forked from jengelh/sssd
Jan Engelhardt
8b1778e6ae
If usr/etc exists will be installed there, otherwise in /etc. (bsc#1226157);
2101 lines
95 KiB
Plaintext
2101 lines
95 KiB
Plaintext
-------------------------------------------------------------------
|
||
Thu Jul 11 09:41:21 UTC 2024 - Samuel Cabrero <scabrero@suse.de>
|
||
|
||
- Revert the change dropping the default configuration file. If
|
||
/usr/etc exists will be installed there, otherwise in /etc.
|
||
(bsc#1226157);
|
||
|
||
-------------------------------------------------------------------
|
||
Thu May 16 12:13:02 UTC 2024 - Jan Engelhardt <jengelh@inai.de>
|
||
|
||
- Update to release 2.9.5
|
||
* Added failover_primary_timout configuration option. This can
|
||
be used to configure how often SSSD tries to reconnect to a
|
||
primary server after a successful connection to a backup
|
||
server. This was previously hardcoded to 31 seconds which is
|
||
kept as the default value.
|
||
|
||
-------------------------------------------------------------------
|
||
Fri Mar 8 12:49:59 UTC 2024 - pgajdos@suse.com
|
||
|
||
- remove dependency on /usr/bin/python3 using
|
||
%python3_fix_shebang_path macro, [bsc#1212476]
|
||
|
||
-------------------------------------------------------------------
|
||
Fri Jan 12 14:02:10 UTC 2024 - Jan Engelhardt <jengelh@inai.de>
|
||
|
||
- Update to release 2.9.4
|
||
* Fixes a crash when PAM passkey processing incorrectly handles
|
||
non-passkey data.
|
||
* Fixed group membership handling when members are coming from
|
||
different forest domains and using ldap token groups is
|
||
prohibited.
|
||
* Files provider was erroneously taking into consideration
|
||
``local_auth_policy`` config option, thus breaking smartcard
|
||
authentication of local user in setups that did not explicitly
|
||
specify this option. This is now fixed.
|
||
|
||
-------------------------------------------------------------------
|
||
Tue Nov 21 09:43:57 UTC 2023 - Samuel Cabrero <scabrero@suse.de>
|
||
|
||
- Adapt spec file for SLE 15 SP6/Leap 15.6; (jsc#PED-6714);
|
||
* Remove package sssd-common, merged into sssd
|
||
* Continue building deprecated files provider and infopipe
|
||
responder
|
||
* Disable selinux and semanage
|
||
* Provide rcsssd shortcut
|
||
|
||
-------------------------------------------------------------------
|
||
Fri Nov 17 14:52:30 UTC 2023 - Samuel Cabrero <scabrero@suse.de>
|
||
|
||
- Fix spec file for Leap
|
||
|
||
-------------------------------------------------------------------
|
||
Fri Nov 17 12:30:33 UTC 2023 - Samuel Cabrero <scabrero@suse.de>
|
||
|
||
- /usr/etc migration, restore /etc/sssd/sssd.conf.rpmsave after
|
||
update (bsc#1216865)
|
||
- Do not install the KRB5 IDP plugin, it is useless without the
|
||
OIDC child
|
||
- Drop no longer valid --without-secrets configure switch
|
||
|
||
-------------------------------------------------------------------
|
||
Mon Nov 13 12:48:09 UTC 2023 - Jan Engelhardt <jengelh@inai.de>
|
||
|
||
- Update to release 2.9.3
|
||
* The proxy provider is now able to handle certificate mapping
|
||
and matching rules and users handled by the proxy provider can
|
||
be configured for local Smartcard authentication. Besides the
|
||
mapping rule local Smartcard authentication should be enabled
|
||
with the `local_auth_policy` option in the backend and with
|
||
`pam_cert_auth` in the PAM responder.
|
||
|
||
-------------------------------------------------------------------
|
||
Thu Nov 2 16:09:55 UTC 2023 - Jan Engelhardt <jengelh@inai.de>
|
||
|
||
- Offer the sssd.conf template as %doc (for examples, do actually
|
||
see the "Examples" section of the sssd.conf(5) manpage)
|
||
|
||
-------------------------------------------------------------------
|
||
Tue Oct 31 15:20:37 UTC 2023 - Samuel Cabrero <scabrero@suse.de>
|
||
|
||
- Update dependencies to require the same subpackages version and
|
||
release
|
||
- Fix /usr/etc migration fragment in wrong "%pre kcm" instead of
|
||
"%pre"
|
||
- Move sss_analyze to sssd-tools package
|
||
|
||
-------------------------------------------------------------------
|
||
Tue Oct 31 11:04:57 UTC 2023 - Jan Engelhardt <jengelh@inai.de>
|
||
|
||
- Default config is unworkable, just stop installing it altogether
|
||
[boo#1216739]
|
||
|
||
-------------------------------------------------------------------
|
||
Thu Sep 7 12:07:10 UTC 2023 - Jan Engelhardt <jengelh@inai.de>
|
||
|
||
- Update to release 2.9.2
|
||
* sssctl cert-show and cert-show cert-eval-rule can now be run as
|
||
non-root user.
|
||
* New option local_auth_policy is added to control which offline
|
||
authentication methods will be enabled by SSSD.
|
||
* Fix sssd entering failed state under heavy load by adding
|
||
watchdog to monitor sbus_call_DBus_Hello_send(); (bsc#1213283);
|
||
Drop SLE patch 0001-sssd-watchdog.patch
|
||
|
||
-------------------------------------------------------------------
|
||
Fri Jun 23 14:49:30 UTC 2023 - Jan Engelhardt <jengelh@inai.de>
|
||
|
||
- Update to relese 2.9.1
|
||
* A regression was fixed that prevented autofs lookups to
|
||
function correctly when cache_first is set to True.
|
||
* A regression where SSSD failed to properly watch for changes
|
||
in ``/etc/resolv.conf`` when it was a symbolic link or was a
|
||
relative path, was fixed.
|
||
* ldap password policy: return failure if there are no grace logins
|
||
left; (bsc#1214434); Drop SLE patch
|
||
0006-ldap-return-failure-if-there-are-no-grace-logins-lef.patch
|
||
|
||
-------------------------------------------------------------------
|
||
Fri May 5 10:47:41 UTC 2023 - Jan Engelhardt <jengelh@inai.de>
|
||
|
||
- Update to release 2.9
|
||
* The sss_simpleifp library is deprecated (and for openSUSE,
|
||
already removed)
|
||
* The "Files provider" (i.e. id_provider = files) is deprecated
|
||
(and for openSUSE, already removed)
|
||
* SSSD will no longer warn about changed defaults when using
|
||
ldap_schema = rfc2307 and default autofs mapping.
|
||
* New passkey functionality, which will allow the use of FIDO2
|
||
compliant devices to authenticate a centrally managed user
|
||
locally.
|
||
* Add support for ldapi:// URLs to allow connections to local
|
||
LDAP servers.
|
||
* NSS IDMAP has two new methods: getsidbyusername and
|
||
getsidbygroupname.
|
||
|
||
-------------------------------------------------------------------
|
||
Thu Jan 26 15:23:54 UTC 2023 - Callum Farmer <gmbr3@opensuse.org>
|
||
|
||
- Move dbus-1 system.d file to /usr (bsc#1207586)
|
||
|
||
-------------------------------------------------------------------
|
||
Tue Jan 3 12:01:41 UTC 2023 - Stefan Schubert <schubi@suse.com>
|
||
|
||
- Migration of PAM settings to /usr/lib/pam.d.
|
||
|
||
-------------------------------------------------------------------
|
||
Wed Dec 21 19:29:45 UTC 2022 - Jan Engelhardt <jengelh@inai.de>
|
||
|
||
- Take systemd units off the restart list that have
|
||
RefuseManualStart=yes [boo#1206592]
|
||
- Add symvers.patch [boo#1206592] [bsc#1182058] [bsc#1196166]
|
||
|
||
-------------------------------------------------------------------
|
||
Sun Dec 11 14:17:23 UTC 2022 - Jan Engelhardt <jengelh@inai.de>
|
||
|
||
- Update to release 2.8.2
|
||
* New mapping template for serial number, subject key id, SID,
|
||
certificate hashes and DN components are added to
|
||
libsss_certmap.
|
||
|
||
-------------------------------------------------------------------
|
||
Fri Nov 4 12:28:27 UTC 2022 - Jan Engelhardt <jengelh@inai.de>
|
||
|
||
- Update to release 2.8.1
|
||
* A regression when running sss_cache when no SSSD domain is
|
||
enabled would produce a syslog critical message was fixed.
|
||
|
||
-------------------------------------------------------------------
|
||
Fri Oct 7 12:05:29 UTC 2022 - Jan Engelhardt <jengelh@inai.de>
|
||
|
||
- Update to release 2.8.0
|
||
* Introduced the dbus function
|
||
org.freedesktop.sssd.infopipe.Users.ListByAttr(attr, value,
|
||
limit) listing upto limit users matching the filter
|
||
attr=value.
|
||
* sssctl is now able to create, list and delete indexes on the
|
||
local caches. Indexes are useful for the new D-Bus
|
||
ListByAttr() function.
|
||
* sssctl is now able to read and set each component's debug
|
||
level independently.
|
||
* A number of new configuration options are available,
|
||
cf. https://sssd.io/release-notes/sssd-2.8.0.html .
|
||
* Fix sdap_access_host No matching host rule found;
|
||
(bsc#1202559); Drop SLE patch
|
||
0001-Fix-sdap_access_host-No-matching-host-rule-found.patch
|
||
* Accept krb5 1.20 for building the PAC plugin; Drop SLE patch
|
||
0004-BUILD-Accept-krb5-1.20-for-building-the-PAC-plugin.patch
|
||
|
||
-------------------------------------------------------------------
|
||
Thu Sep 1 13:45:36 UTC 2022 - Stefan Schubert <schubi@suse.com>
|
||
|
||
- Migration to /usr/etc: Saving user changed configuration files
|
||
in /etc and restoring them while an RPM update.
|
||
|
||
-------------------------------------------------------------------
|
||
Fri Aug 26 20:54:33 UTC 2022 - Jan Engelhardt <jengelh@inai.de>
|
||
|
||
- Update to release 2.7.4
|
||
* Lock-free client support will be only built if libc provides
|
||
pthread_key_create() and pthread_once(). For glibc this means
|
||
version 2.34+.
|
||
|
||
-------------------------------------------------------------------
|
||
Mon Jul 4 12:11:11 UTC 2022 - Jan Engelhardt <jengelh@inai.de>
|
||
|
||
- Update to release 2.7.3
|
||
* All SSSD client libraries (nss, pam, etc) won't serialize
|
||
requests anymore by default, i.e. requests from multiple
|
||
threads can be executed in parallel. Old behavior
|
||
(serialization) can be enabled by setting environment
|
||
variable "SSS_LOCKFREE" to "NO".
|
||
|
||
-------------------------------------------------------------------
|
||
Tue Jun 21 10:19:54 UTC 2022 - Stefan Schubert <schubi@localhost>
|
||
|
||
- Removed %config flag for files in /usr directory.
|
||
|
||
-------------------------------------------------------------------
|
||
Tue Jun 21 06:43:27 UTC 2022 - Stefan Schubert <schubi@suse.com>
|
||
|
||
- Moved logrotate files from user-specific directory /etc/logrotate.d
|
||
to vendor-specific directory /usr/etc/logrotate.d.
|
||
|
||
-------------------------------------------------------------------
|
||
Wed Jun 15 11:28:35 UTC 2022 - Samuel Cabrero <scabrero@suse.de>
|
||
|
||
- Use pam rpm macros to avoid hardcoding the directory names;
|
||
(bsc#1191047);
|
||
- Do not take ownership of %_pam_confdir directory, it is owned by
|
||
pam package
|
||
|
||
-------------------------------------------------------------------
|
||
Mon Jun 13 14:48:28 UTC 2022 - Jan Engelhardt <jengelh@inai.de>
|
||
|
||
- Update to release 2.7.2
|
||
* A sssd-2.7.1 regression preventing successful authentication of
|
||
IPA users was fixed.
|
||
* Default value of pac_check changed to check_upn,
|
||
check_upn_dns_info_ex (for AD and IPA provider).
|
||
|
||
-------------------------------------------------------------------
|
||
Thu Jun 2 15:24:57 UTC 2022 - Jan Engelhardt <jengelh@inai.de>
|
||
|
||
- Update to release 2.7.1
|
||
* SSSD can now handle multi-valued RDNs if a unique name must
|
||
be determined with the help of the RDN.
|
||
* A regression in pam_sss_gss module causing a failure if
|
||
KRB5CCNAME environment variable was not set was fixed.
|
||
* New option `implicit_pac_responder` to control if the PAC
|
||
responder is started for the IPA and AD providers; the
|
||
default is true.
|
||
* New option `krb5_check_pac` to control the PAC validation
|
||
behavior.
|
||
* Multiple `crl_file` arguments can be used in the
|
||
`certificate_verification` option.
|
||
|
||
-------------------------------------------------------------------
|
||
Mon May 16 21:49:38 UTC 2022 - Jan Engelhardt <jengelh@inai.de>
|
||
|
||
- Enable subid_sss
|
||
|
||
-------------------------------------------------------------------
|
||
Thu Apr 14 22:43:03 UTC 2022 - Jan Engelhardt <jengelh@inai.de>
|
||
|
||
- Update to release 2.7.0
|
||
* Better default for IPA/AD re_expression. Tunning for group
|
||
names containing '@' is no longer needed.
