a409fd64abcf67159a69eba7971231e0901b4e8c |
|
23-Jan-2018 |
Sumit Bose <sbose@redhat.com> |
pam_sss: password change with two factor authentication
If two factor authentication is enforced both authentication factors are
needed to update or change the long term password. This means that
during the PAM chauthok operation it has to be determined if two factor
authentication is enable for the user and the user must be prompted
accordingly.
Typically in the first step of the chauthok operation (PAM_PRELIM_CHECK)
the current password is verified before asking the user for a new
password. With two factor authentication this has to be skipped because
the one-time factor would then be invalid to authenticate the actual
password change.
Related to https://pagure.io/SSSD/sssd/issue/3585
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
06c2300353faf3983e38fecb1d6afe1f6cc8fe32 |
|
13-Nov-2017 |
Sumit Bose <sbose@redhat.com> |
pam: add prompt string for certificate authentication
A new certificate attribute is added which contains a string which is
used in the certificate selection list displayed to the user. The
Subject-DN of the certificate is used here because it is present in all
certificate and in general differs for certificate with different usage.
libsss_certmap is used to extract the subject-DN from the certificate
and convert it into a string.
Related to https://pagure.io/SSSD/sssd/issue/3560
Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com>
Tested-by: Scott Poore <spoore@redhat.com> |
122830e67472390b41edc73f0cfcd5c5705b726b |
|
13-Nov-2017 |
Sumit Bose <sbose@redhat.com> |
pam_sss: refactoring, use struct cert_auth_info
Similar as in the PAM responder this patch replaces the individual
certificate authentication related attributes by a struct which can be
used as a list. With the pam_sss can handle multiple SSS_PAM_CERT_INFO
message and place the data in individual list items.
If multiple certificates are returned before prompting for the PIN a
dialog to select a certificate is shown to the users. If available a GDM
PAM extension is used to let the user choose from a list. All coded
needed at runtime to check if the extension is available and handle the
data is provided by GDM as macros. This means that there are no
additional run-time requirements.
Related to https://pagure.io/SSSD/sssd/issue/3560
Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com>
Tested-by: Scott Poore <spoore@redhat.com> |
818d01b4a0d332fff06db33c0c985b8c0f1417c7 |
|
13-Jun-2017 |
Lukas Slebodnik <lslebodn@redhat.com> |
pam_sss: Fix leaking of memory in case of failures
Found by coverity.
Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com> |
c62dc2ac02253e130991db0f6acd60ce1a2753f1 |
|
05-Jun-2017 |
Lukas Slebodnik <lslebodn@redhat.com> |
pam_sss: Fix checking of empty string cert_user
src/sss_client/pam_sss.c: In function ‘eval_response’:
src/sss_client/pam_sss.c:998:64: error: comparison between pointer and zero character constant [-Werror=pointer-compare]
if (type == SSS_PAM_CERT_INFO && pi->cert_user == '\0') {
^~
src/sss_client/pam_sss.c:998:50: note: did you mean to dereference the pointer?
if (type == SSS_PAM_CERT_INFO && pi->cert_user == '\0') {
^
src/sss_client/pam_sss.c:1010:42: error: comparison between pointer and zero character constant [-Werror=pointer-compare]
&& pi->cert_user != '\0') {
^~
src/sss_client/pam_sss.c:1010:28: note: did you mean to dereference the pointer?
&& pi->cert_user != '\0') {
Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com> |
a192a1d72e92dae3e71e062b333e51a5095a0395 |
|
01-Jun-2017 |
Sumit Bose <sbose@redhat.com> |
pam_sss: add support for SSS_PAM_CERT_INFO_WITH_HINT
The new response type SSS_PAM_CERT_INFO_WITH_HINT is equivalent to
SSS_PAM_CERT_INFO but tells pam_sss to prompt for an option user name as
well.
Resolves:
https://pagure.io/SSSD/sssd/issue/3395
Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com> |
6dd271fdcf6ceb0afd77e703c98897672da3671a |
|
02-Mar-2017 |
Sumit Bose <sbose@redhat.com> |
pam: use authtok from PAM stack if available
With this patch the behavior of pam_sss is slightly changed to be more
similar to the behavior of other PAM modules. Currently pam_sss expects
that there is a authtok (password) on the PAM stack if the
'use_first_pass' option was used. Without the option pam_sss
unconditionally prompts for credentials.
