Commit Graph

68 Commits

Author SHA1 Message Date
Julien Rische
760155b461 Fix gating rule for TMT test plan
Signed-off-by: Julien Rische <jrische@redhat.com>
2025-05-15 13:47:53 +02:00
Julien Rische
08d251b9d6 Remove source of entropy tests
Signed-off-by: Julien Rische <jrische@redhat.com>
2025-05-05 17:01:38 +02:00
Julien Rische
7be83f5dbc krb5 1.21.1-8
- Do not block HMAC-MD4/5 in FIPS mode
  Resolves: RHEL-88704
- Don't issue RC4 session keys by default (CVE-2025-3576)
  Resolves: RHEL-88048
- Add PKINIT paChecksum2 from MS-PKCA v20230920
  Resolves: RHEL-82647

Signed-off-by: Julien Rische <jrische@redhat.com>
2025-04-30 16:36:44 +02:00
Michal Polovka
06f28789f7 krb5 1.21.1-7
- Use TMT for gating tests
- Add dedicated tests sub-package

Signed-off-by: Michal Polovka <mpolovka@redhat.com>
Co-authored-by: Julien Rische <jrische@redhat.com>
2025-03-25 13:41:29 +01:00
Julien Rische
f376552134 krb5 1.21.1-6
- Prevent overflow when calculating ulog block size (CVE-2025-24528)
  Resolves: RHEL-76759

Signed-off-by: Julien Rische <jrische@redhat.com>
2025-01-29 12:11:07 +01:00
Julien Rische
3a633f7a64 Enable SoftHSM PKCS11 tests
Signed-off-by: Julien Rische <jrische@redhat.com>
2025-01-28 17:39:03 +01:00
Julien Rische
bae456c76c krb5 1.21.1-5
- Support PKCS11 EC client certs in PKINIT
  Resolves: RHEL-74374
- kdb5_util: fix DB entry flags on modification
  Resolves: RHEL-56059
- Add ECDH support for PKINIT (RFC5349)
  Resolves: RHEL-4902

Signed-off-by: Julien Rische <jrische@redhat.com>
2025-01-17 14:52:40 +01:00
Julien Rische
2b904f4c4a krb5 1.21.1-4
- libkrad: implement support for Message-Authenticator (CVE-2024-3596)
  Resolves: RHEL-55423
- Fix various issues detected by static analysis
  Resolves: RHEL-58216
- Remove RSA protocol for PKINIT
  Resolves: RHEL-15323

Signed-off-by: Julien Rische <jrische@redhat.com>
2024-10-17 17:38:12 +02:00
Julien Rische
ff5212e6a8 Enable abidiff in rpminspect
Signed-off-by: Julien Rische <jrische@redhat.com>
2024-08-08 18:24:06 +02:00
Julien Rische
201d6cb428 Fix expected kadmin principal in inplace-upgrade-sanity test
Signed-off-by: Julien Rische <jrische@redhat.com>
2024-08-08 18:22:50 +02:00
Julien Rische
6b95961231 krb5 1.21.1-3
- CVE-2024-37370 CVE-2024-37371
  Fix vulnerabilities in GSS message token handling
  Resolves: RHEL-45402 RHEL-45392

Signed-off-by: Julien Rische <jrische@redhat.com>
2024-07-05 12:20:28 +02:00
Julien Rische
b0d04d78e0 krb5 1.21.1-2
- Fix memory leak in GSSAPI interface
  Resolves: RHEL-27251
- Fix memory leak in PMAP RPC interface
  Resolves: RHEL-27245
- Fix memory leak in failing UTF-8 to UTF-16 re-encoding for PAC
  Resolves: RHEL-27253
- Make TCP waiting time configurable
  Resolves: RHEL-17132

Signed-off-by: Julien Rische <jrische@redhat.com>
2024-03-22 17:38:06 +01:00
Julien Rische
19e63e55c9 New upstream version (1.21.1)
- Fix double-free in KDC TGS processing (CVE-2023-39975)
- Add support for "pac_privsvr_enctype" KDB string attribute

