Commit Graph

61 Commits

Author SHA1 Message Date
Julien Rische
2b904f4c4a krb5 1.21.1-4
- libkrad: implement support for Message-Authenticator (CVE-2024-3596)
  Resolves: RHEL-55423
- Fix various issues detected by static analysis
  Resolves: RHEL-58216
- Remove RSA protocol for PKINIT
  Resolves: RHEL-15323

Signed-off-by: Julien Rische <jrische@redhat.com>
2024-10-17 17:38:12 +02:00
Julien Rische
ff5212e6a8 Enable abidiff in rpminspect
Signed-off-by: Julien Rische <jrische@redhat.com>
2024-08-08 18:24:06 +02:00
Julien Rische
201d6cb428 Fix expected kadmin principal in inplace-upgrade-sanity test
Signed-off-by: Julien Rische <jrische@redhat.com>
2024-08-08 18:22:50 +02:00
Julien Rische
6b95961231 krb5 1.21.1-3
- CVE-2024-37370 CVE-2024-37371
  Fix vulnerabilities in GSS message token handling
  Resolves: RHEL-45402 RHEL-45392

Signed-off-by: Julien Rische <jrische@redhat.com>
2024-07-05 12:20:28 +02:00
Julien Rische
b0d04d78e0 krb5 1.21.1-2
- Fix memory leak in GSSAPI interface
  Resolves: RHEL-27251
- Fix memory leak in PMAP RPC interface
  Resolves: RHEL-27245
- Fix memory leak in failing UTF-8 to UTF-16 re-encoding for PAC
  Resolves: RHEL-27253
- Make TCP waiting time configurable
  Resolves: RHEL-17132

Signed-off-by: Julien Rische <jrische@redhat.com>
2024-03-22 17:38:06 +01:00
Julien Rische
19e63e55c9 New upstream version (1.21.1)
- Fix double-free in KDC TGS processing (CVE-2023-39975)
- Add support for "pac_privsvr_enctype" KDB string attribute

Resolves: rhbz#2060421
Signed-off-by: Julien Rische <jrische@redhat.com>
2023-08-08 17:22:24 +02:00
Julien Rische
21e03e152b Do not disable PKINIT if some of the well-known DH groups are unavailable
Resolves: rhbz#2187722
Signed-off-by: Julien Rische <jrische@redhat.com>
2023-06-08 16:46:31 +02:00
Julien Rische
73e19c7eb6 Make PKINIT CMS SHA-1 signature verification available in FIPS mode
Resolves: rhbz#2155607
Signed-off-by: Julien Rische <jrische@redhat.com>
2023-06-08 16:46:21 +02:00
Julien Rische
a599b39ea9 Allow to set PAC ticket signature as optional
Resolves: rhbz#2178298
Signed-off-by: Julien Rische <jrische@redhat.com>
2023-06-08 15:43:12 +02:00
Julien Rische
a135c3ec8a Fix datetime parsing in kadmin on s390x
Resolves: rhbz#2169985
Signed-off-by: Julien Rische <jrische@redhat.com>
2023-02-22 16:41:33 +01:00
Julien Rische
4b799ce613 Fix double free on kdb5_util key creation failure
Resolves: rhbz#2166603
Signed-off-by: Julien Rische <jrische@redhat.com>
2023-02-14 10:08:44 +01:00
Julien Rische
db46465e14 Add support for MS-PAC extended KDC signature (CVE-2022-37967)
Resolves: rhbz#2165827
Signed-off-by: Julien Rische <jrische@redhat.com>
2023-01-31 17:37:29 +01:00
Julien Rische
01971e8acb Add missing Bugzilla reference 2023-01-31 15:55:54 +01:00
Julien Rische
49e904cdde Do not block KRB5KDF and MD4/5 in FIPS mode
Bypass OpenSSL's restrictions to use KRB5KDF in FIPS mode in case at
least one of AES SHA-1 HMAC encryption types are used.

