Bug 1782492
| Summary: | Max Password Lifetime in KDC policy is not being enforced | |||
|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux 7 | Reporter: | afox <afox> | |
| Component: | krb5 | Assignee: | Robbie Harwood <rharwood> | |
| Status: | CLOSED ERRATA | QA Contact: | Filip Dvorak <fdvorak> | |
| Severity: | medium | Docs Contact: | Josip Vilicic <jvilicic> | |
| Priority: | unspecified | |||
| Version: | 7.7 | CC: | dpal, fdvorak, fhanzelk, jvilicic, rharwood | |
| Target Milestone: | rc | Keywords: | TestCaseProvided, Triaged | |
| Target Release: | --- | |||
| Hardware: | x86_64 | |||
| OS: | Linux | |||
| URL: | https://github.com/krb5/krb5/pull/1016 | |||
| Whiteboard: | ||||
| Fixed In Version: | krb5-1.15.1-50.el7 | Doc Type: | Bug Fix | |
| Doc Text: |
.KDCs now correctly enforce password lifetime policy from LDAP backends
Previously, non-IPA Kerberos Distribution Centers (KDCs) did not ensure maximum password lifetimes because the Kerberos LDAP backend incorrectly enforced password policies. With this update, the Kerberos LDAP backend has been fixed, and password lifetimes behave as expected.
|
Story Points: | --- | |
| Clone Of: | ||||
| : | 1784655 (view as bug list) | Environment: | ||
| Last Closed: | 2020-09-29 20:19:38 UTC | Type: | Bug | |
| Regression: | --- | Mount Type: | --- | |
| Documentation: | --- | CRM: | ||
| Verified Versions: | Category: | --- | ||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
| Cloudforms Team: | --- | Target Upstream Version: | ||
| Embargoed: | ||||
| Bug Depends On: | 1784655 | |||
| Bug Blocks: | 1788833 | |||
|
Description
afox@redhat.com
2019-12-11 17:38:36 UTC
After a login (kinit), it does not change the PW expiration date. However, when testing the customer had forgotten the password for zzuser20 and reset it and noticed that the process of resetting the password did activate the PW expiration date. It looks like there is a bug where the password expiration is not set the first time the account is created. Firstly, the example for zzuser21 (customer created another new user with the default password policy): Account created - note password expiration is not correctly set -bash-4.2$ kadmin -p jwuser/admin Couldn't open log file /var/log/kadmin.log: Permission denied Authenticating as principal jwuser/admin with password. Password for jwuser/admin: kadmin: addprinc -policy default zzuser21 Enter password for principal "zzuser21": Re-enter password for principal "zzuser21": Principal "zzuser21" created. kadmin: getprinc zzuser21 Principal: zzuser21 Expiration date: [never] Last password change: Mon Dec 09 10:18:01 EST 2019 Password expiration date: [never] Maximum ticket life: 0 days 08:00:00 Maximum renewable life: 7 days 00:00:00 Last modified: Mon Dec 09 10:18:01 EST 2019 (jwuser/admin) Last successful authentication: [never] Last failed authentication: [never] Failed password attempts: 0 Number of keys: 2 Key: vno 1, aes128-cts-hmac-sha1-96 Key: vno 1, des3-cbc-sha1 MKey: vno 1 Attributes: REQUIRES_PRE_AUTH Policy: default kadmin: quit Now Login as user and recheck - note PW expiration is still not correctly set -bash-4.2$ kinit zzuser21 Password for zzuser21: -bash-4.2$ kadmin -p jwuser/admin Couldn't open log file /var/log/kadmin.log: Permission denied Authenticating as principal jwuser/admin with password. Password for jwuser/admin: kadmin: getprinc zzuser21 Principal: zzuser21 Expiration date: [never] Last password change: Mon Dec 09 10:18:01 EST 2019 Password expiration date: [never] Maximum ticket life: 0 days 08:00:00 Maximum renewable life: 7 days 00:00:00 Last modified: Mon Dec 09 10:18:01 EST 2019 (jwuser/admin) Last successful authentication: Mon Dec 09 10:18:23 EST 2019 Last failed authentication: [never] Failed password attempts: 0 Number of keys: 2 Key: vno 1, aes128-cts-hmac-sha1-96 Key: vno 1, des3-cbc-sha1 MKey: vno 1 Attributes: REQUIRES_PRE_AUTH Policy: default Now change password : Note that PW expiration is now correctly set kadmin: cpw zzuser21 Enter password for principal "zzuser21": Re-enter password for principal "zzuser21": Password for "zzuser21" changed. kadmin: getprinc zzuser21 Principal: zzuser21 Expiration date: [never] Last password change: Mon Dec 09 10:19:04 EST 2019 Password expiration date: Sun Mar 08 11:19:04 EDT 2020 Maximum ticket life: 0 days 08:00:00 Maximum renewable life: 7 days 00:00:00 Last modified: Mon Dec 09 10:19:04 EST 2019 (jwuser/admin) Last successful authentication: Mon Dec 09 10:18:23 EST 2019 Last failed authentication: [never] Failed password attempts: 0 Number of keys: 2 Key: vno 2, aes128-cts-hmac-sha1-96 Key: vno 2, des3-cbc-sha1 MKey: vno 1 Attributes: REQUIRES_PRE_AUTH Policy: default The same applies to the existing zzuser20 account. When the customer reset the password because he had forgotten it, the PW expiration became correctly set. -bash-4.2$ kadmin -p jwuser/admin Couldn't open log file /var/log/kadmin.log: Permission denied Authenticating as principal jwuser/admin with password. Password for jwuser/admin: kadmin: getprinc zzuser20 Principal: zzuser20 Expiration date: [never] Last password change: Fri Nov 29 11:25:47 EST 2019 Password expiration date: [never] Maximum ticket life: 0 days 08:00:00 Maximum renewable life: 7 days 00:00:00 Last modified: Fri Nov 29 11:25:47 EST 2019 (jwuser/admin) Last successful authentication: [never] Last failed authentication: [never] Failed password attempts: 0 Number of keys: 2 Key: vno 1, aes128-cts-hmac-sha1-96 Key: vno 1, des3-cbc-sha1 MKey: vno 1 Attributes: REQUIRES_PRE_AUTH Policy: default kadmin: quit kadmin: cpw zzuser20 Enter password for principal "zzuser20": Re-enter password for principal "zzuser20": Password for "zzuser20" changed. kadmin: getprinc zzuser20 Principal: zzuser20 Expiration date: [never] Last password change: Mon Dec 09 10:16:28 EST 2019 Password expiration date: Sun Mar 08 11:16:28 EDT 2020 Maximum ticket life: 0 days 08:00:00 Maximum renewable life: 7 days 00:00:00 Last modified: Mon Dec 09 10:16:28 EST 2019 (jwuser/admin) Last successful authentication: [never] Last failed authentication: Mon Dec 09 10:15:52 EST 2019 Failed password attempts: 0 Number of keys: 2 Key: vno 2, aes128-cts-hmac-sha1-96 Key: vno 2, des3-cbc-sha1 MKey: vno 1 Attributes: REQUIRES_PRE_AUTH Policy: default kadmin: quit Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (krb5 bug fix and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2020:3982 |