Discussion:
[Freeipa-users] Password requirements too stringent
Tim Hildred
2012-09-18 01:25:57 UTC
Permalink
Hey all;

I'm running IPA internally to control access to our cloud environment.

I must admit, I do not understand the password requirements. I have had them set to the defaults. I read this:
https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/6/html/Identity_Management_Guide/user-pwdpolicy.html

I have the minimum character classes set to 0. When people use SSH to change their passwords, they get "Based on a dictionary word" for passwords that have nothing to do with dictionary words.

I can't find anywhere in the documentation a break down of what makes an unacceptable versus acceptable password.

Can anyone help me figure out what to tell my users? I think people would get a lot less frustrated if they knew why "C679V375" was "too simple" when the password policy has 0 required classes.

Tim Hildred, RHCE
Content Author II - Engineering Content Services, Red Hat, Inc.
Brisbane, Australia
Email: ***@redhat.com
Internal: 8588287
Mobile: +61 4 666 25242
IRC: thildred

ps: funny exchange with user:
Jul 12 14:12:33 <user1> i feel like im being punked
Jul 12 14:12:40 <user1> it is based on a dictionary word
Jul 12 14:12:43 <user1> it is too short
Jul 12 14:12:49 <user1> is does not have enough unique letters
Jul 12 14:12:51 <user1> etc
Steven Jones
2012-09-18 01:44:54 UTC
Permalink
Maybe its the local system having requirements and not IPA?

In my secure logs I see pam is quering first locally and then the sss daemon....maybe its failing you on the default rh setup of the OS?

regards

Steven Jones

Technical Specialist - Linux RHCE

Victoria University, Wellington, NZ

0064 4 463 6272

________________________________________
From: freeipa-users-***@redhat.com [freeipa-users-***@redhat.com] on behalf of Tim Hildred [***@redhat.com]
Sent: Tuesday, 18 September 2012 1:25 p.m.
To: freeipa-users
Subject: [Freeipa-users] Password requirements too stringent

Hey all;

I'm running IPA internally to control access to our cloud environment.

I must admit, I do not understand the password requirements. I have had them set to the defaults. I read this:
https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/6/html/Identity_Management_Guide/user-pwdpolicy.html

I have the minimum character classes set to 0. When people use SSH to change their passwords, they get "Based on a dictionary word" for passwords that have nothing to do with dictionary words.

I can't find anywhere in the documentation a break down of what makes an unacceptable versus acceptable password.

Can anyone help me figure out what to tell my users? I think people would get a lot less frustrated if they knew why "C679V375" was "too simple" when the password policy has 0 required classes.

Tim Hildred, RHCE
Content Author II - Engineering Content Services, Red Hat, Inc.
Brisbane, Australia
Email: ***@redhat.com
Internal: 8588287
Mobile: +61 4 666 25242
IRC: thildred

ps: funny exchange with user:
Jul 12 14:12:33 <user1> i feel like im being punked
Jul 12 14:12:40 <user1> it is based on a dictionary word
Jul 12 14:12:43 <user1> it is too short
Jul 12 14:12:49 <user1> is does not have enough unique letters
Jul 12 14:12:51 <user1> etc
JR Aquino
2012-09-18 02:37:48 UTC
Permalink
Tim, please check your /etc/pam.d/system-auth with the password block. If you see password requisite pam_cracklib.so, then this is why you are having a problem.

$ man pam_cracklib

It is a local security library for enforcing strong password practices from the unix cli.

ProTip:
If you don't need this, you can remove it from pam
If you want to work around this, set your password from the IPA webui or via the cli: "ipa passwd username"

Hope this info helps!

"Keeping your head in the cloud"
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
JR Aquino

Senior Information Security Specialist, Technical Operations
T: +1 805 690 3478 | F: +1 805 879 3730 | M: +1 805 717 0365
GIAC Certified Incident Handler | GIAC WebApplication Penetration Tester
***@citrix.com<mailto:***@citrix.com>


[cid:***@01CD4A37.5451DC00]

Powering mobile workstyles and cloud services





On Sep 17, 2012, at 6:25 PM, Tim Hildred wrote:

Hey all;

I'm running IPA internally to control access to our cloud environment.

I must admit, I do not understand the password requirements. I have had them set to the defaults. I read this:
https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/6/html/Identity_Management_Guide/user-pwdpolicy.html

I have the minimum character classes set to 0. When people use SSH to change their passwords, they get "Based on a dictionary word" for passwords that have nothing to do with dictionary words.

I can't find anywhere in the documentation a break down of what makes an unacceptable versus acceptable password.

Can anyone help me figure out what to tell my users? I think people would get a lot less frustrated if they knew why "C679V375" was "too simple" when the password policy has 0 required classes.

Tim Hildred, RHCE
Content Author II - Engineering Content Services, Red Hat, Inc.
Brisbane, Australia
Email: ***@redhat.com
Internal: 8588287
Mobile: +61 4 666 25242
IRC: thildred

ps: funny exchange with user:
Jul 12 14:12:33 <user1> i feel like im being punked
Jul 12 14:12:40 <user1> it is based on a dictionary word
Jul 12 14:12:43 <user1> it is too short
Jul 12 14:12:49 <user1> is does not have enough unique letters
Jul 12 14:12:51 <user1> etc
Tim Hildred
2012-09-18 02:53:29 UTC
Permalink
JR

I had that line. I commented it out. Thank you.

Now, what do I have to restart?

Tim Hildred, RHCE
Content Author II - Engineering Content Services, Red Hat, Inc.
Brisbane, Australia
Email: ***@redhat.com
Internal: 8588287
Mobile: +61 4 666 25242
IRC: thildred

----- Original Message -----
> From: "JR Aquino" <***@citrix.com>
> To: "Tim Hildred" <***@redhat.com>
> Cc: "freeipa-users" <freeipa-***@redhat.com>
> Sent: Tuesday, September 18, 2012 12:37:48 PM
> Subject: Re: [Freeipa-users] Password requirements too stringent
>
> Tim, please check your /etc/pam.d/system-auth with the password
> block. If you see password requisite pam_cracklib.so, then
> this is why you are having a problem.
>
> $ man pam_cracklib
>
> It is a local security library for enforcing strong password
> practices from the unix cli.
>
> ProTip:
> If you don't need this, you can remove it from pam
> If you want to work around this, set your password from the IPA webui
> or via the cli: "ipa passwd username"
>
> Hope this info helps!
>
> "Keeping your head in the cloud"
> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
> JR Aquino
>
> Senior Information Security Specialist, Technical Operations
> T: +1 805 690 3478 | F: +1 805 879 3730 | M: +1 805 717 0365
> GIAC Certified Incident Handler | GIAC WebApplication Penetration
> Tester
> ***@citrix.com<mailto:***@citrix.com>
>
>
> [cid:***@01CD4A37.5451DC00]
>
> Powering mobile workstyles and cloud services
>
>
>
>
>
> On Sep 17, 2012, at 6:25 PM, Tim Hildred wrote:
>
> Hey all;
>
> I'm running IPA internally to control access to our cloud
> environment.
>
> I must admit, I do not understand the password requirements. I have
> had them set to the defaults. I read this:
> https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/6/html/Identity_Management_Guide/user-pwdpolicy.html
>
> I have the minimum character classes set to 0. When people use SSH to
> change their passwords, they get "Based on a dictionary word" for
> passwords that have nothing to do with dictionary words.
>
> I can't find anywhere in the documentation a break down of what makes
> an unacceptable versus acceptable password.
>
> Can anyone help me figure out what to tell my users? I think people
> would get a lot less frustrated if they knew why "C679V375" was "too
> simple" when the password policy has 0 required classes.
>
> Tim Hildred, RHCE
> Content Author II - Engineering Content Services, Red Hat, Inc.
> Brisbane, Australia
> Email: ***@redhat.com
> Internal: 8588287
> Mobile: +61 4 666 25242
> IRC: thildred
>
> ps: funny exchange with user:
> Jul 12 14:12:33 <user1> i feel like im being punked
> Jul 12 14:12:40 <user1> it is based on a dictionary word
> Jul 12 14:12:43 <user1> it is too short
> Jul 12 14:12:49 <user1> is does not have enough unique letters
> Jul 12 14:12:51 <user1> etc
>
> _______________________________________________
> Freeipa-users mailing list
> Freeipa-***@redhat.com
> https://www.redhat.com/mailman/listinfo/freeipa-users
>
>
JR Aquino
2012-09-18 02:57:49 UTC
Permalink
On Sep 17, 2012, at 7:53 PM, Tim Hildred wrote:

> JR
>
> I had that line. I commented it out. Thank you.
>
> Now, what do I have to restart?

I believe it should take effect in real time, but you may need to test to be sure. If it is still happening, you may need to double check that some other pam cfg doesn't also have it present: $ cd /etc/pam.d/ && grep pam_cracklib *

If you have removed it from everything and it is still giving you the same error, then I would try a reboot... perhaps getty needs to reinitialize or something. But I'd try those steps before a reboot!

;)

> Tim Hildred, RHCE
> Content Author II - Engineering Content Services, Red Hat, Inc.
> Brisbane, Australia
> Email: ***@redhat.com
> Internal: 8588287
> Mobile: +61 4 666 25242
> IRC: thildred
>
> ----- Original Message -----
>> From: "JR Aquino" <***@citrix.com>
>> To: "Tim Hildred" <***@redhat.com>
>> Cc: "freeipa-users" <freeipa-***@redhat.com>
>> Sent: Tuesday, September 18, 2012 12:37:48 PM
>> Subject: Re: [Freeipa-users] Password requirements too stringent
>>
>> Tim, please check your /etc/pam.d/system-auth with the password
>> block. If you see password requisite pam_cracklib.so, then
>> this is why you are having a problem.
>>
>> $ man pam_cracklib
>>
>> It is a local security library for enforcing strong password
>> practices from the unix cli.
>>
>> ProTip:
>> If you don't need this, you can remove it from pam
>> If you want to work around this, set your password from the IPA webui
>> or via the cli: "ipa passwd username"
>>
>> Hope this info helps!
>>
>> "Keeping your head in the cloud"
>> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>> JR Aquino
>>
>> Senior Information Security Specialist, Technical Operations
>> T: +1 805 690 3478 | F: +1 805 879 3730 | M: +1 805 717 0365
>> GIAC Certified Incident Handler | GIAC WebApplication Penetration
>> Tester
>> ***@citrix.com<mailto:***@citrix.com>
>>
>>
>> [cid:***@01CD4A37.5451DC00]
>>
>> Powering mobile workstyles and cloud services
>>
>>
>>
>>
>>
>> On Sep 17, 2012, at 6:25 PM, Tim Hildred wrote:
>>
>> Hey all;
>>
>> I'm running IPA internally to control access to our cloud
>> environment.
>>
>> I must admit, I do not understand the password requirements. I have
>> had them set to the defaults. I read this:
>> https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/6/html/Identity_Management_Guide/user-pwdpolicy.html
>>
>> I have the minimum character classes set to 0. When people use SSH to
>> change their passwords, they get "Based on a dictionary word" for
>> passwords that have nothing to do with dictionary words.
>>
>> I can't find anywhere in the documentation a break down of what makes
>> an unacceptable versus acceptable password.
>>
>> Can anyone help me figure out what to tell my users? I think people
>> would get a lot less frustrated if they knew why "C679V375" was "too
>> simple" when the password policy has 0 required classes.
>>
>> Tim Hildred, RHCE
>> Content Author II - Engineering Content Services, Red Hat, Inc.
>> Brisbane, Australia
>> Email: ***@redhat.com
>> Internal: 8588287
>> Mobile: +61 4 666 25242
>> IRC: thildred
>>
>> ps: funny exchange with user:
>> Jul 12 14:12:33 <user1> i feel like im being punked
>> Jul 12 14:12:40 <user1> it is based on a dictionary word
>> Jul 12 14:12:43 <user1> it is too short
>> Jul 12 14:12:49 <user1> is does not have enough unique letters
>> Jul 12 14:12:51 <user1> etc
>>
>> _______________________________________________
>> Freeipa-users mailing list
>> Freeipa-***@redhat.com
>> https://www.redhat.com/mailman/listinfo/freeipa-users
>>
>>
Jakub Hrozek
2012-09-18 07:29:12 UTC
Permalink
On Tue, Sep 18, 2012 at 02:57:49AM +0000, JR Aquino wrote:
>
> On Sep 17, 2012, at 7:53 PM, Tim Hildred wrote:
>
> > JR
> >
> > I had that line. I commented it out. Thank you.
> >
> > Now, what do I have to restart?
>
> I believe it should take effect in real time, but you may need to test to be sure. If it is still happening, you may need to double check that some other pam cfg doesn't also have it present: $ cd /etc/pam.d/ && grep pam_cracklib *
>
> If you have removed it from everything and it is still giving you the same error, then I would try a reboot... perhaps getty needs to reinitialize or something. But I'd try those steps before a reboot!
>
> ;)
>

Some services, notably the sshd, must be restarted in order to re-read
the PAM config.
Innes, Duncan
2012-09-18 11:05:26 UTC
Permalink
Folks,

Juggling a problem here that perhaps doesn't have a perfect solution.
I'm looking at systems that get re-provisioned by a
Satellite/Spacewalk/Installation method. For full (Free)IPA
integration, we normally delete the old entry from IPA, create a new one
from scratch and set the OTP to match what we put in our post-install
script called by the kickstart file.

