#3508 Issues with certificate mapping rules
Closed: Fixed 6 years ago Opened 6 years ago by sbose.

Ticket was cloned from Red Hat Bugzilla (product Red Hat Enterprise Linux 7): Bug 1489895

Description of problem:

Two issues were found related to certificate mapping rules.

1. If <EKU> is used in the matching rule with only OIDs, e.g. <EKU>1.2.3.4, the
SSSD backend will crash. Since the rules are read during startup SSSD might
even fail to start.

2. If the rules are re-read, e.g. during an offline-online cycle with
    kill -USR1 $(pidof sssd)
    kill -USR2 $(pidof sssd)
the SSSD backend might crash if the certificate mapping rules are evaluated for
a trusted AD domain.

Metadata Update from @sbose:
- Issue set to the milestone: None

6 years ago

Metadata Update from @sbose:
- Custom field patch adjusted to on

6 years ago

Metadata Update from @jhrozek:
- Custom field rhbz adjusted to https://bugzilla.redhat.com/show_bug.cgi?id=1489895

6 years ago

Metadata Update from @jhrozek:
- Issue close_status updated to: Fixed
- Issue set to the milestone: SSSD 1.15.4
- Issue status updated to: Closed (was: Open)

6 years ago

Metadata Update from @lslebodn:
- Custom field type adjusted to 1.15.3

6 years ago

Metadata Update from @jhrozek:
- Issue set to the milestone: SSSD 1.16.0 (was: SSSD 1.15.4)

6 years ago

SSSD is moving from Pagure to Github. This means that new issues and pull requests
will be accepted only in SSSD's github repository.

This issue has been cloned to Github and is available here:
- https://github.com/SSSD/sssd/issues/4534

If you want to receive further updates on the issue, please navigate to the github issue
and click on subscribe button.

Thank you for understanding. We apologize for all inconvenience.

Login to comment on this ticket.

Metadata