4a9c1047354dbe5a4ed41e5951ae623e3772e113 |
|
29-Jan-2018 |
René Genz <liebundartig@freenet.de> |
Fix minor spelling mistakes in providers/*
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
20d18db36096e3fa2636143a83a12a2e3a7f26d6 |
|
10-Nov-2017 |
Fabiano Fidêncio <fidencio@redhat.com> |
LDAP: Improve error treatment from sdap_cli_connect() in ldap_auth
Because we weren't treating the errors coming from
sdap_cli_connect_recv() properly we ended up introducing a regression in
the commit add72860c7, related to offline authentication.
From now on, let's properly treat errors coming from auth_connect_send(),
which were treated before by going offline when be_resolve_server_recv()
failed, and propagate ETIMEDOUT to the request, thus going offline and
allowing offline authentication on those cases.
Related:
https://pagure.io/SSSD/sssd/issue/3451
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
Reviewed-by: Sumit Bose <sbose@redhat.com> |
add72860c7a7a2c418f4d8b6790b5caeaf7dfb7b |
|
03-Nov-2017 |
Fabiano Fidêncio <fidencio@redhat.com> |
LDAP: Bind to the LDAP server also in the auth
When dealing with id_provider not being the same as auth_provider, SSSD
has to bind the DN of the user which wants to authenticate with the
ldap_default_bind_dn and the password provided by the user.
In order to do so, the least intrusive way is just by replacing
sdap_connect*() functions by sdap_cli_connect*() functions in the LDAP's
auth module.
The simple change also allowed us to remove some code that is already
executed as part of sdap_cli_connect*() and some functions had their
names adapted to reflect better their new purpose.
Resolves:
https://pagure.io/SSSD/sssd/issue/3451
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
Reviewed-by: Sumit Bose <sbose@redhat.com> |
f70d946f8cde55b6bdc09345e22849842bca4387 |
|
23-Feb-2017 |
Sumit Bose <sbose@redhat.com> |
LDAP/proxy: tell frontend that Smartcard auth is not supported
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
b4c6060b10b14257e6f01038ae44e46c5a429f33 |
|
30-Aug-2016 |
Lukas Slebodnik <lslebodn@redhat.com> |
PROXY: Use right name in ldap filter
We used internal fq name in ldap filter
with id_provider proxy to files and auth provider
ldap
[sssd[be[LDAP]]] [sdap_get_generic_ext_step]
(0x0400): calling ldap_search_ext with
[(&(uid=testuser1@ldap)(objectclass=posixAccount))][dc=example,dc=com].
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
565e6dc434eec865c73ad1d0b61f86f5538dff01 |
|
08-Aug-2016 |
Petr Cech <pcech@redhat.com> |
LDAP: Fixing wrong pam error code for passwd
This patch adds right pam error code for sssd offline state.
Resolves:
https://fedorahosted.org/sssd/ticket/3109 |
dea636af4d1902a081ee891f1b19ee2f8729d759 |
|
20-Jun-2016 |
Pavel Březina <pbrezina@redhat.com> |
DP: Switch to new interface
Reviewed-by: Sumit Bose <sbose@redhat.com>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
ff275f4c0b8cc1a098dbd0c5f6d52d6a93cda597 |
|
17-Feb-2016 |
Pavel Reichl <preichl@redhat.com> |
SDAP: Add return code ERR_ACCOUNT_LOCKED
Add code to distinquish state when account is locked in Active
Directory server.
Tested against Windows Server 2012
This patch is best effort only as decision whether account is actually
locked is based on parsing error message returned by AD. The format and
content of this error message might be subject of change in future
releases and also can be modified by AD administrators.
If account is locked bind operation is expected to return following
error message:
-----------------------------------------------------------------------
Invalid credentials(49), 80090308: LdapErr: DSID-0C0903C5, comment:
AcceptSecurityContext error, data 775, v23f0
-----------------------------------------------------------------------
Where sub string 'data 775' implies that account is locked
(ERROR_ACCOUNT_LOCKED_OUT) [1]. However the 80090308 (error code
0x80090308, SEC_E_INVALID_TOKEN) is the only guaranteed part of error
string [2].
Error message is described in further detail as [3]:
-----------------------------------------------------------------------
When the server fails an LDAP operation with an error, and the server
has sufficient resources to compute a string value for the errorMessage
field of the LDAPResult, it includes a string in the errorMessage field
of the LDAPResult (see [RFC2251] section 4.1.10). The string contains
further information about the error.
