<?xml version="1.0" encoding="utf-8"?>
<feed xml:lang="en" xmlns="http://www.w3.org/2005/Atom"><title>Recent changes to bugs</title><link href="https://sourceforge.net/p/modauthkerb/bugs/" rel="alternate"/><link href="https://sourceforge.net/p/modauthkerb/bugs/feed.atom" rel="self"/><id>https://sourceforge.net/p/modauthkerb/bugs/</id><updated>2021-03-02T17:44:23.802000Z</updated><subtitle>Recent changes to bugs</subtitle><entry><title>#62 Fails to build with MIT Kerberos 1.18</title><link href="https://sourceforge.net/p/modauthkerb/bugs/62/?limit=25#7e85" rel="alternate"/><published>2021-03-02T17:44:23.802000Z</published><updated>2021-03-02T17:44:23.802000Z</updated><author><name>Joakim Tjernlund</name><uri>https://sourceforge.net/u/jocketj/</uri></author><id>https://sourceforge.net069611103ae38fcbddcaaf4ebc94c1c764c655f6</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;I replaced the patch in ticket #61 with this instead(quite some time ago):&lt;br/&gt;
```&lt;br/&gt;
--- ./src/mod_auth_kerb.c.org   2020-08-13 17:30:15.901691505 +0200&lt;br/&gt;
+++ ./src/mod_auth_kerb.c   2020-08-13 17:35:00.069621299 +0200&lt;br/&gt;
@@ -2062,6 +2062,11 @@&lt;br/&gt;
 static int&lt;br/&gt;
 have_rcache_type(const char &lt;em&gt;type)&lt;br/&gt;
 {&lt;br/&gt;
+  /&lt;/em&gt; rcache "none" is always present in modern mit-krb5&lt;br/&gt;
+   * but krb5_rc_resolve_full() has been removed in 1.18.x&lt;br/&gt;
+   * so hardcode to true */&lt;br/&gt;
+   return 1;&lt;br/&gt;
+#if 0&lt;br/&gt;
    krb5_error_code ret;&lt;br/&gt;
    krb5_context context;&lt;br/&gt;
    krb5_rcache id = NULL;&lt;br/&gt;
@@ -2079,6 +2084,7 @@&lt;br/&gt;
    krb5_free_context(context);&lt;/p&gt;
&lt;div class="codehilite"&gt;&lt;pre&gt;&lt;span&gt;&lt;/span&gt;&lt;span class="err"&gt;return found;&lt;/span&gt;
&lt;/pre&gt;&lt;/div&gt;


&lt;p&gt;+#endif&lt;br/&gt;
 }&lt;/p&gt;
&lt;p&gt;/&lt;strong&gt;&lt;em&gt;*&lt;/em&gt;&lt;/strong&gt;&lt;strong&gt;&lt;em&gt;*&lt;/em&gt;&lt;/strong&gt;&lt;strong&gt;&lt;em&gt;*&lt;/em&gt;&lt;/strong&gt;&lt;strong&gt;&lt;em&gt;*&lt;/em&gt;&lt;/strong&gt;&lt;strong&gt;&lt;em&gt;*&lt;/em&gt;&lt;/strong&gt;&lt;strong&gt;&lt;em&gt;*&lt;/em&gt;&lt;/strong&gt;&lt;strong&gt;&lt;em&gt;*&lt;/em&gt;&lt;/strong&gt;&lt;strong&gt;&lt;em&gt;*&lt;/em&gt;&lt;/strong&gt;&lt;strong&gt;&lt;em&gt;*&lt;/em&gt;&lt;/strong&gt;&lt;strong&gt;&lt;em&gt;*&lt;/em&gt;&lt;/strong&gt;&lt;strong&gt;*&lt;/strong&gt; &lt;/p&gt;&lt;/div&gt;</summary></entry><entry><title>Fails to build with MIT Kerberos 1.18</title><link href="https://sourceforge.net/p/modauthkerb/bugs/62/" rel="alternate"/><published>2020-11-20T20:17:23.292000Z</published><updated>2020-11-20T20:17:23.292000Z</updated><author><name>Sam Hartman</name><uri>https://sourceforge.net/u/hartmans/</uri></author><id>https://sourceforge.netfabf14d8f14bfadfc67e73712c99cd632823c2de</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;If you take a look at src/mit-internals.h you'll see that the code copies internals from MIT Kerberos 1.3 to try and disable the replay cache.  Unfortunately, the replay cache was refactored in ersion 1.18, and these internals no longer build.  There's a "fix" to this in ticket 61, but that fix introduces a memory leak and replaces one set of internals with another.  At this point I am fairly sure that the actual default replay cache should work, even against Microsoft authenticators, so we could simply remove the internals completely and use the default replay cache.&lt;br/&gt;
