> btw. I cannot reproduce your issue where a command is denied where only
> user and host is matching, can you give an example where this is
> happening? Thanks

I retract my previous statement and stand corrected:

I have run a test and verified on Redhat Enterprise 5.5 that Sudo is behaving 
as we believe it should.

A command NO MATCH occurs only if sudo parses all results and does not find a 
match.

I am documenting this for my internal team so that we can investigate the 
systems that have had contrary results as they are likely the result of a 
definite bug.

I apologize for the F.U.D.

So then, that just leaves us with:

How do we adjust FreeIPA such that it ensures Deny-IPASudoRules precede any 
Allow-IPASudoRules ?
 
Sudo Debug:
-------------------
sudo: ldap_set_option(LDAP_OPT_X_TLS, LDAP_OPT_X_TLS_HARD)

sudo: ldap_sasl_bind_s() ok
sudo: found:cn=defaults,cn=SUDOers,dc=example,dc=com
sudo: ldap sudoOption: 'logfile=/var/log/sudolog'
sudo: ldap sudoOption: 'ignore_dot'
sudo: ldap search 
'(|(sudoUser=testuser)(sudoUser=%testuser)(sudoUser=%UGRP-Test1)(sudoUser=ALL))'
sudo: found:cn=ROLE-jumpers_RO,cn=SUDOers,dc=example,dc=com
sudo: ldap sudoHost 'jump2.example.com' ... not
sudo: ldap sudoHost 'jump1.example.com' ... MATCH!
sudo: found:cn=ROLE-jr-test,cn=SUDOers,dc=example,dc=com
sudo: ldap sudoHost 'jump2.example.com' ... not
sudo: ldap sudoHost 'jump1.example.com' ... MATCH!
sudo: found:cn=ROLE-jr-test2,cn=SUDOers,dc=example,dc=com
sudo: ldap sudoHost 'jump2.example.com' ... not
sudo: ldap sudoHost 'jump1.example.com' ... MATCH!
sudo: ldap sudoCommand 'ALL' ... MATCH!
sudo: Command allowed
sudo: user_matches=1
sudo: host_matches=1
sudo: sudo_ldap_lookup(0)=0x02

_______________________________________________
Freeipa-devel mailing list
Freeipa-devel@redhat.com
https://www.redhat.com/mailman/listinfo/freeipa-devel

Reply via email to