With this patch pam_sss will use an authtok from the PAM stack even if
'use_first_pass' is not set but it will assume that it is a password. To
return to the previous behavior the new 'prompt_always' can be used.
Resolves:
https://pagure.io/SSSD/sssd/issue/2984
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
52f45837ded98564968da42229b37db6a36ad627 |
|
23-Feb-2017 |
Sumit Bose <sbose@redhat.com> |
pam: enhance Smartcard authentication token
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
ead25e32c52c8c2f5fd9abd179e9e81de58f9ca3 |
|
23-Feb-2017 |
Sumit Bose <sbose@redhat.com> |
p11: return name of PKCS#11 module and key id to pam_sss
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
327a16652bbafbb77b5b90cc7abac3ded7c14364 |
|
23-Feb-2017 |
Sumit Bose <sbose@redhat.com> |
PAM: fix memory leak in pam_sss
Since there can be multiple rounds trips between the PAM client and SSSD
it might be possible that the same data is send multiple times by SSSD.
So before overriding the old data it should be freed. I've seen this
with the domain name which is send both in the pre-auth and the auth
responses. To be on the safe side I added free() for some other items as
well.
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
0965a77c4ff0b358d24582955cb7ae375ebaa0d2 |
|
22-Feb-2017 |
Sumit Bose <sbose@redhat.com> |
pam_sss: check conversation callback
With this patch pam_sss checks if a conversation callback is available
before using it.
Resolves https://fedorahosted.org/sssd/ticket/3296
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
cbb0e683ff11d7800328da3991f3e75ef88f937f |
|
01-Feb-2017 |
Lukas Slebodnik <lslebodn@redhat.com> |
pam_sss: Suppress warning format-truncation
src/sss_client/pam_sss.c: In function ‘send_and_receive’:
src/sss_client/pam_sss.c:742:39: error: ‘%.*s’ directive output
between 0 and 18446744073709551615 bytes may cause result to exceed
‘INT_MAX’ [-Werror=format-truncation=]
ret = snprintf(user_msg, bufsize, "%s%s%.*s",
^~~~~~~~~~
sssd/src/sss_client/pam_sss.c:742:39: note: assuming directive output
of 4294967295 bytes
Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com> |
a8631161c47cbaefe7fd14b88202238bbdcc3dc8 |
|
19-Sep-2016 |
Sumit Bose <sbose@redhat.com> |
PAM: call free only when memory is expected to be allocated
Reborted by Coverity
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
35ba922bc51416f02877b53a6f25c04104ae5f03 |
|
16-Sep-2016 |
Sumit Bose <sbose@redhat.com> |
pam_sss: check PKCS11_LOGIN_TOKEN_NAME
Check if PKCS11_LOGIN_TOKEN_NAME is set and prompt the user if the
matching Smartcard is not inserted.
Related to https://fedorahosted.org/sssd/ticket/3165
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
78027feeb56d6fe216f699be86a4716aaef3f628 |
|
07-Jul-2016 |
Sumit Bose <sbose@redhat.com> |
PAM/KRB5: optional otp and password prompting
Depending on the available Kerberos pre-authentication methods pam_sss
will prompt the user for a password, 2 authentication factors or both.
Resolves https://fedorahosted.org/sssd/ticket/2988
Reviewed-by: Nathaniel McCallum <npmccallum@redhat.com>
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
325ed9f92f1ea1f348fd7913229faecf3dc1d40b |
|
09-Jun-2016 |
Sumit Bose <sbose@redhat.com> |
PAM: add pam_sss option allow_missing_name
With this option SSSD can be used with the gdm Smartcard feature.
Resolves:
https://fedorahosted.org/sssd/ticket/2941
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
957e0a8675359d90fa50067b704578d01f565bba |
|
14-Mar-2016 |
Sumit Bose <sbose@redhat.com> |
pam_sss: reorder pam_message array
There are different expectations about how the pam_message array is
organized, details can be found in the pam_conv man page. E.g. sudo was
not able to handle the Linux-PAM style but expected the Solaris PAM
style. With this patch both styles should work as expected.