            It might be better to disable things.  That can be done with a setenv call, but that's undesirable in a apache module.  I'm not remembering off the top of my head whether there's a better way to do this at the gss layer.&lt;/p&gt;&lt;/div&gt;</summary></entry><entry><title>#61 Use after free in authenticate_user_krb5pwd()</title><link href="https://sourceforge.net/p/modauthkerb/bugs/61/?limit=25#807c" rel="alternate"/><published>2020-08-12T16:00:14.841000Z</published><updated>2020-08-12T16:00:14.841000Z</updated><author><name>Joakim Tjernlund</name><uri>https://sourceforge.net/u/jocketj/</uri></author><id>https://sourceforge.net28583b74e7aa5d266aa33a94d1b309a398f28b1d</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;This makes mod_auth_kerb load when built against mit-krb5-1.18.2&lt;br/&gt;
Not run tested yet&lt;/p&gt;&lt;/div&gt;</summary></entry><entry><title>#61 Use after free in authenticate_user_krb5pwd()</title><link href="https://sourceforge.net/p/modauthkerb/bugs/61/?limit=25#5490" rel="alternate"/><published>2019-10-21T03:49:20.809000Z</published><updated>2019-10-21T03:49:20.809000Z</updated><author><name>Paul Wise</name><uri>https://sourceforge.net/u/pabs3/</uri></author><id>https://sourceforge.net234c14f0096baadec97991c8581f7cdb20035f82</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;FYI I've just added this patch to the Debian package of mod_auth_kerb in response to Debian bug #&lt;a class="" href="https://bugs.debian.org/934043" rel="nofollow"&gt;934043&lt;/a&gt;.&lt;/p&gt;&lt;/div&gt;</summary></entry><entry><title>Use after free in authenticate_user_krb5pwd()</title><link href="https://sourceforge.net/p/modauthkerb/bugs/61/" rel="alternate"/><published>2018-12-13T08:59:26.371000Z</published><updated>2018-12-13T08:59:26.371000Z</updated><author><name>Johan Ymerson</name><uri>https://sourceforge.net/u/ymerson/</uri></author><id>https://sourceforge.net34617490a6df9ec1282915564dc99a2a8464d278</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;In verify_krb5_user() krb5_kt_close() is called under certain conditions, but krb5_kt_close() is also called from the top level function authenticate_user_krb5pwd() after calling verify_krb5_user().&lt;br/&gt;
This leads to a use after free, since kbr5_kt_close() free up memory pointed to in the keytab struct and&lt;br/&gt;
the next call to krb5_kt_close() will dereference pointers in that (now freed) memory.&lt;br/&gt;
This leads to a segmentation fault with recent versions of MIT Kerberos.&lt;/p&gt;
&lt;p&gt;Patch to fix this attached.&lt;/p&gt;&lt;/div&gt;</summary></entry><entry><title>#60 Strim REALM\ in username</title><link href="https://sourceforge.net/p/modauthkerb/bugs/60/?limit=25#e4ec" rel="alternate"/><published>2016-11-23T17:06:38.179000Z</published><updated>2016-11-23T17:06:38.179000Z</updated><author><name>chris</name><uri>https://sourceforge.net/u/c7np6r/</uri></author><id>https://sourceforge.net3de1f4b1cd867111a411b3155ea59a5a8c259859</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;Looks like this should be done somewhere in function &lt;code&gt;authenticate_user_krb5pwd&lt;/code&gt;, where also the &lt;code&gt;'@'&lt;/code&gt; character is searched in the auth line&lt;/p&gt;&lt;/div&gt;</summary></entry><entry><title>Strim REALM\ in username</title><link href="https://sourceforge.net/p/modauthkerb/bugs/60/" rel="alternate"/><published>2016-11-23T16:59:29.590000Z</published><updated>2016-11-23T16:59:29.590000Z</updated><author><name>chris</name><uri>https://sourceforge.net/u/c7np6r/</uri></author><id>https://sourceforge.net4cdf46b2f1c21ed0b66ae984fa261bdb104160f1</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;Hi,&lt;br/&gt;