Use OpenSSL 3.0 library context to access MD4 and MD5 lazily from
legacy provider if RADIUS is being used or RC4 encryption type is
enabled, without affecting global context.

Such exceptions should not be allowed by the default FIPS crypto
policy.

Resolves: rhbz#2162461

Signed-off-by: Julien Rische <jrische@redhat.com>
2023-01-19 19:39:27 +01:00
Julien Rische
12d175e299 Add AES SHA-2 HMAC family as default KDC etypes
Resolves: rhbz#2068535
Signed-off-by: Julien Rische <jrische@redhat.com>
2023-01-13 15:03:46 +01:00
Julien Rische
1f6e56b48b Fix year in last changelog message
Resolves: rhbz#2159643
Signed-off-by: Julien Rische <jrische@redhat.com>
2023-01-10 15:41:32 +01:00
Julien Rische
28849e0b1c Strip debugging data from ksu executable file
Resolves: rhbz#2159643
Signed-off-by: Julien Rische <jrische@redhat.com>
2023-01-10 10:36:03 +01:00
Julien Rische
bffc62bbd8 Make tests compatible with sssd_krb5_locator_plugin.so
The sssd_krb5_locator_plugin.so plugin provided by sssd-client conflicts
with the upstream test t_discover_uri.py. The test has to be modified in
order to avoid false positive.

Resolves: rhbz#2151513
Signed-off-by: Julien Rische <jrische@redhat.com>
2022-12-20 17:06:07 +01:00
Julien Rische
722f10118c Remove invalid password expiry warning
Resolves: rhbz#2121099
Signed-off-by: Julien Rische <jrische@redhat.com>
2022-12-06 12:39:21 +01:00
Julien Rische
6e7ed5a0ab Update error checking for OpenSSL CMS_verify
Resolves: rhbz#2063838
Signed-off-by: Julien Rische <jrische@redhat.com>
2022-12-06 12:39:21 +01:00
Julien Rische
22de4f021f New upstream version (1.20.1)
Resolves: rhbz#2016312
Resolves: rhbz#2140971
Signed-off-by: Julien Rische <jrische@redhat.com>
2022-12-06 12:39:15 +01:00
Julien Rische
538c7a8ffc Make kprop work for dump files larger than 4GB
If the dump file size does not fit in 32 bits, encode four zero bytes
(forcing an error for unmodified kpropd) followed by the size in the
next 64 bits.

Add a functional test case, but only run it when an environment
variable is set, as processing a 4GB dump file is too
resource-intensive for make check.

Resolves: rhbz#2133014

Signed-off-by: Julien Rische <jrische@redhat.com>
2022-10-18 16:48:30 +02:00
Julien Rische
9fd115708c Set "supportedCMSTypes" to SHA-512/256 with RSA
Resolves: rhbz#2068935
Signed-off-by: Julien Rische <jrische@redhat.com>
2022-07-08 15:19:35 +02:00
Julien Rische
08803b1c46 Allow use of larger RADIUS attributes in krad library
In kr_attrset_decode(), explicitly treat the length byte as unsigned.
    Otherwise attributes longer than 125 characters will be rejected with
    EBADMSG.

    Add a 253-character-long NAS-Identifier attribute to the tests to make
    sure that attributes with the maximal number of characters are working
    as expected.

    [ghudson@mit.edu: used uint8_t cast per current practices; edited
    commit message]

    ticket: 9036 (new)

From upstream, needed in preparation for OAuth2 support for FreeIPA and
SSSD.

Resolves: rhbz#2100351

Signed-off-by: Julien Rische <jrische@redhat.com>
2022-06-23 14:48:11 +02:00
Julien Rische
5fafe74f37 Fix libkrad client cleanup code
Resolves: rhbz#2100351

Signed-off-by: Julien Rische <jrische@redhat.com>
2022-06-23 14:47:18 +02:00
Julien Rische
6ea8af6747 Fix OpenSSL 3 MD5 encryption in FIPS mode
MD4 cipher requires OpenSSL3's "legacy" provider, while MD5 fetched from
the "default" one. Both ciphers are unavailable in FIPS mode, however
MD5 is tolerated for RADIUS requests on local host.

