<feed xmlns='http://www.w3.org/2005/Atom'>
<title>freeipa.git/util, branch getkeytab</title>
<subtitle>FreeIPA patches</subtitle>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/'/>
<entry>
<title>ipa-getkeytab: Add support for get_keytab extop</title>
<updated>2014-06-09T18:53:55+00:00</updated>
<author>
<name>Simo Sorce</name>
<email>simo@redhat.com</email>
</author>
<published>2013-09-19T16:50:35+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=63f7aa46f2e1d0f4dec7951cc1684f555fb77d39'/>
<id>63f7aa46f2e1d0f4dec7951cc1684f555fb77d39</id>
<content type='text'>
This new extended operation is tried by default and then the code falls back to
the old method if it fails.
The new method allows for server side password generation as well as retrieval
of existing credentials w/o causing regeneration of keys on the server.

Resolves:
https://fedorahosted.org/freeipa/ticket/3859
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This new extended operation is tried by default and then the code falls back to
the old method if it fails.
The new method allows for server side password generation as well as retrieval
of existing credentials w/o causing regeneration of keys on the server.

Resolves:
https://fedorahosted.org/freeipa/ticket/3859
</pre>
</div>
</content>
</entry>
<entry>
<title>keytab: Add new extended operation to get a keytab.</title>
<updated>2014-06-09T18:49:42+00:00</updated>
<author>
<name>Simo Sorce</name>
<email>simo@redhat.com</email>
</author>
<published>2013-09-17T04:30:14+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=aa785cf1ce101382c2adbc4a3c70361d1e7a27e0'/>
<id>aa785cf1ce101382c2adbc4a3c70361d1e7a27e0</id>
<content type='text'>
This new extended operation allow to create new keys or retrieve
existing ones.
The new set of keys is returned as a ASN.1 structure similar to the one
that is passed in by the 'set keytab' extended operation.

Access to the operation is regulated through a new special ACI that
allows 'retrieval' only if the user has access to an attribute
named ipaProtectedOperation postfixed by the subtypes 'read_keys' and
'write_keys' to distinguish between creation and retrieval operation.

For example for allowing retrieval by a specific user the following ACI
is set on cn=accounts:

(targetattr="ipaProtectedOperation;read_keys") ...
 ... userattr=ipaAllowedToPerform;read_keys#USERDN)

This ACI matches only if the service object hosts a new attribute named
ipaAllowedToPerform that holds the DN of the user attempting the operation.

Resolves:
https://fedorahosted.org/freeipa/ticket/3859
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This new extended operation allow to create new keys or retrieve
existing ones.
The new set of keys is returned as a ASN.1 structure similar to the one
that is passed in by the 'set keytab' extended operation.

Access to the operation is regulated through a new special ACI that
allows 'retrieval' only if the user has access to an attribute
named ipaProtectedOperation postfixed by the subtypes 'read_keys' and
'write_keys' to distinguish between creation and retrieval operation.

For example for allowing retrieval by a specific user the following ACI
is set on cn=accounts:

(targetattr="ipaProtectedOperation;read_keys") ...
 ... userattr=ipaAllowedToPerform;read_keys#USERDN)

This ACI matches only if the service object hosts a new attribute named
ipaAllowedToPerform that holds the DN of the user attempting the operation.

Resolves:
https://fedorahosted.org/freeipa/ticket/3859
</pre>
</div>
</content>
</entry>
<entry>
<title>keytabs: Expose and modify key encoding function</title>
<updated>2014-06-09T18:35:00+00:00</updated>
<author>
<name>Simo Sorce</name>
<email>simo@redhat.com</email>
</author>
<published>2013-09-17T04:28:32+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=f440e927d8a66a3dd2e6505825e671052f66ae3e'/>
<id>f440e927d8a66a3dd2e6505825e671052f66ae3e</id>
<content type='text'>
Make it available outside of the encoding.c file for use in a follow-up
patch.
Add option to not pass a password and generate a random key instead.

Related:
https://fedorahosted.org/freeipa/ticket/3859
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Make it available outside of the encoding.c file for use in a follow-up
patch.
Add option to not pass a password and generate a random key instead.

Related:
https://fedorahosted.org/freeipa/ticket/3859
</pre>
</div>
</content>
</entry>
<entry>
<title>Add support to ipa-kdb for keyless principals</title>
<updated>2014-02-19T09:15:36+00:00</updated>
<author>
<name>Nathaniel McCallum</name>
<email>nathaniel@themccallums.org</email>
</author>
<published>2013-11-12T15:52:51+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=b769d1c18678b5eede7505dec7938f6836070044'/>
<id>b769d1c18678b5eede7505dec7938f6836070044</id>
<content type='text'>
https://fedorahosted.org/freeipa/ticket/3779

Reviewed-By: Alexander Bokovoy &lt;abokovoy@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
https://fedorahosted.org/freeipa/ticket/3779

