-
Notifications
You must be signed in to change notification settings - Fork 371
Add RFC 5929 channel binding support for SSPI client #565
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
I'm currently on vacation and don't have quick access to an Active Directory to test this. I will once I'm back or find the time to set up an AD quickly myself. I would appreciate it if others would review the changes and provide feedback 😄 |
|
Alex merged in alexbrainman/sspi#18 now, so I have updated the go.mod accordingly. For anyone wanting to play around with this, microsoft has a support page where they describe what registry entry and values that configurates the active directory server to use channel binding tokens. Before the changes in this PR and the one in the |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM.
Thank you for your PR ❤️
This PR relates to: alexbrainman/sspi#18
This PR should also not be merged before above PR is merged since it is strictly dependant on those changes.
In newer microsoft active directory versions, channel binding token is on by default, causing clients to fail to authorize.
These changes gives an option to enable the security context to be updated with a channel binding token.
I have tested manually against active directory servers that have this feature on and off, and after these changes along with above PR, I was able to connect and authorize as usual.
It is hard to write tests for things like this that talks to the operating system, but any pointers to how I can improve my tests would be appreciated, otherwise I hope this us up to the standard of the lib in general.