J. Pfennig kirjoitti 31.5.2023 klo 21.34:
Package: libpam-sss
Version: 2.8.2-4
Severity: normal
File: /lib/x86_64-linux-gnu/security/pam_sss.so

Dear Maintainer,

    * What led up to the situation?

     using kerberos, AD/DC, sssd and its pam module

    * What exactly did you do (or not do) that was effective (or
      ineffective)?

     kinit ...           # to get a kerberos ticket
     echo $KRB5CCNAME    # path to creditial cache

     sudo -i user2
     echo $KRB5CCNAME    # ORIGINAL path to creditial cache

    * What was the outcome of this action?

     kinit, klist et al fail, wrong credential cache
     echo $KRB5CCNAME    # path from original user

    * What outcome did you expect instead?

     KRB5CCNAME must not be passed

     the case is described better than I can do at:

     https://bugzilla.redhat.com/show_bug.cgi?id=1324486

     Bug fixed there in 2017. Could Debian fix it too?


The default value for pam_response_filter should already be
'ENV:KRB5CCNAME:sudo, ENV:KRB5CCNAME:sudo-i', so this issue should not happen since 2.5.1.


--
t

Reply via email to