krb5-1.9 is released
tlyu at MIT.EDU
Wed Dec 22 17:03:08 EST 2010
-----BEGIN PGP SIGNED MESSAGE-----
The MIT Kerberos Team announces the availability of MIT Kerberos 5
Release 1.9. Please see below for a list of some major changes
included, or consult the README file in the source tree for a more
detailed list of significant changes.
RETRIEVING KERBEROS 5 RELEASE 1.9
You may retrieve the Kerberos 5 Release 1.9 source from the
The homepage for the krb5-1.9 release is:
Further information about Kerberos 5 may be found at the following
and at the MIT Kerberos Consortium web site:
The Data Encryption Standard (DES) is widely recognized as weak. The
krb5-1.7 release contains measures to encourage sites to migrate away
- From using single-DES cryptosystems. Among these is a configuration
variable that enables "weak" enctypes, which defaults to "false"
beginning with krb5-1.8.
Major changes in 1.9
Additional background information on these changes may be found at
* Fix MITKRB5-SA-2010-007 checksum vulnerabilities (CVE-2010-1324 and
* Add a Python-based testing framework.
* Perform DAL cleanup.
* Add NSS crypto back end.
* Improve PRNG modularity.
* Add a Fortuna-like PRNG back end.
* Account lockout performance improvements -- allow disabling of some
account lockout functionality to reduce the number of write
operations to the database during authentication
* Add support for multiple KDC worker processes.
* Add Trace logging support to ease the diagnosis of configuration
* Add support for purging old keys (e.g. from "cpw -randkey -keepold").
* Add plugin interface for password sync -- based on proposed patches
by Russ Allbery that support his krb5-sync package
* Add plugin interface for password quality checks -- enables
pluggable password quality checks similar to Russ Allbery's
* Add a configuration file validator script.
* Add KDC support for SecurID preauthentication -- this is the old
SAM-2 protocol, implemented to support existing deployments, not the
in-progress FAST-OTP work.
* Add "cheat" capability for kinit when running on a KDC host.
* Add support for IAKERB -- a mechanism for tunneling Kerberos KDC
transactions over GSS-API, enabling clients to authenticate to
services even when the clients cannot directly reach the KDC that
serves the services.
* Add support for Camellia encryption (experimental; disabled by
* Add GSS-API support for implementors of the SASL GS2 bridge
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.8 (SunOS)
-----END PGP SIGNATURE-----
kerberos-announce mailing list
kerberos-announce at mit.edu
More information about the krbdev