krb5-1.19-beta2 is available
Greg Hudson
ghudson at mit.edu
Mon Jan 11 13:00:57 EST 2021
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
MIT krb5-1.19-beta2 is now available for download from
https://web.mit.edu/kerberos/dist/testing.html
The main MIT Kerberos web page is
https://web.mit.edu/kerberos/
Please send comments to the krbdev list. We plan for the final
release to occur in about one month. The README file contains a more
extensive list of changes.
Major changes in 1.19
- ---------------------
Administrator experience:
* When a client keytab is present, the GSSAPI krb5 mech will refresh
credentials even if the current credentials were acquired manually.
* It is now harder to accidentally delete the K/M entry from a KDB.
Developer experience:
* gss_acquire_cred_from() now supports the "password" and "verify"
options, allowing credentials to be acquired via password and
verified using a keytab key.
* When an application accepts a GSS security context, the new
GSS_C_CHANNEL_BOUND_FLAG will be set if the initiator and acceptor
both provided matching channel bindings.
* Added the GSS_KRB5_NT_X509_CERT name type, allowing S4U2Self
requests to identify the desired client principal by certificate.
* PKINIT certauth modules can now cause the hw-authent flag to be set
in issued tickets.
* The krb5_init_creds_step() API will now issue the same password
expiration warnings as krb5_get_init_creds_password().
Protocol evolution:
* Added client and KDC support for Microsoft's Resource-Based
Constrained Delegation, which allows cross-realm S4U2Proxy requests.
A third-party database module is required for KDC support.
* kadmin/admin is now the preferred server principal name for kadmin
connections, and the host-based form is no longer created by
default. The client will still try the host-based form as a
fallback.
* Added client and server support for Microsoft's KERB_AP_OPTIONS_CBT
extension, which causes channel bindings to be required for the
initiator if the acceptor provided them. The client will send this
option if the client_aware_gss_bindings profile option is set.
User experience:
* kinit will now issue a warning if the des3-cbc-sha1 encryption type
is used in the reply. This encryption type will be deprecated and
removed in future releases.
* Added kvno flags --out-cache, --no-store, and --cached-only
(inspired by Heimdal's kgetcred).
-----BEGIN PGP SIGNATURE-----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=k1Q5
-----END PGP SIGNATURE-----
More information about the krbdev
mailing list