Blame SOURCES/Try-harder-to-avoid-password-change-replay-errors.patch

183584
From d0f65d35675131dc299ad300722d4c358db9d4f4 Mon Sep 17 00:00:00 2001
183584
From: Greg Hudson <ghudson@mit.edu>
183584
Date: Fri, 4 Mar 2022 00:45:00 -0500
183584
Subject: [PATCH] Try harder to avoid password change replay errors
183584
183584
Commit d7b3018d338fc9c989c3fa17505870f23c3759a8 (ticket 7905) changed
183584
change_set_password() to prefer TCP.  However, because UDP_LAST falls
183584
back to UDP after one second, we can still get a replay error due to a
183584
dropped packet, before the TCP layer has a chance to retry.
183584
183584
Instead, try k5_sendto() with NO_UDP, and only fall back to UDP after
183584
TCP fails completely without reaching a server.  In sendto_kdc.c,
183584
implement an ONLY_UDP transport strategy to allow the UDP fallback.
183584
183584
ticket: 9037
183584
---
183584
 src/lib/krb5/os/changepw.c   |  9 ++++++++-
183584
 src/lib/krb5/os/os-proto.h   |  1 +
183584
 src/lib/krb5/os/sendto_kdc.c | 12 ++++++++----
183584
 3 files changed, 17 insertions(+), 5 deletions(-)
183584
183584
diff --git a/src/lib/krb5/os/changepw.c b/src/lib/krb5/os/changepw.c
183584
index 9f968da7f..c59232586 100644
183584
--- a/src/lib/krb5/os/changepw.c
183584
+++ b/src/lib/krb5/os/changepw.c
183584
@@ -255,9 +255,16 @@ change_set_password(krb5_context context,
183584
     callback_info.pfn_cleanup = kpasswd_sendto_msg_cleanup;
183584
     krb5_free_data_contents(callback_ctx.context, &chpw_rep);
183584
 
183584
+    /* UDP retransmits may be seen as replays.  Only try UDP after other
183584
+     * transports fail completely. */
183584
     code = k5_sendto(callback_ctx.context, NULL, &creds->server->realm,
183584
-                     &sl, UDP_LAST, &callback_info, &chpw_rep,
183584
+                     &sl, NO_UDP, &callback_info, &chpw_rep,
183584
                      ss2sa(&remote_addr), &addrlen, NULL, NULL, NULL);
183584
+    if (code == KRB5_KDC_UNREACH) {
183584
+        code = k5_sendto(callback_ctx.context, NULL, &creds->server->realm,
183584
+                         &sl, ONLY_UDP, &callback_info, &chpw_rep,
183584
+                         ss2sa(&remote_addr), &addrlen, NULL, NULL, NULL);
183584
+    }
183584
     if (code)
183584
         goto cleanup;
183584
 
183584
diff --git a/src/lib/krb5/os/os-proto.h b/src/lib/krb5/os/os-proto.h
183584
index 7cf5a4879..69d4ec34e 100644
183584
--- a/src/lib/krb5/os/os-proto.h
183584
+++ b/src/lib/krb5/os/os-proto.h
183584
@@ -49,6 +49,7 @@ typedef enum {
183584
     UDP_FIRST = 0,
183584
     UDP_LAST,
183584
     NO_UDP,
183584
+    ONLY_UDP
183584
 } k5_transport_strategy;
183584
 
183584
 /* A single server hostname or address. */
183584
diff --git a/src/lib/krb5/os/sendto_kdc.c b/src/lib/krb5/os/sendto_kdc.c
183584
index fffe0262f..e790a5198 100644
183584
--- a/src/lib/krb5/os/sendto_kdc.c
183584
+++ b/src/lib/krb5/os/sendto_kdc.c
183584
@@ -795,11 +795,14 @@ resolve_server(krb5_context context, const krb5_data *realm,
183584
     int err, result;
183584
     char portbuf[PORT_LENGTH];
183584
 
183584
-    /* Skip UDP entries if we don't want UDP. */
183584
+    /* Skip entries excluded by the strategy. */
183584
     if (strategy == NO_UDP && entry->transport == UDP)
183584
         return 0;
183584
+    if (strategy == ONLY_UDP && entry->transport != UDP &&
183584
+        entry->transport != TCP_OR_UDP)
183584
+        return 0;
183584
 
183584
-    transport = (strategy == UDP_FIRST) ? UDP : TCP;
183584
+    transport = (strategy == UDP_FIRST || strategy == ONLY_UDP) ? UDP : TCP;
183584
     if (entry->hostname == NULL) {
183584
         /* Added by a module, so transport is either TCP or UDP. */
183584
         ai.ai_socktype = socktype_for_transport(entry->transport);
183584
@@ -843,8 +846,9 @@ resolve_server(krb5_context context, const krb5_data *realm,
183584
     }
183584
 
183584
     /* For TCP_OR_UDP entries, add each address again with the non-preferred
183584
-     * transport, unless we are avoiding UDP.  Flag these as deferred. */
183584
-    if (retval == 0 && entry->transport == TCP_OR_UDP && strategy != NO_UDP) {
183584
+     * transport, if there is one.  Flag these as deferred. */
183584
+    if (retval == 0 && entry->transport == TCP_OR_UDP &&
183584
+        (strategy == UDP_FIRST || strategy == UDP_LAST)) {
183584
         transport = (strategy == UDP_FIRST) ? TCP : UDP;
183584
         for (a = addrs; a != 0 && retval == 0; a = a->ai_next) {
183584
             a->ai_socktype = socktype_for_transport(transport);
183584
-- 
183584
2.35.1
183584