On Wed, Jul 27, 2016 at 07:06:53PM +0200, Jakub Hrozek wrote:
> On Tue, Jul 26, 2016 at 04:57:19PM +0200, Sumit Bose wrote:
> > now with patches ...
> > 
> > On Tue, Jul 26, 2016 at 04:55:37PM +0200, Sumit Bose wrote:
> > > On Tue, Jul 26, 2016 at 11:12:34AM +0200, Jakub Hrozek wrote:
> > > > On Fri, Jul 22, 2016 at 09:44:33PM +0200, Sumit Bose wrote:
> > > > > Hi,
> > > > > 
> > > > > this patch set should fix https://fedorahosted.org/sssd/ticket/2958
> > > > > "Support multiple principals for IPA users" so the IPA users can log 
> > > > > in
> > > > > with their Kerberos alias as well.
> > > > 
> > > > First, thank you very much for splitting the patchset into small
> > > > self-contained changes. The review was much easier this way.
> > > > 
> > > > > 
> > > > > The overall code-path was already added for the UPN feature but had to
> > > > > be extended at various places. The main difference is that the realm
> > > > > part of the AD UPNs with an alternative domain suffix do not related 
> > > > > to
> > > > > a known domain name. The realm part from the Kerberos aliases can come
> > > > > from any domain. The same is true for email addresses which are 
> > > > > supported
> > > > > by this patch set as well.
> > > > 
> > > > I wonder if we will immediatelly get a request to provide a list of
> > > > e-mail domain suffixes by the users that could be used to map the e-mail
> > > > address to a domain. Do you think it would make sense (maybe in a future
> > > > patch) to let the admin configure the suffixes for direct integration in
> > > > sssd.conf and maybe on the server for IPA-AD trusts?
> > > 
> > > It might help in some cases, but I think in general it will not help
> > > much. Email domain suffixes as e.g. AD's alternative domain suffixes are
> > > typically used for a whole organization/forest so I would expect that
> > > the cases where you have multiple domains and a single email domain
> > > suffix relates only to a specific domain and is not equal to the domain
> > > name is rare.
> > > 
> > > What might help more (and would help lookup by id as well) is to reorder
> > > the lookups in the responders to check the cache for all domains first
> > > before iterating over the backends. I think we already have a ticket for
> > > this.
> > > 
> > > > 
> > > > > 
> > > > > I know that Jakub had some concerns adding email addresses now and the
> > > > > another attribute in the next version and so on. I would like to make
> > > > > this scheme more generic so that the attributes which should be used 
> > > > > for
> > > > > login names can be configured. Unfortunately I didn't had the time do
> > > > > already do it in this patch-set.
> > > > 
> > > > np, I think the patches are well structured and make the extension
> > > > possible.
> > > > 
> > > > > 
> > > > > Adding a larger number of sources for the login name increases the
> > > > > chance for collisions. But since each of the name types, Kerberos
> > > > > principals and email addresses, are expected to be unique in their
> > > > > domain, I hope the chances are still low enough.
> > > > 
> > > > Yes.
> > > > 
> > > > > 
> > > > > bye,
> > > > > Sumit
> > > > 
> > > > > From b2012e5b0cc8af65f18a6e48774b80246c68c04a Mon Sep 17 00:00:00 2001
> > > > > From: Sumit Bose <sb...@redhat.com>
> > > > > Date: Fri, 22 Jul 2016 17:35:43 +0200
> > > > > Subject: [PATCH 01/14] IPA: fix lookup by UPN for subdomains
> > > > > 
> > > > > Currently the user name used in the extdom exop request is
> > > > > unconditionally set to the short name. While this is correct for the
> > > > > general name based lookups it breaks UPN/email based lookups where the
> > > > > name part after the @-sign might not match to domain name. I guess 
> > > > > this
> > > > > was introduce during the sysdb refactoring.
> > > > 
> > > > Yes, it was. Sorry about that. I tested UPN lookups on an IPA-AD trust
> > > > client and they work fine with this patch.
> > > > 
> > > > ACK
> > > > 
> > > > > From 762cd84cc5851666607c871d53f4e309b8760f6c Mon Sep 17 00:00:00 2001
> > > > > From: Sumit Bose <sb...@redhat.com>
> > > > > Date: Fri, 22 Jul 2016 12:19:26 +0200
> > > > > Subject: [PATCH 02/14] LDAP: allow multiple user principals
> > > > > 
> > > > > In general a user can have multiple principals and recent IPA version
> > > > > added support to defined multiple principals. With this patch SSSD 
> > > > > does
> > > > > not only store the first but all principals read by LDAP from a 
> > > > > server.
