Freeipa client on debian 9 - Cannot find user error
Clash Royale CLAN TAG#URR8PPP
EDIT 1: added solution, pam was faulty
i'm trying to set up freeipa client on debian 9 client using this guide:
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/identity_management_guide/linux-manual
Current setup:
- Freeipa service is installed on centos 7.6 (ipa-server 4.6.4-10.el7.centos.2)
- Debian 9 on which i am trying to set up as client has installed selinux and configured in permissive mode, sssd and sssd-krb5 in version 1.15.0-3
- I am able to login on local (non freeipa) users which existed on the system before installation/configuration (intended behaviour)
I am not able to login via freeipa newly created user (lines appear when i'm trying ssh newuser@host). Error:
==> sssd_dev.company.log <==
(timestamp) [sssd[be[dev.company]]] [sysdb_get_real_name] (0x0040): Cannot find user [nobody@dev.company] in cache
(timestamp) [sssd[be[dev.company]]] [ipa_id_get_account_info_orig_done] (0x0080): Object not found, ending request
(timestamp) [sssd[be[dev.company]]] [krb5_auth_send] (0x0020): Illegal zero-length authtok for user [newuser@dev.company]
Configs below:
SSSD:
[sssd]
config_file_version = 2
services = nss, pam, sudo, ssh
domains = dev.company
debug_level = 3
[nss]
debug_level = 3
[pam]
debug_level = 3
[sudo]
debug_level = 3
[ssh]
debug_level = 3
[domain/dev.company]
cache_credentials = True
krb5_store_password_if_offline = True
ipa_domain = dev.company
id_provider = ipa
auth_provider = ipa
access_provider = ipa
ipa_hostname = company-dev-test-01.dev.company
chpass_provider = ipa
ipa_server = freeipa.dev.company
ldap_tls_cacert = /etc/ipa/ca.crt
debug_level = 3
/etc/krb5.conf
[logging]
default = FILE:/var/log/krb5libs.log
kdc = FILE:/var/log/krb5kdc.log
master_kdc = FILE:/var/log/krb5masterkdc.log
admin_server = FILE:/var/log/kadmind.log
kpasswd_server = FILE:/var/log/kpasswdserver.log
[libdefaults]
default_realm = DEV.COMPANY
dns_lookup_realm = false
dns_lookup_kdc = false
rdns = false
ticket_lifetime = 24h
forwardable = yes
allow_weak_crypto = false
[realms]
DEV.COMPANY =
kdc = freeipa.dev.company:88
master_kdc = freeipa.dev.company:88
admin_server = freeipa.dev.company:749
kpasswd_server = freeipa.dev.company:464
default_domain = dev.company
[domain_realm]
.dev.company = DEV.COMPANY
dev.company = DEV.COMPANY
/etc/pam.d/common-account
account [default=bad success=ok user_unknown=ignore] pam_sss.so forward_pass use_first_pass
account [success=1 new_authtok_reqd=done default=ignore] pam_unix.so
account requisite pam_deny.so
account required pam_permit.so
account sufficient pam_localuser.so
/etc/pam.d/common-auth (old, not working)
auth [success=2 default=ignore] pam_sss.so forward_pass use_first_pass
auth [success=1 default=ignore] pam_unix.so nullok_secure
auth requisite pam_deny.so
auth required pam_permit.so
/etc/pam.d/common-auth (new, working)
auth [success=2 default=ignore] pam_sss.so forward_pass
auth [success=1 default=ignore] pam_unix.so nullok_secure try_first_pass
auth requisite pam_deny.so
auth required pam_permit.so
/etc/pam.d/common-password
password [success=2 default=ignore] pam_sss.so forward_pass
password [success=1 default=ignore] pam_unix.so obscure sha512
password requisite pam_deny.so
password required pam_permit.so
/etc/pam.d/common-session
session [default=1] pam_permit.so
session requisite pam_deny.so
session required pam_mkhomedir.so
session required pam_permit.so
session required pam_unix.so
session optional pam_sss.so
pam kerberos sssd freeipa
add a comment |
EDIT 1: added solution, pam was faulty
i'm trying to set up freeipa client on debian 9 client using this guide:
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/identity_management_guide/linux-manual
Current setup:
- Freeipa service is installed on centos 7.6 (ipa-server 4.6.4-10.el7.centos.2)
- Debian 9 on which i am trying to set up as client has installed selinux and configured in permissive mode, sssd and sssd-krb5 in version 1.15.0-3
- I am able to login on local (non freeipa) users which existed on the system before installation/configuration (intended behaviour)
