mirror of
https://salsa.debian.org/freeipa-team/freeipa.git
synced 2024-12-24 08:00:02 -06:00
3f1b373cb2
Since November 2020, Active Directory KDC generates a new type of signature as part of the PAC. It is called "ticket signature", and is generated based on the encrypted part of the ticket. The presence of this signature is not mandatory in order for the PAC to be accepted for S4U requests. However, the behavior is different for MIT krb5. Support was added as part of the 1.20 release, and this signature is required in order to process S4U requests. Contrary to the PAC extended KDC signature, the code generating this signature cannot be isolated and backported to older krb5 versions because this version of the KDB API does not allow passing the content of the ticket's encrypted part to IPA. This is an issue in gradual upgrade scenarios where some IPA servers rely on 1.19 and older versions of MIT krb5, while others use version 1.20 or newer. A service ticket that was provided by 1.19- IPA KDC will be rejected when used by a service against a 1.20+ IPA KDC for S4U requests. On Fedora, CentOS 9 Stream, and RHEL 9, when the krb5 version is 1.20 or newer, it will include a downstream-only update adding the "optional_pac_tkt_chksum" KDB string attribute allowing to tolerate the absence of PAC ticket signatures, if necessary. This commit adds an extra step during the installation and update processes where it adds a "pacTktSignSupported" ipaConfigString attribute in "cn=KDC,cn=[server],cn=masters,cn=ipa,cn=etc,[basedn]" if the MIT krb5 version IPA what built with was 1.20 or newer. This commit also set "optional_pac_tkt_chksum" as a virtual KDB entry attribute. This means the value of the attribute is not actually stored in the database (to avoid race conditions), but its value is determined at the KDC starting time by search the "pacTktSignSupported" ipaConfigString in the server list. If this value is missing for at least of them is missing, enforcement of the PAC ticket signature is disabled by setting "optional_pac_tkt_chksum" to true for the local realm TGS KDB entry. For foreign realm TGS KDB entries, the "optional_pac_tkt_chksum" virtual string attribute is set to true systematically, because, at least for now, trusted AD domains can still have PAC ticket signature support disabled. Given the fact the "pacTktSignSupported" ipaConfigString for a single server is added when this server is updated, and that the value of "optional_pac_tkt_chksum" is determined at KDC starting time based on the ipaConfigString attributes of all the KDCs in the domain, this requires to restart all the KDCs in the domain after all IPA servers were updated in order for PAC ticket signature enforcement to actually take effect. Fixes: https://pagure.io/freeipa/issue/9371 Signed-off-by: Julien Rische <jrische@redhat.com> Reviewed-By: Rob Crittenden <rcritten@redhat.com> Reviewed-By: Alexander Bokovoy <abokovoy@redhat.com>
58 lines
2.0 KiB
Python
58 lines
2.0 KiB
Python
# Authors: Rob Crittenden <rcritten@redhat.com>
|
|
#
|
|
# Copyright (C) 2007 Red Hat
|
|
# see file 'COPYING' for use and warranty information
|
|
#
|
|
# This program is free software; you can redistribute it and/or modify
|
|
# it under the terms of the GNU General Public License as published by
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
# (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
#
|
|
|
|
from pkg_resources import parse_version
|
|
|
|
# The full version including strings
|
|
VERSION = "@VERSION@"
|
|
|
|
# A fuller version including the vendor tag (e.g. 3.3.3-34.fc20)
|
|
VENDOR_VERSION = "@VERSION@@VENDOR_SUFFIX@"
|
|
|
|
|
|
# Just the numeric portion of the version so one can do direct numeric
|
|
# comparisons to see if the API is compatible.
|
|
#
|
|
# How NUM_VERSION was generated changed over time:
|
|
# Before IPA 3.1.3, it was simply concatenated decimal numbers:
|
|
# IPA 2.2.2: NUM_VERSION=222
|
|
# IPA 2.2.99: NUM_VERSION=2299 (development version)
|
|
# IPA 3.1.0: NUM_VERSION=310
|
|
# IPA 3.1.3: NUM_VERSION=313
|
|
# In IPA 3.1.4 and 3.2.0, the version was taken as an octal number due to a bug
|
|
# (https://fedorahosted.org/freeipa/ticket/3622):
|
|
# IPA 3.1.4: NUM_VERSION=12356 (octal 030104)
|
|
# IPA 3.2.0: NUM_VERSION=12416 (octal 030200)
|
|
# After IPA 3.2.0, it is decimal number where each part has two digits:
|
|
# IPA 3.2.1: NUM_VERSION=30201
|
|
# IPA 3.2.99: NUM_VERSION=30299 (development version)
|
|
# IPA 3.3.0: NUM_VERSION=30300
|
|
NUM_VERSION = @NUM_VERSION@
|
|
|
|
|
|
# The version of the API.
|
|
API_VERSION = "@API_VERSION@"
|
|
|
|
|
|
DEFAULT_PLUGINS = frozenset(l.strip() for l in """
|
|
@DEFAULT_PLUGINS@
|
|
""".strip().splitlines())
|
|
|
|
KRB5_BUILD_VERSION = parse_version("@KRB5_BUILD_VERSION@")
|