From: Greg Hudson Date: Mon, 25 May 2009 16:40:00 +0000 (+0000) Subject: Temporarily disable FAST PKINIT for 1.7 release X-Git-Tag: krb5-1.8-alpha1~455 X-Git-Url: http://git.tremily.us/?a=commitdiff_plain;h=7e306b5fe4443c3152ecae549b6dac642ee91710;p=krb5.git Temporarily disable FAST PKINIT for 1.7 release There are protocol issues and implementation defects surrounding the combination of FAST an PKINIT currently. To avoid impacting the 1.7 scheduled and to avoid creating interoperability problems later, disable the combination until the problems are resolved. ticket: 6501 tags: pullup target_version: 1.7 git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@22381 dc483132-0cff-0310-8789-dd5450dbe970 --- diff --git a/src/plugins/preauth/pkinit/pkinit_clnt.c b/src/plugins/preauth/pkinit/pkinit_clnt.c index 13651c57a..f7cd99890 100644 --- a/src/plugins/preauth/pkinit/pkinit_clnt.c +++ b/src/plugins/preauth/pkinit/pkinit_clnt.c @@ -40,6 +40,9 @@ #include "pkinit.h" +/* Remove when FAST PKINIT is settled. */ +#include "../fast_factor.h" + #ifdef LONGHORN_BETA_COMPAT /* * It is anticipated that all the special checks currently @@ -1027,10 +1030,19 @@ pkinit_client_process(krb5_context context, int processing_request = 0; pkinit_context plgctx = (pkinit_context)plugin_context; pkinit_req_context reqctx = (pkinit_req_context)request_context; + krb5_keyblock *armor_key = NULL; pkiDebug("pkinit_client_process %p %p %p %p\n", context, plgctx, reqctx, request); + /* Remove (along with armor_key) when FAST PKINIT is settled. */ + retval = fast_get_armor_key(context, get_data_proc, rock, &armor_key); + if (retval == 0 && armor_key != NULL) { + /* Don't use PKINIT if also using FAST. */ + krb5_free_keyblock(context, armor_key); + return EINVAL; + } + if (plgctx == NULL || reqctx == NULL) return EINVAL; diff --git a/src/plugins/preauth/pkinit/pkinit_srv.c b/src/plugins/preauth/pkinit/pkinit_srv.c index 228815511..031752974 100644 --- a/src/plugins/preauth/pkinit/pkinit_srv.c +++ b/src/plugins/preauth/pkinit/pkinit_srv.c @@ -35,6 +35,9 @@ #include "pkinit.h" +/* Remove when FAST PKINIT is settled. */ +#include "../fast_factor.h" + static krb5_error_code pkinit_server_get_edata(krb5_context context, krb5_kdc_req * request, @@ -146,9 +149,19 @@ pkinit_server_get_edata(krb5_context context, { krb5_error_code retval = 0; pkinit_kdc_context plgctx = NULL; + krb5_keyblock *armor_key = NULL; pkiDebug("pkinit_server_get_edata: entered!\n"); + /* Remove (along with armor_key) when FAST PKINIT is settled. */ + retval = fast_kdc_get_armor_key(context, server_get_entry_data, request, + client, &armor_key); + if (retval == 0 && armor_key != NULL) { + /* Don't advertise PKINIT if the client used FAST. */ + krb5_free_keyblock(context, armor_key); + return EINVAL; + } + /* * If we don't have a realm context for the given realm, * don't tell the client that we support pkinit! @@ -344,11 +357,21 @@ pkinit_server_verify_padata(krb5_context context, krb5_authdata **my_authz_data = NULL, *pkinit_authz_data = NULL; krb5_kdc_req *tmp_as_req = NULL; krb5_data k5data; + krb5_keyblock *armor_key; pkiDebug("pkinit_verify_padata: entered!\n"); if (data == NULL || data->length <= 0 || data->contents == NULL) return 0; + /* Remove (along with armor_key) when FAST PKINIT is settled. */ + retval = fast_kdc_get_armor_key(context, server_get_entry_data, request, + client, &armor_key); + if (retval == 0 && armor_key != NULL) { + /* Don't allow PKINIT if the client used FAST. */ + krb5_free_keyblock(context, armor_key); + return EINVAL; + } + if (pa_plugin_context == NULL || e_data == NULL) return EINVAL;