|
|
bb0ded |
From 49d9147e38c5b50c52a1ebc7283753c779c2f81f Mon Sep 17 00:00:00 2001
|
|
|
bb0ded |
From: Alexander Bokovoy <abokovoy@redhat.com>
|
|
|
bb0ded |
Date: Thu, 3 Mar 2022 14:38:57 +0200
|
|
|
bb0ded |
Subject: [PATCH] ipatests: extend AES keyset to SHA2-based ones
|
|
|
bb0ded |
|
|
|
bb0ded |
Fixes: https://pagure.io/freeipa/issue/9119
|
|
|
bb0ded |
|
|
|
bb0ded |
Signed-off-by: Alexander Bokovoy <abokovoy@redhat.com>
|
|
|
bb0ded |
Reviewed-By: Julien Rische <jrische@redhat.com>
|
|
|
bb0ded |
Reviewed-By: Francisco Trivino <ftrivino@redhat.com>
|
|
|
bb0ded |
---
|
|
|
bb0ded |
ipaserver/install/plugins/adtrust.py | 3 ++-
|
|
|
bb0ded |
ipatests/pytest_ipa/integration/tasks.py | 3 ++-
|
|
|
bb0ded |
2 files changed, 4 insertions(+), 2 deletions(-)
|
|
|
bb0ded |
|
|
|
bb0ded |
diff --git a/ipaserver/install/plugins/adtrust.py b/ipaserver/install/plugins/adtrust.py
|
|
|
bb0ded |
index 5b87ac47c6919de287b07c9ceef7ae22e1e79398..67e372bdb40a0b1f6815f107fc567f0ae056dad8 100644
|
|
|
bb0ded |
--- a/ipaserver/install/plugins/adtrust.py
|
|
|
bb0ded |
+++ b/ipaserver/install/plugins/adtrust.py
|
|
|
bb0ded |
@@ -754,7 +754,8 @@ class update_host_cifs_keytabs(Updater):
|
|
|
bb0ded |
"""
|
|
|
bb0ded |
|
|
|
bb0ded |
host_princ_template = "host/{master}@{realm}"
|
|
|
bb0ded |
- valid_etypes = ['aes256-cts-hmac-sha1-96', 'aes128-cts-hmac-sha1-96']
|
|
|
bb0ded |
+ valid_etypes = ['aes256-cts-hmac-sha384-192', 'aes128-cts-hmac-sha256-128',
|
|
|
bb0ded |
+ 'aes256-cts-hmac-sha1-96', 'aes128-cts-hmac-sha1-96']
|
|
|
bb0ded |
|
|
|
bb0ded |
def extract_key_refs(self, keytab):
|
|
|
bb0ded |
host_princ = self.host_princ_template.format(
|
|
|
bb0ded |
diff --git a/ipatests/pytest_ipa/integration/tasks.py b/ipatests/pytest_ipa/integration/tasks.py
|
|
|
bb0ded |
index 13d84e23fa7dc8a5e562e8498c9142e2bcad696a..d06f8eb2cf6c36956ec200a1abb7c488d1dad9aa 100755
|
|
|
bb0ded |
--- a/ipatests/pytest_ipa/integration/tasks.py
|
|
|
bb0ded |
+++ b/ipatests/pytest_ipa/integration/tasks.py
|
|
|
bb0ded |
@@ -2261,7 +2261,8 @@ class KerberosKeyCopier:
|
|
|
bb0ded |
copier.copy_keys('/etc/krb5.keytab', tmpname, replacement=replacement)
|
|
|
bb0ded |
"""
|
|
|
bb0ded |
host_princ_template = "host/{master}@{realm}"
|
|
|
bb0ded |
- valid_etypes = ['aes256-cts-hmac-sha1-96', 'aes128-cts-hmac-sha1-96']
|
|
|
bb0ded |
+ valid_etypes = ['aes256-cts-hmac-sha384-192', 'aes128-cts-hmac-sha256-128',
|
|
|
bb0ded |
+ 'aes256-cts-hmac-sha1-96', 'aes128-cts-hmac-sha1-96']
|
|
|
bb0ded |
|
|
|
bb0ded |
def __init__(self, host):
|
|
|
bb0ded |
self.host = host
|
|
|
bb0ded |
--
|
|
|
bb0ded |
2.34.1
|
|
|
bb0ded |
|