On Wed, Oct 17, 2012 at 07:41:45PM +0000, Joshua C. Endries wrote:
> Hello,
> 
> I'm trying to set sssd up so that I use a local passwd file for accounts and 
> Kerberos for authentication, until AD is set up with the correct attributes 
> (which will be a while). I have Kerberos working via krb5.conf, and LDAP sort 
> of works via ldap.conf (except the important parts) but I will need to switch 
> to SSSD eventually. I was hoping to get this going now with local accounts to 
> make things easier down the road. This is on RHEL 5 right now. I'm hoping 6 
> isn't much different.
> 
> I'm having some trouble (shocker!) so my first question is: is this 
> configuration possible?
> 

Hi Josh,

your configuration is not the most typical setup, but it *should* work..
That said, it's not something we typically test, so there might be
bugs.

> My sssd.conf is pretty basic so far:
> 
> [sssd]
> config_file_version = 2
> domains = DEFAULT
> services = nss, pam
> 
> [nss]
> 
> [pam]
> 
> [domain/DEFAULT]
> auth_provider = krb5
> id_provider = proxy
> proxy_lib_name = files
> krb5_server = kerberos.foo.com
> krb5_realm = IT.FOO.COM
> 
> These are some of the errors I'm seeing:
> 
> [sssd[pam]] [sss_dp_get_reply] (4): Got reply (3, 19, Initgroups call not 
> supported) from Data Provider
> [sssd[pam]] [pam_check_user_dp_callback] (2): Unable to get information from 
> Data Provider
> [sssd[pam]] [pam_check_user_search] (4): Requesting info for [jce54@DEFAULT]
> [pam_check_user_search] (2): No matching domain found for [jce54], fail!
> sshd[6592]: pam_sss(sshd:auth): received for user jce54: 10 (User not known 
> to the underlying authentication module)
> 
> This suggests to me that it's not talking with NSS somehow...

Yep, pam_sss claims it doesn't know the user.

Is "sss" included on the "passwd" and "group" lines of /etc/nsswitch.conf?

Does "getent passwd -s sss jce54" work?

Which SSSD version are you running? The one from stock RHEL5? (I suspect
so, because of the decimal debug levels..)


> 
> /etc/pam.d/system-auth:
> 
> auth        required      pam_env.so
> auth        sufficient    pam_unix.so nullok try_first_pass
> auth        requisite     pam_succeed_if.so uid >= 500 quiet
> auth sufficient pam_sss.so use_first_pass
> #auth        sufficient    pam_krb5.so use_first_pass
> auth        required      pam_deny.so
> 
> #account     sufficient    pam_ldap.so
> account     required      pam_unix.so broken_shadow
> account     sufficient    pam_succeed_if.so uid < 500 quiet
> account [default=bad success=ok user_unknown=ignore] pam_sss.so
> #account     [default=bad success=ok user_unknown=ignore] pam_krb5.so
> account     required      pam_permit.so
> 
> password    requisite     pam_cracklib.so try_first_pass retry=3
> password    sufficient    pam_unix.so md5 shadow nullok try_first_pass 
> use_authtok
> password sufficient pam_sss.so use_authtok
> #password    sufficient    pam_krb5.so use_authtok minimum_uid=1000
> password    required      pam_deny.so
> 
> session     optional      pam_keyinit.so revoke
> session     required      pam_limits.so
> session     [success=1 default=ignore] pam_succeed_if.so service in crond 
> quiet use_uid
> session sufficient pam_sss.so
> session     required      pam_unix.so

Your PAM stack looks OK to me..

> 
> I read in one of the man pages I think that sssd will append the krb5_realm 
> to the username if there isn't a domain there, and I'm logging in with jce54, 
> so it *should* I think use jc...@it.foo.com, but doesn't appear to do 
> anything Kerberos-wise so maybe that's not an issue (yet).

Yep, by default the principal is constructed as user@REALM. As you said,
the issue seems to be in the Name Service Switch.

> 
> Thanks,
> Josh

Interestingly enough, I tried the same configuration locally and I'm
getting an error as well -- but a different one.. I'll try to debug the
issue and report back.
_______________________________________________
sssd-devel mailing list
sssd-devel@lists.fedorahosted.org
https://lists.fedorahosted.org/mailman/listinfo/sssd-devel

Reply via email to