--On Thursday, May 10, 2018 9:28 PM -0400 Ken Murchison <mu...@fastmail.com> wrote:

All,

I have built a eighth (and hopefully last) release candidate of SASL
2.1.27 which can be downloaded from here:

Hi Ken,

I've done some testing of the 2.1.27 RC8 and found some issues:

1) While there is the configure option --enable-sample (which defaults to yes), the corresponding --disable-sample option doesn't work. I've opened <https://github.com/cyrusimap/cyrus-sasl/issues/524> to track this issue, and <https://github.com/cyrusimap/cyrus-sasl/pull/530> to fix it.

2) The sample/server.c code hasn't been updated to match the changes to the Heimdal API that were made in 2011. I opened <https://github.com/cyrusimap/cyrus-sasl/issues/525> to track this issue and <https://github.com/cyrusimap/cyrus-sasl/pull/527> to fix it.

3) The value supplied to --plugindir is not honored due to the value being hard coded in the Makefile. I opened <https://github.com/cyrusimap/cyrus-sasl/issues/528> to track this issue and <https://github.com/cyrusimap/cyrus-sasl/pull/529> to fix it.

4) There is no corresponding tag in the git repository for 2.1.27-RC8, so it's difficult to know exactly what it was generated from (although I assumed master). 2.1.27-RC7 was tagged in the git repo, so that's why I make a note of this.

5) One of the major features of Cyrus-SASL 2.1.27 for applications using it was that it was supposed to provide the underlying SSF information back out instead of hard coding it to the value of "56" for Kerberos based mechanisms. Unfortunatley, I'm seeing it still report "56" (Carson also repoted this):

Aug 20 11:16:15 anvil1 slapd[19854]: conn=1005 op=3 BIND dn="krb5PrincipalName=b...@symas.net,ou=kerberosprincipals,dc=example,dc=com" mech=GSSAPI sasl_ssf=56 ssf=256

Various other bits work as desired although in this case forcing me to deal with the limitation of the SASL SSF being hard coded:

GSSAPI only:
root@anvil1:/opt/symas/etc/openldap# ldapsearch -Q -LLL -Y GSSAPI -H ldap:/// -s base -b dc=example,dc=com
dn: dc=example,dc=com

GSSAPI+TLS:
root@anvil1:/opt/symas/etc/openldap# ldapsearch -ZZ -Q -LLL -Y GSSAPI -H ldap:/// -s base -b dc=example,dc=com
dn: dc=example,dc=com

GSSAPI+TLS+MAXSSF=0:
root@anvil1:/opt/symas/etc/openldap# ldapsearch -ZZ -Q -LLL -Y GSSAPI -H ldap:/// -s base -b dc=example,dc=com -O maxssf=0
dn: dc=example,dc=com

GSSAPI+TLS+MAXSSF=512:
root@anvil1:/opt/symas/etc/openldap# ldapsearch -ZZ -Q -LLL -Y GSSAPI -H ldap:/// -s base -b dc=example,dc=com -O maxssf=512
dn: dc=example,dc=com

GSSAPI+TLS+MINSSF=56:
root@anvil1:/opt/symas/etc/openldap# ldapsearch -ZZ -Q -LLL -Y GSSAPI -H ldap:/// -s base -b dc=example,dc=com -O minssf=56
dn: dc=example,dc=com

GSSAPI+TLS+MINSSF=256 (The TLS SSF):
root@anvil1:/opt/symas/etc/openldap# ldapsearch -ZZ -Q -LLL -Y GSSAPI -H ldap:/// -s base -b dc=example,dc=com -O minssf=256
dn: dc=example,dc=com

GSSAPI+TLS+MINSSF=512 (Should fail and does):
root@anvil1:/opt/symas/etc/openldap# ldapsearch -ZZ -Q -LLL -Y GSSAPI -H ldap:/// -s base -b dc=example,dc=com -O minssf=512
ldap_sasl_interactive_bind_s: Unknown authentication method (-6)
additional info: SASL(-15): mechanism too weak for this user: Unable to find a callback: 32775

GSSAPI+MINSSF=56:
root@anvil1:/opt/symas/etc/openldap# ldapsearch -Q -LLL -Y GSSAPI -H ldap:/// -s base -b dc=example,dc=com -O minssf=56
dn: dc=example,dc=com

GSSAPI+MINSSF+57 (fails, technically it shouldn't but does due to the hard coded value): root@anvil1:/opt/symas/etc/openldap# ldapsearch -Q -LLL -Y GSSAPI -H ldap:/// -s base -b dc=example,dc=com -O minssf=57
ldap_sasl_interactive_bind_s: Unknown authentication method (-6)
additional info: SASL(-15): mechanism too weak for this user: Unable to find a callback: 32775


So it seems like issue#5 is a major one that needs fixing for the release. It *might* work with MIT Kerberos (via 4b0306dcd76031460246b2dabcb7db766d6b04d8) but it definitely does *not* work with Heimdal. I'll see if I can dig into this further.

Warm regards,
Quanah

--

Quanah Gibson-Mount
Product Architect
Symas Corporation
Packaged, certified, and supported LDAP solutions powered by OpenLDAP:
<http://www.symas.com>

Reply via email to