Resolves: rhbz#2060421
Signed-off-by: Julien Rische <jrische@redhat.com>
2023-08-08 17:22:24 +02:00
Julien Rische
21e03e152b Do not disable PKINIT if some of the well-known DH groups are unavailable
Resolves: rhbz#2187722
Signed-off-by: Julien Rische <jrische@redhat.com>
2023-06-08 16:46:31 +02:00
Julien Rische
73e19c7eb6 Make PKINIT CMS SHA-1 signature verification available in FIPS mode
Resolves: rhbz#2155607
Signed-off-by: Julien Rische <jrische@redhat.com>
2023-06-08 16:46:21 +02:00
Julien Rische
a599b39ea9 Allow to set PAC ticket signature as optional
Resolves: rhbz#2178298
Signed-off-by: Julien Rische <jrische@redhat.com>
2023-06-08 15:43:12 +02:00
Julien Rische
a135c3ec8a Fix datetime parsing in kadmin on s390x
Resolves: rhbz#2169985
Signed-off-by: Julien Rische <jrische@redhat.com>
2023-02-22 16:41:33 +01:00
Julien Rische
4b799ce613 Fix double free on kdb5_util key creation failure
Resolves: rhbz#2166603
Signed-off-by: Julien Rische <jrische@redhat.com>
2023-02-14 10:08:44 +01:00
Julien Rische
db46465e14 Add support for MS-PAC extended KDC signature (CVE-2022-37967)
Resolves: rhbz#2165827
Signed-off-by: Julien Rische <jrische@redhat.com>
2023-01-31 17:37:29 +01:00
Julien Rische
01971e8acb Add missing Bugzilla reference 2023-01-31 15:55:54 +01:00
Julien Rische
49e904cdde Do not block KRB5KDF and MD4/5 in FIPS mode
Bypass OpenSSL's restrictions to use KRB5KDF in FIPS mode in case at
least one of AES SHA-1 HMAC encryption types are used.

Use OpenSSL 3.0 library context to access MD4 and MD5 lazily from
legacy provider if RADIUS is being used or RC4 encryption type is
enabled, without affecting global context.

Such exceptions should not be allowed by the default FIPS crypto
policy.

Resolves: rhbz#2162461

Signed-off-by: Julien Rische <jrische@redhat.com>
2023-01-19 19:39:27 +01:00
Julien Rische
12d175e299 Add AES SHA-2 HMAC family as default KDC etypes
Resolves: rhbz#2068535
Signed-off-by: Julien Rische <jrische@redhat.com>
2023-01-13 15:03:46 +01:00
Julien Rische
1f6e56b48b Fix year in last changelog message
Resolves: rhbz#2159643
Signed-off-by: Julien Rische <jrische@redhat.com>
2023-01-10 15:41:32 +01:00
Julien Rische
28849e0b1c Strip debugging data from ksu executable file
Resolves: rhbz#2159643
Signed-off-by: Julien Rische <jrische@redhat.com>
2023-01-10 10:36:03 +01:00
Julien Rische
bffc62bbd8 Make tests compatible with sssd_krb5_locator_plugin.so
The sssd_krb5_locator_plugin.so plugin provided by sssd-client conflicts
with the upstream test t_discover_uri.py. The test has to be modified in
order to avoid false positive.

Resolves: rhbz#2151513
Signed-off-by: Julien Rische <jrische@redhat.com>
2022-12-20 17:06:07 +01:00
Julien Rische
722f10118c Remove invalid password expiry warning
Resolves: rhbz#2121099
Signed-off-by: Julien Rische <jrische@redhat.com>
2022-12-06 12:39:21 +01:00
Julien Rische
6e7ed5a0ab Update error checking for OpenSSL CMS_verify
Resolves: rhbz#2063838
Signed-off-by: Julien Rische <jrische@redhat.com>
2022-12-06 12:39:21 +01:00
Julien Rische
22de4f021f New upstream version (1.20.1)
Resolves: rhbz#2016312
Resolves: rhbz#2140971
Signed-off-by: Julien Rische <jrische@redhat.com>
2022-12-06 12:39:15 +01:00
Julien Rische
538c7a8ffc Make kprop work for dump files larger than 4GB
If the dump file size does not fit in 32 bits, encode four zero bytes
(forcing an error for unmodified kpropd) followed by the size in the
next 64 bits.

