<feed xmlns='http://www.w3.org/2005/Atom'>
<title>mod_auth_gssapi.git/src, branch perms</title>
<subtitle>A GSSAPI based replacement for the aging mod_auth_kerb.</subtitle>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/mod_auth_gssapi.git/'/>
<entry>
<title>Add option to set custom permissions on ccache</title>
<updated>2016-11-02T13:09:41+00:00</updated>
<author>
<name>Simo Sorce</name>
<email>simo@redhat.com</email>
</author>
<published>2016-11-02T10:34:11+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/mod_auth_gssapi.git/commit/?id=4ed98d156122f748c6f0d4fed183944d52e245e7'/>
<id>4ed98d156122f748c6f0d4fed183944d52e245e7</id>
<content type='text'>
This allows apache to set permission so that another user in the default
group can access the ccache. Useful when apache passes the request to a
process running under a different user or group id number.

Signed-off-by: Simo Sorce &lt;simo@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This allows apache to set permission so that another user in the default
group can access the ccache. Useful when apache passes the request to a
process running under a different user or group id number.

Signed-off-by: Simo Sorce &lt;simo@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Write 'Persistent-Auth' header to err_headers_out</title>
<updated>2016-10-11T13:01:23+00:00</updated>
<author>
<name>Michael Osipov</name>
<email>1983-01-06@gmx.net</email>
</author>
<published>2016-10-11T11:53:14+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/mod_auth_gssapi.git/commit/?id=912738edbf248c9d9c2960cd4ff1daaa855e6c7e'/>
<id>912738edbf248c9d9c2960cd4ff1daaa855e6c7e</id>
<content type='text'>
In some cases, like internal redirects, authentication is completed but our
'Persistent-Auth' header is dropped by the server because headers_out is ignored
with errors (4xx, 5xx) and internal redirects.

See: https://ci.apache.org/projects/httpd/trunk/doxygen/structrequest__rec.html#a9f49c2d5680987c0c28466ea37d41a62

This fixes #110

Reviewed-by: Simo Sorce &lt;simo@redhat.com&gt;
Reviewed-by: Isaac Boukris &lt;iboukris@gmail.com&gt;
Closes #111
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
In some cases, like internal redirects, authentication is completed but our
'Persistent-Auth' header is dropped by the server because headers_out is ignored
with errors (4xx, 5xx) and internal redirects.

See: https://ci.apache.org/projects/httpd/trunk/doxygen/structrequest__rec.html#a9f49c2d5680987c0c28466ea37d41a62

This fixes #110

Reviewed-by: Simo Sorce &lt;simo@redhat.com&gt;
Reviewed-by: Isaac Boukris &lt;iboukris@gmail.com&gt;
Closes #111
</pre>
</div>
</content>
</entry>
<entry>
<title>Declare mag_complete outside the ifdef block</title>
<updated>2016-10-11T12:59:32+00:00</updated>
<author>
<name>Simo Sorce</name>
<email>simo@redhat.com</email>
</author>
<published>2016-10-07T14:01:26+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/mod_auth_gssapi.git/commit/?id=1e3ebb21677943d7e79f77d31d21cfcdf51314f0'/>
<id>1e3ebb21677943d7e79f77d31d21cfcdf51314f0</id>
<content type='text'>
Signed-off-by: Simo Sorce &lt;simo@redhat.com&gt;
Reviewed-by: Isaac Boukris &lt;iboukris@gmail.com&gt;
Reviewed-by: Robbie Harwood &lt;rharwood@redhat.com&gt;
Fixes #106
Closes #107
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Signed-off-by: Simo Sorce &lt;simo@redhat.com&gt;
Reviewed-by: Isaac Boukris &lt;iboukris@gmail.com&gt;
Reviewed-by: Robbie Harwood &lt;rharwood@redhat.com&gt;
Fixes #106
Closes #107
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix behavior of NULL ccname for cookie creation</title>
<updated>2016-08-15T18:32:45+00:00</updated>
<author>
<name>Robbie Harwood</name>
<email>rharwood@redhat.com</email>
</author>
<published>2016-07-22T18:23:31+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/mod_auth_gssapi.git/commit/?id=3ef79e28b4996750a07874f80282acc0351ef675'/>
<id>3ef79e28b4996750a07874f80282acc0351ef675</id>
<content type='text'>
This resolves an issue where the session cookie would not be populated
when sesions were used but unique ccaches were not.

