Skip to content

Use SASL authzid as client identity if auth module permits it#524

Merged
zinid merged 2 commits intoprocessone:masterfrom
benlangfeld:feature/auth/authcid
Mar 25, 2016
Merged

Use SASL authzid as client identity if auth module permits it#524
zinid merged 2 commits intoprocessone:masterfrom
benlangfeld:feature/auth/authcid

Conversation

@benlangfeld
Copy link
Copy Markdown
Contributor

This allows the authentication modules to perform SASL proxy authentication. It puts the onus on them to authorize the authcid to masquerade as the authzid. Doesn't currently implement such functionality in existing auth modules, since they cannot currently codify a relationship between the two identities. Does not permit the authzid to use a domain differently from the one of the connection.

Note: digest might not work, but I have no interest in it, being deprecated.

@benlangfeld benlangfeld force-pushed the feature/auth/authcid branch from 3165f49 to 5263ee9 Compare April 9, 2015 03:09
@zinid
Copy link
Copy Markdown
Contributor

zinid commented Apr 9, 2015

What do you mean DIGEST-MD5 might not work? It's still in use. Or it might not work with SASL proxy authentication, but will work for sure with regular SASL?

@benlangfeld
Copy link
Copy Markdown
Contributor Author

I may have broken SASL DIGEST here. I did not test it. It is deprecated In favour of SCRAM so I did not pay attention to it.

@benlangfeld benlangfeld force-pushed the feature/auth/authcid branch 3 times, most recently from 8ce9b9d to 07ec735 Compare April 14, 2015 21:49
@benlangfeld benlangfeld changed the title Use SASL PLAIN authzid as client identity if auth module permits it Use SASL authzid as client identity if auth module permits it Apr 14, 2015
@benlangfeld
Copy link
Copy Markdown
Contributor Author

Digest auth fixed. This should probably be good to merge now. The test failures are MUC related, which I havn't touched here.

@benlangfeld benlangfeld force-pushed the feature/auth/authcid branch from c52aefd to b46f9c4 Compare May 5, 2015 00:50
@benlangfeld
Copy link
Copy Markdown
Contributor Author

I've finally managed to get the test suite running locally, and it does indeed appear that there remain issues with DIGEST auth, which I will fix ASAP.

@zinid
Copy link
Copy Markdown
Contributor

zinid commented May 5, 2015

@benlangfeld good

@benlangfeld benlangfeld force-pushed the feature/auth/authcid branch from f462be7 to 6946a34 Compare May 6, 2015 16:07
This allows the authentication modules to perform SASL proxy authentication. It puts the onus on them to authorize the authcid to masquerade as the authzid. Doesn't currently implement such functionality in existing auth modules, since they cannot currently codify a relationship between the two identities. Does not permit the authzid to use a domain differently from the one of the connection.

Note: digest might not work, but I have no interest in it, being deprecated.
@benlangfeld benlangfeld force-pushed the feature/auth/authcid branch from 6946a34 to 917d48f Compare May 6, 2015 17:12
@benlangfeld
Copy link
Copy Markdown
Contributor Author

This should be good to go now. What are the chances of it making it into 15.05?

@benlangfeld
Copy link
Copy Markdown
Contributor Author

Is there any chance this might be reviewed for inclusion?

@benlangfeld
Copy link
Copy Markdown
Contributor Author

Anyone? @badlop @zinid @mremond?

@zinid zinid merged commit 917d48f into processone:master Mar 25, 2016
@benlangfeld
Copy link
Copy Markdown
Contributor Author

💃 Thanks @zinid!

@benlangfeld benlangfeld deleted the feature/auth/authcid branch March 25, 2016 15:22
@mremond
Copy link
Copy Markdown
Member

mremond commented Mar 25, 2016

@benlangfeld Cool 👍

@lock
Copy link
Copy Markdown

lock bot commented Jun 10, 2019

This thread has been automatically locked since there has not been any recent activity after it was closed. Please open a new issue for related bugs.

@lock lock bot locked as resolved and limited conversation to collaborators Jun 10, 2019
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants