<p>> On Tue, Feb 19, 2013 at 03:29:03PM -0700, ninibaba@worldd.org
wrote:<br />
>><br />
>><br />
>> ?<br />
>> ?<br />
>> Actually<br />
>> i'd like to take that back now, it works fine when running
kpasswd, but<br />
>> if<br />
>> user password is expired when SSH to client, during the reset it
only<br />
>> tried UDP same if issuing passwd command as well.<br />
><br />
><br />
> Both use sssd here which in theory should behave as kpasswd. Can you
run<br />
> sssd with a high debug level, run the passwd command again and
send<br />
> logs? If you prefer you can send them as PM to me. Most
interesting<br />
> would be krb5_child.log but the others miht be useful as well.<br />
><br />
> bye,<br />
> Sumit<br />
>> _______________________________________________<br />
>> Freeipa-users mailing list<br />
>> Freeipa-users@redhat.com<br />
>> https://www.redhat.com/mailman/listinfo/freeipa-users<br />
><br />
></p><p> </p><p>I found my issue by disabled SELinux on the
client, also did a search and found this bug related to my issue
exactly:</p><p> </p><p><a
href="https://bugzilla.redhat.com/show_bug.cgi?id=889251">https://bugzilla.redhat.com/show_bug.cgi?id=889251</a></p><p> </p><p>The
selinux-policy in CentOS 6 is not the same as the current <span
style="color: rgb(0, 0, 0); font-family: 'DejaVu Sans', 'Liberation Sans',
sans-serif; font-size: small;">selinux-policy-3.7.19-190.el6 in RHEL 6,
CentOS 6 is using </span><span style="color: rgb(0, 0, 0);
font-family: 'DejaVu Sans', 'Liberation Sans', sans-serif; font-size:
small;">selinux-policy-3.7.19-155.el6</span></p><p> </p><p>Thank you
for everyone's help, reviewing the krb5_child.log led me to search SELinux
audit log which turned up the problem while looking for denied
messages.</p>