Re: [Freeipa-devel] [PATCH 0017] Add OTP support to ipalib CLI

2013-09-09 Thread Martin Kosek
On 09/07/2013 06:28 PM, Simo Sorce wrote: > On Thu, 2013-09-05 at 00:38 -0400, Nathaniel McCallum wrote: >> On Thu, 2013-09-05 at 00:25 -0400, Nathaniel McCallum wrote: >>> This patch has a few problems that I'd like some help with. There are a >>> few notes here as well. >>> >>> 1. The handling of

Re: [Freeipa-devel] Multiple CA certificates in LDAP, questions

2013-09-09 Thread Jan Cholasta
Another question: Should each IPA service (LDAP, HTTP, PKINIT) have its own distinctive set of trusted CAs, or is using one set for everything good enough? Using distinctive sets would allow granular control over what CA is trusted for what service (e.g. trust CA1 to issue certificates for LDA

Re: [Freeipa-devel] Notes and questions for fine-grained read permissions

2013-09-09 Thread Petr Viktorin
On 09/07/2013 04:45 PM, Simo Sorce wrote: Sorry to come late to this thread. I think I like some of Petr plan, but not all of it. On Fri, 2013-09-06 at 08:46 -0400, Rob Crittenden wrote: [...] I'm not sure I follow, what are you trying to achieve here? The more ACIs the slower the processing.

Re: [Freeipa-devel] [PATCH] 0062 Replace ntpdate calls with ntpd

2013-09-09 Thread Petr Viktorin
On 09/04/2013 03:28 PM, Ana Krivokapic wrote: On 09/03/2013 01:15 PM, Petr Viktorin wrote: On 09/02/2013 05:05 PM, Ana Krivokapic wrote: Hello, This patch addresses tickethttps://fedorahosted.org/freeipa/ticket/3797. Thanks! I have a question. -# retry several times -- logic follo

Re: [Freeipa-devel] [PATCH] 0064 Fix invocations of FileError in ipa-client-install

2013-09-09 Thread Petr Viktorin
On 09/04/2013 04:13 PM, Ana Krivokapic wrote: Hello, This patch addresses ticket https://fedorahosted.org/freeipa/ticket/3758. Thanks, ACK, pushed to master: 66242e6ab0ab21eb39f3fbdaa586e8e38663faae -- PetrĀ³ ___ Freeipa-devel mailing list Freeipa-

Re: [Freeipa-devel] [PATCH 0015] Add support for managing user auth types

2013-09-09 Thread Petr Viktorin
On 09/05/2013 06:04 AM, Nathaniel McCallum wrote: patch attached Thanks, some comments below. Git complains about trailing whitespace in the patch, please strip it. freeipa-npmccallum-0015-Add-support-for-managing-user-auth-types.patch From 757436ccc431d26a3e62de830dad0b107a6c48ff Mon Sep

Re: [Freeipa-devel] Multiple CA certificates in LDAP, questions

2013-09-09 Thread Simo Sorce
On Mon, 2013-09-09 at 11:17 +0200, Jan Cholasta wrote: > Another question: > > Should each IPA service (LDAP, HTTP, PKINIT) have its own distinctive > set of trusted CAs, or is using one set for everything good enough? > Using distinctive sets would allow granular control over what CA is > trus

Re: [Freeipa-devel] Notes and questions for fine-grained read permissions

2013-09-09 Thread Simo Sorce
On Mon, 2013-09-09 at 13:00 +0200, Petr Viktorin wrote: > On 09/07/2013 04:45 PM, Simo Sorce wrote: > > Sorry to come late to this thread. > > > > I think I like some of Petr plan, but not all of it. > > > > On Fri, 2013-09-06 at 08:46 -0400, Rob Crittenden wrote: > [...] > I'm not sure I foll

Re: [Freeipa-devel] Multiple CA certificates in LDAP, questions

2013-09-09 Thread John Dennis
On 09/09/2013 10:02 AM, Nalin Dahyabhai wrote: > On Mon, Sep 09, 2013 at 11:17:02AM +0200, Jan Cholasta wrote: >> Should each IPA service (LDAP, HTTP, PKINIT) have its own >> distinctive set of trusted CAs, or is using one set for everything >> good enough? Using distinctive sets would allow granul

