Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

MAN: Document that PAM stack contains the systemd-user service in the account phase in recent distributions #4912

Closed
sssd-bot opened this issue May 2, 2020 · 0 comments
Assignees
Labels
Bugzilla Closed: Fixed Issue was closed as fixed.

Comments

@sssd-bot
Copy link

sssd-bot commented May 2, 2020

Cloned from Pagure issue: https://pagure.io/SSSD/sssd/issue/3932


Ticket was cloned from Red Hat Bugzilla (product Red Hat Enterprise Linux 8): Bug 1669407

some distributions, like RHEL-8 add a new systemd-user service that is called by the systemd user session and includes system-auth. This means that the access control rules must also include the systemd-user service or else authentication fails.

We should probably document this at least for the purely client-side access control schemas like authorizedService. GPOs already include systemd-user as permit-by-default and IPA had changed its defaults to include this service as well.

Comments


Comment from jhrozek at 2019-01-28 21:20:13

Metadata Update from @jhrozek:


Comment from abbra at 2019-01-29 08:14:57

I would prefer if SSSD would always allowed systemd-user access in HBAC rules. We are going to remove a special HBAC rule for systemd-user because there is no variability in that one, it has simply to be allowed always.


Comment from jhrozek at 2019-01-29 08:44:25

OK, adding a 'special rule' if fine with me (I would just open a separate ticket). I'd also like to get your opinion on two things:

  1. do you feel we should also add a 'subfilter' for the systemd-user service for e.g. the authorizedServices LDAP attribute? Here I would personally say no, the LDAP filters are too 'low-level' and free-form in my opinion that I think we should not presume anything and just let admin configure them

  2. do you think this should be a RHEL-8.0 fix? IIRC you planned to fix systemd-user for 8.0, did that change?


Comment from abbra at 2019-01-29 12:34:29

I don't think (1) is needed to be done, indeed. I'd rather allow admins to have full control there.

For (2) -- it affects Fedora 29+ and RHEL 8 post-beta. We fixed RHEL 8 post-beta but I think now we want to remove that fix and also revert it upstream and instead rely on a fixed SSSD. The problem with an explicit HBAC rule is that it makes little sense for something which is a system-specific property which is pretty much not configurable. pam_systemd always launches systemd --user and the exact PAM service name is hardcoded in systemd source code:

src/login/pam_systemd.c:        if (streq_ptr(service, "systemd-user")) {

So I would consider this as a distribution specific detail as all systemd-based distributions will have it and the only difference is whether pam_systemd is included with required or optional line in PAM configuration, either forcing a failure or pampering over it.


Comment from jhrozek at 2019-01-29 12:44:00

OK, I'll open another ticket. Thanks for the opinions.


Comment from jhrozek at 2019-01-29 12:45:25

Issue #3933 created.


Comment from jhrozek at 2019-02-27 16:49:02

Metadata Update from @jhrozek:

  • Issue set to the milestone: SSSD 2.1
  • Issue tagged with: docs

Comment from jhrozek at 2019-02-27 17:22:38

Metadata Update from @jhrozek:

  • Issue set to the milestone: SSSD 2.2 (was: SSSD 2.1)

Comment from jhrozek at 2019-06-13 23:08:56

Metadata Update from @jhrozek:

  • Issue set to the milestone: SSSD 2.3 (was: SSSD 2.2)

Comment from jhrozek at 2019-07-04 10:24:11

Metadata Update from @jhrozek:

  • Issue assigned to jhrozek

Comment from jhrozek at 2019-07-04 10:24:17

PR: #845


Comment from mzidek at 2019-08-18 23:15:15

master: 820151f


Comment from mzidek at 2019-08-18 23:15:16

Metadata Update from @mzidek:

  • Issue close_status updated to: Fixed
  • Issue status updated to: Closed (was: Open)
@sssd-bot sssd-bot added Bugzilla Closed: Fixed Issue was closed as fixed. labels May 2, 2020
@sssd-bot sssd-bot closed this as completed May 2, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Bugzilla Closed: Fixed Issue was closed as fixed.
Projects
None yet
Development

No branches or pull requests

2 participants