The first eight characters of the errorMessage string are a 32-bit
integer, expressed in hexadecimal. Where protocol specifies the extended
error code "<unrestricted>" there is no restriction on the value of the
32-bit integer. It is recommended that implementations use a Windows
error code for the 32-bit integer in this case in order to improve
usability of the directory for clients. Where protocol specifies an
extended error code which is a Windows error code, the 32-bit integer is
the specified Windows error code. Any data after the eighth character
is strictly informational and used only for debugging. Conformant
implementations need not put any value beyond the eighth character of
the errorMessage field.
-----------------------------------------------------------------------
[1] https://msdn.microsoft.com/en-us/library/windows/desktop/ms681386%28v=vs.85%29.aspx
[2] https://social.msdn.microsoft.com/Forums/en-US/e1d600c8-60b7-4ed0-94cb-20ddd6c1a1c6/msadts-user-locking-password-policies?forum=os_windowsprotocols
[3] MS-ADTS 3.1.1.3.1.9
https://msdn.microsoft.com/en-us/library/cc223253.aspx
Resolves:
https://fedorahosted.org/sssd/ticket/2839
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Alexander Bokovoy <abokovoy@redhat.com>
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
10c07e188323a2f9824b5e34379f3b1a9b37759e |
|
23-Oct-2015 |
Jakub Hrozek <jhrozek@redhat.com> |
FO: Use refcount to keep track of servers returned to callers
Resolves:
https://fedorahosted.org/sssd/ticket/2829
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
1f2fc55ecf7b5e170b2c0752304d1a2ecebc5259 |
|
15-Jul-2015 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: Add sdap_lookup_type enum
Related:
https://fedorahosted.org/sssd/ticket/2553
Change the boolan parameter of sdap_get_users_send and sdap_get_groups_send
to a tri-state that controls whether we expect only a single entry
(ie don't use the paging control), multiple entries with a search limit
(wildcard request) or multiple entries with no limit (enumeration).
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
450c2b78ff0bd5044c4c73f32ca8459b211dd446 |
|
08-Apr-2015 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: Set sdap handle as explicitly connected in LDAP auth
In case SSSD is set with id_provider=proxy and auth_provider=ldap, the
LDAP provider is not used to retrieve the user info with the
higher-level calls, but the lower-level connection establishment is used
instead. In this case, we need to make sure to mark the connection as
explicitly connected to be notified about results of looking up the DN.
Resolves:
https://fedorahosted.org/sssd/ticket/2620
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
0ec41ab7d3fbb021967de16ea000c69dcedf7cb5 |
|
23-Mar-2015 |
Pavel Reichl <preichl@redhat.com> |
ldap: refactor check_pwexpire_kerberos to use util func
Refactor check_pwexpire_kerberos() to use utility function
sss_utc_to_time_t().
Modify test to handle new error code ERR_TIMESPEC_NOT_SUPPORTED
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
f0072e2b102f3b553533402d4ae42b1989b0370e |
|
23-Mar-2015 |
Jakub Hrozek <jhrozek@redhat.com> |
SDAP: Make password change timeout configurable with ldap_opt_timeout
Related:
https://fedorahosted.org/sssd/ticket/1501
Reviewed-by: Pavel Reichl <preichl@redhat.com> |
b123a618dd8837f8a2db385542f0d7f3d7679d9b |
|
23-Mar-2015 |
Jakub Hrozek <jhrozek@redhat.com> |
SDAP: Make simple bind timeout configurable
Resolves:
https://fedorahosted.org/sssd/ticket/1501
Reuse the value of sdap_opt_timeout to set a longer bind timeout for
user authentication, ID connection authentication and authentication
during IPA migration mode.
Reviewed-by: Pavel Reichl <preichl@redhat.com> |
c9b0071bfcb8eb8c71e40248de46d23aceecc0f3 |
|
03-Mar-2015 |
Pavel Reichl <preichl@redhat.com> |
SDAP: enable change phase of pw expire policy check
Implement new option which does checking password expiration policy
in accounting phase.
This allows SSSD to issue shadow expiration warning even if alternate
authentication method is used.
