Sync from SUSE:SLFO:Main pam_krb5 revision 764e4c39ecb1057c3d9a4cef4258b888
This commit is contained in:
commit
998f4ba751
23
.gitattributes
vendored
Normal file
23
.gitattributes
vendored
Normal file
@ -0,0 +1,23 @@
|
|||||||
|
## Default LFS
|
||||||
|
*.7z filter=lfs diff=lfs merge=lfs -text
|
||||||
|
*.bsp filter=lfs diff=lfs merge=lfs -text
|
||||||
|
*.bz2 filter=lfs diff=lfs merge=lfs -text
|
||||||
|
*.gem filter=lfs diff=lfs merge=lfs -text
|
||||||
|
*.gz filter=lfs diff=lfs merge=lfs -text
|
||||||
|
*.jar filter=lfs diff=lfs merge=lfs -text
|
||||||
|
*.lz filter=lfs diff=lfs merge=lfs -text
|
||||||
|
*.lzma filter=lfs diff=lfs merge=lfs -text
|
||||||
|
*.obscpio filter=lfs diff=lfs merge=lfs -text
|
||||||
|
*.oxt filter=lfs diff=lfs merge=lfs -text
|
||||||
|
*.pdf filter=lfs diff=lfs merge=lfs -text
|
||||||
|
*.png filter=lfs diff=lfs merge=lfs -text
|
||||||
|
*.rpm filter=lfs diff=lfs merge=lfs -text
|
||||||
|
*.tbz filter=lfs diff=lfs merge=lfs -text
|
||||||
|
*.tbz2 filter=lfs diff=lfs merge=lfs -text
|
||||||
|
*.tgz filter=lfs diff=lfs merge=lfs -text
|
||||||
|
*.ttf filter=lfs diff=lfs merge=lfs -text
|
||||||
|
*.txz filter=lfs diff=lfs merge=lfs -text
|
||||||
|
*.whl filter=lfs diff=lfs merge=lfs -text
|
||||||
|
*.xz filter=lfs diff=lfs merge=lfs -text
|
||||||
|
*.zip filter=lfs diff=lfs merge=lfs -text
|
||||||
|
*.zst filter=lfs diff=lfs merge=lfs -text
|
3
baselibs.conf
Normal file
3
baselibs.conf
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
pam_krb5
|
||||||
|
+/lib(64)?/security/pam_krb5/pam_krb5_storetmp
|
||||||
|
supplements "packageand(pam_krb5:pam-<targettype>)"
|
75
bug-641008_pam_krb5-2.3.11-setcred-log.diff
Normal file
75
bug-641008_pam_krb5-2.3.11-setcred-log.diff
Normal file
@ -0,0 +1,75 @@
|
|||||||
|
Index: pam_krb5-2.4.13/src/auth.c
|
||||||
|
===================================================================
|
||||||
|
--- pam_krb5-2.4.13.orig/src/auth.c
|
||||||
|
+++ pam_krb5-2.4.13/src/auth.c
|
||||||
|
@@ -435,13 +435,33 @@ pam_sm_setcred(pam_handle_t *pamh, int f
|
||||||
|
int argc, PAM_KRB5_MAYBE_CONST char **argv)
|
||||||
|
{
|
||||||
|
const char *why = "";
|
||||||
|
+ krb5_context ctx;
|
||||||
|
+ struct _pam_krb5_options *options;
|
||||||
|
struct _pam_krb5_perms *saved_perms;
|
||||||
|
- notice("pam_setcred (%s) called",
|
||||||
|
- (flags & PAM_ESTABLISH_CRED)?"establish credential":
|
||||||
|
- (flags & PAM_REINITIALIZE_CRED)?"reinitialize credential":
|
||||||
|
- (flags & PAM_REFRESH_CRED)?"refresh credential":
|
||||||
|
- (flags & PAM_DELETE_CRED)?"delete credential":"unknown flag");
|
||||||
|
+
|
||||||
|
+ if (_pam_krb5_init_ctx(&ctx, argc, argv) != 0) {
|
||||||
|
+ warn("error initializing Kerberos");
|
||||||
|
+ return PAM_SERVICE_ERR;
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
+ options = _pam_krb5_options_init(pamh, argc, argv, ctx,
|
||||||
|
+ _pam_krb5_option_role_general);
|
||||||
|
+ if (options == NULL) {
|
||||||
|
+ warn("error parsing options (shouldn't happen)");
|
||||||
|
+ krb5_free_context(ctx);
|
||||||
|
+ return PAM_SERVICE_ERR;
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
+ if (options->debug) {
|
||||||
|
+ debug("pam_setcred (%s) called",
|
||||||
|
+ (flags & PAM_ESTABLISH_CRED)?"establish credential":
|
||||||
|
+ (flags & PAM_REINITIALIZE_CRED)?"reinitialize credential":
|
||||||
|
+ (flags & PAM_REFRESH_CRED)?"refresh credential":
|
||||||
|
+ (flags & PAM_DELETE_CRED)?"delete credential":"unknown flag");
|
||||||
|
+ }
|
||||||
|
if (flags & PAM_ESTABLISH_CRED) {
|
||||||
|
+ _pam_krb5_options_free(pamh, ctx, options);
|
||||||
|
+ krb5_free_context(ctx);
|
||||||
|
return _pam_krb5_open_session(pamh, flags, argc, argv,
|
||||||
|
"pam_setcred(PAM_ESTABLISH_CRED)",
|
||||||
|
_pam_krb5_session_caller_setcred);
|
||||||
|
@@ -464,20 +484,30 @@ pam_sm_setcred(pam_handle_t *pamh, int f
|
||||||
|
}
|
||||||
|
saved_perms = NULL;
|
||||||
|
|
||||||
|
+ _pam_krb5_options_free(pamh, ctx, options);
|
||||||
|
+ krb5_free_context(ctx);
|
||||||
|
return i;
|
||||||
|
} else {
|
||||||
|
- debug("looks unsafe - ignore refresh");
|
||||||
|
+ if (options->debug) {
|
||||||
|
+ debug("looks unsafe - ignore refresh");
|
||||||
|
+ }
|
||||||
|
if (saved_perms != NULL) {
|
||||||
|
