<feed xmlns='http://www.w3.org/2005/Atom'>
<title>freeipa.git/daemons/ipa-slapi-plugins, branch master</title>
<subtitle>Unnamed repository; edit this file 'description' to name the repository.</subtitle>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/pvoborni/public_git/freeipa.git/'/>
<entry>
<title>Add TOTP watermark support</title>
<updated>2014-07-25T08:41:17+00:00</updated>
<author>
<name>Nathaniel McCallum</name>
<email>npmccallum@redhat.com</email>
</author>
<published>2014-07-11T16:29:58+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/pvoborni/public_git/freeipa.git/commit/?id=d3638438fce1a9d1e07c2be3b8f43befb07a6b40'/>
<id>d3638438fce1a9d1e07c2be3b8f43befb07a6b40</id>
<content type='text'>
This prevents the reuse of TOTP tokens by recording the last token
interval that was used. This will be replicated as normal. However,
this patch does not increase the number of writes to the database
in the standard authentication case. This is because it also
eliminates an unnecessary write during authentication. Hence, this
patch should be write-load neutral with the existing code.

Further performance enhancement is desired, but is outside the
scope of this patch.

https://fedorahosted.org/freeipa/ticket/4410

Reviewed-By: Alexander Bokovoy &lt;abokovoy@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This prevents the reuse of TOTP tokens by recording the last token
interval that was used. This will be replicated as normal. However,
this patch does not increase the number of writes to the database
in the standard authentication case. This is because it also
eliminates an unnecessary write during authentication. Hence, this
patch should be write-load neutral with the existing code.

Further performance enhancement is desired, but is outside the
scope of this patch.

https://fedorahosted.org/freeipa/ticket/4410

Reviewed-By: Alexander Bokovoy &lt;abokovoy@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Add missing break</title>
<updated>2014-07-14T14:28:59+00:00</updated>
<author>
<name>Lukas Slebodnik</name>
<email>lslebodn@redhat.com</email>
</author>
<published>2014-07-12T16:28:38+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/pvoborni/public_git/freeipa.git/commit/?id=d1d253637535017fdf82aa833df742bb418bbf65'/>
<id>d1d253637535017fdf82aa833df742bb418bbf65</id>
<content type='text'>
Wrong error message would be used for in case of
RANGE_CHECK_DIFFERENT_TYPE_IN_DOMAIN. Missing break will cause fall through to
the default section.

Reviewed-By: Tomas Babej &lt;tbabej@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Wrong error message would be used for in case of
RANGE_CHECK_DIFFERENT_TYPE_IN_DOMAIN. Missing break will cause fall through to
the default section.

Reviewed-By: Tomas Babej &lt;tbabej@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix getkeytab code to always use implicit tagging.</title>
<updated>2014-06-27T08:03:23+00:00</updated>
<author>
<name>Simo Sorce</name>
<email>simo@redhat.com</email>
</author>
<published>2014-06-26T15:43:47+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/pvoborni/public_git/freeipa.git/commit/?id=d9d5967f7e1a11d77dee4bba00f10763b8ac2ec5'/>
<id>d9d5967f7e1a11d77dee4bba00f10763b8ac2ec5</id>
<content type='text'>
A mixture of implicit and explicit tagging was being used and this caused
a bug in retrieving the enctype number due to the way ber_scanf() loosely
treat sequences and explicit tagging.

The ASN.1 notation used to describe the getkeytab operation uses implicit
tagging, so by changing the code we simply follow to the specified encoding.

Resolves: https://fedorahosted.org/freeipa/ticket/4404

Signed-off-by: Simo Sorce &lt;simo@redhat.com&gt;
Reviewed-By: Alexander Bokovoy &lt;abokovoy@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
A mixture of implicit and explicit tagging was being used and this caused
a bug in retrieving the enctype number due to the way ber_scanf() loosely
treat sequences and explicit tagging.

The ASN.1 notation used to describe the getkeytab operation uses implicit
tagging, so by changing the code we simply follow to the specified encoding.

Resolves: https://fedorahosted.org/freeipa/ticket/4404

Signed-off-by: Simo Sorce &lt;simo@redhat.com&gt;
Reviewed-By: Alexander Bokovoy &lt;abokovoy@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>keytab: Add new extended operation to get a keytab.</title>
<updated>2014-06-26T08:30:53+00:00</updated>
<author>
<name>Simo Sorce</name>
<email>simo@redhat.com</email>
</author>
<published>2013-09-17T04:30:14+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/pvoborni/public_git/freeipa.git/commit/?id=5c0e7a5fb420377dcc06a956695afdcb35196444'/>
<id>5c0e7a5fb420377dcc06a956695afdcb35196444</id>
<content type='text'>
This new extended operation allow to create new keys or retrieve
existing ones. The new set of keys is returned as a ASN.1 structure
similar to the one that is passed in by the 'set keytab' extended
operation.