|
||
* A new debug level is added to show statistical and
|
||
performance data.
|
||
* Added support for anonymous PKINIT to get FAST credentials.
|
||
* SSSD now correctly falls back to UPN search if the user was
|
||
not found even with `cache_first = true`.
|
||
* Add 'ldap_ignore_unreadable_references' parameter to skip
|
||
unreadable objects referenced by 'member' attributte;
|
||
(bsc#1190775); (gh#SSSD/sssd#4893); Drop SLE patch
|
||
0001-ldap-ignore-unreadable-references.patch
|
||
|
||
-------------------------------------------------------------------
|
||
Mon Feb 21 14:50:38 UTC 2022 - Callum Farmer <gmbr3@opensuse.org>
|
||
|
||
- Enable selinux support
|
||
- Update Supplements to new format
|
||
|
||
-------------------------------------------------------------------
|
||
Wed Feb 9 13:17:30 UTC 2022 - Samuel Cabrero <scabrero@suse.de>
|
||
|
||
- Remove caches only when performing a package downgrade. The sssd
|
||
daemon takes care of upgrading the database format when necessary
|
||
(bsc#1195552)
|
||
|
||
-------------------------------------------------------------------
|
||
Tue Jan 25 11:32:10 UTC 2022 - Jan Engelhardt <jengelh@inai.de>
|
||
|
||
- Update to release 2.6.3
|
||
* A regression introduced in sssd-2.6.2 in the IPA provider
|
||
that prevented users from login was fixed. Access control
|
||
always denied access because the selinux_child returned an
|
||
unexpected reply.
|
||
* A critical regression that prevented authentication of users
|
||
via AD and IPA providers was fixed. LDAP port was reused for
|
||
Kerberos communication and this provider would send
|
||
incomprehensible information to this port.
|
||
* When authenticating AD users, backtrace was triggered even
|
||
though everything was working correctly. This was caused by a
|
||
search in the global catalog. Servers from the global catalog
|
||
are filtered out of the list before writing the KDC info
|
||
file. With this fix, SSSD does not attempt to write to the
|
||
KDC info file when performing a GC lookup.
|
||
|
||
-------------------------------------------------------------------
|
||
Mon Jan 17 17:27:40 UTC 2022 - Jan Engelhardt <jengelh@inai.de>
|
||
|
||
- Upgrade LDB_DIR shell variable to %ldbdir macro.
|
||
|
||
-------------------------------------------------------------------
|
||
Tue Jan 11 18:04:46 UTC 2022 - Samuel Cabrero <scabrero@suse.de>
|
||
|
||
- Remove libsmbclient-devel BuildRequires in favor of
|
||
pkgconfig(smbclient)
|
||
|
||
-------------------------------------------------------------------
|
||
Thu Dec 23 14:52:55 UTC 2021 - Jan Engelhardt <jengelh@inai.de>
|
||
|
||
- Update to release 2.6.2
|
||
* Quick log out and log in did not correctly refresh user's
|
||
initgroups in no_session PAM schema due to lingering systemd
|
||
processes.
|
||
|
||
-------------------------------------------------------------------
|
||
Tue Nov 23 16:11:48 UTC 2021 - Johannes Segitz <jsegitz@suse.com>
|
||
|
||
- Added hardening to systemd service(s) (bsc#1181400). Added patch(es):
|
||
* harden_sssd-ifp.service.patch
|
||
* harden_sssd-kcm.service.patch
|
||
|
||
-------------------------------------------------------------------
|
||
Tue Nov 9 15:35:58 UTC 2021 - Jan Engelhardt <jengelh@inai.de>
|
||
|
||
- Update to release 2.6.1
|
||
* New infopipe method FindByValidCertificate().
|
||
* The default value of the "ssh_hash_known_hosts" setting was
|
||
changed to false for the sake of consistency with OpenSSH
|
||
that does not hash host names by default.
|
||
|
||
-------------------------------------------------------------------
|
||
Fri Oct 15 13:41:13 UTC 2021 - Jan Engelhardt <jengelh@inai.de>
|
||
|
||
- Update to release 2.6.0
|
||
* Support of legacy json format for ccaches was dropped.
|
||
* Support of long time deprecated secrets responder was dropped.
|
||
* Support of long time deprecated local provider was dropped.
|
||
* The sssctl command was vulnerable to shell command injection
|
||
via the logs-fetch and cache-expire subcommands,
|
||
which was fixed; (CVE-2021-3621); (bsc#1189492); Drop SLE patch
|
||
0002-TOOLS-replace-system-with-execvp-to-avoid-execution-.patch
|
||
* Basic support of user's 'subuid and subgid ranges' for IPA
|
||
provider and corresponding plugin for shadow-utils were added.
|
||
|
||
-------------------------------------------------------------------
|
||
Mon Jul 12 19:45:37 UTC 2021 - Jan Engelhardt <jengelh@inai.de>
|
||
|
||
- Update to release 2.5.2; (jsc#SLE-17763);
|
||
* originalADgidNumber attribute in the SSSD cache is now indexed.
|
||
* Add new config option fallback_to_nss.
|
||
|
||
-------------------------------------------------------------------
|
||
Tue Jun 8 16:35:25 UTC 2021 - Jan Engelhardt <jengelh@inai.de>
|
||
|
||
- Update to release 2.5.1
|
||
* auto_private_groups option can be set centrally through ID
|
||
range setting in IPA (see ipa idrange commands family). This
|
||
feature requires SSSD update on both client and server. This
|
||
feature also requires freeipa 4.9.4 and newer.
|
||
* Fix getsidbyname issues with IPA users with a user-private-group.
|
||
* Default value of ldap_sudo_random_offset changed to 0
|
||
(disabled). This makes sure that sudo rules are available as
|
||
soon as possible after SSSD start in default configuration.
|
||
|
||
-------------------------------------------------------------------
|
||
Mon May 10 13:58:04 UTC 2021 - Jan Engelhardt <jengelh@inai.de>
|
||
|
||
- Update to release 2.5.0
|
||
* Added support for automatic renewal of renewable TGTs that
|
||
are stored in KCM ccache. This can be enabled by setting
|
||
tgt_renewal = true. See the sssd-kcm man page for more
|
||
details. This feature requires MIT Kerberos
|
||
krb5-1.19-0.beta2.3 or higher.
|
||
* Backround sudo periodic tasks (smart and full refresh) periods are
|
||
now extended by a random offset to spread the load on the server in
|
||
environments with many clients.
|
||
* Completing a sudo full refresh now postpones the smart refresh by
|
||
ldap_sudo_smart_refresh_interval value. This ensure that the smart
|
||
refresh is not run too soon after a successful full refresh.
|
||
* If debug_backtrace_enabled is set to true then on any error all prior
|
||
debug messages (to some limit) are printed even if debug_level is set
|
||
to low value.
|
||
* Besides trusted domains known by the forest root, trusted domains known
|
||
by the local domain are used as well.
|
||
* New configuration option offline_timeout_random_offset to control random
|
||
factor in backend probing interval when SSSD is in offline mode.
|
||
* ad_gpo_implicit_deny is now respected even if there are no
|
||
applicable GPOs present.
|
||
* During the IPA subdomains request a failure in reading a single specific
|
||
configuration option is not considered fatal and the request will
|
||
continue.
|
||
* Unknown IPA id-range types are not considered as an error
|
||
|
||
-------------------------------------------------------------------
|
||
Tue Apr 6 12:08:29 UTC 2021 - Samuel Cabrero <scabrero@suse.de>
|
||
|
||
- Move sssctl command from sssd to sssd-tools package; (bsc#1184289);
|
||
|
||
-------------------------------------------------------------------
|
||
Thu Apr 1 15:08:14 UTC 2021 - jeffm@suse.com
|
||
|
||
- Add missing /var/lib/sss/pubconf/krb5.include.d directory (bsc#1184285).
|
||
|
||
-------------------------------------------------------------------
|
||
Tue Feb 23 12:43:38 UTC 2021 - Aurelien Aptel <aaptel@suse.com>
|
||
|
||
- Make cifs-idmap plugin (cifs_idmap_sss.so) use update-alternatives
|
||
mechanism to be able to switch between cifs-utils and sssd;
|
||
(bsc#1182682).
|
||
|
||
-------------------------------------------------------------------
|
||
Fri Feb 19 17:30:58 UTC 2021 - Jan Engelhardt <jengelh@inai.de>
|
||
|
||
- Update to release 2.4.2
|
||
* Default value of "user" config option was fixed into
|
||
accordance with man page, i.e. default is "root".
|
||
* pam_sss_gss now support authentication indicators to further
|
||
harden the authentication.
|
||
|
||
-------------------------------------------------------------------
|
||
Fri Feb 12 15:55:37 UTC 2021 - Dominique Leuenberger <dimstar@opensuse.org>
|
||
|
||
- Pass --with-pid-path=%{_rundir} to configure: adjust rundir
|
||
according the distro settings, i.e. /run on modern systems.
|
||
Eliminates a systemd warning like this one in the journal:
|
||
Feb 12 12:33:32 zeus systemd[1]: /usr/lib/systemd/system/sssd.service:13:
|
||
PIDFile= references a path below legacy directory /var/run/,
|
||
updating /var/run/sssd.pid → /run/sssd.pid; please update the unit file accordingly.
|
||
|
||
-------------------------------------------------------------------
|
||
Fri Feb 5 12:56:44 UTC 2021 - Jan Engelhardt <jengelh@inai.de>
|
||
|
||
- Update to release 2.4.1
|
||
* New PAM module pam_sss_gss for authentication using GSSAPI.
|
||
* case_sensitive=Preserving can now be set for trusted domains
|
||
with AD and IPA providers.
|
||
* krb5_use_subdomain_realm=True can now be used when sub-domain
|
||
user principal names have upnSuffixes which are not known in
|
||
the parent domain. SSSD will try to send the Kerberos request
|
||
directly to a KDC of the sub-domain.
|
||
* SYSLOG_IDENTIFIER was renamed to SSSD_PRG_NAME in journald
|
||
output, to avoid issues with PID parsing in rsyslog
|
||
(BSD-style forwarder) output.
|
||
* Added pam_gssapi_check_upn to enforce authentication only
|
||
with principal that can be associated with target user.
|
||
* Added pam_gssapi_services to list PAM services that can
|
||
authenticate using GSSAPI.
|
||
* Create timestamp attribute in cache objects if missing;
|
||
(bsc#1182637);
|
||
|
||
-------------------------------------------------------------------
|
||
Mon Oct 12 13:10:26 UTC 2020 - Jan Engelhardt <jengelh@inai.de>
|
||
|
||
- Update to release 2.4.0
|
||
* Session recording can now exclude specific users or groups
|
||
when scope is set to all (see exclude_users and
|
||
exclude_groups options).
|
||
* Active Directory provider now sends CLDAP pings over UDP
|
||
protocol to Domain Controllers in parallel to determine site
|
||
and forest to speed up server discovery.
|
||
|
||
-------------------------------------------------------------------
|
||
Mon Aug 10 12:55:05 UTC 2020 - Jan Engelhardt <jengelh@inai.de>
|
||
|
||
- Build sssd's KCM.
|
||
|
||
-------------------------------------------------------------------
|
||
Fri Jul 24 16:57:58 UTC 2020 - Jan Engelhardt <jengelh@inai.de>
|
||
|
||
- Update to release 2.3.1
|
||
* Domains can be now explicitly enabled or disabled using
|
||
enable option in domain section. This can be especially used
|
||
in configuration snippets.
|
||
* New configuration options memcache_size_passwd,
|
||
memcache_size_group, memcache_size_initgroups that can be
|
||
used to control memory cache size.
|
||
* Fixed several regressions in GPO processing introduced in
|
||
sssd-2.3.0
|
||
* Fixed regression in PAM responder: failures in cache only
|
||
lookups are no longer considered fatal.
|
||
* Fixed regression in proxy provider: pwfield=x is now default
|
||
value only for sssd-shadowutils target.
|
||
* Rotate child debug file descriptors on SIGHUP (bsc#1080156)
|
||
- sssd-wbclient is obsolete and no longer shipped
|
||
|
||
-------------------------------------------------------------------
|
||
Tue May 19 11:32:22 UTC 2020 - Jan Engelhardt <jengelh@inai.de>
|
||
|
||
- Update to release 2.3.0
|
||
* SSSD can now handle hosts and networks nsswitch databases
|
||
(see resolve_provider option).
|
||
* By default, authentication request only refresh user's
|
||
initgroups if it is expired or there is not active user's
|
||
session (see pam_initgroups_scheme option).
|
||
* OpenSSL is used as default crypto provider, NSS is deprecated.
|
||
* The AD provider now defaults to GSS-SPNEGO SASL mechanism
|
||
(see ldap_sasl_mech option).
|
||
* The AD provider can now be configured to use only ldaps port
|
||
(see ad_use_ldaps option).
|
||
* SSSD now accepts host entries from GPO's security filter.
|
||
* New debug level (0x10000) added for low level LDB messages
|
||
only (see sssd.conf man page).