_pam_krb5_restore_perms_r2e(saved_perms);
|
||||||
|
}
|
||||||
|
+ _pam_krb5_options_free(pamh, ctx, options);
|
||||||
|
+ krb5_free_context(ctx);
|
||||||
|
return PAM_IGNORE;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if (flags & PAM_DELETE_CRED) {
|
||||||
|
+ _pam_krb5_options_free(pamh, ctx, options);
|
||||||
|
+ krb5_free_context(ctx);
|
||||||
|
return _pam_krb5_close_session(pamh, flags, argc, argv,
|
||||||
|
"pam_setcred(PAM_DELETE_CRED)",
|
||||||
|
_pam_krb5_session_caller_setcred);
|
||||||
|
}
|
||||||
|
warn("pam_setcred() called with no flags. Assume PAM_ESTABLISH_CRED");
|
||||||
|
+ _pam_krb5_options_free(pamh, ctx, options);
|
||||||
|
+ krb5_free_context(ctx);
|
||||||
|
return pam_sm_open_session(pamh, (flags | PAM_ESTABLISH_CRED), argc, argv);
|
||||||
|
}
|
13
pam_krb5-2.2.3-1-setcred-assume-establish.dif
Normal file
13
pam_krb5-2.2.3-1-setcred-assume-establish.dif
Normal file
@ -0,0 +1,13 @@
|
|||||||
|
Index: pam_krb5-2.4.13/src/auth.c
|
||||||
|
===================================================================
|
||||||
|
--- pam_krb5-2.4.13.orig/src/auth.c
|
||||||
|
+++ pam_krb5-2.4.13/src/auth.c
|
||||||
|
@@ -478,6 +478,6 @@ pam_sm_setcred(pam_handle_t *pamh, int f
|
||||||
|
"pam_setcred(PAM_DELETE_CRED)",
|
||||||
|
_pam_krb5_session_caller_setcred);
|
||||||
|
}
|
||||||
|
- warn("pam_setcred() called with no flags");
|
||||||
|
- return PAM_SERVICE_ERR;
|
||||||
|
+ warn("pam_setcred() called with no flags. Assume PAM_ESTABLISH_CRED");
|
||||||
|
+ return pam_sm_open_session(pamh, (flags | PAM_ESTABLISH_CRED), argc, argv);
|
||||||
|
}
|
90
pam_krb5-2.3.1-log-choise.dif
Normal file
90
pam_krb5-2.3.1-log-choise.dif
Normal file
@ -0,0 +1,90 @@
|
|||||||
|
Index: pam_krb5-2.4.13/src/acct.c
|
||||||
|
===================================================================
|
||||||
|
--- pam_krb5-2.4.13.orig/src/acct.c
|
||||||
|
+++ pam_krb5-2.4.13/src/acct.c
|
||||||
|
@@ -90,6 +90,10 @@ pam_sm_acct_mgmt(pam_handle_t *pamh, int
|
||||||
|
_pam_krb5_free_ctx(ctx);
|
||||||
|
return PAM_SERVICE_ERR;
|
||||||
|
}
|
||||||
|
+ if (options->debug) {
|
||||||
|
+ debug("pam_acct_mgmt called for '%s', realm '%s'", user,
|
||||||
|
+ options->realm);
|
||||||
|
+ }
|
||||||
|
|
||||||
|
/* Get information about the user and the user's principal name. */
|
||||||
|
userinfo = _pam_krb5_user_info_init(ctx, user, options);
|
||||||
|
Index: pam_krb5-2.4.13/src/auth.c
|
||||||
|
===================================================================
|
||||||
|
--- pam_krb5-2.4.13.orig/src/auth.c
|
||||||
|
+++ pam_krb5-2.4.13/src/auth.c
|
||||||
|
@@ -109,8 +109,8 @@ pam_sm_authenticate(pam_handle_t *pamh,
|
||||||
|
return PAM_SERVICE_ERR;
|
||||||
|
}
|
||||||
|
if (options->debug) {
|
||||||
|
- debug("called to authenticate '%s', configured realm '%s'",
|
||||||
|
- user, options->realm);
|
||||||
|
+ debug("pam_authenticate called for '%s', realm '%s'", user,
|
||||||
|
+ options->realm);
|
||||||
|
}
|
||||||
|
_pam_krb5_set_init_opts(ctx, gic_options, options);
|
||||||
|
|
||||||
|
@@ -434,6 +434,11 @@ pam_sm_setcred(pam_handle_t *pamh, int f
|
||||||
|
int argc, PAM_KRB5_MAYBE_CONST char **argv)
|
||||||
|
{
|
||||||
|
const char *why = "";
|
||||||
|
+ notice("pam_setcred (%s) called",
|
||||||
|
+ (flags & PAM_ESTABLISH_CRED)?"establish credential":
|
||||||
|
+ (flags & PAM_REINITIALIZE_CRED)?"reinitialize credential":
|
||||||
|
+ (flags & PAM_REFRESH_CRED)?"refresh credential":
|
||||||
|
+ (flags & PAM_DELETE_CRED)?"delete credential":"unknown flag");
|
||||||
|
if (flags & PAM_ESTABLISH_CRED) {
|
||||||
|
return _pam_krb5_open_session(pamh, flags, argc, argv,
|
||||||
|
"pam_setcred(PAM_ESTABLISH_CRED)",
|
||||||
|
Index: pam_krb5-2.4.13/src/password.c
|
||||||
|
===================================================================
|
||||||
|
--- pam_krb5-2.4.13.orig/src/password.c
|
||||||
|
+++ pam_krb5-2.4.13/src/password.c
|
||||||
|
@@ -111,6 +111,16 @@ pam_sm_chauthtok(pam_handle_t *pamh, int
|
||||||
|
_pam_krb5_free_ctx(ctx);
|
||||||
|
return PAM_SERVICE_ERR;
|
||||||
|
}
|
||||||
|
+ if (options->debug) {
|
||||||
|
+ debug("pam_chauthtok called (%s) for '%s', realm '%s'",
|
||||||
|
+ (flags & PAM_PRELIM_CHECK) ?
|
||||||
|
+ "preliminary check" :
|
||||||
|
+ ((flags & PAM_UPDATE_AUTHTOK) ?
