sssd-krb5-common-1.13.4-21.1<>,x]|/=„ьgَ.xLjQw kCF?k|T\SeCh0d6,m]so(w9%WlwCO70t(2E'dYejzfLE$:2>Rpp0#' !?Ő\H(*e rN'Î.횹ȶ`^I }Kej7.pL3#_وOƌhHA6;cG:t ]>:q?qd  Z  "1PV`t ~    5Nh|$(8R9 R: RFkGkHkIlXl Yl\l4]lH^l~blcmVdmemfmlmunvnwpxp0ypD+zpCsssd-krb5-common1.13.421.1SSSD helpers needed for Kerberos and GSSAPI authenticationProvides helper processes that the LDAP and Kerberos back ends can use for Kerberos user or host authentication.]|lamb70`openSUSE Leap 42.3openSUSEGPL-3.0-or-laterhttp://bugs.opensuse.orgSystem/Daemonshttps://fedorahosted.org/sssd/linuxx86_64``AA]q]q]q]s]s543175d2e070fd970a59da69402702f5c12cf2372014ba4af2b4bf38f8cff13e60b7a17d317efda40f5222704e6236a1rootrootrootrootrootrootrootrootrootrootsssd-1.13.4-21.1.src.rpmlibsss_krb5_common.so()(64bit)sssd-krb5-commonsssd-krb5-common(x86-64)@@@@@@@@@@@@@@@@@@@   cyrus-sasl-gssapilibc.so.6()(64bit)libc.so.6(GLIBC_2.14)(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.3)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.4)(64bit)libdhash.so.1()(64bit)libdhash.so.1(DHASH_0.4.3)(64bit)libkeyutils.so.1()(64bit)libkeyutils.so.1(KEYUTILS_0.3)(64bit)libkrb5.so.3()(64bit)libkrb5.so.3(krb5_3_MIT)(64bit)libpopt.so.0()(64bit)libpopt.so.0(LIBPOPT_0)(64bit)libsss_debug.so()(64bit)libsystemd.so.0()(64bit)libsystemd.so.0(LIBSYSTEMD_209)(64bit)libtalloc.so.2()(64bit)libtalloc.so.2(TALLOC_2.0.2)(64bit)rpmlib(CompressedFileNames)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsLzma)3.0.4-14.0-14.4.6-14.11.2\9\\o@\ @[[^[^[*AZ؄Z]@YB@YYf@XX~@XXX6@W%W@WVwV]V3[UUL@T@S0S@Sr @ShSW@R1@R0@RsR%@QQU@Q^QIQ,QQ \PPPPAOOO@O O|7O\NNw.N7N2N1O@MM?MM@MM2@Mv@M6@M5M LOLr@L@L@L{@K9@K9@KK@KKjJ@J@J Samuel Cabrero Samuel Cabrero Samuel Cabrero Samuel Cabrero ckowalczyk@suse.comckowalczyk@suse.comckowalczyk@suse.comckowalczyk@suse.comckowalczyk@suse.comhguo@suse.comhguo@suse.comhguo@suse.comhguo@suse.comhguo@suse.comhguo@suse.comhguo@suse.comhguo@suse.comhguo@suse.comhguo@suse.comhguo@suse.comhguo@suse.comhguo@suse.comhguo@suse.comhguo@suse.comhguo@suse.comhguo@suse.comddiss@suse.comlchiquitto@suse.comckornacker@suse.comvarkoly@suse.comddiss@suse.comvarkoly@suse.comjengelh@inai.deckornacker@suse.comjengelh@inai.dejengelh@inai.dejengelh@inai.dejengelh@inai.dejengelh@inai.derhafer@suse.comjengelh@inai.derhafer@suse.comrhafer@suse.comrhafer@suse.comrhafer@suse.comjengelh@inai.dejengelh@inai.dejengelh@inai.dejengelh@inai.deben.kevan@gmail.comben.kevan@gmail.comben.kevan@gmail.comjengelh@medozas.derhafer@suse.dejengelh@medozas.derhafer@suse.dejengelh@medozas.dejengelh@medozas.derhafer@suse.derhafer@suse.derhafer@suse.derhafer@suse.derhafer@suse.derhafer@suse.derhafer@suse.derhafer@suse.derhafer@suse.deaj@suse.derhafer@novell.comrhafer@novell.comcoolo@novell.comrhafer@novell.comrhafer@novell.comrhafer@novell.comrhafer@novell.comrhafer@novell.comrhafer@novell.comrhafer@novell.comrhafer@novell.comrhafer@novell.comrhafer@novell.comrhafer@novell.com- Create directory to download and cache GPOs (bsc#1132879) - Added an option to skip GPOs that have groupPolicyContainers, unreadable by SSSD (bsc#1124194) (CVE-2018-16838) - Added patches: * 0020-GPO-Add-option-ad_gpo_ignore_unreadable.patch- Fix race condition in monitor ping handling (bsc#1128862) - Added patches: * 0019-MONITOR-Adjust-ping-canceling.patch- Fix fallback_homedir returning '/' for empty home directories (CVE-2019-3811) (bsc#1121759) - Add an option to disable checking for trusted domains in the subdomains provider (bsc#1125617) - Clear pid file in corner cases (bsc#1127670) - Fix child unable to write to log file after SIGHUP (bsc#1127670) - Added patches: * 0017-nss-sssd-returns-for-emtpy-home-directories.patch * 0018-AD_PROVIDER-ad_enabled_domains.patch - Updated patches: * 0008-Logging-handle-hup-for-helper-fds.patch- Fix race condition on boot between SSSD and Autofs; (bsc#1010700); * Create pidfile after responders started 0014-MONITOR-Create-pidfile-after-responders-started.patch * Fixing duplication of pid file declaration 