> > > > > 
> > > > > Resolves https://fedorahosted.org/sssd/ticket/2958
> > > > 
> > > > ACK
> > > > 
> > > > 
> > > > > From 5c1a50ef35d816438880e4e9951d0355b283980f Mon Sep 17 00:00:00 2001
> > > > > From: Sumit Bose <sb...@redhat.com>
> > > > > Date: Sat, 18 Jun 2016 18:24:50 +0200
> > > > > Subject: [PATCH 03/14] LDAP: new attribute option ldap_user_email
> > > > 
> > > > ACK
> > > > 
> > > > > From 3f09cfc6598d34ff42be1c85f448b5c0635410e0 Mon Sep 17 00:00:00 2001
> > > > > From: Sumit Bose <sb...@redhat.com>
> > > > > Date: Mon, 20 Jun 2016 12:57:43 +0200
> > > > > Subject: [PATCH 04/14] sysdb: include email in UPN searches
> > > > 
> > > > ACK just one question..
> > > > 
> > > > > 
> > > > > Email addresses and Kerberos user principals names (UPNs) do not only
> > > > > look similar they also can be used to identify a user uniquely.
> > > > > 
> > > > > In future this approach should be replace by a more generic one where
> > > > > the attributes which can uniquely identifies a user can be configured 
> > > > > to
> > > > > support even a wider range of login names.
> > > > 
> > > > ..I think we want to track this with a ticket (even if it was deferred
> > > > now). If you agree I can file one.
> > > 
> > > yes, please.
> > > 
> > > > 
> > > > > From 6ac7dacf122da2933ce6fe9b2ceff356c1b65721 Mon Sep 17 00:00:00 2001
> > > > > From: Sumit Bose <sb...@redhat.com>
> > > > > Date: Mon, 20 Jun 2016 12:58:16 +0200
> > > > > Subject: [PATCH 05/14] LDAP: include email in UPN searches
> > > > 
> > > > ACK
> > > > 
> > > > > From b3c9c37baa49ade82f8cf873a2e0d2e0e7e16fad Mon Sep 17 00:00:00 2001
> > > > > From: Sumit Bose <sb...@redhat.com>
> > > > > Date: Mon, 20 Jun 2016 13:37:56 +0200
> > > > > Subject: [PATCH 06/14] NSS: add user email to fill_orig()
> > > > > 
> > > > > The IPA server must send the email address of a user to the clients to
> > > > > allow login by email.
> > > > 
> > > > ACK
> > > > 
> > > > > From 88118645466c50c52a81e5ff38d66ecb2dfda2a7 Mon Sep 17 00:00:00 2001
> > > > > From: Sumit Bose <sb...@redhat.com>
> > > > > Date: Mon, 20 Jun 2016 16:11:11 +0200
> > > > > Subject: [PATCH 07/14] utils: add is_email_from_domain()
> > > > 
> > > > ACK
> > > > 
> > > > > From 72fb323490acc4155227b56be6470965830b7ade Mon Sep 17 00:00:00 2001
> > > > > From: Sumit Bose <sb...@redhat.com>
> > > > > Date: Mon, 20 Jun 2016 16:30:03 +0200
> > > > > Subject: [PATCH 08/14] LDAP/IPA: add local email address to aliases
> > > > > 
> > > > > Adding email-addresses from the local domain to the alias names is
> > > > > strictly not needed by might help to speed up lookups in the NSS
> > > > > responder.
> > > > 
> > > > ACK, this makes sense, the aliases are indexed.
> > > > 
> > > > > From 0f2863a0fb1620bf86ffb828e0c51ead4f807b2a Mon Sep 17 00:00:00 2001
> > > > > From: Sumit Bose <sb...@redhat.com>
> > > > > Date: Tue, 21 Jun 2016 11:06:19 +0200
> > > > > Subject: [PATCH 09/14] NSS: continue with UPN/email search if name 
> > > > > was not
> > > > >  found
> > > > > 
> > > > > Currently we only search for UPNs if the domain part of the name was 
> > > > > not
> > > > > know, with Kerberos aliases and email addresses we have to do this 
> > > > > even
> > > > > if the domain name is a know domain.
