* krb5 issues
@ 2016-05-23 15:21 Ken Bass
2016-05-24 14:07 ` Ken Bass
0 siblings, 1 reply; 5+ messages in thread
From: Ken Bass @ 2016-05-23 15:21 UTC (permalink / raw)
To: linux-audit
Hello,
I enabled krb5 in my audisp-remote and audispd-remote reports "GSS-API
error sending token length" and fails to log remotely.
If I reboot the destination auditd server AFTER the clients are running
it appears to work. But if I reboot any clients machine, logging from
that rebooted machine fails.
I created my service principals using freeipa - all systems are clean
installs of Centos 7.2.
For now, I disabled krb5, but that is not a good solution.
Thank you,
Ken
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: krb5 issues
2016-05-23 15:21 krb5 issues Ken Bass
@ 2016-05-24 14:07 ` Ken Bass
2016-05-26 15:16 ` Ken Bass
2016-05-26 20:12 ` Steve Grubb
0 siblings, 2 replies; 5+ messages in thread
From: Ken Bass @ 2016-05-24 14:07 UTC (permalink / raw)
To: linux-audit
On 05/23/2016 11:21 AM, Ken Bass wrote:
> I enabled krb5 in my audisp-remote and audispd-remote reports "GSS-API
> error sending token length" and fails to log remotely.
>
> If I reboot the destination auditd server AFTER the clients are
> running it appears to work. But if I reboot any clients machine,
> logging from that rebooted machine fails.
> I created my service principals using freeipa - all systems are clean
> installs of Centos 7.2.
>
> For now, I disabled krb5, but that is not a good solution.
After disabling krb5 and rebooting the client servers several times I am
seeing similar problems. I am seeing a dozen or so log file entries of
Too many connections from 10.10.10.10:39107 - rejected
I only have 2 clients and all I am doing is rebooting them. I tried
increasing the tcp_listen_queue to 20 (from the default of 5) which made
no difference.
I seem to have traced it to needing to specify the tcp_client_ports to
60 rather than using whatever the default was. What would have been
blocking this? And why only when the clients are rebooted second does it
fail?
After changing this the Kerberos works, so I think the 'error sending
token length' is basically the same message but in a different code path
to indicate the connection is rejected / cannot write to the TCP socket.
Was the commented out ##tcp_client_ports parameter supposed to be
changed by the end user? Was the defaults supposed to work?
On a related note, using krb5 causes a problem with selinux. Unless I
disable it (or figure out a rule) auditd fails to start because it is
denied permission to create /var/tmp/auditd_0 kerberos replay cache file.
Is there a rule or procedure to properly fix that?
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: krb5 issues
2016-05-24 14:07 ` Ken Bass
@ 2016-05-26 15:16 ` Ken Bass
2016-05-26 20:04 ` Steve Grubb
2016-05-26 20:12 ` Steve Grubb
1 sibling, 1 reply; 5+ messages in thread
From: Ken Bass @ 2016-05-26 15:16 UTC (permalink / raw)
To: linux-audit
On 05/24/2016 10:07 AM, Ken Bass wrote:
>
> On a related note, using krb5 causes a problem with selinux. Unless I
> disable it (or figure out a rule) auditd fails to start because it is
> denied permission to create /var/tmp/auditd_0 kerberos replay cache file.
> Is there a rule or procedure to properly fix that?
Is there somewhere to file a bug report for this at? Obviously the
selinux is not being setup for auditd to manage the /var/tmp/auditd_0
file when krb5 is enabled. Using Centos 7.2.
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: krb5 issues
2016-05-26 15:16 ` Ken Bass
@ 2016-05-26 20:04 ` Steve Grubb
0 siblings, 0 replies; 5+ messages in thread
From: Steve Grubb @ 2016-05-26 20:04 UTC (permalink / raw)
To: linux-audit
On Thursday, May 26, 2016 11:16:05 AM Ken Bass wrote:
> On 05/24/2016 10:07 AM, Ken Bass wrote:
> > On a related note, using krb5 causes a problem with selinux. Unless I
> > disable it (or figure out a rule) auditd fails to start because it is
> > denied permission to create /var/tmp/auditd_0 kerberos replay cache file.
> > Is there a rule or procedure to properly fix that?
>
> Is there somewhere to file a bug report for this at?
You could use Bugzilla and file against selinux-policy.
> Obviously the selinux is not being setup for auditd to manage the
> /var/tmp/auditd_0 file when krb5 is enabled. Using Centos 7.2.
I think its used so rarely that no one has noticed.
-Steve
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: krb5 issues
2016-05-24 14:07 ` Ken Bass
2016-05-26 15:16 ` Ken Bass
@ 2016-05-26 20:12 ` Steve Grubb
1 sibling, 0 replies; 5+ messages in thread
From: Steve Grubb @ 2016-05-26 20:12 UTC (permalink / raw)
To: linux-audit
On Tuesday, May 24, 2016 10:07:57 AM Ken Bass wrote:
> On 05/23/2016 11:21 AM, Ken Bass wrote:
> > I enabled krb5 in my audisp-remote and audispd-remote reports "GSS-API
> > error sending token length" and fails to log remotely.
> >
> > If I reboot the destination auditd server AFTER the clients are
> > running it appears to work. But if I reboot any clients machine,
> > logging from that rebooted machine fails.
> > I created my service principals using freeipa - all systems are clean
> > installs of Centos 7.2.
> >
> > For now, I disabled krb5, but that is not a good solution.
>
> After disabling krb5 and rebooting the client servers several times I am
> seeing similar problems. I am seeing a dozen or so log file entries of
>
> Too many connections from 10.10.10.10:39107 - rejected
>
> I only have 2 clients and all I am doing is rebooting them. I tried
> increasing the tcp_listen_queue to 20 (from the default of 5) which made
> no difference.
>
> I seem to have traced it to needing to specify the tcp_client_ports to
> 60 rather than using whatever the default was. What would have been
> blocking this?
I think 60 is the default in the audit config files. IPtables/firewalld needs to
be opened and selinux is expecting port 60.
> And why only when the clients are rebooted second does it
> fail?
>
> After changing this the Kerberos works, so I think the 'error sending
> token length' is basically the same message but in a different code path
> to indicate the connection is rejected / cannot write to the TCP socket.
>
> Was the commented out ##tcp_client_ports parameter supposed to be
> changed by the end user? Was the defaults supposed to work?
There is some discussion of this in the man pages. Ports < 1024 are
privileged. If its higher they you can have someone dump spoofed log events in
the aggregating server. So, setting the port low gives a small amount of trust
that it might be real events from a real system. You should also use
tcp_wrappers to make sure specific systems are sending events. Kerberos though
is supposed to help ensure that you have even more trust.
-Steve
> On a related note, using krb5 causes a problem with selinux. Unless I
> disable it (or figure out a rule) auditd fails to start because it is
> denied permission to create /var/tmp/auditd_0 kerberos replay cache file.
> Is there a rule or procedure to properly fix that?
>
> --
> Linux-audit mailing list
> Linux-audit@redhat.com
> https://www.redhat.com/mailman/listinfo/linux-audit
^ permalink raw reply [flat|nested] 5+ messages in thread
end of thread, other threads:[~2016-05-26 20:12 UTC | newest]
Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2016-05-23 15:21 krb5 issues Ken Bass
2016-05-24 14:07 ` Ken Bass
2016-05-26 15:16 ` Ken Bass
2016-05-26 20:04 ` Steve Grubb
2016-05-26 20:12 ` Steve Grubb
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).