Resolves:
https://fedorahosted.org/sssd/ticket/2167
Reviewed-by: Sumit Bose <sbose@redhat.com> |
cdaa29d2c5724a4c72bfa0f42284ccfac3d5a464 |
|
03-Mar-2015 |
Pavel Reichl <preichl@redhat.com> |
SDAP: refactor pwexpire policy
Move part of pwexpire policy code to a separate function.
Relates to:
https://fedorahosted.org/sssd/ticket/2167
Reviewed-by: Sumit Bose <sbose@redhat.com> |
06ba69972e6728f97f5adbcc3cc4df811a831f53 |
|
22-Aug-2014 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: Do not shortcut on ret != EOK during password expiry check
https://fedorahosted.org/sssd/ticket/2323
The functions that check for password expiration can return non-zero
return codes not only on internal failure, but also to indicate that the
password was expired. The code would in this case shortcut in the error
handler instead of making its way to the switch-case code below that
translates the SSSD error codes into PAM error codes.
We don't lose the error reporting, because any internal error would
translate into PAM_SYSTEM_ERROR anyway.
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
80c092f94a7ac24ea00e560201e37ae27cfbf665 |
|
26-May-2014 |
Lukas Slebodnik <lslebodn@redhat.com> |
LDAP: Don't use macro _XOPEN_SOURCE for extra features
We defined macro _XOPEN_SOURCE before time.h, because we need function strptime
The problem is with undef after including header time.h
The macro _XOPEN_SOURCE can be defined on some platforms
and undef can cause problems.
We detect all necessary feature macros in configure script
using AC_USE_SYSTEM_EXTENSIONS or AC_GNU_SOURCE.
It is better to include header file config.h
instead of defining macro _XOPEN_SOURCE
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
83bf46f4066e3d5e838a32357c201de9bd6ecdfd |
|
12-Feb-2014 |
Nikolai Kondrashov <Nikolai.Kondrashov@redhat.com> |
Update DEBUG* invocations to use new levels
Use a script to update DEBUG* macro invocations, which use literal
numbers for levels, to use bitmask macros instead:
grep -rl --include '*.[hc]' DEBUG . |
while read f; do
mv "$f"{,.orig}
perl -e 'use strict;
use File::Slurp;
my @map=qw"
SSSDBG_FATAL_FAILURE
SSSDBG_CRIT_FAILURE
SSSDBG_OP_FAILURE
SSSDBG_MINOR_FAILURE
SSSDBG_CONF_SETTINGS
SSSDBG_FUNC_DATA
SSSDBG_TRACE_FUNC
SSSDBG_TRACE_LIBS
SSSDBG_TRACE_INTERNAL
SSSDBG_TRACE_ALL
";
my $text=read_file(\*STDIN);
my $repl;
$text=~s/
^
(
.*
\b
(DEBUG|DEBUG_PAM_DATA|DEBUG_GR_MEM)
\s*
\(\s*
)(
[0-9]
)(
\s*,
)
(
\s*
)
(
.*
)
$
/
$repl = $1.$map[$3].$4.$5.$6,
length($repl) <= 80
? $repl
: $1.$map[$3].$4."\n".(" " x length($1)).$6
/xmge;
print $text;
' < "$f.orig" > "$f"
rm "$f.orig"
done
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Stephen Gallagher <sgallagh@redhat.com>
Reviewed-by: Simo Sorce <simo@redhat.com> |
a3c8390d19593b1e5277d95bfb4ab206d4785150 |
|
12-Feb-2014 |
Nikolai Kondrashov <Nikolai.Kondrashov@redhat.com> |
Make DEBUG macro invocations variadic
Use a script to update DEBUG macro invocations to use it as a variadic
macro, supplying format string and its arguments directly, instead of
wrapping them in parens.
