2018-12-12 15:34:05 +01:00
|
|
|
# We basically use nscd as a proxy for forwarding nss requests to appropriate
|
|
|
|
# nss modules, as we run nscd with LD_LIBRARY_PATH set to the directory
|
|
|
|
# containing all such modules
|
|
|
|
# Note that we can not use `enable-cache no` As this will actually cause nscd
|
|
|
|
# to just reject the nss requests it receives, which then causes glibc to
|
|
|
|
# fallback to trying to handle the request by itself. Which won't work as glibc
|
|
|
|
# is not aware of the path in which the nss modules live. As a workaround, we
|
|
|
|
# have `enable-cache yes` with an explicit ttl of 0
|
2007-01-12 00:55:25 +01:00
|
|
|
server-user nscd
|
2007-01-23 14:44:41 +01:00
|
|
|
threads 1
|
2007-01-12 00:55:25 +01:00
|
|
|
paranoia no
|
|
|
|
debug-level 0
|
|
|
|
|
|
|
|
enable-cache passwd yes
|
nixos/nscd: Disable caching of group and passwd
Systemd provides an option for allocating DynamicUsers
which we want to use in NixOS to harden service configuration.
However, we discovered that the user wasn't allocated properly
for services. After some digging this turned out to be, of course,
a cache inconsistency problem.
When a DynamicUser creation is performed, Systemd check beforehand
whether the requested user already exists statically. If it does,
it bails out. If it doesn't, systemd continues with allocating the
user.
However, by checking whether the user exists, nscd will store
the fact that the user does not exist in it's negative cache.
When the service tries to lookup what user is associated to its
uid (By calling whoami, for example), it will try to consult
libnss_systemd.so However this will read from the cache and tell
report that the user doesn't exist, and thus will return that
there is no user associated with the uid. It will continue
to do so for the cache duration time. If the service
doesn't immediately looks up its username, this bug is not
triggered, as the cache will be invalidated around this time.
However, if the service is quick enough, it might end up
in a situation where it's incorrectly reported that the
user doesn't exist.
Preferably, we would not be using nscd at all. But we need to
use it because glibc reads nss modules from /etc/nsswitch.conf
by looking relative to the global LD_LIBRARY_PATH. Because LD_LIBRARY_PATH
is not set globally (as that would lead to impurities and ABI issues),
glibc will fail to find any nss modules.
Instead, as a hack, we start up nscd with LD_LIBRARY_PATH set
for only that service. Glibc will forward all nss syscalls to
nscd, which will then respect the LD_LIBRARY_PATH and only
read from locations specified in the NixOS config.
we can load nss modules in a pure fashion.
However, I think by accident, we just copied over the default
settings of nscd, which actually caches user and group lookups.
We already disable this when sssd is enabled, as this interferes
with the correct working of libnss_sss.so as it already
does its own caching of LDAP requests.
(See https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/deployment_guide/usingnscd-sssd)
Because nscd caching is now also interferring with libnss_systemd.so
and probably also with other nsss modules, lets just pre-emptively
disable caching for now for all options related to users and groups,
but keep it for caching hosts ans services lookups.
Note that we can not just put in /etc/nscd.conf:
enable-cache passwd no
As this will actually cause glibc to _not_ forward the call to nscd
at all, and thus never reach the nss modules. Instead we set
the negative and positive cache ttls to 0 seconds as a workaround.
This way, Glibc will always forward requests to nscd, but results
will never be cached.
Fixes #50273
2018-11-13 16:28:37 +01:00
|
|
|
positive-time-to-live passwd 0
|
|
|
|
negative-time-to-live passwd 0
|
2007-01-12 00:55:25 +01:00
|
|
|
suggested-size passwd 211
|
|
|
|
check-files passwd yes
|
2007-01-23 14:44:41 +01:00
|
|
|
persistent passwd no
|
2007-01-12 00:55:25 +01:00
|
|
|
shared passwd yes
|
|
|
|
|
|
|
|
enable-cache group yes
|
nixos/nscd: Disable caching of group and passwd
Systemd provides an option for allocating DynamicUsers
which we want to use in NixOS to harden service configuration.
