krb5 commit: Update features list for 1.15
Tom Yu
tlyu at mit.edu
Mon Oct 24 14:57:51 EDT 2016
https://github.com/krb5/krb5/commit/6872044bb52fdbbcbb965fe5dcb3e1da2755ae82
commit 6872044bb52fdbbcbb965fe5dcb3e1da2755ae82
Author: Tom Yu <tlyu at mit.edu>
Date: Mon Oct 24 14:05:41 2016 -0400
Update features list for 1.15
ticket: 8510 (new)
tags: pullup
target_version: 1.15-next
doc/mitK5features.rst | 56 +++++++++++++++++++++++++++++++++++++++++++++---
1 files changed, 52 insertions(+), 4 deletions(-)
diff --git a/doc/mitK5features.rst b/doc/mitK5features.rst
index cdcb04f..b4e4b8b 100644
--- a/doc/mitK5features.rst
+++ b/doc/mitK5features.rst
@@ -19,8 +19,8 @@ Quick facts
License - :ref:`mitK5license`
Releases:
- - Latest stable: http://web.mit.edu/kerberos/krb5-1.14/
- - Supported: http://web.mit.edu/kerberos/krb5-1.13/
+ - Latest stable: http://web.mit.edu/kerberos/krb5-1.15/
+ - Supported: http://web.mit.edu/kerberos/krb5-1.14/
- Release cycle: 9 -- 12 months
Supported platforms \/ OS distributions:
@@ -80,8 +80,6 @@ Starting from release 1.8:
`Heimdal`
-* Support for reading Heimdal database starting from release 1.8
-
* Support for KCM credential cache starting from release 1.13
Feature list
@@ -261,6 +259,56 @@ Release 1.14
full resync, and do not require two full resyncs after the master
KDC's log file is reset.
+Release 1.15
+
+* Administrator experience:
+
+ - Add support to kadmin for remote extraction of current keys
+ without changing them (requires a special kadmin permission that
+ is excluded from the wildcard permission), with the exception of
+ highly protected keys.
+
+ - Add a lockdown_keys principal attribute to prevent retrieval of
+ the principal's keys (old or new) via the kadmin protocol. In
+ newly created databases, this attribute is set on the krbtgt and
+ kadmin principals.
+
+ - Restore recursive dump capability for DB2 back end, so sites can
+ more easily recover from database corruption resulting from power
+ failure events.
+
+ - Add DNS auto-discovery of KDC and kpasswd servers from URI
+ records, in addition to SRV records. URI records can convey TCP
+ and UDP servers and master KDC status in a single DNS lookup, and
+ can also point to HTTPS proxy servers.
+
+ - Add support for password history to the LDAP back end.
+
+ - Add support for principal renaming to the LDAP back end.
+
+ - Use the getrandom system call on supported Linux kernels to avoid
+ blocking problems when getting entropy from the operating system.
+
+* Code quality:
+
+ - Clean up numerous compilation warnings.
+
+ - Remove various infrequently built modules, including some preauth
+ modules that were not built by default.
+
+* Developer experience:
+
+ - Add support for building with OpenSSL 1.1.
+
+ - Use SHA-256 instead of MD5 for (non-cryptographic) hashing of
+ authenticators in the replay cache. This helps sites that must
+ build with FIPS 140 conformant libraries that lack MD5.
+
+* Protocol evolution:
+
+ - Add support for the AES-SHA2 enctypes, which allows sites to
+ conform to Suite B crypto requirements.
+
`Pre-authentication mechanisms`
- PW-SALT :rfc:`4120#section-5.2.7.3`
More information about the cvs-krb5
mailing list