<feed xmlns='http://www.w3.org/2005/Atom'>
<title>freeipa.git/daemons/ipa-slapi-plugins/ipa-pwd-extop, branch mindatefix</title>
<subtitle>FreeIPA patches</subtitle>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/'/>
<entry>
<title>Simplify date manipulation in pwd plugin</title>
<updated>2016-07-20T10:08:05+00:00</updated>
<author>
<name>Simo Sorce</name>
<email>simo@redhat.com</email>
</author>
<published>2016-07-19T11:43:50+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=fec7ed2d2d7d8352d1a6a9cf5607476c9fd5d65f'/>
<id>fec7ed2d2d7d8352d1a6a9cf5607476c9fd5d65f</id>
<content type='text'>
Use a helper function to perform operations on dates in LDAP attributes.

Related to #2795

Signed-off-by: Simo Sorce &lt;simo@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Use a helper function to perform operations on dates in LDAP attributes.

Related to #2795

Signed-off-by: Simo Sorce &lt;simo@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Allow unexpiring passwords</title>
<updated>2016-07-01T09:22:02+00:00</updated>
<author>
<name>David Kupka</name>
<email>dkupka@redhat.com</email>
</author>
<published>2016-06-30T06:52:33+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=d2cb9ed327ee4003598d5e45d80ab7918b89eeed'/>
<id>d2cb9ed327ee4003598d5e45d80ab7918b89eeed</id>
<content type='text'>
Treat maxlife=0 in password policy as "never expire". Delete
krbPasswordExpiration in user entry when password should never expire.

https://fedorahosted.org/freeipa/ticket/2795

Reviewed-By: Thierry Bordaz &lt;tbordaz@redhat.com&gt;
Reviewed-By: Pavel Vomacka &lt;pvomacka@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Treat maxlife=0 in password policy as "never expire". Delete
krbPasswordExpiration in user entry when password should never expire.

https://fedorahosted.org/freeipa/ticket/2795

Reviewed-By: Thierry Bordaz &lt;tbordaz@redhat.com&gt;
Reviewed-By: Pavel Vomacka &lt;pvomacka@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>ipapwd_extop should use TARGET_DN defined by a pre-extop plugin</title>
<updated>2016-06-24T12:51:15+00:00</updated>
<author>
<name>Thierry Bordaz</name>
<email>tbordaz@redhat.com</email>
</author>
<published>2016-06-10T13:34:40+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=1ce8d32fd6c09b0bfcb1593e2e5ad8e47eef3670'/>
<id>1ce8d32fd6c09b0bfcb1593e2e5ad8e47eef3670</id>
<content type='text'>
ipapwd_extop allows to update the password on a specific entry, identified by its DN.
It can be usefull to support virtual DN in the extop so that update of a virtual entry
would land into the proper real entry.

If a pre-extop sets the TARGET_DN, ipapwd_extop sets ORIGINAL_DN with the value
of TARGET_DN, instead of using the original one (in the ber req)
There is a dependency on slapi-nis &gt;= 0.56-0.1 (https://fedorahosted.org/freeipa/ticket/5955)

https://fedorahosted.org/freeipa/ticket/5946

Reviewed-By: Alexander Bokovoy &lt;abokovoy@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
ipapwd_extop allows to update the password on a specific entry, identified by its DN.
It can be usefull to support virtual DN in the extop so that update of a virtual entry
would land into the proper real entry.

If a pre-extop sets the TARGET_DN, ipapwd_extop sets ORIGINAL_DN with the value
of TARGET_DN, instead of using the original one (in the ber req)
There is a dependency on slapi-nis &gt;= 0.56-0.1 (https://fedorahosted.org/freeipa/ticket/5955)

https://fedorahosted.org/freeipa/ticket/5946

Reviewed-By: Alexander Bokovoy &lt;abokovoy@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Migrate from #ifndef guards to #pragma once</title>
<updated>2016-05-29T12:04:45+00:00</updated>
<author>
<name>Nathaniel McCallum</name>
<email>npmccallum@redhat.com</email>
</author>
<published>2016-05-24T14:18:43+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=4bafba06f2b8cc51cd95a725e1c8adf7bbf9a5fc'/>
<id>4bafba06f2b8cc51cd95a725e1c8adf7bbf9a5fc</id>
<content type='text'>
Using a pragma instead of guards is easier to write, less error prone
and avoids name clashes (a source of very subtle bugs). This pragma
is supported on almost all compilers, including all the compilers we
care about: https://en.wikipedia.org/wiki/Pragma_once#Portability.