The OpenSSL3 library context was missing the "default" provider, causing
MD5 encryption to fail in FIPS mode.

Resolves: rhbz#2068458

Signed-off-by: Julien Rische <jrische@redhat.com>
2022-05-25 11:49:51 +02:00
Julien Rische
d78e3940d1 Allow krad UDP/TCP localhost connection with FIPS
libkrad allows to establish connections only to UNIX socket in FIPS
mode, because MD5 digest is not considered safe enough to be used for
network communication. However, FreeRadius requires connection on TCP or
UDP ports.

This commit allows TCP or UDP connections in FIPS mode if destination is
localhost.

Resolves: rhbz#2068458

Signed-off-by: Julien Rische <jrische@redhat.com>
2022-05-25 10:13:47 +02:00
Julien Rische
99ca133dd0 Use p11-kit as default PKCS11 module
Resolves: rhbz#2030981

Signed-off-by: Julien Rische <jrische@redhat.com>
2022-05-03 17:07:12 +02:00
Julien Rische
4262e013b4 Try harder to avoid password change replay errors
change_set_password() was changed to prefer TCP.  However, because
UDP_LAST falls back to UDP after one second, we can still get a replay
error due to a dropped packet, before the TCP layer has a chance to
retry.

Instead, try k5_sendto() with NO_UDP, and only fall back to UDP after
TCP fails completely without reaching a server.  In sendto_kdc.c,
implement an ONLY_UDP transport strategy to allow the UDP fallback.

Resolves: rhbz#2075186

Signed-off-by: Julien Rische <jrische@redhat.com>
2022-04-26 15:32:34 +02:00
Julien Rische
670d3af2d8 Fix global dejagnu test suite
Global dejagnu tests in src/tests/dejagnu were not following the
enforced test suite directory naming.

Resolves: rhbz#2053133

Signed-off-by: Julien Rische <jrische@redhat.com>
2022-04-11 12:03:13 +02:00
Julien Rische
72dec680b5 Use newly enforced dejagnu path naming convention
Since version 1.6.3, dejagnu started to enforce a naming convention that
was already in place, but not mandatory: dejagnu test directories have
to be named "testsuite". If they don't implicit relative sub-paths
resolution (e.g. "lib", "config") is not forking.

This commit renames kadm5 library's unit tests directory to match this
requirement.

This fix won't be applied upstream because these tests were removed in
version 1.20.

Resolves: rhbz#2053133

Signed-off-by: Julien Rische <jrische@redhat.com>
2022-03-31 19:03:03 +02:00
Julien Rische
743ee90668 Use SHA-256 instead of SHA-1 for PKINIT CMS digest
CMS digest and signature algorithm for the anonymous PKINIT is changed
from SHA-1 to SHA-256. SHA-1 hasn't been considered secure anymore for
this kind of purposes for some years already.

Resolves: rhbz#2064823

Signed-off-by: Julien Rische <jrische@redhat.com>
2022-03-16 17:49:06 +01:00
Julien Rische
d5c38cc27b Do not block KRB5KDF and MD4/5 in FIPS mode
Bypass OpenSSL's restrictions to use KRB5KDF in FIPS mode in case at
least one of AES SHA-1 HMAC encryption types are used.

Use OpenSSL 3.0 library context to access MD4 and MD5 lazily from
legacy provider if RADIUS is being used or RC4 encryption type is
enabled, without affecting global context.

Remove EVP_MD_CTX_FLAG_NON_FIPS_ALLOW flag since does not have any
effect anymore.

Such exceptions should not be allowed by the default FIPS crypto
policy.

