@itemx db_library
This tag indicates the name of the loadable database library. The value should be @samp{db2} for DB2 database and @samp{kldap} for LDAP database.
+@itemx database_name
+This DB2-specific tag indicates the location of the database. The
+default is @* @code{@value{DefaultDatabaseName}}.
+
+@itemx disable_last_success
+If set to @code{true}, suppresses KDC updates to the ``Last successful
+authentication'' field of principal entries requiring preauthentication.
+Setting this flag may improve performance. (Principal entries which do
+not require preauthentication never update the ``Last successful
+authentication'' field.)
+
+@itemx disable_lockout
+If set to @code{true}, suppresses KDC updates to the ``Last failed
+authentication'' and ``Failed password attempts'' fields of principal
+entries requiring preauthentication. Setting this flag may improve
+performance, but also disables account lockout.
+
@itemx ldap_kerberos_container_dn
This LDAP specific tag indicates the DN of the container object where the realm objects will be located.
daemons @code{kadmind4} and @code{v5passwdd} use to authenticate to
the database. The default is @code{@value{DefaultAdminKeytab}}.
-@itemx database_name
-(String.) Location of the Kerberos database for this realm. The
-default is @* @code{@value{DefaultDatabaseName}}.
-
@itemx default_principal_expiration
(Absolute time string.) Specifies the default expiration date of
principals created in this realm. The default value for this tag is
#define KRB5_CONF_DEFAULT_PRINCIPAL_EXPIRATION "default_principal_expiration"
#define KRB5_CONF_DEFAULT_PRINCIPAL_FLAGS "default_principal_flags"
#define KRB5_CONF_DICT_FILE "dict_file"
+#define KRB5_CONF_DISABLE_LAST_SUCCESS "disable_last_success"
+#define KRB5_CONF_DISABLE_LOCKOUT "disable_lockout"
#define KRB5_CONF_DNS_LOOKUP_KDC "dns_lookup_kdc"
#define KRB5_CONF_DNS_LOOKUP_REALM "dns_lookup_realm"
#define KRB5_CONF_DNS_FALLBACK "dns_fallback"
krb5_db2_context *db_ctx;
char **t_ptr, *opt = NULL, *val = NULL, *pval = NULL;
profile_t profile = KRB5_DB_GET_PROFILE(context);
+ int bval;
status = k5db2_init_context(context);
if (status != 0)
db_ctx->db_name = strdup(pval);
}
+ status = profile_get_boolean(profile, KDB_MODULE_SECTION, conf_section,
+ KRB5_CONF_DISABLE_LAST_SUCCESS, FALSE, &bval);
+ if (status != 0)
+ goto cleanup;
+ db_ctx->disable_last_success = bval;
+
+ status = profile_get_boolean(profile, KDB_MODULE_SECTION, conf_section,
+ KRB5_CONF_DISABLE_LOCKOUT, FALSE, &bval);
+ if (status != 0)
+ goto cleanup;
+ db_ctx->disable_lockout = bval;
+
cleanup:
free(opt);
free(val);
krb5_keyblock *db_master_key; /* Master key of database */
krb5_keylist_node *db_master_key_list; /* Master key list of database */
osa_adb_policy_t policy_db;
- krb5_boolean tempdb;
+ krb5_boolean tempdb;
+ krb5_boolean disable_last_success;
+ krb5_boolean disable_lockout;
} krb5_db2_context;
#define KRB5_DB2_MAX_RETRY 5
#include <stdio.h>
#include <errno.h>
#include <kadm5/server_internal.h>
+#include "kdb5.h"
#include "kdb_db2.h"
/*
krb5_kvno max_fail = 0;
krb5_deltat failcnt_interval = 0;
krb5_deltat lockout_duration = 0;
+ krb5_db2_context *db_ctx = context->dal_handle->db_context;
+
+ if (db_ctx->disable_lockout)
+ return 0;
code = lookup_lockout_policy(context, entry, &max_fail,
&failcnt_interval,
krb5_deltat failcnt_interval = 0;
krb5_deltat lockout_duration = 0;
int nentries = 1;
+ krb5_db2_context *db_ctx = context->dal_handle->db_context;
+ krb5_boolean need_update = FALSE;
switch (status) {
case 0:
return 0;
}
- code = lookup_lockout_policy(context, entry, &max_fail,
- &failcnt_interval,
- &lockout_duration);
- if (code != 0)
- return code;
-
- assert (!locked_check_p(context, stamp, max_fail, lockout_duration, entry));
+ if (!db_ctx->disable_lockout) {
+ code = lookup_lockout_policy(context, entry, &max_fail,
+ &failcnt_interval, &lockout_duration);
+ if (code != 0)
+ return code;
+ }
+ /* Only mark the authentication as successful if the entry
+ * required preauthentication, otherwise we have no idea. */
if (status == 0 && (entry->attributes & KRB5_KDB_REQUIRES_PRE_AUTH)) {
- /*
- * Only mark the authentication as successful if the entry
- * required preauthentication, otherwise we have no idea.