Access to the operation is regulated through a new special ACI that
allows 'retrieval' only if the user has access to an attribute named
ipaProtectedOperation postfixed by the subtypes 'read_keys' and
'write_keys' to distinguish between creation and retrieval operation.

For example for allowing retrieval by a specific user the following ACI
is set on cn=accounts:

(targetattr="ipaProtectedOperation;read_keys") ...
 ... userattr=ipaAllowedToPerform;read_keys#USERDN)

This ACI matches only if the service object hosts a new attribute named
ipaAllowedToPerform that holds the DN of the user attempting the
operation.

Resolves:
https://fedorahosted.org/freeipa/ticket/3859

Reviewed-By: Nathaniel McCallum &lt;npmccallum@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This new extended operation allow to create new keys or retrieve
existing ones. The new set of keys is returned as a ASN.1 structure
similar to the one that is passed in by the 'set keytab' extended
operation.

Access to the operation is regulated through a new special ACI that
allows 'retrieval' only if the user has access to an attribute named
ipaProtectedOperation postfixed by the subtypes 'read_keys' and
'write_keys' to distinguish between creation and retrieval operation.

For example for allowing retrieval by a specific user the following ACI
is set on cn=accounts:

(targetattr="ipaProtectedOperation;read_keys") ...
 ... userattr=ipaAllowedToPerform;read_keys#USERDN)

This ACI matches only if the service object hosts a new attribute named
ipaAllowedToPerform that holds the DN of the user attempting the
operation.

Resolves:
https://fedorahosted.org/freeipa/ticket/3859

Reviewed-By: Nathaniel McCallum &lt;npmccallum@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>keytabs: Expose and modify key encoding function</title>
<updated>2014-06-26T08:30:53+00:00</updated>
<author>
<name>Simo Sorce</name>
<email>simo@redhat.com</email>
</author>
<published>2013-09-17T04:28:32+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/pvoborni/public_git/freeipa.git/commit/?id=88bcf5899c3bd12b05d017436df0fc1374c954a5'/>
<id>88bcf5899c3bd12b05d017436df0fc1374c954a5</id>
<content type='text'>
Make it available outside of the encoding.c file for use in a follow-up
patch. Add option to not pass a password and generate a random key
instead.

Related:
https://fedorahosted.org/freeipa/ticket/3859

Reviewed-By: Nathaniel McCallum &lt;npmccallum@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Make it available outside of the encoding.c file for use in a follow-up
patch. Add option to not pass a password and generate a random key
instead.

Related:
https://fedorahosted.org/freeipa/ticket/3859

Reviewed-By: Nathaniel McCallum &lt;npmccallum@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>keytabs: Modularize setkeytab operation</title>
<updated>2014-06-26T08:30:53+00:00</updated>
<author>
<name>Simo Sorce</name>
<email>simo@redhat.com</email>
</author>
<published>2013-09-17T04:25:14+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/pvoborni/public_git/freeipa.git/commit/?id=d04746cdea312eb630e6466162c322593187ab8b'/>
<id>d04746cdea312eb630e6466162c322593187ab8b</id>
<content type='text'>
In preparation of adding another function to avoid code duplication.

Related:
https://fedorahosted.org/freeipa/ticket/3859

Reviewed-By: Nathaniel McCallum &lt;npmccallum@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
In preparation of adding another function to avoid code duplication.

Related:
https://fedorahosted.org/freeipa/ticket/3859

Reviewed-By: Nathaniel McCallum &lt;npmccallum@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Change OTPSyncRequest structure to use OctetString</title>
<updated>2014-06-25T12:22:01+00:00</updated>
<author>
<name>Nathaniel McCallum</name>
<email>npmccallum@redhat.com</email>
</author>
<published>2014-05-23T17:01:59+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/pvoborni/public_git/freeipa.git/commit/?id=7b15fcd57b06482be36e95e50cbec596777955b4'/>
<id>7b15fcd57b06482be36e95e50cbec596777955b4</id>
<content type='text'>
This change has two motivations:
  1. Clients don't have to parse the string.
  2. Future token types may have new formats.

