On Tue, Oct 06, 2015 at 08:32:29AM -0400, Simo Sorce wrote:
> On 06/10/15 08:04, David Kupka wrote:
> >On 06/10/15 13:35, Simo Sorce wrote:
> >>On 06/10/15 03:51, thierry bordaz wrote:
> >>>On 10/06/2015 07:19 AM, David Kupka wrote:
> >>>>On 05/10/15 16:12, Simo Sorce wrote:
> >>>>>On 05/10/15 09:00, Martin Babinsky wrote:
> >>>>>>These patches implement the plumbing required to properly support
> >>>>>>canonicalization of Kerberos principals (
> >>>>>>https://fedorahosted.org/freeipa/ticket/3864).
> >>>>>>
> >>>>>>Setting multiple principal aliases on hosts/services is beyond the
> >>>>>>scope
> >>>>>>of this patchset and should be done after these patches are pushed.
> >>>>>>
> >>>>>>I will try to send some tests for the patches later this week.
> >>>>>>
> >>>>>>Please review the hell out of them.
> >>>>>
> >>>>>LGTM, I do not see any issue at quick visual inspection.
> >>>>>What about the performance regression with the indexes ? Is that bug
> >>>>>fixed in 389ds ?
> >>>>>
> >>>>>Simo.
> >>>>>
> >>>>>
> >>>>
> >>>>The issue is still there. Thierry investigated this in 389 DS and IIUC
> >>>>he is not sure if it's bug or completely missing feature. Therefore we
> >>>>still don't know how much time is needed there.
> >>>>
> >>>Hi,
> >>>that is correct.
> >>>I can reproduce the problem. Although the matching rule (in my test
> >>>caseIgnoreIA5Match) is found, it has no registered indexing function, so
> >>>the setting (nsMatchingRule) is ignored.
> >>>I do not know if the indexing function is missing or there is a bug so
> >>>that the matching rule "forget" to register it.
> >>>This feature is documented but I can not find any QA test around it, so
> >>>I do not know yet if it is a regression or if it was not enabled at all.
> >>>
> >>>I do not expect rapid progress on it. How urgent is it ? 7.3 ?
> >>>For the moment I can think to only two workarounds:
> >>>
> >>>  * use filtered matching rule (preferred)
> >>>  * change the attribute syntax/matching rule, in the schema (I would
> >>>    discourage this one because changing the schema is risky)
> >>
> >>We can't change the syntax at this point.
> >>
> >>Well this patchset is blocked until the 389 ds bug is fixed (the
> >>performance regression is too big to just put it in and hope) so I guess
> >>we'll have to negotiate a time for the fix.
> >>
> >>Simo.
> >>
> >
> >I agree that we really shouldn't change schema.
> >
> >But I don't think the patches're necessary blocked by this issue.
> >Canonicalization was never supported in FreeIPA and when it is not
> >requested the performance is not effected at all. We could merge patches
> >as soon as they're carefully reviewed and tested to avoid tedious
> >rebasing and start using the new functionality when 389 DS gets fixed.
> 
> The fact we didn't do canonicalization this way doesn't mean clients aren't
> asking for it.
> 
> I think Windows clients ask for canonicalization by default, and in SSSD I
> see we turn on by default krb5_canonicalize in the IPA nd LDAP case (oddly
> enough not in the AD case ?)
> 
> So SSSD's authentication requests would end up hitting this case all the
> time if I am reading the code correctly (CCed Jakub to confirm/dispel this).

We ask for canonicalization always in IPA and LDAP, but also whenever
enterprise principals are used, which is true for AD provider.

-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

Reply via email to