Add a functional test case, but only run it when an environment
variable is set, as processing a 4GB dump file is too
resource-intensive for make check.

Resolves: rhbz#2133014

Signed-off-by: Julien Rische <jrische@redhat.com>
2022-10-18 16:48:30 +02:00
Julien Rische
9fd115708c Set "supportedCMSTypes" to SHA-512/256 with RSA
Resolves: rhbz#2068935
Signed-off-by: Julien Rische <jrische@redhat.com>
2022-07-08 15:19:35 +02:00
Julien Rische
08803b1c46 Allow use of larger RADIUS attributes in krad library
In kr_attrset_decode(), explicitly treat the length byte as unsigned.
    Otherwise attributes longer than 125 characters will be rejected with
    EBADMSG.

    Add a 253-character-long NAS-Identifier attribute to the tests to make
    sure that attributes with the maximal number of characters are working
    as expected.

    [ghudson@mit.edu: used uint8_t cast per current practices; edited
    commit message]

    ticket: 9036 (new)

From upstream, needed in preparation for OAuth2 support for FreeIPA and
SSSD.

Resolves: rhbz#2100351

Signed-off-by: Julien Rische <jrische@redhat.com>
2022-06-23 14:48:11 +02:00
Julien Rische
5fafe74f37 Fix libkrad client cleanup code
Resolves: rhbz#2100351

Signed-off-by: Julien Rische <jrische@redhat.com>
2022-06-23 14:47:18 +02:00
Julien Rische
6ea8af6747 Fix OpenSSL 3 MD5 encryption in FIPS mode
MD4 cipher requires OpenSSL3's "legacy" provider, while MD5 fetched from
the "default" one. Both ciphers are unavailable in FIPS mode, however
MD5 is tolerated for RADIUS requests on local host.

The OpenSSL3 library context was missing the "default" provider, causing
MD5 encryption to fail in FIPS mode.

Resolves: rhbz#2068458

Signed-off-by: Julien Rische <jrische@redhat.com>
2022-05-25 11:49:51 +02:00
Julien Rische
d78e3940d1 Allow krad UDP/TCP localhost connection with FIPS
libkrad allows to establish connections only to UNIX socket in FIPS
mode, because MD5 digest is not considered safe enough to be used for
network communication. However, FreeRadius requires connection on TCP or
UDP ports.

This commit allows TCP or UDP connections in FIPS mode if destination is
localhost.

Resolves: rhbz#2068458

Signed-off-by: Julien Rische <jrische@redhat.com>
2022-05-25 10:13:47 +02:00
Julien Rische
99ca133dd0 Use p11-kit as default PKCS11 module
Resolves: rhbz#2030981

Signed-off-by: Julien Rische <jrische@redhat.com>
2022-05-03 17:07:12 +02:00
Julien Rische
4262e013b4 Try harder to avoid password change replay errors
change_set_password() was changed to prefer TCP.  However, because
UDP_LAST falls back to UDP after one second, we can still get a replay
error due to a dropped packet, before the TCP layer has a chance to
retry.

Instead, try k5_sendto() with NO_UDP, and only fall back to UDP after
TCP fails completely without reaching a server.  In sendto_kdc.c,
implement an ONLY_UDP transport strategy to allow the UDP fallback.

Resolves: rhbz#2075186

Signed-off-by: Julien Rische <jrische@redhat.com>
2022-04-26 15:32:34 +02:00
Julien Rische
670d3af2d8 Fix global dejagnu test suite
Global dejagnu tests in src/tests/dejagnu were not following the
enforced test suite directory naming.

