SASL 2.1.27 rc8

Carson Gaspar carson at taltos.org
Thu May 10 21:05:33 EDT 2018


On 5/10/2018 5:28 PM, Ken Murchison wrote:
>
> The primary reason for this candidate is to revert the GSSAPI flag 
> changes.  I'd like to roll out the final release early next week, so 
> please test this RC as soon as possible.

I can confirm that rc8 behaves as well/badly as the RedHat patched 
version when connecting to an AD LDAP server. i.e. when using TLS and 
GSSAPI, one must set maxssf for it to work. So it at least isn't a step 
backwards.

I'm not sure that negotiated SSF is working as intended, however, unless 
code changes to the client are required. openldap-2.4.45 linked with rc8 
example without maxssf, showing an enctype of aes256 but SSF of 56:

$ KRB5_TRACE=/dev/stdout /var/tmp/cyrus-sasl/bin/ldapsearch -Y GSSAPI 
-LLL -H ldaps://XXXX:636 -b 'XXX"
SASL/GSSAPI authentication started
[138314] 1526000107.192106: ccselect can't find appropriate cache for 
server principal ldap/XXX@
[138314] 1526000107.192208: Getting credentials gaspar at XXX -> ldap/XXX@ 
using ccache FILE:/tmp/krb5cc_XXX
[138314] 1526000107.192288: Retrieving gaspar at XXX -> ldap/XXX@ from 
FILE:/tmp/krb5cc_XXX with result: 0/Success
[138314] 1526000107.192363: Creating authenticator for gaspar at XXX -> 
ldap/XXX@, seqnum 811872038, subkey aes256-cts/8D75, session key 
aes256-cts/16BB
[138314] 1526000107.193939: Read AP-REP, time 1526000107.192369, subkey 
aes256-cts/BB06, seqnum 497881342
SASL username: gaspar at XXX
SASL SSF: 56
SASL data security layer installed.
ldap_result: Can't contact LDAP server (-1)

If I pass in -O maxssf=[0..256] while using TLS, it works, and I get:

SASL SSF: 0

If I pass in no maxssf option or -O maxssf=[0..256] while not using TLS, 
it works, and I get:

SASL SSF: 56



More information about the Cyrus-devel mailing list