Skip to content

Commit cb30fe2

Browse files
committed
Revert the MSVAVFLAGS_UNVERIFIED_SPN flag default
By default SSPI does not set this flag, and setting it causes servers with restrictive policy to fail authentication. Given no MS client sets this flag by default, neither should we until there is a clear need. We trust our calling applications to do the right thing here in any case just like SSPI trusts their own calling applications. Signed-off-by: Simo Sorce <[email protected]>
1 parent a898099 commit cb30fe2

File tree

1 file changed

+9
-1
lines changed

1 file changed

+9
-1
lines changed

src/gss_sec_ctx.c

+9-1
Original file line numberDiff line numberDiff line change
@@ -730,7 +730,15 @@ uint32_t gssntlm_accept_sec_context(uint32_t *minor_status,
730730
goto done;
731731
}
732732

733-
av_flags = MSVAVFLAGS_UNVERIFIED_SPN;
733+
/* TODO: allow client applications to set a context option to
734+
* provide an av_flags default value so that flags like
735+
* MSVAVFLAGS_UNVERIFIED_SPN can be set. By default SSPI does
736+
* not set this flag, and setting it causes servers with restrictive
737+
* policy to fail authentication. Given no MS client set this flag
738+
* by default, neither should we until there is a clear need. We
739+
* trust our calling applications to do the right thing here.
740+
* av_flags = MSVAVFLAGS_UNVERIFIED_SPN;
741+
*/
734742

735743
timestamp = ntlm_timestamp_now();
736744

0 commit comments

Comments
 (0)