0015-UTILS-Fixing-duplication-of-pid-file-declaration.patch * Fix detection of systemd 0016-BUILD-Fix-detection-of-systemd.patch * Change systemd unit type to notify- Introduce two patches (bsc#1110299): * exit() the forked process if exec()-ing a child process fails 0012-call_exit_if_exec_failed.patch * Do not schedule the machine renewal task if adcli is not executable 0013-AD-skip-reneval-task-without-adcli.patch- Introduce a patch: * Remove whitespaces from netgroup entries 0011-trim_whitespaces_in_netgroup_triples.patch (bsc#1087320)- Introduce a patch: * Remove missleading log messages: 0010-NSS-Move-a-DEBUG-message-so-that-it-s-less-confusing.patch (bsc#1101877)- Introduce a patch: * Create sockets with right permissions: 0009-SUDO-Create-the-socket-with-stricter-permissions.patch (bsc#1098377, CVE-2018-10852)- Introduce patches: * Rotate child debug file descriptors on SIGHUP 0008-Logging-handle-hup-for-helper-fds.patch (bsc#1080156)- Introduce patches: * Fix segfault in sss_cache command with 0006-Solve-segfault-in-sss_cache-command-invoked-on-speci.patch (bsc#1072728) * Fix failure in autofs initialisation sequence upon system boot 0007-AUTOFS-Fix-offline-resolution-of-autofs-maps.patch (bsc#1010700)- Introduce patch 0005-sdap-Fix-ldap_rfc_2307_fallback_to_local_users.patch to fix a segfault issue. (bsc#1055123)- Introduce patch 0004-sysdb-sanitize-search-filter-input.patch to fix CVE-2017-12173 sssd: unsanitized input when searching in local cache database (bsc#1061832).- Install /var/lib/sss/mc directory to correct sssd cache invalidation behaviour. Spec patch authored by Josef Cejka. (bsc#1039567)- Fix IO error triggered by processing non-ordinary GPO values such as remote registry settings with patch: 0003-GPO-ignore-non-KVP-lines-if-possible.patch (bsc#1030473)- Introduce mandatory runtime requirement "cyrus-sasl-gssapi" to krb5-common sub-package. Address bsc#1024836.- Remove invalid definition "After=syslog.target" from systemd service file. (bsc#983938)- The IPA provider depends on AD provider's PAC executable, hence introducing the package dependency. (bsc#1021441)- Match patch content with the version commited to upstream project: 0002-sss_client-Defer-thread-cancellation-until-completio.patch (bsc#993582)- Avoid linking sssd's nss to pthread, fix bsc#993582 with patch: 0002-sss_client-Defer-thread-cancellation-until-completio.patch - Install logrotate configuration to fix bsc#1004220.- Enable PAC responder. PAC is an extension element returned by domain contriller, to speed up resolution of authorisation data such as group memberships. Continue implementing fate#320466.- Upgrade to minor release 1.13.4 with important regression fixes across ID mapper, AD/IPA connectivity, and race conditions. Implement fate#320466.- Upgrade to version 1.13.3 to implement fate#320466. - Install rcsssd symlink. - Remove all expired macros from spec file. - Remove expired patches: 0002-Signals-Remove-unused-functions.patch 0003-SSH-Allow-newline-at-the-end-of-public-key-values-in.patch 0004-SDAP-Continue_resolving_SID_even_if_some_fail.patch 0005-LDAP-tokengroups_do_not_work_with_id_provider=ldap.patch - Other minor clean-ups.- Add patches: 0004-SDAP-Continue_resolving_SID_even_if_some_fail.patch 0005-LDAP-tokengroups_do_not_work_with_id_provider=ldap.patch to resolve issues with missing groups and group attributes from AD. Many thanks to Luiz Angelo Daros de Luca for the original submission made against Leap 42.1. (bsc#957291)- Do not permit user session before SSSD starts. bsc#926961 - Redo fix for bsc#939249 by using rpm Requires.