This script was used to update the code:
grep -rwl --include '*.[hc]' DEBUG . |
while read f; do
mv "$f"{,.orig}
perl -e \
'use strict;
use File::Slurp;
my $text=read_file(\*STDIN);
$text=~s#(\bDEBUG\s*\([^(]+)\((.*?)\)\s*\)\s*;#$1$2);#gs;
print $text;' < "$f.orig" > "$f"
rm "$f.orig"
done
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Stephen Gallagher <sgallagh@redhat.com>
Reviewed-by: Simo Sorce <simo@redhat.com> |
17f9255e08337876fd8c1c1342111ca14d1c89c4 |
|
27-Nov-2013 |
Lukas Slebodnik <lslebodn@redhat.com> |
Remove unused parameter from get_user_dn |
0a08bd9e9410639f9aaa62134a1977a3d5c30e52 |
|
20-Nov-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: Search for original DN during auth if it's missing
Resolves: https://fedorahosted.org/sssd/ticket/2077
If during the LDAP authentication we find out that the originalDN to
bind as is missing (because the ID module is not LDAP based), we can try
to look up the user from LDAP without saving him just in order to
receive the originalDN. |
d115f40c7a3999e3cbe705a2ff9cf0fd493f80fb |
|
15-Nov-2013 |
Michal Zidek <mzidek@redhat.com> |
SYSDB: Drop the sysdb_ctx parameter - module sysdb_ops (part 2) |
b3292840ebaa747a9fd596ff47cc5d18198361d0 |
|
15-Nov-2013 |
Michal Zidek <mzidek@redhat.com> |
SYSDB: Drop the sysdb_ctx parameter from the sysdb_search module |
937928d1161a4f7bd894cb365ada97569ab0f78f |
|
11-Sep-2013 |
Lukas Slebodnik <lslebodn@redhat.com> |
Fix formating of variables with type: time_t |
57cd3443dcb7c073c5a00a9f2c3c3a3030ae2d3e |
|
11-Sep-2013 |
Lukas Slebodnik <lslebodn@redhat.com> |
Fix formating of variables with type: long |
86c985481c2fdb1d8996a77576b12bff431c18d5 |
|
11-Aug-2013 |
Michal Zidek <mzidek@redhat.com> |
ldap, krb5: More descriptive msg on chpass failure.
Print more descriptive message when wrong current password
is given during password change operation.
resolves:
https://fedorahosted.org/sssd/ticket/2029 |
1e7275d3f075973f868c480dbfbe1219c1885585 |
|
01-Jul-2013 |
Jim Collins <github@collins-fam.com> |
ldap: only update shadowLastChange when password change is successful
https://fedorahosted.org/sssd/ticket/1999
ldap_auth.c code which was added to SSSD for updating the
shadowLastChange when "ldap_chpass_update_last_change" option is
enabled updates shadowLastChange even when the PAM password change
status reports failure.
We should only update shadowLastChange on PAM password change success or
we open up a work around for users to avoid changing their passwords
periodically as required by policy. The user simply attempts to change
password, fails by trying to set new password which invalid (denied due
to password history check) yet shadowLastChange is updated, avoiding
their need to actually change the password they are using. |
4ada3948dd888e7d95831a377bff3f8608cd778b |
|
02-May-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
Display the last grace warning, too
Due to a comparison error, the last warning when an LDAP password was in
its grace period was never displayed.
https://fedorahosted.org/sssd/ticket/1890 |
9acfb09f7969a69f58bd45c856b01700541853ca |
|
02-Apr-2013 |
Lukas Slebodnik <lslebodn@redhat.com> |
Making the authtok structure really opaque.
Definition of structure sss_auth_token was removed from header file
authtok.h and there left only declaration of this structure.
Therefore only way how to use this structure is to use accessory function from
same header file.
To creating new empty authotok can only be used newly created function
sss_authtok_new(). TALLOC context was removed from copy and setter functions,
because pointer to stuct sss_auth_token is used as a memory context.
All declaration of struct sss_auth_token variables was replaced with
pointer to this structure and related changes was made in source code.
Function copy_pam_data can copy from argument src which was dynamically
allocated with function create_pam_data() or zero initialized struct pam_data
allocated on stack.
https://fedorahosted.org/sssd/ticket/1830 |
233a3c6c48972b177e60d6ef4cecfacd3cf31659 |
|
19-Mar-2013 |
Simo Sorce <simo@redhat.com> |
Use common error facility instead of sdap_result
Simplifies and consolidates error reporting for ldap authentication paths.
Adds 3 new error codes:
ERR_CHPASS_DENIED - Used when password constraints deny password changes
ERR_ACCOUNT_EXPIRED - Account is expired
ERR_PASSWORD_EXPIRED - Password is expired |
cbaba2f47da96c4191971bce86f03afb3f88864a |
|
21-Jan-2013 |
Simo Sorce <simo@redhat.com> |
Add be_req_get_data() helper funciton.
In preparation for making struct be_req opaque. |
03abdaa21ecf562b714f204ca42379ff08626f75 |
|
21-Jan-2013 |
Simo Sorce <simo@redhat.com> |
Add be_req_get_be_ctx() helper.