Resolves https://fedorahosted.org/sssd/ticket/2971
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
11e8f3ecdddf8edd8b1bbe9f41b49ce8b709b92a |
|
31-Aug-2015 |
Petr Cech <pcech@redhat.com> |
UTIL: Function 2string for enum sss_cli_command
Improvement of debug messages.
Instead of:"(0x0400): Running command [17]..."
We could see:"(0x0400): Running command [17][SSS_NSS_GETPWNAM]..."
(It's not used in sss_client. There are only hex numbers of commands.)
Resolves:
https://fedorahosted.org/sssd/ticket/2708
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
5242964d275d0b2e96c9b0d1f8a9958c85d566fc |
|
31-Jul-2015 |
Sumit Bose <sbose@redhat.com> |
pam_sss: add sc support
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
bf6c3f07d653d474da9e43b2b7cced57fc4ea069 |
|
08-May-2015 |
Sumit Bose <sbose@redhat.com> |
pam_sss: move message encoding into separate file
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
e5698314b87e147c0223d0d8bcac206733dfae8c |
|
08-May-2015 |
Sumit Bose <sbose@redhat.com> |
pam_sss: add pre-auth and 2fa support
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
bc052ea17d858c19f9cb9c9e2bc602e754f68831 |
|
08-May-2015 |
Sumit Bose <sbose@redhat.com> |
utils: add sss_authtok_[gs]et_2fa
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
50afd8b1dd782820fa31240e958df38c915ba5af |
|
26-Mar-2015 |
Lukas Slebodnik <lslebodn@redhat.com> |
pam_client: fix casting to const pointer
src/sss_client/pam_sss.c:1461:73:
error: cast from 'int **' to 'const void **' must have all
intermediate pointers const qualified to be safe [-Werror,-Wcast-qual]
pam_get_data(pamh, "pam_sss:password_expired_flag", (const void **) &exp_data);
^
Reviewed-by: Sumit Bose <sbose@redhat.com> |
cac22be9e58abdcf6c3bf66190fba0f7cb6f490e |
|
02-Mar-2015 |
Lukas Slebodnik <lslebodn@redhat.com> |
Remove useless assignment to function parameter
Reported by: cppcheck
void free_fun(struct info *info)
free(info->name);
free(info);
info = NULL;
^^^^^^^^^^^
Assignment to function parameter has no effect outside the function.
Reviewed-by: Pavel Reichl <preichl@redhat.com> |
e039f1aefecc65a7b3c2d4a13a612bff1dd367c8 |
|
23-Feb-2015 |
Pavel Reichl <preichl@redhat.com> |
PAM: new option pam_account_expired_message
This option sets string to be printed when authenticating using SSH
keys and account is expired.
Resolves:
https://fedorahosted.org/sssd/ticket/2050
Reviewed-by: Sumit Bose <sbose@redhat.com> |
a61d6d01a4e89ec14175af135e84f1cac55af748 |
|
23-Feb-2015 |
Pavel Reichl <preichl@redhat.com> |
PAM: do not reject abruptly
If account has expired then pass message.
Resolves:
https://fedorahosted.org/sssd/ticket/2050
Reviewed-by: Sumit Bose <sbose@redhat.com> |
134bff159119b0f62492133983ba637957e26fab |
|
13-Dec-2014 |
Jakub Hrozek <jhrozek@redhat.com> |
PAM: Missing argument to domains= should fail auth
When the administrator sets the domains= list, he usually wants to
restrict the set of domains. An empty list is an undefined configuration
and it's safer to fail then.
https://fedorahosted.org/sssd/ticket/2516
Reviewed-by: Pavel Reichl <preichl@redhat.com> |
2368a0fc19bcd56581eccd8397289e4513a383a5 |
|
07-Nov-2014 |
Lukas Slebodnik <lslebodn@redhat.com> |
PAM: Remove authtok from PAM stack with OTP
We remove the password from the PAM stack when OTP is used to make sure
that other pam modules (pam-gnome-keyring, pam_mount) cannot use it anymore
and have to request a password on their own.
