krb5-1.12-beta2 is available

Tom Yu tlyu at MIT.EDU
Wed Nov 27 17:51:23 EST 2013


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

MIT krb5-1.12-beta2 is now available for download from

         http://web.mit.edu/kerberos/dist/testing.html

The main MIT Kerberos web page is

         http://web.mit.edu/kerberos/

Please send comments to the krbdev list.  The final release will
probably occur in mid-December.  No further source code changes are
planned before the final krb5-1.12 release.  (Some documentation
changes may occur.)  The README file contains a more extensive list of
changes.

Major changes in 1.12
=====================
Additional background information on these changes may be found at

    http://k5wiki.kerberos.org/wiki/Release_1.12

and

    http://k5wiki.kerberos.org/wiki/Category:Release_1.12_projects

Developer experience:

* Add a plugin interface to control krb5_aname_to_localname and
  krb5_kuserok behavior.

* Add a plugin interface to control hostname-to-realm mappings and the
  default realm.

* Add GSSAPI extensions for constructing MIC tokens using IOV lists.

Administrator experience:

* Principal entries may now refer to the names of policies which do
  not exist as policy objects in the database.  Policy objects may now
  be deleted whether or not principals reference their names.  A
  principal which references a nonexistent policy name will behave as
  if it does not reference a policy.

* Add support for having no long-term keys for a principal. This can
  be useful if the principal is only intended to be used with PKINIT
  or OTP preauthentication.

* Add collection support to the KEYRING credential cache type on
  Linux, and add support for persistent user keyrings and larger
  credentials on systems which support them.

* Add a FAST OTP preauthentication module for the KDC which uses
  RADIUS to validate OTP token values.

* Add an experimental pluggable interface for auditing KDC
  processing. This interface may change in a backwards-incompatible
  way in a future release.

Performance:

* The AES-based encryption types will use AES-NI instructions when
  possible for improved performance.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (SunOS)

iQEVAwUBUpZ3bxUCTNN0nXiJAQLy9Qf/XsDCqWdkgrUPEdEAmfiKm9GKkJIUjZr5
I11naEkb462nfT4noINUmL9gnbmtzVv522y8EzeKkz6hFnmuZcvjB7Us+2mTq3GX
xvoQard8p0u0zVps/SPxh0mfN1W/MyH+8j30GzhYy+M7YbKz5hOKAKCskBTNUU3t
tAD70uJNB5/Tvc+rnTObxIhTSuubaoo6Yx5+wgqDNeMhkBsCIWWsxET2rvxSpp6k
066SeBG2fhS8ktM5y9dx2ehaNx8CXQ8R7df7CB+xzAIwSeXImaq8Cgh2ReMvtkOV
i9H9M1l8iywLTRBai2ZOCbEoCKxSwyGhOvKBFuC7w9HCnxkROcX/bQ==
=I3fP
-----END PGP SIGNATURE-----


More information about the krbdev mailing list