freeipa/util
Tomas Babej 0e8a329048 Prevent integer overflow when setting krbPasswordExpiration
Since in Kerberos V5 are used 32-bit unix timestamps, setting
maxlife in pwpolicy to values such as 9999 days would cause
integer overflow in krbPasswordExpiration attribute.

This would result into unpredictable behaviour such as users
not being able to log in after password expiration if password
policy was changed (#3114) or new users not being able to log
in at all (#3312).

The timestamp value is truncated to Jan 1, 2038 in ipa-kdc driver.

https://fedorahosted.org/freeipa/ticket/3312
https://fedorahosted.org/freeipa/ticket/3114
2013-02-08 15:54:21 +01:00
..
ipa_krb5.c Move code into common krb5 utils 2012-07-30 10:31:47 -04:00
ipa_krb5.h Move code into common krb5 utils 2012-07-30 10:31:47 -04:00
ipa_pwd_ntlm.c Make encode_ntlm_keys() public 2012-09-06 09:24:58 +02:00
ipa_pwd.c Make encode_ntlm_keys() public 2012-09-06 09:24:58 +02:00
ipa_pwd.h Prevent integer overflow when setting krbPasswordExpiration 2013-02-08 15:54:21 +01:00