In preparation for making be_req opaque |
8e5549e453558d4bebdec333a93e215d5d6ffaec |
|
21-Jan-2013 |
Simo Sorce <simo@redhat.com> |
Introduce be_req_terminate() helper
Call it everywhere instead of directly dereferencing be_req->fn
This is in preparation of making be_req opaque. |
ccc2af010bbbe6d8a7496fb717216135bc4c1993 |
|
21-Jan-2013 |
Simo Sorce <simo@redhat.com> |
Remove domain from be_req structure |
df0596ec12bc5091608371e2977f3111241e8caf |
|
21-Jan-2013 |
Simo Sorce <simo@redhat.com> |
Remove sysdb as a be context structure member
The sysdb context is already available through the 'domain' structure. |
777f5bc1fb5f2ba4267de83843beee51090eb8d5 |
|
15-Jan-2013 |
Simo Sorce <simo@redhat.com> |
Add domain argument to sysdb_cache_password() |
5d78919c955c945e78865f322726aac075c71203 |
|
15-Jan-2013 |
Simo Sorce <simo@redhat.com> |
Add domain argument to sysdb_get_user_attr() |
64af76e2bef2565caa9738f675c108a4b3789237 |
|
10-Jan-2013 |
Simo Sorce <simo@redhat.com> |
Change pam data auth tokens.
Use the new authtok abstraction and interfaces throught the code. |
da7ed242898bafe5d84d4dd2b4253d20e4105516 |
|
15-Dec-2012 |
Pavel Březina <pbrezina@redhat.com> |
let ldap_chpass_uri failover work when using same hostname
https://fedorahosted.org/sssd/ticket/1699
We want to continue with the next server on all errors, not only
on ETIMEDOUT.
This particullar ticket was dealing with ECONNREFUSED. |
6230ee6822dd61f3591c3c502047b338f09b3292 |
|
02-Dec-2012 |
Pavel Březina <pbrezina@redhat.com> |
warn user if password is about to expire
https://fedorahosted.org/sssd/ticket/1638
If pwd_exp_warning == 0, expiry warning should be printed if it is
returned by server.
If pwd_exp_warning > 0, expiry warning should be printed only if
the password will expire in time <= pwd_exp_warning.
ppolicy->expiry contains period in seconds after which the password
expires. Not the exact timestamp. Thus we should not add 'now' to
pwd_exp_warning. |
d25e7c659361ebd794ef011dc9305543f266e8c4 |
|
13-Sep-2012 |
Jakub Hrozek <jhrozek@redhat.com> |
FO: Check server validity before setting status
The list of resolved servers is allocated on the back end context and
kept in the fo_service structure. However, a single request often
resolves a server and keeps a pointer until the end of a request and
only then gives feedback about the server based on the request result.
This presents a big race condition in case the SRV resolution is used.
When there are requests coming in in parallel, it is possible that an
incoming request will invalidate a server until another request that
holds a pointer to the original server is able to give a feedback.
This patch simply checks if a server is in the list of servers
maintained by a service before reading its status.
https://fedorahosted.org/sssd/ticket/1364 |
5c3054fbdec7bd82ab4feb2c605139fd53c8743e |
|
05-Sep-2012 |
Jakub Hrozek <jhrozek@redhat.com> |
Retry the next server if bind during LDAP auth times out |
bf8cce77a35cb0a3cdb0d21fb9c39b7b6372bc11 |
|
04-May-2012 |
Jan Zeleny <jzeleny@redhat.com> |
Modify behavior of pam_pwd_expiration_warning
New option pwd_expiration_warning is introduced which can be set per
domain and can override the value specified by the original
pam_pwd_expiration_warning.
If the value of expiration warning is set to zero, the filter isn't
apllied at all - if backend server returns the warning, it will be
automatically displayed.
