BLU Discuss list archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Discuss] ssh with rsa keys and ldap
- Subject: [Discuss] ssh with rsa keys and ldap
- From: gaf.linux at gmail.com (Jerry Feldman)
- Date: Thu, 27 Oct 2016 07:35:54 -0400
- In-reply-to: <20161026203119.GP18405@angus.ind.wpi.edu>
- References: <CAEvgogHQWR89Auju9pusPDFFhd6_ijTutn8n=52mJD7TamEhRQ@mail.gmail.com> <CALQ72QFQ_7jb0LsG_iq2ExfZiCiJ7JKdWQts25LTh=Lig3CA9Q@mail.gmail.com> <CAEvgogFkLCHEcBCv76FkcwdQxYWOvLNQ2vXLO2N2e6KHLe1T=w@mail.gmail.com> <CAEvgogGiviSinh913k6rmPi7wiP=yCnYWi2Ce1cwPDz7K4XsMw@mail.gmail.com> <a8b1c7d2-5f2a-0503-6c92-0579a4ee23ba@blu.org> <20161026203119.GP18405@angus.ind.wpi.edu>
Thanks Chuck. It actually does not matter in this case. The workstation is in a lab and not widely available outside. However, restorecon may be a better way. I'll try that on another server. On Wed, Oct 26, 2016 at 4:31 PM, Chuck Anderson <cra at wpi.edu> wrote: > Most likely all you had to do was fix the labels (or in some cases > enable a boolean). I say this because SELinux policy should already > exist to allow /usr/sbin/sshd to access authorized_keys--that is a > very basic function of a common system daemon that existing policy > should cover, not some obscure daemon or use case. > > restorecon -R /home/auser > > By changing the policy (loading a new policy module created with > audit2allow) you may be inadvertently making your system less secure > by allowing a broad range of access, rather than just fixing the > labels (or turning on a boolean) to match what the existing policy > already allows. It is always a good idea to LOOK at what you are > piping into audit2allow before just blindly allowing it. Please post > the sshd lines from audit.log and we may be able to help with that. > > On Wed, Oct 26, 2016 at 03:59:34PM -0400, Jerry Feldman wrote: > > Not wanting to make Dan Walsh weep all over > > me(https://stopdisablingselinux.com/), or worse hit me over the head > > with my own mallet, I re-enabled selinux and issue this command (as > > root): > > > > grep sshd /var/log/audit/audit.log | audit2allow -M mypol > > > > And verified it works. > > > > On 10/26/2016 03:07 PM, Jerry Feldman wrote: > > >Found the culprit!!! Journalctl is your friend. > > >Oct 26 14:56:18 target.usersys.redhat.com python[31245]: SELinux is > > >preventing /usr/sbin/sshd from open access on the file > > >/home/auser/.ssh/authorized_keys. > > > If you > believe > > >that sshd should be allowed open access on the authorized_keys file by > > >default. > > > # grep > sshd > > >/var/log/audit/audit.log | audit2allow -M mypol > > >I temporarily disabled selinux to test this. > > > > > >On Wed, Oct 26, 2016 at 1:40 PM, Jerry Feldman <gaf.linux at gmail.com> > wrote: > > > > > >>It's wierd. I can ssh to the workstation as a non-ldap user > > >>ssh -l <nonldap> > > >>And it authenticates properly. But if I ssh to another host at work > where > > >>I have the keys set up. it always goes to password. > > >> > > >> > > >>On Wed, Oct 26, 2016 at 12:14 PM, Guy Gold <guy1gold at gmail.com> wrote: > > >> > > >>>Jerry, > > >>> > > >>>Interesting. > > >>>Would you say it's safe to assume the culprit is the client rather > than > > >>>the > > >>>ssh server (target) ? > > >>> > > >>>It's as if "something" (ldap?) is throwing the auth process to believe > > >>>"you" does not exist, even when the files are there. > > >>> > > >>>On 26 October 2016 at 08:42, Jerry Feldman <gaf.linux at gmail.com> > wrote: > > >>> > > >>>>Unfortunately nothing very interesting. > > >>>>/var/log/secure on target: > > >>>>Oct 26 08:30:45 jfeldmanws sudo: xxxx : TTY=pts/0 ; PWD=/home/xxxx > ; > > >>>>USER=root ; COMMAND=/bin/tail -f /var/log/secure > > >>>>Oct 26 08:31:15 jtarget sshd[16073]: Accepted password for yyyy from > > >>>>10.18.41.22 port 57384 ssh2 > > >>>>Oct 26 08:31:15 target sshd[16073]: pam_unix(sshd:session): session > > >>>opened > > >>>>for user yyyy by (uid=0) > _______________________________________________ > Discuss mailing list > Discuss at blu.org > http://lists.blu.org/mailman/listinfo/discuss > -- -- Jerry Feldman <gaf.linux at gmail.com> Boston Linux and Unix PGP key id: B7F14F2F Key fingerprint: D937 A424 4836 E052 2E1B 8DC6 24D7 000F B7F1 4F2F
- References:
- [Discuss] ssh with rsa keys and ldap
- From: gaf.linux at gmail.com (Jerry Feldman)
- [Discuss] ssh with rsa keys and ldap
- From: guy1gold at gmail.com (Guy Gold)
- [Discuss] ssh with rsa keys and ldap
- From: gaf.linux at gmail.com (Jerry Feldman)
- [Discuss] ssh with rsa keys and ldap
- From: gaf.linux at gmail.com (Jerry Feldman)
- [Discuss] ssh with rsa keys and ldap
- From: gaf at blu.org (Jerry Feldman)
- [Discuss] ssh with rsa keys and ldap
- From: cra at WPI.EDU (Chuck Anderson)
- [Discuss] ssh with rsa keys and ldap
- Prev by Date: [Discuss] ssh with rsa keys and ldap
- Next by Date: [Discuss] BLU Desktop GNU/Linux SIG Meeting - TMUX + Lightning Talks - Weds, Nov 2, 2016
- Previous by thread: [Discuss] ssh with rsa keys and ldap
- Next by thread: [Discuss] ssh with rsa keys and ldap
- Index(es):