Resolves: rhbz#2053133

Signed-off-by: Julien Rische <jrische@redhat.com>
2022-04-11 12:03:13 +02:00
Julien Rische
72dec680b5 Use newly enforced dejagnu path naming convention
Since version 1.6.3, dejagnu started to enforce a naming convention that
was already in place, but not mandatory: dejagnu test directories have
to be named "testsuite". If they don't implicit relative sub-paths
resolution (e.g. "lib", "config") is not forking.

This commit renames kadm5 library's unit tests directory to match this
requirement.

This fix won't be applied upstream because these tests were removed in
version 1.20.

Resolves: rhbz#2053133

Signed-off-by: Julien Rische <jrische@redhat.com>
2022-03-31 19:03:03 +02:00
Julien Rische
743ee90668 Use SHA-256 instead of SHA-1 for PKINIT CMS digest
CMS digest and signature algorithm for the anonymous PKINIT is changed
from SHA-1 to SHA-256. SHA-1 hasn't been considered secure anymore for
this kind of purposes for some years already.

Resolves: rhbz#2064823

Signed-off-by: Julien Rische <jrische@redhat.com>
2022-03-16 17:49:06 +01:00
Julien Rische
d5c38cc27b Do not block KRB5KDF and MD4/5 in FIPS mode
Bypass OpenSSL's restrictions to use KRB5KDF in FIPS mode in case at
least one of AES SHA-1 HMAC encryption types are used.

Use OpenSSL 3.0 library context to access MD4 and MD5 lazily from
legacy provider if RADIUS is being used or RC4 encryption type is
enabled, without affecting global context.

Remove EVP_MD_CTX_FLAG_NON_FIPS_ALLOW flag since does not have any
effect anymore.

Such exceptions should not be allowed by the default FIPS crypto
policy.

Resolves: rhbz#2039684
Resolves: rhbz#2053135

Signed-off-by: Julien Rische <jrische@redhat.com>
2022-02-28 14:19:37 +01:00
Antonio Torres
859e264a8c Remove -specs= from krb5-config output
Resolves: bz#1997021
Signed-off-by: Antonio Torres <antorres@redhat.com>
2021-12-17 14:12:12 +01:00
Antonio Torres
f34cb373a2 Fix KDC null deref on TGS inner body null server (CVE-2021-37750)
Resolves: #1997602
Signed-off-by: Antonio Torres <antorres@redhat.com>
2021-10-20 17:08:04 +02:00
Mohan Boddu
364706b0c5 Rebuilt for IMA sigs, glibc 2.34, aarch64 flags
Related: rhbz#1991688
Signed-off-by: Mohan Boddu <mboddu@redhat.com>
2021-08-09 21:12:46 +00:00
Robbie Harwood
d14638ed20 Fix KDC null deref on bad encrypted challenge (CVE-2021-36222)
Resolves: #1983733
2021-07-20 14:51:15 -04:00
Robbie Harwood
f1e7f38975 Update OpenSSL 3 provider handling to clean up properly
Resolves: #1955873
2021-07-14 16:32:30 -04:00
Robbie Harwood
e7aeea399f Sync openssl3 patches with upstream
Resolves: #1955873
2021-06-21 13:24:29 -04:00
Robbie Harwood
8855babfbf Add rpminspect and clean up mass rebuild mess
Resolves: #1967505
2021-06-17 18:55:14 -04:00
Robbie Harwood
bbae1053b5 Fix several fallback canonicalization problems
Resolves: #1967505
2021-06-17 17:47:21 -04:00
Mohan Boddu
b99dafad10 - Rebuilt for RHEL 9 BETA for openssl 3.0
Related: rhbz#1971065
Signed-off-by: Mohan Boddu <mboddu@redhat.com>
2021-06-15 20:29:45 +00:00
Kaleemullah Siddiqui
9cc7b9bf08 Add gating definition for RHEL 9
Related: rhbz#1947473

Signed-off-by: Kaleemullah Siddiqui <ksiddiqu@redhat.com>
2021-06-11 13:08:52 +00:00