krb5 commit: Update features list for 1.22
ghudson at mit.edu
ghudson at mit.edu
Tue Aug 20 17:20:43 EDT 2024
https://github.com/krb5/krb5/commit/6cbd45486eb0b7814377a3864aaa298d171b3134
commit 6cbd45486eb0b7814377a3864aaa298d171b3134
Author: Greg Hudson <ghudson at mit.edu>
Date: Tue Aug 20 16:43:07 2024 -0400
Update features list for 1.22
doc/mitK5features.rst | 49 +++++++++++++++++++++++++++++++++++++++++++++++--
1 file changed, 47 insertions(+), 2 deletions(-)
diff --git a/doc/mitK5features.rst b/doc/mitK5features.rst
index 10effcf17..a3679354f 100644
--- a/doc/mitK5features.rst
+++ b/doc/mitK5features.rst
@@ -19,8 +19,8 @@ Quick facts
License - :ref:`mitK5license`
Releases:
- - Latest stable: https://web.mit.edu/kerberos/krb5-1.20/
- - Supported: https://web.mit.edu/kerberos/krb5-1.19/
+ - Latest stable: https://web.mit.edu/kerberos/krb5-1.22/
+ - Supported: https://web.mit.edu/kerberos/krb5-1.21/
- Release cycle: approximately 12 months
Supported platforms \/ OS distributions:
@@ -685,6 +685,51 @@ Release 1.21
- Improved the test framework's detection of memory errors in daemon
processes when used with asan.
+Release 1.21
+
+* User experience:
+
+ - The libdefaults configuration variable "request_timeout" can be
+ set to limit the total timeout for KDC requests. When making a
+ KDC request, the client will now wait indefinitely (or until the
+ request timeout has elapsed) on a KDC which accepts a TCP
+ connection, without contacting any additional KDCs. Clients will
+ make fewer DNS queries in some configurations.
+
+ - The realm configuration variable "sitename" can be set to cause
+ the client look for site-specific DNS records when making KDC
+ requests.
+
+* Developer experience:
+
+ - The profile library supports the modification of empty profiles
+ and the copying of modified profiles, making it possible to
+ construct an in-memory profile and pass it to
+ krb5_init_context_profile().
+
+ - GSS-API applications can pass the GSS_C_CHANNEL_BOUND flag to
+ gss_init_sec_context() to request strict enforcement of channel
+ bindings by the acceptor.
+
+* Protocol evolution:
+
+ - PKINIT has support for elliptic curve client certificates and for
+ ECDH key exchange.
+
+ - The IAKERB implementation has been changed to comply with the
+ standard.
+
+* Code quality:
+
+ - Old-style function declarations have been removed, to accomodate
+ compilers removing support for them.
+
+ - OSS-Fuzz support has been added to the project's continuous
+ integration infrastructure.
+
+ - GSS per-message token parsing code has been rewritten for improved
+ safety.
+
`Pre-authentication mechanisms`
- PW-SALT :rfc:`4120#section-5.2.7.3`
More information about the cvs-krb5
mailing list