- Relabel patch to fix its sequence number: 0001-Signals-Remove-unused-functions.patch -> 0002-Signals-Remove-unused-functions.patch - Add patch 0003-SSH-Allow-newline-at-the-end-of-public-key-values-in.patch to resolve an issue with incorrect interpretation of line breaks in sshPublicKey attribute. (bsc#941121)- Let the main package obsolute/provide libsss_sudo package, because sudo capability is an integral component in SSSD daemon. (bsc#939249)- Remove unused functions conflicting with Samba types; (bnc#919519). + 0001-Signals-Remove-unused-functions.patch- The utility sss_obfuscate uses the Python module pysss, so add a dependency on python-sssd-config to sssd-tools (bnc#890242)- fix %postun to not erroneously remove sss pam module (bnc#876667)- bnc#877457 - 78 Configuration file /usr/lib/systemd/system/sssd.service is marked executable. Please remove executable permission bits.- Detect endianness at configure time, for use by Samba's byteorder.h header; (bnc#876544). + 0001-build-detect-endianness-at-configure-time.patch- Update to new upstream release 1.11.5.1 * sssd crashes after upgrade from 1.11.4 to 1.11.5 when using a samba4 domain * SSSD pam module accepts usernames with leading spaces * [RFE] Expose the list of trusted domains to IPA * If both IPA and LDAP are set up with enumeration on, two enum tasks are running * sssd.conf man pages don't list a configuration option. * Make SSSD compilable on systems with non-standard paths to krb5 includes * [freebsd] pam_sss: add ignore_unknown_user option * MAN: Remove misleading memberof example from ldap_access_filter example * not retrieving homedirs of AD users with posix attributes * Document that `sssd` cache needs to be cleared manually, if ID mapping configuration changes * Check IPA idranges before saving them to the cache * Evaluate usage of sudo LDAP provider together with the AD provider * Setting int option to 0 yields the default value * ipa-server-mode: Use lower-case user name component in home dir path * SSSD Does not cache SELinux map from FreeIPA correctly * IPA SELinux code looks for the host in the wrong sysdb subdir when a trusted user logs in * sssd fails to handle expired passwords when OTP is used * Add another Kerberos error code to trigger IPA password migration * Double OK when starting the service * SSSD should create the SELinux mapping file with format expected by pam_selinux * Valgrind: Invalid read of int while processing netgroup * other subdomains are unavailable when joined to a subdomain in the ad forest * Error during password change * configure time variables not expanded when running ./configure * RHEL7 IPA selinuxusermap hbac rule not always matching * AD Enumeration reads data from LDAP while regular lookups connect to GC * Implement heuristics to detect if POSIX attributes have been replicated to the Global Catalog or not * sssd_be crashes when ad_access_filter uses FOREST keyword. * "System Error" when invalid ad_access_filter is used * RHEL7 sssd not setting IPA AD trusted user homedir * Enabling ldap_id_mapping doesn't exclude uidNumber in filter * FAST does not work in SSSD 1.11.2 in Fedora 20 * Access denied for users from gc domain when using format DOMAIN\user * Group membership lookup issue * Group lookup does not return member with multiple names after user lookup * sssd ad trusted sub domain do not inherit fallbacks and overrides settings * sssd_be crashes when ldap_search_base cannot be parsed. * sssd_be aborts a request if it doesn't match any configured idmap domain * sssd_be should hint about increasing the krb5_auth_timeout if krb5 auth times out * Warn with a user-friendly error message when permissions on sssd.conf are incorrect * sudo rules time filter is nondeterministic * Man page states default_shell option supersedes other shell options but in fact override_shell does. * SSSD needs to enable FAST by default- Update to new upstream release 1.11.3 * The AD provider is able to resolve group memberships for groups with Global and Universal scope * The initgroups (get groups for user) operation for users from trusted AD domains was made more reliable by reading the required tokenGroups attribute from LDAP instead of Global Catalog * A new option ad_enable_gc was added to the AD provider. This option allows the administrator to force SSSD to talk to LDAP port only and never try the Global Catalog * The AD provider is now able to leverage