- */
- entry->fail_auth_count = 0;
- entry->last_success = stamp;
- } else if (status == KRB5KDC_ERR_PREAUTH_FAILED ||
- status == KRB5KRB_AP_ERR_BAD_INTEGRITY) {
+ if (!db_ctx->disable_lockout && entry->fail_auth_count != 0) {
+ entry->fail_auth_count = 0;
+ need_update = TRUE;
+ }
+ if (!db_ctx->disable_last_success) {
+ entry->last_success = stamp;
+ need_update = TRUE;
+ }
+ } else if (!db_ctx->disable_lockout &&
+ (status == KRB5KDC_ERR_PREAUTH_FAILED ||
+ status == KRB5KRB_AP_ERR_BAD_INTEGRITY)) {
if (failcnt_interval != 0 &&
stamp > entry->last_failed + failcnt_interval) {
- /* Reset fail_auth_count after failcnt_interval */
+ /* Reset fail_auth_count after failcnt_interval. */
entry->fail_auth_count = 0;
}
entry->last_failed = stamp;
entry->fail_auth_count++;
- } else
- return 0; /* nothing to do */
+ need_update = TRUE;
+ }
- code = krb5_db2_db_put_principal(context, entry,
- &nentries, NULL);
- if (code != 0)
- return code;
+ if (need_update) {
+ code = krb5_db2_db_put_principal(context, entry, &nentries, NULL);
+ if (code != 0)
+ return code;
+ }
return 0;
}
k5_mutex_t hndl_lock;
krb5_ldap_krbcontainer_params *krbcontainer;
krb5_ldap_realm_params *lrparams;
+ krb5_boolean disable_last_success;
+ krb5_boolean disable_lockout;
krb5_context kcontext; /* to set the error code and message */
} krb5_ldap_context;
return 0;
}
+/* Get integer or string values from the config section, falling back
+ to the default section, then to hard-coded values. */
+static errcode_t
+prof_get_boolean_def(krb5_context ctx, const char *conf_section,
+ const char *name, krb5_boolean dfl, krb5_boolean *out)
+{
+ errcode_t err;
+ int out_temp = 0;
+
+ err = profile_get_boolean(ctx->profile, KDB_MODULE_SECTION, conf_section,
+ name, -1, &out_temp);
+ if (err) {
+ krb5_set_error_message(ctx, err, "Error reading '%s' attribute: %s",
+ name, error_message(err));
+ return err;
+ }
+ if (out_temp != -1) {
+ *out = out_temp;
+ return 0;
+ }
+ err = profile_get_boolean(ctx->profile, KDB_MODULE_DEF_SECTION, name, 0,
+ dfl, &out_temp);
+ if (err) {
+ krb5_set_error_message(ctx, err, "Error reading '%s' attribute: %s",
+ name, error_message(err));
+ return err;
+ }
+ *out = out_temp;
+ return 0;
+}
+
/* We don't have non-null defaults in any of our calls, so don't
bother with the extra argument. */
static errcode_t
}
}
+ if ((st = prof_get_boolean_def(context, conf_section,
+ KRB5_CONF_DISABLE_LAST_SUCCESS, FALSE,
+ &ldap_context->disable_last_success)))
+ goto cleanup;
+
