7e394400eefd0e7c5ba0c64ab3fa28bee21ef2d7 |
|
28-Nov-2016 |
Sumit Bose <sbose@redhat.com> |
krb5: Use command line arguments instead env vars for krb5_child
Resolves:
https://fedorahosted.org/sssd/ticket/697
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
fedfb7c62b4efa89d18d0d3a7895a2a34ec4ce42 |
|
08-Sep-2016 |
Jakub Hrozek <jhrozek@redhat.com> |
KRB5: Send the output username, not internal fqname to krb5_child
krb5_child calls krb5_kuserok() during the access phase which checks if
a particular user is allowed to authenticate as a particular principal.
We used to pass the internal fqname to krb5_kuserok() which broke the
functionality and all users were denied access.
This patch changes that to send the 'output' username to krb5_child,
because that's the username the system receives through getpwnam() or
getpwuid() anyway. The patch also adds a new structure member fo the
krb5child_req structure to avoid reusing the pd->user variable but have
an explicit one that serves as the input for the child process.
Resolves:
https://fedorahosted.org/sssd/ticket/3172
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
dea636af4d1902a081ee891f1b19ee2f8729d759 |
|
20-Jun-2016 |
Pavel Březina <pbrezina@redhat.com> |
DP: Switch to new interface
Reviewed-by: Sumit Bose <sbose@redhat.com>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
cc2d77d5218c188119fa954c856e858cbde76947 |
|
20-Jun-2016 |
Pavel Březina <pbrezina@redhat.com> |
Rename dp_backend.h to backend.h
Reviewed-by: Sumit Bose <sbose@redhat.com>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
01ec08efd0e166ac6f390f8627c6d08dcc63ccc4 |
|
06-Jul-2015 |
Jakub Hrozek <jhrozek@redhat.com> |
KRB5: Add and use krb5_auth_queue_send to queue requests by default
Resolves:
https://fedorahosted.org/sssd/ticket/2701
Previously, only the krb5 provides used to queue requests, which
resulted in concurrent authentication requests stepping on one another.
This patch queues requests by default.
Reviewed-by: Sumit Bose <sbose@redhat.com> |
aa8a8318aaa3270e9d9957d0c22dec6342360a37 |
|
28-May-2015 |
Pavel Reichl <preichl@redhat.com> |
krb5: new option krb5_map_user
New option `krb5_map_user` providing mapping of ID provider names to
Kerberos principals.
Resolves:
https://fedorahosted.org/sssd/ticket/2509
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
9696ce0c9ff737c873ddbf54fab91355d71e8698 |
|
14-May-2015 |
Pavel Reichl <preichl@redhat.com> |
krb5: remove field run_as_user
run_as_user is set set but never read.
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
45aeb924ec3ac448bb8d174a5cc061ed98b147c7 |
|
18-Nov-2014 |
Jakub Hrozek <jhrozek@redhat.com> |
KRB5: Move ccache-related functions to krb5_ccache.c
Add a new module krb5_ccache.c that contains all ccache-related
operations. The only user of this module shall be krb5_child.c as the
other modules will run unprivileged and accessing the ccache requires
either privileges of root or the ccache owner.
Related:
https://fedorahosted.org/sssd/ticket/2370
Reviewed-by: Sumit Bose <sbose@redhat.com>
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
d20a5a74666413cadbf64c02eb656a5a3b4bb1de |
|
09-Sep-2013 |
Simo Sorce <simo@redhat.com> |
krb5: Remove unused ccache backend infrastructure
Remove struct sss_krb5_cc_be and the remaining functions that reference
it as they are all unused now.
Resolves:
https://fedorahosted.org/sssd/ticket/2061 |
fa4a9c4afcc0c62a693034e21f33356e64735687 |
|
25-Jun-2013 |
Sumit Bose <sbose@redhat.com> |
krb5: do not send pac for IPA users from the local domain
So far we didn't send the PAC of IPA users to the PAC responder during
password authentication because group memberships for IPA users can be
retrieved efficiently with LDAP calls. Recently patches added PAC
support for the AD provider as well and removed the restriction for the
IPA users. This patch restores the original behaviour by introducing a
new flag in struct krb5_ctx which is only set for the IPA provider.
Additionally a different flag is renamed to make it's purpose more
clear.
Fixes https://fedorahosted.org/sssd/ticket/1995 |
b40583c6d52b72e41bf01106534535e54b4fba4f |
|
08-Mar-2013 |
Nathaniel McCallum <npmccallum@redhat.com> |
Add support for krb5 1.11's responder callback.
krb5 1.11 adds support for a new method for responding to
structured data queries. This method, called the responder,
provides an alternative to the prompter interface.
This patch adds support for this method. It takes the password
and provides it via a responder instead of the prompter. In the
case of OTP authentication, it also disables the caching of
credentials (since the credentials are one-time only). |
7baccb545ac9829b7e1990f45ff6f70e2de55c2a |
|
04-Dec-2012 |
Simo Sorce <simo@redhat.com> |
Fix tevent_req style for krb5_auth
No functionality changes,
just make the code respect the tevent_req style and naming conventions
and enhance readability by adding some helper functions. |
964628ab89229e9266adc5f4f8a26222734788b7 |
|
26-Oct-2012 |
Sumit Bose <sbose@redhat.com> |
Use find_or_guess_upn() where needed |
d3dca30d3a6feba062d0299718d1a9fcdc8b9d17 |
|
26-Oct-2012 |
Sumit Bose <sbose@redhat.com> |
krb5_child: send back the client principal
In general Kerberos is case sensitive but the KDC of Active Directory
typically handles request case in-sensitive. In the case where we guess
a user principal by combining the user name and the realm and are not
sure about the cases of the letters used in the user name we might get a
valid ticket from the AD KDC but are not able to access it with the
Kerberos client library because we assume a wrong case.
