pgreco / rpms / ipa

Forked from forks/areguera/rpms/ipa 4 years ago
Clone

Blame SOURCES/0041-Revert-Don-t-allow-OTP-or-RADIUS-in-FIPS-mode.patch

8558a7
From 6d813f6b03811a285c3c6dae85942c0086b619a6 Mon Sep 17 00:00:00 2001
8558a7
From: Nathaniel McCallum <npmccallum@redhat.com>
8558a7
Date: Mon, 26 Feb 2018 09:48:22 -0500
8558a7
Subject: [PATCH] Revert "Don't allow OTP or RADIUS in FIPS mode"
8558a7
8558a7
This reverts commit 16a952a0a44a0ebee97029ea1d2f6b7593dd2622.
8558a7
8558a7
OTP now works in FIPS mode. RADIUS can be made to be compliant by wrapping
8558a7
traffic in a VPN.
8558a7
8558a7
https://pagure.io/freeipa/issue/7168
8558a7
https://pagure.io/freeipa/issue/7243
8558a7
8558a7
Reviewed-By: Rob Crittenden <rcritten@redhat.com>
8558a7
Reviewed-By: Christian Heimes <cheimes@redhat.com>
8558a7
Reviewed-By: Rob Crittenden <rcritten@redhat.com>
8558a7
---
8558a7
 ipaserver/plugins/baseuser.py |  3 ---
8558a7
 ipaserver/plugins/config.py   | 16 ----------------
8558a7
 2 files changed, 19 deletions(-)
8558a7
8558a7
diff --git a/ipaserver/plugins/baseuser.py b/ipaserver/plugins/baseuser.py
8558a7
index bb8a73ded0fed135d5829ec0b0829a936f2196fb..bf24dbf542d3b481671dfe4e8cee14a2edcc26e0 100644
8558a7
--- a/ipaserver/plugins/baseuser.py
8558a7
+++ b/ipaserver/plugins/baseuser.py
8558a7
@@ -32,7 +32,6 @@ from .baseldap import (
8558a7
     add_missing_object_class)
8558a7
 from ipaserver.plugins.service import (
8558a7
    validate_certificate, validate_realm, normalize_principal)
8558a7
-from ipaserver.plugins.config import check_fips_auth_opts
8558a7
 from ipalib.request import context
8558a7
 from ipalib import _
8558a7
 from ipalib.constants import PATTERN_GROUPUSER_NAME
8558a7
@@ -478,7 +477,6 @@ class baseuser_add(LDAPCreate):
8558a7
                             **options):
8558a7
         assert isinstance(dn, DN)
8558a7
         set_krbcanonicalname(entry_attrs)
8558a7
-        check_fips_auth_opts(fips_mode=self.api.env.fips_mode, **options)
8558a7
         self.obj.convert_usercertificate_pre(entry_attrs)
8558a7
 
8558a7
     def post_common_callback(self, ldap, dn, entry_attrs, *keys, **options):
8558a7
@@ -602,7 +600,6 @@ class baseuser_mod(LDAPUpdate):
8558a7
         assert isinstance(dn, DN)
8558a7
         add_sshpubkey_to_attrs_pre(self.context, attrs_list)
8558a7
 
8558a7
-        check_fips_auth_opts(fips_mode=self.api.env.fips_mode, **options)
8558a7
         self.check_namelength(ldap, **options)
8558a7
 
8558a7
         self.check_mail(entry_attrs)
8558a7
diff --git a/ipaserver/plugins/config.py b/ipaserver/plugins/config.py
8558a7
index c9033fa8e7a2a0bfe77464fa4f9c62278bd814f6..ce15e6096f5b84dc45ee21d5aecc73ecf86eba07 100644
8558a7
--- a/ipaserver/plugins/config.py
8558a7
+++ b/ipaserver/plugins/config.py
8558a7
@@ -85,20 +85,6 @@ EXAMPLES:
8558a7
 
8558a7
 register = Registry()
8558a7
 
8558a7
-
8558a7
-def check_fips_auth_opts(fips_mode, **options):
8558a7
-    """
8558a7
-    OTP and RADIUS are not allowed in FIPS mode since they use MD5
8558a7
-    checksums (OTP uses our RADIUS responder daemon ipa-otpd).
8558a7
-    """
8558a7
-    if 'ipauserauthtype' in options and fips_mode:
8558a7
-        if ('otp' in options['ipauserauthtype'] or
8558a7
-                'radius' in options['ipauserauthtype']):
8558a7
-            raise errors.InvocationError(
8558a7
-                'OTP and RADIUS authentication in FIPS is '
8558a7
-                'not yet supported')
8558a7
-
8558a7
-
8558a7
 @register()
8558a7
 class config(LDAPObject):
8558a7
     """
8558a7
@@ -412,8 +398,6 @@ class config_mod(LDAPUpdate):
8558a7
 
8558a7
     def pre_callback(self, ldap, dn, entry_attrs, attrs_list, *keys, **options):
8558a7
         assert isinstance(dn, DN)
8558a7
-        check_fips_auth_opts(fips_mode=self.api.env.fips_mode, **options)
8558a7
-
8558a7
         if 'ipadefaultprimarygroup' in entry_attrs:
8558a7
             group=entry_attrs['ipadefaultprimarygroup']
8558a7
             try:
8558a7
-- 
8558a7
2.14.3
8558a7