Just noticed that I can do the same thing by Unprovisioning the system
via the WebUI and then setting the OTP.

Is there a way to Unprovision a registered host and set a OTP via the
command line? I was looking at 'ipa host-mod --setattr' but not getting
too far with the Unprovisioning aspect.

Duncan Innes | Linux Architect | Virgin Money | +44 1603 215476 | +44
7801 134507 | ***@virginmoney.com



> -----Original Message-----
> From: freeipa-users-***@redhat.com
> [mailto:freeipa-users-***@redhat.com] On Behalf Of JR Aquino
> Sent: 18 September 2012 03:58
> To: Tim Hildred
> Cc: freeipa-users
> Subject: Re: [Freeipa-users] Password requirements too stringent
>
>
> On Sep 17, 2012, at 7:53 PM, Tim Hildred wrote:
>
> > JR
> >
> > I had that line. I commented it out. Thank you.
> >
> > Now, what do I have to restart?
>
> I believe it should take effect in real time, but you may
> need to test to be sure. If it is still happening, you may
> need to double check that some other pam cfg doesn't also
> have it present: $ cd /etc/pam.d/ && grep pam_cracklib *
>
> If you have removed it from everything and it is still giving
> you the same error, then I would try a reboot... perhaps
> getty needs to reinitialize or something. But I'd try those
> steps before a reboot!
>
> ;)
>
> > Tim Hildred, RHCE
> > Content Author II - Engineering Content Services, Red Hat, Inc.
> > Brisbane, Australia
> > Email: ***@redhat.com
> > Internal: 8588287
> > Mobile: +61 4 666 25242
> > IRC: thildred
> >
> > ----- Original Message -----
> >> From: "JR Aquino" <***@citrix.com>
> >> To: "Tim Hildred" <***@redhat.com>
> >> Cc: "freeipa-users" <freeipa-***@redhat.com>
> >> Sent: Tuesday, September 18, 2012 12:37:48 PM
> >> Subject: Re: [Freeipa-users] Password requirements too stringent
> >>
> >> Tim, please check your /etc/pam.d/system-auth with the password
> >> block. If you see password requisite pam_cracklib.so, then
> >> this is why you are having a problem.
> >>
> >> $ man pam_cracklib
> >>
> >> It is a local security library for enforcing strong password
> >> practices from the unix cli.
> >>
> >> ProTip:
> >> If you don't need this, you can remove it from pam If you want to
> >> work around this, set your password from the IPA webui or via the
> >> cli: "ipa passwd username"
> >>
> >> Hope this info helps!
> >>
> >> "Keeping your head in the cloud"
> >> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
> >> JR Aquino
> >>
> >> Senior Information Security Specialist, Technical Operations
> >> T: +1 805 690 3478 | F: +1 805 879 3730 | M: +1 805 717 0365 GIAC
> >> Certified Incident Handler | GIAC WebApplication
> Penetration Tester
> >> ***@citrix.com<mailto:***@citrix.com>
> >>
> >>
> >> [cid:***@01CD4A37.5451DC00]
> >>
> >> Powering mobile workstyles and cloud services
> >>
> >>
> >>
> >>
> >>
> >> On Sep 17, 2012, at 6:25 PM, Tim Hildred wrote:
> >>
> >> Hey all;
> >>
> >> I'm running IPA internally to control access to our cloud
> >> environment.
> >>
> >> I must admit, I do not understand the password
> requirements. I have
> >> had them set to the defaults. I read this:
> >>
> https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Lin
> >> ux/6/html/Identity_Management_Guide/user-pwdpolicy.html
> >>
> >> I have the minimum character classes set to 0. When people
> use SSH to
> >> change their passwords, they get "Based on a dictionary word" for
> >> passwords that have nothing to do with dictionary words.
> >>
> >> I can't find anywhere in the documentation a break down of
> what makes
> >> an unacceptable versus acceptable password.
> >>
> >> Can anyone help me figure out what to tell my users? I
> think people
> >> would get a lot less frustrated if they knew why
> "C679V375" was "too
> >> simple" when the password policy has 0 required classes.
> >>
> >> Tim Hildred, RHCE
> >> Content Author II - Engineering Content Services, Red Hat, Inc.
> >> Brisbane, Australia
> >> Email: ***@redhat.com
> >> Internal: 8588287
> >> Mobile: +61 4 666 25242
> >> IRC: thildred
> >>
> >> ps: funny exchange with user:
> >> Jul 12 14:12:33 <user1> i feel like im being punked Jul 12
> 14:12:40
> >> <user1> it is based on a dictionary word Jul 12 14:12:43
> <user1> it
> >> is too short Jul 12 14:12:49 <user1> is does not have
> enough unique
> >> letters Jul 12 14:12:51 <user1> etc
> >>
> >> _______________________________________________
> >> Freeipa-users mailing list
> >> Freeipa-***@redhat.com
> >> https://www.redhat.com/mailman/listinfo/freeipa-users
> >>
> >>
>
>
> _______________________________________________
> Freeipa-users mailing list
> Freeipa-***@redhat.com
> https://www.redhat.com/mailman/listinfo/freeipa-users
>
> This message has been checked for viruses and spam by the
> Virgin Money email scanning system powered by Messagelabs.
>


Northern Rock plc is part of the Virgin Money group of companies.

This e-mail is intended to be confidential to the recipient. If you receive a copy in error, please inform the sender and then delete this message.

Virgin Money Personal Financial Service Limited is authorised and regulated by the Financial Services Authority. Company no. 3072766.

Virgin Money Unit Trust Managers Limited is authorised and regulated by the Financial Services Authority. Company no. 3000482.

Virgin Money Cards Limited. Introducer appointed representative only of Virgin Money Personal Financial Service Limited. Company no. 4232392.

Virgin Money Management Services Limited. Company no. 3072772.

Virgin Money Holdings (UK) Limited. Company no. 3087587.

Each of the above companies is registered in England and Wales and has its registered office at Discovery House, Whiting Road, Norwich NR4 6EJ.

Northern Rock plc. Authorised and regulated by the Financial Services Authority. Registered in England and Wales (Company no. 6952311) with its registered office at Northern Rock House, Gosforth, Newcastle upon Tyne NE3 4PL.

The above companies use the trading name Virgin Money.
Charlie Derwent
2012-09-18 11:34:20 UTC
Permalink
Hi

I've used "ipa host-disable ${HOST}; ipa host-mod --password=${PASS}
${HOST}" In the past and that seems to work quite well. The ideal for me
would be a situation where the IPA information could persist between
rebuilds.

Cheers,
Charlie
On Tue, Sep 18, 2012 at 12:05 PM, Innes, Duncan <
***@virginmoney.com> wrote:

> Folks,
>
> Juggling a problem here that perhaps doesn't have a perfect solution.
> I'm looking at systems that get re-provisioned by a
> Satellite/Spacewalk/Installation method. For full (Free)IPA
> integration, we normally delete the old entry from IPA, create a new one
> from scratch and set the OTP to match what we put in our post-install
> script called by the kickstart file.
>
> Just noticed that I can do the same thing by Unprovisioning the system
> via the WebUI and then setting the OTP.
>
> Is there a way to Unprovision a registered host and set a OTP via the
> command line? I was looking at 'ipa host-mod --setattr' but not getting
> too far with the Unprovisioning aspect.
>
> Duncan Innes | Linux Architect | Virgin Money | +44 1603 215476 | +44
> 7801 134507 | ***@virginmoney.com
>
>
>
> > -----Original Message-----
> > From: freeipa-users-***@redhat.com
> > [mailto:freeipa-users-***@redhat.com] On Behalf Of JR Aquino
> > Sent: 18 September 2012 03:58
> > To: Tim Hildred
> > Cc: freeipa-users
> > Subject: Re: [Freeipa-users] Password requirements too stringent
> >
> >
> > On Sep 17, 2012, at 7:53 PM, Tim Hildred wrote:
> >
> > > JR
> > >
> > > I had that line. I commented it out. Thank you.
> > >
> > > Now, what do I have to restart?
> >
> > I believe it should take effect in real time, but you may
> > need to test to be sure. If it is still happening, you may
> > need to double check that some other pam cfg doesn't also
> > have it present: $ cd /etc/pam.d/ && grep pam_cracklib *
> >
> > If you have removed it from everything and it is still giving
> > you the same error, then I would try a reboot... perhaps
> > getty needs to reinitialize or something. But I'd try those
> > steps before a reboot!
> >
> > ;)
> >
> > > Tim Hildred, RHCE
> > > Content Author II - Engineering Content Services, Red Hat, Inc.
> > > Brisbane, Australia
> > > Email: ***@redhat.com
> > > Internal: 8588287
> > > Mobile: +61 4 666 25242
> > > IRC: thildred
> > >
> > > ----- Original Message -----
> > >> From: "JR Aquino" <***@citrix.com>
> > >> To: "Tim Hildred" <***@redhat.com>
> > >> Cc: "freeipa-users" <freeipa-***@redhat.com>
> > >> Sent: Tuesday, September 18, 2012 12:37:48 PM
> > >> Subject: Re: [Freeipa-users] Password requirements too stringent
> > >>
> > >> Tim, please check your /etc/pam.d/system-auth with the password
> > >> block. If you see password requisite pam_cracklib.so, then
> > >> this is why you are having a problem.
> > >>
> > >> $ man pam_cracklib
> > >>
> > >> It is a local security library for enforcing strong password
> > >> practices from the unix cli.
> > >>
> > >> ProTip:
> > >> If you don't need this, you can remove it from pam If you want to
> > >> work around this, set your password from the IPA webui or via the
> > >> cli: "ipa passwd username"
> > >>
> > >> Hope this info helps!
> > >>
> > >> "Keeping your head in the cloud"
> > >> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
> > >> JR Aquino
> > >>
> > >> Senior Information Security Specialist, Technical Operations
> > >> T: +1 805 690 3478 | F: +1 805 879 3730 | M: +1 805 717 0365 GIAC
> > >> Certified Incident Handler | GIAC WebApplication
> > Penetration Tester
> > >> ***@citrix.com<mailto:***@citrix.com>
> > >>
> > >>
> > >> [cid:***@01CD4A37.5451DC00]
> > >>
> > >> Powering mobile workstyles and cloud services
> > >>
> > >>
> > >>
> > >>
> > >>
> > >> On Sep 17, 2012, at 6:25 PM, Tim Hildred wrote:
> > >>
> > >> Hey all;
> > >>
> > >> I'm running IPA internally to control access to our cloud
> > >> environment.
> > >>
> > >> I must admit, I do not understand the password
> > requirements. I have
> > >> had them set to the defaults. I read this:
> > >>
> > https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Lin
> > >> ux/6/html/Identity_Management_Guide/user-pwdpolicy.html
> > >>
> > >> I have the minimum character classes set to 0. When people
> > use SSH to
> > >> change their passwords, they get "Based on a dictionary word" for
> > >> passwords that have nothing to do with dictionary words.
> > >>
> > >> I can't find anywhere in the documentation a break down of
> > what makes
> > >> an unacceptable versus acceptable password.
> > >>
> > >> Can anyone help me figure out what to tell my users? I
> > think people
> > >> would get a lot less frustrated if they knew why
> > "C679V375" was "too
> > >> simple" when the password policy has 0 required classes.
> > >>
> > >> Tim Hildred, RHCE
> > >> Content Author II - Engineering Content Services, Red Hat, Inc.
> > >> Brisbane, Australia
> > >> Email: ***@redhat.com
> > >> Internal: 8588287
> > >> Mobile: +61 4 666 25242
> > >> IRC: thildred
> > >>
> > >> ps: funny exchange with user:
> > >> Jul 12 14:12:33 <user1> i feel like im being punked Jul 12
> > 14:12:40
> > >> <user1> it is based on a dictionary word Jul 12 14:12:43
> > <user1> it
> > >> is too short Jul 12 14:12:49 <user1> is does not have
> > enough unique
> > >> letters Jul 12 14:12:51 <user1> etc
> > >>
> > >> _______________________________________________
> > >> Freeipa-users mailing list
> > >> Freeipa-***@redhat.com
> > >> https://www.redhat.com/mailman/listinfo/freeipa-users
> > >>
> > >>
> >
> >
> > _______________________________________________
> > Freeipa-users mailing list
> > Freeipa-***@redhat.com
> > https://www.redhat.com/mailman/listinfo/freeipa-users
> >
> > This message has been checked for viruses and spam by the
> > Virgin Money email scanning system powered by Messagelabs.
> >
>
>
> Northern Rock plc is part of the Virgin Money group of companies.
>
> This e-mail is intended to be confidential to the recipient. If you
> receive a copy in error, please inform the sender and then delete this
> message.
>
> Virgin Money Personal Financial Service Limited is authorised and
> regulated by the Financial Services Authority. Company no. 3072766.
>
> Virgin Money Unit Trust Managers Limited is authorised and regulated by
> the Financial Services Authority. Company no. 3000482.
>
> Virgin Money Cards Limited. Introducer appointed representative only of
> Virgin Money Personal Financial Service Limited. Company no. 4232392.
>
> Virgin Money Management Services Limited. Company no. 3072772.
>
> Virgin Money Holdings (UK) Limited. Company no. 3087587.
>
> Each of the above companies is registered in England and Wales and has its
> registered office at Discovery House, Whiting Road, Norwich NR4 6EJ.
>
> Northern Rock plc. Authorised and regulated by the Financial Services
> Authority. Registered in England and Wales (Company no. 6952311) with its
> registered office at Northern Rock House, Gosforth, Newcastle upon Tyne NE3
> 4PL.
>
> The above companies use the trading name Virgin Money.
>
>
> _______________________________________________
> Freeipa-users mailing list
> Freeipa-***@redhat.com
> https://www.redhat.com/mailman/listinfo/freeipa-users
>
Innes, Duncan
2012-09-18 13:59:42 UTC
Permalink
Thanks,

