homepage

This issue tracker has been migrated to GitHub , and is currently read-only.
For more information, see the GitHub FAQs in the Python's Developer Guide.

classification
Title: spwd.getspall() is returning LDAP (non local) users too
Type: behavior Stage: resolved
Components: Library (Lib) Versions: Python 2.6
process
Status: closed Resolution: not a bug
Dependencies: Superseder:
Assigned To: Nosy List: christian.heimes, dmalcolm, halfie
Priority: normal Keywords:

Created on 2012年05月08日 08:01 by halfie, last changed 2022年04月11日 14:57 by admin. This issue is now closed.

Messages (3)
msg160188 - (view) Author: (halfie) Date: 2012年05月08日 08:01
spwd.getspall() is returning LDAP (non local) users too. 
On RHEL 6.2 machine with LDAP authentication configured, spwd.getspall() 
is returning LDAP (non local) users too. On a similarly configured CentOS 6.2 machine, spwd.getspall() is returning only local users.
Is spwd.getspall() supposed to return LDAP users? (If yes, this should to documented). Why is spwd.getspall() behavior different on different Linux OSes?
msg160210 - (view) Author: Dave Malcolm (dmalcolm) (Python committer) Date: 2012年05月08日 15:58
Like passwd and group information, the shadow password entries are pulled through libc's Name Service Switch and modules for it, depending on configuration.
See "man nsswitch.conf".
Hence this is likely to be a configuration difference between the two boxes. Some notes from one of my Red Hat colleagues:
* Is a module listed in /etc/nsswitch.conf so that it'll be used to look
 up "shadow" information?
* Does the module support looking up shadow information?
 The libnss_ldap.so.2 stub from nss-pam-ldapd does; SSSD (at least
 version 1.8.3) doesn't.
* Are there shadowAccount entries in the directory server?
 An IPA server won't have them, because IPA makes use of the directory
 server's built-in password policy functionality to avoid depending on
 clients to enforce aging policies.
* Is the client performing the lookup authorized to read the shadow data
 from the directory server?
* Does the client perform any additional access control?
 The daemon in nss-pam-ldapd only exposes shadow information to
 processes running as UID 0.
etc
Hope this is helpful
msg192366 - (view) Author: Christian Heimes (christian.heimes) * (Python committer) Date: 2013年07月05日 22:23
Dave has explained the problem very well. I like to add one thing. The module just returns what your operation system's getspent() API returns. http://linux.die.net/man/3/getspnam
Please ask your vendor for more details, too.
History
Date User Action Args
2022年04月11日 14:57:30adminsetgithub: 58953
2013年07月05日 22:23:13christian.heimessetstatus: open -> closed

nosy: + christian.heimes
messages: + msg192366

resolution: not a bug
stage: resolved
2012年05月08日 15:58:33dmalcolmsetmessages: + msg160210
2012年05月08日 12:40:48pitrousetnosy: + dmalcolm
2012年05月08日 08:01:53halfiecreate

AltStyle によって変換されたページ (->オリジナル) /