|
||||||
|
+ "updating authtok":
|
||||||
|
+ "unknown phase"),
|
||||||
|
+ user,
|
||||||
|
+ options->realm);
|
||||||
|
+ }
|
||||||
|
_pam_krb5_set_init_opts(ctx, gic_options, options);
|
||||||
|
|
||||||
|
/* Get information about the user and the user's principal name. */
|
||||||
|
Index: pam_krb5-2.4.13/src/session.c
|
||||||
|
===================================================================
|
||||||
|
--- pam_krb5-2.4.13.orig/src/session.c
|
||||||
|
+++ pam_krb5-2.4.13/src/session.c
|
||||||
|
@@ -98,6 +98,10 @@ _pam_krb5_open_session(pam_handle_t *pam
|
||||||
|
_pam_krb5_free_ctx(ctx);
|
||||||
|
return PAM_SERVICE_ERR;
|
||||||
|
}
|
||||||
|
+ if (options->debug) {
|
||||||
|
+ debug("pam_open_session called for '%s', realm '%s'", user,
|
||||||
|
+ options->realm);
|
||||||
|
+ }
|
||||||
|
|
||||||
|
/* If we're in a no-cred-session situation, return. */
|
||||||
|
if ((!options->cred_session) &&
|
||||||
|
@@ -295,7 +299,10 @@ _pam_krb5_close_session(pam_handle_t *pa
|
||||||
|
_pam_krb5_free_ctx(ctx);
|
||||||
|
return PAM_SERVICE_ERR;
|
||||||
|
}
|
||||||
|
-
|
||||||
|
+ if (options->debug) {
|
||||||
|
+ debug("pam_close_session called for '%s', realm '%s'", user,
|
||||||
|
+ options->realm);
|
||||||
|
+ }
|
||||||
|
/* If we're in a no-cred-session situation, return. */
|
||||||
|
if ((!options->cred_session) &&
|
||||||
|
(caller_type == _pam_krb5_session_caller_setcred)) {
|
116
pam_krb5-2.3.1-switch-perms-on-refresh.dif
Normal file
116
pam_krb5-2.3.1-switch-perms-on-refresh.dif
Normal file
@ -0,0 +1,116 @@
|
|||||||
|
Index: pam_krb5-2.4.13/src/auth.c
|
||||||
|
===================================================================
|
||||||
|
--- pam_krb5-2.4.13.orig/src/auth.c
|
||||||
|
+++ pam_krb5-2.4.13/src/auth.c
|
||||||
|
@@ -56,6 +56,7 @@
|
||||||
|
#include "items.h"
|
||||||
|
#include "kuserok.h"
|
||||||
|
#include "log.h"
|
||||||
|
+#include "perms.h"
|
||||||
|
#include "options.h"
|
||||||
|
#include "prompter.h"
|
||||||
|
#include "session.h"
|
||||||
|
@@ -434,6 +435,7 @@ pam_sm_setcred(pam_handle_t *pamh, int f
|
||||||
|
int argc, PAM_KRB5_MAYBE_CONST char **argv)
|
||||||
|
{
|
||||||
|
const char *why = "";
|
||||||
|
+ struct _pam_krb5_perms *saved_perms;
|
||||||
|
notice("pam_setcred (%s) called",
|
||||||
|
(flags & PAM_ESTABLISH_CRED)?"establish credential":
|
||||||
|
(flags & PAM_REINITIALIZE_CRED)?"reinitialize credential":
|
||||||
|
@@ -445,6 +447,8 @@ pam_sm_setcred(pam_handle_t *pamh, int f
|
||||||
|
_pam_krb5_session_caller_setcred);
|
||||||
|
}
|
||||||
|
if (flags & (PAM_REINITIALIZE_CRED | PAM_REFRESH_CRED)) {
|
||||||
|
+ saved_perms = _pam_krb5_switch_perms_r2e();
|
||||||
|
+
|
||||||
|
if (flags & PAM_REINITIALIZE_CRED) {
|
||||||
|
why = "pam_setcred(PAM_REINITIALIZE_CRED)";
|
||||||
|
if (flags & PAM_REFRESH_CRED) {
|
||||||
|
@@ -454,9 +458,18 @@ pam_sm_setcred(pam_handle_t *pamh, int f
|
||||||
|
why = "pam_setcred(PAM_REFRESH_CRED)";
|
||||||
|
}
|
||||||
|
if (_pam_krb5_sly_looks_unsafe() == 0) {
|
||||||
|
- return _pam_krb5_sly_maybe_refresh(pamh, flags, why,
|
||||||
|
- argc, argv);
|
||||||
|
+ int i = _pam_krb5_sly_maybe_refresh(pamh, flags, why, argc, argv);
|
||||||
|
+ if (saved_perms != NULL) {
|
||||||
|
+ _pam_krb5_restore_perms_r2e(saved_perms);
|
||||||
|
+ }
|
||||||
|
+ saved_perms = NULL;
|
||||||
|
+
|
||||||
|
+ return i;
|
||||||
|
} else {
|
||||||
|
+ debug("looks unsafe - ignore refresh");
|
||||||
|
+ if (saved_perms != NULL) {
|
||||||
|
+ _pam_krb5_restore_perms_r2e(saved_perms);
|
||||||
|
+ }
|
||||||
|
return PAM_IGNORE;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
Index: pam_krb5-2.4.13/src/perms.c
|
||||||
|
===================================================================
|
||||||
|
--- pam_krb5-2.4.13.orig/src/perms.c
|
||||||
|
+++ pam_krb5-2.4.13/src/perms.c
|
||||||
|
@@ -89,3 +89,49 @@ _pam_krb5_restore_perms(struct _pam_krb5
|
||||||
|
}
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
+
|
||||||
|
+struct _pam_krb5_perms *
|
||||||
|
+_pam_krb5_switch_perms_r2e(void)
|
||||||
|
+{
|
||||||
|
+ struct _pam_krb5_perms *ret;
|
||||||
|
+ ret = malloc(sizeof(*ret));
|
||||||
|
+ if (ret != NULL) {
|
||||||
|
+ ret->ruid = getuid();
|
||||||
|
+ ret->euid = geteuid();
|
||||||
|
+ ret->rgid = getgid();
|
||||||
|
+ ret->egid = getegid();
|
||||||
|
+ if (ret->ruid == ret->euid) {
|
||||||
|
+ ret->ruid = -1;
|
||||||
|
+ ret->euid = -1;
|
||||||
|
+ }
|
||||||
|
+ if (ret->rgid == ret->egid) {
|
||||||
|
+ ret->rgid = -1;
|
||||||
|
+ ret->egid = -1;
|
||||||
|
+ }
|
||||||
|
+ if (setresgid(ret->rgid, ret->rgid, ret->egid) == -1) {
|
||||||
|
+ free(ret);
|
||||||
|
+ ret = NULL;
|
||||||
|
+ } else {
|
||||||
|
+ if (setresuid(ret->ruid, ret->ruid, ret->euid) == -1) {
|
||||||
|
+ setresgid(ret->rgid, ret->egid, ret->rgid);
|
||||||
|
+ free(ret);
|
||||||
|
+ ret = NULL;
|
||||||
|
+ }
|
||||||
|
+ }
|
||||||
|
+ }
|
||||||
|
+ return ret;
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
+int
|
||||||
|
+_pam_krb5_restore_perms_r2e(struct _pam_krb5_perms *saved)
|
||||||
|
+{
|
||||||
|
+ int ret = -1;
|
||||||
|
+ if (saved != NULL) {
|
||||||
|
+ if ((setresuid(saved->ruid, saved->euid, saved->ruid) == 0) &&
|
||||||
|
+ (setresgid(saved->rgid, saved->egid, saved->rgid) == 0)) {
|
||||||
|
+ ret = 0;
|
||||||
|
+ }
|
||||||
|
+ free(saved);
|
||||||
|
+ }
|
||||||
|
+ return ret;
|
||||||
|
+}
|
||||||
|
Index: pam_krb5-2.4.13/src/perms.h
|
||||||
|
===================================================================
|
||||||
|
--- pam_krb5-2.4.13.orig/src/perms.h
|
||||||
|
+++ pam_krb5-2.4.13/src/perms.h
|
||||||
|
@@ -37,4 +37,7 @@ struct _pam_krb5_perms;
|
||||||
|
struct _pam_krb5_perms *_pam_krb5_switch_perms(void);
|
||||||
|
int _pam_krb5_restore_perms(struct _pam_krb5_perms *saved);
|
||||||
|
|
||||||
|
+struct _pam_krb5_perms *_pam_krb5_switch_perms_r2e(void);
|
||||||
|
+int _pam_krb5_restore_perms_r2e(struct _pam_krb5_perms *saved);
|
||||||
|
+
|
||||||
|
#endif
|
BIN
pam_krb5-2.4.13.tar.bz2
(Stored with Git LFS)
Normal file
BIN
pam_krb5-2.4.13.tar.bz2
(Stored with Git LFS)
Normal file
Binary file not shown.
