Skip to content

Commit 38a28bf

Browse files
committed
Drop support for GSS_C_MA_NOT_DFLT_MECH
When this MEchanism Attribute is exposed as supported it causes GSSAPI implementations to eclude the mechanism completely as vaiable to acquire creds from pseudo mechanisms like SPNEGO. This is not what was intended when we added this flag. The intention was to not make this mechanism the default when mutliple are available, and specifically to not make it preferred over krb5. However given this is not how the fal works, we need to drop it now. It may be re-introduced at a later time as a runtime settings when we grow a way to set configuration in a file somewhere so that admin can control this behavior. Signed-off-by: Simo Sorce <simo@redhat.com>
1 parent 9d7a275 commit 38a28bf

File tree

2 files changed

+0
-2
lines changed

2 files changed

+0
-2
lines changed

src/gss_names.c

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -751,7 +751,6 @@ static uint32_t make_ma_oid_set(uint32_t *minor_status, gss_OID_set *ma_set,
751751
};
752752
gss_const_OID supported_mech_attrs[] = {
753753
GSS_C_MA_MECH_CONCRETE,
754-
GSS_C_MA_NOT_DFLT_MECH,
755754
GSS_C_MA_AUTH_INIT,
756755
GSS_C_MA_INTEG_PROT,
757756
GSS_C_MA_CONF_PROT,

tests/ntlmssptest.c

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2116,7 +2116,6 @@ do { \
21162116
} while(0)
21172117

21182118
CHECK_MA(mech_attrs, GSS_C_MA_MECH_CONCRETE);
2119-
CHECK_MA(mech_attrs, GSS_C_MA_NOT_DFLT_MECH);
21202119
CHECK_MA(mech_attrs, GSS_C_MA_AUTH_INIT);
21212120
CHECK_MA(mech_attrs, GSS_C_MA_INTEG_PROT);
21222121
CHECK_MA(mech_attrs, GSS_C_MA_CONF_PROT);

0 commit comments

Comments
 (0)