Reviewed-By: Alexander Bokovoy &lt;abokovoy@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This change has two motivations:
  1. Clients don't have to parse the string.
  2. Future token types may have new formats.

Reviewed-By: Alexander Bokovoy &lt;abokovoy@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Revert "Check for password expiration in pre-bind"</title>
<updated>2014-06-10T06:42:03+00:00</updated>
<author>
<name>Martin Kosek</name>
<email>mkosek@redhat.com</email>
</author>
<published>2014-06-10T06:42:03+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/pvoborni/public_git/freeipa.git/commit/?id=c41b782bc59cd0cb70cbd62d543f9c538109d410'/>
<id>c41b782bc59cd0cb70cbd62d543f9c538109d410</id>
<content type='text'>
This reverts commit bfdbd3b6ad7c437e7dd293d2488b2d53f4ea7ba6.

Forceful validation of password expiration date in a BIND pre-callback
breaks LDAP password change extended operation as the password change
is only allowed via authenticated (bound) channel. Passwords could be
only changed via kadmin protocol. This change would thus break
LDAP-only clients and Web UI password change hook.

This patch will need to be revisited so that unauthenicated corner
cases are also revisited.

https://fedorahosted.org/freeipa/ticket/1539
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This reverts commit bfdbd3b6ad7c437e7dd293d2488b2d53f4ea7ba6.

Forceful validation of password expiration date in a BIND pre-callback
breaks LDAP password change extended operation as the password change
is only allowed via authenticated (bound) channel. Passwords could be
only changed via kadmin protocol. This change would thus break
LDAP-only clients and Web UI password change hook.

This patch will need to be revisited so that unauthenicated corner
cases are also revisited.

https://fedorahosted.org/freeipa/ticket/1539
</pre>
</div>
</content>
</entry>
<entry>
<title>Check for password expiration in pre-bind</title>
<updated>2014-06-09T06:18:16+00:00</updated>
<author>
<name>Simo Sorce</name>
<email>simo@redhat.com</email>
</author>
<published>2013-05-09T18:25:14+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/pvoborni/public_git/freeipa.git/commit/?id=bfdbd3b6ad7c437e7dd293d2488b2d53f4ea7ba6'/>
<id>bfdbd3b6ad7c437e7dd293d2488b2d53f4ea7ba6</id>
<content type='text'>
If the password is expired fail a password bind.

Resolves: https://fedorahosted.org/freeipa/ticket/1539
Reviewed-By: Martin Kosek &lt;mkosek@redhat.com&gt;
Reviewed-By: Nathaniel McCallum &lt;npmccallum@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
If the password is expired fail a password bind.

Resolves: https://fedorahosted.org/freeipa/ticket/1539
Reviewed-By: Martin Kosek &lt;mkosek@redhat.com&gt;
Reviewed-By: Nathaniel McCallum &lt;npmccallum@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>ipa-pwd-extop: Deny LDAP binds for accounts with expired principals</title>
<updated>2014-05-05T15:50:01+00:00</updated>
<author>
<name>Tomas Babej</name>
<email>tbabej@redhat.com</email>
</author>
<published>2014-04-01T10:41:16+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/pvoborni/public_git/freeipa.git/commit/?id=5d78cdf80951748f5f954a69c41a2a2cb1b84812'/>
<id>5d78cdf80951748f5f954a69c41a2a2cb1b84812</id>
<content type='text'>
Adds a check for krbprincipalexpiration attribute to pre_bind operation
in ipa-pwd-extop dirsrv plugin. If the principal is expired, auth is
denied and LDAP_UNWILLING_TO_PERFORM along with the error message is
sent back to the client. Since krbprincipalexpiration attribute is not
mandatory, if there is no value set, the check is passed.

https://fedorahosted.org/freeipa/ticket/3305

Reviewed-By: Simo Sorce &lt;simo@redhat.com&gt;
Reviewed-By: Alexander Bokovoy &lt;abokovoy@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Adds a check for krbprincipalexpiration attribute to pre_bind operation
in ipa-pwd-extop dirsrv plugin. If the principal is expired, auth is
denied and LDAP_UNWILLING_TO_PERFORM along with the error message is
sent back to the client. Since krbprincipalexpiration attribute is not
mandatory, if there is no value set, the check is passed.

https://fedorahosted.org/freeipa/ticket/3305

Reviewed-By: Simo Sorce &lt;simo@redhat.com&gt;
Reviewed-By: Alexander Bokovoy &lt;abokovoy@redhat.com&gt;
</pre>
</div>
</content>
</entry>
</feed>
