<feed xmlns='http://www.w3.org/2005/Atom'>
<title>sssd.git/src/responder/pam, branch my-master</title>
<subtitle>Experimental work on SSSD - Systen Security Services Daemon</subtitle>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/sssd.git/'/>
<entry>
<title>RESPONDERS: Create a common file with service names and versions</title>
<updated>2012-12-18T16:25:34+00:00</updated>
<author>
<name>Jakub Hrozek</name>
<email>jhrozek@redhat.com</email>
</author>
<published>2012-12-15T15:24:25+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/sssd.git/commit/?id=e880949305cee3aca79441fe6113a9d79e7c98f2'/>
<id>e880949305cee3aca79441fe6113a9d79e7c98f2</id>
<content type='text'>
The monitor sends calls different sbus methods to different responders.
Instead of including headers of the particular responders directly in
monitor, which breaks layering a little, create a common header file
that will be included from src/responder/common/
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The monitor sends calls different sbus methods to different responders.
Instead of including headers of the particular responders directly in
monitor, which breaks layering a little, create a common header file
that will be included from src/responder/common/
</pre>
</div>
</content>
</entry>
<entry>
<title>sssd_pam: Cleanup requests cache on sbus reconect</title>
<updated>2012-12-14T16:23:56+00:00</updated>
<author>
<name>Simo Sorce</name>
<email>simo@redhat.com</email>
</author>
<published>2012-12-13T23:13:06+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/sssd.git/commit/?id=927c089ba7799a0d006769bf3a09f769966b068b'/>
<id>927c089ba7799a0d006769bf3a09f769966b068b</id>
<content type='text'>
The pam responder was not properly configured to recover from a backend
disconnect. The connections that were in flight before the disconnection
were never freed and new requests for the same user would just pile up on
top of the now phantom requests.

Fixes: https://fedorahosted.org/sssd/ticket/1655
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The pam responder was not properly configured to recover from a backend
disconnect. The connections that were in flight before the disconnection
were never freed and new requests for the same user would just pile up on
top of the now phantom requests.

Fixes: https://fedorahosted.org/sssd/ticket/1655
</pre>
</div>
</content>
</entry>
<entry>
<title>Refactor the way subdomain accounts are saved</title>
<updated>2012-11-19T14:11:03+00:00</updated>
<author>
<name>Simo Sorce</name>
<email>simo@redhat.com</email>
</author>
<published>2012-11-16T20:25:42+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/sssd.git/commit/?id=8d9e0547a864cee05ab36bc988300c0cfa986025'/>
<id>8d9e0547a864cee05ab36bc988300c0cfa986025</id>
<content type='text'>
The original sysdb code had a strong assumption that only users from one
domain are saved in the databse, with the subdomain feature, we have
changed reality, but have not adjusted all the code arund the sysdb calls
to not rely on the original assumption.

One of the side effects of this incongrunece is that currently group
memberships do not return fully qualified names for subdomain users as they
should.

In oreder to fix this and other potential issues surrounding the violation
of the original assumption, we need to fully qualify subdomain user names.
By savin them fully qualified we do not risk aliasing local users and have
group memberhips or other name based matching code mistake a domain user
with subdomain usr or vice versa.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The original sysdb code had a strong assumption that only users from one
domain are saved in the databse, with the subdomain feature, we have
changed reality, but have not adjusted all the code arund the sysdb calls
to not rely on the original assumption.

One of the side effects of this incongrunece is that currently group
memberships do not return fully qualified names for subdomain users as they
should.

In oreder to fix this and other potential issues surrounding the violation
of the original assumption, we need to fully qualify subdomain user names.
By savin them fully qualified we do not risk aliasing local users and have
group memberhips or other name based matching code mistake a domain user
with subdomain usr or vice versa.
</pre>
</div>
</content>
</entry>
<entry>
<title>Do not always return PAM_SYSTEM_ERR when offline krb5 authentication fails</title>
<updated>2012-11-12T10:09:26+00:00</updated>
<author>
<name>Jakub Hrozek</name>
<email>jhrozek@redhat.com</email>
</author>
<published>2012-11-07T17:28:29+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/sssd.git/commit/?id=6c7584a32899bf573f62cf8c3fb37410a8ec05bb'/>
<id>6c7584a32899bf573f62cf8c3fb37410a8ec05bb</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>PAM: Do not leak fd after SELinux context file is written</title>
<updated>2012-11-01T23:02:44+00:00</updated>
<author>
<name>Jakub Hrozek</name>
<email>jhrozek@redhat.com</email>
</author>
<published>2012-11-01T19:18:23+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/sssd.git/commit/?id=a97f6203967b801d666ac686cdb7c76a7dfe55a9'/>
<id>a97f6203967b801d666ac686cdb7c76a7dfe55a9</id>
<content type='text'>
https://fedorahosted.org/sssd/ticket/1619