I stumbled across the same resolution just before I went for lunch.
Found
myself more keen to eat and less keen to let you all know I'd found a
solution.

Not sure IPA could re-use all the information between rebuilds quite as
freely as you want. Unless you backup the IPA certificate etc. before
re-provisioning and then restore the relevant details on rebuild. Would
that be possible?

Finally, appologies for the utter failure to edit the cruft out of my
original
message before sending it.

Cheers

Duncan

> From: Charlie Derwent
> Sent: 18 September 2012 12:34
> To: Innes, Duncan
> Cc: freeipa-users
> Subject: Re: [Freeipa-users] Cmd-line Unprovision & OTP setting for a
host
>
> Hi
>
> I've used "ipa host-disable ${HOST}; ipa host-mod --password=${PASS}
${HOST}"
> In the past and that seems to work quite well. The ideal for me would
be a
> situation where the IPA information could persist between rebuilds.
>
> Cheers,
> Charlie
>
> On Tue, Sep 18, 2012 at 12:05 PM, Innes, Duncan wrote:
>
> > Folks,
> >
> > Juggling a problem here that perhaps doesn't have a perfect
solution.
> > I'm looking at systems that get re-provisioned by a
> > Satellite/Spacewalk/Installation method. For full (Free)IPA
> > integration, we normally delete the old entry from IPA, create a new
one
> > from scratch and set the OTP to match what we put in our
post-install
> > script called by the kickstart file.
> >
> > Just noticed that I can do the same thing by Unprovisioning the
system
> > via the WebUI and then setting the OTP.
> >
> > Is there a way to Unprovision a registered host and set a OTP via
the
> > command line? I was looking at 'ipa host-mod --setattr' but not
getting
> > too far with the Unprovisioning aspect.
> >
> > Duncan Innes | Linux Architect | Virgin Money
> >


Northern Rock plc is part of the Virgin Money group of companies.

This e-mail is intended to be confidential to the recipient. If you receive a copy in error, please inform the sender and then delete this message.

Virgin Money Personal Financial Service Limited is authorised and regulated by the Financial Services Authority. Company no. 3072766.

Virgin Money Unit Trust Managers Limited is authorised and regulated by the Financial Services Authority. Company no. 3000482.

Virgin Money Cards Limited. Introducer appointed representative only of Virgin Money Personal Financial Service Limited. Company no. 4232392.

Virgin Money Management Services Limited. Company no. 3072772.

Virgin Money Holdings (UK) Limited. Company no. 3087587.

Each of the above companies is registered in England and Wales and has its registered office at Discovery House, Whiting Road, Norwich NR4 6EJ.

Northern Rock plc. Authorised and regulated by the Financial Services Authority. Registered in England and Wales (Company no. 6952311) with its registered office at Northern Rock House, Gosforth, Newcastle upon Tyne NE3 4PL.

The above companies use the trading name Virgin Money.
Dmitri Pal
2012-09-18 14:41:46 UTC
Permalink
On 09/18/2012 07:34 AM, Charlie Derwent wrote:
> Hi
>
> I've used "ipa host-disable ${HOST}; ipa host-mod --password=${PASS}
> ${HOST}" In the past and that seems to work quite well. The ideal for
> me would be a situation where the IPA information could persist
> between rebuilds.


Can you please elaborate more?
Between rebuilds of what client or server?
And what information you want to persist: cert, keytab, OTP?

Thanks
Dmitri

>
> Cheers,
> Charlie
> On Tue, Sep 18, 2012 at 12:05 PM, Innes, Duncan
> <***@virginmoney.com <mailto:***@virginmoney.com>>
> wrote:
>
> Folks,
>
> Juggling a problem here that perhaps doesn't have a perfect solution.
> I'm looking at systems that get re-provisioned by a
> Satellite/Spacewalk/Installation method. For full (Free)IPA
> integration, we normally delete the old entry from IPA, create a
> new one
> from scratch and set the OTP to match what we put in our post-install
> script called by the kickstart file.
>
> Just noticed that I can do the same thing by Unprovisioning the system
> via the WebUI and then setting the OTP.
>
> Is there a way to Unprovision a registered host and set a OTP via the
> command line? I was looking at 'ipa host-mod --setattr' but not
> getting
> too far with the Unprovisioning aspect.
>
> Duncan Innes | Linux Architect | Virgin Money | +44 1603 215476
> <tel:%2B44%201603%20215476> | +44
> 7801 134507 | ***@virginmoney.com
> <mailto:***@virginmoney.com>
>
>
>
> > -----Original Message-----
> > From: freeipa-users-***@redhat.com
> <mailto:freeipa-users-***@redhat.com>
> > [mailto:freeipa-users-***@redhat.com
> <mailto:freeipa-users-***@redhat.com>] On Behalf Of JR Aquino
> > Sent: 18 September 2012 03:58
> > To: Tim Hildred
> > Cc: freeipa-users
> > Subject: Re: [Freeipa-users] Password requirements too stringent
> >
> >
> > On Sep 17, 2012, at 7:53 PM, Tim Hildred wrote:
> >
> > > JR
> > >
> > > I had that line. I commented it out. Thank you.
> > >
> > > Now, what do I have to restart?
> >
> > I believe it should take effect in real time, but you may
> > need to test to be sure. If it is still happening, you may
> > need to double check that some other pam cfg doesn't also
> > have it present: $ cd /etc/pam.d/ && grep pam_cracklib *
> >
> > If you have removed it from everything and it is still giving
> > you the same error, then I would try a reboot... perhaps
> > getty needs to reinitialize or something. But I'd try those
> > steps before a reboot!
> >
> > ;)
> >
> > > Tim Hildred, RHCE
> > > Content Author II - Engineering Content Services, Red Hat, Inc.
> > > Brisbane, Australia
> > > Email: ***@redhat.com <mailto:***@redhat.com>
> > > Internal: 8588287
> > > Mobile: +61 4 666 25242 <tel:%2B61%204%20666%2025242>
> > > IRC: thildred
> > >
> > > ----- Original Message -----
> > >> From: "JR Aquino" <***@citrix.com
> <mailto:***@citrix.com>>
> > >> To: "Tim Hildred" <***@redhat.com
> <mailto:***@redhat.com>>
> > >> Cc: "freeipa-users" <freeipa-***@redhat.com
> <mailto:freeipa-***@redhat.com>>
> > >> Sent: Tuesday, September 18, 2012 12:37:48 PM
> > >> Subject: Re: [Freeipa-users] Password requirements too stringent
> > >>
> > >> Tim, please check your /etc/pam.d/system-auth with the password
> > >> block. If you see password requisite pam_cracklib.so,
> then
> > >> this is why you are having a problem.
> > >>
> > >> $ man pam_cracklib
> > >>
> > >> It is a local security library for enforcing strong password
> > >> practices from the unix cli.
> > >>
> > >> ProTip:
> > >> If you don't need this, you can remove it from pam If you want to
> > >> work around this, set your password from the IPA webui or via the
> > >> cli: "ipa passwd username"
> > >>
> > >> Hope this info helps!
> > >>
> > >> "Keeping your head in the cloud"
> > >> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
> > >> JR Aquino
> > >>
> > >> Senior Information Security Specialist, Technical Operations
> > >> T: +1 805 690 3478 <tel:%2B1%20805%20690%203478> | F: +1 805
> 879 3730 <tel:%2B1%20805%20879%203730> | M: +1 805 717 0365
> <tel:%2B1%20805%20717%200365> GIAC
> > >> Certified Incident Handler | GIAC WebApplication
> > Penetration Tester
> > >> ***@citrix.com
> <mailto:***@citrix.com><mailto:***@citrix.com
> <mailto:***@citrix.com>>
> > >>
> > >>
> > >> [cid:***@01CD4A37.5451DC00]
> > >>
> > >> Powering mobile workstyles and cloud services
> > >>
> > >>
> > >>
> > >>
> > >>
> > >> On Sep 17, 2012, at 6:25 PM, Tim Hildred wrote:
> > >>
> > >> Hey all;
> > >>
> > >> I'm running IPA internally to control access to our cloud
> > >> environment.
> > >>
> > >> I must admit, I do not understand the password
> > requirements. I have
> > >> had them set to the defaults. I read this:
> > >>
> >
> https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Lin
> > >> ux/6/html/Identity_Management_Guide/user-pwdpolicy.html
> > >>
> > >> I have the minimum character classes set to 0. When people
> > use SSH to
> > >> change their passwords, they get "Based on a dictionary word" for
> > >> passwords that have nothing to do with dictionary words.
> > >>
> > >> I can't find anywhere in the documentation a break down of
> > what makes
> > >> an unacceptable versus acceptable password.
> > >>
> > >> Can anyone help me figure out what to tell my users? I
> > think people
> > >> would get a lot less frustrated if they knew why
> > "C679V375" was "too
> > >> simple" when the password policy has 0 required classes.
> > >>
> > >> Tim Hildred, RHCE
> > >> Content Author II - Engineering Content Services, Red Hat, Inc.
> > >> Brisbane, Australia
> > >> Email: ***@redhat.com <mailto:***@redhat.com>
> > >> Internal: 8588287
> > >> Mobile: +61 4 666 25242 <tel:%2B61%204%20666%2025242>
> > >> IRC: thildred
> > >>
> > >> ps: funny exchange with user:
> > >> Jul 12 14:12:33 <user1> i feel like im being punked Jul 12
> > 14:12:40
> > >> <user1> it is based on a dictionary word Jul 12 14:12:43
> > <user1> it
> > >> is too short Jul 12 14:12:49 <user1> is does not have
> > enough unique
> > >> letters Jul 12 14:12:51 <user1> etc
> > >>
> > >> _______________________________________________
> > >> Freeipa-users mailing list
> > >> Freeipa-***@redhat.com <mailto:Freeipa-***@redhat.com>
> > >> https://www.redhat.com/mailman/listinfo/freeipa-users
> > >>
> > >>
> >
> >
> > _______________________________________________
> > Freeipa-users mailing list
> > Freeipa-***@redhat.com <mailto:Freeipa-***@redhat.com>
> > https://www.redhat.com/mailman/listinfo/freeipa-users
> >
> > This message has been checked for viruses and spam by the
> > Virgin Money email scanning system powered by Messagelabs.
> >
>
>
> Northern Rock plc is part of the Virgin Money group of companies.
>
> This e-mail is intended to be confidential to the recipient. If
> you receive a copy in error, please inform the sender and then
> delete this message.
>
> Virgin Money Personal Financial Service Limited is authorised and
> regulated by the Financial Services Authority. Company no. 3072766.
>
> Virgin Money Unit Trust Managers Limited is authorised and
> regulated by the Financial Services Authority. Company no. 3000482.
>
> Virgin Money Cards Limited. Introducer appointed representative
> only of Virgin Money Personal Financial Service Limited. Company
> no. 4232392.
>
> Virgin Money Management Services Limited. Company no. 3072772.
>
> Virgin Money Holdings (UK) Limited. Company no. 3087587.
>
> Each of the above companies is registered in England and Wales and
> has its registered office at Discovery House, Whiting Road,
> Norwich NR4 6EJ.
>
> Northern Rock plc. Authorised and regulated by the Financial
> Services Authority. Registered in England and Wales (Company no.
> 6952311) with its registered office at Northern Rock House,
> Gosforth, Newcastle upon Tyne NE3 4PL.
>
> The above companies use the trading name Virgin Money.
>
>
> _______________________________________________
> Freeipa-users mailing list
> Freeipa-***@redhat.com <mailto:Freeipa-***@redhat.com>
> https://www.redhat.com/mailman/listinfo/freeipa-users
>
>
>
>
> _______________________________________________
> Freeipa-users mailing list
> Freeipa-***@redhat.com
> https://www.redhat.com/mailman/listinfo/freeipa-users


--
Thank you,
Dmitri Pal

Sr. Engineering Manager for IdM portfolio
Red Hat Inc.