Resolves:
https://fedorahosted.org/sssd/ticket/2287
Reviewed-by: Nathaniel McCallum <npmccallum@redhat.com> |
663fd9bcdcc6b299785ba3434532cd7e6c462bff |
|
29-Sep-2014 |
Daniel Gollub <dgollub at brocade.com> |
PAM: Add domains= option to pam_sss
Design document:
https://fedorahosted.org/sssd/wiki/DesignDocs/RestrictDomainsInPAM
Fixes:
https://fedorahosted.org/sssd/ticket/1021
Signed-off-by: Pavel Reichl <preichl@redhat.com>
Reviewed-by: Sven-Thorsten Dietrich <sven@brocade.com>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
93760585cc6a9b403ede0211f517adfba713d5c9 |
|
09-Jul-2014 |
Lukas Slebodnik <lslebodn@redhat.com> |
PAM: Test right variable after calling sss_atomic_read_s
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
ffa42f689dded74b0c0b0451bff3516bc4003179 |
|
03-Jun-2014 |
Lukas Slebodnik <lslebodn@redhat.com> |
PAM: add ignore_authinfo_unavail option
Resolves:
https://fedorahosted.org/sssd/ticket/2232
Reviewed-by: Sumit Bose <sbose@redhat.com> |
683e1f67d08be7165ea456d4594c4c8a4eddc9b3 |
|
03-Jun-2014 |
Lukas Slebodnik <lslebodn@redhat.com> |
PAM: Define compatible macros for some functions.
Functions pam_vsyslog and pam_modutil_getlogin are not available in openpam.
This patch conditionally define macros for these function if they are not
available. Compatible macros use standard functions vsyslog, getlogin
Reviewed-by: Sumit Bose <sbose@redhat.com> |
81d6673764c4e2f635482be1efd52eba3ab5a27f |
|
03-Jun-2014 |
Lukas Slebodnik <lslebodn@redhat.com> |
PAM: Include header file security/pam_appl.h
We need this file for declaration of pam functions
pam_get_item, pam_putenv, pam_set_data, pam_strerror, pam_set_item
There is already test in configure script for this header file,
but it was not included in pam_sss.c
sh-4.2$ git grep pam_appl.h
src/external/pam.m4:AC_CHECK_HEADERS([security/pam_appl.h ...
src/providers/data_provider_be.c:#include <security/pam_appl.h>
src/providers/proxy/proxy.h:#include <security/pam_appl.h>
src/providers/proxy/proxy_child.c:#include <security/pam_appl.h>
src/responder/pam/pamsrv.h:#include <security/pam_appl.h>
src/sss_client/pam_test_client.c:#include <security/pam_appl.h>
src/util/auth_utils.h:#include <security/pam_appl.h>
Reviewed-by: Sumit Bose <sbose@redhat.com> |
a4b2352c97053c79fd0d78d0dd647beed69b17e5 |
|
18-May-2014 |
Lukas Slebodnik <lslebodn@redhat.com> |
PAM: macro PAM_DATA_REPLACE isn't available in openpam.
This part was introduced in commit dba7903ba7fc04bc331004b0453938c116be3663
"PAM: close socket fd with pam_set_data"
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
3983d81f461a4f17736a516eb595f54df4bf4336 |
|
26-Mar-2014 |
Jakub Hrozek <jhrozek@redhat.com> |
KRB5: Do not attempt to get a TGT after a password change using OTP
https://fedorahosted.org/sssd/ticket/2271
The current krb5_child code attempts to get a TGT for the convenience of
the user using the new password after a password change operation.
However, an OTP should never be used twice, which means we can't perform
the kinit operation after chpass is finished. Instead, we only print a
PAM information instructing the user to log out and back in manually.
Reviewed-by: Alexander Bokovoy <abokovoy@redhat.com> |
d987dba42894aceff106d557b13812092028cc29 |
|
14-Mar-2014 |
Pete Fritchman <pfritchman@fxcm.com> |
PAM: add ignore_unknown_user option
https://fedorahosted.org/sssd/ticket/2232
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
441c0f5e1e05db77c62f3281525345ff322b0a65 |
|
07-Mar-2014 |
Lukas Slebodnik <lslebodn@redhat.com> |
PAM: Test return value of strdup
Warnings reported by Coverity (12463,12464)
Dereferencing a pointer that might be null pi->pam_authtok when calling strlen.
Dereferencing a pointer that might be null action when calling strncmp.
