The pam error:
sssd_pam runs as root but dropped its capability CAP_DAC_OVERRIDE.
before it restarts, we changed the file/directory owner in the postinst script 
to sssd.
when it restarts, atexit calls unlink() to the file, but now the uid doesn't 
match.
79492 --- SIGTERM {si_signo=SIGTERM, si_code=SI_USER, si_pid=280, si_uid=0} ---
[...]
79492 unlink("/var/lib/sss/pubconf/pam_preauth_available") = -1 EACCES 
(Permission denied)
79492 write(0, "(2026-03-17 15:33:07): [pam] [cl"..., 176) = 176

-> fix by stopping the service before the permission changes.


The krb5_kpasswd option error seems overly verbose, since the condition is this:
    const char *primary_servers = option(krb5_kpasswd);

    if (primary_servers == NULL && kdc_servers != NULL) {
        DEBUG(SSSDBG_FATAL_FAILURE, "Missing krb5_kpasswd option and KDC set "
              "explicitly, will use KDC for password change operations!\n");
        ctx->kpasswd_service = NULL;
    }

and according to man 5 sssd-krb5:

       krb5_kpasswd, krb5_backup_kpasswd (string)
           If the change password service is not running on the KDC, 
alternative servers can be defined here. An optional port number (preceded by a 
colon) may be appended to the addresses or hostnames.

           Default: Use the KDC

so i think this is not an error, but too verbose. reported upstream:
https://bugs.launchpad.net/ubuntu/+source/sssd/+bug/2142140

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2142140

Title:
  rootless sssd upgrade issues

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sssd/+bug/2142140/+subscriptions


-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to