<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Recent changes to bugs</title><link>https://sourceforge.net/p/modauthkerb/bugs/</link><description>Recent changes to bugs</description><atom:link href="https://sourceforge.net/p/modauthkerb/bugs/feed.rss" rel="self"/><language>en</language><lastBuildDate>Tue, 02 Mar 2021 17:44:23 -0000</lastBuildDate><atom:link href="https://sourceforge.net/p/modauthkerb/bugs/feed.rss" rel="self" type="application/rss+xml"/><item><title>#62 Fails to build with MIT Kerberos 1.18</title><link>https://sourceforge.net/p/modauthkerb/bugs/62/?limit=25#7e85</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;I replaced the patch in ticket #61 with this instead(quite some time ago):&lt;br/&gt;
```&lt;br/&gt;
--- ./src/mod_auth_kerb.c.org   2020-08-13 17:30:15.901691505 +0200&lt;br/&gt;
+++ ./src/mod_auth_kerb.c   2020-08-13 17:35:00.069621299 +0200&lt;br/&gt;
@@ -2062,6 +2062,11 @@&lt;br/&gt;
 static int&lt;br/&gt;
 have_rcache_type(const char &lt;em&gt;type)&lt;br/&gt;
 {&lt;br/&gt;
+  /&lt;/em&gt; rcache "none" is always present in modern mit-krb5&lt;br/&gt;
+   * but krb5_rc_resolve_full() has been removed in 1.18.x&lt;br/&gt;
+   * so hardcode to true */&lt;br/&gt;
+   return 1;&lt;br/&gt;
+#if 0&lt;br/&gt;
    krb5_error_code ret;&lt;br/&gt;
    krb5_context context;&lt;br/&gt;
    krb5_rcache id = NULL;&lt;br/&gt;
@@ -2079,6 +2084,7 @@&lt;br/&gt;
    krb5_free_context(context);&lt;/p&gt;
&lt;div class="codehilite"&gt;&lt;pre&gt;&lt;span&gt;&lt;/span&gt;&lt;span class="err"&gt;return found;&lt;/span&gt;
&lt;/pre&gt;&lt;/div&gt;


&lt;p&gt;+#endif&lt;br/&gt;
 }&lt;/p&gt;
&lt;p&gt;/&lt;strong&gt;&lt;em&gt;*&lt;/em&gt;&lt;/strong&gt;&lt;strong&gt;&lt;em&gt;*&lt;/em&gt;&lt;/strong&gt;&lt;strong&gt;&lt;em&gt;*&lt;/em&gt;&lt;/strong&gt;&lt;strong&gt;&lt;em&gt;*&lt;/em&gt;&lt;/strong&gt;&lt;strong&gt;&lt;em&gt;*&lt;/em&gt;&lt;/strong&gt;&lt;strong&gt;&lt;em&gt;*&lt;/em&gt;&lt;/strong&gt;&lt;strong&gt;&lt;em&gt;*&lt;/em&gt;&lt;/strong&gt;&lt;strong&gt;&lt;em&gt;*&lt;/em&gt;&lt;/strong&gt;&lt;strong&gt;&lt;em&gt;*&lt;/em&gt;&lt;/strong&gt;&lt;strong&gt;&lt;em&gt;*&lt;/em&gt;&lt;/strong&gt;&lt;strong&gt;*&lt;/strong&gt; &lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Joakim Tjernlund</dc:creator><pubDate>Tue, 02 Mar 2021 17:44:23 -0000</pubDate><guid>https://sourceforge.net069611103ae38fcbddcaaf4ebc94c1c764c655f6</guid></item><item><title>Fails to build with MIT Kerberos 1.18</title><link>https://sourceforge.net/p/modauthkerb/bugs/62/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;If you take a look at src/mit-internals.h you'll see that the code copies internals from MIT Kerberos 1.3 to try and disable the replay cache.  Unfortunately, the replay cache was refactored in ersion 1.18, and these internals no longer build.  There's a "fix" to this in ticket 61, but that fix introduces a memory leak and replaces one set of internals with another.  At this point I am fairly sure that the actual default replay cache should work, even against Microsoft authenticators, so we could simply remove the internals completely and use the default replay cache.&lt;br/&gt;
            It might be better to disable things.  That can be done with a setenv call, but that's undesirable in a apache module.  I'm not remembering off the top of my head whether there's a better way to do this at the gss layer.&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Sam Hartman</dc:creator><pubDate>Fri, 20 Nov 2020 20:17:23 -0000</pubDate><guid>https://sourceforge.netfabf14d8f14bfadfc67e73712c99cd632823c2de</guid></item><item><title>#61 Use after free in authenticate_user_krb5pwd()</title><link>https://sourceforge.net/p/modauthkerb/bugs/61/?limit=25#807c</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;This makes mod_auth_kerb load when built against mit-krb5-1.18.2&lt;br/&gt;
Not run tested yet&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Joakim Tjernlund</dc:creator><pubDate>Wed, 12 Aug 2020 16:00:14 -0000</pubDate><guid>https://sourceforge.net28583b74e7aa5d266aa33a94d1b309a398f28b1d</guid></item><item><title>#61 Use after free in authenticate_user_krb5pwd()</title><link>https://sourceforge.net/p/modauthkerb/bugs/61/?limit=25#5490</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;FYI I've just added this patch to the Debian package of mod_auth_kerb in response to Debian bug #&lt;a class="" href="https://bugs.debian.org/934043" rel="nofollow"&gt;934043&lt;/a&gt;.&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Paul Wise</dc:creator><pubDate>Mon, 21 Oct 2019 03:49:20 -0000</pubDate><guid>https://sourceforge.net234c14f0096baadec97991c8581f7cdb20035f82</guid></item><item><title>Use after free in authenticate_user_krb5pwd()</title><link>https://sourceforge.net/p/modauthkerb/bugs/61/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;In verify_krb5_user() krb5_kt_close() is called under certain conditions, but krb5_kt_close() is also called from the top level function authenticate_user_krb5pwd() after calling verify_krb5_user().&lt;br/&gt;