I am not able to login via freeipa newly created user (lines appear when i'm trying ssh newuser@host). Error:
==> sssd_dev.company.log <==
(timestamp) [sssd[be[dev.company]]] [sysdb_get_real_name] (0x0040): Cannot find user [nobody@dev.company] in cache
(timestamp) [sssd[be[dev.company]]] [ipa_id_get_account_info_orig_done] (0x0080): Object not found, ending request
(timestamp) [sssd[be[dev.company]]] [krb5_auth_send] (0x0020): Illegal zero-length authtok for user [newuser@dev.company]
Configs below:
SSSD:
[sssd]
config_file_version = 2
services = nss, pam, sudo, ssh
domains = dev.company
debug_level = 3
[nss]
debug_level = 3
[pam]
debug_level = 3
[sudo]
debug_level = 3
[ssh]
debug_level = 3
[domain/dev.company]
cache_credentials = True
krb5_store_password_if_offline = True
ipa_domain = dev.company
id_provider = ipa
auth_provider = ipa
access_provider = ipa
ipa_hostname = company-dev-test-01.dev.company
chpass_provider = ipa
ipa_server = freeipa.dev.company
ldap_tls_cacert = /etc/ipa/ca.crt
debug_level = 3
/etc/krb5.conf
[logging]
default = FILE:/var/log/krb5libs.log
kdc = FILE:/var/log/krb5kdc.log
master_kdc = FILE:/var/log/krb5masterkdc.log
admin_server = FILE:/var/log/kadmind.log
kpasswd_server = FILE:/var/log/kpasswdserver.log
[libdefaults]
default_realm = DEV.COMPANY
dns_lookup_realm = false
dns_lookup_kdc = false
rdns = false
ticket_lifetime = 24h
forwardable = yes
allow_weak_crypto = false
[realms]
DEV.COMPANY =
kdc = freeipa.dev.company:88
master_kdc = freeipa.dev.company:88
admin_server = freeipa.dev.company:749
kpasswd_server = freeipa.dev.company:464
default_domain = dev.company
[domain_realm]
.dev.company = DEV.COMPANY
dev.company = DEV.COMPANY
/etc/pam.d/common-account
account [default=bad success=ok user_unknown=ignore] pam_sss.so forward_pass use_first_pass
account [success=1 new_authtok_reqd=done default=ignore] pam_unix.so
account requisite pam_deny.so
account required pam_permit.so
account sufficient pam_localuser.so
/etc/pam.d/common-auth (old, not working)
auth [success=2 default=ignore] pam_sss.so forward_pass use_first_pass
auth [success=1 default=ignore] pam_unix.so nullok_secure
auth requisite pam_deny.so
auth required pam_permit.so
/etc/pam.d/common-auth (new, working)
auth [success=2 default=ignore] pam_sss.so forward_pass
auth [success=1 default=ignore] pam_unix.so nullok_secure try_first_pass
auth requisite pam_deny.so
auth required pam_permit.so
/etc/pam.d/common-password
password [success=2 default=ignore] pam_sss.so forward_pass
password [success=1 default=ignore] pam_unix.so obscure sha512
password requisite pam_deny.so
password required pam_permit.so
/etc/pam.d/common-session
session [default=1] pam_permit.so
session requisite pam_deny.so
session required pam_mkhomedir.so
session required pam_permit.so
session required pam_unix.so
session optional pam_sss.so
pam kerberos sssd freeipa
Pam configuration was faulty - i reedited my original post with both old, not working config part and new - working
– anon628462
Feb 28 at 7:35
add a comment |
EDIT 1: added solution, pam was faulty
i'm trying to set up freeipa client on debian 9 client using this guide:
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/identity_management_guide/linux-manual
Current setup:
- Freeipa service is installed on centos 7.6 (ipa-server 4.6.4-10.el7.centos.2)
- Debian 9 on which i am trying to set up as client has installed selinux and configured in permissive mode, sssd and sssd-krb5 in version 1.15.0-3
- I am able to login on local (non freeipa) users which existed on the system before installation/configuration (intended behaviour)
I am not able to login via freeipa newly created user (lines appear when i'm trying ssh newuser@host). Error:
==> sssd_dev.company.log <==
(timestamp) [sssd[be[dev.company]]] [sysdb_get_real_name] (0x0040): Cannot find user [nobody@dev.company] in cache
(timestamp) [sssd[be[dev.company]]] [ipa_id_get_account_info_orig_done] (0x0080): Object not found, ending request
(timestamp) [sssd[be[dev.company]]] [krb5_auth_send] (0x0020): Illegal zero-length authtok for user [newuser@dev.company]
Configs below:
SSSD:
[sssd]
config_file_version = 2
services = nss, pam, sudo, ssh
domains = dev.company
debug_level = 3
[nss]
debug_level = 3
[pam]
debug_level = 3
[sudo]
debug_level = 3
[ssh]
debug_level = 3
[domain/dev.company]
cache_credentials = True
krb5_store_password_if_offline = True
ipa_domain = dev.company
id_provider = ipa
auth_provider = ipa
access_provider = ipa
ipa_hostname = company-dev-test-01.dev.company
chpass_provider = ipa
ipa_server = freeipa.dev.company
ldap_tls_cacert = /etc/ipa/ca.crt
debug_level = 3
/etc/krb5.conf
[logging]
default = FILE:/var/log/krb5libs.log
kdc = FILE:/var/log/krb5kdc.log
master_kdc = FILE:/var/log/krb5masterkdc.log
admin_server = FILE:/var/log/kadmind.log
kpasswd_server = FILE:/var/log/kpasswdserver.log
[libdefaults]
default_realm = DEV.COMPANY
dns_lookup_realm = false
dns_lookup_kdc = false
rdns = false
ticket_lifetime = 24h
forwardable = yes
allow_weak_crypto = false
[realms]
DEV.COMPANY =
kdc = freeipa.dev.company:88
master_kdc = freeipa.dev.company:88
admin_server = freeipa.dev.company:749
kpasswd_server = freeipa.dev.company:464
default_domain = dev.company
[domain_realm]
.dev.company = DEV.COMPANY
dev.company = DEV.COMPANY
/etc/pam.d/common-account
account [default=bad success=ok user_unknown=ignore] pam_sss.so forward_pass use_first_pass
account [success=1 new_authtok_reqd=done default=ignore] pam_unix.so
account requisite pam_deny.so
account required pam_permit.so
account sufficient pam_localuser.so
/etc/pam.d/common-auth (old, not working)
auth [success=2 default=ignore] pam_sss.so forward_pass use_first_pass
auth [success=1 default=ignore] pam_unix.so nullok_secure
auth requisite pam_deny.so
auth required pam_permit.so
/etc/pam.d/common-auth (new, working)
auth [success=2 default=ignore] pam_sss.so forward_pass
auth [success=1 default=ignore] pam_unix.so nullok_secure try_first_pass
auth requisite pam_deny.so
auth required pam_permit.so
/etc/pam.d/common-password
password [success=2 default=ignore] pam_sss.so forward_pass
password [success=1 default=ignore] pam_unix.so obscure sha512
password requisite pam_deny.so
password required pam_permit.so
/etc/pam.d/common-session
session [default=1] pam_permit.so
session requisite pam_deny.so
session required pam_mkhomedir.so
session required pam_permit.so
session required pam_unix.so
session optional pam_sss.so
pam kerberos sssd freeipa
EDIT 1: added solution, pam was faulty
i'm trying to set up freeipa client on debian 9 client using this guide:
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/identity_management_guide/linux-manual
Current setup:
- Freeipa service is installed on centos 7.6 (ipa-server 4.6.4-10.el7.centos.2)
- Debian 9 on which i am trying to set up as client has installed selinux and configured in permissive mode, sssd and sssd-krb5 in version 1.15.0-3
- I am able to login on local (non freeipa) users which existed on the system before installation/configuration (intended behaviour)
I am not able to login via freeipa newly created user (lines appear when i'm trying ssh newuser@host). Error:
==> sssd_dev.company.log <==
(timestamp) [sssd[be[dev.company]]] [sysdb_get_real_name] (0x0040): Cannot find user [nobody@dev.company] in cache
(timestamp) [sssd[be[dev.company]]] [ipa_id_get_account_info_orig_done] (0x0080): Object not found, ending request
(timestamp) [sssd[be[dev.company]]] [krb5_auth_send] (0x0020): Illegal zero-length authtok for user [newuser@dev.company]
Configs below:
SSSD:
[sssd]
config_file_version = 2
services = nss, pam, sudo, ssh
domains = dev.company
debug_level = 3
[nss]
debug_level = 3
[pam]
debug_level = 3
[sudo]
debug_level = 3
[ssh]
debug_level = 3
[domain/dev.company]
cache_credentials = True
krb5_store_password_if_offline = True
ipa_domain = dev.company
id_provider = ipa
auth_provider = ipa
access_provider = ipa
ipa_hostname = company-dev-test-01.dev.company
chpass_provider = ipa
ipa_server = freeipa.dev.company
ldap_tls_cacert = /etc/ipa/ca.crt
debug_level = 3
/etc/krb5.conf
[logging]
default = FILE:/var/log/krb5libs.log
kdc = FILE:/var/log/krb5kdc.log
master_kdc = FILE:/var/log/krb5masterkdc.log