Based on a report from Bhagavan Das.

Signed-off-by: Robbie Harwood &lt;rharwood@redhat.com&gt;
Reviewed-by: Simo Sorce &lt;simo@redhat.com&gt;
Closes #98
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This resolves an issue where the session cookie would not be populated
when sesions were used but unique ccaches were not.

Based on a report from Bhagavan Das.

Signed-off-by: Robbie Harwood &lt;rharwood@redhat.com&gt;
Reviewed-by: Simo Sorce &lt;simo@redhat.com&gt;
Closes #98
</pre>
</div>
</content>
</entry>
<entry>
<title>Add compatibility with OpenSSL 1.1.0</title>
<updated>2016-07-06T20:16:22+00:00</updated>
<author>
<name>Simo Sorce</name>
<email>simo@redhat.com</email>
</author>
<published>2016-07-01T14:30:42+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/mod_auth_gssapi.git/commit/?id=86aaf37e4ca95145512c56e3643bcbcb0e534b57'/>
<id>86aaf37e4ca95145512c56e3643bcbcb0e534b57</id>
<content type='text'>
In their continued wisdom OpenSSL developers keep breaking APIs left and
right with very poor documentation and forward/backward source compatibility.

Signed-off-by: Simo Sorce &lt;simo@redhat.com&gt;
Closes #96
Closes #97
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
In their continued wisdom OpenSSL developers keep breaking APIs left and
right with very poor documentation and forward/backward source compatibility.

Signed-off-by: Simo Sorce &lt;simo@redhat.com&gt;
Closes #96
Closes #97
</pre>
</div>
</content>
</entry>
<entry>
<title>Insure the asn1 definitions are in the tarball</title>
<updated>2016-06-15T15:04:08+00:00</updated>
<author>
<name>Simo Sorce</name>
<email>simo@redhat.com</email>
</author>
<published>2016-06-15T04:32:51+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/mod_auth_gssapi.git/commit/?id=3e0f4e980b4bea2f4f347fc39ea3deddf95fe71e'/>
<id>3e0f4e980b4bea2f4f347fc39ea3deddf95fe71e</id>
<content type='text'>
Signed-off-by: Simo Sorce &lt;simo@redhat.com&gt;
Close #95
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Signed-off-by: Simo Sorce &lt;simo@redhat.com&gt;
Close #95
</pre>
</div>
</content>
</entry>
<entry>
<title>Move context loops to a helper function</title>
<updated>2016-06-15T15:03:44+00:00</updated>
<author>
<name>Simo Sorce</name>
<email>simo@redhat.com</email>
</author>
<published>2016-06-09T14:08:16+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/mod_auth_gssapi.git/commit/?id=71995938f931ac8e5723777412ae85817c9b4ff8'/>
<id>71995938f931ac8e5723777412ae85817c9b4ff8</id>
<content type='text'>
This work simplifies the calling code and reduces duplication.

Signed-off-by: Simo Sorce &lt;simo@redhat.com&gt;
Reviewed-by: Reviewed-by: Isaac Boukris &lt;iboukris@gmail.com&gt;
Close #94
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This work simplifies the calling code and reduces duplication.