-------------------------------
Looking to carve out IT costs?
www.redhat.com/carveoutcosts/
Charlie Derwent
2012-12-08 03:15:04 UTC
Permalink
Sorry for the extremely late reply, rebuilds of clients, keytab and
configuration primarily but certs too would be nice.

What we currently do during our provisioning process is disable the host
and reset the password (as previously mentioned) during the kickstart setup
process so the server can successfully enroll (or in the situation I'm
thinking of re-enroll) later on. The problem that causes is when you need
to log onto the server to reboot it but you've just removed your account.
So we have to use a shared local account to log on, limiting the need to do
things like that was the exact reason we installed IPA on our network in
the first place.

So if there was a command like ipa-client-backup or ipa-client-restore that
you could run to generate/restore a gpg file with your clients info we
could safely restore the config after disk had been wiped. Another possibly
simpler option would be being able to reset the OTP without having to
disable the host first, so the first time the IPA server sees a new
ipa-client-install request with the right OTP it automatically disables the
host server side then enrolls the client that made the request. (Or even
simpler if there's any documentation on what files you would need to back
up)

I prefer option 2 :-)

Thanks,
Charlie


On Tue, Sep 18, 2012 at 3:41 PM, Dmitri Pal <***@redhat.com> wrote:

> On 09/18/2012 07:34 AM, Charlie Derwent wrote:
>
> Hi
>
> I've used "ipa host-disable ${HOST}; ipa host-mod --password=${PASS}
> ${HOST}" In the past and that seems to work quite well. The ideal for me
> would be a situation where the IPA information could persist between
> rebuilds.
>
>
>
> Can you please elaborate more?
> Between rebuilds of what client or server?
> And what information you want to persist: cert, keytab, OTP?
>
> Thanks
> Dmitri
>
>
>
> Cheers,
> Charlie
> On Tue, Sep 18, 2012 at 12:05 PM, Innes, Duncan <
> ***@virginmoney.com> wrote:
>
>> Folks,
>>
>> Juggling a problem here that perhaps doesn't have a perfect solution.
>> I'm looking at systems that get re-provisioned by a
>> Satellite/Spacewalk/Installation method. For full (Free)IPA
>> integration, we normally delete the old entry from IPA, create a new one
>> from scratch and set the OTP to match what we put in our post-install
>> script called by the kickstart file.
>>
>> Just noticed that I can do the same thing by Unprovisioning the system
>> via the WebUI and then setting the OTP.
>>
>> Is there a way to Unprovision a registered host and set a OTP via the
>> command line? I was looking at 'ipa host-mod --setattr' but not getting
>> too far with the Unprovisioning aspect.
>>
>> Duncan Innes | Linux Architect | Virgin Money | +44 1603 215476 | +44
>> 7801 134507 | ***@virginmoney.com
>>
>>
>>
>> > -----Original Message-----
>> > From: freeipa-users-***@redhat.com
>> > [mailto:freeipa-users-***@redhat.com] On Behalf Of JR Aquino
>> > Sent: 18 September 2012 03:58
>> > To: Tim Hildred
>> > Cc: freeipa-users
>> > Subject: Re: [Freeipa-users] Password requirements too stringent
>> >
>> >
>> > On Sep 17, 2012, at 7:53 PM, Tim Hildred wrote:
>> >
>> > > JR
>> > >
>> > > I had that line. I commented it out. Thank you.
>> > >
>> > > Now, what do I have to restart?
>> >
>> > I believe it should take effect in real time, but you may
>> > need to test to be sure. If it is still happening, you may
>> > need to double check that some other pam cfg doesn't also
>> > have it present: $ cd /etc/pam.d/ && grep pam_cracklib *
>> >
>> > If you have removed it from everything and it is still giving
>> > you the same error, then I would try a reboot... perhaps
>> > getty needs to reinitialize or something. But I'd try those
>> > steps before a reboot!
>> >
>> > ;)
>> >
>> > > Tim Hildred, RHCE
>> > > Content Author II - Engineering Content Services, Red Hat, Inc.
>> > > Brisbane, Australia
>> > > Email: ***@redhat.com
>> > > Internal: 8588287
>> > > Mobile: +61 4 666 25242 <%2B61%204%20666%2025242>
>> > > IRC: thildred
>> > >
>> > > ----- Original Message -----
>> > >> From: "JR Aquino" <***@citrix.com>
>> > >> To: "Tim Hildred" <***@redhat.com>
>> > >> Cc: "freeipa-users" <freeipa-***@redhat.com>
>> > >> Sent: Tuesday, September 18, 2012 12:37:48 PM
>> > >> Subject: Re: [Freeipa-users] Password requirements too stringent
>> > >>
>> > >> Tim, please check your /etc/pam.d/system-auth with the password
>> > >> block. If you see password requisite pam_cracklib.so, then
>> > >> this is why you are having a problem.
>> > >>
>> > >> $ man pam_cracklib
>> > >>
>> > >> It is a local security library for enforcing strong password
>> > >> practices from the unix cli.
>> > >>
>> > >> ProTip:
>> > >> If you don't need this, you can remove it from pam If you want to
>> > >> work around this, set your password from the IPA webui or via the
>> > >> cli: "ipa passwd username"
>> > >>
>> > >> Hope this info helps!
>> > >>
>> > >> "Keeping your head in the cloud"
>> > >> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>> > >> JR Aquino
>> > >>
>> > >> Senior Information Security Specialist, Technical Operations
>> > >> T: +1 805 690 3478 <%2B1%20805%20690%203478> | F: +1 805 879 3730<%2B1%20805%20879%203730>| M: +1
>> 805 717 0365 <%2B1%20805%20717%200365> GIAC
>> > >> Certified Incident Handler | GIAC WebApplication
>> > Penetration Tester
>> > >> ***@citrix.com<mailto:***@citrix.com>
>> > >>
>> > >>
>> > >> [cid:***@01CD4A37.5451DC00]
>> > >>
>> > >> Powering mobile workstyles and cloud services
>> > >>
>> > >>
>> > >>
>> > >>
>> > >>
>> > >> On Sep 17, 2012, at 6:25 PM, Tim Hildred wrote:
>> > >>
>> > >> Hey all;
>> > >>
>> > >> I'm running IPA internally to control access to our cloud
>> > >> environment.
>> > >>
>> > >> I must admit, I do not understand the password
>> > requirements. I have
>> > >> had them set to the defaults. I read this:
>> > >>
>> > https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Lin
>> > >> ux/6/html/Identity_Management_Guide/user-pwdpolicy.html
>> > >>
>> > >> I have the minimum character classes set to 0. When people
>> > use SSH to
>> > >> change their passwords, they get "Based on a dictionary word" for
>> > >> passwords that have nothing to do with dictionary words.
>> > >>
>> > >> I can't find anywhere in the documentation a break down of
>> > what makes
>> > >> an unacceptable versus acceptable password.
>> > >>
>> > >> Can anyone help me figure out what to tell my users? I
>> > think people
>> > >> would get a lot less frustrated if they knew why
>> > "C679V375" was "too
>> > >> simple" when the password policy has 0 required classes.
>> > >>
>> > >> Tim Hildred, RHCE
>> > >> Content Author II - Engineering Content Services, Red Hat, Inc.
>> > >> Brisbane, Australia
>> > >> Email: ***@redhat.com
>> > >> Internal: 8588287
>> > >> Mobile: +61 4 666 25242 <%2B61%204%20666%2025242>
>> > >> IRC: thildred
>> > >>
>> > >> ps: funny exchange with user:
>> > >> Jul 12 14:12:33 <user1> i feel like im being punked Jul 12
>> > 14:12:40
>> > >> <user1> it is based on a dictionary word Jul 12 14:12:43
>> > <user1> it
>> > >> is too short Jul 12 14:12:49 <user1> is does not have
>> > enough unique
>> > >> letters Jul 12 14:12:51 <user1> etc
>> > >>
>> > >> _______________________________________________
>> > >> Freeipa-users mailing list
>> > >> Freeipa-***@redhat.com
>> > >> https://www.redhat.com/mailman/listinfo/freeipa-users
>> > >>
>> > >>
>> >
>> >
>> > _______________________________________________
>> > Freeipa-users mailing list
>> > Freeipa-***@redhat.com
>> > https://www.redhat.com/mailman/listinfo/freeipa-users
>> >
>> > This message has been checked for viruses and spam by the
>> > Virgin Money email scanning system powered by Messagelabs.
>> >
>>
>>
>> Northern Rock plc is part of the Virgin Money group of companies.
>>
>> This e-mail is intended to be confidential to the recipient. If you
>> receive a copy in error, please inform the sender and then delete this
>> message.
>>
>> Virgin Money Personal Financial Service Limited is authorised and
>> regulated by the Financial Services Authority. Company no. 3072766.
>>
>> Virgin Money Unit Trust Managers Limited is authorised and regulated by
>> the Financial Services Authority. Company no. 3000482.
>>
>> Virgin Money Cards Limited. Introducer appointed representative only of
>> Virgin Money Personal Financial Service Limited. Company no. 4232392.
>>
>> Virgin Money Management Services Limited. Company no. 3072772.
>>
>> Virgin Money Holdings (UK) Limited. Company no. 3087587.
>>
>> Each of the above companies is registered in England and Wales and has
>> its registered office at Discovery House, Whiting Road, Norwich NR4 6EJ.
>>
>> Northern Rock plc. Authorised and regulated by the Financial Services
>> Authority. Registered in England and Wales (Company no. 6952311) with its
>> registered office at Northern Rock House, Gosforth, Newcastle upon Tyne NE3
>> 4PL.
>>
>> The above companies use the trading name Virgin Money.
>>
>>
>> _______________________________________________
>> Freeipa-users mailing list
>> Freeipa-***@redhat.com
>> https://www.redhat.com/mailman/listinfo/freeipa-users
>>
>
>
>
> _______________________________________________
> Freeipa-users mailing listFreeipa-***@redhat.comhttps://www.redhat.com/mailman/listinfo/freeipa-users
>
>
>
> --
> Thank you,
> Dmitri Pal
>
> Sr. Engineering Manager for IdM portfolio
> Red Hat Inc.
>
>
> -------------------------------
> Looking to carve out IT costs?www.redhat.com/carveoutcosts/
>
>
> _______________________________________________
> Freeipa-users mailing list
> Freeipa-***@redhat.com
> https://www.redhat.com/mailman/listinfo/freeipa-users
>
Dmitri Pal
2012-12-10 13:57:24 UTC
Permalink
On 12/07/2012 10:15 PM, Charlie Derwent wrote:
> Sorry for the extremely late reply, rebuilds of clients, keytab and
> configuration primarily but certs too would be nice.
>
> What we currently do during our provisioning process is disable the
> host and reset the password (as previously mentioned) during the
> kickstart setup process so the server can successfully enroll (or in
> the situation I'm thinking of re-enroll) later on. The problem that
> causes is when you need to log onto the server to reboot it but you've
> just removed your account. So we have to use a shared local account
> to log on, limiting the need to do things like that was the exact
> reason we installed IPA on our network in the first place.
>
> So if there was a command like ipa-client-backup or ipa-client-restore
> that you could run to generate/restore a gpg file with your clients
> info we could safely restore the config after disk had been wiped.
> Another possibly simpler option would be being able to reset the OTP
> without having to disable the host first, so the first time the IPA
> server sees a new ipa-client-install request with the right OTP it
> automatically disables the host server side then enrolls the client
> that made the request. (Or even simpler if there's any documentation
> on what files you would need to back up)
>
> I prefer option 2 :-)


I am trying to understand the sequence of the operations here.
You have a client that you need to periodically re-install or re-deploy it.