admin_server = FILE:/var/log/kadmind.log
kpasswd_server = FILE:/var/log/kpasswdserver.log
[libdefaults]
default_realm = DEV.COMPANY
dns_lookup_realm = false
dns_lookup_kdc = false
rdns = false
ticket_lifetime = 24h
forwardable = yes
allow_weak_crypto = false
[realms]
DEV.COMPANY =
kdc = freeipa.dev.company:88
master_kdc = freeipa.dev.company:88
admin_server = freeipa.dev.company:749
kpasswd_server = freeipa.dev.company:464
default_domain = dev.company
[domain_realm]
.dev.company = DEV.COMPANY
dev.company = DEV.COMPANY
/etc/pam.d/common-account
account [default=bad success=ok user_unknown=ignore] pam_sss.so forward_pass use_first_pass
account [success=1 new_authtok_reqd=done default=ignore] pam_unix.so
account requisite pam_deny.so
account required pam_permit.so
account sufficient pam_localuser.so
/etc/pam.d/common-auth (old, not working)
auth [success=2 default=ignore] pam_sss.so forward_pass use_first_pass
auth [success=1 default=ignore] pam_unix.so nullok_secure
auth requisite pam_deny.so
auth required pam_permit.so
/etc/pam.d/common-auth (new, working)
auth [success=2 default=ignore] pam_sss.so forward_pass
auth [success=1 default=ignore] pam_unix.so nullok_secure try_first_pass
auth requisite pam_deny.so
auth required pam_permit.so
/etc/pam.d/common-password
password [success=2 default=ignore] pam_sss.so forward_pass
password [success=1 default=ignore] pam_unix.so obscure sha512
password requisite pam_deny.so
password required pam_permit.so
/etc/pam.d/common-session
session [default=1] pam_permit.so
session requisite pam_deny.so
session required pam_mkhomedir.so
session required pam_permit.so
session required pam_unix.so
session optional pam_sss.so
pam kerberos sssd freeipa
pam kerberos sssd freeipa
edited Feb 28 at 7:34
anon628462
asked Feb 25 at 8:52
anon628462anon628462
12
12
Pam configuration was faulty - i reedited my original post with both old, not working config part and new - working
– anon628462
Feb 28 at 7:35
add a comment |
Pam configuration was faulty - i reedited my original post with both old, not working config part and new - working
– anon628462
Feb 28 at 7:35
Pam configuration was faulty - i reedited my original post with both old, not working config part and new - working
– anon628462
Feb 28 at 7:35
Pam configuration was faulty - i reedited my original post with both old, not working config part and new - working
– anon628462
Feb 28 at 7:35
add a comment |
0
active
oldest
votes
Your Answer
StackExchange.ready(function()
var channelOptions =
tags: "".split(" "),
id: "106"
;
initTagRenderer("".split(" "), "".split(" "), channelOptions);
StackExchange.using("externalEditor", function()
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled)
StackExchange.using("snippets", function()
createEditor();
);
else
createEditor();
);
function createEditor()
StackExchange.prepareEditor(
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: false,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: null,
bindNavPrevention: true,
postfix: "",
imageUploader:
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
,
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
);
);
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f502805%2ffreeipa-client-on-debian-9-cannot-find-user-error%23new-answer', 'question_page');
);
Post as a guest
Required, but never shown
0
active
oldest
votes
0
active
oldest
votes
active
oldest
votes
active
oldest
votes
Thanks for contributing an answer to Unix & Linux Stack Exchange!
- Please be sure to answer the question. Provide details and share your research!
But avoid …
- Asking for help, clarification, or responding to other answers.
- Making statements based on opinion; back them up with references or personal experience.
To learn more, see our tips on writing great answers.
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f502805%2ffreeipa-client-on-debian-9-cannot-find-user-error%23new-answer', 'question_page');
);
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Pam configuration was faulty - i reedited my original post with both old, not working config part and new - working
– anon628462
Feb 28 at 7:35