Reviewed-by: Stephen Gallagher <sgallagh@redhat.com> |
88ca28caa4675026d4ab222c9e4ef635da57f610 |
|
24-Jan-2014 |
Lukas Slebodnik <lslebodn@redhat.com> |
CLIENT: Remove unused macros
PAM_SM_AUTH, PAM_SM_ACCOUNT, PAM_SM_SESSION, PAM_SM_PASSWORD
I cannot find in git history where these macro were used. |
a171d77f40aa92e240e91aa4bafe5a392a98b5a2 |
|
03-Dec-2013 |
Michal Zidek <mzidek@redhat.com> |
sss_client: Use SAFEALIGN_COPY_<type> macros where appropriate.
resolves:
https://fedorahosted.org/sssd/ticket/1359 |
0bc28fce13b2e6616892d71a55b7765b8b7b7e74 |
|
15-Nov-2013 |
Michal Zidek <mzidek@redhat.com> |
sss_client: Use SAFEALIGN_SETMEM_<type> macros where appropriate.
https://fedorahosted.org/sssd/ticket/1359 |
8445e39d8e154523b1c39ce701830dacef51d1e9 |
|
12-Oct-2012 |
Jakub Hrozek <jhrozek@redhat.com> |
PAM: fix handling the client fd in pam destructor
* Protect the fd with a mutex when closing
* Set it to a safe value after closing |
dba7903ba7fc04bc331004b0453938c116be3663 |
|
11-Oct-2012 |
Jakub Hrozek <jhrozek@redhat.com> |
PAM: close socket fd with pam_set_data
https://fedorahosted.org/sssd/ticket/1569 |
300c772767c1b12077cac1d148ac89738b058f97 |
|
27-Jul-2012 |
Jan Zeleny <jzeleny@redhat.com> |
Write SELinux config files in responder instead of PAM module |
7016947229edcaa268a82bf69fde37e521b13233 |
|
27-Jul-2012 |
Jan Zeleny <jzeleny@redhat.com> |
Move SELinux processing from session to account PAM stack
The idea is to rename session provider to selinux provider. Processing
of SELinux rules has to be performed in account stack in order to ensure
that pam_selinux (which is the first module in PAM session stack) will
get the correct input from SSSD.
Processing of account PAM stack is bound to access provider. That means
we need to have two providers executed when SSS_PAM_ACCT_MGMT message
is received from PAM responder. Change in data_provider_be.c ensures
just that - after access provider finishes its actions, the control is
given to selinux provider and only after this provider finishes is the
result returned to PAM responder. |
42ea38d7d06673bf6dc16ccfbd19e27f0a696b28 |
|
15-Jun-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
SSS_CLIENT: Fix uninitialized value error
This would cause a crash if we jump to the done: label before it
has been allocated. |
1268a628a26a21efabeb97d2619933d1c1b2d979 |
|
14-Jun-2012 |
Jan Zeleny <jzeleny@redhat.com> |
Provide "service filter" for SELinux context
At this moment we will support only asterisk, designating "all
services".
https://fedorahosted.org/sssd/ticket/1360 |
95cc95749a5e783f2b5d2124d783f85820baf937 |
|
22-May-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
Always use positional arguments in translatable strings
https://fedorahosted.org/sssd/ticket/1336 |
3c6a4eead4e9186d0ea2e9ac7092f1a7a9e0bf6d |
|
02-May-2012 |
Jakub Hrozek <jhrozek@redhat.com> |
PAM_SSS: report error code if write fails
clang had reported this as "value of ret is never used", I think it
would be nice to report a meaningful error message. |
9d7d4458d94d0aac0a7edf999368eb18f89cb76a |
|
20-Apr-2012 |
Jakub Hrozek <jhrozek@redhat.com> |
Convert read and write operations to sss_atomic_read
https://fedorahosted.org/sssd/ticket/1209 |
a330324ee6a4ea148b56c7bd8c2cecadb3230968 |
|
18-Apr-2012 |
Jakub Hrozek <jhrozek@redhat.com> |
pam_sss: improve error handling in SELinux code |
8d821f0508f495deb376617c165cbcbf396a058a |
|
23-Feb-2012 |
Simo Sorce <simo@redhat.com> |
pam_sss: keep selinux optional
Signed-off-by: Stephen Gallagher <sgallagh@redhat.com> |
5c8f19954c49a738b825d8752d25baf752723bea |
|
13-Feb-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
Fix missing NULL check after malloc
Coverity #12528 |
264bbfed9f2cdb05d9e017e9e3307f37edb4c1da |
|
06-Feb-2012 |
Jan Zeleny <jzeleny@redhat.com> |
SELinux support in PAM module |
a63aee266c6d41216c606c2efa459f9477875cc7 |
|
08-Dec-2011 |
Jan Zeleny <jzeleny@redhat.com> |
Fixed incorrect return code in PAM client
The original return code when SSSD was not running was system_err, now
it is authinfo_unavail.