the tokenGroups attribute even when POSIX attributes are used, providing better performance during logins. * A memory leak in the NSS responder that affected long-lived clients that requested netgroup data was fixed - Remove sssd-ldflags.diff (merged upstream)- Migrate deprecated krb5_kdcip variable to krb5_server (bnc#851048)- Update to new upstream release 1.11.2 * A new option ad_access_filter was added. This option allows the administrator to easily configure LDAP search filter that the users logging in must match in order to be granted access. * The Kerberos provider will no longer try to create public directories when evaluating the krb5_ccachedir option. - Remove 0005-implicit-decl.diff (merged upstream)- Update to new upstream release 1.11.0 * The sudo integration was made more robust. SSSD is now able to gracefully handle situations where it is not able to resolve the client host name or sudo rules have multiple name attributes. * Several nested group membership bugs were fixed * The PAC responder was made more robust and efficient, modifying existing cache entries instead of always recreating them. * The Kerberos provider now supports the new KEYRING ccache type. - Remove sssd-no-ldb-check.diff, now implemented through a configure argument --disable-ldb-version-check- Explicitly formulate SASL BuildRequires- Update to new upstream release 1.9.5 * Includes a fix for CVE-2013-0287: A simple access provider flaw prevents intended ACL use when SSSD is configured as an Active Directory client. * Fixed spurious password expiration warning that was printed on login with the Kerberos back end. * A new option ldap_rfc2307_fallback_to_local_users was added. If this option is set to true, SSSD is be able to resolve local group members of LDAP groups. * Fixed an indexing bug that prevented the contents of autofs maps from being returned to the automounter deamon in case the map contained a large number of entries. * Several fixes for safer handling of Kerberos credential caches for cases where the ccache is set to be stored in a DIR: type. - Remove Provide-a-be_get_account_info_send-function.patch, Add-unit-tests-for-simple-access-test-by-groups.patch, Do-not-compile-main-in-DP-if-UNIT_TESTING-is-defined.patch, Resolve-GIDs-in-the-simple-access-provider.patch (CVE-2013-0287 material is in upstream), sssd-sysdb-binary-attrs.diff (merged upstream)- Implement signature verification- Fixed security issue: CVE-2013-0287 (bnc#809153): When SSSD is configured as an Active Directory client by using the new Active Directory provider or equivalent configuration of the LDAP provider, the Simple Access Provider does not handle access control correctly. If any groups are specified with the simple_deny_groups option, the group members are permitted access. New patches: * Provide-a-be_get_account_info_send-function.patch * Add-unit-tests-for-simple-access-test-by-groups.patch * Do-not-compile-main-in-DP-if-UNIT_TESTING-is-defined.patch * Resolve-GIDs-in-the-simple-access-provider.patch- Resolve user retrieval problems when encountering binary data in LDAP attributes (bnc#806078), added sssd-sysdb-binary-attrs.diff - Added sssd-no-ldb-check.diff so that SSSD continues to start even after an LDB update.- fix package name in baselibs.conf (bnc#796423)- update to 1.9.4 (bnc#801036): * A security bug assigned CVE-2013-0219 was fixed - TOCTOU race conditions when creating or removing home directories for users in local domain * A security bug assigned CVE-2013-0220 was fixed - out-of-bounds reads in autofs and ssh responder * The sssd_pam responder processes pending requests after reconnect * A serious memory leak in the NSS responder was fixed * Requests that were processing group entries with DNs pointing out of any configured search bases were not terminated correctly, causing long timeouts * Kerberos tickets are correctly renewed even after SSSD daemon restart * Multiple fixes related to SUDO integration, in particular fixing functionality when