This patch does not change the autogenerated files: asn1/asn1c/*.h.

Reviewed-By: Martin Basti &lt;mbasti@redhat.com&gt;
Reviewed-By: Christian Heimes &lt;cheimes@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Using a pragma instead of guards is easier to write, less error prone
and avoids name clashes (a source of very subtle bugs). This pragma
is supported on almost all compilers, including all the compilers we
care about: https://en.wikipedia.org/wiki/Pragma_once#Portability.

This patch does not change the autogenerated files: asn1/asn1c/*.h.

Reviewed-By: Martin Basti &lt;mbasti@redhat.com&gt;
Reviewed-By: Christian Heimes &lt;cheimes@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Ensure that ipa-otpd bind auths validate an OTP</title>
<updated>2016-05-26T16:47:05+00:00</updated>
<author>
<name>Nathaniel McCallum</name>
<email>npmccallum@redhat.com</email>
</author>
<published>2016-05-12T19:10:47+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=168a6c7d4778a2a3c729e3ac24e4ad9dfacb46c0'/>
<id>168a6c7d4778a2a3c729e3ac24e4ad9dfacb46c0</id>
<content type='text'>
Before this patch, if the user was configured for either OTP or password
it was possible to do a 1FA authentication through ipa-otpd. Because this
correctly respected the configuration, it is not a security error.

However, once we begin to insert authentication indicators into the
Kerberos tickets, we cannot allow 1FA authentications through this
code path. Otherwise the ticket would contain a 2FA indicator when
only 1FA was actually performed.

To solve this problem, we have ipa-otpd send a critical control during
the bind operation which informs the LDAP server that it *MUST* validate
an OTP token for authentication to be successful. Next, we implement
support for this control in the ipa-pwd-extop plugin. The end result is
that the bind operation will always fail if the control is present and
no OTP is validated.

https://fedorahosted.org/freeipa/ticket/433

Reviewed-By: Sumit Bose &lt;sbose@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Before this patch, if the user was configured for either OTP or password
it was possible to do a 1FA authentication through ipa-otpd. Because this
correctly respected the configuration, it is not a security error.

However, once we begin to insert authentication indicators into the
Kerberos tickets, we cannot allow 1FA authentications through this
code path. Otherwise the ticket would contain a 2FA indicator when
only 1FA was actually performed.

To solve this problem, we have ipa-otpd send a critical control during
the bind operation which informs the LDAP server that it *MUST* validate
an OTP token for authentication to be successful. Next, we implement
support for this control in the ipa-pwd-extop plugin. The end result is
that the bind operation will always fail if the control is present and
no OTP is validated.

https://fedorahosted.org/freeipa/ticket/433

Reviewed-By: Sumit Bose &lt;sbose@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Rename syncreq.[ch] to otpctrl.[ch]</title>
<updated>2016-05-26T16:47:05+00:00</updated>
<author>
<name>Nathaniel McCallum</name>
<email>npmccallum@redhat.com</email>
</author>
<published>2016-05-12T18:57:29+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=cd9bc84240c99ed744e5ee44db18d925a5292ffd'/>
<id>cd9bc84240c99ed744e5ee44db18d925a5292ffd</id>
<content type='text'>
This gives us a place to handle all OTP related controls. Also,
genericize otpctrl_present() so that the OID can be specified as an
argument to the function call.

These changes are preparatory for the subsequent patches.

https://fedorahosted.org/freeipa/ticket/433

Reviewed-By: Sumit Bose &lt;sbose@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This gives us a place to handle all OTP related controls. Also,
genericize otpctrl_present() so that the OID can be specified as an
argument to the function call.

These changes are preparatory for the subsequent patches.

https://fedorahosted.org/freeipa/ticket/433

Reviewed-By: Sumit Bose &lt;sbose@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Improve keytab code to select the right principal.</title>
<updated>2016-02-01T12:28:39+00:00</updated>
<author>
<name>Simo Sorce</name>
<email>simo@redhat.com</email>
</author>
<published>2015-12-02T20:20:42+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=e011b376a5d071492bf3adfae26e4d61e2face07'/>
<id>e011b376a5d071492bf3adfae26e4d61e2face07</id>
<content type='text'>
Whe requesting a keytab the salt used is the NORMAL type (for backwards and AD
compatibility), however since we added alias support we need to search for the
krbCanonicalName in preference, hen nothing is specified, and for the requested
principal name when a getkeytab operation is performed. This is so that the
correct salt can be applied. (Windows AD uses some peculiar aliases for some
special accounts to generate the salt).

