summaryrefslogtreecommitdiffstats
path: root/server/responder/pam
Commit message (Collapse)AuthorAgeFilesLines
* Supress warnings with -O2Jakub Hrozek2010-02-181-2/+1
|
* Make return values more specific during password changeSumit Bose2010-02-101-34/+52
| | | | | | | - return PAM_AUTHTOK_ERR instead of PAM_SYSTEM_ERR if the password change operation fails - send a message to the user if the system is offline and the password cannot be changed
* Send a message to the user if the login is delayedSumit Bose2010-02-101-3/+24
|
* Added option to use libcrypto instead of NSS.George McCollister2010-02-051-1/+1
| | | | | | | | | | | | crypto_sha512crypt.c is a clone of nss_sha512crypt.c with the exception that all usage of NSS and related libraries has been switched to libcrypto. I renamed nss_sha512crypt.h to sha512crypt.h since it is common to both crypto_sha512crypt.c and nss_sha512crypt.c. Note that the random number generator is not seeded manually and thus relies on seeding done automatically by libcrypto. On some systems without /dev/urandom seeding may not be performed. See http://www.openssl.org/docs/crypto/RAND_add.html. Signed-off-by: George McCollister <georgem@novatech-llc.com>
* Warn the user if authentication happens offlineSumit Bose2010-02-021-1/+19
|
* Add offline failed login counterSumit Bose2010-02-021-6/+7
|
* Avoid 'PAM' at the beginning of define and enum namesSumit Bose2010-02-012-17/+17
|
* Fix size error on 64-bit systemsStephen Gallagher2010-01-251-1/+1
|
* Pointers to non 32 bit aligned data were being cast to uint32_t *George McCollister2010-01-221-8/+10
| | | | | | | | uint32_t pointers must point to 32 bit aligned data on ARM. Instead of padding the data to force it into alignment I altered the code to memcpy the data to an aligned location. I'd appreciate any and all feedback especially on whether I took the best approach. pam_test_client auth and pam_test_client acct now work on my armeb-xscale-linux-gnueabi target. Signed-off-by: George McCollister <georgem@opteron.novatech-llc.com>
* Fix a double free bugSumit Bose2010-01-201-3/+0
|
* Add sysdb request to authenticate against a cached passwordSumit Bose2010-01-204-216/+59
| | | | | | | | | The code for authentication against a cached password is moved from the pam responder to a generic sysdb tevent request. The new code can be used by other components of sssd to verify passwords on their own. Tests for the sysdb_cache_password and sysdb_cache_auth request are added and some unneeded or unused code and variables are removed.
* Fix broken password changes for local usersStephen Gallagher2009-12-181-1/+6
|
* Handle chauthtok with PAM_PRELIM_CHECK separatelySumit Bose2009-12-181-0/+6
| | | | | | If pam_sm_chauthtok is called with the flag PAM_PRELIM_CHECK set we generate a separate call to the sssd to validate the old password before asking for a new password and sending the change password request.
* Speed up user requests while offlineStephen Gallagher2009-11-231-3/+5
| | | | | | | | | This adds a new boolean option to sss_dp_send_acct_req() called fast_reply. If we make a request to the backends and we are currently offline, this option will determine whether we should immediately return from the cache (acceptable for NSS requests) or potentially wait for an online check to complete (required for PAM requests).
* Change the pam code to perform an initgroups callSimo Sorce2009-11-181-1/+1
| | | | | | An initgroups call refreshes both the user and the user's groups, this is ideal for pam so that we don't need addiotnal initgroups calls (initgroups calls are cached too now) during the login process.
* Fix segfault on unknown user/domainStephen Gallagher2009-11-091-2/+2
|
* Fix tevent_req error checking.Simo Sorce2009-11-091-6/+1
| | | | When possible using a macro that correctly deals with tstate
* Move responsibility for entry expiration timeoutSimo Sorce2009-10-271-7/+4
| | | | | The providers are now responsible for determining how long a cached entry is considered valid. The default is the same as before (600s)
* Fix segfaultSimo Sorce2009-10-271-1/+1
| | | | | | Fix copy/paste error that picked up the wrong request structure to pass down. This was causing the talloc code that checks for the right signature to fail and abort as the 2 request structures have different state structures attacched.
* Use standard coding practice to set last loginSimo Sorce2009-10-261-90/+128
| | | | | | | | | This rewrite should also fix a segfault in the code that may happen when exiting in case of error conditions. The previous code was attaching the transaction handle to llreq structure and then calling prepare_reply() from within the request handlers which could ultimately free the preq and llreq and handle before the transaction request was actually completed by tevent.
* Add support for offline auth cache timeoutStephen Gallagher2009-10-224-3/+192
| | | | | | | | | This adds a new option (offline_credentials_expiration) to the [PAM] section of the sssd.conf If the user does not perform an online authentication within the timeout (in days), they will be denied auth once the timeout passes.
* Add pam_ctx (similar to nss_ctx) for storing global PAM configStephen Gallagher2009-10-222-5/+25
|
* Remove two unused functions.Stephen Gallagher2009-10-151-10/+0
| | | | | | These functions were used when reconnecting to the DP after losing the connection. Since there is no DP any longer, there's no reason to have these functions.