Reviewed-By: Alexander Bokovoy &lt;abokovoy@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>BUILD: Fix portability of NSS in file ipa_pwd.c</title>
<updated>2014-01-28T15:35:34+00:00</updated>
<author>
<name>Lukas Slebodnik</name>
<email>lslebodn@redhat.com</email>
</author>
<published>2014-01-28T15:35:34+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=a4faa2f444f42644e6565675999d0db360716db0'/>
<id>a4faa2f444f42644e6565675999d0db360716db0</id>
<content type='text'>
Tested-by: Timo Aaltonen &lt;tjaalton@ubuntu.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Tested-by: Timo Aaltonen &lt;tjaalton@ubuntu.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Remove generation and handling of LM hashes</title>
<updated>2013-11-01T08:28:35+00:00</updated>
<author>
<name>Sumit Bose</name>
<email>sbose@redhat.com</email>
</author>
<published>2013-10-29T11:19:01+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=d876a22732d83ddf8e37ead89e6f23bf7aa0d69c'/>
<id>d876a22732d83ddf8e37ead89e6f23bf7aa0d69c</id>
<content type='text'>
https://fedorahosted.org/freeipa/ticket/3795
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
https://fedorahosted.org/freeipa/ticket/3795
</pre>
</div>
</content>
</entry>
<entry>
<title>ipa-kdb: read SID blacklist from LDAP</title>
<updated>2013-02-12T09:37:47+00:00</updated>
<author>
<name>Martin Kosek</name>
<email>mkosek@redhat.com</email>
</author>
<published>2013-02-07T13:52:35+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=827ea50566dbb2a0906da76d318a2ba68a4b818e'/>
<id>827ea50566dbb2a0906da76d318a2ba68a4b818e</id>
<content type='text'>
SIDs in incoming MS-PAC were checked and filtered with a fixed list of
well-known SIDs. Allow reading the SID blacklist from LDAP
(ipaNTSIDBlacklistIncoming and ipaNTSIDBlacklistOutgoing) and add the list
to mspac adtrust structure. Use the hardcoded SID list only if the LDAP
SID list is not configured.

LIMITATION: SID blacklist list is not used yet.

https://fedorahosted.org/freeipa/ticket/3289
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
SIDs in incoming MS-PAC were checked and filtered with a fixed list of
well-known SIDs. Allow reading the SID blacklist from LDAP
(ipaNTSIDBlacklistIncoming and ipaNTSIDBlacklistOutgoing) and add the list
to mspac adtrust structure. Use the hardcoded SID list only if the LDAP
SID list is not configured.

LIMITATION: SID blacklist list is not used yet.

https://fedorahosted.org/freeipa/ticket/3289
</pre>
</div>
</content>
</entry>
<entry>
<title>Prevent integer overflow when setting krbPasswordExpiration</title>
<updated>2013-02-08T14:54:21+00:00</updated>
<author>
<name>Tomas Babej</name>
<email>tbabej@redhat.com</email>
</author>
<published>2013-01-14T15:19:44+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=0e8a329048629f639ae64ff32e01e12a495e7763'/>
<id>0e8a329048629f639ae64ff32e01e12a495e7763</id>
<content type='text'>
Since in Kerberos V5 are used 32-bit unix timestamps, setting
maxlife in pwpolicy to values such as 9999 days would cause
integer overflow in krbPasswordExpiration attribute.

This would result into unpredictable behaviour such as users
not being able to log in after password expiration if password
policy was changed (#3114) or new users not being able to log
in at all (#3312).

The timestamp value is truncated to Jan 1, 2038 in ipa-kdc driver.

https://fedorahosted.org/freeipa/ticket/3312
https://fedorahosted.org/freeipa/ticket/3114
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Since in Kerberos V5 are used 32-bit unix timestamps, setting
maxlife in pwpolicy to values such as 9999 days would cause
integer overflow in krbPasswordExpiration attribute.

This would result into unpredictable behaviour such as users
not being able to log in after password expiration if password
policy was changed (#3114) or new users not being able to log
in at all (#3312).

The timestamp value is truncated to Jan 1, 2038 in ipa-kdc driver.

https://fedorahosted.org/freeipa/ticket/3312
https://fedorahosted.org/freeipa/ticket/3114
</pre>
</div>
</content>
</entry>
<entry>
<title>Make encode_ntlm_keys() public</title>
<updated>2012-09-06T07:24:58+00:00</updated>
<author>
<name>Sumit Bose</name>
<email>sbose@redhat.com</email>
</author>
<published>2012-08-24T12:46:05+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=973aad9db3a2a5e4cdd9d0c300e9ae1a826c1b41'/>
<id>973aad9db3a2a5e4cdd9d0c300e9ae1a826c1b41</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Move code into common krb5 utils</title>
<updated>2012-07-30T14:31:47+00:00</updated>
<author>
<name>Simo Sorce</name>
<email>ssorce@redhat.com</email>
</author>
<published>2012-07-06T15:15:15+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=505bc85ec31ad8cfa66be0dc99d19599cd1a9497'/>
<id>505bc85ec31ad8cfa66be0dc99d19599cd1a9497</id>
<content type='text'>
This moves the decoding function that reads the keys from the ber format
into a structure in the common krb5 util code right below the function
that encodes the same data structure into a ber format.
This way the 2 functions are in the same place and can be both used by
all ia components.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This moves the decoding function that reads the keys from the ber format
into a structure in the common krb5 util code right below the function
that encodes the same data structure into a ber format.
This way the 2 functions are in the same place and can be both used by
all ia components.
</pre>
</div>
</content>
</entry>
</feed>