The client principal in the returned credentials will always have the
right cases. To be able to update the cache user principal name the
krb5_child will return the principal for further processing. |
83f24636ef8d3d2b9c5be46272781ed5e0497ca7 |
|
26-Oct-2012 |
Sumit Bose <sbose@redhat.com> |
krb5_auth: check if principal belongs to a different realm
Add a flag if the principal used for authentication does not belong
to our realm. This can be used to act differently for users from other
realms. |
fd8595874aa06c8057740001ec465ba76b4af142 |
|
14-Jun-2012 |
Jakub Hrozek <jhrozek@redhat.com> |
Add a credential cache back end structure
To be able to add support for new credential cache types easily, this
patch creates a new structure sss_krb5_cc_be that defines common
operations with a credential cache, such as create, check if used or remove. |
7b14a9e64fd248103149eb1cb422ee752d91ba58 |
|
14-Jun-2012 |
Jakub Hrozek <jhrozek@redhat.com> |
Split parse_krb5_child_response so it can be reused
krb5-child-test will be another consumer. It also makes the code more
readable by splitting a huge function. |
87c07559af5cfcd2752295ef7c425bd3205f426f |
|
19-Dec-2011 |
Stephen Gallagher <sgallagh@redhat.com> |
Move child_common routines to util |
7d436b1bd6bcca29aa9874adc11bdfb862139cd8 |
|
20-Dec-2010 |
Sumit Bose <sbose@redhat.com> |
Serialize requests of the same user in the krb5 provider |
589dd0f6600515926e4e514442c62366db0a62b3 |
|
20-Dec-2010 |
Sumit Bose <sbose@redhat.com> |
Fixes for automatic ticket renewal
- do not recreate the ccache file when renewing the TGT
- use user principal name as hash key instead of ccfile name
- let krb5_child return Kerberos error codes |
f3f9ce8024d7610439d6c70ddafab1ab025cf8a8 |
|
03-Dec-2010 |
Sumit Bose <sbose@redhat.com> |
Add support for automatic Kerberos ticket renewal |
b87233035e26cee919dcf46adaec29ba7fdaa51e |
|
04-Nov-2010 |
Sumit Bose <sbose@redhat.com> |
Make handle_child_* request public
I took the opportunity to move everything related to the handling of the
krb5_child into a separate file and cleaned the interfaces and related
structures a bit. |
fab9c6a75eaf09e4f5440f4bb530c26009b0ffc7 |
|
04-Nov-2010 |
Sumit Bose <sbose@redhat.com> |
Make krb5_setup() public |
1e29e68388c2e9c5da9cb0afe997bc1b4e6933be |
|
04-Nov-2010 |
Sumit Bose <sbose@redhat.com> |
Add infrastructure for Kerberos access provider |
f520e7a2f4fe29747f25118621e20b0d89d296fc |
|
14-Jun-2010 |
Jakub Hrozek <jhrozek@redhat.com> |
Remove krb5_changepw_principal option
Fixes: #531 |
6126d57239edc0ed0fac8082e00cd4a685c0566d |
|
27-May-2010 |
Sumit Bose <sbose@redhat.com> |
Add callback to remove krb5 info files when going offline |
c2caac87520c2f5a7db764d4827d1ad4cadcb696 |
|
26-May-2010 |
Sumit Bose <sbose@redhat.com> |
Fix handling of ccache file when going offline
The ccache file was removed too early if system is offline but the
backend was not already marked offline. Now we remove the ccache file
only if the successfully got a new one and it is not the same as the old
one. |
02e38eae1b9cb5df2036a707dafd86f6047c17de |
|
26-May-2010 |
Sumit Bose <sbose@redhat.com> |
Add support for delayed kinit if offline
If the configuration option krb5_store_password_if_offline is set to
true and the backend is offline the plain text user password is stored
and used to request a TGT if the backend becomes online. If available
the Linux kernel key retention service is used. |
5f2593e24f565b202821329f1f9cb103241d80bb |
|
16-May-2010 |
Sumit Bose <sbose@redhat.com> |
Make Kerberos authentication a tevent_req
To allow other providers to include Kerberos authentication the main
part is put into a tevent request. |
5096bb4c2242b426aa6f5ea2cb82223e0b81a345 |
|
12-Mar-2010 |
Sumit Bose <sbose@redhat.com> |
Add krb5_kpasswd option |
29752834fbf3a19e4e117668abfce4e4c7c48ee4 |
|
11-Mar-2010 |
Sumit Bose <sbose@redhat.com> |
Add expandable sequences to krb5_ccachedir
As with krb5_ccname_template sequences like %u can be used in the
krb5_ccachedir parameter which are expanded at runtime. If the directory
does not exist, it will be created. Depending on the used sequences it
is created as a public or private directory. |
953e07b7c43bc9bb7c7616180b1ba1730e22c59a |
|
19-Feb-2010 |
Sumit Bose <sbose@redhat.com> |
Remove unneeded items from struct pam_data |
1c48b5a62f73234ed26bb20f0ab345ab61cda0ab |
|
18-Feb-2010 |
Stephen Gallagher <sgallagh@redhat.com> |
Rename server/ directory to src/
Also update BUILD.txt |