Send modauthtkt-users mailing list submissions to
        modauthtkt-users@lists.sourceforge.net

To subscribe or unsubscribe via the World Wide Web, visit
        https://lists.sourceforge.net/lists/listinfo/modauthtkt-users
or, via email, send a message with subject or body 'help' to
        modauthtkt-users-requ...@lists.sourceforge.net

You can reach the person managing the list at
        modauthtkt-users-ow...@lists.sourceforge.net

When replying, please edit your Subject line so it is more specific
than "Re: Contents of modauthtkt-users digest..."


Today's Topics:

   1. Re: mod_auth_tkt & mod_proxy...reverse proxy removes query
      string? (Brian Macauley)
   2. Re: mod_auth_tkt & mod_proxy...reverse proxy removes query
      string? (Brian Macauley)
   3. single-signon across completely unrelated domains (Matteo Balasso)
   4. Re: mat 2.1.0: Bug and Patch for TKTAuthBackCookieName
      (Christian Folini)
   5. A feature bugfix/request? (Steffen Yount)


----------------------------------------------------------------------

Message: 1
Date: Tue, 18 Oct 2011 11:34:31 +0100
From: Brian Macauley <brian.macau...@gmail.com>
Subject: Re: [modauthtkt-users] mod_auth_tkt & mod_proxy...reverse
        proxy removes query string?
To: Brian Macauley <brian.macau...@gmail.com>,
        modauthtkt-users@lists.sourceforge.net
Message-ID:
        <caebrghcbedfosy_8aqxvazurbh+2iztfortbxzmsrtc8we5...@mail.gmail.com>
Content-Type: text/plain; charset=UTF-8

Gavin,

Unfortunately, I haven't progressed any further with the debugging.

As we were up against a tight timeline, we converted the backend
application to use PATH_INFO as well as QUERY_STRING and it is all
working very well in production

My hunch is that it could one of 2 things...

(1) Apache mod_proxy with CentOS 5.6 has a subtle bug or
incompatibility with mod_auth_tkt. Looking through the mod_proxy bug
tracker suggests that there have been QUERY_STRING issues in the past.
If we had not succeeded with the PATH_INFO approach my plan was
download the mod_proxy source to either debug the issue or add a
custom environment variable with the QUERY_STRING

(2) The way we are using mod_auth_tkt is a little non-standard. We are
processing a federated login call from Salesforce to generate the
secure cookie using a Python routine. One thing I noticed was that
when we used the 'Require valid-user' config, was that we get a basic
authentication login screen. Without the 'Require valid-user' it works
perfectly. I thought this approach might be causing an issue in either
mod_auth_tkt or mod_proxy