Resolves: rhbz#2039684
Resolves: rhbz#2053135

Signed-off-by: Julien Rische <jrische@redhat.com>
2022-02-28 14:19:37 +01:00
Antonio Torres
859e264a8c Remove -specs= from krb5-config output
Resolves: bz#1997021
Signed-off-by: Antonio Torres <antorres@redhat.com>
2021-12-17 14:12:12 +01:00
Antonio Torres
f34cb373a2 Fix KDC null deref on TGS inner body null server (CVE-2021-37750)
Resolves: #1997602
Signed-off-by: Antonio Torres <antorres@redhat.com>
2021-10-20 17:08:04 +02:00
Mohan Boddu
364706b0c5 Rebuilt for IMA sigs, glibc 2.34, aarch64 flags
Related: rhbz#1991688
Signed-off-by: Mohan Boddu <mboddu@redhat.com>
2021-08-09 21:12:46 +00:00
Robbie Harwood
d14638ed20 Fix KDC null deref on bad encrypted challenge (CVE-2021-36222)
Resolves: #1983733
2021-07-20 14:51:15 -04:00
Robbie Harwood
f1e7f38975 Update OpenSSL 3 provider handling to clean up properly
Resolves: #1955873
2021-07-14 16:32:30 -04:00
Robbie Harwood
e7aeea399f Sync openssl3 patches with upstream
Resolves: #1955873
2021-06-21 13:24:29 -04:00
Robbie Harwood
8855babfbf Add rpminspect and clean up mass rebuild mess
Resolves: #1967505
2021-06-17 18:55:14 -04:00
Robbie Harwood
bbae1053b5 Fix several fallback canonicalization problems
Resolves: #1967505
2021-06-17 17:47:21 -04:00
Mohan Boddu
b99dafad10 - Rebuilt for RHEL 9 BETA for openssl 3.0
Related: rhbz#1971065
Signed-off-by: Mohan Boddu <mboddu@redhat.com>
2021-06-15 20:29:45 +00:00
Kaleemullah Siddiqui
9cc7b9bf08 Add gating definition for RHEL 9
Related: rhbz#1947473

Signed-off-by: Kaleemullah Siddiqui <ksiddiqu@redhat.com>
2021-06-11 13:08:52 +00:00
Robbie Harwood
d223dacd67 Backport KCM retrieval fixes
Resolves: #1956403
2021-06-10 15:27:22 -04:00
Robbie Harwood
aec30dcfcb Fix DES3 mention in KDFs
Resolves: #1955873
2021-05-20 10:39:59 -04:00
Robbie Harwood
0018db9e38 Port to OpenSSL 3 (alpha 15)
Resolves: #1955873
2021-05-19 19:58:33 -04:00
Mohan Boddu
028c031c89 - Rebuilt for RHEL 9 BETA on Apr 15th 2021. Related: rhbz#1947937
Signed-off-by: Mohan Boddu <mboddu@redhat.com>
2021-04-16 00:56:33 +00:00
DistroBaker
7a9f036cee Merged update from upstream sources
This is an automated DistroBaker update from upstream sources.
If you do not know what this is about or would like to opt out,
contact the OSCI team.

Source: https://src.fedoraproject.org/rpms/krb5.git#1c03da79deb8ed96af1eed5beacd2db24c4212a6
2021-03-11 20:10:59 +00:00
Robbie Harwood
22be492dbf Manual merge with Fedora 34
Update to 1c03da79de
2021-03-09 12:06:44 -05:00
DistroBaker
94bc4ee9cb Merged update from upstream sources
This is an automated DistroBaker update from upstream sources.
If you do not know what this is about or would like to opt out,
contact the OSCI team.

Source: https://src.fedoraproject.org/rpms/krb5.git#ab3f34f0e757af2367b8c31b9bd42feae03d0e48
2021-02-18 22:21:10 +00:00