+ if ((st = prof_get_boolean_def(context, conf_section,
+ KRB5_CONF_DISABLE_LOCKOUT, FALSE,
+ &ldap_context->disable_lockout)))
+ goto cleanup;
+
cleanup:
return(st);
}
krb5_timestamp stamp)
{
krb5_error_code code;
+ kdb5_dal_handle *dal_handle;
+ krb5_ldap_context *ldap_context;
krb5_kvno max_fail = 0;
krb5_deltat failcnt_interval = 0;
krb5_deltat lockout_duration = 0;
+ SETUP_CONTEXT();
+ if (ldap_context->disable_lockout)
+ return 0;
+
code = lookup_lockout_policy(context, entry, &max_fail,
&failcnt_interval,
&lockout_duration);
krb5_error_code status)
{
krb5_error_code code;
+ kdb5_dal_handle *dal_handle;
+ krb5_ldap_context *ldap_context;
krb5_kvno max_fail = 0;
krb5_deltat failcnt_interval = 0;
krb5_deltat lockout_duration = 0;
int nentries = 1;
+ SETUP_CONTEXT();
+
switch (status) {
case 0:
case KRB5KDC_ERR_PREAUTH_FAILED:
return 0;
}
- code = lookup_lockout_policy(context, entry, &max_fail,
- &failcnt_interval,
- &lockout_duration);
- if (code != 0)
- return code;
+ if (!ldap_context->disable_lockout) {
+ code = lookup_lockout_policy(context, entry, &max_fail,
+ &failcnt_interval,
+ &lockout_duration);
+ if (code != 0)
+ return code;
+ }
entry->mask = 0;
assert (!locked_check_p(context, stamp, max_fail, lockout_duration, entry));
+ /* Only mark the authentication as successful if the entry
+ * required preauthentication, otherwise we have no idea. */
if (status == 0 && (entry->attributes & KRB5_KDB_REQUIRES_PRE_AUTH)) {
- /*
- * Only mark the authentication as successful if the entry
- * required preauthentication, otherwise we have no idea.
- */
- entry->fail_auth_count = 0;
- entry->last_success = stamp;
- entry->mask |= KADM5_FAIL_AUTH_COUNT | KADM5_LAST_SUCCESS;
- } else if (status == KRB5KDC_ERR_PREAUTH_FAILED ||
- status == KRB5KRB_AP_ERR_BAD_INTEGRITY) {
+ if (!ldap_context->disable_lockout && entry->fail_auth_count != 0) {
+ entry->fail_auth_count = 0;
+ entry->mask |= KADM5_FAIL_AUTH_COUNT;
+ }
+ if (!ldap_context->disable_last_success) {
+ entry->last_success = stamp;
+ entry->mask |= KADM5_LAST_SUCCESS;
+ }
+ } else if (!ldap_context->disable_lockout &&
+ (status == KRB5KDC_ERR_PREAUTH_FAILED ||
+ status == KRB5KRB_AP_ERR_BAD_INTEGRITY)) {
if (failcnt_interval != 0 &&
stamp > entry->last_failed + failcnt_interval) {
/* Reset fail_auth_count after failcnt_interval */
}
if (entry->mask) {
- code = krb5_ldap_put_principal(context, entry,
- &nentries, NULL);
+ code = krb5_ldap_put_principal(context, entry, &nentries, NULL);
if (code != 0)
return code;
}