<feed xmlns='http://www.w3.org/2005/Atom'>
<title>freeipa.git/util, branch master</title>
<subtitle>Unnamed repository; edit this file 'description' to name the repository.</subtitle>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/pvoborni/public_git/freeipa.git/'/>
<entry>
<title>ipa-getkeytab: Add support for get_keytab extop</title>
<updated>2014-06-26T08:30:53+00:00</updated>
<author>
<name>Simo Sorce</name>
<email>simo@redhat.com</email>
</author>
<published>2013-09-19T16:50:35+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/pvoborni/public_git/freeipa.git/commit/?id=f352702d6785fc5f59698dba73d415f994b4ce7d'/>
<id>f352702d6785fc5f59698dba73d415f994b4ce7d</id>
<content type='text'>
This new extended operation is tried by default and then the code falls
back to the old method if it fails. The new method allows for server
side password generation as well as retrieval of existing credentials
w/o causing regeneration of keys on the server.

Resolves:
https://fedorahosted.org/freeipa/ticket/3859

Reviewed-By: Nathaniel McCallum &lt;npmccallum@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This new extended operation is tried by default and then the code falls
back to the old method if it fails. The new method allows for server
side password generation as well as retrieval of existing credentials
w/o causing regeneration of keys on the server.

Resolves:
https://fedorahosted.org/freeipa/ticket/3859

Reviewed-By: Nathaniel McCallum &lt;npmccallum@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>keytab: Add new extended operation to get a keytab.</title>
<updated>2014-06-26T08:30:53+00:00</updated>
<author>
<name>Simo Sorce</name>
<email>simo@redhat.com</email>
</author>
<published>2013-09-17T04:30:14+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/pvoborni/public_git/freeipa.git/commit/?id=5c0e7a5fb420377dcc06a956695afdcb35196444'/>
<id>5c0e7a5fb420377dcc06a956695afdcb35196444</id>
<content type='text'>
This new extended operation allow to create new keys or retrieve
existing ones. The new set of keys is returned as a ASN.1 structure
similar to the one that is passed in by the 'set keytab' extended
operation.

Access to the operation is regulated through a new special ACI that
allows 'retrieval' only if the user has access to an attribute named
ipaProtectedOperation postfixed by the subtypes 'read_keys' and
'write_keys' to distinguish between creation and retrieval operation.

For example for allowing retrieval by a specific user the following ACI
is set on cn=accounts:

(targetattr="ipaProtectedOperation;read_keys") ...
 ... userattr=ipaAllowedToPerform;read_keys#USERDN)

This ACI matches only if the service object hosts a new attribute named
ipaAllowedToPerform that holds the DN of the user attempting the
operation.

Resolves:
https://fedorahosted.org/freeipa/ticket/3859

Reviewed-By: Nathaniel McCallum &lt;npmccallum@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This new extended operation allow to create new keys or retrieve
existing ones. The new set of keys is returned as a ASN.1 structure
similar to the one that is passed in by the 'set keytab' extended
operation.

Access to the operation is regulated through a new special ACI that
allows 'retrieval' only if the user has access to an attribute named
ipaProtectedOperation postfixed by the subtypes 'read_keys' and
'write_keys' to distinguish between creation and retrieval operation.

For example for allowing retrieval by a specific user the following ACI
is set on cn=accounts:

(targetattr="ipaProtectedOperation;read_keys") ...
 ... userattr=ipaAllowedToPerform;read_keys#USERDN)

This ACI matches only if the service object hosts a new attribute named
ipaAllowedToPerform that holds the DN of the user attempting the
operation.

Resolves:
https://fedorahosted.org/freeipa/ticket/3859

Reviewed-By: Nathaniel McCallum &lt;npmccallum@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>keytabs: Expose and modify key encoding function</title>
<updated>2014-06-26T08:30:53+00:00</updated>
<author>
<name>Simo Sorce</name>
<email>simo@redhat.com</email>
</author>
<published>2013-09-17T04:28:32+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/pvoborni/public_git/freeipa.git/commit/?id=88bcf5899c3bd12b05d017436df0fc1374c954a5'/>
<id>88bcf5899c3bd12b05d017436df0fc1374c954a5</id>
<content type='text'>
Make it available outside of the encoding.c file for use in a follow-up
patch. Add option to not pass a password and generate a random key
instead.

Related:
https://fedorahosted.org/freeipa/ticket/3859

Reviewed-By: Nathaniel McCallum &lt;npmccallum@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Make it available outside of the encoding.c file for use in a follow-up
patch. Add option to not pass a password and generate a random key
instead.

Related:
https://fedorahosted.org/freeipa/ticket/3859

Reviewed-By: Nathaniel McCallum &lt;npmccallum@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Add support to ipa-kdb for keyless principals</title>
<updated>2014-02-19T09:15:36+00:00</updated>
<author>
<name>Nathaniel McCallum</name>
<email>nathaniel@themccallums.org</email>
</author>
<published>2013-11-12T15:52:51+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/pvoborni/public_git/freeipa.git/commit/?id=b769d1c18678b5eede7505dec7938f6836070044'/>
<id>b769d1c18678b5eede7505dec7938f6836070044</id>
<content type='text'>
https://fedorahosted.org/freeipa/ticket/3779

Reviewed-By: Alexander Bokovoy &lt;abokovoy@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
https://fedorahosted.org/freeipa/ticket/3779