|
||
* Update samba secrets after changing machine password; (jsc#SLE-11503);
|
||
* Delete linked local user overrides when deleting a user
|
||
(bsc#1133168)
|
||
- Drop sssd-gpo_host_security_filter-2.2.2.patch,
|
||
0001-Resolve-computer-lookup-failure-when-sam-cn.patch,
|
||
0001-AD-use-getaddrinfo-with-AI_CANONNAME-to-find-the-FQD.patch (merged)
|
||
- Drop 0001-Fix-build-failure-against-samba-4.12.0rc1.patch
|
||
(unapplicable)
|
||
|
||
-------------------------------------------------------------------
|
||
Tue Mar 24 10:49:17 UTC 2020 - Jan Engelhardt <jengelh@inai.de>
|
||
|
||
- Update to 2.2.3
|
||
* New features:
|
||
* allow_missing_name now treats empty strings the same as
|
||
missing names.
|
||
* "soft_ocsp" and "soft_crl" options have been added to make
|
||
the checks for revoked certificates more flexible if the
|
||
system is offline.
|
||
* Smart card authentication in polkit is now allowed by default.
|
||
* Handling of FreeIPA users and groups containing ‘@’ sign now works.
|
||
* Issue when autofs was unable to mount shares was fixed.
|
||
* SSSD was unable to hande ldap_uri containing URIs with
|
||
different port numbers, which has been rectified.
|
||
* Fix domain offline after first boot when resolv.conf is a symlink
|
||
(bsc#1136139)
|
||
- Add 0001-Fix-build-failure-against-samba-4.12.0rc1.patch
|
||
|
||
-------------------------------------------------------------------
|
||
Mon Mar 16 16:44:23 UTC 2020 - Samuel Cabrero <scabrero@suse.de>
|
||
|
||
- Fix dynamic DNS updates not using FQDN (bsc#1160587); Add
|
||
0001-AD-use-getaddrinfo-with-AI_CANONNAME-to-find-the-FQD.patch
|
||
|
||
-------------------------------------------------------------------
|
||
Sun Jan 19 23:54:34 UTC 2020 - Stefan Brüns <stefan.bruens@rwth-aachen.de>
|
||
|
||
- Remove leftover python2 build dependencies
|
||
- Remove python3-devel BuildRequires in favor of pkgconfig(python3)
|
||
|
||
-------------------------------------------------------------------
|
||
Mon Jan 13 14:40:11 UTC 2020 - David Mulder <dmulder@suse.com>
|
||
|
||
- SSSD GPO host entries are ignored if computer cn does not
|
||
match its samaccountname, add
|
||
0001-Resolve-computer-lookup-failure-when-sam-cn.patch;
|
||
(jsc#SLE-9298); (bsc#1160688)
|
||
|
||
-------------------------------------------------------------------
|
||
Thu Jan 02 17:17:00 UTC 2020 - David Mulder <dmulder@suse.com>
|
||
|
||
- SSSD should accept host entries from GPO's security filter, add
|
||
sssd-gpo_host_security_filter-2.2.2.patch; (jsc#SLE-9298)
|
||
|
||
-------------------------------------------------------------------
|
||
Fri Nov 22 13:31:54 UTC 2019 - Samuel Cabrero <scabrero@suse.de>
|
||
|
||
- Install infopipe dbus service (bsc#1106598)
|
||
- Add systemd service unit files to manage socket or bus activated responders.
|
||
- All responders except infopipe are also managed by a socket unit file.
|
||
- Add missing post and postun hooks for libsss_certmap0 package.
|
||
|
||
-------------------------------------------------------------------
|
||
Thu Nov 21 12:56:28 UTC 2019 - Jan Engelhardt <jengelh@inai.de>
|
||
|
||
- Update to release 2.2.2
|
||
* New options were added which allow sssd-kcm to handle bigger
|
||
data. See manual pages for max_ccaches, max_uid_caches and
|
||
max_ccache_size.
|
||
* SSSD can now automatically refresh cached user data from
|
||
subdomains in IPA/AD trust.
|
||
* Fixed issue with SSSD hanging when connecting to
|
||
non-responsive server with ldaps://.
|
||
* SSSD is now restarted by systemd after crashes.
|
||
|
||
-------------------------------------------------------------------
|
||
Tue Jun 18 08:00:46 UTC 2019 - Jan Engelhardt <jengelh@inai.de>
|
||
|
||
- Update to new upstream release 2.2.0
|
||
* The Kerberos provider can now include more KDC addresses or
|
||
host names when writing data for the Kerberos locator plugin.
|
||
* The 2FA prompting can now be configured.
|
||
* The LDAP authentication provider now allows to use a
|
||
different method of changing LDAP passwords using a modify
|
||
operation in addition to the default extended operation.
|
||
* The "auto_private_groups" configuration option now takes a
|
||
new value hybrid.
|
||
* A new option "ad_gpo_ignore_unreadable" was added.
|
||
* The "cached_auth_timeout" parameter is now inherited by
|
||
trusted domains.
|
||
* The "ldap_sasl_mech" option now accepts another mechanism
|
||
"GSS-SPNEGO" in addition to "GSSAPI".
|
||
* The sssctl tool has two new commands, "cert-show" and
|
||
"cert-map".
|
||
* Added an option to skip GPOs that have groupPolicyContainers,
|
||
unreadable by SSSD (bsc#1124194) (CVE-2018-16838)
|
||
* Fix fallback_homedir returning '/' for empty home directories
|
||
(CVE-2019-3811) (bsc#1121759)
|
||
|
||
-------------------------------------------------------------------
|
||
Fri Apr 26 10:59:25 UTC 2019 - Samuel Cabrero <scabrero@suse.de>
|
||
|
||
- Create directory to download and cache GPOs (bsc#1132879)
|
||
|
||
-------------------------------------------------------------------
|
||
Sat Mar 16 11:50:58 UTC 2019 - Jan Engelhardt <jengelh@inai.de>
|
||
|
||
- Update to new upstream release 2.1.0
|
||
* Any provider can now match and map certificates to user
|
||
identities.
|
||
* pam_sss can now be configured to only perform Smart Card
|
||
authentication or return an error if this is not possible.
|
||
* pam_sss can also prompt the user to insert a Smart Card if,
|
||
during an authentication it is not available.
|
||
* A new configuration option ad_gpo_implicit_deny was added.
|
||
This option (when set to True) can be used to deny access to
|
||
users even if there is not applicable GPO.
|
||
* The dynamic DNS update can now batch DNS updates to include
|
||
all address family updates in a single transaction.
|
||
* Fix sss_cache spurious error messages when invoked from shadow-utils;
|
||
(bsc#1185017);
|
||
* Fix building with newer samba versions (bsc#1137876)
|
||
* Fix memory leak in nss netgroup enumeration (bsc#1139247);
|
||
|
||
-------------------------------------------------------------------
|
||
Wed Feb 20 16:01:52 UTC 2019 - Samuel Cabrero <scabrero@suse.de>
|
||
|
||
- Install systemd service unit file created from source's template
|
||
(bsc#1120852); (bsc#1185185);
|
||
- Install logrotate configuration (bsc#1004220)
|
||
- Set journald as system logger
|
||
|
||
-------------------------------------------------------------------
|
||
Fri Feb 15 17:36:22 UTC 2019 - Jan Engelhardt <jengelh@inai.de>
|
||
|
||
- Add krb-noversion.diff so sssd_pac builds even with newer krb.
|
||
|
||
-------------------------------------------------------------------
|
||
Mon Oct 1 13:34:56 UTC 2018 - ckowalczyk@suse.com
|
||
|
||
- Add dependency to adcli for sssd-ad
|
||
(SLE15: fate#326619, bsc#1109849)
|
||
(SLE12SP4: fate#326620, bsc#1110121)
|
||
|
||
-------------------------------------------------------------------
|
||
Fri Sep 7 18:52:18 UTC 2018 - Jan Engelhardt <jengelh@inai.de>
|
||
|
||
- Update to new upstream release 2.0.0
|
||
* The Python API for managing users and groups in local domains
|
||
(id_provider=local) was removed completely. The local
|
||
provider (id_provider=local) and the command line tools to
|
||
manage users and groups in the local domains, such as
|
||
sss_useradd is not built anymore.
|
||
* The LDAP provider had a special-case branch for evaluating
|
||
group memberships with the RFC2307bis schema when group
|
||
nesting was explicitly disabled. This codepath is removed.
|
||
* The "ldap_sudo_include_regexp" option changed its default
|
||
value from true to false. Wildcards in the sudoHost LDAP
|
||
attribute are no longer evaluated. This was costly to
|
||
evaluate on the LDAP server side and at the same time rarely
|
||
used.
|
||
* The list of PAM services which are allowed to authenticate
|
||
using a Smart Card is now configurable using a new option
|
||
pam_p11_allowed_services.
|
||
* Allow defaults sudoRole without sudoUser attribute (bsc#1135247)
|
||
|
||
-------------------------------------------------------------------
|
||
Fri Aug 31 07:14:39 UTC 2018 - kbabioch@suse.com
|
||
|
||
- Update to upstream release 1.16.3
|
||
* New Features:
|
||
* kdcinfo files for informing krb5 about discovered KDCs are
|
||
now also generated for trusted domains in setups that use
|
||
id_provider=ad and IPA masters in a trust relationship with
|
||
an AD domain.
|
||
* The Kerberlos locator plugin can now process multiple
|
||
address if SSSD generates more than one. A
|
||
* Bug fixes:
|
||
* Fixed information leak due to incorrect permissions on
|
||
/var/lib/sss/pipes/sudo [CVE-2018-10852, bsc#1098377]
|
||
* Cached password are now stored with a salt. Old ones will be
|
||
regenerated on next authentication, and the auth server needs
|
||
to be reachable for that.
|
||
* The sss_ssh proces leaked file descriptors when converting
|
||
more than one X.509 certificate to an SSH public key.
|
||
* The PAC responder is now able to process Domain Local in case
|
||
the PAC uses SID compression (Windows Server 2012+).
|
||
* Address the issue that some versions of OpenSSH would close
|
||
the pipe towards sss_ssh_authorizedkeys when the matching key
|
||
is found before the rest of the output is read.
|
||
* User lookups no longer fail if user's e-mail address
|
||
conflicts with another user's fully qualified name.
|
||
* The override_shell and override_homedir options are no longer
|
||
applied to entries from the files domain.
|
||
* The grace logins with an expired password when authenticating
|
||
against certain newer versions of the 389DS/RHDS LDAP server
|
||
did not work.
|
||
* Fix login not possible when email address is duplicated in ldap
|
||
attributes (bsc#1149597)
|
||
* Strip whitespaces in netgroup triples (bsc#1087320)
|
||
- Removed patches that are included upstream now:
|
||
0001-SUDO-Create-the-socket-with-stricter-permissions.patch,
|
||
0002-intg-Do-not-hardcode-nsslibdir.patch,
|
||
0003-Fix-build-for-1-16-2-version.patch
|
||
|
||
-------------------------------------------------------------------
|
||
Sun Jul 1 12:44:00 UTC 2018 - ckowalczyk@suse.com
|
||
|
||
- Fixed patch name.
|
||
|
||
-------------------------------------------------------------------
|
||
Wed Jun 20 10:46:34 UTC 2018 - ckowalczyk@suse.com
|
||
|
||
- Introduce patches:
|
||
* Create sockets with right permissions:
|
||
0001-SUDO-Create-the-socket-with-stricter-permissions.patch
|
||
(bsc#1098377, CVE-2018-10852)
|
||
* Fix for sssd upstream integration tests
|
||
0002-intg-Do-not-hardcode-nsslibdir.patch
|
||
(bsc#1098163)
|
||
|
||
-------------------------------------------------------------------
|
||
Wed Jun 20 08:38:53 UTC 2018 - varkoly@suse.com
|
||
|
||
- Update to new minor upstream release 1.16.2
|
||
New Features:
|
||
* The smart card authentication, or in more general certificate
|
||
authentication code now supports OpenSSL in addition to previously
|
||
supported NSS (#3489). In addition, the SSH responder can now
|
||
return public SSH keys derived from the public keys stored in a
|
||
X.509 certificate. Please refer to the ssh_use_certificate_keys
|
||
option in the man pages.
|
||
* The files provider now supports mirroring multiple passwd or
|
||
group files. This enhancement can be used to use the SSSD files
|
||
provider instead of the nss_altfiles module
|
||
Bugfixes:
|
||
* A memory handling issue in the nss_ex interface was fixed. This
|
||
bug would manifest in IPA environments with a trusted AD domain
|
||
as a crash of the ns-slapd process, because a ns-slapd plugin
|
||
loads the nss_ex interface (#3715)
|
||
* Several fixes for the KCM deamon were merged (see #3687, #3671, #3633)
|
||
* The ad_site override is now honored in GPO code as well (#3646)
|
||
* Several potential crashes in the NSS responder’s netgroup code
|
||
were fixed (#3679, #3731)
|
||
* A potential crash in the autofs responder’s code was fixed (#3752)
|
||
* The LDAP provider now supports group renaming (#2653)
|
||
* The GPO access control code no longer returns an error if one
|
||
of the relevant GPO rules contained no SIDs at all (#3680)
|
||
* A memory leak in the IPA provider related to resolving external
|
||
AD groups was fixed (#3719)
|
||
* Setups that used multiple domains where one of the domains had
|
||
its ID space limited using the min_id/max_id options did not
|
||
resolve requests by ID properly (#3728)
|
||
* Overriding IDs or names did not work correctly when the domain
|
||
resolution order was set as well (#3595)
|
||
* A version mismatch between certain newer Samba versions (e.g.