Before you re-install you need to set the OTP (because it is OTP)
anyways. This means you need some software to run a command against IPA.
OK so at that moment you can remove the host and then re-create it again
in IPA and set the OTP there.
On the client side you run ipa-client-install providing OTP and it
creates the host keytab and does all configuration steps.
After that you can log with any user account you have into that client
(unless you prohibited this user from logging in via HBAC).

It seems that what you are asking above is the ability to set OTP
without disabling the host...
Is the problem with sequencing? Are you saying that while the client is
still working you already need to prepare it for the next re-enrollment
without disrupting current operations?
I can understand that.
But what prevents you from doing operations in sequence: uninstall
client, recreate the host and OTP on the server side, re-install the client?



>
> Thanks,
> Charlie
>
>
> On Tue, Sep 18, 2012 at 3:41 PM, Dmitri Pal <***@redhat.com
> <mailto:***@redhat.com>> wrote:
>
> On 09/18/2012 07:34 AM, Charlie Derwent wrote:
>> Hi
>>
>> I've used "ipa host-disable ${HOST}; ipa host-mod
>> --password=${PASS} ${HOST}" In the past and that seems to work
>> quite well. The ideal for me would be a situation where the IPA
>> information could persist between rebuilds.
>
>
> Can you please elaborate more?
> Between rebuilds of what client or server?
> And what information you want to persist: cert, keytab, OTP?
>
> Thanks
> Dmitri
>
>
>>
>> Cheers,
>> Charlie
>> On Tue, Sep 18, 2012 at 12:05 PM, Innes, Duncan
>> <***@virginmoney.com
>> <mailto:***@virginmoney.com>> wrote:
>>
>> Folks,
>>
>> Juggling a problem here that perhaps doesn't have a perfect
>> solution.
>> I'm looking at systems that get re-provisioned by a
>> Satellite/Spacewalk/Installation method. For full (Free)IPA
>> integration, we normally delete the old entry from IPA,
>> create a new one
>> from scratch and set the OTP to match what we put in our
>> post-install
>> script called by the kickstart file.
>>
>> Just noticed that I can do the same thing by Unprovisioning
>> the system
>> via the WebUI and then setting the OTP.
>>
>> Is there a way to Unprovision a registered host and set a OTP
>> via the
>> command line? I was looking at 'ipa host-mod --setattr' but
>> not getting
>> too far with the Unprovisioning aspect.
>>
>> Duncan Innes | Linux Architect | Virgin Money | +44 1603
>> 215476 <tel:%2B44%201603%20215476> | +44
>> 7801 134507 | ***@virginmoney.com
>> <mailto:***@virginmoney.com>
>>
>>
>>
>> > -----Original Message-----
>> > From: freeipa-users-***@redhat.com
>> <mailto:freeipa-users-***@redhat.com>
>> > [mailto:freeipa-users-***@redhat.com
>> <mailto:freeipa-users-***@redhat.com>] On Behalf Of JR Aquino
>> > Sent: 18 September 2012 03:58
>> > To: Tim Hildred
>> > Cc: freeipa-users
>> > Subject: Re: [Freeipa-users] Password requirements too
>> stringent
>> >
>> >
>> > On Sep 17, 2012, at 7:53 PM, Tim Hildred wrote:
>> >
>> > > JR
>> > >
>> > > I had that line. I commented it out. Thank you.
>> > >
>> > > Now, what do I have to restart?
>> >
>> > I believe it should take effect in real time, but you may
>> > need to test to be sure. If it is still happening, you may
>> > need to double check that some other pam cfg doesn't also
>> > have it present: $ cd /etc/pam.d/ && grep pam_cracklib *
>> >
>> > If you have removed it from everything and it is still giving
>> > you the same error, then I would try a reboot... perhaps
>> > getty needs to reinitialize or something. But I'd try those
>> > steps before a reboot!
>> >
>> > ;)
>> >
>> > > Tim Hildred, RHCE
>> > > Content Author II - Engineering Content Services, Red
>> Hat, Inc.
>> > > Brisbane, Australia
>> > > Email: ***@redhat.com <mailto:***@redhat.com>
>> > > Internal: 8588287
>> > > Mobile: +61 4 666 25242 <tel:%2B61%204%20666%2025242>
>> > > IRC: thildred
>> > >
>> > > ----- Original Message -----
>> > >> From: "JR Aquino" <***@citrix.com
>> <mailto:***@citrix.com>>
>> > >> To: "Tim Hildred" <***@redhat.com
>> <mailto:***@redhat.com>>
>> > >> Cc: "freeipa-users" <freeipa-***@redhat.com
>> <mailto:freeipa-***@redhat.com>>
>> > >> Sent: Tuesday, September 18, 2012 12:37:48 PM
>> > >> Subject: Re: [Freeipa-users] Password requirements too
>> stringent
>> > >>
>> > >> Tim, please check your /etc/pam.d/system-auth with the
>> password
>> > >> block. If you see password requisite
>> pam_cracklib.so, then
>> > >> this is why you are having a problem.
>> > >>
>> > >> $ man pam_cracklib
>> > >>
>> > >> It is a local security library for enforcing strong password
>> > >> practices from the unix cli.
>> > >>
>> > >> ProTip:
>> > >> If you don't need this, you can remove it from pam If
>> you want to
>> > >> work around this, set your password from the IPA webui
>> or via the
>> > >> cli: "ipa passwd username"
>> > >>
>> > >> Hope this info helps!
>> > >>
>> > >> "Keeping your head in the cloud"
>> > >> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>> > >> JR Aquino
>> > >>
>> > >> Senior Information Security Specialist, Technical Operations
>> > >> T: +1 805 690 3478 <tel:%2B1%20805%20690%203478> | F: +1
>> 805 879 3730 <tel:%2B1%20805%20879%203730> | M: +1 805 717
>> 0365 <tel:%2B1%20805%20717%200365> GIAC
>> > >> Certified Incident Handler | GIAC WebApplication
>> > Penetration Tester
>> > >> ***@citrix.com
>> <mailto:***@citrix.com><mailto:***@citrix.com
>> <mailto:***@citrix.com>>
>> > >>
>> > >>
>> > >> [cid:***@01CD4A37.5451DC00]
>> > >>
>> > >> Powering mobile workstyles and cloud services
>> > >>
>> > >>
>> > >>
>> > >>
>> > >>
>> > >> On Sep 17, 2012, at 6:25 PM, Tim Hildred wrote:
>> > >>
>> > >> Hey all;
>> > >>
>> > >> I'm running IPA internally to control access to our cloud
>> > >> environment.
>> > >>
>> > >> I must admit, I do not understand the password
>> > requirements. I have
>> > >> had them set to the defaults. I read this:
>> > >>
>> >
>> https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Lin
>> > >> ux/6/html/Identity_Management_Guide/user-pwdpolicy.html
>> > >>
>> > >> I have the minimum character classes set to 0. When people
>> > use SSH to
>> > >> change their passwords, they get "Based on a dictionary
>> word" for
>> > >> passwords that have nothing to do with dictionary words.
>> > >>
>> > >> I can't find anywhere in the documentation a break down of
>> > what makes
>> > >> an unacceptable versus acceptable password.
>> > >>
>> > >> Can anyone help me figure out what to tell my users? I
>> > think people
>> > >> would get a lot less frustrated if they knew why
>> > "C679V375" was "too
>> > >> simple" when the password policy has 0 required classes.
>> > >>
>> > >> Tim Hildred, RHCE
>> > >> Content Author II - Engineering Content Services, Red
>> Hat, Inc.
>> > >> Brisbane, Australia
>> > >> Email: ***@redhat.com <mailto:***@redhat.com>
>> > >> Internal: 8588287
>> > >> Mobile: +61 4 666 25242 <tel:%2B61%204%20666%2025242>
>> > >> IRC: thildred
>> > >>
>> > >> ps: funny exchange with user:
>> > >> Jul 12 14:12:33 <user1> i feel like im being punked Jul 12
>> > 14:12:40
>> > >> <user1> it is based on a dictionary word Jul 12 14:12:43
>> > <user1> it
>> > >> is too short Jul 12 14:12:49 <user1> is does not have
>> > enough unique
>> > >> letters Jul 12 14:12:51 <user1> etc
>> > >>
>> > >> _______________________________________________
>> > >> Freeipa-users mailing list
>> > >> Freeipa-***@redhat.com <mailto:Freeipa-***@redhat.com>
>> > >> https://www.redhat.com/mailman/listinfo/freeipa-users
>> > >>
>> > >>
>> >
>> >
>> > _______________________________________________
>> > Freeipa-users mailing list
>> > Freeipa-***@redhat.com <mailto:Freeipa-***@redhat.com>
>> > https://www.redhat.com/mailman/listinfo/freeipa-users
>> >
>> > This message has been checked for viruses and spam by the
>> > Virgin Money email scanning system powered by Messagelabs.
>> >
>>
>>
>> Northern Rock plc is part of the Virgin Money group of companies.
>>
>> This e-mail is intended to be confidential to the recipient.
>> If you receive a copy in error, please inform the sender and
>> then delete this message.
>>
>> Virgin Money Personal Financial Service Limited is authorised
>> and regulated by the Financial Services Authority. Company
>> no. 3072766.
>>
>> Virgin Money Unit Trust Managers Limited is authorised and
>> regulated by the Financial Services Authority. Company no.
>> 3000482.
>>
>> Virgin Money Cards Limited. Introducer appointed
>> representative only of Virgin Money Personal Financial
>> Service Limited. Company no. 4232392.
>>
>> Virgin Money Management Services Limited. Company no. 3072772.
>>
>> Virgin Money Holdings (UK) Limited. Company no. 3087587.
>>
>> Each of the above companies is registered in England and
>> Wales and has its registered office at Discovery House,
>> Whiting Road, Norwich NR4 6EJ.
>>
>> Northern Rock plc. Authorised and regulated by the Financial
>> Services Authority. Registered in England and Wales (Company
>> no. 6952311) with its registered office at Northern Rock
>> House, Gosforth, Newcastle upon Tyne NE3 4PL.
>>
>> The above companies use the trading name Virgin Money.
>>
>>
>> _______________________________________________
>> Freeipa-users mailing list
>> Freeipa-***@redhat.com <mailto:Freeipa-***@redhat.com>
>> https://www.redhat.com/mailman/listinfo/freeipa-users
>>
>>
>>
>>
>> _______________________________________________
>> Freeipa-users mailing list
>> Freeipa-***@redhat.com <mailto:Freeipa-***@redhat.com>
>> https://www.redhat.com/mailman/listinfo/freeipa-users
>
>
> --
> Thank you,
> Dmitri Pal
>
> Sr. Engineering Manager for IdM portfolio
> Red Hat Inc.
>
>
> -------------------------------
> Looking to carve out IT costs?
> www.redhat.com/carveoutcosts/ <http://www.redhat.com/carveoutcosts/>
>
>
>
> _______________________________________________
> Freeipa-users mailing list
> Freeipa-***@redhat.com <mailto:Freeipa-***@redhat.com>
> https://www.redhat.com/mailman/listinfo/freeipa-users
>
>


--
Thank you,
Dmitri Pal

Sr. Engineering Manager for IdM portfolio
Red Hat Inc.


-------------------------------
Looking to carve out IT costs?
www.redhat.com/carveoutcosts/
Charlie Derwent
2013-01-12 20:46:13 UTC
Permalink
Again apologies for the late reply, I've just discovered a new issue
regarding this but I'll answer the original question before asking a
new one. Yes being able to set the OTP without disabling the host is one of
the ways we could solve this problem and yes the longer we can keep a
server enrolled the better.

The reason why it would be hard to change the order to something similar to
what you described above is due to the batch nature of kickstarting
servers. Your new sequence "uninstall client, recreate the host and OTP on
the server side, re-install the client" effectively translates to "log on
to the client but don't do anything yet, log onto the provisioning server
and recreate the host and set the OTP, return to your client session
and reboot it thus starting the automated provisioning process" which
doesn't work very well when trying to provision multiple servers or
automating things.

The other option of being able to backup and restore the config in a clean
way is still a viable option as far as I'm concerned. I just thought the
OTP route would be easier to implement. I just noticed someone else asked a
similar question which prompted me to trawl back through my e-mails to find
this thread.

The other issue that affects automated provisioning is we have just
upgraded from IPA 2.1.3 to 2.2.0 and found that OTP password reuse has been
disabled. Is there any way around this as it has broken our automated build
process?