However, we discovered that the user wasn't allocated properly
for services. After some digging this turned out to be, of course,
a cache inconsistency problem.
When a DynamicUser creation is performed, Systemd check beforehand
whether the requested user already exists statically. If it does,
it bails out. If it doesn't, systemd continues with allocating the
user.
However, by checking whether the user exists, nscd will store
the fact that the user does not exist in it's negative cache.
When the service tries to lookup what user is associated to its
uid (By calling whoami, for example), it will try to consult
libnss_systemd.so However this will read from the cache and tell
report that the user doesn't exist, and thus will return that
there is no user associated with the uid. It will continue
to do so for the cache duration time. If the service
doesn't immediately looks up its username, this bug is not
triggered, as the cache will be invalidated around this time.
However, if the service is quick enough, it might end up
in a situation where it's incorrectly reported that the
user doesn't exist.
Preferably, we would not be using nscd at all. But we need to
use it because glibc reads nss modules from /etc/nsswitch.conf
by looking relative to the global LD_LIBRARY_PATH. Because LD_LIBRARY_PATH
is not set globally (as that would lead to impurities and ABI issues),
glibc will fail to find any nss modules.
Instead, as a hack, we start up nscd with LD_LIBRARY_PATH set
for only that service. Glibc will forward all nss syscalls to
nscd, which will then respect the LD_LIBRARY_PATH and only
read from locations specified in the NixOS config.
we can load nss modules in a pure fashion.
However, I think by accident, we just copied over the default
settings of nscd, which actually caches user and group lookups.
We already disable this when sssd is enabled, as this interferes
with the correct working of libnss_sss.so as it already
does its own caching of LDAP requests.
(See https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/deployment_guide/usingnscd-sssd)
Because nscd caching is now also interferring with libnss_systemd.so
and probably also with other nsss modules, lets just pre-emptively
disable caching for now for all options related to users and groups,
but keep it for caching hosts ans services lookups.
Note that we can not just put in /etc/nscd.conf:
enable-cache passwd no
As this will actually cause glibc to _not_ forward the call to nscd
at all, and thus never reach the nss modules. Instead we set
the negative and positive cache ttls to 0 seconds as a workaround.
This way, Glibc will always forward requests to nscd, but results
will never be cached.
Fixes #50273
2018-11-13 16:28:37 +01:00
|
|
|
positive-time-to-live group 0
|
|
|
|
negative-time-to-live group 0
|
2007-01-12 00:55:25 +01:00
|
|
|
suggested-size group 211
|
|
|
|
check-files group yes
|
2007-01-23 14:44:41 +01:00
|
|
|
persistent group no
|
2007-01-12 00:55:25 +01:00
|
|
|
shared group yes
|
|
|
|
|
2018-11-16 15:08:01 +01:00
|
|
|
enable-cache netgroup yes
|
|
|
|
positive-time-to-live netgroup 0
|
|
|
|
negative-time-to-live netgroup 0
|
|
|
|
suggested-size netgroup 211
|
|
|
|
check-files netgroup yes
|
|
|
|
persistent netgroup no
|
|
|
|
shared netgroup yes
|
|
|
|
|
2007-01-12 00:55:25 +01:00
|
|
|
enable-cache hosts yes
|
|
|
|
positive-time-to-live hosts 600
|
2018-11-14 12:19:58 +01:00
|
|
|
negative-time-to-live hosts 0
|
2007-01-12 00:55:25 +01:00
|
|
|
suggested-size hosts 211
|
|
|
|
check-files hosts yes
|
|
|
|
persistent hosts no
|
|
|
|
shared hosts yes
|
2018-11-16 15:03:00 +01:00
|
|
|
|
|
|
|
enable-cache services yes
|
|
|
|
positive-time-to-live services 0
|
|
|
|
negative-time-to-live services 0
|
|
|
|
suggested-size services 211
|
|
|
|
check-files services yes
|
|
|
|
persistent services no
|
|
|
|
shared services yes
|