BIN
pam_krb5-po.tar.bz2
(Stored with Git LFS)
Normal file
BIN
pam_krb5-po.tar.bz2
(Stored with Git LFS)
Normal file
Binary file not shown.
607
pam_krb5.changes
Normal file
607
pam_krb5.changes
Normal file
@ -0,0 +1,607 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Wed Jan 12 10:29:54 UTC 2022 - Josef Möllers <josef.moellers@suse.com>
|
||||||
|
|
||||||
|
- Use the %_pam_moduledir macro in pam_userpass.spec in order to
|
||||||
|
have the package follow UsrMerge.
|
||||||
|
[bsc#1190951, pam_krb5.spec]
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Wed Jul 26 07:04:12 UTC 2017 - josef.moellers@suse.com
|
||||||
|
|
||||||
|
- Update to 2.4.13:
|
||||||
|
* Fix a memory leak on FAST-capable clients
|
||||||
|
* Learn to run 'kdc' and 'kpasswdd', if appropriate
|
||||||
|
* Add the ability to specify a server principal
|
||||||
|
* Drop _pam_krb5_stash_chown_keyring functionality
|
||||||
|
* Fix a configure syntax error
|
||||||
|
* Handle ccname templates that don't include a type
|
||||||
|
* Fix a memory leak (static analysis)
|
||||||
|
* default to subsequent_prompt=false for chauthtok
|
||||||
|
* Don't close descriptors for fork-without-exec
|
||||||
|
* Handle PKINIT without duplicate prompting
|
||||||
|
* Add support for rxkad-k5-kdf
|
||||||
|
[pam_krb5-LINGUAS.dif]
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Wed May 28 15:24:21 UTC 2014 - ckornacker@suse.com
|
||||||
|
|
||||||
|
- serialize make process to prevent build failures on s390
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue Apr 16 11:06:38 CEST 2013 - mc@suse.de
|
||||||
|
|
||||||
|
- update to version 2.4.4
|
||||||
|
* drop configuration settings that duplicated library settings
|
||||||
|
* drop the existing_ticket option
|
||||||
|
* drop krb4 support
|
||||||
|
* add support for preserving configuration information in ccaches
|
||||||
|
* add support for creating and cleaning up DIR: ccaches
|
||||||
|
* finish cleaning up KEYRING: ccaches
|
||||||
|
* add experimental "armor" and "armor_strategy" options
|
||||||
|
* handle creation of /run/user/XXX for FILE: and DIR: caches
|
||||||
|
* handle different function signatures for krb5_trace_callback
|
||||||
|
* avoid overriding the primary when updating DIR: caches
|
||||||
|
- obsolets patches (upstream):
|
||||||
|
* pam_krb5-2.2.0-0.5-configure_ac.dif
|
||||||
|
* use-urandom-for-tests.dif
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Thu Mar 7 13:38:09 UTC 2013 - cfarrell@suse.com
|
||||||
|
|
||||||
|
- license update: BSD-3-Clause or LGPL-2.1+
|
||||||
|
it is a dual license - hence the operator is ^or^ not ^and^
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Fri Mar 1 16:27:46 UTC 2013 - coolo@suse.com
|
||||||
|
|
||||||
|
- update license to new format
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue Aug 23 15:12:32 CEST 2011 - mc@suse.de
|
||||||
|
|
||||||
|
- disable checks during build. Does not work reliable in the
|
||||||
|
buildservice
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Sun Aug 21 15:17:26 UTC 2011 - mc@novell.com
|
||||||
|
|
||||||
|
- update to version 2.3.13
|
||||||
|
* don't bother creating a v5 ccache in "external" mode
|
||||||
|
* add a "trace" option to enable libkrb5 tracing, if available
|
||||||
|
* avoid trying to get password-change creds twice
|
||||||
|
* use an in-memory ccache when obtaining tokens using v5 creds
|
||||||
|
* turn off creds==session in "sshd"
|
||||||
|
* add a "validate_user_user" option to control trying to perform
|
||||||
|
user-to-user authentication to validate TGTs when a keytab is not
|
||||||
|
available
|
||||||
|
* add an "ignore_k5login" option to control whether or not the module
|
||||||
|
will use the krb5_kuserok() function to perform additional
|
||||||
|
authorization checks
|
||||||
|
* turn on validation by default - verify_ap_req_nofail controls how we
|
||||||
|
treat errors reading keytab files now
|
||||||
|
* add an "always_allow_localname" option when we can use
|
||||||
|
krb5_aname_to_localname() to second-guess the krb5_kuserok() check
|
||||||
|
* prefer krb5_change_password() to krb5_set_password()
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue Mar 1 17:41:57 CET 2011 - mc@suse.de
|
||||||
|
|
||||||
|
- make pam_sm_setcred less verbose (bnc#641008)
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Fri Nov 19 10:44:35 UTC 2010 - coolo@novell.com
|
||||||
|
|
||||||
|
- remove autoreconf call - breaks more than it helps
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon Mar 22 12:03:20 CET 2010 - mc@suse.de
|
||||||
|
|
||||||
|
- update to version 2.3.11
|
||||||
|
* create credentials before trying to look up the location of
|
||||||
|
the user's home directory via krb5_kuserok()
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Thu Mar 4 12:22:27 CET 2010 - mc@suse.de
|
||||||
|
|
||||||
|
- update to version 2.3.10-3
|
||||||
|
* add a "chpw_prompt" option
|
||||||
|
* add a "multiple_ccaches" option
|
||||||
|
* fine-tune the logic for selecting which key we use for
|
||||||
|
validating credentials
|
||||||
|
* fixes
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon Feb 1 12:17:08 UTC 2010 - jengelh@medozas.de
|
||||||
|
|
||||||
|
- package baselibs.conf
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue Nov 3 19:09:36 UTC 2009 - coolo@novell.com
|
||||||
|
|
||||||
|
- updated patches to apply with fuzz=0
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon Jul 27 11:53:30 CEST 2009 - mc@novell.com
|
||||||
|
|
||||||
|
- version 2.3.7
|
||||||
|
* when refreshing credentials, store the new creds in the default
|
||||||
|
ccache if $KRB5CCNAME isn't set.