Reviewed-By: Alexander Bokovoy &lt;abokovoy@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>BUILD: Fix portability of NSS in file ipa_pwd.c</title>
<updated>2014-01-28T15:35:34+00:00</updated>
<author>
<name>Lukas Slebodnik</name>
<email>lslebodn@redhat.com</email>
</author>
<published>2014-01-28T15:35:34+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/pvoborni/public_git/freeipa.git/commit/?id=a4faa2f444f42644e6565675999d0db360716db0'/>
<id>a4faa2f444f42644e6565675999d0db360716db0</id>
<content type='text'>
Tested-by: Timo Aaltonen &lt;tjaalton@ubuntu.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Tested-by: Timo Aaltonen &lt;tjaalton@ubuntu.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Remove generation and handling of LM hashes</title>
<updated>2013-11-01T08:28:35+00:00</updated>
<author>
<name>Sumit Bose</name>
<email>sbose@redhat.com</email>
</author>
<published>2013-10-29T11:19:01+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/pvoborni/public_git/freeipa.git/commit/?id=d876a22732d83ddf8e37ead89e6f23bf7aa0d69c'/>
<id>d876a22732d83ddf8e37ead89e6f23bf7aa0d69c</id>
<content type='text'>
https://fedorahosted.org/freeipa/ticket/3795
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
https://fedorahosted.org/freeipa/ticket/3795
</pre>
</div>
</content>
</entry>
<entry>
<title>ipa-kdb: read SID blacklist from LDAP</title>
<updated>2013-02-12T09:37:47+00:00</updated>
<author>
<name>Martin Kosek</name>
<email>mkosek@redhat.com</email>
</author>
<published>2013-02-07T13:52:35+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/pvoborni/public_git/freeipa.git/commit/?id=827ea50566dbb2a0906da76d318a2ba68a4b818e'/>
<id>827ea50566dbb2a0906da76d318a2ba68a4b818e</id>
<content type='text'>
SIDs in incoming MS-PAC were checked and filtered with a fixed list of
well-known SIDs. Allow reading the SID blacklist from LDAP
(ipaNTSIDBlacklistIncoming and ipaNTSIDBlacklistOutgoing) and add the list
to mspac adtrust structure. Use the hardcoded SID list only if the LDAP
SID list is not configured.

LIMITATION: SID blacklist list is not used yet.

https://fedorahosted.org/freeipa/ticket/3289
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
SIDs in incoming MS-PAC were checked and filtered with a fixed list of
well-known SIDs. Allow reading the SID blacklist from LDAP
(ipaNTSIDBlacklistIncoming and ipaNTSIDBlacklistOutgoing) and add the list
to mspac adtrust structure. Use the hardcoded SID list only if the LDAP
SID list is not configured.

LIMITATION: SID blacklist list is not used yet.

https://fedorahosted.org/freeipa/ticket/3289
</pre>
</div>
</content>
</entry>
<entry>
<title>Prevent integer overflow when setting krbPasswordExpiration</title>
<updated>2013-02-08T14:54:21+00:00</updated>
<author>
<name>Tomas Babej</name>
<email>tbabej@redhat.com</email>
</author>
<published>2013-01-14T15:19:44+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/pvoborni/public_git/freeipa.git/commit/?id=0e8a329048629f639ae64ff32e01e12a495e7763'/>
<id>0e8a329048629f639ae64ff32e01e12a495e7763</id>
<content type='text'>
Since in Kerberos V5 are used 32-bit unix timestamps, setting
maxlife in pwpolicy to values such as 9999 days would cause
integer overflow in krbPasswordExpiration attribute.

This would result into unpredictable behaviour such as users
not being able to log in after password expiration if password
policy was changed (#3114) or new users not being able to log
in at all (#3312).

The timestamp value is truncated to Jan 1, 2038 in ipa-kdc driver.

https://fedorahosted.org/freeipa/ticket/3312
https://fedorahosted.org/freeipa/ticket/3114
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Since in Kerberos V5 are used 32-bit unix timestamps, setting
maxlife in pwpolicy to values such as 9999 days would cause
integer overflow in krbPasswordExpiration attribute.

This would result into unpredictable behaviour such as users
not being able to log in after password expiration if password
policy was changed (#3114) or new users not being able to log
in at all (#3312).

The timestamp value is truncated to Jan 1, 2038 in ipa-kdc driver.

https://fedorahosted.org/freeipa/ticket/3312
https://fedorahosted.org/freeipa/ticket/3114
</pre>
</div>
</content>
</entry>
<entry>
<title>Make encode_ntlm_keys() public</title>
<updated>2012-09-06T07:24:58+00:00</updated>
<author>
<name>Sumit Bose</name>
<email>sbose@redhat.com</email>
</author>
<published>2012-08-24T12:46:05+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/pvoborni/public_git/freeipa.git/commit/?id=973aad9db3a2a5e4cdd9d0c300e9ae1a826c1b41'/>
<id>973aad9db3a2a5e4cdd9d0c300e9ae1a826c1b41</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Move code into common krb5 utils</title>
<updated>2012-07-30T14:31:47+00:00</updated>
<author>
<name>Simo Sorce</name>
<email>ssorce@redhat.com</email>
</author>
<published>2012-07-06T15:15:15+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/pvoborni/public_git/freeipa.git/commit/?id=505bc85ec31ad8cfa66be0dc99d19599cd1a9497'/>
<id>505bc85ec31ad8cfa66be0dc99d19599cd1a9497</id>
<content type='text'>
This moves the decoding function that reads the keys from the ber format
into a structure in the common krb5 util code right below the function
that encodes the same data structure into a ber format.
This way the 2 functions are in the same place and can be both used by
all ia components.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This moves the decoding function that reads the keys from the ber format
into a structure in the common krb5 util code right below the function
that encodes the same data structure into a ber format.
This way the 2 functions are in the same place and can be both used by
all ia components.
</pre>
</div>
</content>
</entry>
</feed>
