Kerberos 5 Release 1.16.4

Kerberos 5 Release 1.16.4 is now available

The MIT Kerberos Team announces the availability of the krb5-1.16.4 release. The detached PGP signature is available without going through the download page, if you wish to verify the authenticity of a distribution you have obtained elsewhere.

Please see the README file for a more complete list of changes.

You may also see the current full list of fixed bugs tracked in our RT bugtracking system.

DES transition

The Data Encryption Standard (DES) is widely recognized as weak. The krb5-1.7 release contains measures to encourage sites to migrate away from using single-DES cryptosystems. Among these is a configuration variable that enables "weak" enctypes, which now defaults to "false" beginning with krb5-1.8.

Major changes in 1.16.4 (2019年12月11日)

This is a bug fix release.

Major changes in 1.16.3 (2019年01月07日)

This is a bug fix release.

Major changes in 1.16.2 (2018年11月01日)

This is a bug fix release.

Major changes in 1.16.1 (2018年05月03日)

This is a bug fix release.

Major changes in 1.16 (2017年12月05日)

Administrator experience
  • The KDC can match PKINIT client certificates against the "pkinit_cert_match" string attribute on the client principal entry, using the same syntax as the existing "pkinit_cert_match" profile option.
  • The ktutil addent command supports the "-k 0" option to ignore the key version, and the "-s" option to use a non-default salt string.
  • kpropd supports a --pid-file option to write a pid file at startup, when it is run in standalone mode.
  • The "encrypted_challenge_indicator" realm option can be used to attach an authentication indicator to tickets obtained using FAST encrypted challenge pre-authentication.
  • Localization support can be disabled at build time with the --disable-nls configure option.
Developer experience
  • The kdcpolicy pluggable interface allows modules control whether tickets are issued by the KDC.
  • The kadm5_auth pluggable interface allows modules to control whether kadmind grants access to a kadmin request.
  • The certauth pluggable interface allows modules to control which PKINIT client certificates can authenticate to which client principals.
  • KDB modules can use the client and KDC interface IP addresses to determine whether to allow an AS request.
  • GSS applications can query the bit strength of a krb5 GSS context using the GSS_C_SEC_CONTEXT_SASL_SSF OID with gss_inquire_sec_context_by_oid().
  • GSS applications can query the impersonator name of a krb5 GSS credential using the GSS_KRB5_GET_CRED_IMPERSONATOR OID with gss_inquire_cred_by_oid().
  • kdcpreauth modules can query the KDC for the canonicalized requested client principal name, or match a principal name against the requested client principal name with canonicalization.
Protocol evolution
  • The client library will continue to try pre-authentication mechanisms after most failure conditions.
  • The KDC will issue trivially renewable tickets (where the renewable lifetime is equal to or less than the ticket lifetime) if requested by the client, to be friendlier to scripts.
  • The client library will use a random nonce for TGS requests instead of the current system time.
  • For the RC4 string-to-key or PAC operations, UTF-16 is supported (previously only UCS-2 was supported).
  • When matching PKINIT client certificates, UPN SANs will be matched correctly as UPNs, with canonicalization.
User experience
  • Dates after the year 2038 are accepted (provided that the platform time facilities support them), through the year 2106.
  • Automatic credential cache selection based on the client realm will take into account the fallback realm and the service hostname.
  • Referral and alternate cross-realm TGTs will not be cached, avoiding some scenarios where they can be added to the credential cache multiple times.
  • A German translation has been added.
Code quality
  • The build is warning-clean under clang with the configured warning options.
  • The automated test suite runs cleanly under AddressSanitizer.

Retrieving Kerberos 5 Release 1.16.4

You may retrieve the Kerberos 5 Release 1.16.4 source from here. If you need to acquire the sources from some other distribution site, you may verify them against the detached PGP signature for krb5-1.16.


$Id: krb5-1.16.4.html,v 1.1 2019年12月12日 00:25:50 ghudson Exp $
MIT Kerberos [ home ] [ contact ]

AltStyle によって変換されたページ (->オリジナル) /