|
||
those shipped in RHEL-7.5) and the Winbind interface provided
|
||
by SSSD was fixed. To further prevent issues like this in the
|
||
future, the correct interface is now detected at build time (#3741)
|
||
* The files provider no longer returns a qualified name in case
|
||
domain resolution order is used (#3743)
|
||
* A race condition between evaluating IPA group memberships and
|
||
AD group memberships in setups with IPA-AD trusts that would
|
||
have manifested as randomly losing IPA group memberships assigned
|
||
to an AD user was fixed (#3744)
|
||
* Setting an SELinux login label was broken in setups where the
|
||
domain resolution order was used (#3740)
|
||
* SSSD start up issue on systems that use the libldb library
|
||
with version 1.4.0 or newer was fixed.
|
||
* Update winbind idmap plugin to support interface version 6
|
||
(jsc#SLE-9819)
|
||
* Add a netgroup counter to struct nss_enum_index (bsc#1132657)
|
||
* Fix sssd not starting in foreground mode (bsc#1125277)
|
||
Introduce a patch:
|
||
* Fix build of sssd of 1.16.2 version:
|
||
0003-Fix-build-for-1-16-2-version.patch
|
||
(back then called fix-build.patch)
|
||
|
||
-------------------------------------------------------------------
|
||
Fri Apr 27 14:43:58 UTC 2018 - ckowalczyk@suse.com
|
||
|
||
- Update to new minor upstream release 1.16.1 (fate#323340):
|
||
|
||
New Features:
|
||
* A new option auto_private_groups was added. If this option is
|
||
enabled, SSSD will automatically create user private groups based
|
||
on user’s UID number. The GID number is ignored in this case.
|
||
* The SSSD smart card integration now supports a special type of PAM
|
||
conversation implemented by GDM which allows the user to select
|
||
the appropriate smrt card certificate in GDM.
|
||
* A new API for accessing user and group information was added.
|
||
This API is similar to the tradiional Name Service Switch API, but
|
||
allows the consumer to talk to SSSD directly as well as to
|
||
fine-tune the query with e.g. how cache should be evaluated.
|
||
* The sssctl command line tool gained a new command access-report,
|
||
which can generate who can access the client machine. Currently
|
||
only generating the report on an IPA client based on HBAC rules
|
||
is supported.
|
||
* The hostid provider was moved from the IPA specific code to
|
||
the generic LDAP code. This allows SSH host keys to be access by
|
||
the generic LDAP provider as well. See the ldap_host_* options in
|
||
the sssd-ldap manual page for more details.
|
||
* Setting the memcache_timeout option to 0 disabled creating
|
||
the memory cache files altogether. This can be useful in cases
|
||
there is a bug in the memory cache that needs working around.
|
||
|
||
-------------------------------------------------------------------
|
||
Tue Apr 24 13:09:35 UTC 2018 - ckowalczyk@suse.com
|
||
|
||
- Updated sssd.spec:
|
||
The IPA provider depends on AD provider's PAC executable, hence
|
||
introducing the package dependency. (bsc#1021441, bsc#1062124)
|
||
|
||
-------------------------------------------------------------------
|
||
Tue Feb 27 09:24:46 UTC 2018 - hguo@suse.com
|
||
|
||
- Remove package descriptions for the python 2 packages that are
|
||
no longer distributed:
|
||
* python-ipa_hbac
|
||
* python-sss-murmur
|
||
* python-sss_nss_idmap
|
||
* python-sssd-config
|
||
- Correct python version dependency of tools package. (bsc#1082108)
|
||
|
||
-------------------------------------------------------------------
|
||
Mon Dec 4 10:03:59 UTC 2017 - hguo@suse.com
|
||
|
||
- Correct dependency of sss_obfuscate command line program.
|
||
|
||
-------------------------------------------------------------------
|
||
Fri Dec 1 14:35:08 UTC 2017 - hguo@suse.com
|
||
|
||
- In an ongoing effort to reduce dependency on python version 2,
|
||
the following python libraries are no longer built. Nevertheless
|
||
their python3 counterparts remain in place:
|
||
* python-ipa_hbac
|
||
* python-sss-murmur
|
||
* python-sss_nss_idmap
|
||
* python-sssd-config
|
||
|
||
-------------------------------------------------------------------
|
||
Mon Oct 23 16:31:54 UTC 2017 - michael@stroeder.com
|
||
|
||
- Update to new upstream release 1.16.0
|
||
|
||
Security fixes
|
||
* This release fixes CVE-2017-12173: Unsanitized input when searching in
|
||
local cache database. SSSD stores its cached data in an LDAP like local
|
||
database file using libldb. To lookup cached data LDAP search filters
|
||
like (objectClass=user)(name=user_name) are used. However, in
|
||
sysdb_search_user_by_upn_res(), the input was not sanitized and
|
||
allowed to manipulate the search filter for cache lookups. This would
|
||
allow a logged in user to discover the password hash of a different user.
|
||
|
||
New Features
|
||
* SSSD now supports session recording configuration through tlog. This
|
||
feature enables recording of everything specific users see or type
|
||
during their sessions on a text terminal. For more information, see
|
||
the sssd-session-recording(5) manual page.
|
||
* SSSD can act as a client agent to deliver
|
||
Fleet Commander <https://wiki.gnome.org/Projects/FleetCommander>
|
||
policies defined on an IPA server. Fleet Commander provides a
|
||
configuration management interface that is controlled centrally and
|
||
that covers desktop, applications and network configuration.
|
||
* Several new systemtap <https://sourceware.org/systemtap/> probes
|
||
were added into various locations in SSSD code to assist in
|
||
troubleshooting and analyzing performance related issues. Please see the
|
||
sssd-systemtap(5) manual page for more information.
|
||
* A new LDAP provide access control mechanism that allows to restrict
|
||
access based on PAM's rhost data field was added. For more details,
|
||
please consult the sssd-ldap(5) manual page, in particular the
|
||
options ldap_user_authorized_rhost and the rhost value of
|
||
ldap_access_filter.
|
||
|
||
-------------------------------------------------------------------
|
||
Tue Jul 25 15:46:23 UTC 2017 - michael@stroeder.com
|
||
|
||
- Update to new upstream release 1.15.3 (KCM disabled)
|
||
|
||
New Features
|
||
* In a setup where an IPA domain trusts an Active Directory domain,
|
||
it is now possible to define the domain resolution order
|
||
(see http://www.freeipa.org/page/Releases/4.5.0#AD_User_Short_Names).
|
||
* Design page - Shortnames in trusted domains <https://docs.pagure.org/SSSD.sssd/design_pages/shortnames.html>
|
||
* SSSD ships with a new service called KCM. This service acts as a
|
||
storage for Kerberos tickets when "libkrb5" is configured to use
|
||
"KCM:" in "krb5.conf".
|
||
* Design page - KCM server for SSSD <https://docs.pagure.org/SSSD.sssd/design_pages/kcm.html>
|
||
* NOTE: There are several known issues in the "KCM" responder that
|
||
will be handled in the next release.
|
||
* Support for user and group resolution through the D-Bus interface and
|
||
authentication and/or authorization through the PAM interface even
|
||
for setups without UIDs or Windows SIDs present on the LDAP directory
|
||
side. This enhancement allows SSSD to be used together with apache
|
||
modules <https://github.com/adelton/mod_lookup_identity> to provide
|
||
identities for applications
|
||
* Design page - Support for non-POSIX users and groups <https://docs.pagure.org/SSSD.sssd/design_pages/non_posix_support.html>
|
||
* SSSD ships a new public library called "libsss_certmap" that allows
|
||
a flexible and configurable way of mapping a certificate to a user
|
||
identity.
|
||
* Design page - Matching and Mapping Certificates <https://docs.pagure.org/SSSD.sssd/design_pages/matching_and_mapping_certificates.html>
|
||
* The Kerberos locator plugin can be disabled using an environment variable
|
||
"SSSD_KRB5_LOCATOR_DISABLE". Please refer to the
|
||
"sssd_krb5_locator_plugin" manual page for mode details.
|
||
* The "sssctl" command line tool supports a new command "user-checks"
|
||
that enables the administrator to check whether a certain user should be
|
||
allowed or denied access to a certain PAM service.
|
||
* The "secrets" responder now forwards requests to a proxy Custodia
|
||
back end over a secure channel.
|
||
|
||
-------------------------------------------------------------------
|
||
Thu Mar 16 13:32:12 UTC 2017 - hguo@suse.com
|
||
|
||
- Introduce mandatory runtime requirement "cyrus-sasl-gssapi" to
|
||
krb5-common sub-package. Address bsc#1024836.
|
||
|
||
-------------------------------------------------------------------
|
||
Wed Mar 15 22:18:03 UTC 2017 - michael@stroeder.com
|
||
|
||
- Update to new upstream release 1.15.2
|
||
* It is now possible to configure certain parameters of a
|
||
trusted domain in a configuration file sub-section.
|
||
* Several issues related to socket-activating the NSS service,
|
||
especially if SSSD was configured to use a non-privileged
|
||
userm were fixed. The NSS service now does not change the
|
||
ownership of its log files to avoid triggering a name-service
|
||
lookup while the NSS service is not running yet.
|
||
Additionally, the NSS service is started before any other
|
||
service to make sure username resolution works and the other
|
||
service can resolve the SSSD user correctly.
|
||
* A new option "cache_first" allows the administrator to change
|
||
the way multiple domains are searched. When this option is
|
||
enabled, SSSD will first try to "pin" the requested name or
|
||
ID to a domain by searching the entries that are already
|
||
cached and contact the domain that contains the cached entry
|
||
first. Previously, SSSD would check the cache and the remote
|
||
server for each domain. This option brings performance
|
||
benefit for setups that use multiple domains (even
|
||
auto-discovered trusted domains), especially for ID lookups
|
||
that would previously iterate over all domains. Please note
|
||
that this option must be enabled with care as the
|
||
administrator must ensure that the ID space of domains does
|
||
not overlap.
|
||
* The SSSD D-Bus interface gained two new methods:
|
||
"FindByNameAndCertificate" and "ListByCertificate". These
|
||
methods will be used primarily by IPA and
|
||
`mod_lookup_identity
|
||
<https://github.com/adelton/mod_lookup_identity/> to
|
||
correctly match multple users who use the same certificate
|
||
for Smart Card login.
|
||
* A bug where SSSD did not properly sanitize a username with a
|
||
newline character in it was fixed.
|
||
|
||
-------------------------------------------------------------------
|
||
Sat Mar 11 22:34:41 UTC 2017 - jengelh@inai.de
|
||
|
||
- Switch *all* URLs after fedorahosted.org retirement
|
||
|
||
-------------------------------------------------------------------
|
||
Sat Mar 4 19:57:33 UTC 2017 - michael@stroeder.com
|
||
|
||
- Updated project URL
|
||
- Update to new upstream release 1.15.1
|
||
* Several issues related to starting the SSSD services on-demand via
|
||
socket activation were fixed. In particular, it is no longer possible
|
||
to have a service started both by sssd and socket-activated. Another
|
||
bug which might have caused the responder to start before SSSD started
|
||
and cause issues especially on system startup was fixed.
|
||
* A new 'files' provider was added. This provider mirrors the contents
|
||
of '/etc/passwd' and '/etc/shadow' into the SSSD database. The purpose
|
||
of this new provider is to make it possible to use SSSD's interfaces,
|
||
such as the D-Bus interface for local users and enable leveraging the
|
||
in-memory fast cache for local users as well, as a replacement for `nscd`.
|
||
In future, we intend to extend the D-Bus interface to also provide setting
|
||
and retrieving additional custom attributes for the files users.
|
||
* SSSD now autogenerates a fallback configuration that enables the
|
||
files domain if no SSSD configuration exists. This allows distributions
|
||
to enable the 'sssd' service when the SSSD package is installed. Please
|
||
note that SSSD must be build with the configuration option
|
||
'--enable-files-domain' for this functionality to be enabled.
|
||
* Support for public-key authentication with Kerberos (PKINIT) was
|
||
added. This support will enable users who authenticate with a Smart Card
|
||
to obtain a Kerberos ticket during authentication.
|
||
|
||
-------------------------------------------------------------------
|
||
Sat Feb 18 08:35:13 CET 2017 - kukuk@suse.de
|
||
|
||
- Remove obsolete insserv call
|
||
|
||
-------------------------------------------------------------------
|
||
Wed Feb 8 19:58:55 UTC 2017 - luizluca@gmail.com
|
||
|
||
- Added /etc/sssd/conf.d/ for configuration snippets
|
||
|
||
-------------------------------------------------------------------
|
||
Wed Jan 25 19:25:09 UTC 2017 - michael@stroeder.com
|
||
|
||
- Removed 0001-krb5-1.15-build-fix.patch obsoleted by upstream update
|
||
- Update to new upstream release 1.15.0
|
||
* SSSD now allows the responders to be activated by the systemd service
|
||
manager and exit when idle. This means the services line in sssd.conf is
|
||
optional and the responders can be started on-demand, simplifying the sssd
|
||
configuration. Please note that this change is backwards-compatible and
|
||
the responders listed explicitly in sssd.conf's services line are managed
|
||
by sssd in the same manner as in previous releases. Please refer to man
|
||
sssd.conf(5) for more information
|
||
* The sudo provider is no longer disabled for configurations that do not
|
||
explicitly include the sudo responder in the services list. In order to
|
||
disable the sudo-related back end code that executes the periodic LDAP
|
||
queries, set the sudo_provider to none explicitly
|
||
* The watchdog signal handler no longer uses signal-unsafe functions. This
|
||
bug was causing a deadlock in case the watchdog was about to kill a
|
||
stuck process
|
||
* A bug that prevented TLS to be set up correctly on systems where libldap
|
||
links with GnuTLS was fixed
|
||
* The functionality to alter SSSD configuration through the D-Bus interface
|
||
provided by the IFP responder was removed. This functionality was not used to
|
||
the best of our knowledge, had no tests and prevented the InfoPipe responder
|
||
from running as a non-privileged user.