* Fix offline authenticationSimo Sorce2009-10-151-16/+3
| | | | | | | | The way we were processing errors from the provider caused offline authentication to stop working. Previously the problem was masked by a bug in the data provider that always returned "Success" for any operation no matter what the actual return code was. when DP got removed the bug became evident.
* Remove DP processSimo Sorce2009-10-092-22/+27
| | | | | Turn the backend process into data provider servers Make Frontends (pam, nss) directly attach to the backends
* Remove unused btreemap codeStephen Gallagher2009-10-061-1/+0
| | | | | We have converted to using dhash in place of btreemap everywhere in the code.
* Send debug messages to logfileJakub Hrozek2009-09-251-1/+3
| | | | | | | | | | | | | Introduces a new option --debug-to-files which makes SSSD output its debug information to a file instead of stderr, which is still the default. Also introduces a new confdb option debug_to_files which does the same, but can be specified per-service in the config file. The logfiles are stored in /var/log/sssd by default. Changes the initscript to log to files by default.
* Upgrade confdb to version 2Stephen Gallagher2009-09-251-5/+4
| | | | | This converts a great many configuration options to the new standard format.
* Revert "Use syslog for logging error conditions in SSSD"Stephen Gallagher2009-09-235-22/+14
| | | | | | | | This reverts commit 8c50bd085c0efe5fde354deee2c8118887aae29d. Amended: commit 1016af2b1b97ad4290ccce8fa462cc7e3c191b2e also made use of the SYSLOG_ERROR() macro, so those portions of that code also needed to be reverted.
* Use syslog for logging error conditions in SSSDJakub Hrozek2009-09-215-14/+22
| | | | | This is just a band-aid until ELAPI is fully functional and ready to use.
* make cli_pid mandatory and increase version number of pam protocolSumit Bose2009-09-141-1/+25
|
* Let the PAM client send its PIDSumit Bose2009-09-141-0/+19
| | | | | | - the client sends the PID as uint32_t and sssd will use uint32_t too - fix a possible type issue where a uint32_t is sent as int32 in internal dbus communication
* Add copyright noticesJakub Hrozek2009-09-111-0/+21
| | | | Fixes: #138
* Split database in multiple filesSimo Sorce2009-09-083-5/+41
| | | | | The special persistent local database retains the original name. All other backends now have their own cache-NAME.ldb file.
* Fix reconnection codeSimo Sorce2009-08-174-48/+57
| | | | | | | Remove redundant reconnection code that was interfeering with the sbus reconnection code. Consolidate include files for sbus relates operations. Make pamsrv code similar to nsssrv code.
* Refactor responder_dp.cStephen Gallagher2009-08-141-6/+6
| | | | | | Many of the functions in responder_dp.c were originally NSS- specific and were moved there from the NSS responder code. Since they are now generic to any responder, rename them to sss_dp_*
* Change the why DP clients identifySimo Sorce2009-08-113-53/+16
| | | | Mirrors what we have done with the monitor.
* Change services identification mechanismSimo Sorce2009-08-111-72/+5
| | | | | | | Let services identify themselves voiluntarily as the first operation instead of polling from the monitor. Also consolidate some common functions and make them available as monitor helpers.
* Make child processes exit when parent diesJakub Hrozek2009-08-111-0/+6
| | | | | | | | The child processes call prctl() and when their parent process is killed, they are sent SIGTERM using prctl. This is currently Linux-specific, for non-Linuxes, a similar effect is achieved by catching a set of common termination signals and sending SIGTERM to the process group.
* Make socket paths a compile-time optionStephen Gallagher2009-08-111-1/+0
| | | | | | Previously, we had hardcoded the paths for the NSS, PAM and private PAM sockets to /var/lib/sss/pipes. With this patch, we will specify the sockets with --with-pipe-path.
* Simplify interfaces initializationSimo Sorce2009-08-103-30/+37
| | | | | | | Make as much as possible static, and remove use of talloc_reference and allocation/deallocation of memory when not necessary. Fix also responder use of rctx->conn, was mistakenly used for both monitor and dp connections.
* Cosmetic changesSimo Sorce2009-08-102-21/+21
| | | | | Rationalize and rename connection names in preparatoin for merging of server and connection structures.
* Remove redundant memory contextsSimo Sorce2009-08-102-5/+5
| | | | Simplify code by removing stuff that is never used or redundant.
* Address CVE-2009-2410Stephen Gallagher2009-07-291-1/+1
| | | | Fix incorrect error code return in local_handler_callback
* Implement resInit for monitor, NSS, PAM, DP and the backendsStephen Gallagher2009-07-201-0/+20
|
* Rework transaction code to use tevent_reqSimo Sorce2009-07-031-31/+84
| | | | | | This is part of a set of patches to rewrite sysdb to a hopefully better API, that will also let use use tevent_req async style calls to manipulate our cache.
* Rename sysdb_req to sysdb_handle.Simo Sorce2009-07-032-12/+6
| | | | | | | | | This sysdb_req has always really been a transaction handle and not a request. This is part of a set of patches to rewrite transaction support in sysdb to a hopefully better API, that will also let use use tevent_req async style to manipulate our cache.
* check pending_return after dbus_connection_send_with_replySumit Bose2009-07-021-1/+1
|
* added kerberos backend with tevent_req event handlingSumit Bose2009-07-021-1/+19
|
* fix detection of authentication against LOCAL domainSumit Bose2009-06-081-3/+9
|