Select Your Language

Infrastructure and Management

Cloud Computing

Storage

Runtimes

Integration and Automation

  • Comments
  • rpm --setperms will make ipa server fail

    Posted on

    Background:
    One of the recommended mechanisms for enforcing configuration of system files (and reversing user changes) is to use:
    rpm --setperms [rpm_name]

    Problem:
    We have discovered that in RHEL 7.6 two of the ipa rpms have file permissions too restictive for operation of the IdM servers (either master or replica).

    1) ipa-client-common - sets the permission of /etc/pki/ca-trust/source/ipa.p11-kit to 0000. This will keep named-pkcs11 (DNS) from starting. There is code in the domain-join which overrides this permission (to 644), but that is not sufficient as the rpm does not know this.
    Verify: rpm -qV ipa-client-common

    2) ipa-server-common - sets the permission of /var/named/dyndb-ldap/ipa to 0000. This also keeps named-pkcs11 (DNS) from starting. Initialization of the server sets this directory to 755, but the rpm does not know this.
    Verify: rpm -qV ipa-server-common

    Is it expected that execution of "rpm --setperms" would be compatible with successful operation of the systems? If so, this should be part of the standard testing of the IPA rpms, and the current too-restrictive permissions should be changed.

    by

    points

    Responses

    Red Hat LinkedIn YouTube Facebook X, formerly Twitter

    Quick Links

    Help

    Site Info

    Related Sites

    © 2026 Red Hat