SSSD upgrade breaking p11_child and smartcard stops working
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
sssd (Ubuntu) |
Incomplete
|
Undecided
|
Marco Trevisan (Treviño) | ||
Focal |
In Progress
|
Medium
|
Unassigned |
Bug Description
Facing issue with using smartcard for active directory users after upgrading the SSSD packages from sssd_2.
Also we are facing issue that sssd is crashing if we upgrade only samba and not sssd packages
We tried the steps mentioned a part of below bug:
Referance : https:/
https:/
Tried below solutions
1) Updating certificate path :
/etc/sssd/sssd.conf
[pam]
pam_cert_db_path = /etc/ssl/
2)
add any mapping/filter rules to the /etc/sssd/sssd.conf for p11_child
upadte /usr/share/
add the root and issuing certs to /usr/local/
generate a new, empty nssdb
/usr/bin/certutil -N -d sql:/etc/pki/nssdb --empty-password
when adding the certs to nssdb, only add the Issuing CA WITH CT,C,C flags
certutil -A -d /etc/pki/nssdb -n issuingCA.crt -t "CT,C,C" -i /usr/local/
enable openSC
modutil -force -dbdir /etc/pki/nssdb -add "OpenSC" -libfile opensc-pkcs11.so
test PKI auth works
login or:
/usr/libexec/
perform upgrade to latest sssd
verify the /etc/sssd/
test p11_child to see if it breaks
/usr/libexec/
fix it:
add the /usr/local/
run p11_child again, observe that it works
try to login
Brick your system procedure:
After above test procedure works:
configure for MFA on old sssd
populate the below to /usr/share/
pam-auth-update --package --enable sss-smartcardonly --remove sss --force
verify only smart card is allowed to login
apt upgrade
reboot, login no longer allowed
Note that SSHing into the system may be allowed, depending on ssh configuration and if sss_ssh_
Name: SSS authentication - Requires Smartcard
Default: yes
Conflicts: sss
Priority: 800
Auth-Type: Primary
Auth:
[success=end default=ignore] pam_sss.so use_first_pass require_cert_auth
Auth-Initial:
[success=end default=ignore] pam_sss.so forward_pass require_cert_auth
Account-Type: Additional
Account:
sufficient pam_localuser.so
[default=bad success=ok user_unknown=
Session-Type: Additional
Session-
Session:
optional pam_sss.so
Password-Type: Primary
Password:
sufficient pam_sss.so use_authtok
Password-Initial:
sufficient pam_sss.so
3) After tring 2nd solution : issue was to recognize the certificate
Fix certificate issue by moving certificates to DHC path
It is not able to read token information, hence not detecting certificate during login
Can you please help us know if we are missing anything.
Changed in sssd (Ubuntu Focal): | |
status: | New → Confirmed |
tags: | added: regression-update |
Changed in sssd (Ubuntu): | |
assignee: | nobody → Marco Trevisan (Treviño) (3v1n0) |
Changed in sssd (Ubuntu Focal): | |
status: | Confirmed → In Progress |
importance: | Undecided → High |
importance: | High → Medium |
Ok, so we need to backport the fixes for focal that landed upstream, and then the configuration value can be set to `certification_ verification = partial_chain`