Blame SOURCES/0013-ad-set-min-and-max-ssf-for-ldaps.patch

0d441c
From d702d594e380a1d0f0e937524bdd8a3eabc9bdf1 Mon Sep 17 00:00:00 2001
0d441c
From: Sumit Bose <sbose@redhat.com>
0d441c
Date: Fri, 27 Sep 2019 13:45:13 +0200
0d441c
Subject: [PATCH 13/13] ad: set min and max ssf for ldaps
0d441c
MIME-Version: 1.0
0d441c
Content-Type: text/plain; charset=UTF-8
0d441c
Content-Transfer-Encoding: 8bit
0d441c
0d441c
AD does not allow to use encryption in the TLS and SASL layer at the
0d441c
same time. To be able to use ldaps this patch sets min and max ssf to 0
0d441c
if ldaps should be used.
0d441c
0d441c
Related to https://pagure.io/SSSD/sssd/issue/4131
0d441c
0d441c
Reviewed-by: Pavel Březina <pbrezina@redhat.com>
0d441c
---
0d441c
 src/providers/ad/ad_common.c     | 21 +++++++++++++++++++++
0d441c
 src/providers/ad/ad_common.h     |  2 ++
0d441c
 src/providers/ad/ad_subdomains.c |  4 ++++
0d441c
 3 files changed, 27 insertions(+)
0d441c
0d441c
diff --git a/src/providers/ad/ad_common.c b/src/providers/ad/ad_common.c
0d441c
index a2369166a..51300f5b2 100644
0d441c
--- a/src/providers/ad/ad_common.c
0d441c
+++ b/src/providers/ad/ad_common.c
0d441c
@@ -1021,6 +1021,23 @@ done:
0d441c
     return;
0d441c
 }
0d441c
 
0d441c
+void ad_set_ssf_for_ldaps(struct sdap_options *id_opts)
0d441c
+{
0d441c
+    int ret;
0d441c
+
0d441c
+    DEBUG(SSSDBG_TRACE_ALL, "Setting ssf for ldaps usage.\n");
0d441c
+    ret = dp_opt_set_int(id_opts->basic, SDAP_SASL_MINSSF, 0);
0d441c
+    if (ret != EOK) {
0d441c
+        DEBUG(SSSDBG_CRIT_FAILURE,
0d441c
+              "Failed to set SASL minssf for ldaps usage, ignored.\n");
0d441c
+    }
0d441c
+    ret = dp_opt_set_int(id_opts->basic, SDAP_SASL_MAXSSF, 0);
0d441c
+    if (ret != EOK) {
0d441c
+        DEBUG(SSSDBG_CRIT_FAILURE,
0d441c
+              "Failed to set SASL maxssf for ldaps usage, ignored.\n");
0d441c
+    }
0d441c
+}
0d441c
+
0d441c
 static errno_t
0d441c
 ad_set_sdap_options(struct ad_options *ad_opts,
0d441c
                     struct sdap_options *id_opts)
0d441c
@@ -1079,6 +1096,10 @@ ad_set_sdap_options(struct ad_options *ad_opts,
0d441c
         goto done;
0d441c
     }
0d441c
 
0d441c
+    if (dp_opt_get_bool(ad_opts->basic, AD_USE_LDAPS)) {
0d441c
+        ad_set_ssf_for_ldaps(id_opts);
0d441c
+    }
0d441c
+
0d441c
     /* Warn if the user is doing something silly like overriding the schema
0d441c
      * with the AD provider
0d441c
      */
0d441c
diff --git a/src/providers/ad/ad_common.h b/src/providers/ad/ad_common.h
0d441c
index 820e06124..d23aee616 100644
0d441c
--- a/src/providers/ad/ad_common.h
0d441c
+++ b/src/providers/ad/ad_common.h
0d441c
@@ -181,6 +181,8 @@ errno_t
0d441c
 ad_get_dyndns_options(struct be_ctx *be_ctx,
0d441c
                       struct ad_options *ad_opts);
0d441c
 
0d441c
+void ad_set_ssf_for_ldaps(struct sdap_options *id_opts);
0d441c
+
0d441c
 struct ad_id_ctx *
0d441c
 ad_id_ctx_init(struct ad_options *ad_opts, struct be_ctx *bectx);
0d441c
 
0d441c
diff --git a/src/providers/ad/ad_subdomains.c b/src/providers/ad/ad_subdomains.c
0d441c
index d8c201437..a9c6b9f28 100644
0d441c
--- a/src/providers/ad/ad_subdomains.c
0d441c
+++ b/src/providers/ad/ad_subdomains.c
0d441c
@@ -328,6 +328,10 @@ ad_subdom_ad_ctx_new(struct be_ctx *be_ctx,
0d441c
         return ret;
0d441c
     }
0d441c
 
0d441c
+    if (dp_opt_get_bool(ad_options->basic, AD_USE_LDAPS)) {
0d441c
+        ad_set_ssf_for_ldaps(ad_options->id);
0d441c
+    }
0d441c
+
0d441c
     ret = ad_inherit_opts_if_needed(id_ctx->sdap_id_ctx->opts->basic,
0d441c
                                     ad_options->id->basic,
0d441c
                                     be_ctx->cdb, subdom_conf_path,
0d441c
-- 
0d441c
2.20.1
0d441c