|
||
* A bug that prevented statically-linked applications from using libnss_sss
|
||
was fixed by removing dependency on -lpthreads from the libnss_sss library
|
||
(please see https://sourceware.org/bugzilla/show_bug.cgi?id=20500 for
|
||
an example on why linking with -lpthread from an NSS modules is problematic)
|
||
* Previously, SSSD did not ignore GPOs that were missing the
|
||
gPCFunctionalityVersion attribute and failed the whole GPO
|
||
processing. Starting with this version, the GPOs without the
|
||
gPCFunctionalityVersion are skipped.
|
||
|
||
-------------------------------------------------------------------
|
||
Mon Dec 12 13:36:18 UTC 2016 - dimstar@opensuse.org
|
||
|
||
- BuildRequire pkgconfig(libsystemd) instead of
|
||
pkgconfig(libsystemd-login): the latter has been deprecated since
|
||
systemd 209 and finally removed with systemd 230.
|
||
|
||
-------------------------------------------------------------------
|
||
Wed Dec 7 10:39:30 UTC 2016 - jengelh@inai.de
|
||
|
||
- Add 0001-krb5-1.15-build-fix.patch to unlock building
|
||
against future KRB versions.
|
||
|
||
-------------------------------------------------------------------
|
||
Wed Oct 19 22:21:30 UTC 2016 - michael@stroeder.com
|
||
|
||
- Update to new upstream release 1.14.2
|
||
* Several more regressions caused by cache refactoring to use qualified
|
||
names internally were fixed, including a regression that prevented the
|
||
krb5_map_user option from working correctly.
|
||
* A regression when logging in with a smart card using the GDM login manager
|
||
was fixed
|
||
* SSSD now removes the internal timestamp on startup cache when the
|
||
persistent cache is removed. This enables admins to follow their existing
|
||
workflow of just removing the persistent cache and start from a fresh slate
|
||
* Several fixes to the sssd-secrets responder are present in this release
|
||
* A bug in the autofs responder that prevented automounter maps from being
|
||
returned when sssd_be was offline was fixed
|
||
* A similar bug in the NSS responder that prevented netgroups from being
|
||
returned when sssd_be was offline was fixed
|
||
* Disabling the netlink integration can now be done with a new option
|
||
disable_netlink. Previously, the netlink integration could be disabled with
|
||
a sssd command line switch, which is being deprecated in this release.
|
||
* The internal watchdog no longer kills sssd processes in case time shifts
|
||
during sssd runtime
|
||
* The fail over code is able to cope with concurrent SRV resolution
|
||
requests better in this release
|
||
* The proxy provider gained a new option proxy_max_children that allows the
|
||
administrator to control the maximum number of child helper processes that
|
||
authenticate users with auth_provider=proxy
|
||
* The InfoPipe D-Bus responder exports the UUIDs of user and group objects
|
||
through a uniqueID property
|
||
|
||
-------------------------------------------------------------------
|
||
Fri Aug 19 18:38:35 UTC 2016 - michael@stroeder.com
|
||
|
||
- Update to new upstream release 1.14.1
|
||
* The IPA provider now supports logins with enterprise principals (also
|
||
known as additional UPN suffixes). This functionality also enabled Active
|
||
Directory users from trusted AD domains who use an additional UPN suffix
|
||
to log in. Please note that this feature requires a recent IPA server.
|
||
* When a user name is overriden in an IPA domain, resolving a group these
|
||
users are a member of now returns the overriden user names
|
||
* Users can be looked up by and log in with their e-mail address as an
|
||
identifier. In order to do so, an attribute that represents the user's
|
||
e-mail address is fetched by default. This attribute can by customized
|
||
by setting the ldap_user_email configuration option.
|
||
* A new ad_enabled_domains option was added. This option lets the
|
||
administrator select domains that SSSD should attempt to reach in the
|
||
AD forest SSSD is joined to. This option is useful for deployments where
|
||
not all domains are reachable on the network level, yet the administrator
|
||
needs to access some trusted domains and therefore disabling the subdomains
|
||
provider completely is not desirable.
|
||
* The sssctl tool has two new commands active-server and servers that
|
||
allow the administrator to observe the server that SSSD is bound to and
|
||
the servers that SSSD autodiscovered
|
||
* SSSD used to fail to start when an attribute name is present in both
|
||
the default SSSD attribute map and the custom ldap_user_extra_attrs map
|
||
* GPO policy procesing no longer fails if the gPCMachineExtensionNames
|
||
attribute only contains whitespaces
|
||
* Several commits fix regressions related to switching all user and group
|
||
names to fully qualified format, such as running initgroups for a user
|
||
who is only a member of a primary group
|
||
* Several patches fix regressions caused by splitting the database into
|
||
two ldb files, such as when user attributes change without increasing
|
||
the modifyTimestamp attribute value
|
||
* systemd unit files are now shipped for the sssd-secrets responder,
|
||
allowing the responder to be socket-activated. To do so, administrators
|
||
should enable the sssd-secrets.socket and sssd-secrets.service systemd
|
||
units.
|
||
* The sssd binary has a new switch --disable-netlink that lets sssd skip
|
||
messages from the kernel's netlink interface.
|
||
* A crash when entries with special characters such as '(' were requested
|
||
was fixed
|
||
* The ldap_rfc_2307_fallback_to_local_users option was broken in the
|
||
previous version. This release fixes the functionality.
|
||
|
||
-------------------------------------------------------------------
|
||
Fri Jul 8 10:46:59 UTC 2016 - jengelh@inai.de
|
||
|
||
- Update to new upstream release 1.14.0
|
||
* The AD provider is now able to look up users from Active
|
||
Directory domains by certificate. This change enables logins for
|
||
Active Directory users with the help of a smart card.
|
||
* The sss_override tool is now able to add certificates as local
|
||
overrides in the SSSD cache. Please note that the certificate
|
||
overrides are stored in the local cache, so removing the cache
|
||
also removes all the certificates!
|
||
* Invalid certificates are skipped instead of aborting the whole
|
||
operation when logging in with a smart card using SSH.
|
||
* This version allows several OCSP-related options such as the OCSP
|
||
responder to be configured during smart card authentication.
|
||
* SSSD is now able to determine the name of the user who logs in
|
||
from the inserted smart card without having to type in the
|
||
username. Note that this functionality must be enabled with the
|
||
allow_missing_name pam_sss option.
|
||
* The sss_cache command line tool is now able to invalidate SUDO
|
||
rules with its new -r/-R switches. Note that the sudo rules ar
|
||
not refreshed with the sss_cache tool immediately.
|
||
* A new command line tool called sssctl was added. This tool
|
||
allows to observe the status of SSSD.
|
||
* A new option local_negative_timeout was added. This option
|
||
allows the admin to specify the time during which lookups for
|
||
users that are not handled by SSSD but are present on the
|
||
system (typically in /etc/passwd and /etc/group) and prevents
|
||
repeated lookups of local users on the remote server during
|
||
initgroups operation.
|
||
* An ID-mapping plugin for the winbind deamon was added. With
|
||
this plugin, it's possible for winbind to use the same
|
||
ID-mapping scheme as SSSD uses, producing consistent ID values.
|
||
- Remove 0001-build-detect-endianness-at-configure-time.patch
|
||
(included upstream)
|
||
|
||
-------------------------------------------------------------------
|
||
Mon Apr 18 12:24:29 UTC 2016 - hguo@suse.com
|
||
|
||
- Enable PAC responder.
|
||
PAC is an extension element returned by domain controller, to speed
|
||
up resolution of authorisation data such as group memberships.
|
||
|
||
-------------------------------------------------------------------
|
||
Thu Apr 14 17:20:11 UTC 2016 - michael@stroeder.com
|
||
|
||
- Update to new upstream release 1.13.4
|
||
* The IPA sudo provider was reimplemented. The new version reads the
|
||
data from IPA's LDAP tree (as opposed to the compat tree populated by
|
||
the slapi-nis plugin that was used previously). The benefit is that
|
||
deployments which don't require the compat tree for other purposes,
|
||
such as support for non-SSSD clients can disable those autogenerated
|
||
LDAP trees to conserve resources that slapi-nis otherwise requires. There
|
||
should be no visible changes to the end user.
|
||
* SSSD now has the ability to renew the machine credentials (keytabs)
|
||
when the ad provider is used. Please note that a recent version of
|
||
the adcli (0.8 or newer) package is required for this feature to work.
|
||
* The automatic ID mapping feature was improved so that the administrator
|
||
is no longer required to manually set the range size in case a RID in
|
||
the AD domain is larger than the default range size
|
||
* A potential infinite loop in the NFS ID mapping plugin that was
|
||
resulting in an excessive memory usage was fixed
|
||
* Clients that are pinned to a particular AD site using the ad_site
|
||
option no longer communicate with DCs outside that site during service
|
||
discovery.
|
||
* The IPA identity provider is now able to resolve external
|
||
(typically coming from a trusted AD forest) group members during
|
||
get-group-information requests. Please note that resolving external
|
||
group memberships for AD users during the initgroup requests used to
|
||
work even prior to this update. This feature is mostly useful for cases
|
||
where an IPA client is using the compat tree to resolve AD trust users.
|
||
* The IPA ID views feature now works correctly even for deployments
|
||
without a trust relationship. Previously, the subdomains IPA provider
|
||
failed to read the views data if no master domain record was created
|
||
on the IPA server during trust establishment.
|
||
* A race condition in the client libraries between the SSSD closing
|
||
the socket as idle and the client application using the socket was
|
||
fixed. This bug manifested with a Broken Pipe error message on the
|
||
client.
|
||
* SSSD is now able to resolve users with the same usernames in different
|
||
OUs of an AD domain
|
||
* The smartcard authentication now works properly with gnome-screensaver
|
||
|
||
-------------------------------------------------------------------
|
||
Wed Feb 10 16:38:37 UTC 2016 - mpluskal@suse.com
|
||
|
||
- Enable internal testsuite
|
||
|
||
-------------------------------------------------------------------
|
||
Wed Dec 16 14:08:01 UTC 2015 - jengelh@inai.de
|
||
|
||
- Update to new maintenance release 1.13.3
|
||
* A bug that prevented user lookups and logins after migration from
|
||
winsync to IPA-AD trusts was fixed.
|
||
* A bug that prevented the ignore_group_members option from working
|
||
correctly in AD provider setups that use a dedicated primary
|
||
group (as opposed to a user-private group) was fixed.
|
||
* Offline detection and offline login timeouts were improved for AD
|
||
users logging in from a domain trusted by an IPA server.
|
||
* The AD provider supports setting up autofs_provider=ad .
|
||
|
||
-------------------------------------------------------------------
|
||
Fri Nov 20 10:39:56 UTC 2015 - jengelh@inai.de
|
||
|
||
- Update to new upstream release 1.13.2
|
||
* Initial support for Smart Card authentication was added.
|
||
* The PAM prompting was enhanced so that when Two-Factor
|
||
Authentication is used, both factors (password and token) can be
|
||
entered separately on separate prompts.
|
||
* This release supports authenticating againt a KDC proxy.
|
||
|
||
-------------------------------------------------------------------
|
||
Wed Sep 30 11:44:21 UTC 2015 - michael@stroeder.com
|
||
|
||
- Update to new upstream release 1.13.1
|
||
* Initial support for Smart Card authentication was added. The
|
||
feature can be activated with the new pam_cert_auth option.
|
||
* The PAM prompting was enhanced so that when Two-Factor
|
||
Authentication is used, both factors (password and token) can
|
||
be entered separately on separate prompts. At the same time,
|
||
only the long-term password is cached, so offline access would
|
||
still work using the long term password.
|
||
* A new command line tool sss_override is present in this
|
||
release. The tools allows to override attributes on the SSSD
|
||
side. It's helpful in environment where e.g. some hosts need to
|
||
have a different view of POSIX attributes than others. Please
|
||
note that the overrides are stored in the cache as well, so
|
||
removing the cache will also remove the overrides.
|
||
* Several enhancements to the dynamic DNS update code. Notably,
|
||
clients that update multiple interfaces work better with this
|
||
release.
|
||
* This release supports authenticating againt a KDC proxy
|
||
* The fail over code was enhanced so that if a trusted domain is
|
||
not reachable, only that domain will be marked as inactive but
|
||
the backed would stay in online mode.
|
||
|
||
-------------------------------------------------------------------
|
||
Thu Aug 20 08:34:44 UTC 2015 - jengelh@inai.de
|
||
|
||
- Update to new upstream release 1.13
|
||
* Support for separate prompts when using two-factor authentication
|
||
* Added support for one-way trusts between an IPA and Active
|
||
Directory environment. (Depends on IPA 4.2)
|
||
* The fast memory cache now also supports the initgroups operation.