Default value for Kerberos: 7 days
Default value for LDAP: don't apply the filter
Technical note: default value when creating the domain is -1. This is
important so we can distinguish between "no value set" and 0. Without
this possibility it would be impossible to set different values for LDAP
and Kerberos provider. |
606d2d03833903f00d40f9810d4dccd04a752e76 |
|
08-Mar-2012 |
Jakub Hrozek <jhrozek@redhat.com> |
Detect cycle in the fail over on subsequent resolve requests only |
b300bad539e9a9ad7f3a88dc91253afff0425cb6 |
|
06-Mar-2012 |
Jakub Hrozek <jhrozek@redhat.com> |
Only do one cycle when resolving a server
https://fedorahosted.org/sssd/ticket/1214 |
c9750312bfb4196b49ba6f91b26489f630958452 |
|
06-Feb-2012 |
Jan Zeleny <jzeleny@redhat.com> |
Update shadowLastChanged attribute during LDAP password change
https://fedorahosted.org/sssd/ticket/1019 |
ac3a1f3da772cf101101c31675c63dc3549b21b5 |
|
22-Nov-2011 |
Jakub Hrozek <jhrozek@redhat.com> |
Cleanup: Remove unused parameters |
4a6a5421113ab662a665c62ed6a24b61a5a36950 |
|
28-Sep-2011 |
Jakub Hrozek <jhrozek@redhat.com> |
Multiline macro cleanup
This is mostly a cosmetic patch.
The purpose of wrapping a multi-line macro in a do { } while(0) is to
make the macro usable as a regular statement, not a compound statement.
When the while(0) is terminated with a semicolon, the do { } while(0);
block becomes a compound statement again. |
cd5b718ebeab1c923af7a5c3c0a5c717c5659c7d |
|
06-Sep-2011 |
Jakub Hrozek <jhrozek@redhat.com> |
Improve error message for LDAP password constraint violation
https://fedorahosted.org/sssd/ticket/985 |
24a5dc6614f3bd834d1b82c19cca8d3adc6a7653 |
|
25-Aug-2011 |
Sumit Bose <sbose@redhat.com> |
Improve password policy error code and message
Instead of returning PAM_SYSTEM_ERR if they necessary attributes for the
requested password policy cannot be found we return PAM_PERM_DENIED.
Additionally the log message says that the access is denied. |
e79d23932ef9d52cf4eb32ddec2d0a9b3af9a9eb |
|
15-Aug-2011 |
Jan Zeleny <jzeleny@redhat.com> |
sysdb refactoring: memory context deleted
This patch deletes memory context parameter in those places in sysdb
where it is not necessary. The code using modified functions has been
updated. Tests updated as well. |
8a1738f9379a1b8fb5c95c3df649e014ff5a1434 |
|
15-Aug-2011 |
Jan Zeleny <jzeleny@redhat.com> |
sysdb refactoring: deleted domain variables in sysdb API
The patch also updates code using modified functions. Tests have also
been adjusted. |
e96c468ed06c3378e2aee6992dabe926d79e1a2d |
|
30-Jun-2011 |
Sumit Bose <sbose@redhat.com> |
Use ldap_init_fd() instead of ldap_initialize() if available |
a950b3f31ec88e40e40a28e0902baf92a6b57e03 |
|
17-Jun-2011 |
Sumit Bose <sbose@redhat.com> |
Do not check pwdAttribute
It is not safe to check pwdAttribute to see if server side password
policies are active. Only if a LDAP_CONTROL_PASSWORDPOLICYRESPONSE is
present the bind response we can assume that there is a server side
password policy. |
df33bc1ede96f57f2b8be1fa6f8a1f7451bf051f |
|
08-Apr-2011 |
Jakub Hrozek <jhrozek@redhat.com> |
Fix unchecked return values of pam_add_response
https://fedorahosted.org/sssd/ticket/798 |
cc2b267e14db7073e7247b52cc9d82dfdf280076 |
|
16-Feb-2011 |
Stephen Gallagher <sgallagh@redhat.com> |
Do not attempt to use START_TLS on SSL connections
Not all LDAP servers are capable of handling dual-encryption with
both TLS and SSL.
