You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.
We set up a trust between the FreeIPA server and our AD, and we can correctly authenticate both AD users and FreeIPA users on the clients, but when we enabled cached_auth_timeout on the clients we noticed that the setting is not being honored for AD users, while it's working as expected for users defined in FreeIPA.
$ ssh freeipa-user@test76
Password:
Last login: Fri Feb 15 16:53:28 2019 from 172.22.9.28
[freeipa-user@test74 ~]$ exit
logout
Connection to test74 closed.
$ ssh freeipa-user@test74
Password:
Authenticated with cached credentials.
Last login: Mon Feb 18 10:00:42 2019 from 172.22.9.28
$ ssh ad-user@test74
Password:
Last login: Fri Feb 15 16:54:22 2019 from 172.22.9.28
[ad-user@test74 ~]$ exit
logout
Connection to test74 closed.
$ ssh ad-user@test74
Password:
Last login: Mon Feb 18 09:59:40 2019 from 172.22.9.28
But if we force the backed offline by blocking traffic directed to the FreeIPA server on the client firewall:
$ ssh ad-user@test74
Password:
Authenticated with cached credentials.
Last login: Mon Feb 18 11:12:21 2019 from 172.22.9.28
[ad-user@test74 ~]$
Does it help to create a subsection for your trusted AD domain and add the parameter there?
[domain/freeipa.example.com/ad.example.com]
cached_auth_timeout = 3600
?
It didn't. I added both cached_auth_timeout and cache_credentials in a subsection but there was no difference.
Another thing that I noticed is that sssctl user-show behaves differently for FreeIPA users and AD users:
# sssctl user-show ad-user
User ad-user is not present in cache.
# sssctl user-show ad-user@ad.example.com
Name: ad-user
Cache entry creation date: 02/21/19 13:21:17
Cache entry last update time: 02/21/19 13:28:24
Cache entry expiration time: 02/21/19 14:58:24
Initgroups expiration time: 02/21/19 14:58:24
Cached in InfoPipe: No
I don't know if it's important, for what it's worth caching doesn't seem to work even if I login using username+ad domain name, ie: ssh 'ad-user@ad.example.com'@test76.
Hi, this is probably out of scope for this bug but I've been doing tests with a patched sssd 1.16.1 that includes both commits and while I can confirm that now I'm not seeing authentication traffic towards the DCs, sssd is always doing LDAP queries towards the FreeIPA servers. Am I missing some option to cache those too?
The text was updated successfully, but these errors were encountered:
Cloned from Pagure issue: https://pagure.io/SSSD/sssd/issue/3960
We set up a trust between the FreeIPA server and our AD, and we can correctly authenticate both AD users and FreeIPA users on the clients, but when we enabled cached_auth_timeout on the clients we noticed that the setting is not being honored for AD users, while it's working as expected for users defined in FreeIPA.
But if we force the backed offline by blocking traffic directed to the FreeIPA server on the client firewall:
This is our sssd.conf:
sssd.conf:
We're running FreeIPA 4.6.4 on CentOS 7.6.1810 on our FreeIPA server and SSSD 1.16.2 on our clients (both Ubuntu and CentOS):
server:
clients:
Comments
Comment from jhrozek at 2019-02-21 12:50:13
Does it help to create a subsection for your trusted AD domain and add the parameter there?
[domain/freeipa.example.com/ad.example.com]
cached_auth_timeout = 3600
?
Comment from plumbeo at 2019-02-21 13:38:36
It didn't. I added both cached_auth_timeout and cache_credentials in a subsection but there was no difference.
Another thing that I noticed is that
sssctl user-showbehaves differently for FreeIPA users and AD users:But:
I don't know if it's important, for what it's worth caching doesn't seem to work even if I login using username+ad domain name, ie:
ssh 'ad-user@ad.example.com'@test76.Comment from jhrozek at 2019-03-01 21:21:21
You are right that this is a bug. Sorry about the delay.
Comment from jhrozek at 2019-03-01 21:21:34
Metadata Update from @jhrozek:
Comment from jhrozek at 2019-03-07 22:13:10
Metadata Update from @jhrozek:
Comment from jhrozek at 2019-03-07 22:13:10
Issue linked to Bugzilla: Bug 1685581
Comment from jhrozek at 2019-03-07 22:18:44
Metadata Update from @jhrozek:
Comment from jhrozek at 2019-03-07 22:18:54
PR: #772
Comment from jhrozek at 2019-03-07 22:19:15
Metadata Update from @jhrozek:
Comment from jhrozek at 2019-03-26 22:13:06
Comment from jhrozek at 2019-03-26 22:13:06
Metadata Update from @jhrozek:
Comment from jhrozek at 2019-03-26 22:13:51
Feel free to open another ticket about the sssctl issue btw
Comment from jhrozek at 2019-05-20 08:59:58
Commit c911562d relates to this ticket
Comment from jhrozek at 2019-05-20 09:03:13
Related commits that also fix PREAUTH caching:
Comment from plumbeo at 2019-05-26 22:34:48
Hi, this is probably out of scope for this bug but I've been doing tests with a patched sssd 1.16.1 that includes both commits and while I can confirm that now I'm not seeing authentication traffic towards the DCs, sssd is always doing LDAP queries towards the FreeIPA servers. Am I missing some option to cache those too?
The text was updated successfully, but these errors were encountered: