Bug 459037 - the setkeytab extended operation may allow users to set a password ignoring password policies
Summary: the setkeytab extended operation may allow users to set a password ignoring p...
Keywords:
Status: CLOSED DEFERRED
Alias: None
Product: freeIPA
Classification: Retired
Component: ipa-server
Version: 1.0
Hardware: All
OS: Linux
high
medium
Target Milestone: future release
Assignee: Simo Sorce
QA Contact: Ben Levenson
URL:
Whiteboard:
Depends On:
Blocks: 431020
TreeView+ depends on / blocked
 
Reported: 2008-08-13 20:52 UTC by Simo Sorce
Modified: 2015-01-21 12:31 UTC (History)
4 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2015-01-21 12:31:02 UTC
Embargoed:


Attachments (Terms of Use)

Description Simo Sorce 2008-08-13 20:52:50 UTC
As currently built the setkeytab extended operation (implemented in ipa-pwd-extop plugin) allows a user with enough permissions to set kerberos keys in ldap.
The keys transmitted are already encoded and therefore it is not possible to inspect the originating secret to apply password policies.
While the only current client (ipa-getkeytab) does not allow setting arbitrary passwords, a new set of patches has been proposed on the freeipa-devel list to allow it.
Appropriate restrictions on which accounts can be changed through this extended operation should be enforced, possibly a new version of the same interface developed to allow application of password policies before the change is granted.

Comment 3 Rob Crittenden 2010-09-15 17:59:57 UTC
https://fedorahosted.org/freeipa/ticket/232

Comment 5 Martin Kosek 2015-01-21 12:31:02 UTC
Thank you taking your time and submitting this request for FreeIPA in Fedora. Unfortunately, this bug was not given a priority and was deferred both in Fedora and in the upstream FreeIPA project.

Given that we are unable to fulfill this request in following Fedora releases, I am closing the Bugzilla as DEFERRED. To request re-consideration of this decision please reopen this Bugzilla and provide additional technical details about its importance to you.

Note that you can still track this request or even contribute patches in the referred upstream Trac ticket.


Note You need to log in before you can comment on or make changes to this bug.