|
||
* The PAM responder is now capable of caching authentication for
|
||
configurable period, which might reduce server load in cases
|
||
where accounts authenticate very frequently.
|
||
Refer to the "cached_auth_timeout" option in sssd.conf(5).
|
||
* The Active Directory provider has changed the default value of
|
||
the "ad_gpo_access_control" option from permissive to enforcing.
|
||
As a consequence, the GPO access control now affects all clients
|
||
that set access_provider to ad. In order to restore the previous
|
||
behaviour, set ad_gpo_access_control to permissive or use a
|
||
different access_provider type.
|
||
* Group Policy objects defined in a different AD domain that the
|
||
computer object is defined in are now supported.
|
||
* Credential caching and Offline authentication are also available
|
||
when using two-factor authentication
|
||
* The Python bindings are now built for both Python2 and Python3.
|
||
* The LDAP bind timeout, StartTLS timeout and password change
|
||
timeout are now configurable using the ldap_opt_timeout option.
|
||
|
||
-------------------------------------------------------------------
|
||
Wed Aug 12 18:20:25 UTC 2015 - jengelh@inai.de
|
||
|
||
- Kill unused libsss_sudo-devel solvable.
|
||
|
||
-------------------------------------------------------------------
|
||
Tue Aug 11 07:41:07 UTC 2015 - hguo@suse.com
|
||
|
||
- Obsolete/provide libsss_sudo in sssd main package.
|
||
Sudo capability is an integral feature in SSSD and the library
|
||
is not supposed to be used separately.
|
||
|
||
-------------------------------------------------------------------
|
||
Thu Jun 25 16:44:49 UTC 2015 - crrodriguez@opensuse.org
|
||
|
||
- sssd.service: add Before= and Wants=nss-user-lookup.target
|
||
correct fix for bsc#926961
|
||
|
||
-------------------------------------------------------------------
|
||
Sun Jun 14 17:44:20 UTC 2015 - michael@stroeder.com
|
||
|
||
- Update to new upstream release 1.12.5
|
||
* The background refresh tasks now supports refreshing users and
|
||
groups as well. See the "refresh_expired_interval" parameter in
|
||
the sssd.conf manpage.
|
||
* A new option subdomain_inherit was added.
|
||
* When an expired account attempts to log in, a configurable
|
||
error message can be displayed with sufficient pam_verbosity
|
||
setting. See the "pam_account_expired_message" option.
|
||
* OpenLDAP ppolicy can be honored even when an alternate login
|
||
method (such as SSH key) is used. See the "ldap_access_order"
|
||
option.
|
||
* A new option :krb5_map_user" was added, allowing the admin to
|
||
map UNIX usernames to Kerberos principals.
|
||
* BUG FIXES:
|
||
* Fixed AD-specific bugs that resulted in the incorrect set of
|
||
groups being displayed after the initgroups operation.
|
||
* Fixes related to the IPA ID views feature. Setups using this
|
||
should update sssd on both IPA servers and clients.
|
||
* The AD provider now handles binary GUIDs correctly.
|
||
* A bug that prevented the `ignore_group_members` parameter to be
|
||
used with the AD provider was fixed.
|
||
* The failover code now reads and honors TTL value for SRV
|
||
queries as well.
|
||
* Race condition between setting the timeout in the back ends and
|
||
reading it in the front end during initgroup operation was
|
||
fixed. This bug affected applications that perform the
|
||
initgroups(3) operation in multiple processes simultaneously.
|
||
* Setups that only want to use the domain SSSD is connected to,
|
||
but not the autodiscovered trusted domains by setting
|
||
`subdomains_provider=none` now work correctly as long as the
|
||
domain SID is set manually in the config file.
|
||
* In case only "allow" rules are used, the simple access provider
|
||
is now able to skip unresolvable groups.
|
||
* The GPO access control code now handles situations where user
|
||
and computer objects were in different domains.
|
||
|
||
-------------------------------------------------------------------
|
||
Thu Feb 19 10:51:22 UTC 2015 - hguo@suse.com
|
||
|
||
- Update to new upstream release 1.12.4 (Changelog highlights following)
|
||
* This is mostly a bug fixing release with only minor enhancements
|
||
visible to the end user.
|
||
* Contains many fixes and enhancements related to the ID views
|
||
functionality of FreeIPA servers.
|
||
* Several fixes related to retrieving AD group membership in an
|
||
IPA-AD trust scenario.
|
||
* Fixes a bug where the GPO access control previously didn't work
|
||
at all if debugging was enabled in smb.conf.
|
||
* SSSD can now be pinned to a particular AD site instead of
|
||
autodiscovering the site.
|
||
* A regression that caused setting the SELinux context for IPA users
|
||
to fail, was fixed.
|
||
* Fixed a potential crash caused by a double-free error when an SSSD
|
||
service was killed by the monitor process.
|
||
|
||
-------------------------------------------------------------------
|
||
Mon Feb 16 10:09:18 UTC 2015 - howard@localhost
|
||
|
||
- A minor rpmspec cleanup to get rid of five rpmlint warnings
|
||
* Remove mentioning of system-wide dbus configuration file from comments.
|
||
* Remove traditional init script.
|
||
* Remove compatibility for producing packages on older OpenSUSE releases.
|
||
|
||
-------------------------------------------------------------------
|
||
Thu Jan 8 22:23:42 UTC 2015 - jengelh@inai.de
|
||
|
||
- Update to new upstream release 1.12.3
|
||
* SSSD now allows the IPA client to move from one ID view to
|
||
another after SSSD restart.
|
||
* It is possible to apply ID views to IPA domains as well.
|
||
Previous SSSD versions only allowed views to be applied to AD
|
||
trusted domains.
|
||
* Overriding SSH public keys is supported in this release.
|
||
* Move semanage related functions to a separate library.
|
||
|
||
-------------------------------------------------------------------
|
||
Thu Jan 1 22:01:02 UTC 2015 - meissner@suse.com
|
||
|
||
- build with PIE
|
||
|
||
-------------------------------------------------------------------
|
||
Mon Nov 10 00:37:00 UTC 2014 - Led <ledest@gmail.com>
|
||
|
||
- fix bashism in postun script
|
||
|
||
-------------------------------------------------------------------
|
||
Thu Oct 30 12:22:06 UTC 2014 - jengelh@inai.de
|
||
|
||
- Update to new upstream release 1.12.2 (bugfix release, bnc#900159)
|
||
* Fixed a regression where the IPA provider did not fetch User
|
||
Private Groups correctly
|
||
* An important bug in the GPO access control which resulted in a
|
||
wrong principal being used, was fixed.
|
||
* Several new options are available for deployments that need to
|
||
restrict a certain PAM service from connecting to a certain SSSD
|
||
domain. For more details, see the description of
|
||
pam_trusted_users and pam_public_domains options in the
|
||
sssd.conf(5) man page and the domains option in the pam_sss(8)
|
||
man page.
|
||
* When SSSD is acting as an IPA client in setup with trusted AD
|
||
domains, it is able to return group members or full group
|
||
memberships for users from trusted AD domains.
|
||
* Support for the "views" feature of IPA.
|
||
- Remove 0001-build-call-AC_BUILD_AUX_DIR-before-anything-else.patch
|
||
(merged upstream)
|
||
|
||
-------------------------------------------------------------------
|
||
Sat Oct 11 13:36:48 UTC 2014 - jengelh@inai.de
|
||
|
||
- Add 0001-build-call-AC_BUILD_AUX_DIR-before-anything-else.patch
|
||
to workaround bad autoconf invocation
|
||
|
||
-------------------------------------------------------------------
|
||
Sat Oct 11 00:16:15 UTC 2014 - crrodriguez@opensuse.org
|
||
|
||
- 0001-build-detect-endianness-at-configure-time.patch
|
||
Correct defective endianness test.
|
||
|
||
-------------------------------------------------------------------
|
||
Mon Oct 6 13:25:23 UTC 2014 - jengelh@inai.de
|
||
|
||
- Update to new upstream release 1.12.1
|
||
* The GPO access control was further enhanced to allow the access
|
||
control decisions while offline and map the Windows logon
|
||
rights onto Linux PAM services.
|
||
* The SSSD now ships a plugin for the rpc.idmapd daemon,
|
||
sss_rpcidmapd(5).
|
||
* A MIT Kerberos localauth plugin was added to SSSD. This plugin
|
||
helps translating principals to user names in IPA-AD trust
|
||
scenarios, allowing the krb5.conf configuration to be less
|
||
complex.
|
||
* A libwbclient plugin implementation is now part of the SSSD.
|
||
The main purpose is to map Active Directory users and groups
|
||
identified by their SID to POSIX users and groups for the
|
||
file-server use-case.
|
||
* Active Directory users ca nnow use their User Logon Name to log
|
||
in.
|
||
* The sss_cache tool was enhanced to allow invalidating the SSH
|
||
host keys.
|
||
* Groups without full POSIX information can now be used to enroll
|
||
group membership (CVE-2014-0249).
|
||
* Detection of transition from offline to online state was
|
||
improved, resulting in fewer timeouts when SSSD is offline.
|
||
* The Active Directory provider now correctly detects Windows
|
||
Server 2012 R2. Previous versions would fall back to the slower
|
||
non-AD path with 2012 R2.
|
||
* Several other bugs related to deployments where SSSD is acting
|
||
as an AD client were fixed.
|
||
|
||
-------------------------------------------------------------------
|
||
Fri Aug 22 15:44:14 UTC 2014 - lchiquitto@suse.com
|
||
|
||
- The utility sss_obfuscate uses the Python module pysss, so add a
|
||
dependency on python-sssd-config to sssd-tools (bnc#890242)
|
||
|
||
-------------------------------------------------------------------
|
||
Sun Aug 10 12:20:50 UTC 2014 - jengelh@inai.de
|
||
|
||
- Update to new upstream release 1.12.0
|
||
* A new responder, called InfoPipe was added. This responder
|
||
provides a public D-Bus interface accessible over the system bus.
|
||
In this release, methods for retrieving user attributes and list
|
||
of groups were added as well as objects representing SSSD domains
|
||
and processes. (The next 1.12.x releases will publish objects
|
||
representing users and groups, too.)
|
||
* SSSD provides an ID-mapping plugin for cifs-utils so that Windows
|
||
SIDs can be mapped onto POSIX IDs and/or names without requiring
|
||
Winbind and using the same code as the SSSD uses for identity
|
||
information.
|
||
* First phase of Group Policy-based access control for the AD
|
||
provider was added. At the moment, the gpo-ldap component that
|
||
downloads the list of GPOs that apply for the specific client has
|
||
been implemented as well as the gpo-smb component that retrieves
|
||
the group policy files and determines the access control check
|
||
results based on those files. Future improvements will focus on
|
||
storing the GPO policies as local files and mapping the Windows
|
||
logon rights onto Linux PAM services.
|
||
* Added a new library called sss_sifp that provides a simple
|
||
synchronous API for communication with our new InfoPipe responder
|
||
over the system bus.
|
||
- Remove 0001-BUILD-Link-libsss_ldap_common.so-to-libsss_idmap.so.patch
|
||
(merged upstream)
|
||
- Provide "rcsssd" in systemd environments
|
||
- Ensure sssd is always startable by removing /var/lib/sss/db/*.ldb
|
||
on package installation so as to avoid potentially cache
|
||
format incompatibility which would cause sssd to exit
|
||
|
||
-------------------------------------------------------------------
|
||
Thu Jun 12 14:18:30 UTC 2014 - ckornacker@suse.com
|
||
|
||
- fix %postun to not erroneously remove sss pam module
|
||
|
||
-------------------------------------------------------------------
|
||
Tue May 27 16:56:42 UTC 2014 - crrodriguez@opensuse.org
|
||
|
||
- Switch to libnl-3 so we can get rid of libnl-1.
|
||
|
||
-------------------------------------------------------------------
|
||
Sat May 24 14:36:43 UTC 2014 - jengelh@inai.de
|
||
|
||
- Redo 0001-build-detect-endianness-at-configure-time.patch to be -p1
|
||
- Add 0001-BUILD-Link-libsss_ldap_common.so-to-libsss_idmap.so.patch
|
||
to resolve runtime loading problems
|
||
(http://lists.opensuse.org/opensuse-factory/2014-05/msg00181.html )
|
||
|
||
-------------------------------------------------------------------
|
||
Tue May 13 11:11:59 UTC 2014 - varkoly@suse.com
|
||
|
||
- bnc#877457 - 78 Configuration file /usr/lib/systemd/system/sssd.service is marked executable.
|
||
Please remove executable permission bits.
|
||
|
||
-------------------------------------------------------------------
|
||
Tue May 6 14:01:29 UTC 2014 - ddiss@suse.com
|
||
|
||
- Detect endianness at configure time, for use by Samba's byteorder.h header;
|
||
(bnc#876544).
|
||
+ 0001-build-detect-endianness-at-configure-time.patch
|
||
|
||
-------------------------------------------------------------------
|
||
Tue Apr 29 10:00:57 UTC 2014 - varkoly@suse.com
|
||
|
||
- Update to new upstream release 1.11.5.1
|
||
* sssd crashes after upgrade from 1.11.4 to 1.11.5 when using a samba4 domain
|
||
* SSSD pam module accepts usernames with leading spaces
|
||
* [RFE] Expose the list of trusted domains to IPA
|
||
* If both IPA and LDAP are set up with enumeration on, two enum tasks are running
|
||
* sssd.conf man pages don't list a configuration option.