https://fedorahosted.org/sssd/ticket/1011 |
ac3a1f3da772cf101101c31675c63dc3549b21b5 |
|
22-Nov-2011 |
Jakub Hrozek <jhrozek@redhat.com> |
Cleanup: Remove unused parameters |
1f6ef3004e260f0cbad79f61c42200b5f737fd91 |
|
20-Sep-2011 |
Pavel Březina <pbrezina@redhat.com> |
Added quiet option to pam_sss
https://fedorahosted.org/sssd/ticket/894 |
0fc334e130cb3ca30c29c2f5d8c378393ad0d072 |
|
23-May-2011 |
Stephen Gallagher <sgallagh@redhat.com> |
Import config.h earlier
On RHEL 5 and other older platforms, failing to set _GNU_SOURCE
early would cause some functions - such as strndup() - to be
unavailable. |
324fb26ba803a999bedc29e93c46c84f27abf5b7 |
|
23-May-2011 |
Sumit Bose <sbose@redhat.com> |
Set _GNU_SOURCE globally |
66e691ceeee4cca739fc2606f1b357bbff4a3440 |
|
11-Feb-2011 |
Simo Sorce <ssorce@redhat.com> |
Use neutral name for functions used by both pam and nss |
1b36cbb287b53fca6b0070f1e2ca0e3f1f56946b |
|
17-Dec-2010 |
Simo Sorce <ssorce@redhat.com> |
Fix wrong test in pam_sss |
3da2609d20eb5cbb05f212e13baa040bf7cf02fa |
|
16-Dec-2010 |
Stephen Gallagher <sgallagh@redhat.com> |
Fix segfault for PAM_TEXT_INFO conversations |
ad6c0f29d78f2ce5d84d5e3d80e56152eac1b9d4 |
|
15-Dec-2010 |
Sumit Bose <sbose@redhat.com> |
Fix possible memory leak in do_pam_conversation
https://fedorahosted.org/sssd/ticket/731 |
e404ac6b8c5b78a102e20320133706f5efa66b12 |
|
14-Dec-2010 |
Sumit Bose <sbose@redhat.com> |
Fix improper bit manipulation in pam_sss
https://fedorahosted.org/sssd/ticket/715 |
1ebddb7c2498f715f108b8721fa5fc8d4892e14d |
|
15-Nov-2010 |
Stephen Gallagher <sgallagh@redhat.com> |
Fix cast warning for pam_sss.c |
4b498111c49b254e9aa5e2b0d4fcc1ba24a04236 |
|
15-Nov-2010 |
Sumit Bose <sbose@redhat.com> |
Avoid long long in messages to PAM client use int64_t |
06247775aa9c49ffce72827921eb45e2d04c6aa1 |
|
10-Jun-2010 |
Stephen Gallagher <sgallagh@redhat.com> |
Properly handle read() and write() throughout the SSSD
We need to guarantee at all times that reads and writes complete
successfully. This means that they must be checked for returning
EINTR and EAGAIN, and all writes must be wrapped in a loop to
ensure that they do not truncate their output. |
e5196fd7da44e4ae04ab8b5d2e7191167762cf0b |
|
09-Jun-2010 |
Sumit Bose <sbose@redhat.com> |
Add a missing free() |
cd08e2f935f70ea884520793588b43ad8114465a |
|
09-Jun-2010 |
Sumit Bose <sbose@redhat.com> |
Avoid a potential double-free |
06c03627c81a5252420931383a68eb67ba551667 |
|
26-May-2010 |
Sumit Bose <sbose@redhat.com> |
Handle Krb5 password expiration warning |
3f70f0c29b85f2c3f660f5cb99f2854cc8c62c21 |
|
07-May-2010 |
Sumit Bose <sbose@redhat.com> |
Add retry option to pam_sss |
347c98433b0b12701fd8e8db6858bf7841845234 |
|
07-May-2010 |
Jakub Hrozek <jhrozek@redhat.com> |
Improve the offline authentication message |
cd13aab316d57c353df99962eba2fbaf13f5430f |
|
30-Apr-2010 |
Sumit Bose <sbose@redhat.com> |
Fix wrong return value
If there was a failure during a password change a wrong return value was
send back to the PAM stack. |
bd290f62727b8903d889705a9d129ee6c9d62bc9 |
|
26-Apr-2010 |
Sumit Bose <sbose@redhat.com> |
Display a message if a password reset by root fails |
b843b55b1565176d9f27554d89e5e041b34c0dcf |
|
26-Apr-2010 |
Sumit Bose <sbose@redhat.com> |
Unset authentication tokens if password change fails |
ea0173fe8ba915960621454168651c62301833cb |
|
16-Apr-2010 |
Sumit Bose <sbose@redhat.com> |
Use SO_PEERCRED on the PAM socket
This is the second attempt to let the PAM client and the PAM responder
exchange their credentials, i.e. uid, gid and pid. Because this approach
does not require any message interchange between the client and the
server the protocol version number is not changed.