|
||||||
|
* prefer a "host" key, if one is found, when validating TGTs
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Wed Jun 24 19:29:55 CEST 2009 - sbrabec@suse.cz
|
||||||
|
|
||||||
|
- Supplement pam-32bit/pam-64bit in baselibs.conf (bnc#354164).
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon Jun 15 15:32:11 CEST 2009 - mc@suse.de
|
||||||
|
|
||||||
|
- compile fixes for krb5 1.7
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon Jun 8 09:52:00 CEST 2009 - mc@suse.de
|
||||||
|
|
||||||
|
- update to version 2.3.5
|
||||||
|
* make prompting behavior for non-existent accounts and users who
|
||||||
|
just press enter match up with those who aren't/don't (#502602,
|
||||||
|
CVE-2009-1384)
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Wed May 20 11:49:22 CEST 2009 - mc@suse.de
|
||||||
|
|
||||||
|
- update to version 2.3.4
|
||||||
|
* don't request password-changing credentials using the same options
|
||||||
|
we use for ticket-granting tickets
|
||||||
|
* close a couple of open pipes to defunct processes, fix a couple
|
||||||
|
of debug messages
|
||||||
|
* fix ccache permissions bypass when the "existing_ticket" option is
|
||||||
|
used (CVE-2008-3825, which affects 2.2.0-2.2.25, 2.3.0, and 2.3.1)
|
||||||
|
- obsolete a lot of patches.
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Thu Feb 5 12:31:29 CET 2009 - mc@suse.de
|
||||||
|
|
||||||
|
- update translations
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon Feb 2 17:30:42 CET 2009 - mc@suse.de
|
||||||
|
|
||||||
|
- pam_sm_setcred should assume PAM_ESTABLISH_CRED
|
||||||
|
if no flag are passed (bnc#470414)
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue Jan 13 12:34:56 CET 2009 - olh@suse.de
|
||||||
|
|
||||||
|
- obsolete old -XXbit packages (bnc#437293)
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Fri Nov 21 12:54:39 CET 2008 - mc@suse.de
|
||||||
|
|
||||||
|
- update translations
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Wed Nov 5 15:12:17 CET 2008 - mc@suse.de
|
||||||
|
|
||||||
|
- update translations
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Wed Oct 29 11:35:39 CET 2008 - mc@suse.de
|
||||||
|
|
||||||
|
- use the upstream fix for
|
||||||
|
pam_krb5-2.3.1-fix-pwchange-with-use_shmem.dif
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue Oct 28 15:09:24 CET 2008 - mc@suse.de
|
||||||
|
|
||||||
|
- simplify switch permissions of refresh credentials
|
||||||
|
(remove pam_krb5-2.2.11-1-refresh-drop-restore-priv.dif
|
||||||
|
add pam_krb5-2.3.1-switch-perms-on-refresh.dif)
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Fri Oct 24 13:44:42 CEST 2008 - mc@suse.de
|
||||||
|
|
||||||
|
- write new ticket into shmem after password change if requested.
|
||||||
|
(bnc#438181)
|
||||||
|
- update translations
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon Oct 6 16:34:48 CEST 2008 - mc@suse.de
|
||||||
|
|
||||||
|
- fixing pam_krb5 existing_ticket permission flaw (CVE-2008-3825)
|
||||||
|
(bnc#425861)
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Thu Sep 4 10:21:53 CEST 2008 - mc@suse.de
|
||||||
|
|
||||||
|
- if the realm name given to us is NULL, don't bother consulting
|
||||||
|
the appdefaults
|
||||||
|
- check for the "debug" flag earlier
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon Sep 1 11:19:22 CEST 2008 - mc@suse.de
|
||||||
|
|
||||||
|
- validate new fetched credentials
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Fri Jun 20 16:26:30 CEST 2008 - mc@suse.de
|
||||||
|
|
||||||
|
- version 2.3.1
|
||||||
|
* translations for messages!