Signed-off-by: Simo Sorce &lt;simo@redhat.com&gt;
Reviewed-by: Reviewed-by: Isaac Boukris &lt;iboukris@gmail.com&gt;
Close #94
</pre>
</div>
</content>
</entry>
<entry>
<title>Postpone adding spnego mech to mech list</title>
<updated>2016-06-09T20:15:05+00:00</updated>
<author>
<name>Simo Sorce</name>
<email>simo@redhat.com</email>
</author>
<published>2016-06-08T12:54:14+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/mod_auth_gssapi.git/commit/?id=56c4cb5dd4c09a4996674e9006bf1aeb69183499'/>
<id>56c4cb5dd4c09a4996674e9006bf1aeb69183499</id>
<content type='text'>
Add the SPNEGO mech oid only if we are performing negotiate auth.
This cacthes earlier, with a hard failure, the case where a mechanism defined
on the command line is not available, by checking if there are any desired
mechs.

Signed-off-by: Simo Sorce &lt;simo@redhat.com&gt;
Reviewed-by: Isaac Boukris &lt;iboukris@gmail.com&gt;
Close #93
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Add the SPNEGO mech oid only if we are performing negotiate auth.
This cacthes earlier, with a hard failure, the case where a mechanism defined
on the command line is not available, by checking if there are any desired
mechs.

Signed-off-by: Simo Sorce &lt;simo@redhat.com&gt;
Reviewed-by: Isaac Boukris &lt;iboukris@gmail.com&gt;
Close #93
</pre>
</div>
</content>
</entry>
<entry>
<title>Add support for GssapiImpersonate.</title>
<updated>2016-06-09T14:11:43+00:00</updated>
<author>
<name>Jan Pazdziora</name>
<email>jpazdziora@redhat.com</email>
</author>
<published>2016-05-28T06:31:32+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/mod_auth_gssapi.git/commit/?id=d1710aff7c72263f691f09f20f91922a3ce57cfc'/>
<id>d1710aff7c72263f691f09f20f91922a3ce57cfc</id>
<content type='text'>
This is can be enabled on locations that are authenticated by another module
to obtain a ticket for the user, so that the application gets access to
krb5 credentials and all named attributes for the client.

The service needs to be authorized by the KDC if there is the need to use
credentials for further ticket acquisition by setting the
ok_to_auth_as_delegate flag on the service principal. This will provide a
forwardable ticket that can be used to obtain additional tickets via consrained
delegation (also subkect to KDC access control).

Signed-off-by: Jan Pazdziora &lt;jpazdziora@redhat.com&gt;
Signed-off-by: Simo Sorce &lt;simo@redhat.com&gt;
Close #92
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This is can be enabled on locations that are authenticated by another module
to obtain a ticket for the user, so that the application gets access to
krb5 credentials and all named attributes for the client.

The service needs to be authorized by the KDC if there is the need to use
credentials for further ticket acquisition by setting the
ok_to_auth_as_delegate flag on the service principal. This will provide a
forwardable ticket that can be used to obtain additional tickets via consrained
delegation (also subkect to KDC access control).

Signed-off-by: Jan Pazdziora &lt;jpazdziora@redhat.com&gt;
Signed-off-by: Simo Sorce &lt;simo@redhat.com&gt;
Close #92
</pre>
</div>
</content>
</entry>
<entry>
<title>Split the book keeping operations into a function</title>
<updated>2016-06-09T14:11:18+00:00</updated>
<author>
<name>Simo Sorce</name>
<email>simo@redhat.com</email>
</author>
<published>2016-06-07T09:20:23+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/mod_auth_gssapi.git/commit/?id=17c292a0b4f7ce7c08780c17c1300721c3256031'/>
<id>17c292a0b4f7ce7c08780c17c1300721c3256031</id>
<content type='text'>
This will be used in a following patch that perform gssapi operations
using a different path but need to perform the same bookj keeping as the
main auth path.

Signed-off-by: Simo Sorce &lt;simo@redhat.com&gt;
Reviewed-by: Jan Pazdziora &lt;jpazdziora@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This will be used in a following patch that perform gssapi operations
using a different path but need to perform the same bookj keeping as the
main auth path.

Signed-off-by: Simo Sorce &lt;simo@redhat.com&gt;
Reviewed-by: Jan Pazdziora &lt;jpazdziora@redhat.com&gt;
</pre>
</div>
</content>
</entry>
</feed>
