krb5 commit: Update features list for 1.22 (again)

ghudson at mit.edu ghudson at mit.edu
Mon May 5 17:55:34 EDT 2025


https://github.com/krb5/krb5/commit/5cf58c55fd84ea648b08109911d1fa3bf8c3a767
commit 5cf58c55fd84ea648b08109911d1fa3bf8c3a767
Author: Greg Hudson <ghudson at mit.edu>
Date:   Fri May 2 17:14:02 2025 -0400

    Update features list for 1.22 (again)

 doc/mitK5features.rst | 40 +++++++++++++++++++++++++++++-----------
 1 file changed, 29 insertions(+), 11 deletions(-)

diff --git a/doc/mitK5features.rst b/doc/mitK5features.rst
index a3679354f..e260e8e08 100644
--- a/doc/mitK5features.rst
+++ b/doc/mitK5features.rst
@@ -685,7 +685,7 @@ Release 1.21
   - Improved the test framework's detection of memory errors in daemon
     processes when used with asan.
 
-Release 1.21
+Release 1.22
 
 * User experience:
 
@@ -697,11 +697,25 @@ Release 1.21
     make fewer DNS queries in some configurations.
 
   - The realm configuration variable "sitename" can be set to cause
-    the client look for site-specific DNS records when making KDC
+    the client to query site-specific DNS records when making KDC
     requests.
 
+* Administrator experience:
+
+  - Principal aliases are supported in the DB2 and LMDB KDB modules
+    and in the kadmin protocol.  (The LDAP KDB module has supported
+    aliases since release 1.7.)
+
+  - UNIX domain sockets are supported for the Kerberos and kpasswd
+    protocols.
+
+  - systemd socket activation is supported for krb5kdc and kadmind.
+
 * Developer experience:
 
+  - KDB modules can be be implemented in terms of other modules using
+    the new krb5_db_load_module() function.
+
   - The profile library supports the modification of empty profiles
     and the copying of modified profiles, making it possible to
     construct an in-memory profile and pass it to
@@ -713,21 +727,25 @@ Release 1.21
 
 * Protocol evolution:
 
-  - PKINIT has support for elliptic curve client certificates and for
-    ECDH key exchange.
+  - The PKINIT preauth module supports elliptic curve client
+    certificates, ECDH key exchange, and the Microsoft paChecksum2
+    field.
+
+  - The IAKERB implementation has been changed to comply with the most
+    recent draft standard and to support realm discovery.
 
-  - The IAKERB implementation has been changed to comply with the
-    standard.
+  - Message-Authenticator is supported in the RADIUS implementation
+    used by the OTP kdcpreauth module.
 
 * Code quality:
 
-  - Old-style function declarations have been removed, to accomodate
-    compilers removing support for them.
+  - Removed old-style function declarations, to accomodate compilers
+    which have removed support for them.
 
-  - OSS-Fuzz support has been added to the project's continuous
-    integration infrastructure.
+  - Added OSS-Fuzz to the project's continuous integration
+    infrastructure.
 
-  - GSS per-message token parsing code has been rewritten for improved
+  - Rewrote the GSS per-message token parsing code for improved
     safety.
 
 `Pre-authentication mechanisms`


More information about the cvs-krb5 mailing list