|
||||||
|
* added the ability to set up tokens in the rxk5 format
|
||||||
|
* added the "token_strategy" option to control which methods we'll
|
||||||
|
try to use for setting tokens
|
||||||
|
* merge "null_afs" functionality from Jan Iven
|
||||||
|
* when we're changing passwords, force at least one attempt to
|
||||||
|
authenticate using the KDC, even in the pathological case where
|
||||||
|
there's no previously- entered password and we were told not to ask
|
||||||
|
for one (brc#400611)
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Fri Jun 6 10:07:14 CEST 2008 - mc@suse.de
|
||||||
|
|
||||||
|
- update i18n files
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Fri May 9 11:52:06 CEST 2008 - mc@suse.de
|
||||||
|
|
||||||
|
- update i18n files
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon Apr 14 12:31:25 CEST 2008 - mc@suse.de
|
||||||
|
|
||||||
|
- update i18n files
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Thu Apr 10 12:54:45 CEST 2008 - ro@suse.de
|
||||||
|
|
||||||
|
- added baselibs.conf file to build xxbit packages
|
||||||
|
for multilib support
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Thu Mar 13 18:24:31 CET 2008 - mc@suse.de
|
||||||
|
|
||||||
|
- add i18n support
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon Feb 11 13:37:46 CET 2008 - mc@suse.de
|
||||||
|
|
||||||
|
- version 2.2.22
|
||||||
|
* moved .k5login checks to a subprocess to avoid screwing with the
|
||||||
|
parent process's tokens and PAG (fallout from #371761)
|
||||||
|
* all options which took true/false before ("debug", "tokens", and
|
||||||
|
so on) can now take service names
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Wed Nov 21 16:37:51 CET 2007 - mc@suse.de
|
||||||
|
|
||||||
|
- some bugfixes from upstream
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Fri Nov 9 11:55:11 CET 2007 - mc@suse.de
|
||||||
|
|
||||||
|
- version 2.2.21
|
||||||
|
* fix permissions problems on keyring ccaches, so that users can write
|
||||||
|
to them after we've set them up, and we can still do the cleanup
|
||||||
|
- remove pam_krb5-2.2.20-1-copy-cache-priv-fix.dif; fix is upstream
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon Nov 5 17:51:05 CET 2007 - mc@suse.de
|
||||||
|
|
||||||
|
- pam_krb5-2.2.20-1-copy-cache-priv-fix.dif
|
||||||
|
fix permissions on the ccache im not file case
|
||||||
|
- pam_krb5-2.2.20-1-debug-log-choice.dif
|
||||||
|
improve debug log
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon Oct 29 11:51:49 CET 2007 - mc@suse.de
|
||||||
|
|
||||||
|
- version 2.2.20
|
||||||
|
* fixes for credential refreshing
|
||||||
|
- remove obsolete patch pam_krb5-2.2.19-fix-format-error.dif
|
||||||
|
(fix is upstream)
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Fri Oct 26 11:00:16 CEST 2007 - mc@suse.de
|
||||||
|
|
||||||
|
- version 2.2.19:
|
||||||
|
* the "keytab" option can now be used to specify a custom location
|
||||||
|
for a given service from within krb5.conf
|
||||||
|
* log messages are now logged with facility LOG_AUTHPRIV (or LOG_AUTH
|
||||||
|
if LOG_AUTHPRIV is not defined) instead of the application's default
|
||||||
|
or LOG_USER
|
||||||
|
* added the "pkinit_identity" option to provide a way to specify
|
||||||
|
where the user's public-key credentials are, and "pkinit_flags" to
|
||||||
|
specify arbitrary flags for libkrb5 (Heimdal only)
|
||||||
|
* added the "preauth_options" option to provide a way to specify
|
||||||
|
arbitrary preauthentication options to libkrb5 (MIT only)
|
||||||
|
* added the "ccname_template" option to provide a way to specify
|
||||||
|
where the user's credentials should be stored, so that KEYRING:
|
||||||
|
credential caches can be deployed at will.
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue Aug 7 11:03:59 CEST 2007 - mc@suse.de
|
||||||
|
|
||||||
|
- version 2.2.17:
|
||||||
|
* corrected a typo in the pam_krb5(8) man page
|
||||||
|
* clarified that the "tokens" flag should only be needed for
|
||||||
|
applications which are not using PAM correctly
|
||||||
|
* don't bother using a helper for creating v4 ticket files when we're
|
||||||
|
just getting tokens
|
||||||
|
* clean up the debug message which we emit when we do v5->v4
|
||||||
|
principal name conversion
|
||||||
|
* compilation fixes
|
||||||
|
* let default "external" and "use_shmem" settings be specified at
|
||||||
|
compile-time
|
||||||
|
* correctly return a "unknown user" error when attempting to change
|
||||||
|
a password for a user who has no corresponding principal (#235020)
|
||||||
|
* don't bother using a helper for creating ccache files, which we're
|
||||||
|
just going to delete, when we need to get tokens
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon Jul 16 10:34:08 CEST 2007 - mc@suse.de
|
||||||
|
|
||||||
|
- version 2.2.14
|
||||||
|
* treat a "client revoked" error as an "unknown principal" error
|
||||||
|
* some small bugfixes
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Fri Jul 13 10:31:01 CEST 2007 - mc@suse.de
|
||||||
|
|
||||||
|
- version 2.2.13
|
||||||
|
* make it possible to have more than one ccache (and tktfile) at
|
||||||
|
a time to work around apps which open a session, set the
|
||||||
|
environment, and initialize creds (when we previously created
|
||||||
|
a ccache, removing the one which was named in the environment)
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon Jul 2 10:09:34 CEST 2007 - mc@suse.de
|
||||||
|
|
||||||
|
- version 2.2.12
|
||||||
|
* add a "pwhelp" option.
|
||||||
|
* Display the KDC error to users.
|
||||||
|
* lots of bugfixes
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Thu Mar 15 12:34:55 CET 2007 - mc@suse.de
|
||||||
|
|
||||||
|
- drop privileges in _pam_krb5_sly_maybe_refresh when
|
||||||
|
running in set uid and restore them on exit of this
|
||||||
|
function. This enables us to refresh the ticket
|
||||||
|
after screen un-lock.
|
||||||
|
[#124611]
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon Sep 25 10:45:53 CEST 2006 - mc@suse.de
|
||||||
|
|
||||||
|
- version 2.2.11
|
||||||
|
- remove two patches with are upstream now
|
||||||
|
- pam_krb5-2.2.10-0-oldauthtok.dif
|
||||||
|
- pam_krb5-2.2.10-0-testfix.dif
|
||||||
|
- make use of --with-os-distribution
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Thu Sep 14 10:40:55 CEST 2006 - mc@suse.de
|
||||||
|
|
||||||
|
- fix pam_set_item call for AUTHTOK and OLDAUTHTOK
|
||||||
|
- fix testcase
|
||||||
|
- if the server returns an error message during password-changing,
|
||||||
|
let the user see it
|
||||||
|
- add the "debug_sensitive" option, which actually logs passwords
|
||||||
|
- add the "no_subsequent_prompt" option, to force the module to
|
||||||
|
always answer a libkrb5 prompt with the PAM_AUTHTOK value
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue Sep 12 11:37:12 CEST 2006 - mc@suse.de
|
||||||
|
|
||||||
|
- version 2.2.10
|
||||||
|
* log text for server-supplied error code along with the
|
||||||
|
failure information.
|
||||||
|
* rework the prompting bits so that it makes more correct use of
|
||||||
|
the initial_prompt/use_first_pass flags and correctly disables
|
||||||
|
use of the callback for arbitrary prompts
|
||||||
|
* give the caller a way to specify which prompter callback we
|
||||||
|
should use.