the sssd back end process was changing its online/offline status * The pwd_exp_warning option was fixed to function as documented in the manual page - refreshed sssd-ldflags.diff to apply cleanly- Removed left-over "Requires" for no longer existing sssd-client subpackage. - New patch: sssd-ldflags.diff to fix link failures due to erroneous LDFLAGS usage- Switch back to using libcrypto instead of mozilla-nss as it seems to be supported upstream again, cf. https://lists.fedorahosted.org/pipermail/sssd-devel/2012-June/010202.html - Cleanup PAM configuration after uninstalling sssd (bnc#788328)- Update to new upstream release 1.9.3 * Many fixes related to deployments where the SSSD is running as a client of IPA server with trust relation established with an Active Directory server * Multiple fixes related to correct reporting of group memberships, especially in setups that use nested groups * Fixed a bug that prevented upgrade from the 1.8 series if the cache contained nested groups before the upgrade * Restarting the responders is more robust for cases where the machine is under heavy load during back end restart * The default_shell option can now be also set per-domain in addition to global setting.- Update to new upstream release 1.9.2 * Users or groups from trusted domains can be retrieved by UID or GID as well * Several fixes that mitigate file descriptor leak during logins * SSH host keys are also removed from the cache after being removed from the server * Fix intermittent crash in responders if the responder was shutting down while requests were still pending * Catch an error condition that might have caused a tight loop in the sssd_nss process while refreshing expired enumeration request * Fixed memory hierarchy of subdomains discovery requests that caused use-after-free access bugs * The krb5_child and ldap_child processes can print libkrb5 tracing information in the debug logs- Update to new upstream release 1.8.93 (1.9.0~beta3) * Add native support for autofs to the IPA provider * Support for id mapping when connecting to Active Directory * Support for handling very large (> 1500 users) groups in Active Directory * Add a new fast in-memory cache to speed up lookups of cached data on repeated requests * Add support for the Kerberos DIR cache for storing multiple TGTs automatically * Add a new PAC responder for dealing with cross-realm Kerberos trusts * Terminate idle connections to the NSS and PAM responders- Update to new upstream release 1.8.3 * LDAP: Handle situations where the RootDSE is not available anonymously * LDAP: Fix regression for users using non-standard LDAP attributes for user information - Switch from openssl to mozilla-nss, as this is the officially supported crypto integration- Fix build error on SLES 11 builds- Add suse_version condition for glib over libunistring for SLES 11 SP2. - Update to new upstream release 1.8.2 * Fix for GSSAPI binds when the keytab contains unrelated principals * Workarounds added for LDAP servers with unreadable RootDSE- Update to new upstream release 1.8.1 * Resolve issue where we could enter an infinite loop trying to connect to an auth server- Update to new upstream release 1.8.0 * Support for the service map in NSS * Support for setting default SELinux user context from FreeIPA * Support for retrieving SSH user and host keys from LDAP * Support for caching autofs LDAP requests * Support for caching SUDO rules * Include the IPA AutoFS provider * Fixed several memory-corruption bugs * Fixed a regression in the proxy provider- Fixed systemd related packaging issues (bnc#724157) - fixed build on older openSUSE releases- Resolve "have choice for libnl-devel: libnl-1_1-devel libnl3-devel"- Fixed typos in configure args - Cherry-picked password policy fixes from 1.5 branch (bnc#705768) - switched to fd-leak fix cherry-picked from 1.5 branch - Add /usr/sbin to the search path to make configure find nscd (bnc#709747)- Add patches to fix an fd leak in sssd_pam- Update to new upstream