krb5-1.13 is released

Tom Yu tlyu at mit.edu
Wed Oct 15 20:50:07 EDT 2014


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

The MIT Kerberos Team announces the availability of MIT Kerberos 5
Release 1.13.  Please see below for a list of some major changes
included, or consult the README file in the source tree for a more
detailed list of significant changes.

RETRIEVING KERBEROS 5 RELEASE 1.13
==================================

You may retrieve the Kerberos 5 Release 1.13 source from the
following URL:

        http://web.mit.edu/kerberos/dist/

More information about the krb5-1.13 release is at:

        http://web.mit.edu/kerberos/krb5-1.13/

Further information about Kerberos 5 may be found at the following
URL:

        http://web.mit.edu/kerberos/

and at the MIT Kerberos Consortium web site:

        http://www.kerberos.org/


DES transition
==============

The Data Encryption Standard (DES) is widely recognized as weak.  The
krb5-1.7 release contains measures to encourage sites to migrate away
- From using single-DES cryptosystems.  Among these is a configuration
variable that enables "weak" enctypes, which defaults to "false"
beginning with krb5-1.8.

Major changes in 1.13 (2014-10-15)
==================================

Administrator experience:

* Add support for accessing KDCs via an HTTPS proxy server using the
  MS-KKDCP protocol.

* Add support for hierarchical incremental propagation, where slaves
  can act as intermediates between an upstream master and other
  downstream slaves.

* Add support for configuring GSS mechanisms using
  /etc/gss/mech.d/*.conf files in addition to /etc/gss/mech.

* Add support to the LDAP KDB module for binding to the LDAP server
  using SASL.

* The KDC listens for TCP connections by default.

* Fix a minor key disclosure vulnerability where using the "keepold"
  option to the kadmin randkey operation could return the old keys.
  [CVE-2014-5351]

User experience:

* Add client support for the Kerberos Cache Manager protocol. If the
  host is running a Heimdal kcm daemon, caches served by the daemon
  can be accessed with the KCM: cache type.

* When built on OS X 10.7 and higher, use "KCM:" as the default cache
  type, unless overridden by command-line options or krb5-config
  values.

Performance:

* Add support for doing unlocked database dumps for the DB2 KDC back
  end, which would allow the KDC and kadmind to continue accessing the
  database during lengthy database dumps.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQEVAwUBVD8WPxUCTNN0nXiJAQLrdAf/aormDh4JqMbvMHPD/w5JNrb+U5nO5Nsm
NeaK3qvqQa1tEe+3GMVIkUKfM7bUw+i9VWLORdPvFmzJE1oxcgCX/+eUrIfGJ1Yc
//88wfOrNA/u02KuVZKvnTZIuONrSucUHAU441O7C68EMPIfMZtigRWkaGlV5bsx
9Dxm3100XgQHTtfLo5ogTrq/L9K7yKK8Z8tfzRuj8x2r9cSoxU4B2jyjSuf+zeUc
n09aGjNeOqvAIW4ffyNom4zLjG6t9zXnEOyHIUEbS0ddOcKHqar/ugfWA9Mcou6e
nWB03v6wNXDhyJxldEnlZdkul939WEksXwPMppY6zkvB/MY4JsPPCg==
=VY6/
-----END PGP SIGNATURE-----



More information about the kerberos-announce mailing list