|
||
* Make SSSD compilable on systems with non-standard paths to krb5 includes
|
||
* [freebsd] pam_sss: add ignore_unknown_user option
|
||
* MAN: Remove misleading memberof example from ldap_access_filter example
|
||
* not retrieving homedirs of AD users with posix attributes
|
||
* Document that `sssd` cache needs to be cleared manually, if ID mapping configuration changes
|
||
* Check IPA idranges before saving them to the cache
|
||
* Evaluate usage of sudo LDAP provider together with the AD provider
|
||
* Setting int option to 0 yields the default value
|
||
* ipa-server-mode: Use lower-case user name component in home dir path
|
||
* SSSD Does not cache SELinux map from FreeIPA correctly
|
||
* IPA SELinux code looks for the host in the wrong sysdb subdir when a trusted user logs in
|
||
* sssd fails to handle expired passwords when OTP is used
|
||
* Add another Kerberos error code to trigger IPA password migration
|
||
* Double OK when starting the service
|
||
* SSSD should create the SELinux mapping file with format expected by pam_selinux
|
||
* Valgrind: Invalid read of int while processing netgroup
|
||
* other subdomains are unavailable when joined to a subdomain in the ad forest
|
||
* Error during password change
|
||
* configure time variables not expanded when running ./configure
|
||
* RHEL7 IPA selinuxusermap hbac rule not always matching
|
||
|
||
-------------------------------------------------------------------
|
||
Fri Mar 7 15:18:34 UTC 2014 - jengelh@inai.de
|
||
|
||
- Update to new upstream release 1.11.4
|
||
* The simple access provider supports specifying users and groups
|
||
using their NetBIOS domain name (such as DOMAIN\username)
|
||
* Support for enumerating users and groups from trusted AD domains
|
||
was added to the AD provider
|
||
* The Active Directory site discovery was made more robust for
|
||
configurations which use multiple trusted domains
|
||
* Several bugs in the LDAP provider that affected setups which
|
||
mapped Windows SIDs to POSIX IDs were fixed
|
||
* The SSSD is now able to use One Time Password (OTP)
|
||
authentication configured on an IPA server.
|
||
|
||
-------------------------------------------------------------------
|
||
Fri Dec 20 21:54:58 UTC 2013 - jengelh@inai.de
|
||
|
||
- Update to new upstream release 1.11.3
|
||
* The AD provider is able to resolve group memberships for groups
|
||
with Global and Universal scope
|
||
* The initgroups (get groups for user) operation for users from
|
||
trusted AD domains was made more reliable by reading the required
|
||
tokenGroups attribute from LDAP instead of Global Catalog
|
||
* A new option ad_enable_gc was added to the AD provider. This
|
||
option allows the administrator to force SSSD to talk to LDAP
|
||
port only and never try the Global Catalog
|
||
* The AD provider is now able to leverage the tokenGroups attribute
|
||
even when POSIX attributes are used, providing better performance
|
||
during logins.
|
||
* A memory leak in the NSS responder that affected long-lived
|
||
clients that requested netgroup data was fixed
|
||
- Remove sssd-ldflags.diff (merged upstream)
|
||
|
||
-------------------------------------------------------------------
|
||
Thu Nov 28 16:51:39 UTC 2013 - ckornacker@suse.com
|
||
|
||
- Migrate deprecated krb5_kdcip variable to krb5_server (bnc#851048)
|
||
|
||
-------------------------------------------------------------------
|
||
Fri Nov 1 22:12:03 UTC 2013 - jengelh@inai.de
|
||
|
||
- Update to new upstream release 1.11.2
|
||
* A new option ad_access_filter was added. This option allows the
|
||
administrator to easily configure LDAP search filter that the users
|
||
logging in must match in order to be granted access.
|
||
* The Kerberos provider will no longer try to create public
|
||
directories when evaluating the krb5_ccachedir option.
|
||
- Remove 0005-implicit-decl.diff (merged upstream)
|
||
|
||
-------------------------------------------------------------------
|
||
Tue Sep 3 21:12:37 UTC 2013 - jengelh@inai.de
|
||
|
||
- Update to new upstream release 1.11.0
|
||
* The sudo integration was made more robust. SSSD is now able to
|
||
gracefully handle situations where it is not able to resolve the
|
||
client host name or sudo rules have multiple name attributes.
|
||
* Several nested group membership bugs were fixed
|
||
* The PAC responder was made more robust and efficient, modifying
|
||
existing cache entries instead of always recreating them.
|
||
* The Kerberos provider now supports the new KEYRING ccache type.
|
||
- Remove sssd-no-ldb-check.diff, now implemented through a
|
||
configure argument --disable-ldb-version-check
|
||
|
||
-------------------------------------------------------------------
|
||
Sun Jun 16 16:11:42 UTC 2013 - jengelh@inai.de
|
||
|
||
- Explicitly formulate SASL BuildRequires
|
||
|
||
-------------------------------------------------------------------
|
||
Thu May 2 09:20:49 UTC 2013 - jengelh@inai.de
|
||
|
||
- Update to new upstream release 1.9.5
|
||
* Includes a fix for CVE-2013-0287: A simple access provider flaw
|
||
prevents intended ACL use when SSSD is configured as an Active
|
||
Directory client.
|
||
* Fixed spurious password expiration warning that was printed on
|
||
login with the Kerberos back end.
|
||
* A new option ldap_rfc2307_fallback_to_local_users was added. If
|
||
this option is set to true, SSSD is be able to resolve local
|
||
group members of LDAP groups.
|
||
* Fixed an indexing bug that prevented the contents of autofs maps
|
||
from being returned to the automounter deamon in case the map
|
||
contained a large number of entries.
|
||
* Several fixes for safer handling of Kerberos credential caches
|
||
for cases where the ccache is set to be stored in a DIR: type.
|
||
- Remove Provide-a-be_get_account_info_send-function.patch,
|
||
Add-unit-tests-for-simple-access-test-by-groups.patch,
|
||
Do-not-compile-main-in-DP-if-UNIT_TESTING-is-defined.patch,
|
||
Resolve-GIDs-in-the-simple-access-provider.patch
|
||
(CVE-2013-0287 material is in upstream),
|
||
sssd-sysdb-binary-attrs.diff (merged upstream)
|
||
|
||
-------------------------------------------------------------------
|
||
Fri Apr 5 16:35:07 UTC 2013 - jengelh@inai.de
|
||
|
||
- Implement signature verification
|
||
|
||
-------------------------------------------------------------------
|
||
Wed Mar 20 10:05:00 UTC 2013 - rhafer@suse.com
|
||
|
||
- Fixed security issue: CVE-2013-0287 (bnc#809153):
|
||
When SSSD is configured as an Active Directory client by using
|
||
the new Active Directory provider or equivalent configuration
|
||
of the LDAP provider, the Simple Access Provider does not
|
||
handle access control correctly. If any groups are specified
|
||
with the simple_deny_groups option, the group members are
|
||
permitted access. New patches:
|
||
* Provide-a-be_get_account_info_send-function.patch
|
||
* Add-unit-tests-for-simple-access-test-by-groups.patch
|
||
* Do-not-compile-main-in-DP-if-UNIT_TESTING-is-defined.patch
|
||
* Resolve-GIDs-in-the-simple-access-provider.patch
|
||
|
||
-------------------------------------------------------------------
|
||
Tue Feb 26 08:29:43 UTC 2013 - jengelh@inai.de
|
||
|
||
- Resolve user retrieval problems when encountering binary data
|
||
in LDAP attributes (bnc#806078),
|
||
added sssd-sysdb-binary-attrs.diff
|
||
- Added sssd-no-ldb-check.diff so that SSSD continues to start
|
||
even after an LDB update.
|
||
|
||
-------------------------------------------------------------------
|
||
Fri Feb 8 10:31:52 UTC 2013 - rhafer@suse.com
|
||
|
||
- fix package name in baselibs.conf (bnc#796423)
|
||
|
||
-------------------------------------------------------------------
|
||
Thu Jan 31 16:34:47 UTC 2013 - rhafer@suse.com
|
||
|
||
- update to 1.9.4 (bnc#801036):
|
||
* A security bug assigned CVE-2013-0219 was fixed - TOCTOU race
|
||
conditions when creating or removing home directories for users
|
||
in local domain
|
||
* A security bug assigned CVE-2013-0220 was fixed - out-of-bounds
|
||
reads in autofs and ssh responder
|
||
* The sssd_pam responder processes pending requests after
|
||
reconnect
|
||
* A serious memory leak in the NSS responder was fixed
|
||
* Requests that were processing group entries with DNs pointing
|
||
out of any configured search bases were not terminated
|
||
correctly, causing long timeouts
|
||
* Kerberos tickets are correctly renewed even after SSSD daemon
|
||
restart
|
||
* Multiple fixes related to SUDO integration, in particular
|
||
fixing functionality when the sssd back end process was
|
||
changing its online/offline status
|
||
* The pwd_exp_warning option was fixed to function as documented
|
||
in the manual page
|
||
- refreshed sssd-ldflags.diff to apply cleanly
|
||
|
||
-------------------------------------------------------------------
|
||
Mon Dec 10 09:55:35 UTC 2012 - rhafer@suse.com
|
||
|
||
- Removed left-over "Requires" for no longer existing sssd-client
|
||
subpackage.
|
||
- New patch: sssd-ldflags.diff to fix link failures due to erroneous
|
||
LDFLAGS usage
|
||
|
||
-------------------------------------------------------------------
|
||
Thu Dec 6 10:38:59 UTC 2012 - rhafer@suse.com
|
||
|
||
- Switch back to using libcrypto instead of mozilla-nss as it seems
|
||
to be supported upstream again, cf.
|
||
https://lists.fedorahosted.org/pipermail/sssd-devel/2012-June/010202.html
|
||
- Cleanup PAM configuration after uninstalling sssd (bnc#788328)
|
||
|
||
-------------------------------------------------------------------
|
||
Thu Dec 6 09:05:29 UTC 2012 - jengelh@inai.de
|
||
|
||
- Update to new upstream release 1.9.3
|
||
* Many fixes related to deployments where the SSSD is running as
|
||
a client of IPA server with trust relation established with an
|
||
Active Directory server
|
||
* Multiple fixes related to correct reporting of group
|
||
memberships, especially in setups that use nested groups
|
||
* Fixed a bug that prevented upgrade from the 1.8 series if the
|
||
cache contained nested groups before the upgrade
|
||
* Restarting the responders is more robust for cases where the
|
||
machine is under heavy load during back end restart
|
||
* The default_shell option can now be also set per-domain in
|
||
addition to global setting.
|
||
|
||
-------------------------------------------------------------------
|
||
Sat Nov 10 00:27:06 UTC 2012 - jengelh@inai.de
|
||
|
||
- Update to new upstream release 1.9.2
|
||
* Users or groups from trusted domains can be retrieved by UID or
|
||
GID as well
|
||
* Several fixes that mitigate file descriptor leak during logins
|
||
* SSH host keys are also removed from the cache after being
|
||
removed from the server
|
||
* Fix intermittent crash in responders if the responder was
|
||
shutting down while requests were still pending
|
||
* Catch an error condition that might have caused a tight loop in
|
||
the sssd_nss process while refreshing expired enumeration request
|
||
* Fixed memory hierarchy of subdomains discovery requests that
|
||
caused use-after-free access bugs
|
||
* The krb5_child and ldap_child processes can print libkrb5 tracing
|
||
information in the debug logs
|
||
|
||
-------------------------------------------------------------------
|
||
Wed Jun 27 12:32:05 UTC 2012 - jengelh@inai.de
|
||
|
||
- Update to new upstream release 1.8.93 (1.9.0~beta3)
|
||
* Add native support for autofs to the IPA provider
|
||
* Support for id mapping when connecting to Active Directory
|
||
* Support for handling very large (> 1500 users) groups in
|
||
Active Directory
|
||
* Add a new fast in-memory cache to speed up lookups of cached data
|
||
on repeated requests
|
||
* Add support for the Kerberos DIR cache for storing multiple TGTs
|
||
automatically
|
||
* Add a new PAC responder for dealing with cross-realm Kerberos
|
||
trusts
|
||
* Terminate idle connections to the NSS and PAM responders
|
||
|
||
-------------------------------------------------------------------
|
||
Thu May 10 04:22:47 UTC 2012 - jengelh@inai.de
|
||
|
||
- Update to new upstream release 1.8.3
|
||
* LDAP: Handle situations where the RootDSE is not available
|
||
anonymously
|
||
* LDAP: Fix regression for users using non-standard LDAP attributes
|
||
for user information
|
||
- Switch from openssl to mozilla-nss, as this is the officially
|
||
supported crypto integration
|
||
|
||
-------------------------------------------------------------------
|
||
Fri Apr 13 13:03:44 PDT 2012 - ben.kevan@gmail.com
|
||
|
||
- Fix build error on SLES 11 builds
|
||
|
||
-------------------------------------------------------------------
|
||
Mon Apr 9 21:45:45 PDT 2012 - ben.kevan@gmail.com
|
||
|
||
- Add suse_version condition for glib over libunistring for
|
||
SLES 11 SP2.
