Uploaded image for project: 'MariaDB Server'
  1. MariaDB Server
  2. MDEV-12479

I can not connect via PAM authentication.

    XMLWordPrintable

Details

    Description

      Connecting USER through PAM authentication. Sometimes it is not possible to connect to a USER created via PAM authentication.
      However,I reboot the server. Then I can connect through user via PAM authentication.
      I can't connect to the PAM plug-in after deleting it and re-installing it.

      Send the PAM config information as shown below.

      1) /var/log/secure

      Apr 10 15:50:58 robofowd unix_chkpwd[32010]: password check failed for user (S460029)
      Apr 10 15:50:58 robofowd mysqld: pam_unix(mysql:auth): authentication failure; logname= uid=27 euid=27 tty= ruser= rhost=  user=S460029
      

      2) my.cnf

      [mysqld]
      datadir=/data_robo/mysql
      socket=/var/lib/mysql/mysql.sock
       
      # Disabling symbolic-links is recommended to prevent assorted security risks
      symbolic-links=0
       
      # Settings user and group are ignored when systemd is used.
      # If you need to run mysqld under a different user or group,
      # customize your systemd unit file for mariadb according to the
      # instructions in http://fedoraproject.org/wiki/Systemd
       
      max_connections=2000
      innodb_flush_log_at_trx_commit=2
      innodb_buffer_pool_size=128G
      innodb_log_buffer_size=402653184
      innodb_log_file_size=268435456
      plugin_load=auth_pamlog.so
      port=21398
       
      pam_use_cleartext_plugin
       
      [mysqld_safe]
      log-error=/var/log/mariadb/mariadb.log
      pid-file=/var/run/mariadb/mariadb.pid
      

      3) /etc/pam.d/system-auth

      #%PAM-1.0
      # This file is auto-generated.
      # User changes will be destroyed the next time authconfig is run.
       
      # BEGIN OF SECURITY SETTING
      auth        required       pam_unity_uac.so
      auth        required       pam_tally2.so deny=4 unlock_time=1800
      account     required       pam_tally2.so
      # END OF SECURITY SETTING
       
      auth        required      pam_env.so
      auth        sufficient    pam_unix.so nullok try_first_pass
      auth        requisite     pam_succeed_if.so uid >= 1000 quiet_success
      auth        required      pam_deny.so
       
      account     required      pam_unix.so
      account     sufficient    pam_localuser.so
      account     sufficient    pam_succeed_if.so uid < 1000 quiet
      account     required      pam_permit.so
       
      password    requisite     pam_pwquality.so try_first_pass local_users_only retry=3 authtok_type= dcredit=-1 lcredit=-1 ocredit=-1
      password    sufficient    pam_unity_upv.so pam_unix.so  sha512 shadow nullok try_first_pass  remember=2
      password    required      pam_deny.so
       
      session     optional      pam_keyinit.so revoke
      session     required      pam_limits.so
      -session     optional      pam_systemd.so
      session     [success=1 default=ignore] pam_succeed_if.so service in crond quiet use_uid
      session     required      pam_unix.so
      

      4) /etc/pam.d/password-auth

      #%PAM-1.0
      # This file is auto-generated.
      # User changes will be destroyed the next time authconfig is run.
       
      # BEGIN OF SECURITY SETTING
      auth        required       pam_unity_uac.so
      auth        required       pam_tally2.so deny=4 unlock_time=1800
      account     required       pam_tally2.so
      # END OF SECURITY SETTING
       
      auth        required      pam_env.so
      auth        sufficient    pam_unix.so nullok try_first_pass
      auth        requisite     pam_succeed_if.so uid >= 1000 quiet_success
      auth        required      pam_deny.so
       
      account     required      pam_unix.so
      account     sufficient    pam_localuser.so
      account     sufficient    pam_succeed_if.so uid < 1000 quiet
      account     required      pam_permit.so
       
      password    requisite     pam_pwquality.so try_first_pass local_users_only retry=3 authtok_type= dcredit=-1 lcredit=-1 ocredit=-1
      password    sufficient    pam_unity_upv.so pam_unix.so  sha512 shadow nullok try_first_pass  remember=2
      password    required      pam_deny.so
       
      session     optional      pam_keyinit.so revoke
      session     required      pam_limits.so
      -session     optional      pam_systemd.so
      session     [success=1 default=ignore] pam_succeed_if.so service in crond quiet use_uid
      session     required      pam_unix.so
      

      Attachments

        Activity

          People

            Unassigned Unassigned
            gks3117 sungwon.han
            Votes:
            0 Vote for this issue
            Watchers:
            4 Start watching this issue

            Dates

              Created:
              Updated:
              Resolved:

              Git Integration

                Error rendering 'com.xiplink.jira.git.jira_git_plugin:git-issue-webpanel'. Please contact your Jira administrators.