> > > > 
> > > > ACK
> > > > 
> > > > > From 84813abfb71dc23ad054c42af0e3d2eba1e74e7e Mon Sep 17 00:00:00 2001
> > > > > From: Sumit Bose <sb...@redhat.com>
> > > > > Date: Wed, 22 Jun 2016 18:21:11 +0200
> > > > > Subject: [PATCH 10/14] PAM: continue with UPN/email search if name 
> > > > > was not
> > > > >  found
> > > > > 
> > > > > Currently we only search for UPNs if the domain part of the name was 
> > > > > not
> > > > > know, with Kerberos aliases and email addresses we have to do this 
> > > > > even
> > > > > if the domain name is a know domain.
> > > > 
> > > > ACK
> > > > 
> > > > > From bccc06776316459ec10c8103465664df2433f260 Mon Sep 17 00:00:00 2001
> > > > > From: Sumit Bose <sb...@redhat.com>
> > > > > Date: Fri, 22 Jul 2016 17:34:20 +0200
> > > > > Subject: [PATCH 12/14] PAM: Fix domain for UPN based lookups
> > > > > 
> > > > > Since sysdb_search_user_by_upn() searches the whole cache we have to 
> > > > > set
> > > > > the domain so that it matches the result.
> > > > 
> > > > ACK, we already have a matching commit in NSS
> > > > 
> > > > > From c132fa210341b30ec4586c0bb951ffb1dc6feb94 Mon Sep 17 00:00:00 2001
> > > > > From: Sumit Bose <sb...@redhat.com>
> > > > > Date: Fri, 22 Jul 2016 12:20:33 +0200
> > > > > Subject: [PATCH 13/14] SDAP: add special handling for IPA Kerberos 
> > > > > enterprise
> > > > >  principal strings
> > > > > 
> > > > > Unfortunately principal aliases with an alternative realm are stored 
> > > > > in
> > > > > IPA as the string representation of an enterprise principal, i.e.
> > > > > name\@alt.realm@IPA.REALM. To allow searches with the plain alias
> > > > > 'name@alt.realm' the returned value is converted before it is saved to
> > > > > the cache.
> > > > 
> > > > ACK
> > > > 
> > > > > From 3b4deb7deb64136094aa5e70705b467a836dd05b Mon Sep 17 00:00:00 2001
> > > > > From: Sumit Bose <sb...@redhat.com>
> > > > > Date: Fri, 22 Jul 2016 20:10:42 +0200
> > > > > Subject: [PATCH 14/14] SDAP: add enterprise principal strings for user
> > > > >  searches
> > > > > 
> > > > > Unfortunately principal aliases with an alternative realm are stored 
> > > > > in
> > > > > IPA as the string representation of an enterprise principal, i.e.
> > > > > name\@alt.realm@IPA.REALM. To be able to lookup the alternative
> > > > > principal in LDAP properly the UPN search filter is extended to search
> > > > > for this type of name as well.
> > > > 
> > > > There is a warning:
> > > >   CC       src/tests/cmocka/nestedgroups_tests-common_mock_sdap.o
> > > > /home/remote/jhrozek/devel/sssd/src/providers/ldap/sdap_utils.c: In 
> > > > function ‘get_enterprise_principal_string_filter’:
> > > > /home/remote/jhrozek/devel/sssd/src/providers/ldap/sdap_utils.c:254:37: 
> > > > warning: field precision specifier ‘.*’ expects argument of type ‘int’, 
> > > > but argument 4 has type ‘long int’ [-Wformat=]
> > > >      return talloc_asprintf(mem_ctx, "(%s=%.*s\\\\@%s@%s)", attr_name,
> > > >                                      ^
> > > > 
> > > > But the intent of the code looks good to me.
> > > 
> > > I fixed this with a cast, I hope this is sufficient to silence the
> > > warning.
> > > 
> > > New version which fixes the Coverity warning as well is attached.
> > > 
> > > bye,
> > > Sumit
> 
> Thank you, I saw one login failure with these patches where a wrong UPN
> was passed to the krb5_child, causing a System Error. But neither me nor
> Sumit were able to reproduce the bug afterwards. Because the patches are
> working for me now just fine, I will push them and watch closely for any
> failures in my IPA-AD trust setup..
> 
> ACK, waiting for CI to finish before pushing.

CI: http://sssd-ci.duckdns.org/logs/job/50/40/summary.html
_______________________________________________
sssd-devel mailing list
sssd-devel@lists.fedorahosted.org
https://lists.fedorahosted.org/admin/lists/sssd-devel@lists.fedorahosted.org

Reply via email to