We don't close the fd when we write the selinux login file in the pam
responder. This results in a fd leak.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
https://fedorahosted.org/sssd/ticket/1619

We don't close the fd when we write the selinux login file in the pam
responder. This results in a fd leak.
</pre>
</div>
</content>
</entry>
<entry>
<title>Include talloc log in our debug facility</title>
<updated>2012-10-29T16:15:37+00:00</updated>
<author>
<name>Michal Zidek</name>
<email>mzidek@redhat.com</email>
</author>
<published>2012-10-15T13:24:15+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/sssd.git/commit/?id=9e2c64c6d4f5560e27207193efea6536a566865e'/>
<id>9e2c64c6d4f5560e27207193efea6536a566865e</id>
<content type='text'>
https://fedorahosted.org/sssd/ticket/1495
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
https://fedorahosted.org/sssd/ticket/1495
</pre>
</div>
</content>
</entry>
<entry>
<title>Add new option default_domain_suffix</title>
<updated>2012-10-01T19:45:21+00:00</updated>
<author>
<name>Sumit Bose</name>
<email>sbose@redhat.com</email>
</author>
<published>2012-09-21T16:30:30+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/sssd.git/commit/?id=1542b85f13d72329685bdd97aa879c36d11f81be'/>
<id>1542b85f13d72329685bdd97aa879c36d11f81be</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>SELinux: Always use the default if it exists on the server</title>
<updated>2012-09-13T16:11:59+00:00</updated>
<author>
<name>Jakub Hrozek</name>
<email>jhrozek@redhat.com</email>
</author>
<published>2012-09-13T08:07:29+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/sssd.git/commit/?id=ebb1f28998c06984765e3e78d30911c1c3ec84e2'/>
<id>ebb1f28998c06984765e3e78d30911c1c3ec84e2</id>
<content type='text'>
https://fedorahosted.org/sssd/ticket/1513

This is a counterpart of the FreeIPA ticket https://fedorahosted.org/freeipa/ticket/3045

During an e-mail discussion, it was decided that

    * if the default is set in the IPA config object, the SSSD would use
      that default no matter what
    * if the default is not set (aka empty or missing), the SSSD
      would just use the system default and skip creating the login
      file altogether
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
https://fedorahosted.org/sssd/ticket/1513

This is a counterpart of the FreeIPA ticket https://fedorahosted.org/freeipa/ticket/3045

During an e-mail discussion, it was decided that

    * if the default is set in the IPA config object, the SSSD would use
      that default no matter what
    * if the default is not set (aka empty or missing), the SSSD
      would just use the system default and skip creating the login
      file altogether
</pre>
</div>
</content>
</entry>
<entry>
<title>Check if the SELinux login directory exists</title>
<updated>2012-09-04T08:14:18+00:00</updated>
<author>
<name>Jakub Hrozek</name>
<email>jhrozek@redhat.com</email>
</author>
<published>2012-08-27T06:23:57+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/sssd.git/commit/?id=3d038d2e0dc7af04ec2f7c85ae325accb39f6237'/>
<id>3d038d2e0dc7af04ec2f7c85ae325accb39f6237</id>
<content type='text'>
https://fedorahosted.org/sssd/ticket/1492
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
https://fedorahosted.org/sssd/ticket/1492
</pre>
</div>
</content>
</entry>
<entry>
<title>Only create the SELinux login file if there are mappings on the server</title>
<updated>2012-08-16T11:31:03+00:00</updated>
<author>
<name>Jakub Hrozek</name>
<email>jhrozek@redhat.com</email>
</author>
<published>2012-08-05T20:37:09+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/sssd.git/commit/?id=f004e23af14fe020d81b8f97f30b448105b79606'/>
<id>f004e23af14fe020d81b8f97f30b448105b79606</id>
<content type='text'>
https://fedorahosted.org/sssd/ticket/1455

In case there are no rules on the IPA server, we must simply avoid generating
the login file. That would make us fall back to the system-wide default
defined in /etc/selinux/targeted/seusers.

The IPA default must be only used if there *are* rules on the server,
but none matches.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
https://fedorahosted.org/sssd/ticket/1455

In case there are no rules on the IPA server, we must simply avoid generating
the login file. That would make us fall back to the system-wide default
defined in /etc/selinux/targeted/seusers.

The IPA default must be only used if there *are* rules on the server,
but none matches.
</pre>
</div>
</content>
</entry>
</feed>