Regards,
Charlie




On Mon, Dec 10, 2012 at 1:57 PM, Dmitri Pal <***@redhat.com> wrote:

> On 12/07/2012 10:15 PM, Charlie Derwent wrote:
>
> Sorry for the extremely late reply, rebuilds of clients, keytab and
> configuration primarily but certs too would be nice.
>
> What we currently do during our provisioning process is disable the host
> and reset the password (as previously mentioned) during the kickstart setup
> process so the server can successfully enroll (or in the situation I'm
> thinking of re-enroll) later on. The problem that causes is when you need
> to log onto the server to reboot it but you've just removed your account.
> So we have to use a shared local account to log on, limiting the need to do
> things like that was the exact reason we installed IPA on our network in
> the first place.
>
> So if there was a command like ipa-client-backup or ipa-client-restore
> that you could run to generate/restore a gpg file with your clients info we
> could safely restore the config after disk had been wiped. Another possibly
> simpler option would be being able to reset the OTP without having to
> disable the host first, so the first time the IPA server sees a new
> ipa-client-install request with the right OTP it automatically disables the
> host server side then enrolls the client that made the request. (Or even
> simpler if there's any documentation on what files you would need to back
> up)
>
> I prefer option 2 :-)
>
>
>
> I am trying to understand the sequence of the operations here.
> You have a client that you need to periodically re-install or re-deploy it.
>
> Before you re-install you need to set the OTP (because it is OTP) anyways.
> This means you need some software to run a command against IPA.
> OK so at that moment you can remove the host and then re-create it again
> in IPA and set the OTP there.
> On the client side you run ipa-client-install providing OTP and it creates
> the host keytab and does all configuration steps.
> After that you can log with any user account you have into that client
> (unless you prohibited this user from logging in via HBAC).
>
> It seems that what you are asking above is the ability to set OTP without
> disabling the host...
> Is the problem with sequencing? Are you saying that while the client is
> still working you already need to prepare it for the next re-enrollment
> without disrupting current operations?
> I can understand that.
> But what prevents you from doing operations in sequence: uninstall client,
> recreate the host and OTP on the server side, re-install the client?
>
>
>
>
>
> Thanks,
> Charlie
>
>
> On Tue, Sep 18, 2012 at 3:41 PM, Dmitri Pal <***@redhat.com> wrote:
>
>> On 09/18/2012 07:34 AM, Charlie Derwent wrote:
>>
>> Hi
>>
>> I've used "ipa host-disable ${HOST}; ipa host-mod --password=${PASS}
>> ${HOST}" In the past and that seems to work quite well. The ideal for me
>> would be a situation where the IPA information could persist between
>> rebuilds.
>>
>>
>>
>> Can you please elaborate more?
>> Between rebuilds of what client or server?
>> And what information you want to persist: cert, keytab, OTP?
>>
>> Thanks
>> Dmitri
>>
>>
>>
>> Cheers,
>> Charlie
>> On Tue, Sep 18, 2012 at 12:05 PM, Innes, Duncan <
>> ***@virginmoney.com> wrote:
>>
>>> Folks,
>>>
>>> Juggling a problem here that perhaps doesn't have a perfect solution.
>>> I'm looking at systems that get re-provisioned by a
>>> Satellite/Spacewalk/Installation method. For full (Free)IPA
>>> integration, we normally delete the old entry from IPA, create a new one
>>> from scratch and set the OTP to match what we put in our post-install
>>> script called by the kickstart file.
>>>
>>> Just noticed that I can do the same thing by Unprovisioning the system
>>> via the WebUI and then setting the OTP.
>>>
>>> Is there a way to Unprovision a registered host and set a OTP via the
>>> command line? I was looking at 'ipa host-mod --setattr' but not getting
>>> too far with the Unprovisioning aspect.
>>>
>>> Duncan Innes | Linux Architect | Virgin Money | +44 1603 215476<%2B44%201603%20215476>| +44
>>> 7801 134507 | ***@virginmoney.com
>>>
>>>
>>>
>>> > -----Original Message-----
>>> > From: freeipa-users-***@redhat.com
>>> > [mailto:freeipa-users-***@redhat.com] On Behalf Of JR Aquino
>>> > Sent: 18 September 2012 03:58
>>> > To: Tim Hildred
>>> > Cc: freeipa-users
>>> > Subject: Re: [Freeipa-users] Password requirements too stringent
>>> >
>>> >
>>> > On Sep 17, 2012, at 7:53 PM, Tim Hildred wrote:
>>> >
>>> > > JR
>>> > >
>>> > > I had that line. I commented it out. Thank you.
>>> > >
>>> > > Now, what do I have to restart?
>>> >
>>> > I believe it should take effect in real time, but you may
>>> > need to test to be sure. If it is still happening, you may
>>> > need to double check that some other pam cfg doesn't also
>>> > have it present: $ cd /etc/pam.d/ && grep pam_cracklib *
>>> >
>>> > If you have removed it from everything and it is still giving
>>> > you the same error, then I would try a reboot... perhaps
>>> > getty needs to reinitialize or something. But I'd try those
>>> > steps before a reboot!
>>> >
>>> > ;)
>>> >
>>> > > Tim Hildred, RHCE
>>> > > Content Author II - Engineering Content Services, Red Hat, Inc.
>>> > > Brisbane, Australia
>>> > > Email: ***@redhat.com
>>> > > Internal: 8588287
>>> > > Mobile: +61 4 666 25242 <%2B61%204%20666%2025242>
>>> > > IRC: thildred
>>> > >
>>> > > ----- Original Message -----
>>> > >> From: "JR Aquino" <***@citrix.com>
>>> > >> To: "Tim Hildred" <***@redhat.com>
>>> > >> Cc: "freeipa-users" <freeipa-***@redhat.com>
>>> > >> Sent: Tuesday, September 18, 2012 12:37:48 PM
>>> > >> Subject: Re: [Freeipa-users] Password requirements too stringent
>>> > >>
>>> > >> Tim, please check your /etc/pam.d/system-auth with the password
>>> > >> block. If you see password requisite pam_cracklib.so, then
>>> > >> this is why you are having a problem.
>>> > >>
>>> > >> $ man pam_cracklib
>>> > >>
>>> > >> It is a local security library for enforcing strong password
>>> > >> practices from the unix cli.
>>> > >>
>>> > >> ProTip:
>>> > >> If you don't need this, you can remove it from pam If you want to
>>> > >> work around this, set your password from the IPA webui or via the
>>> > >> cli: "ipa passwd username"
>>> > >>
>>> > >> Hope this info helps!
>>> > >>
>>> > >> "Keeping your head in the cloud"
>>> > >> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>>> > >> JR Aquino
>>> > >>
>>> > >> Senior Information Security Specialist, Technical Operations
>>> > >> T: +1 805 690 3478 <%2B1%20805%20690%203478> | F: +1 805 879 3730<%2B1%20805%20879%203730>| M: +1
>>> 805 717 0365 <%2B1%20805%20717%200365> GIAC
>>> > >> Certified Incident Handler | GIAC WebApplication
>>> > Penetration Tester
>>> > >> ***@citrix.com<mailto:***@citrix.com>
>>> > >>
>>> > >>
>>> > >> [cid:***@01CD4A37.5451DC00]
>>> > >>
>>> > >> Powering mobile workstyles and cloud services
>>> > >>
>>> > >>
>>> > >>
>>> > >>
>>> > >>
>>> > >> On Sep 17, 2012, at 6:25 PM, Tim Hildred wrote:
>>> > >>
>>> > >> Hey all;
>>> > >>
>>> > >> I'm running IPA internally to control access to our cloud
>>> > >> environment.
>>> > >>
>>> > >> I must admit, I do not understand the password
>>> > requirements. I have
>>> > >> had them set to the defaults. I read this:
>>> > >>
>>> > https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Lin
>>> > >> ux/6/html/Identity_Management_Guide/user-pwdpolicy.html
>>> > >>
>>> > >> I have the minimum character classes set to 0. When people
>>> > use SSH to
>>> > >> change their passwords, they get "Based on a dictionary word" for
>>> > >> passwords that have nothing to do with dictionary words.
>>> > >>
>>> > >> I can't find anywhere in the documentation a break down of
>>> > what makes
>>> > >> an unacceptable versus acceptable password.
>>> > >>
>>> > >> Can anyone help me figure out what to tell my users? I
>>> > think people
>>> > >> would get a lot less frustrated if they knew why
>>> > "C679V375" was "too
>>> > >> simple" when the password policy has 0 required classes.
>>> > >>
>>> > >> Tim Hildred, RHCE
>>> > >> Content Author II - Engineering Content Services, Red Hat, Inc.
>>> > >> Brisbane, Australia
>>> > >> Email: ***@redhat.com
>>> > >> Internal: 8588287
>>> > >> Mobile: +61 4 666 25242 <%2B61%204%20666%2025242>
>>> > >> IRC: thildred
>>> > >>
>>> > >> ps: funny exchange with user:
>>> > >> Jul 12 14:12:33 <user1> i feel like im being punked Jul 12
>>> > 14:12:40
>>> > >> <user1> it is based on a dictionary word Jul 12 14:12:43
>>> > <user1> it
>>> > >> is too short Jul 12 14:12:49 <user1> is does not have
>>> > enough unique
>>> > >> letters Jul 12 14:12:51 <user1> etc
>>> > >>
>>> > >> _______________________________________________
>>> > >> Freeipa-users mailing list
>>> > >> Freeipa-***@redhat.com
>>> > >> https://www.redhat.com/mailman/listinfo/freeipa-users
>>> > >>
>>> > >>
>>> >
>>> >
>>> > _______________________________________________
>>> > Freeipa-users mailing list
>>> > Freeipa-***@redhat.com
>>> > https://www.redhat.com/mailman/listinfo/freeipa-users
>>> >
>>> > This message has been checked for viruses and spam by the
>>> > Virgin Money email scanning system powered by Messagelabs.
>>> >
>>>
>>>
>>> Northern Rock plc is part of the Virgin Money group of companies.
>>>
>>> This e-mail is intended to be confidential to the recipient. If you
>>> receive a copy in error, please inform the sender and then delete this
>>> message.
>>>
>>> Virgin Money Personal Financial Service Limited is authorised and
>>> regulated by the Financial Services Authority. Company no. 3072766.
>>>
>>> Virgin Money Unit Trust Managers Limited is authorised and regulated by
>>> the Financial Services Authority. Company no. 3000482.
>>>
>>> Virgin Money Cards Limited. Introducer appointed representative only of
>>> Virgin Money Personal Financial Service Limited. Company no. 4232392.
>>>
>>> Virgin Money Management Services Limited. Company no. 3072772.
>>>
>>> Virgin Money Holdings (UK) Limited. Company no. 3087587.
>>>
>>> Each of the above companies is registered in England and Wales and has
>>> its registered office at Discovery House, Whiting Road, Norwich NR4 6EJ.
>>>
>>> Northern Rock plc. Authorised and regulated by the Financial Services
>>> Authority. Registered in England and Wales (Company no. 6952311) with its
>>> registered office at Northern Rock House, Gosforth, Newcastle upon Tyne NE3
>>> 4PL.
>>>
>>> The above companies use the trading name Virgin Money.
>>>
>>>
>>> _______________________________________________
>>> Freeipa-users mailing list
>>> Freeipa-***@redhat.com
>>> https://www.redhat.com/mailman/listinfo/freeipa-users
>>>
>>
>>
>>
>> _______________________________________________
>> Freeipa-users mailing listFreeipa-***@redhat.comhttps://www.redhat.com/mailman/listinfo/freeipa-users
>>
>>
>>
>> --
>> Thank you,
>> Dmitri Pal
>>
>> Sr. Engineering Manager for IdM portfolio
>> Red Hat Inc.
>>
>>
>> -------------------------------
>> Looking to carve out IT costs?www.redhat.com/carveoutcosts/
>>
>>
>> _______________________________________________
>> Freeipa-users mailing list
>> Freeipa-***@redhat.com
>> https://www.redhat.com/mailman/listinfo/freeipa-users
>>
>
>
>
> --
> Thank you,
> Dmitri Pal
>
> Sr. Engineering Manager for IdM portfolio
> Red Hat Inc.
>
>
> -------------------------------
> Looking to carve out IT costs?www.redhat.com/carveoutcosts/
>
>
Dmitri Pal
2013-01-12 21:24:19 UTC
Permalink
On 01/12/2013 03:46 PM, Charlie Derwent wrote:
> Again apologies for the late reply, I've just discovered a new issue
> regarding this but I'll answer the original question before asking a
> new one. Yes being able to set the OTP without disabling the host is
> one of the ways we could solve this problem and yes the longer we can
> keep a server enrolled the better.
>

Can you please file an RFE about it?
https://fedorahosted.org/freeipa/newticket


> The reason why it would be hard to change the order to something
> similar to what you described above is due to the batch nature of
> kickstarting servers. Your new sequence "uninstall client, recreate
> the host and OTP on the server side, re-install the client"
> effectively translates to "log on to the client but don't do anything
> yet, log onto the provisioning server and recreate the host and set
> the OTP, return to your client session and reboot it thus starting the
> automated provisioning process" which doesn't work very well when
> trying to provision multiple servers or automating things.