|
||||||
|
* track whether or not we want to let libkrb5 ask for information
|
||||||
|
via the callbacks.
|
||||||
|
* and more fixes
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Thu Jul 27 11:03:27 CEST 2006 - mc@suse.de
|
||||||
|
|
||||||
|
- version 2.2.9
|
||||||
|
* look for krb5/krb5.h in preference to krb5.h (new in
|
||||||
|
MIT Kerberos 1.5)
|
||||||
|
* if the default principal in the ccache doesn't match the
|
||||||
|
userinfo structure, update the userinfo structure.
|
||||||
|
* always use the name of the v5 principal when saving
|
||||||
|
credentials, especially for the "external" case where
|
||||||
|
it may not be the value we originally guessed
|
||||||
|
* be more careful about other ways which our prompting
|
||||||
|
callback can try to break us
|
||||||
|
* go back to overwriting the template, to avoid uncontrolled
|
||||||
|
growth in the filename.
|
||||||
|
* build the new ccache name by appending the mkstemp template
|
||||||
|
instead of assuming the previous file ended with one
|
||||||
|
* and more fixes.
|
||||||
|
- remove pam_krb5-2.2.3-1-prompter-segfault.dif it is upstream now
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Wed Jun 28 12:06:39 CEST 2006 - mc@suse.de
|
||||||
|
|
||||||
|
- update to version 2.2.8
|
||||||
|
* fix reporting of the reasons for password change failures
|
||||||
|
* add "krb4_use_as_req" to completely disallow any attempts to get
|
||||||
|
v4 credentials
|
||||||
|
* do 524 conversion for the "external" cases, too
|
||||||
|
- remove obsolete patches
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Fri Apr 21 11:18:26 CEST 2006 - mc@suse.de
|
||||||
|
|
||||||
|
- fix segfault in prompter [#165972]
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Wed Jan 25 21:39:14 CET 2006 - mls@suse.de
|
||||||
|
|
||||||
|
- converted neededforbuild to BuildRequires
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue Jan 17 11:41:33 CET 2006 - mc@suse.de
|
||||||
|
|
||||||
|
- add two patches from upstream
|
||||||
|
* pam_krb5-upstreamfix-password-handling.dif
|
||||||
|
* pam_krb5-upstreamfix-testcase.dif
|
||||||
|
- build with more then one job
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Fri Jan 13 16:04:17 CET 2006 - mc@suse.de
|
||||||
|
|
||||||
|
- set /usr/bin/afs5log executable
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Wed Jan 11 14:29:53 CET 2006 - mc@suse.de
|
||||||
|
|
||||||
|
- add -fstack-protector to CFLAGS
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue Dec 20 11:12:23 CET 2005 - mc@suse.de
|
||||||
|
|
||||||
|
- update to version 2.2.3
|
||||||
|
- remove pam_krb5-2.2.0-0.5-NULL-fix.dif; patch is now upstream
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Fri Dec 2 11:38:25 CET 2005 - mc@suse.de
|
||||||
|
|
||||||
|
- update to version 2.2.2
|
||||||
|
* don't leak the keytab file descriptor
|
||||||
|
* actually check for AFS support first, so that the
|
||||||
|
ioctl-only support case will work properly.
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon Nov 14 16:28:45 CET 2005 - uli@suse.de
|
||||||
|
|
||||||
|
- no afs_syscall on ARM
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon Nov 14 11:23:10 CET 2005 - mc@suse.de
|
||||||
|
|
||||||
|
- update to version 2.2.0-2
|
||||||
|
- remove obsolete patch (debug_false is upstream now)
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon Oct 10 14:02:29 CEST 2005 - mc@suse.de
|
||||||
|
|
||||||
|
- update to current CVS version
|
||||||
|
- drop some patches (they are upstream now)
|
||||||
|
- fix NULL problem
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Wed Aug 17 15:27:05 CEST 2005 - mc@suse.de
|
||||||
|
|
||||||
|
- got official fix for the authtok problem
|
||||||
|
[#104051]
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon Aug 15 13:41:42 CEST 2005 - mc@suse.de
|
||||||
|
|
||||||
|
- fix the behavior of password changing if use_authtok
|
||||||
|
is not present [#104051]
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Wed Jun 29 16:43:58 CEST 2005 - mc@suse.de
|
||||||
|
|
||||||
|
- fix change password
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Fri Jun 10 12:43:04 CEST 2005 - mc@suse.de
|
||||||
|
|
||||||
|
- set default for debug to false [#87005]
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Thu Apr 7 10:14:03 CEST 2005 - mc@suse.de
|
||||||
|
|
||||||
|
- switch to version 2.2.0-0.5
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue Feb 22 12:31:53 CET 2005 - nadvornik@suse.cz
|
||||||
|
|
||||||
|
- fixed parsing of time values
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon Feb 21 17:40:20 CET 2005 - mc@suse.de
|
||||||
|
|
||||||
|
- add pam_krb5-use-krb5_afslog.dif [#51047]
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue Jan 18 16:43:06 CET 2005 - okir@suse.de
|
||||||
|
|
||||||
|
- updated to latest pam_krb5 snapshot from sourcforge CVS
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue Jan 11 17:48:14 CET 2005 - ro@suse.de
|
||||||
|
|
||||||
|
- re-added afs module (added krbafs to neededforbuild)
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon Nov 22 02:14:17 CET 2004 - ro@suse.de
|
||||||
|
|
||||||
|
- remove afs for the moment, mit-kerberos does not have support
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Wed Apr 28 17:26:47 CEST 2004 - ro@suse.de
|
||||||
|
|
||||||
|
- added -fno-strict-aliasing
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Fri Jan 16 12:27:46 CET 2004 - kukuk@suse.de
|
||||||
|
|
||||||
|
- Add pam-devel to neededforbuild
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Sun Jan 11 12:03:01 CET 2004 - adrian@suse.de
|
||||||
|
|
||||||
|
- build as user
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Wed Jul 16 14:29:56 CEST 2003 - nadvornik@suse.cz
|
||||||
|
|
||||||
|
- replaced by different implementation of pam_krb5
|
||||||
|
- afs support
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Fri Jun 20 11:35:20 CEST 2003 - okir@suse.de
|
||||||
|
|
||||||
|
- fix build problem with latest heimdal
|
||||||
|
- another fix for passwd updates (#20284)
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Wed Jun 18 12:05:04 CEST 2003 - ro@suse.de
|
||||||
|
|
||||||
|
- use kerberos-devel-packages in neededforbuild
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue Apr 15 10:23:57 CEST 2003 - ro@suse.de
|
||||||
|
|
||||||
|
- fixed neededforbuild
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Wed Aug 28 11:43:01 CEST 2002 - okir@suse.de
|
||||||
|
|
||||||
|
- Security fix (#18463): unbecome_user did not properly reassert
|
||||||
|
original privilege, and the caller didn't check the return value.
