Blame SOURCES/0009-kcm-decode-base64-encoded-secret-on-upgrade-path.patch

b833e0
From 18b98836ef8e337992f0ecb239a32b9c3cedb750 Mon Sep 17 00:00:00 2001
b833e0
From: =?UTF-8?q?Pavel=20B=C5=99ezina?= <pbrezina@redhat.com>
b833e0
Date: Wed, 9 Dec 2020 14:07:22 +0100
b833e0
Subject: [PATCH] kcm: decode base64 encoded secret on upgrade path
b833e0
b833e0
Previous unefficient code encoded the secret multiple times:
b833e0
  secret -> base64 -> masterkey -> base64
b833e0
b833e0
To allow smooth upgrade for already existant ccache we need to also decode
b833e0
the secret if it is still in the old format (type == simple). Otherwise
b833e0
users are not able to log in.
b833e0
b833e0
Resolves: https://github.com/SSSD/sssd/issues/5349
b833e0
b833e0
Reviewed-by: Alexey Tikhonov <atikhono@redhat.com>
b833e0
---
b833e0
 src/responder/kcm/kcmsrv_ccache_secdb.c | 10 ++++++++++
b833e0
 1 file changed, 10 insertions(+)
b833e0
b833e0
diff --git a/src/responder/kcm/kcmsrv_ccache_secdb.c b/src/responder/kcm/kcmsrv_ccache_secdb.c
b833e0
index 726711ac4..ea5c8f9ee 100644
b833e0
--- a/src/responder/kcm/kcmsrv_ccache_secdb.c
b833e0
+++ b/src/responder/kcm/kcmsrv_ccache_secdb.c
b833e0
@@ -59,6 +59,16 @@ static errno_t sec_get(TALLOC_CTX *mem_ctx,
b833e0
         goto done;
b833e0
     }
b833e0
 
b833e0
+    if (strcmp(datatype, "simple") == 0) {
b833e0
+        /* The secret is stored in b64 encoding, we need to decode it first. */
b833e0
+        data = sss_base64_decode(tmp_ctx, (const char*)data, &len;;
b833e0
+        if (data == NULL) {
b833e0
+            DEBUG(SSSDBG_CRIT_FAILURE, "Cannot decode secret from base64\n");
b833e0
+            ret = EIO;
b833e0
+            goto done;
b833e0
+        }
b833e0
+    }
b833e0
+
b833e0
     buf = sss_iobuf_init_steal(tmp_ctx, data, len);
b833e0
     if (buf == NULL) {
b833e0
         DEBUG(SSSDBG_CRIT_FAILURE, "Cannot init the iobuf\n");
b833e0
-- 
b833e0
2.21.3
b833e0