release 1.5.11 * Support for overriding home directory, shell and primary GID locally * Properly honor TTL values from SRV record lookups * Support non-POSIX groups in nested group chains (for RFC2307bis LDAP servers) * Properly escape IPv6 addresses in the failover code * Do not crash if inotify fails (e.g. resource exhaustion) - Remove redundant %clean section; delete .la files more efficiently- Update to 1.5.8: * Support for the LDAP paging control * Support for multiple DNS servers for name resolution * Fixes for several group membership bugs * Fixes for rare crash bugs- Update to 1.5.7 * A flaw was found in the handling of cached passwords when kerberos renewal tickets is enabled. Due to a bug, the cached password was overwritten with a (moderately) predictable filename, which could allow a user to authenticate as someone else if they knew the name of the cache file (bnc#691135, CVE-2011-1758) - Changes in 1.5.6: * Fixed a serious memory leak in the memberOf plugin * Fixed a regression with the negative cache that caused it to be essentially nonfunctional * Fixed an issue where the user's full name would sometimes be removed from the cache * Fixed an issue with password changes in the kerberos provider not working with kpasswd- Update to 1.5.5 * Fixes for several crash bugs * LDAP group lookups will no longer abort if there is a zero-length member attribute * Add automatic fallback to 'cn' if the 'gecos' attribute does not exist- Should build in SLE-11-SP1 now- Updated to 1.5.4 * Fixes for Active Directory when not all users and groups have POSIX attributes * Fixes for handling users and groups that have name aliases (aliases are ignored) * Fix group memberships after initgroups in the IPA provider- Updated to 1.5.3 * Support for libldb >= 1.0.0 * Proper detection of manpage translations * Changes between 1.5.1 and 1.5.2 * Fixes for support of FreeIPA v2 * Fixes for failover if DNS entries change * Improved sss_obfuscate tool with better interactive mode * Fix several crash bugs * Don't attempt to use START_TLS over SSL. Some LDAP servers can't handle this * Delete users from the local cache if initgroups calls return 'no such user' (previously only worked for getpwnam/getpwuid) * Use new Transifex.net translations * Better support for automatic TGT renewal (now survives restart) * Netgroup fixes- Updated to 1.5.1 * Vast performance improvements when enumerate = true * All PAM actions will now perform a forced initgroups lookup instead of just a user information lookup This guarantees that all group information is available to other providers, such as the simple provider. * For backwards-compatibility, DNS lookups will also fall back to trying the SSSD domain name as a DNS discovery domain. * Support for more password expiration policies in LDAP - 389 Directory Server - FreeIPA - ActiveDirectory * Support for ldap_tls_{cert,key,cipher_suite} config options * Assorted bugfixes- /var/lib/sss/pubconf was missing (bnc#665442)- It was possible to make sssd hang forever inside a loop in the PAM responder by sending a carefully crafted packet to sssd. This could be exploited by a local attacker to crash sssd and prevent other legitimate users from logging into the system. (bnc#660481, CVE-2010-4341)- Own /etc/systemd directories to fix build.- install systemd service file- Updated to 1.4.1 * Add support for netgroups to the LDAP and proxy providers * Fixes a minor bug with UIDs/GIDs >= 2^31 * Fixes a segfault in the kerberos provider * Fixes a segfault in the NSS responder if a data provider crashes * Correctly use sdap_netgroup_search_base * the utility libraries libpath_utils1, libpath_utils-devel, libref_array1 and libref_array-devel moved to their own separate upstream project (ding-libs) * Performance improvements made to group processing of RFC2307 LDAP servers * Fixed nested group issues with RFC2307bis LDAP servers without a memberOf plugin * Manpage reviewed and updated- remove hard coded python version- No dependencies