Test setup:

# bind system to KDC (ie. AD)
# ensure the system for kerberos (make sure you can kinit as your user)
# add the following to the pam-auth-update templates 
(/usr/share/pam-configs/sss-gssapi) (note I added debug to increase verbosity 
for this test, this is not needed for general use)

Name: SSS GSSAPI authentication
Default: yes
Priority: 900

Auth-Type: Primary
Auth:
 [success=end default=ignore] pam_sss_gss.so debug
Auth-Initial:
 [success=end default=ignore] pam_sss_gss.so debug

# run pam-auth-update to enable the module
# add to /etc/sssd/sssd.conf under the kerberos realm/domain section, restart 
sssd
[domain/realm section]
pam_gssapi_services = sudo, sudo-i

[pam]
pam_response_filter = ENV:KRB5CCNAME

# add yourself to the /etc/sudoers.d/user_[username]
user1 ALL=(ALL) ALL

Testing that pam_sss_gss.so is properly authing:
# login as your user, view (or gain) kerberos credentials (klist to verify 
valid ccache, kinit to gain creds if needed)
# run sudo -i or sudo [command]. this should execute the sudo without issue

eg:
user1@working-host1:~$ echo $KRB5CCNAME

user1@working-host1:~$ kinit us...@example.com

user1@working-host1:~$ klist
Ticket cache: FILE:/tmp/krb5cc_1000
Default principal: us...@example.com
Valid starting Expires Service principal
03/20/25 22:49:12 03/21/25 08:49:12 krbtgt/example....@example.com
 renew until 03/21/25 22:49:09

user1@working-host1:~$ sudo -i
pam_sss_gss: Initializing GSSAPI authentication with SSSD
pam_sss_gss: Switching euid from 0 to 1234556
pam_sss_gss: Trying to establish security context
pam_sss_gss: SSSD User name: us...@example.com
pam_sss_gss: User domain: example.com
pam_sss_gss: User principal:
pam_sss_gss: Target name: h...@working-host1.example.com
pam_sss_gss: Using ccache: default
pam_sss_gss: Acquiring credentials, principal name will be derived
pam_sss_gss: Switching euid from 1234556 to 0
pam_sss_gss: Authentication successful
root@host1:~#

# exit back to user session, view krb ccache. a valid service ticket for
host/working-host1.example.com will be seen.

test to verify blocking access without valid kerberos creds: (intentional 
failure test)
# login as your user, destroy all krb creds: kdestroy -A
# verify creds are destroyped/ccache is empty with klist -A
# run sudo -i or sudo [command]. this should execute sudo as usual via the pam 
stack, asking for alternative credentials based on the pam-auth-update 
configuration

user1@working-host1:~$ echo $KRB5CCNAME

user1@working-host1:~$ kdestroy -A

user1@working-host1:~$ klist
klist: No credentials cache found (filename: /run/user/1234556/krb5cc)

user1@working-host1:~$ sudo -i
pam_sss_gss: Initializing GSSAPI authentication with SSSD
pam_sss_gss: Switching euid from 0 to 1234556
pam_sss_gss: Trying to establish security context
pam_sss_gss: SSSD User name: us...@example.com
pam_sss_gss: User domain: example.com
pam_sss_gss: User principal:
pam_sss_gss: Target name: h...@working-host1.example.com
pam_sss_gss: Using ccache: default
pam_sss_gss: Acquiring credentials, principal name will be derived
pam_sss_gss: Unable to read credentials from [default] [maj:0x70000, 
min:0x96c73a8d]
pam_sss_gss: GSSAPI: No credentials were supplied, or the credentials were 
unavailable or inaccessible
pam_sss_gss: GSSAPI: No Kerberos credentials available (default cache: 
FILE:/run/user/1234556/krb5cc)
pam_sss_gss: Switching euid from 1234556 to 0
pam_sss_gss: System error [5]: Input/output error
Please insert smart card

access is blocked.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2103623

Title:
  pam_sss_gss fails to work when KRB5CCNAME is not set

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sssd/+bug/2103623/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to