https://fedorahosted.org/sssd/ticket/795 |
a1af9beb915e96da634b7d17762bf42146104d45 |
|
27-Jan-2011 |
Stephen Gallagher <sgallagh@redhat.com> |
Add option to disable TLS for LDAP auth
Option is named to discourage use in production environments and
is intentionally not listed in the SSSDConfig API. |
2fac679ce284b21bd49b4241f0b9e5a5db1bd0c6 |
|
19-Jan-2011 |
Sumit Bose <sbose@redhat.com> |
Fix return value check |
33b8fa8693df109fb33b6051bb29cb0cf5bc4d19 |
|
06-Dec-2010 |
Sumit Bose <sbose@redhat.com> |
Add ldap_chpass_uri config option |
39875788b552ed157e68156e64e95dda5dc6aa43 |
|
06-Dec-2010 |
Sumit Bose <sbose@redhat.com> |
Make string_to_shadowpw_days() public |
488f1784198a0a8775d7f5bb9e960d80a833ba73 |
|
19-Nov-2010 |
Sumit Bose <sbose@redhat.com> |
Fix offline detection for LDAP auth/chpass |
ab45f99d35fdcf952ba56014a433bc814c56df8c |
|
04-Oct-2010 |
Stephen Gallagher <sgallagh@redhat.com> |
Return offline instead of error
When the failover code returns that there are no available servers
while we are marked offline, we were returning an error to the PAM
authentication code. Instead, we should return success with a
result value of SDAP_UNAVAIL so that the PAM responder will mark
the domain offline and attempt offline authentication. |
8262914f885b34a3a845327f59bd70b91ad0d561 |
|
24-Aug-2010 |
Stephen Gallagher <sgallagh@redhat.com> |
Treat a zero-length password as a failure
Some LDAP servers allow binding with blank passwords. We should
not allow a blank password to authenticate the SSSD. |
d317aeeeffca33aa79ae5ce0a5692d54970ffaf6 |
|
04-Aug-2010 |
Stephen Gallagher <sgallagh@redhat.com> |
Fix chpass operations with LDAP provider
The initial verification of the old password was returning an
error because we were not explicitly setting dp_err to
DP_ERR_SUCCESS and it was initialized earlier in the function to
DP_ERR_FATAL. |
96a6aa73a6ea0982b349ac10b82aaf86d03ec5f5 |
|
07-May-2010 |
Sumit Bose <sbose@redhat.com> |
Add more warnings about nearly expired passwords
For the shadow and mit_kerberos password policy warnings are sent to the
client if the password is about to expire. |
2d54b2a56b83315b3f89e082f8bf89fe8132a685 |
|
07-May-2010 |
Jakub Hrozek <jhrozek@redhat.com> |
Use all available servers in LDAP provider |
bd290f62727b8903d889705a9d129ee6c9d62bc9 |
|
26-Apr-2010 |
Sumit Bose <sbose@redhat.com> |
Display a message if a password reset by root fails |
08d9d10747da6900971cdd8fced05ca66f5111e2 |
|
12-Apr-2010 |
Simo Sorce <ssorce@redhat.com> |
sysdb: convert sysdb_get_user_attr |
bb0b6b4e39242577f60729fbcbd9e46e7a7af30d |
|
12-Apr-2010 |
Simo Sorce <ssorce@redhat.com> |
sysdb: convert sysdb_cache_password |
7c837ddd5b1737b56fc475f7e347efdb067e2330 |
|
25-Mar-2010 |
Sumit Bose <sbose@redhat.com> |
Fix warnings from -Wmissing-field-initializers
This patch removes some tab-indentations from pamsrv.c, too. |
dfc511c1226786cebbda35990bb7149dea5577b5 |
|
22-Mar-2010 |
Ralf Haferkamp <rhafer@suse.de> |
Improvements for LDAP Password Policy support
Display warnings about remaining grace logins and password
expiration to the user, when LDAP Password Policies are used.
Improved detection if LDAP Password policies are supported by
LDAP Server. |
b4c01ab6d58519431f2c88deec14e0371233eeef |
|
15-Mar-2010 |
Ralf Haferkamp <rhafer@suse.de> |
Fixed authentication check for CHAUTHTOK_PRELIM
When changing passwords, treat SDAP_AUTH_PW_EXPIRED as a successful
authentication in SSS_PAM_CHAUTHTOK_PRELIM. |
7343ee3d775303845e2528c676c59ef3582d6b27 |
|
23-Feb-2010 |
Sumit Bose <sbose@redhat.com> |
Handle expired passwords like other PAM modules
So far we handled expired password during authentication. Other PAM
modules typically detect expired password during account management and
return PAM_NEW_AUTHTOK_REQD if the password is expired and should be
changed. The PAM library then calls the change password routines. To
meet these standards pam_sss is change accordingly.
As a result it is now possible to update an expired password via ssh if
sssd is running with PasswordAuthentication=yes. One drawback due to
limitations of PAM is that the user now has to type his current password
again before setting a new one. |
1c48b5a62f73234ed26bb20f0ab345ab61cda0ab |
|
18-Feb-2010 |
Stephen Gallagher <sgallagh@redhat.com> |
Rename server/ directory to src/
Also update BUILD.txt |