Signed-off-by: Simo Sorce &lt;simo@redhat.com&gt;
Reviewed-By: Alexander Bokovoy &lt;abokovoy@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Whe requesting a keytab the salt used is the NORMAL type (for backwards and AD
compatibility), however since we added alias support we need to search for the
krbCanonicalName in preference, hen nothing is specified, and for the requested
principal name when a getkeytab operation is performed. This is so that the
correct salt can be applied. (Windows AD uses some peculiar aliases for some
special accounts to generate the salt).

Signed-off-by: Simo Sorce &lt;simo@redhat.com&gt;
Reviewed-By: Alexander Bokovoy &lt;abokovoy@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Use only AES enctypes by default</title>
<updated>2016-01-13T14:24:53+00:00</updated>
<author>
<name>Simo Sorce</name>
<email>simo@redhat.com</email>
</author>
<published>2015-11-23T18:40:42+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=58ab032f1ae20454d4b9d760c7601fd8b44045f5'/>
<id>58ab032f1ae20454d4b9d760c7601fd8b44045f5</id>
<content type='text'>
Remove des3 and arcfour from the defaults for new installs.

NOTE: the ipasam/dcerpc code sill uses arcfour

Signed-off-by: Simo Sorce &lt;simo@redhat.com&gt;

Ticket: https://fedorahosted.org/freeipa/ticket/4740
Reviewed-By: Martin Basti &lt;mbasti@redhat.com&gt;
Reviewed-By: Alexander Bokovoy &lt;abokovoy@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Remove des3 and arcfour from the defaults for new installs.

NOTE: the ipasam/dcerpc code sill uses arcfour

Signed-off-by: Simo Sorce &lt;simo@redhat.com&gt;

Ticket: https://fedorahosted.org/freeipa/ticket/4740
Reviewed-By: Martin Basti &lt;mbasti@redhat.com&gt;
Reviewed-By: Alexander Bokovoy &lt;abokovoy@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>ipa-pwd-extop: expand error message to tell what user is not allowed to fetch keytab</title>
<updated>2015-07-07T23:56:52+00:00</updated>
<author>
<name>Alexander Bokovoy</name>
<email>abokovoy@redhat.com</email>
</author>
<published>2015-06-05T15:31:32+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=a9570e8ea347c3e5cb4c1489e70828bd00077a22'/>
<id>a9570e8ea347c3e5cb4c1489e70828bd00077a22</id>
<content type='text'>
When retrieving keytab, it is useful to know what user was attempting
to fetch the keyts and failed. This is useful to debug one-way trust
where SSSD forks out a process of ipa-getkeytab and it might be using
a wrong credentials cache for authentication purposes.

Part of https://fedorahosted.org/freeipa/ticket/4959

Reviewed-By: Tomas Babej &lt;tbabej@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
When retrieving keytab, it is useful to know what user was attempting
to fetch the keyts and failed. This is useful to debug one-way trust
where SSSD forks out a process of ipa-getkeytab and it might be using
a wrong credentials cache for authentication purposes.

Part of https://fedorahosted.org/freeipa/ticket/4959

Reviewed-By: Tomas Babej &lt;tbabej@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>User life cycle: new stageuser commands activate</title>
<updated>2015-05-18T07:37:21+00:00</updated>
<author>
<name>Thierry Bordaz</name>
<email>tbordaz@redhat.com</email>
</author>
<published>2015-05-08T14:12:58+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=0ebcc5b9222efcd4b9814a2948f266abbf71fdfc'/>
<id>0ebcc5b9222efcd4b9814a2948f266abbf71fdfc</id>
<content type='text'>
Add plugin commands to stageuser plugin:
stageuser_activate: activate entries created by IPA CLIs

https://fedorahosted.org/freeipa/ticket/3813

Reviewed-By: David Kupka &lt;dkupka@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Add plugin commands to stageuser plugin:
stageuser_activate: activate entries created by IPA CLIs

https://fedorahosted.org/freeipa/ticket/3813

Reviewed-By: David Kupka &lt;dkupka@redhat.com&gt;
</pre>
</div>
</content>
</entry>
</feed>
