouldn't be
>e.g:

>[(&(sAMAccountName=u...@domain.ad)(objectclass=user)(sAMAccountName=*)(objectSID=*))][DC=DOMAIN,DC=AD].
 
>while in the working case, the name in the filter is just 
'samaccoutnname=user'.
>
>This is a bug, but at the same time, there's been a number of commits in
>that area that might fix the bug..
>
>Since you are running CentOS, I guess you are not worried about losing a
>support contract :-) so I'm wondering if you could test the 1.16.x release
>from our test repos?
>
>That said, I don't see our 1.16 release in the
>https://copr.fedorainfracloud.org/groups/g/sssd/coprs/ repositories.
>
>Lukas, is building the 1.16 release something we just forgot to do?
>
Actually not.

1.15 continuously moved to 1.16 and there is not any upstream branch for 
1.15
Therefore we have 1.16 in copr sssd-1-15

https://copr.fedorainfracloud.org/coprs/g/sssd/sssd-1-15/builds/

I know it might be a little bit confusing.

LS
___
sssd-users mailing list -- sssd-users@lists.fedorahosted.org
To unsubscribe send an email to sssd-users-le...@lists.fedorahosted.org


___
sssd-users mailing list -- sssd-users@lists.fedorahosted.org
To unsubscribe send an email to sssd-users-le...@lists.fedorahosted.org


[SSSD-users] Re: SSSD/AD Issues After 1.14 to 1.15 upgrade in CentOS 7

2018-02-02 Thread Lukas Slebodnik
On (02/02/18 11:54), Jakub Hrozek wrote:
>In the non-working cases, I see the name qualified where it shouldn't be
>e.g:
>[(&(sAMAccountName=u...@domain.ad)(objectclass=user)(sAMAccountName=*)(objectSID=*))][DC=DOMAIN,DC=AD].
> 
>while in the working case, the name in the filter is just 
>'samaccoutnname=user'.
>
>This is a bug, but at the same time, there's been a number of commits in
>that area that might fix the bug..
>
>Since you are running CentOS, I guess you are not worried about losing a
>support contract :-) so I'm wondering if you could test the 1.16.x release
>from our test repos?
>
>That said, I don't see our 1.16 release in the
>https://copr.fedorainfracloud.org/groups/g/sssd/coprs/ repositories.
>
>Lukas, is building the 1.16 release something we just forgot to do?
>
Actually not.

1.15 continuously moved to 1.16 and there is not any upstream branch for 1.15
Therefore we have 1.16 in copr sssd-1-15

https://copr.fedorainfracloud.org/coprs/g/sssd/sssd-1-15/builds/

I know it might be a little bit confusing.

LS
___
sssd-users mailing list -- sssd-users@lists.fedorahosted.org
To unsubscribe send an email to sssd-users-le...@lists.fedorahosted.org