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Wed Jul 31 14:45:27 CEST 2002 - okir@suse.de
|
||||||
|
|
||||||
|
- suse_update_config now updates the right files
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Wed Jul 24 14:14:28 CEST 2002 - okir@suse.de
|
||||||
|
|
||||||
|
- fixed passwd(1) support; updated README
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue Jul 23 03:38:08 PDT 2002 - okir@suse.de
|
||||||
|
|
||||||
|
- initial packaging
|
||||||
|
|
99
pam_krb5.spec
Normal file
99
pam_krb5.spec
Normal file
@ -0,0 +1,99 @@
|
|||||||
|
#
|
||||||
|
# spec file for package pam_krb5
|
||||||
|
#
|
||||||
|
# Copyright (c) 2022 SUSE LLC
|
||||||
|
#
|
||||||
|
# All modifications and additions to the file contributed by third parties
|
||||||
|
# remain the property of their copyright owners, unless otherwise agreed
|
||||||
|
# upon. The license for this file, and modifications and additions to the
|
||||||
|
# file, is the same license as for the pristine package itself (unless the
|
||||||
|
# license for the pristine package is not an Open Source License, in which
|
||||||
|
# case the license is the MIT License). An "Open Source License" is a
|
||||||
|
# license that conforms to the Open Source Definition (Version 1.9)
|
||||||
|
# published by the Open Source Initiative.
|
||||||
|
|
||||||
|
# Please submit bugfixes or comments via https://bugs.opensuse.org/
|
||||||
|
#
|
||||||
|
|
||||||
|
|
||||||
|
Name: pam_krb5
|
||||||
|
BuildRequires: klogd
|
||||||
|
BuildRequires: krb5-client
|
||||||
|
BuildRequires: krb5-devel
|
||||||
|
BuildRequires: krb5-server
|
||||||
|
BuildRequires: libselinux-devel
|
||||||
|
BuildRequires: openssl-devel
|
||||||
|
BuildRequires: pam-devel
|
||||||
|
Provides: pam_krb
|
||||||
|
# bug437293
|
||||||
|
%ifarch ppc64
|
||||||
|
Obsoletes: pam_krb5-64bit
|
||||||
|
%endif
|
||||||
|
#
|
||||||
|
Version: 2.4.13
|
||||||
|
Release: 0
|
||||||
|
Summary: A Pluggable Authentication Module for Kerberos 5
|
||||||
|
License: BSD-3-Clause OR LGPL-2.1-or-later
|
||||||
|
Group: Productivity/Networking/Security
|
||||||
|
URL: https://pagure.io/pam_krb5
|
||||||
|
Source: pam_krb5-%{version}.tar.bz2
|
||||||
|
Source2: pam_krb5-po.tar.bz2
|
||||||
|
Source3: baselibs.conf
|
||||||
|
Patch1: pam_krb5-2.3.1-log-choise.dif
|
||||||
|
Patch3: pam_krb5-2.3.1-switch-perms-on-refresh.dif
|
||||||
|
Patch4: pam_krb5-2.2.3-1-setcred-assume-establish.dif
|
||||||
|
Patch5: bug-641008_pam_krb5-2.3.11-setcred-log.diff
|
||||||
|
BuildRoot: %{_tmppath}/%{name}-%{version}-build
|
||||||
|
|
||||||
|
%description
|
||||||
|
This PAM module supports authentication against a Kerberos KDC. It also
|
||||||
|
supports updating your Kerberos password.
|
||||||
|
|
||||||
|
%prep
|
||||||
|
%setup -q -n pam_krb5-%{version}
|
||||||
|
%setup -a 2 -T -D -n pam_krb5-%{version}
|
||||||
|
%patch1 -p1
|
||||||
|
%patch3 -p1
|
||||||
|
%patch4 -p1
|
||||||
|
%patch5 -p1
|
||||||
|
|
||||||
|
%build
|
||||||
|
CFLAGS="$RPM_OPT_FLAGS -D_GNU_SOURCE " \
|
||||||
|
./configure --libdir=%{_pam_libdir} \
|
||||||
|
--prefix=/usr \
|
||||||
|
--mandir=%{_mandir} \
|
||||||
|
--with-os-distribution="openSUSE" \
|
||||||
|
--with-default-use-shmem="sshd" \
|
||||||
|
--with-default-external="sshd sshd-rekey gssftp" \
|
||||||
|
--with-default-multiple-ccaches="su su-l" \
|
||||||
|
--with-default-no-cred-session="sshd" \
|
||||||
|
--enable-default-ccname-template=DIR:/run/user/%%U/krb5cc_XXXXXX
|
||||||
|
make -j1
|
||||||
|
make -C po update-po
|
||||||
|
# does not work in the buildservice
|
||||||
|
#make check
|
||||||
|
|
||||||
|
%install
|
||||||
|
make install DESTDIR=%{buildroot} INSTALL="install -p"
|
||||||
|
ln -sf pam_krb5.so %{buildroot}%{_pam_moduledir}/pam_krb5afs.so
|
||||||
|
rm -f %{buildroot}%{_pam_moduledir}/*.la
|
||||||
|
|
||||||
|
# Make the paths jive to avoid conflicts on multilib systems.
|
||||||
|
sed -ri -e 's|/lib(64)?/|/\$LIB/|g' %{buildroot}/%{_mandir}/man*/pam_krb5*.8*
|
||||||
|
|
||||||
|
# Create filelist with translatins
|
||||||
|
%{find_lang} pam_krb5
|
||||||
|
|
||||||
|
%clean
|
||||||
|
rm -rf %{buildroot}
|
||||||
|
|
||||||
|
%files -f pam_krb5.lang
|
||||||
|
%defattr(-,root,root,-)
|
||||||
|
%doc README* COPYING* ChangeLog AUTHORS NEWS
|
||||||
|
%{_bindir}/*
|
||||||
|
%attr(555,root,root) %{_pam_moduledir}/pam_krb5.so
|
||||||
|
%attr(555,root,root) %{_pam_moduledir}/pam_krb5afs.so
|
||||||
|
%{_pam_moduledir}/pam_krb5
|
||||||
|
%_mandir/man*/*.*
|
||||||
|
|
||||||
|
%changelog
|
Loading…
x
Reference in New Issue
Block a user