There might be some problems with our understanding of how bulk
provisioning works.
I assume (and might be wrongly) that there is a reasonable amount of
time between the moment the client is uninstalled and the moment the
client is re-provisioned again. If this is not the case then in fact
there is a problem as you describe.
But what is the reason for recycling the systems like that? What is the
use case? How common it is?
I think JR solved this by redeploying the systems with different name
and using auto member plugin to automatically place the hosts into the
right groups.
Would that approach work for you?

>
> The other option of being able to backup and restore the config in a
> clean way is still a viable option as far as I'm concerned. I just
> thought the OTP route would be easier to implement. I just noticed
> someone else asked a similar question which prompted me to trawl back
> through my e-mails to find this thread.
>
> The other issue that affects automated provisioning is we have just
> upgraded from IPA 2.1.3 to 2.2.0 and found that OTP password reuse has
> been disabled. Is there any way around this as it has broken our
> automated build process?

Can you file a bug about it? https://fedorahosted.org/freeipa/newticket
That would be the fastest way for us to react.

>
> Regards,
> Charlie
>
>
>
>
> On Mon, Dec 10, 2012 at 1:57 PM, Dmitri Pal <***@redhat.com
> <mailto:***@redhat.com>> wrote:
>
> On 12/07/2012 10:15 PM, Charlie Derwent wrote:
>> Sorry for the extremely late reply, rebuilds of clients, keytab
>> and configuration primarily but certs too would be nice.
>>
>> What we currently do during our provisioning process is disable
>> the host and reset the password (as previously mentioned) during
>> the kickstart setup process so the server can successfully enroll
>> (or in the situation I'm thinking of re-enroll) later on. The
>> problem that causes is when you need to log onto the server
>> to reboot it but you've just removed your account. So we have to
>> use a shared local account to log on, limiting the need to do
>> things like that was the exact reason we installed IPA on our
>> network in the first place.
>>
>> So if there was a command like ipa-client-backup or
>> ipa-client-restore that you could run to generate/restore a gpg
>> file with your clients info we could safely restore the config
>> after disk had been wiped. Another possibly simpler option would
>> be being able to reset the OTP without having to disable the host
>> first, so the first time the IPA server sees a new
>> ipa-client-install request with the right OTP it automatically
>> disables the host server side then enrolls the client that made
>> the request. (Or even simpler if there's any documentation on
>> what files you would need to back up)
>>
>> I prefer option 2 :-)
>
>
> I am trying to understand the sequence of the operations here.
> You have a client that you need to periodically re-install or
> re-deploy it.
>
> Before you re-install you need to set the OTP (because it is OTP)
> anyways. This means you need some software to run a command
> against IPA.
> OK so at that moment you can remove the host and then re-create it
> again in IPA and set the OTP there.
> On the client side you run ipa-client-install providing OTP and it
> creates the host keytab and does all configuration steps.
> After that you can log with any user account you have into that
> client (unless you prohibited this user from logging in via HBAC).
>
> It seems that what you are asking above is the ability to set OTP
> without disabling the host...
> Is the problem with sequencing? Are you saying that while the
> client is still working you already need to prepare it for the
> next re-enrollment without disrupting current operations?
> I can understand that.
> But what prevents you from doing operations in sequence: uninstall
> client, recreate the host and OTP on the server side, re-install
> the client?
>
>
>
>
>>
>> Thanks,
>> Charlie
>>
>>
>> On Tue, Sep 18, 2012 at 3:41 PM, Dmitri Pal <***@redhat.com
>> <mailto:***@redhat.com>> wrote:
>>
>> On 09/18/2012 07:34 AM, Charlie Derwent wrote:
>>> Hi
>>>
>>> I've used "ipa host-disable ${HOST}; ipa host-mod
>>> --password=${PASS} ${HOST}" In the past and that seems to
>>> work quite well. The ideal for me would be a situation where
>>> the IPA information could persist between rebuilds.
>>
>>
>> Can you please elaborate more?
>> Between rebuilds of what client or server?
>> And what information you want to persist: cert, keytab, OTP?
>>
>> Thanks
>> Dmitri
>>
>>
>>>
>>> Cheers,
>>> Charlie
>>> On Tue, Sep 18, 2012 at 12:05 PM, Innes, Duncan
>>> <***@virginmoney.com
>>> <mailto:***@virginmoney.com>> wrote:
>>>
>>> Folks,
>>>
>>> Juggling a problem here that perhaps doesn't have a
>>> perfect solution.
>>> I'm looking at systems that get re-provisioned by a
>>> Satellite/Spacewalk/Installation method. For full (Free)IPA
>>> integration, we normally delete the old entry from IPA,
>>> create a new one
>>> from scratch and set the OTP to match what we put in our
>>> post-install
>>> script called by the kickstart file.
>>>
>>> Just noticed that I can do the same thing by
>>> Unprovisioning the system
>>> via the WebUI and then setting the OTP.
>>>
>>> Is there a way to Unprovision a registered host and set
>>> a OTP via the
>>> command line? I was looking at 'ipa host-mod --setattr'
>>> but not getting
>>> too far with the Unprovisioning aspect.
>>>
>>> Duncan Innes | Linux Architect | Virgin Money | +44 1603
>>> 215476 <tel:%2B44%201603%20215476> | +44
>>> 7801 134507 | ***@virginmoney.com
>>> <mailto:***@virginmoney.com>
>>>
>>>
>>>
>>> > -----Original Message-----
>>> > From: freeipa-users-***@redhat.com
>>> <mailto:freeipa-users-***@redhat.com>
>>> > [mailto:freeipa-users-***@redhat.com
>>> <mailto:freeipa-users-***@redhat.com>] On Behalf Of
>>> JR Aquino
>>> > Sent: 18 September 2012 03:58
>>> > To: Tim Hildred
>>> > Cc: freeipa-users
>>> > Subject: Re: [Freeipa-users] Password requirements too
>>> stringent
>>> >
>>> >
>>> > On Sep 17, 2012, at 7:53 PM, Tim Hildred wrote:
>>> >
>>> > > JR
>>> > >
>>> > > I had that line. I commented it out. Thank you.
>>> > >
>>> > > Now, what do I have to restart?
>>> >
>>> > I believe it should take effect in real time, but you may
>>> > need to test to be sure. If it is still happening,
>>> you may
>>> > need to double check that some other pam cfg doesn't also
>>> > have it present: $ cd /etc/pam.d/ && grep pam_cracklib *
>>> >
>>> > If you have removed it from everything and it is still
>>> giving
>>> > you the same error, then I would try a reboot... perhaps
>>> > getty needs to reinitialize or something. But I'd try
>>> those
>>> > steps before a reboot!
>>> >
>>> > ;)
>>> >
>>> > > Tim Hildred, RHCE
>>> > > Content Author II - Engineering Content Services,
>>> Red Hat, Inc.
>>> > > Brisbane, Australia
>>> > > Email: ***@redhat.com <mailto:***@redhat.com>
>>> > > Internal: 8588287
>>> > > Mobile: +61 4 666 25242 <tel:%2B61%204%20666%2025242>
>>> > > IRC: thildred
>>> > >
>>> > > ----- Original Message -----
>>> > >> From: "JR Aquino" <***@citrix.com
>>> <mailto:***@citrix.com>>
>>> > >> To: "Tim Hildred" <***@redhat.com
>>> <mailto:***@redhat.com>>
>>> > >> Cc: "freeipa-users" <freeipa-***@redhat.com
>>> <mailto:freeipa-***@redhat.com>>
>>> > >> Sent: Tuesday, September 18, 2012 12:37:48 PM
>>> > >> Subject: Re: [Freeipa-users] Password requirements
>>> too stringent
>>> > >>
>>> > >> Tim, please check your /etc/pam.d/system-auth with
>>> the password
>>> > >> block. If you see password requisite
>>> pam_cracklib.so, then
>>> > >> this is why you are having a problem.
>>> > >>
>>> > >> $ man pam_cracklib
>>> > >>
>>> > >> It is a local security library for enforcing strong
>>> password
>>> > >> practices from the unix cli.
>>> > >>
>>> > >> ProTip:
>>> > >> If you don't need this, you can remove it from pam
>>> If you want to
>>> > >> work around this, set your password from the IPA
>>> webui or via the
>>> > >> cli: "ipa passwd username"
>>> > >>
>>> > >> Hope this info helps!
>>> > >>
>>> > >> "Keeping your head in the cloud"
>>> > >> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>>> > >> JR Aquino
>>> > >>
>>> > >> Senior Information Security Specialist, Technical
>>> Operations
>>> > >> T: +1 805 690 3478 <tel:%2B1%20805%20690%203478> |
>>> F: +1 805 879 3730 <tel:%2B1%20805%20879%203730> | M: +1
>>> 805 717 0365 <tel:%2B1%20805%20717%200365> GIAC
>>> > >> Certified Incident Handler | GIAC WebApplication
>>> > Penetration Tester
>>> > >> ***@citrix.com
>>> <mailto:***@citrix.com><mailto:***@citrix.com <mailto:***@citrix.com>>
>>> > >>
>>> > >>
>>> > >> [cid:***@01CD4A37.5451DC00]
>>> > >>
>>> > >> Powering mobile workstyles and cloud services
>>> > >>
>>> > >>
>>> > >>
>>> > >>
>>> > >>
>>> > >> On Sep 17, 2012, at 6:25 PM, Tim Hildred wrote:
>>> > >>
>>> > >> Hey all;
>>> > >>
>>> > >> I'm running IPA internally to control access to our
>>> cloud
>>> > >> environment.
>>> > >>
>>> > >> I must admit, I do not understand the password
>>> > requirements. I have
>>> > >> had them set to the defaults. I read this:
>>> > >>
>>> >
>>> https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Lin
>>> > >> ux/6/html/Identity_Management_Guide/user-pwdpolicy.html
>>> > >>
>>> > >> I have the minimum character classes set to 0. When
>>> people
>>> > use SSH to
>>> > >> change their passwords, they get "Based on a
>>> dictionary word" for
>>> > >> passwords that have nothing to do with dictionary
>>> words.
>>> > >>
>>> > >> I can't find anywhere in the documentation a break
>>> down of
>>> > what makes
>>> > >> an unacceptable versus acceptable password.
>>> > >>
>>> > >> Can anyone help me figure out what to tell my users? I
>>> > think people
>>> > >> would get a lot less frustrated if they knew why
>>> > "C679V375" was "too
>>> > >> simple" when the password policy has 0 required
>>> classes.
>>> > >>
>>> > >> Tim Hildred, RHCE
>>> > >> Content Author II - Engineering Content Services,
>>> Red Hat, Inc.
>>> > >> Brisbane, Australia
>>> > >> Email: ***@redhat.com <mailto:***@redhat.com>
>>> > >> Internal: 8588287
>>> > >> Mobile: +61 4 666 25242 <tel:%2B61%204%20666%2025242>
>>> > >> IRC: thildred
>>> > >>
>>> > >> ps: funny exchange with user:
>>> > >> Jul 12 14:12:33 <user1> i feel like im being punked
>>> Jul 12
>>> > 14:12:40
>>> > >> <user1> it is based on a dictionary word Jul 12
>>> 14:12:43
>>> > <user1> it
>>> > >> is too short Jul 12 14:12:49 <user1> is does not have
>>> > enough unique
>>> > >> letters Jul 12 14:12:51 <user1> etc
>>> > >>
>>> > >> _______________________________________________
>>> > >> Freeipa-users mailing list
>>> > >> Freeipa-***@redhat.com
>>> <mailto:Freeipa-***@redhat.com>
>>> > >> https://www.redhat.com/mailman/listinfo/freeipa-users
>>> > >>
>>> > >>
>>> >
>>> >
>>> > _______________________________________________
>>> > Freeipa-users mailing list
>>> > Freeipa-***@redhat.com <mailto:Freeipa-***@redhat.com>
>>> > https://www.redhat.com/mailman/listinfo/freeipa-users
>>> >
>>> > This message has been checked for viruses and spam by the
>>> > Virgin Money email scanning system powered by Messagelabs.
>>> >
>>>
>>>
>>> Northern Rock plc is part of the Virgin Money group of
>>> companies.
>>>
>>> This e-mail is intended to be confidential to the
>>> recipient. If you receive a copy in error, please inform
>>> the sender and then delete this message.
>>>
>>> Virgin Money Personal Financial Service Limited is
>>> authorised and regulated by the Financial Services
>>> Authority. Company no. 3072766.
>>>
>>> Virgin Money Unit Trust Managers Limited is authorised
>>> and regulated by the Financial Services Authority.
>>> Company no. 3000482.
>>>
>>> Virgin Money Cards Limited. Introducer appointed
>>> representative only of Virgin Money Personal Financial
>>> Service Limited. Company no. 4232392.
>>>
>>> Virgin Money Management Services Limited. Company no.
>>> 3072772.
>>>
>>> Virgin Money Holdings (UK) Limited. Company no. 3087587.
>>>
>>> Each of the above companies is registered in England and
>>> Wales and has its registered office at Discovery House,
>>> Whiting Road, Norwich NR4 6EJ.
>>>
>>> Northern Rock plc. Authorised and regulated by the
>>> Financial Services Authority. Registered in England and
>>> Wales (Company no. 6952311) with its registered office
>>> at Northern Rock House, Gosforth, Newcastle upon Tyne
>>> NE3 4PL.
>>>
>>> The above companies use the trading name Virgin Money.
>>>
>>>
>>> _______________________________________________
>>> Freeipa-users mailing list
>>> Freeipa-***@redhat.com <mailto:Freeipa-***@redhat.com>
>>> https://www.redhat.com/mailman/listinfo/freeipa-users
>>>
>>>
>>>
>>>
>>> _______________________________________________
>>> Freeipa-users mailing list
>>> Freeipa-***@redhat.com <mailto:Freeipa-***@redhat.com>
>>> https://www.redhat.com/mailman/listinfo/freeipa-users
>>
>>
>> --
>> Thank you,
>> Dmitri Pal
>>
>> Sr. Engineering Manager for IdM portfolio
>> Red Hat Inc.
>>
>>
>> -------------------------------
>> Looking to carve out IT costs?
>> www.redhat.com/carveoutcosts/ <http://www.redhat.com/carveoutcosts/>
>>
>>
>>
>> _______________________________________________
>> Freeipa-users mailing list
>> Freeipa-***@redhat.com <mailto:Freeipa-***@redhat.com>
>> https://www.redhat.com/mailman/listinfo/freeipa-users
>>
>>
>
>
> --
> Thank you,
> Dmitri Pal
>
> Sr. Engineering Manager for IdM portfolio
> Red Hat Inc.
>
>
> -------------------------------
> Looking to carve out IT costs?
> www.redhat.com/carveoutcosts/ <http://www.redhat.com/carveoutcosts/>
>
>
>


