Skip Menu |
 

From: ghudson@mit.edu
Subject: git commit

Accept GSS mechs which don't supply attributes

If gss_inquire_attrs_for_mech() is called for a mechanism which does
not implement it, the call will succeed with mech_attrs set to
GSS_C_NO_OID_SET (as is explicitly allowed by RFC 5587).
generic_gss_test_oid_set_member() returns an error on this value,
causing gss_accept_sec_context() to erroneously deny the mechanism
when no verifier credential handle is supplied. Change
allow_mech_by_default() to explicitly check for no mech attribute set.

https://github.com/krb5/krb5/commit/bd321c9caa6dc4b034bc3279a1af39af4c41210d
Author: Greg Hudson <ghudson@mit.edu>
Commit: bd321c9caa6dc4b034bc3279a1af39af4c41210d
Branch: master
src/lib/gssapi/mechglue/g_accept_sec_context.c | 4 ++++
1 files changed, 4 insertions(+), 0 deletions(-)
Subject: git commit
From: ghudson@mit.edu

Accept GSS mechs which don't supply attributes

If gss_inquire_attrs_for_mech() is called for a mechanism which does
not implement it, the call will succeed with mech_attrs set to
GSS_C_NO_OID_SET (as is explicitly allowed by RFC 5587).
generic_gss_test_oid_set_member() returns an error on this value,
causing gss_accept_sec_context() to erroneously deny the mechanism
when no verifier credential handle is supplied. Change
allow_mech_by_default() to explicitly check for no mech attribute set.

(cherry picked from commit bd321c9caa6dc4b034bc3279a1af39af4c41210d)

https://github.com/krb5/krb5/commit/467c1454cd601b0be55dc4460a94df138b0d65f7
Author: Greg Hudson <ghudson@mit.edu>
Commit: 467c1454cd601b0be55dc4460a94df138b0d65f7
Branch: krb5-1.16
src/lib/gssapi/mechglue/g_accept_sec_context.c | 4 ++++
1 files changed, 4 insertions(+), 0 deletions(-)
Subject: git commit
From: ghudson@mit.edu

Accept GSS mechs which don't supply attributes

If gss_inquire_attrs_for_mech() is called for a mechanism which does
not implement it, the call will succeed with mech_attrs set to
GSS_C_NO_OID_SET (as is explicitly allowed by RFC 5587).
generic_gss_test_oid_set_member() returns an error on this value,
causing gss_accept_sec_context() to erroneously deny the mechanism
when no verifier credential handle is supplied. Change
allow_mech_by_default() to explicitly check for no mech attribute set.

(cherry picked from commit bd321c9caa6dc4b034bc3279a1af39af4c41210d)

https://github.com/krb5/krb5/commit/563ad3af88f0182f4362a6702844368b0b177406
Author: Greg Hudson <ghudson@mit.edu>
Commit: 563ad3af88f0182f4362a6702844368b0b177406
Branch: krb5-1.17
src/lib/gssapi/mechglue/g_accept_sec_context.c | 4 ++++
1 files changed, 4 insertions(+), 0 deletions(-)