on %{release}- Updated to 1.3.1 * Fixes to the HBAC backend for obsolete or removed HBAC entries * Improvements to log messages around TLS and GSSAPI for LDAP * Support for building in environments using --as-needed LDFLAGS * Vast performance improvement for initgroups on RFC2307 LDAP servers * Long-running SSSD clients (e.g. GDM) will now reconnect properly to the daemon if SSSD is restarted * Rewrote the internal LDB cache API. As a synchronous API it is now faster to access and easier to work with * Eugene Indenbom contributed a sizeable amount of code to the LDAP provider - We now handle failover situations much more reliably than we did previously - We also will now monitor the GSSAPI kerberos ticket and automatically renew it when appropriate, instead of waiting for a connection to fail * Support for netlink now allows us to more quickly detect situations where we may have come online * New option "dns_discovery_domain" allows better configuration for using SRV records for failover - New subpackages: libpath_utils1, libpath_utils-devel, libref_array1 and libref_array-devel- Package pam- and nss-Modules as baselibs - cleaned up file list and dependencies - fixed init script dependencies- Updated to 1.1.0 * Support for IPv6 * Support for LDAP referrals * Offline failed login counter * Fix for the long-standing cache cleanup performance issues * libini_config, libcollection, libdhash, libref_array and libpath_utils are now built as shared libraries for general consumption (libref_array and libpath_utils are currently not packaged, as no component in sssd links against them) * Users get feedback from PAM if they authenticated offline * Native local backend now has a utility to show nested memberships (sss_groupshow) * New "simple" access provider for easy restriction of users - Backported libcrypto support from master to avoid Mozilla NSS dependency - Backported password policy improvments for LDAP provider from master- use logfiles for debug messages by default- subpackages for commandline tools, ipa-provider plugin and python API- Updated to 1.0.5. Highlights: * Removed some dead code (libreplace * Clarify licenses throughout the code- Updated to 1.0.4- Update to 0.6.0- fix LDAP filter for initgroups() with rfc2307bis setups- initial package submissionlamb70 15603487961.13.4-21.11.13.4-21.1sssdkrb5_childldap_childsssdlibsss_krb5_common.so/usr/lib//usr/lib/sssd//usr/lib64//usr/lib64/sssd/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:10403/openSUSE_Leap_42.3_Update/f3ca63e7e8d073c739e0e8fdbe7a12fa-sssd.openSUSE_Leap_42.3_Updatedrpmlzma5x86_64-suse-linuxdirectoryELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/l, for GNU/Linux 3.0.0, BuildID[sha1]=1ae2102bb7f0688eaeed2273b138fd25e290996c, strippedELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/l, for GNU/Linux 3.0.0, BuildID[sha1]=615e27381065d7fc3533083949c803f102e0013b, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=d3dd13b74c6cb04ffdb770651fd0a48f752d2dcd, stripped  RRRRRRRRRR RRR RR RRRRR RRRRRRRRR RR RPR RR RRRR RR RޫJi:02?`]"k%{f}}`ʛ`cwt{a1׻/iEX.N3Ot3bqj(g?>bpt"ʍ輤Pyj/ /5(`AvEM:H9wE ֌"VVrsU閾Oȧ̹,eg )qO/V uD:HZ;J G8Ls R9u~ N[ycIv ,B(-"syoK \) QTi & ĥ!鸻֥s']Iݶ7VR|yhÔgEtd[Y8v!iD 1jr RGY1Vc;ISu eMh9vrGo>S%-P;=ƞsJ$zhwmU$ $'us2Gb3]`LFONi>6m^ Ɵap԰F&|oY[`IYUFSYM_}$2 U֝I_/scF k[_&^ Q}Y*B7: s[)m,9s@wma]3]Wm5̼M"CW _l27/P]`~ɂmJTBrf.s9S j2os (i, N緝;Ҁ(8t9-?QPGxYThm\Gĝn NbB3!udZv8 tI궊HRjl>^jܔN ʹ}TP@EMF}{+*ZfZ4L1TlquNQ/,;fbJ|Hc*=oNIgDqW7^6Jq߻dtwwp d4qk5yg R}.?"{)s 瘸4l<^}o :+5K)$ܥ]Oy_P@}wMYW#cvDwvo55^|!@b_wxSΣ**EM@v Iq 融B48$;K5Hdu2 $:fbq\JyHI{oef'+@Wo!T|-7fwwC i\HX >!rC0"$$-߽Ag^%!K^PӖAR_taib2v=C n.Qۇ [hLm,K4L ȟY+%Fnʇ2__%(%Ӆ KeWވ>V8spOfϨPˆ hljٯc"ciH}iKtM6||9dp{Hs_ckȆy7,0^gb+5[䝶xүl]fK}50ǩנwɍn.`,;CC( !U/`5w's}XT[Tp!Dm|Se/\Z.Nnms80H 9.a5O%QMmjsH'k| rh4v_O{i=_8eUQOxs`%ږ%](]XvcM^uQ)3 G|QBP/?҅Ǯ6z|2Tcs͑}lj! 2)q;7ʐm`GXW]vj}:}7WMr}}ȕ~w=YPWs|EVȣ%ӄ4 N(~$0ɝr oi U!W#.GgZ\{즎:}6Q<\{1Qna̔fR]:-)YցSi(/qj2kcA~9#q?