Re: [Freeipa-devel] Multiple CA certificates in LDAP, questions

2013-09-09 Thread Jan Cholasta
On 9.9.2013 15:36, Simo Sorce wrote: On Mon, 2013-09-09 at 11:17 +0200, Jan Cholasta wrote: Another question: Should each IPA service (LDAP, HTTP, PKINIT) have its own distinctive set of trusted CAs, or is using one set for everything good enough? Using distinctive sets would allow granular con

Re: [Freeipa-devel] Multiple CA certificates in LDAP, questions

2013-09-09 Thread Jan Cholasta
On 9.9.2013 16:05, John Dennis wrote: On 09/09/2013 10:02 AM, Nalin Dahyabhai wrote: On Mon, Sep 09, 2013 at 11:17:02AM +0200, Jan Cholasta wrote: Should each IPA service (LDAP, HTTP, PKINIT) have its own distinctive set of trusted CAs, or is using one set for everything good enough? Using dist

Re: [Freeipa-devel] Multiple CA certificates in LDAP, questions

2013-09-09 Thread Nalin Dahyabhai
On Mon, Sep 09, 2013 at 10:05:59AM -0400, John Dennis wrote: > On 09/09/2013 10:02 AM, Nalin Dahyabhai wrote: > > I'd expect it to depend heavily on whether or not you're chaining up to > > an external CA. Personally, I'd very much want to keep a different set > > of trust anchors for PKINIT in th

Re: [Freeipa-devel] Multiple CA certificates in LDAP, questions

2013-09-09 Thread Nalin Dahyabhai
On Mon, Sep 09, 2013 at 11:17:02AM +0200, Jan Cholasta wrote: > Should each IPA service (LDAP, HTTP, PKINIT) have its own > distinctive set of trusted CAs, or is using one set for everything > good enough? Using distinctive sets would allow granular control > over what CA is trusted for what servic

Re: [Freeipa-devel] Multiple CA certificates in LDAP, questions

2013-09-09 Thread John Dennis
On 09/09/2013 10:24 AM, Nalin Dahyabhai wrote: > On Mon, Sep 09, 2013 at 10:05:59AM -0400, John Dennis wrote: >> On 09/09/2013 10:02 AM, Nalin Dahyabhai wrote: >>> I'd expect it to depend heavily on whether or not you're chaining up to >>> an external CA. Personally, I'd very much want to keep a d

Re: [Freeipa-devel] Multiple CA certificates in LDAP, questions

2013-09-09 Thread Jan Cholasta
On 9.9.2013 16:02, John Dennis wrote: On 09/09/2013 05:17 AM, Jan Cholasta wrote: Another question: Should each IPA service (LDAP, HTTP, PKINIT) have its own distinctive set of trusted CAs, or is using one set for everything good enough? Using distinctive sets would allow granular control over

[Freeipa-devel] [PATCH] 168 Fix nsslapdPlugin object class after initial replication

2013-09-09 Thread Jan Cholasta
Hi, the attached patch fixes . Honza -- Jan Cholasta >From 2021327828cd4245a5a92fa9093f68d76e00e6b5 Mon Sep 17 00:00:00 2001 From: Jan Cholasta Date: Mon, 9 Sep 2013 08:15:11 + Subject: [PATCH] Fix nsslapdPlugin object class after initial repli

Re: [Freeipa-devel] Notes and questions for fine-grained read permissions

2013-09-09 Thread Rob Crittenden
Petr Viktorin wrote: On 09/09/2013 03:46 PM, Simo Sorce wrote: On Mon, 2013-09-09 at 13:00 +0200, Petr Viktorin wrote: On 09/07/2013 04:45 PM, Simo Sorce wrote: Sorry to come late to this thread. I think I like some of Petr plan, but not all of it. [...] It could get ugly real fast, and po

Re: [Freeipa-devel] Multiple CA certificates in LDAP, questions

2013-09-09 Thread Rob Crittenden
Jan Cholasta wrote: On 9.9.2013 16:02, John Dennis wrote: On 09/09/2013 05:17 AM, Jan Cholasta wrote: Another question: Should each IPA service (LDAP, HTTP, PKINIT) have its own distinctive set of trusted CAs, or is using one set for everything good enough? Using distinctive sets would allow g

Re: [Freeipa-devel] Notes and questions for fine-grained read permissions

2013-09-09 Thread Petr Viktorin
On 09/09/2013 03:46 PM, Simo Sorce wrote: On Mon, 2013-09-09 at 13:00 +0200, Petr Viktorin wrote: On 09/07/2013 04:45 PM, Simo Sorce wrote: Sorry to come late to this thread. I think I like some of Petr plan, but not all of it. [...] It could get ugly real fast, and potentially cause a lot

Re: [Freeipa-devel] ipadb.so

2013-09-09 Thread Mahmoud
Hello, Thank you very much for your time and attention. I changed client side code (kinit.c) but it requires to change all clients. Now, I decided to change server side code. I thought it may be better choice. Should I change policy.c file to change ticket policies? It does not require recompilin

Re: [Freeipa-devel] Notes and questions for fine-grained read permissions

2013-09-09 Thread Petr Viktorin
On 09/09/2013 04:44 PM, Rob Crittenden wrote: Petr Viktorin wrote: [...] There needs to be some mechanism for us for force-replace existing ACIs in the case of a security issue. Under my proposal, we can just remove the offending attribute from the default list, and trust that the admin did

Re: [Freeipa-devel] [PATCH] 0066 Do not crash if DS is down during server uninstall

2013-09-09 Thread Petr Viktorin
On 09/06/2013 02:58 PM, Ana Krivokapic wrote: Hello, This patch fixes the regression introduced by the original fix for ticket #3867. https://fedorahosted.org/freeipa/ticket/3867 Thank, ACK, pushed to: master: a70b08e9aea891555ebee512de196748a835acb8 ipa-3-3: 658e734d2c453381a04e9ed72ea6ee9d5

Re: [Freeipa-devel] Multiple CA certificates in LDAP, questions

2013-09-09 Thread John Dennis
On 09/09/2013 05:17 AM, Jan Cholasta wrote: > Another question: > > Should each IPA service (LDAP, HTTP, PKINIT) have its own distinctive > set of trusted CAs, or is using one set for everything good enough? > Using distinctive sets would allow granular control over what CA is > trusted for wha

Re: [Freeipa-devel] ipadb.so

2013-09-09 Thread Dmitri Pal
On 09/09/2013 10:55 AM, Mahmoud wrote: > Hello, > > Thank you very much for your time and attention. > > I changed client side code (kinit.c) but it requires to change all > clients. Now, I decided to change server side code. It seems that you should try to contribute code upstream if you want to

Re: [Freeipa-devel] Multiple CA certificates in LDAP, questions

2013-09-09 Thread Simo Sorce
On Mon, 2013-09-09 at 16:19 +0200, Jan Cholasta wrote: > On 9.9.2013 15:36, Simo Sorce wrote: > > On Mon, 2013-09-09 at 11:17 +0200, Jan Cholasta wrote: > >> Another question: > >> > >> Should each IPA service (LDAP, HTTP, PKINIT) have its own distinctive > >> set of trusted CAs, or is using one se

Re: [Freeipa-devel] ipadb.so

2013-09-09 Thread Mahmoud
Hello Mr. Dmitri Pal Thank you very much for your help. I tried to change source code to have more option. It was difficult for me to understand FreeIPA source code. Hence, I decided to change Kerberos source code. I want to add more features to Kerberos. For example, I like to have two (or sever

Re: [Freeipa-devel] Notes and questions for fine-grained read permissions

2013-09-09 Thread Simo Sorce
On Mon, 2013-09-09 at 16:40 +0200, Petr Viktorin wrote: > On 09/09/2013 03:46 PM, Simo Sorce wrote: > > On Mon, 2013-09-09 at 13:00 +0200, Petr Viktorin wrote: > >> On 09/07/2013 04:45 PM, Simo Sorce wrote: > >>> Sorry to come late to this thread. > >>> > >>> I think I like some of Petr plan, but n