|
||
- Update to new upstream release 1.8.2
|
||
* Fix for GSSAPI binds when the keytab contains unrelated
|
||
principals
|
||
* Workarounds added for LDAP servers with unreadable RootDSE
|
||
|
||
-------------------------------------------------------------------
|
||
Wed Apr 4 16:13:33 PDT 2012 - ben.kevan@gmail.com
|
||
|
||
- Update to new upstream release 1.8.1
|
||
* Resolve issue where we could enter an infinite loop trying to
|
||
connect to an auth server
|
||
|
||
-------------------------------------------------------------------
|
||
|
||
Sun Mar 11 18:36:44 UTC 2012 - jengelh@medozas.de
|
||
|
||
- Update to new upstream release 1.8.0
|
||
* Support for the service map in NSS
|
||
* Support for setting default SELinux user context from FreeIPA
|
||
* Support for retrieving SSH user and host keys from LDAP
|
||
* Support for caching autofs LDAP requests
|
||
* Support for caching SUDO rules
|
||
* Include the IPA AutoFS provider
|
||
* Fixed several memory-corruption bugs
|
||
* Fixed a regression in the proxy provider
|
||
|
||
-------------------------------------------------------------------
|
||
Wed Oct 19 13:56:57 UTC 2011 - rhafer@suse.de
|
||
|
||
- Fixed systemd related packaging issues (bnc#724157)
|
||
- fixed build on older openSUSE releases
|
||
|
||
-------------------------------------------------------------------
|
||
Mon Sep 19 17:07:24 UTC 2011 - jengelh@medozas.de
|
||
|
||
- Resolve "have choice for libnl-devel:
|
||
libnl-1_1-devel libnl3-devel"
|
||
|
||
-------------------------------------------------------------------
|
||
Tue Aug 2 08:46:53 UTC 2011 - rhafer@suse.de
|
||
|
||
- Fixed typos in configure args
|
||
- Cherry-picked password policy fixes from 1.5 branch (bnc#705768)
|
||
- switched to fd-leak fix cherry-picked from 1.5 branch
|
||
- Add /usr/sbin to the search path to make configure find nscd
|
||
(bnc#709747)
|
||
|
||
-------------------------------------------------------------------
|
||
Fri Jul 29 10:39:51 UTC 2011 - jengelh@medozas.de
|
||
|
||
- Add patches to fix an fd leak in sssd_pam
|
||
|
||
-------------------------------------------------------------------
|
||
Thu Jul 28 10:03:32 UTC 2011 - jengelh@medozas.de
|
||
|
||
- Update to new upstream release 1.5.11
|
||
* Support for overriding home directory, shell and primary GID
|
||
locally
|
||
* Properly honor TTL values from SRV record lookups
|
||
* Support non-POSIX groups in nested group chains (for RFC2307bis
|
||
LDAP servers)
|
||
* Properly escape IPv6 addresses in the failover code
|
||
* Do not crash if inotify fails (e.g. resource exhaustion)
|
||
- Remove redundant %clean section; delete .la files more
|
||
efficiently
|
||
|
||
-------------------------------------------------------------------
|
||
Tue Jun 7 08:59:04 UTC 2011 - rhafer@suse.de
|
||
|
||
- Update to 1.5.8:
|
||
* Support for the LDAP paging control
|
||
* Support for multiple DNS servers for name resolution
|
||
* Fixes for several group membership bugs
|
||
* Fixes for rare crash bugs
|
||
|
||
-------------------------------------------------------------------
|
||
Wed May 4 09:22:20 UTC 2011 - rhafer@suse.de
|
||
|
||
- Update to 1.5.7
|
||
* A flaw was found in the handling of cached passwords when
|
||
kerberos renewal tickets is enabled. Due to a bug, the cached
|
||
password was overwritten with a (moderately) predictable
|
||
filename, which could allow a user to authenticate as someone
|
||
else if they knew the name of the cache file (bnc#691135,
|
||
CVE-2011-1758)
|
||
- Changes in 1.5.6:
|
||
* Fixed a serious memory leak in the memberOf plugin
|
||
* Fixed a regression with the negative cache that caused it to be
|
||
essentially nonfunctional
|
||
* Fixed an issue where the user's full name would sometimes be
|
||
removed from the cache
|
||
* Fixed an issue with password changes in the kerberos provider
|
||
not working with kpasswd
|
||
|
||
-------------------------------------------------------------------
|
||
Thu Apr 14 11:31:38 UTC 2011 - rhafer@suse.de
|
||
|
||
- Update to 1.5.5
|
||
* Fixes for several crash bugs
|
||
* LDAP group lookups will no longer abort if there is a
|
||
zero-length member attribute
|
||
* Add automatic fallback to 'cn' if the 'gecos' attribute does not
|
||
exist
|
||
|
||
-------------------------------------------------------------------
|
||
Wed Mar 30 09:47:23 UTC 2011 - rhafer@suse.de
|
||
|
||
- Should build in SLE-11-SP1 now
|
||
|
||
-------------------------------------------------------------------
|
||
Tue Mar 29 13:23:57 UTC 2011 - rhafer@suse.de
|
||
|
||
- Updated to 1.5.4
|
||
* Fixes for Active Directory when not all users and groups have
|
||
POSIX attributes
|
||
* Fixes for handling users and groups that have name aliases
|
||
(aliases are ignored)
|
||
* Fix group memberships after initgroups in the IPA provider
|
||
|
||
-------------------------------------------------------------------
|
||
Thu Mar 24 15:42:02 UTC 2011 - rhafer@suse.de
|
||
|
||
- Updated to 1.5.3
|
||
* Support for libldb >= 1.0.0
|
||
* Proper detection of manpage translations
|
||
* Changes between 1.5.1 and 1.5.2
|
||
* Fixes for support of FreeIPA v2
|
||
* Fixes for failover if DNS entries change
|
||
* Improved sss_obfuscate tool with better interactive mode
|
||
* Fix several crash bugs
|
||
* Don't attempt to use START_TLS over SSL. Some LDAP servers
|
||
can't handle this
|
||
* Delete users from the local cache if initgroups calls return
|
||
'no such user' (previously only worked for getpwnam/getpwuid)
|
||
* Use new Transifex.net translations
|
||
* Better support for automatic TGT renewal (now survives
|
||
restart)
|
||
* Netgroup fixes
|
||
|
||
-------------------------------------------------------------------
|
||
Tue Mar 8 13:22:58 UTC 2011 - rhafer@suse.de
|
||
|
||
- Updated to 1.5.1
|
||
* Vast performance improvements when enumerate = true
|
||
* All PAM actions will now perform a forced initgroups lookup
|
||
instead of just a user information lookup This guarantees that
|
||
all group information is available to other providers, such as
|
||
the simple provider.
|
||
* For backwards-compatibility, DNS lookups will also fall back to
|
||
trying the SSSD domain name as a DNS discovery domain.
|
||
* Support for more password expiration policies in LDAP
|
||
- 389 Directory Server
|
||
- FreeIPA
|
||
- ActiveDirectory
|
||
* Support for ldap_tls_{cert,key,cipher_suite} config options
|
||
* Assorted bugfixes
|
||
|
||
-------------------------------------------------------------------
|
||
Wed Jan 19 09:32:35 UTC 2011 - rhafer@suse.de
|
||
|
||
- /var/lib/sss/pubconf was missing (bnc#665442)
|
||
|
||
-------------------------------------------------------------------
|
||
Tue Jan 18 09:08:35 UTC 2011 - rhafer@suse.de
|
||
|
||
- It was possible to make sssd hang forever inside a loop in the
|
||
PAM responder by sending a carefully crafted packet to sssd.
|
||
This could be exploited by a local attacker to crash sssd and
|
||
prevent other legitimate users from logging into the system.
|
||
(bnc#660481, CVE-2010-4341)
|
||
|
||
-------------------------------------------------------------------
|
||
Sun Dec 19 13:37:32 UTC 2010 - aj@suse.de
|
||
|
||
- Own /etc/systemd directories to fix build.
|
||
|
||
-------------------------------------------------------------------
|
||
Thu Nov 25 16:30:40 UTC 2010 - rhafer@novell.com
|
||
|
||
- install systemd service file
|
||
|
||
-------------------------------------------------------------------
|
||
Tue Nov 16 11:06:02 UTC 2010 - rhafer@novell.com
|
||
|
||
- Updated to 1.4.1
|
||
* Add support for netgroups to the LDAP and proxy providers
|
||
* Fixes a minor bug with UIDs/GIDs >= 2^31
|
||
* Fixes a segfault in the kerberos provider
|
||
* Fixes a segfault in the NSS responder if a data provider crashes
|
||
* Correctly use sdap_netgroup_search_base
|
||
* the utility libraries libpath_utils1, libpath_utils-devel,
|
||
libref_array1 and libref_array-devel moved to their own
|
||
separate upstream project (ding-libs)
|
||
* Performance improvements made to group processing of RFC2307
|
||
LDAP servers
|
||
* Fixed nested group issues with RFC2307bis LDAP servers without
|
||
a memberOf plugin
|
||
* Manpage reviewed and updated
|
||
|
||
-------------------------------------------------------------------
|
||
Mon Sep 13 12:23:47 UTC 2010 - coolo@novell.com
|
||
|
||
- remove hard coded python version
|
||
|
||
-------------------------------------------------------------------
|
||
Fri Sep 3 13:17:48 UTC 2010 - rhafer@novell.com
|
||
|
||
- No dependencies on %{release}
|
||
|
||
-------------------------------------------------------------------
|
||
Mon Aug 30 12:57:47 UTC 2010 - rhafer@novell.com
|
||
|
||
- Updated to 1.3.1
|
||
* Fixes to the HBAC backend for obsolete or removed HBAC entries
|
||
* Improvements to log messages around TLS and GSSAPI for LDAP
|
||
* Support for building in environments using --as-needed LDFLAGS
|
||
* Vast performance improvement for initgroups on RFC2307 LDAP servers
|
||
* Long-running SSSD clients (e.g. GDM) will now reconnect properly to the
|
||
daemon if SSSD is restarted
|
||
* Rewrote the internal LDB cache API. As a synchronous API it is now faster
|
||
to access and easier to work with
|
||
* Eugene Indenbom contributed a sizeable amount of code to the LDAP provider
|
||
- We now handle failover situations much more reliably than we did
|
||
previously
|
||
- We also will now monitor the GSSAPI kerberos ticket and automatically
|
||
renew it when appropriate, instead of waiting for a connection to fail
|
||
* Support for netlink now allows us to more quickly detect situations
|
||
where we may have come online
|
||
* New option "dns_discovery_domain" allows better configuration for
|
||
using SRV records for failover
|
||
- New subpackages: libpath_utils1, libpath_utils-devel, libref_array1
|
||
and libref_array-devel
|
||
|
||
-------------------------------------------------------------------
|
||
Wed Mar 31 14:02:43 UTC 2010 - rhafer@novell.com
|
||
|
||
- Package pam- and nss-Modules as baselibs
|
||
- cleaned up file list and dependencies
|
||
- fixed init script dependencies
|
||
|
||
-------------------------------------------------------------------
|
||
Wed Mar 31 07:57:25 UTC 2010 - rhafer@novell.com
|
||
|
||
- Updated to 1.1.0
|
||
* Support for IPv6
|
||
* Support for LDAP referrals
|
||
* Offline failed login counter
|
||
* Fix for the long-standing cache cleanup performance issues
|
||
* libini_config, libcollection, libdhash, libref_array and
|
||
libpath_utils are now built as shared libraries for general
|
||
consumption (libref_array and libpath_utils are currently not
|
||
packaged, as no component in sssd links against them)
|
||
* Users get feedback from PAM if they authenticated offline
|
||
* Native local backend now has a utility to show nested memberships
|
||
(sss_groupshow)
|
||
* New "simple" access provider for easy restriction of users
|
||
- Backported libcrypto support from master to avoid Mozilla NSS
|
||
dependency
|
||
- Backported password policy improvments for LDAP provider from
|
||
master
|
||
|
||
-------------------------------------------------------------------
|
||
Mon Mar 8 14:06:29 UTC 2010 - rhafer@novell.com
|
||
|
||
- use logfiles for debug messages by default
|
||
|
||
-------------------------------------------------------------------
|
||
Fri Mar 5 12:57:25 UTC 2010 - rhafer@novell.com
|
||
|
||
- subpackages for commandline tools, ipa-provider plugin and
|
||
python API
|
||
|
||
-------------------------------------------------------------------
|
||
Fri Feb 26 14:48:50 UTC 2010 - rhafer@novell.com
|
||
|
||
- Updated to 1.0.5. Highlights:
|
||
* Removed some dead code (libreplace
|
||
* Clarify licenses throughout the code
|
||
|
||
-------------------------------------------------------------------
|
||
Thu Feb 4 17:04:01 UTC 2010 - rhafer@novell.com
|
||
|
||
- Updated to 1.0.4
|
||
|
||
-------------------------------------------------------------------
|
||
Thu Oct 8 15:10:47 UTC 2009 - rhafer@novell.com
|
||
|
||
- Update to 0.6.0
|
||
|
||
-------------------------------------------------------------------
|
||
Fri Sep 4 08:59:21 UTC 2009 - rhafer@novell.com
|
||
|
||
- fix LDAP filter for initgroups() with rfc2307bis setups
|
||
|
||
-------------------------------------------------------------------
|
||
Tue Sep 1 08:58:37 UTC 2009 - rhafer@novell.com
|
||
|
||
- initial package submission
|
||
|