This is quite similar to &lt;a class="alink strikethrough" href="/p/modauthkerb/bugs/42/"&gt;[#42]&lt;/a&gt;. Citrix sends the user name as "REALM\username", and mod_auth_krb then tries to authenticate the username "REALMusername".&lt;br/&gt;
Can this be fixed as in &lt;a class="alink strikethrough" href="/p/modauthkerb/bugs/42/"&gt;[#42]&lt;/a&gt;?&lt;br/&gt;
Thanks&lt;/p&gt;&lt;/div&gt;</summary></entry><entry><title>Login fails if Password contains § Symbol</title><link href="https://sourceforge.net/p/modauthkerb/bugs/59/" rel="alternate"/><published>2015-06-05T10:28:25.444000Z</published><updated>2015-06-05T10:28:25.444000Z</updated><author><name>Thomas Braun</name><uri>https://sourceforge.net/u/userid-1628636/</uri></author><id>https://sourceforge.net46b7be50d76a513a817a095a8e9b8dbd9300e7e4</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;Login fails if Password contains § Symbol with error:&lt;/p&gt;
&lt;p&gt;krb5_get_init_creds_password() failed: Invalid argument&lt;/p&gt;&lt;/div&gt;</summary></entry><entry><title>KrbSaveCredentials + KeepAlive = poof</title><link href="https://sourceforge.net/p/modauthkerb/bugs/58/" rel="alternate"/><published>2013-04-01T06:29:16Z</published><updated>2013-04-01T06:29:16Z</updated><author><name>Dorian Taylor</name><uri>https://sourceforge.net/u/doriantaylor/</uri></author><id>https://sourceforge.net772655af7c8f5d93d03b4c209787997232d24ba6</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;I know my way around Apache modules, but I'm an initiate to mod_auth_kerb, and I've noticed that when I refresh my test CGI too frequently, the credential cache disappears. This doesn't happen, however, if I set KeepAlive off.&lt;/p&gt;
&lt;p&gt;I understand that Kerberos operates at the connection level, so it seems as if it would be possible to authenticate on the first request and then keep that connection authenticated until it disconnected, at which point the credential cache could be removed. This behaviour would gracefully degrade to Connection: close.&lt;/p&gt;
&lt;p&gt;I'd be happy to hack on it if somebody would show me around.&lt;/p&gt;&lt;/div&gt;</summary></entry><entry><title>Crash on graceful Apache reload</title><link href="https://sourceforge.net/p/modauthkerb/bugs/57/" rel="alternate"/><published>2012-12-28T02:07:51Z</published><updated>2012-12-28T02:07:51Z</updated><author><name>Dustin C. Hatch</name><uri>https://sourceforge.net/u/admiralnemo/</uri></author><id>https://sourceforge.net076f5cb18b12548bb05e8fa34dd39c2c8ecb600a</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;After upgrading to Apache 2.2.23 recently, I found that initiating a graceful reload of a running Apache process (i.e. /etc/init.d/apache2 reload) would cause Apache to crash. By turning on debug logging, I was able to find this message, indicating that the problem was caused by mod_auth_kerb:&lt;/p&gt;
&lt;p&gt;apache2: threads.c:351: krb5int_key_register: Assertion `destructors_set[keynum] == 0' failed.&lt;br /&gt;
[Thu Dec 27 20:04:58 2012] [notice] seg fault or similar nasty error detected in the parent process&lt;/p&gt;
&lt;p&gt;Please let me know if there is a way I can provide additional information in order to help you track down this problem.&lt;/p&gt;&lt;/div&gt;</summary></entry></feed>