Re: [Freeipa-devel] Multiple CA certificates in LDAP, questions

2013-09-09 Thread Nalin Dahyabhai
On Mon, Sep 09, 2013 at 10:32:08AM -0400, John Dennis wrote: > Good point. Isn't there an X509 extension (possibly part of PKIX?) which > restricts membership in the chain path to a criteria. In other words you > can require your sub-CA to be present in the chain. Sorry, but my memory > is a bit fu

Re: [Freeipa-devel] Multiple CA certificates in LDAP, questions

2013-09-09 Thread Simo Sorce
On Mon, 2013-09-09 at 10:40 -0400, Rob Crittenden wrote: > Jan Cholasta wrote: > > On 9.9.2013 16:02, John Dennis wrote: > >> On 09/09/2013 05:17 AM, Jan Cholasta wrote: > >>> Another question: > >>> > >>> Should each IPA service (LDAP, HTTP, PKINIT) have its own distinctive > >>> set of trusted CA

Re: [Freeipa-devel] Multiple CA certificates in LDAP, questions

2013-09-09 Thread Henry B. Hotz
Aren't the implementations of name constrains generally buggy, and therefore not usable in real life? On Sep 9, 2013, at 9:02 AM, Nalin Dahyabhai wrote: > On Mon, Sep 09, 2013 at 10:32:08AM -0400, John Dennis wrote: >> Good point. Isn't there an X509 extension (possibly part of PKIX?) which >>

Re: [Freeipa-devel] Multiple CA certificates in LDAP, questions

2013-09-09 Thread Henry B. Hotz
I would strongly argue for a separate CA list for PKINIT (service or workstation login) vice HTTP (web browsing of semi-unknown sites). The trust models are fundamentally different. In the former case you are saying who is allowed to issue (conceivably fraudulent) client certs that allow (conc

Re: [Freeipa-devel] Multiple CA certificates in LDAP, questions

2013-09-09 Thread Nalin Dahyabhai
On Mon, Sep 09, 2013 at 01:07:09PM -0700, Henry B. Hotz wrote: > On Sep 9, 2013, at 9:02 AM, Nalin Dahyabhai wrote: > > On Mon, Sep 09, 2013 at 10:32:08AM -0400, John Dennis wrote: > >> Good point. Isn't there an X509 extension (possibly part of PKIX?) which > >> restricts membership in the chain

Re: [Freeipa-devel] ipadb.so

2013-09-09 Thread Dmitri Pal
On 09/09/2013 12:49 PM, Mahmoud wrote: > Hello Mr. Dmitri Pal > > Thank you very much for your help. > > I tried to change source code to have more option. It was difficult > for me to understand FreeIPA source code. Hence, I decided to change > Kerberos source code. I want to add more features to

[Freeipa-devel] Announcing the release of Dogtag 10.0.5

2013-09-09 Thread Ade Lee
The Dogtag team is proud to announce the fifth errata build for Dogtag 10.0. Builds are available for Fedora 18 and Fedora 19 in the updates-testing repositories. Please try them out and provide karma to move them to the F18 and F19 stable repositories. Karma can be provided at https://admin.f

Re: [Freeipa-devel] ipadb.so

2013-09-09 Thread Mahmoud
Hello, Thank you for your response. When a user get tgt ticket, he can get service tickets without typing password. I like to have several level of users. As high level users have more access to resources, I want to grant a ticket with less validation time. In other word, I want to have several ti

Re: [Freeipa-devel] ipadb.so

2013-09-09 Thread Mahmoud
Hello, I installed Fedora 19. Each time I change /usr/sbin/krb5kdc, it will not start again. I get following error: krb5kdc: Server error - while fetching master key K/M for realm EXAMPLE.COM Via reinstalling IPA, the problem will be fixed but I would like to fix it without reinstalling IPA. When