{kN˱X\u2u|\_üb.X7 X 0-\vsߊ(Y`\Z"{A;e Ok7;5{@J9Q{XDˇHwgb*N5~ Y2H DM*ǶN 8j~=[65@i3m7x+qb'vKm^2y*R .r`}DbʰѨWFŪj|>TS% E iR نI$HhXt67I(6F/\Y9=.!tG'DrB6D0AIKJ=tNӆ*;*+Dk3ZfqKTf:qdItV{܆*\]Yk[6&Ij駉@t#6yŖd*قN{4$ WTT1p7*qVޔ_lͤ0PQֱ;qlƙbϺ}LUv.7*ƍLKb*l6-YKCȯ3ijV%s_qMtOH|dB Z,#&w<JY'{U[ЫisSiDԮolkk 6^X,]v|m=ɧliBlRp8Uz!3I#m.D{pxW\!nXhsΰPyay\teM#S rFقYN2* [&M2 D-Rb). o֋{ahE{o-D+$9Ix ξiy 2"ot;lGRxdOaX324]lco}`0 ԿSѐanv %CZ7ɍ1PŽdu= ^s!D O'5dyapQD ן/{~6]鉮S mu#Ԅe][A37 _# ]( {#@a4!}/I#~w e_ހb>Tcwz} (6=ʃxHJ{™!0SYs𓲰v#8u)`֒tP/:S- WǁV&.hC/*q*wjjJS(#Tj 56|QBطa&߸C$h cbmU0"FqQߐ6\i%P|(bT=Fxtyݜ:{k }_~%O/9`rS A֪g gǂ!Jg7lIL>b2ۼGd]&8IV;^Eͺs%<W[;4ۥi IR >$.|mz!dG:Qd0yWzRn` ԲY"kjrBOȴn%wԩZ x\u:V?`jG jvlaXNnQK`CiްwlKgRn=z!x~SOis{"i# +WSZ1__dLsUU ku>QȘ`ؤ"z6Z;JwfJE?OD؅=zE_t"ߛe)j,scr.+^|>5[7-I; SxJh%OG*it5F"Qƥp B$ G |+hd3G ( ǎ (C(u͸wiSBC4=N! ң0,+z-ġALGw{21ǝ|;k\aK;͙tGž9RAnV֮q:Ī 5^ Ȉ| L~Xll%RWS)9 f_R{4)Qr _ 6qdFI%xwN:;x2.: +{{4gl5yL{/.;лh󨞉-B®Uz[1cRߖB?ZsiFm7(kSJ.P>qRL1|(Vp~vVQN9sk)T(jI&Qg-~ )pb$\pJ nY|;~QR<7yA;DK`c4-'^ϩ(:@_MB_ji?Lgm[d}VlxaV31b) EWz/Ӣ HT%B:+9=f j7bmќܺ*,n{HoVRnasq'm{hÞ81{1O档|8 m[_..8/Pq@fzNU$I!,RH/qv#o@yڸJa& t.BcjB뚎aD݁Mi›3a\a펺@ڙwb`Qerr^x\l2Kuk 0,Y9=A7]swǗ_Lk[=6bRY ^}:p)juY@q4d4YGMF6xWq"hdhikEY^4yeҭ.Tt2V  UFzzu!Q!@\O} o 7h8mK9 nB>$Gh-d-ul8\h,_gф5g_0Qz%P90GVQ fP)U3T ?F)4SUҾJ0?͋}K_>g`p7}hi|IhXmk ~@0ǰ-;;]UM\}7blU"V|/P.Ҟ۫T ߪL 6xIy1N,ݔ%$5vfXm+!N7q6(jb7!v6qĴ?>yXa3uK)A3j"):dcyv} ޢE8ωf-1ϧK1 ׅ |Uo_sVQ6,| K.R ZӃmxo^%'DXEȱNQ6[FbBʡ?.*,θ`<wm&սq9#DT, |M}⩴ Y9Y G[r@ƓDucC[u֧]NЊD1ۘ6FqU);pW6ޞ~|VXWk1{N i!8ӌFz[Zrԍ0Y4ՄђQB u]O{]*G9LƧa@ĭLEsfM8$~8*`z1χh3F}W>Z iV? 8nAZn"Z a_K`9D03 ՅSz8H)DAUtv]8}C]aLoadSwN*Ie!1wF>뼜:Sm 伦ӮA'lwBQVtڐ#6*s? S2 ۘhՓvg/vYJ& #}\R6{ C&R':=bqG"whS:^8d[7RA\k2CM\Up C2RDgH[)- A L6 ?сd] Ө R3c"$$O#G.6b(=S#PR7q% 䊇r|Bp(/2,' "AiQ_ ,)׺x9pM0 ֛Aקa]ulj+SdwioG5k/c F58ڳ P!Nz)`Y(BphSvBZ8ABG^0g6!VS#$٣B=ܻB!z tg311u=RKOL"Wh#)(oPgxh@8I6ř wfvrb}@a8Ϙ{1mq Ӑ~P=vsVS)Й`CLg~6E-%4 ُ e*/Ϟ2! ?85(ɚ '|6+&&}s.>}`p]80л+9x*+imQZx'z1 [fu.TfF.FSNHon6iQ_ΝtXd3q\qcKnah uKZʾMit-,*!},36]z`Ur~<#^3תldg&:GvX" }&7a>?l2p =HBޞ}ƏWUipyyxq ^?T@֋`Q 縎^sɼnM5 ? j߭NoN r.8}RQ-D՘`NO>NHJך\Z5ʑOo:u0a' ײȸv49Qsxjvd?w9eD^UG㒎Gur g5y0r3ېХ!*p0#kFh:7+A1p;٧BV*-o[v97fP :0,Or 77hMq;4|/{Yߜ@S c5SD (rPaR 9;[ }$l]yKdP)HdZǰNէx)Ilqȡ nT!n5/woS=vqXgZ-7Ό9|UFahn/q!{bPk<~q7TfA;G0Scy7Ή;"E|y,čr'Y9[9Eѹ5d2w),(Yi_ 6I1QE$iu3NiӈMk8ȑ S4|C"7x^BvLhq X7;vY_">ICceh<;jFG̟ܝXm,[w\ɫ|񼪎d,\6/^`ޅV[E~҃YjPSKXYCK񋀂̈+F% 6h3 }%F{ԟ?^*.0?X\b]AO*]}R_08uК7\]sKBέEP1NF%}9mY\.0|G-@%9yul;uzb1J2_r&$>9@.T_'"л7ާ3 jڟag6[,Ҽ\o wi& Ɖ%J,Q"Q2J :[#0OfO~_{m0T+J1@=u]0ckUrS)#ـ1vfg!iB]^zW]M(jo?FOWUwc3BO <-l = vbUxu+fڹ;'Y\b(vME!;7Ӵ55ʓt5M7ّ2@Kru݈#vcG7E-O亂{M3XLIJVF_xxbX!K.h pQ4J]sɘUP_Ûi772&n>\:;!Y˫V4c<1o6B34όF[rJs.GfjL׫QqM^@],܁؂TtSD: [~s|L_ ݇BΔ#l?n>w1DڽX?SjHd ص˽ނ WNݻCG5Usa%K҉ !ibnWLKl _,Ϻr,/@G6޾CC5`ì'>ݳKtY5<4:6}1#CR=#u#Bϭդ#>r\0X;`1"ꠊRd|GZъ0_\cP^m|&t~u!D6rG>ӎ3p!i] $C7[c o4񀺾h0(巄;8lc*)އ&c.VPV~rj 67d?J\Qi/ܬFήby 9c`/ akApvJvqSìwQgh' >Պ;^踙8+o-1} -2;hB7cp֓Kz>̣O&}XdYPזB ,+)Sb[6##/1\-M ˶zB(J4:T{fɃ-WsNs*/)C9Fߟ].Y}c 4J t:cAcIa 9jhhv%a Ij =l}xR2:Ոɋ'=ʷsYBBō|t]Z10tBX[mґGjK 22jېtX\_UiNOj0f+ZzutBqֆ^5m#4Y }9LA)f]g4smT>w4)~ń UHmˊ33 dPܵlr1+N@Qh3TBx&WD)91h#Ls vDrUU#8Q?J5 ֵiC-6:WH@TŒ~tc,oK3d񞙂K[mx v}_H#vVx|]{-{H)ČCĖRhK;-+5= >`}*RAp8`)"]P'};Fpg6eXsFRXz㲄x8Jk4lFNX5c&5Յ&቟ϚUM kJbt/xTr Z7/TiLJ5x]p팳#Ҋmc]O4Y9:KUEYô`^0 }q9e/zU9<Xu_c`4Emd|sXp}ͩx(\$#Ѧ+ޤ֊%C̀w`ҠEcW~StfMͣG02𳰮F41.>k uiIE7G(ЮKm>Wt+"b"xVt|8GnP9K4O6r'ϖ&v>}Dd$6XG *,gpJD{#"%Ѓ5w~B)Ck7#rЍUOF4Q[| )z%*@y >'"71"4ymL>w)C-gFCW;X]@RLw: ˗(eRJS"J]g2ih{*^ձ畢}x`Egz 2j=~@cn];trNp%N*6oW Z8wks>˃ *]}VһO*7{ Ndu&v: $yB>/@t)oq"W}Ru؏t ܑɛh_$"*}O x -Z{k࿮vMXiUtPV`o\)VSgx3LK4T&UAkBK|۱ƪuT#k9E|ϞC #U:upW xmqbߍYxz1}iWG hv};I_^UVnJhO4q&P=eJ\h`\*-ex)bǽGq!i50/yYBgu!n',1Fحl[-m]`-UI/Fs0S싹/?9O>:/\'"̌52M+DO|}t=c^聆Y0i"d4f)UsP,  }㇉ .7RP8R|hݗrp:2B@ Pa"#YDHƷ2\ZAd˰ u(HIe1=*3t/["Cӷ(>=^1(-KL1i$_[M+_q#×򼍐 Oʟf}xe(F:Q"h)}6f\4ᇿ1|?'|IOut˜4> (?N(U3)Ͻ$*^ ]ˈWzb{UyR!g%$8LVM.oh*ս59/֖fAȘLq IcnphklG]!+2VYޥaqDpr6yHԂY=$Q<拫^>˔bg`ÆjV(]ժl:PajzUƖ\FQ*OU%\ˑoٹ mL{PnwD0;@K8KHvtb=EvfpcH}MQĻRc#Z'|0j.'tV`4ftctQ/:OͻIOPR\߯oXzuC%m6a͜2,1Oi(N/¨OPrk2&ro#Jp;\(Cĭ" ɲ \Ķ`kvDr+&㥟lZ7*휯P.șex9xQ)|$.TeL}>gʊﴦ!IY 6bCHauSa |OgTZO&^N;ڴcbbѿ5ٸ^r jUoX͉+F_S6G 9|߸Mgy"}iɅә3,VpE,Hil<^|sH',4N?cCB-GZd3G6c_$_oK:<+em ΑJtt%*ěHpXcTI! ھx4gV