On the client side the connection is terminated it the responder is not
run by root. On the server side the effective uid and gid and the pid of
the client are available for future use.
The following additional changes are made by this patch:
- the checks of the ownership and the permissions on the PAM sockets are
enhanced
- internal error codes are introduced on the client side to generate
more specific log messages if an error occurs |
80c8a4f94d54b23bce206fdd75ff2648977ce271 |
|
25-Mar-2010 |
Stephen Gallagher <sgallagh@redhat.com> |
Allow arbitrary-length PAM messages
The PAM standard allows for messages of any length to be returned
to the client. We were discarding all messages of length greater
than 255. This patch dynamically allocates the message buffers so
we can pass the complete message.
This resolves https://fedorahosted.org/sssd/ticket/432 |
dfc511c1226786cebbda35990bb7149dea5577b5 |
|
22-Mar-2010 |
Ralf Haferkamp <rhafer@suse.de> |
Improvements for LDAP Password Policy support
Display warnings about remaining grace logins and password
expiration to the user, when LDAP Password Policies are used.
Improved detection if LDAP Password policies are supported by
LDAP Server. |
dcf257af0cc0ba8bb9d4ec2b311e5548459f6e72 |
|
15-Mar-2010 |
Ralf Haferkamp <rhafer@suse.de> |
Prompt for old password even when running as root
When changing an expired password (during e.g. login) the PAM module needs
to prompt for the old password even when running as root. |
ea38c85d4de7515fd946704c6dd56bb99198f033 |
|
15-Mar-2010 |
Ralf Haferkamp <rhafer@suse.de> |
Warn user about an expired password |
07a2e0b66a1c4688825e07fa88d37886fec4770c |
|
04-Mar-2010 |
George McCollister <georgem@novatech-llc.com> |
Define _GNU_SOURCE in pam_sss.c.
_GNU_SOURCE needs to be defined when using strndup.
Signed-off-by: George McCollister <georgem@novatech-llc.com> |
7343ee3d775303845e2528c676c59ef3582d6b27 |
|
23-Feb-2010 |
Sumit Bose <sbose@redhat.com> |
Handle expired passwords like other PAM modules
So far we handled expired password during authentication. Other PAM
modules typically detect expired password during account management and
return PAM_NEW_AUTHTOK_REQD if the password is expired and should be
changed. The PAM library then calls the change password routines. To
meet these standards pam_sss is change accordingly.
As a result it is now possible to update an expired password via ssh if
sssd is running with PasswordAuthentication=yes. One drawback due to
limitations of PAM is that the user now has to type his current password
again before setting a new one. |
ba8937d83675c7d69808d1d3df8f823afdc5ce2a |
|
18-Feb-2010 |
Stephen Gallagher <sgallagh@redhat.com> |
Fix licensing issues for sss_client |
1c48b5a62f73234ed26bb20f0ab345ab61cda0ab |
|
18-Feb-2010 |
Stephen Gallagher <sgallagh@redhat.com> |
Rename server/ directory to src/
Also update BUILD.txt |