--
Thank you,
Dmitri Pal

Sr. Engineering Manager for IdM portfolio
Red Hat Inc.


-------------------------------
Looking to carve out IT costs?
www.redhat.com/carveoutcosts/
Tim Hildred
2012-09-19 01:43:48 UTC
Permalink
So, commenting out:
password requisite pam_cracklib.so try_first_pass retry=3 type= dcredit=-1 ucredit=-1 ocredit=-1 lcredit=0 minlen=8

Caused users updating their passwords using ssh to get:

[***@ykatabam ~]$ ssh ***@dns1.ecs-cloud.lab.eng.bne.redhat.com
***@dns1.ecs-cloud.lab.eng.bne.redhat.com's password:
Permission denied, please try again.
***@dns1.ecs-cloud.lab.eng.bne.redhat.com's password:
Password expired. Change your password now.
Last login: Fri Sep 14 10:20:49 2012 from vpn1-48-53.bne.redhat.com
WARNING: Your password has expired.
You must change your password now and login again!
Changing password for user ykatabam.
Current Password:
Password change failed. Server message: Password change failed
passwd: Authentication token manipulation error
Connection to dns1.ecs-cloud.lab.eng.bne.redhat.com closed.

Is that to say that you need at least 1 password requisite? That instead of commenting out the password requisite pam_cracklib.so, I should have replaced it with something?

Tim Hildred, RHCE
Content Author II - Engineering Content Services, Red Hat, Inc.
Brisbane, Australia
Email: ***@redhat.com
Internal: 8588287
Mobile: +61 4 666 25242
IRC: thildred

----- Original Message -----
> From: "Jakub Hrozek" <***@redhat.com>
> To: freeipa-***@redhat.com
> Sent: Tuesday, September 18, 2012 5:29:12 PM
> Subject: Re: [Freeipa-users] Password requirements too stringent
>
> On Tue, Sep 18, 2012 at 02:57:49AM +0000, JR Aquino wrote:
> >
> > On Sep 17, 2012, at 7:53 PM, Tim Hildred wrote:
> >
> > > JR
> > >
> > > I had that line. I commented it out. Thank you.
> > >
> > > Now, what do I have to restart?
> >
> > I believe it should take effect in real time, but you may need to
> > test to be sure. If it is still happening, you may need to double
> > check that some other pam cfg doesn't also have it present: $ cd
> > /etc/pam.d/ && grep pam_cracklib *
> >
> > If you have removed it from everything and it is still giving you
> > the same error, then I would try a reboot... perhaps getty needs
> > to reinitialize or something. But I'd try those steps before a
> > reboot!
> >
> > ;)
> >
>
> Some services, notably the sshd, must be restarted in order to
> re-read
> the PAM config.
>
> _______________________________________________
> Freeipa-users mailing list
> Freeipa-***@redhat.com
> https://www.redhat.com/mailman/listinfo/freeipa-users
>
Jakub Hrozek
2012-09-19 06:56:42 UTC
Permalink
On Tue, Sep 18, 2012 at 09:43:48PM -0400, Tim Hildred wrote:
> So, commenting out:
> password requisite pam_cracklib.so try_first_pass retry=3 type= dcredit=-1 ucredit=-1 ocredit=-1 lcredit=0 minlen=8
>
> Caused users updating their passwords using ssh to get:
>
> [***@ykatabam ~]$ ssh ***@dns1.ecs-cloud.lab.eng.bne.redhat.com
> ***@dns1.ecs-cloud.lab.eng.bne.redhat.com's password:
> Permission denied, please try again.
> ***@dns1.ecs-cloud.lab.eng.bne.redhat.com's password:
> Password expired. Change your password now.
> Last login: Fri Sep 14 10:20:49 2012 from vpn1-48-53.bne.redhat.com
> WARNING: Your password has expired.
> You must change your password now and login again!
> Changing password for user ykatabam.
> Current Password:
> Password change failed. Server message: Password change failed
> passwd: Authentication token manipulation error
> Connection to dns1.ecs-cloud.lab.eng.bne.redhat.com closed.
>
> Is that to say that you need at least 1 password requisite? That instead of commenting out the password requisite pam_cracklib.so, I should have replaced it with something?

What did /var/log/secure have to say?

The message sounds to me like it's coming from the server..
Dmitri Pal
2012-09-19 11:32:59 UTC
Permalink
On 09/19/2012 02:56 AM, Jakub Hrozek wrote:
> On Tue, Sep 18, 2012 at 09:43:48PM -0400, Tim Hildred wrote:
>> So, commenting out:
>> password requisite pam_cracklib.so try_first_pass retry=3 type= dcredit=-1 ucredit=-1 ocredit=-1 lcredit=0 minlen=8
>>
>> Caused users updating their passwords using ssh to get:
>>
>> [***@ykatabam ~]$ ssh ***@dns1.ecs-cloud.lab.eng.bne.redhat.com
>> ***@dns1.ecs-cloud.lab.eng.bne.redhat.com's password:
>> Permission denied, please try again.
>> ***@dns1.ecs-cloud.lab.eng.bne.redhat.com's password:
>> Password expired. Change your password now.
>> Last login: Fri Sep 14 10:20:49 2012 from vpn1-48-53.bne.redhat.com
>> WARNING: Your password has expired.
>> You must change your password now and login again!
>> Changing password for user ykatabam.
>> Current Password:
>> Password change failed. Server message: Password change failed
>> passwd: Authentication token manipulation error
>> Connection to dns1.ecs-cloud.lab.eng.bne.redhat.com closed.
>>
>> Is that to say that you need at least 1 password requisite? That instead of commenting out the password requisite pam_cracklib.so, I should have replaced it with something?
> What did /var/log/secure have to say?
>
> The message sounds to me like it's coming from the server..
Please look at the krb5kdc.log on the server.
This is the server side message.
Most likely it did not like the password because it did not meet the policy.
I wonder whether there is a bug in case password policy has 0 for the
required character classes.
Trying different passwords and changing the policy while watching the
log will give you more answers.

>
> _______________________________________________
> Freeipa-users mailing list
> Freeipa-***@redhat.com
> https://www.redhat.com/mailman/listinfo/freeipa-users


--
Thank you,
Dmitri Pal

Sr. Engineering Manager for IdM portfolio
Red Hat Inc.


-------------------------------
Looking to carve out IT costs?
www.redhat.com/carveoutcosts/
Petr Spacek
2012-09-19 11:56:21 UTC
Permalink
On 09/19/2012 01:32 PM, Dmitri Pal wrote:
> On 09/19/2012 02:56 AM, Jakub Hrozek wrote:
>> On Tue, Sep 18, 2012 at 09:43:48PM -0400, Tim Hildred wrote:
>>> So, commenting out:
>>> password requisite pam_cracklib.so try_first_pass retry=3 type= dcredit=-1 ucredit=-1 ocredit=-1 lcredit=0 minlen=8
>>>
>>> Caused users updating their passwords using ssh to get:
>>>
>>> [***@ykatabam ~]$ ssh ***@dns1.ecs-cloud.lab.eng.bne.redhat.com
>>> ***@dns1.ecs-cloud.lab.eng.bne.redhat.com's password:
>>> Permission denied, please try again.
>>> ***@dns1.ecs-cloud.lab.eng.bne.redhat.com's password:
>>> Password expired. Change your password now.
>>> Last login: Fri Sep 14 10:20:49 2012 from vpn1-48-53.bne.redhat.com
>>> WARNING: Your password has expired.
>>> You must change your password now and login again!
>>> Changing password for user ykatabam.
>>> Current Password:
>>> Password change failed. Server message: Password change failed
>>> passwd: Authentication token manipulation error
>>> Connection to dns1.ecs-cloud.lab.eng.bne.redhat.com closed.
>>>
>>> Is that to say that you need at least 1 password requisite? That instead of commenting out the password requisite pam_cracklib.so, I should have replaced it with something?
>> What did /var/log/secure have to say?
>>
>> The message sounds to me like it's coming from the server..
> Please look at the krb5kdc.log on the server.
> This is the server side message.
> Most likely it did not like the password because it did not meet the policy.
> I wonder whether there is a bug in case password policy has 0 for the
> required character classes.
> Trying different passwords and changing the policy while watching the
> log will give you more answers.

BTW if required character classes == 1 there is nothing to enforce, because
each (non-empty) password has at least one character class.

You can check if there is some difference between 0 and 1.

Petr^2 Spacek
Tim Hildred
2012-09-19 07:15:41 UTC
Permalink
Sep 19 11:40:43 dns1 sshd[11197]: pam_sss(sshd:account): User info message: Password expired. Change your password now.
Sep 19 11:40:43 dns1 sshd[11197]: Accepted password for ykatabam from 10.64.48.102 port 47713 ssh2
Sep 19 11:40:43 dns1 sshd[11197]: pam_unix(sshd:session): session opened for user ykatabam by (uid=0)
Sep 19 11:40:43 dns1 passwd: pam_unix(passwd:chauthtok): user "ykatabam" does not exist in /etc/passwd
Sep 19 11:41:21 dns1 passwd: pam_unix(passwd:chauthtok): user "ykatabam" does not exist in /etc/passwd
Sep 19 11:41:22 dns1 sshd[11201]: Received disconnect from 10.64.48.102: 11: disconnected by user
Sep 19 11:41:22 dns1 sshd[11197]: pam_unix(sshd:session): session closed for user ykatabam
Sep 19 14:40:33 dns1 sshd[11113]: Received disconnect from 10.64.15.231: 11: disconnected by user

Looks like you're right Jakub.

>
Tim Hildred
2012-09-20 03:52:48 UTC
Permalink
Hey, sorry, I'm a little confused about all the pieces.

I want to let my users reset expired password using ssh. I would really like them to be able to use the same password every time, and not worry if that password is "icecream".

>
Continue reading on narkive:
Loading...