If I get some time, I will investigate further

Brian M




Brian Macauley
email: brian.macau...@gmail.com
mob: 07968124660



On 18 October 2011 05:20, Gavin Carr <ga...@openfusion.com.au> wrote:
> Hi Brian,
>
> Sorry for the slow reply.
>
> This is a pretty weird problem. I can't reproduce it on my laptop,
> which is pretty similar to your setup - CentOS 6, Apache 2.2,
> mod_auth_tkt 2.1.
>
> I used the following config (pretty much cut-and-pasted from yours):
>
> ?<Location /sledge>
> ?AuthType None
> ?Require valid-user
> ?TKTAuthLoginURL http://nox/auth/login.cgi
> ?TKTAuthBackCookieName back
> ?TKTAuthTimeout 2h
> ?TKTAuthCookieExpires 2h
> ?TKTAuthDebug 0
> ?</Location>
>
> ?ProxyRequests on
> ?ProxyPass ? ? ? ? /sledge/ http://localhost:3005/
> ?ProxyPassReverse ?/sledge/ http://localhost:3005/
>
>
> I'm seeing query strings go straight through to the backend app just
> fine, as expected.
>
> Have you got any further debugging this since you posted?
>
> Cheers,
> Gavin
>
>
>
> On Tue, Oct 04, 2011 at 11:57:13AM +0100, Brian Macauley wrote:
>>
>> I have an issue with mod_auth_tkt when used with mod_proxy in a
>> reverse proxy setup.
>>
>> I used this previous mod_auth_tkt thread as reference...
>>
>> http://sourceforge.net/mailarchive/forum.php?thread_name=07A4A9EC53C2B841A7015A2E2FAFD19506C8CA58%40flybe06.flybe.local&forum_name=modauthtkt-users
>>
>> Any URL with a query string has the query string removed when it is
>> proxy'ed to the backend application.
>>
>> eg
>>
>> https://config.mycompany.com/app1/csdmain.vmgw ...works
>> http://app1.mycompany.com:8080/csdmain.vmgw sent
>>
>> https://config.mycompany.com/app1/csdsrch.vmgw ...works
>> http://app1.mycompany.com:8080/csdsrch.vmgw sent
>>
>>
>> https://config.mycompany.com/app1/csdshow.vmgw?mode=text&fname=HIGHPT&ftype=AB1234
>> ..doesn't work
>> http://app1.mycompany.com:8080/csdshow.vmgw is sent to the backend
>> application
>>
>> I am using...
>>
>> CentOS 5.6
>> Apache 2.2
>> mod_auth_tkt 2.1
>>
>> My config is as follows...
>>
>> ServerName config.mycompany.com
>> ServerAlias config.mycompany.com
>>
>> TKTAuthSecret "secret"
>>
>> # all requests for /back/* must be authenticated
>>
>> #AuthType Basic
>> Require valid???user
>> TKTAuthLoginURL https://www.salesforce.com/secur/login.jsp
>> TKTAuthCookieName GBTicket
>> TKTAuthCookieSecure on
>> TKTAuthDomain .mycompany.com
>> #TKTAuthBackArgName
>> TKTAuthBackCookieName back
>> TKTAuthTimeout 2h
>> TKTAuthCookieExpires 2h
>> TKTAuthDebug 0
>>
>>
>> ProxyRequests off
>> ProxyPass /app1/ ??http://app1.mycompany.com:8080/
>> # RewriteEngine on
>> # RewriteRule ^/app1/?$ http://app1.mycompany.com:8080/ [P,L]
>> # RewriteRule ^/app1/(.+)$ http://app1.mycompany.com:8080/$1 [P,L]
>> ProxyPassReverse /app1/ http://app1.mycompany.com:8080/
>>
>> WSGIScriptAlias /login
>> /var/www/public_html/config.mycompany.com/login/adapter.wsgi
>> The application receives a federated login from a salesforce app, and
>> a Python wsgi app creates the GBTicket secure cookie.
>>
>> I have tried both mod_proxy and mod_rewrite for the reverse proxy,
>> with the same result. I have also tried to add the query string back
>> in to the request using mod_rewrite, but it still gets removed.
>>
>> When I disable mod_auth_tkt, the reverse proxy works as normal, and
>> the query string is passed through to the backend application.
>>
>> Do you have any idea why this is happening?
>>
>> Thanks,
>> Brian M
>>
>>
>> ------------------------------------------------------------------------------
>> All the data continuously generated in your IT infrastructure contains a
>> definitive record of customers, application performance, security
>> threats, fraudulent activity and more. Splunk takes this data and makes
>> sense of it. Business sense. IT sense. Common sense.
>> http://p.sf.net/sfu/splunk-d2dcopy1
>> _______________________________________________
>> modauthtkt-users mailing list
>> modauthtkt-users@lists.sourceforge.net
>> https://lists.sourceforge.net/lists/listinfo/modauthtkt-users
>
>



------------------------------

Message: 2
Date: Tue, 18 Oct 2011 11:39:56 +0100
From: Brian Macauley <brian.macau...@gmail.com>
Subject: Re: [modauthtkt-users] mod_auth_tkt & mod_proxy...reverse
        proxy removes query string?
To: Brian Macauley <brian.macau...@gmail.com>,
        modauthtkt-users@lists.sourceforge.net
Message-ID:
        <caebrghabzeg2zxi29q3unpx00+xfgutpb4suuyurftl0evv...@mail.gmail.com>
Content-Type: text/plain; charset=UTF-8

Slight mistake in the last email...

