Bug 1031710 - Add filter to remove DELEG flags and know to optionally allow it
Summary: Add filter to remove DELEG flags and know to optionally allow it
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: None
Product: Red Hat Enterprise Linux 7
Classification: Red Hat
Component: gssproxy
Version: 7.0
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: rc
: ---
Assignee: Simo Sorce
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2013-11-18 15:22 UTC by Dmitri Pal
Modified: 2014-06-18 05:23 UTC (History)
2 users (show)

Fixed In Version: gssproxy-0.3.0-3.el7
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2014-06-16 10:21:54 UTC
Target Upstream Version:


Attachments (Terms of Use)

Description Dmitri Pal 2013-11-18 15:22:43 UTC
This bug is created as a clone of upstream ticket:
https://fedorahosted.org/gss-proxy/ticket/109

A client process can request that its credentials be forwarded to the target by setting the GSS_C_DELEG_FLAG at context initialization.

However this is not desirable if gssproxy is being used to prevent the caller from getting access to credentials, because in that case, normally the caller should also be prevented from exposing them to the target.

A default list of flags forcibly on or forcibly off should be created and a configuration option to forcibly add or forcibly remove flags should be created.

The option should be something like:

init_flags = +GSS_C_DELEG_FLAG
or also
init_flags = +0x0001

The second notation can be used in in future new flags that do not have a name in the binry are introduced that needs tweaking.

Comment 1 Guenther Deschner 2013-11-20 14:46:08 UTC
Fix pushed.

Comment 3 JianHong Yin 2014-03-12 04:27:50 UTC
test with nfs OK, sanityOnly

Comment 4 Ludek Smid 2014-06-16 10:21:54 UTC
This request was resolved in Red Hat Enterprise Linux 7.0.

Contact your manager or support representative in case you have further questions about the request.


Note You need to log in before you can comment on or make changes to this bug.