This leads to a use after free, since kbr5_kt_close() free up memory pointed to in the keytab struct and&lt;br/&gt;
the next call to krb5_kt_close() will dereference pointers in that (now freed) memory.&lt;br/&gt;
This leads to a segmentation fault with recent versions of MIT Kerberos.&lt;/p&gt;
&lt;p&gt;Patch to fix this attached.&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Johan Ymerson</dc:creator><pubDate>Thu, 13 Dec 2018 08:59:26 -0000</pubDate><guid>https://sourceforge.net34617490a6df9ec1282915564dc99a2a8464d278</guid></item><item><title>#60 Strim REALM\ in username</title><link>https://sourceforge.net/p/modauthkerb/bugs/60/?limit=25#e4ec</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Looks like this should be done somewhere in function &lt;code&gt;authenticate_user_krb5pwd&lt;/code&gt;, where also the &lt;code&gt;'@'&lt;/code&gt; character is searched in the auth line&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">chris</dc:creator><pubDate>Wed, 23 Nov 2016 17:06:38 -0000</pubDate><guid>https://sourceforge.net3de1f4b1cd867111a411b3155ea59a5a8c259859</guid></item><item><title>Strim REALM\ in username</title><link>https://sourceforge.net/p/modauthkerb/bugs/60/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Hi,&lt;br/&gt;
This is quite similar to &lt;a class="alink strikethrough" href="/p/modauthkerb/bugs/42/"&gt;[#42]&lt;/a&gt;. Citrix sends the user name as "REALM\username", and mod_auth_krb then tries to authenticate the username "REALMusername".&lt;br/&gt;
Can this be fixed as in &lt;a class="alink strikethrough" href="/p/modauthkerb/bugs/42/"&gt;[#42]&lt;/a&gt;?&lt;br/&gt;
Thanks&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">chris</dc:creator><pubDate>Wed, 23 Nov 2016 16:59:29 -0000</pubDate><guid>https://sourceforge.net4cdf46b2f1c21ed0b66ae984fa261bdb104160f1</guid></item><item><title>Login fails if Password contains § Symbol</title><link>https://sourceforge.net/p/modauthkerb/bugs/59/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Login fails if Password contains § Symbol with error:&lt;/p&gt;
&lt;p&gt;krb5_get_init_creds_password() failed: Invalid argument&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Thomas Braun</dc:creator><pubDate>Fri, 05 Jun 2015 10:28:25 -0000</pubDate><guid>https://sourceforge.net46b7be50d76a513a817a095a8e9b8dbd9300e7e4</guid></item><item><title>KrbSaveCredentials + KeepAlive = poof</title><link>https://sourceforge.net/p/modauthkerb/bugs/58/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;I know my way around Apache modules, but I'm an initiate to mod_auth_kerb, and I've noticed that when I refresh my test CGI too frequently, the credential cache disappears. This doesn't happen, however, if I set KeepAlive off.&lt;/p&gt;
&lt;p&gt;I understand that Kerberos operates at the connection level, so it seems as if it would be possible to authenticate on the first request and then keep that connection authenticated until it disconnected, at which point the credential cache could be removed. This behaviour would gracefully degrade to Connection: close.&lt;/p&gt;
&lt;p&gt;I'd be happy to hack on it if somebody would show me around.&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dorian Taylor</dc:creator><pubDate>Mon, 01 Apr 2013 06:29:16 -0000</pubDate><guid>https://sourceforge.net772655af7c8f5d93d03b4c209787997232d24ba6</guid></item><item><title>Crash on graceful Apache reload</title><link>https://sourceforge.net/p/modauthkerb/bugs/57/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;After upgrading to Apache 2.2.23 recently, I found that initiating a graceful reload of a running Apache process (i.e. /etc/init.d/apache2 reload) would cause Apache to crash. By turning on debug logging, I was able to find this message, indicating that the problem was caused by mod_auth_kerb:&lt;/p&gt;
&lt;p&gt;apache2: threads.c:351: krb5int_key_register: Assertion `destructors_set[keynum] == 0' failed.&lt;br /&gt;
[Thu Dec 27 20:04:58 2012] [notice] seg fault or similar nasty error detected in the parent process&lt;/p&gt;
&lt;p&gt;Please let me know if there is a way I can provide additional information in order to help you track down this problem.&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dustin C. Hatch</dc:creator><pubDate>Fri, 28 Dec 2012 02:07:51 -0000</pubDate><guid>https://sourceforge.net076f5cb18b12548bb05e8fa34dd39c2c8ecb600a</guid></item></channel></rss>