> (2) The way we are using mod_auth_tkt is a little non-standard. We are
> processing a federated login call from Salesforce to generate the
> secure cookie using a Python routine. One thing I noticed was that
> when we used the 'AuthType Basic' config, was that we get a basic
> authentication login screen. Without the 'AuthType Basic' it works
> perfectly. I thought this approach might be causing an issue in either
> mod_auth_tkt or mod_proxy






Brian Macauley
email: brian.macau...@gmail.com
mob: 07968124660



On 18 October 2011 11:34, Brian Macauley <brian.macau...@gmail.com> wrote:
> Gavin,
>
> Unfortunately, I haven't progressed any further with the debugging.
>
> As we were up against a tight timeline, we converted the backend
> application to use PATH_INFO as well as QUERY_STRING and it is all
> working very well in production
>
> My hunch is that it could one of 2 things...
>
> (1) Apache mod_proxy with CentOS 5.6 has a subtle bug or
> incompatibility with mod_auth_tkt. Looking through the mod_proxy bug
> tracker suggests that there have been QUERY_STRING issues in the past.
> If we had not succeeded with the PATH_INFO approach my plan was
> download the mod_proxy source to either debug the issue or add a
> custom environment variable with the QUERY_STRING
>
> (2) The way we are using mod_auth_tkt is a little non-standard. We are
> processing a federated login call from Salesforce to generate the
> secure cookie using a Python routine. One thing I noticed was that
> when we used the 'Require valid-user' config, was that we get a basic
> authentication login screen. Without the 'Require valid-user' it works
> perfectly. I thought this approach might be causing an issue in either
> mod_auth_tkt or mod_proxy
>
> If I get some time, I will investigate further
>
> Brian M
>
>
>
>
> Brian Macauley
> email: brian.macau...@gmail.com
> mob: 07968124660
>
>
>
> On 18 October 2011 05:20, Gavin Carr <ga...@openfusion.com.au> wrote:
>> Hi Brian,
>>
>> Sorry for the slow reply.
>>
>> This is a pretty weird problem. I can't reproduce it on my laptop,
>> which is pretty similar to your setup - CentOS 6, Apache 2.2,
>> mod_auth_tkt 2.1.
>>
>> I used the following config (pretty much cut-and-pasted from yours):
>>
>> ?<Location /sledge>
>> ?AuthType None
>> ?Require valid-user
>> ?TKTAuthLoginURL http://nox/auth/login.cgi
>> ?TKTAuthBackCookieName back
>> ?TKTAuthTimeout 2h
>> ?TKTAuthCookieExpires 2h
>> ?TKTAuthDebug 0
>> ?</Location>
>>
>> ?ProxyRequests on
>> ?ProxyPass ? ? ? ? /sledge/ http://localhost:3005/
>> ?ProxyPassReverse ?/sledge/ http://localhost:3005/
>>
>>
>> I'm seeing query strings go straight through to the backend app just
>> fine, as expected.
>>
>> Have you got any further debugging this since you posted?
>>
>> Cheers,
>> Gavin
>>
>>
>>
>> On Tue, Oct 04, 2011 at 11:57:13AM +0100, Brian Macauley wrote:
>>>
>>> I have an issue with mod_auth_tkt when used with mod_proxy in a
>>> reverse proxy setup.
>>>
>>> I used this previous mod_auth_tkt thread as reference...
>>>
>>> http://sourceforge.net/mailarchive/forum.php?thread_name=07A4A9EC53C2B841A7015A2E2FAFD19506C8CA58%40flybe06.flybe.local&forum_name=modauthtkt-users
>>>
>>> Any URL with a query string has the query string removed when it is
>>> proxy'ed to the backend application.
>>>
>>> eg
>>>
>>> https://config.mycompany.com/app1/csdmain.vmgw ...works
>>> http://app1.mycompany.com:8080/csdmain.vmgw sent
>>>
>>> https://config.mycompany.com/app1/csdsrch.vmgw ...works
>>> http://app1.mycompany.com:8080/csdsrch.vmgw sent
>>>
>>>
>>> https://config.mycompany.com/app1/csdshow.vmgw?mode=text&fname=HIGHPT&ftype=AB1234
>>> ..doesn't work
>>> http://app1.mycompany.com:8080/csdshow.vmgw is sent to the backend
>>> application
>>>
>>> I am using...
>>>
>>> CentOS 5.6
>>> Apache 2.2
>>> mod_auth_tkt 2.1
>>>
>>> My config is as follows...
>>>
>>> ServerName config.mycompany.com
>>> ServerAlias config.mycompany.com
>>>
>>> TKTAuthSecret "secret"
>>>
>>> # all requests for /back/* must be authenticated
>>>
>>> #AuthType Basic
>>> Require valid???user
>>> TKTAuthLoginURL https://www.salesforce.com/secur/login.jsp
>>> TKTAuthCookieName GBTicket
>>> TKTAuthCookieSecure on
>>> TKTAuthDomain .mycompany.com
>>> #TKTAuthBackArgName
>>> TKTAuthBackCookieName back
>>> TKTAuthTimeout 2h
>>> TKTAuthCookieExpires 2h
>>> TKTAuthDebug 0
>>>
>>>
>>> ProxyRequests off
>>> ProxyPass /app1/ ??http://app1.mycompany.com:8080/
>>> # RewriteEngine on
>>> # RewriteRule ^/app1/?$ http://app1.mycompany.com:8080/ [P,L]
>>> # RewriteRule ^/app1/(.+)$ http://app1.mycompany.com:8080/$1 [P,L]
>>> ProxyPassReverse /app1/ http://app1.mycompany.com:8080/
>>>
>>> WSGIScriptAlias /login
>>> /var/www/public_html/config.mycompany.com/login/adapter.wsgi
>>> The application receives a federated login from a salesforce app, and
>>> a Python wsgi app creates the GBTicket secure cookie.
>>>
>>> I have tried both mod_proxy and mod_rewrite for the reverse proxy,
>>> with the same result. I have also tried to add the query string back
>>> in to the request using mod_rewrite, but it still gets removed.
>>>
>>> When I disable mod_auth_tkt, the reverse proxy works as normal, and
>>> the query string is passed through to the backend application.
>>>
>>> Do you have any idea why this is happening?
>>>
>>> Thanks,
>>> Brian M
>>>
>>>
>>> ------------------------------------------------------------------------------
>>> All the data continuously generated in your IT infrastructure contains a
>>> definitive record of customers, application performance, security
>>> threats, fraudulent activity and more. Splunk takes this data and makes
>>> sense of it. Business sense. IT sense. Common sense.
>>> http://p.sf.net/sfu/splunk-d2dcopy1
>>> _______________________________________________
>>> modauthtkt-users mailing list
>>> modauthtkt-users@lists.sourceforge.net
>>> https://lists.sourceforge.net/lists/listinfo/modauthtkt-users
>>
>>
>



------------------------------

Message: 3
Date: Tue, 18 Oct 2011 13:29:16 +0200
From: Matteo Balasso <m.bala...@scsitaly.com>
Subject: [modauthtkt-users] single-signon across completely unrelated
        domains
To: modauthtkt-users@lists.sourceforge.net
Message-ID:
        <CALZ262fUKQeOo17baDYcuwEHOC8o1UBTT=xqptnkrzd3gcu...@mail.gmail.com>
Content-Type: text/plain; charset="iso-8859-1"

Dear Gavin,

As for mod_auth_tkt documentation, it supports:
Cross-domain authentication support: (as of version 1.3.8) although
cookies are domain specific, the newest version of mod_auth_tkt allows
initial tickets to be passed via URLs, allowing single-signon across
completely unrelated domains (www.foo.com and www.bar.com).

I was able to set i t up for multiple subdomains, but despite my
efforts, I was unable to set it up correctly for unrelated domains. Is
there an example, tutorial or more detailed documentation I can read
to set up the desired feature?

Thanks for your help.

Best Regards,
Matteo

-- 
Matteo Balasso
BioComputing Competence Center
SCS s.r.l. Via Parini 1, 40033 Casalecchio di Reno, Italy
Map: http://bit.ly/czAFT3
www: http://www.scsitaly.com
 <http://www.scsolutions.it/>Tel: +39 051 590199
Fax: +39 051 19901095
-------------- next part --------------
An HTML attachment was scrubbed...

------------------------------

Message: 4
Date: Tue, 1 Nov 2011 22:00:50 +0100
From: Christian Folini <christian.fol...@netnea.com>
Subject: Re: [modauthtkt-users] mat 2.1.0: Bug and Patch for
        TKTAuthBackCookieName
To: Christian Folini <fol...@netnea.com>,
        modauthtkt-users@lists.sourceforge.net, dune73
        <dun...@localhost.netnea.com>
Message-ID: <20111101210050.GC18192@localhost>
Content-Type: text/plain; charset=utf-8

Hi Gavin,

On Mon, Oct 17, 2011 at 03:06:25PM +1100, Gavin Carr wrote:
> Thanks for the patch, finally got to it today.

You see, I am not much faster. :)

> I think TKTAuthBackCookieName is okay here (apart from the error message) -
> if it's not set you don't get a back cookie at all.

Maybe I did something wrong then. It did not work for me.

> TKTAuthBackArgName should be able to be turned off though, and can't be
> in 2.1.0 - I think that's the core bug here.

If that is the intended behaviour, that's ok with me.

> I've pushed an update to https://github.com/gavincarr/mod_auth_tkt that
> should fix this - you can now set 'TKTAuthBackArgName None' to turn off
> the back argument altogether. Can you check if that does what you need?

Yes it does. Perfect. Problem solved for me. Thank you.

Best,

Christian



-- 
The horizon of many people is a circle with zero radius 
which they call their point of view.
-- Albert Einstein



------------------------------

Message: 5
Date: Fri, 4 Nov 2011 01:25:13 -0700
From: Steffen Yount <stef...@yount.name>
Subject: [modauthtkt-users] A feature bugfix/request?
To: modauthtkt-users@lists.sourceforge.net
Message-ID:
        <caobh0xbrtyqzoxbidxvlak_nestqst+aofuznxhxiiibsyb...@mail.gmail.com>
Content-Type: text/plain; charset="iso-8859-1"

Here's what I'm trying to do:

User A logs in and checks the "remember me" box on my login form
I set the mod_auth_tkt cookie with an "expires" value sometime in the
semi-distant future

User B logs in and doesn't check the "remember me" box on my login form
I set the mod_auth_tkt cookie with no "expires" value making it a session
cookie


When these 2 cookies are presented to the mod_auth_tkt module after their
TKTAuthTimeoutRefresh timeout has been triggered, I'd like to see:

User A's cookie refreshed with the same "expires" value set leaving it as a
persistent cookie.
User B's cookie refreshed with no "expires" value set leaving it as a
session cookie.


I believe that implementing this would require the "expires" value to be
encoded into the cookie so that the mod_auth_tkt module has enough
information at renewal time to make this work.

Is this something one of you could implement pretty easily?

Is this something that already works and I just missed it?

Would one of you be willing to implement this?

Thanks,
-Steffen
-------------- next part --------------
An HTML attachment was scrubbed...

------------------------------

------------------------------------------------------------------------------
RSA(R) Conference 2012
Save $700 by Nov 18
Register now
http://p.sf.net/sfu/rsa-sfdev2dev1

------------------------------

_______________________________________________
modauthtkt-users mailing list
modauthtkt-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/modauthtkt-users


End of modauthtkt-users Digest, Vol 28, Issue 1
***********************************************

Reply via email to