Skip to content
This repository

HTTPS clone URL

Subversion checkout URL

You can clone with HTTPS or Subversion.

Download ZIP

git-svn mirror of MIT krb5 anonsvn repository

branch: krb5-1-8

This branch is 127 commits ahead and 1285 commits behind krbldap

Fetching latest commit…

Octocat-spinner-32-eaf2f5

Cannot retrieve the latest commit at this time

Octocat-spinner-32 doc
Octocat-spinner-32 src
Octocat-spinner-32 NOTICE
Octocat-spinner-32 README
README
                   Kerberos Version 5, Release 1.8

                            Release Notes
                        The MIT Kerberos Team

Copyright and Other Notices
---------------------------

Copyright (C) 1985-2011 by the Massachusetts Institute of Technology
and its contributors.  All rights reserved.

Please see the file named NOTICE for additional notices.

MIT Kerberos is a project of the MIT Kerberos Consortium.  For more
information about the Kerberos Consortium, see http://kerberos.org/

For more information about the MIT Kerberos software, see
    http://web.mit.edu/kerberos/

People interested in participating in the MIT Kerberos development
effort should visit http://k5wiki.kerberos.org/

Building and Installing Kerberos 5
----------------------------------

The first file you should look at is doc/install-guide.ps; it contains
the notes for building and installing Kerberos 5.  The info file
krb5-install.info has the same information in info file format.  You
can view this using the GNU emacs info-mode, or by using the
standalone info file viewer from the Free Software Foundation.  This
is also available as an HTML file, install.html.

Other good files to look at are admin-guide.ps and user-guide.ps,
which contain the system administrator's guide, and the user's guide,
respectively.  They are also available as info files
kerberos-admin.info and krb5-user.info, respectively.  These files are
also available as HTML files.

If you are attempting to build under Windows, please see the
src/windows/README file.

Reporting Bugs
--------------

Please report any problems/bugs/comments using the krb5-send-pr
program.  The krb5-send-pr program will be installed in the sbin
directory once you have successfully compiled and installed Kerberos
V5 (or if you have installed one of our binary distributions).

If you are not able to use krb5-send-pr because you haven't been able
compile and install Kerberos V5 on any platform, you may send mail to
krb5-bugs@mit.edu.

Please keep in mind that unencrypted e-mail is not secure. If you need
to report a security vulnerability, or send sensitive information,
please PGP-encrypt it to krbcore-security@mit.edu.

You may view bug reports by visiting

    http://krbdev.mit.edu/rt/

and logging in as "guest" with password "guest".

DES transition
--------------

The krb5-1.8 release disables single-DES cryptosystems by default.  As
a result, you may need to add the libdefaults setting
"allow_weak_crypto = true" to communicate with existing Kerberos
infrastructures if they do not support stronger ciphers.

The Data Encryption Standard (DES) is widely recognized as weak.  The
krb5-1.7 release contains measures to encourage sites to migrate away
from using single-DES cryptosystems.  Among these is a configuration
variable that enables "weak" enctypes, which now defaults to "false"
beginning with krb5-1.8.  The krb5-1.8 release includes additional
measures to ease the transition away from single-DES.  These
additional measures include:

* enctype config enhancements (so you can do "DEFAULT +des", etc.)
* new API to allow applications (e.g. AFS) to explicitly reenable weak
  crypto
* easier kadmin history key changes

Major changes in 1.8.5
----------------------

This is primarily a bugfix release.

* Fix MITKRB5-SA-2011-006 KDC denial of service vulnerabilities
  [CVE-2011-1528 CVE-2011-1529 CVE-2011-4151].

krb5-1.8.5 changes by ticket ID
-------------------------------

6925    Memory leak in save_error_string_nocopy()
6926    work around Dejagnu failure on modern Tcl
6983    SA-2011-006 KDC denial of service [CVE-2011-1528 CVE-2011-1529
        CVE-2011-4151]
6984    modernize doc/Makefile somewhat
6991    fix tar invocation in mkrel

Major changes in 1.8.4
----------------------

This is primarily a bugfix release.

* Fix vulnerabilities:
  ** KDC uninitialized pointer crash [MITKRB5-SA-2010-006 CVE-2010-1322]
  ** kpropd denial of service [MITKRB5-SA-2011-001 CVE-2010-4022]
  ** KDC denial of service attacks [MITKRB5-SA-2011-002
     CVE-2011-0281 CVE-2011-0282 CVE-2011-0283]
  ** KDC double-free when PKINIT enabled [MITKRB5-SA-2011-003
     CVE-2011-0284]
  ** kadmind frees invalid pointer [MITKRB5-SA-2011-004 CVE-2011-0285]

* Interoperability:

  ** Correctly encrypt GSSAPI forwarded credentials using the session
     key, not a subkey.

  ** Set NT-SRV-INST on TGS principal names as expected by some
     Windows Server Domain Controllers.

  ** Don't reject AP-REQ messages if their PAC doesn't validate;
     suppress the PAC instead.

  ** Correctly validate HMAC-MD5 checksums that use DES keys

krb5-1.8.4 changes by ticket ID
-------------------------------

6701    syntax error in src/plugins/kdb/ldap/libkdb_ldap/kerberos.ldif
6764    has_mandatory_for_kdc_authdata checks only first authdata element
6768    GSSAPI forwarded credentials must be encrypted in session key
6790    skip invalid enctypes instead of erroring out in
        krb5_dbe_def_search_enctype
6797    CVE-2010-1322 KDC uninitialized pointer crash in authorization
        data handling (MITKRB5-SA-2010-006)
6798    set NT-SRV-INST on TGS principal names
6833    SA-2010-007 Checksum vulnerabilities (CVE-2010-1324 and others)
6843    handle MS PACs that lack server checksum
6853    Make gss_krb5_set_allowable_enctypes work for the acceptor (1.8 pullup)
6861    kpropd denial of service [MITKRB5-SA-2011-001 CVE-2010-4022]
6862    KDC denial of service attacks [MITKRB5-SA-2011-002
        CVE-2011-0281 CVE-2011-0282]
6876    hmac-md5 checksum doesn't work with DES keys
6877    Don't reject AP-REQs based on PACs
6882    KDC double-free when PKINIT enabled [MITKRB5-SA-2011-003 CVE-2011-0284]
6900    kadmind frees invalid pointer [MITKRB5-SA-2011-004 CVE-2011-0285]

Major changes in 1.8.3
----------------------

* Behavior Change:

    GSS-API context expiration -- the gss_wrap and gss_unwrap
    functions no longer check for ticket expiration.  Applications
    wishing to enforce ticket lifetimes should check using the
    gss_inquire_context function.  The previous behavior of checking
    for ticket expiration produced results that were not expected by
    application developers, and could lead to poor user experience.

* Fix an interoperability issue when the Microsoft HMAC-MD5 checksum
  type was used with non-RC4 keys.

* Fix an interoperability issue with ephemeral Diffie-Hellman key
  exchange in PKINIT that would happen for less than 1% of
  transactions.

krb5-1.8.3 changes by ticket ID
-------------------------------

6345    no kdb5_util stash equivalent with LDAP database
6738    PKINIT DH exchange occasionally produces mismatch
6739    Behavior change: gssapi context expiration
6740    kadmin ktadd may display wrong name of default keytab
6744    only test t_locate_kdc if known-good DNS name is present
6745    Add correct error table when initializing gss-krb5
6750    krb5kdc doesn't parse the -P command-line option correctly
6751    Allow Microsoft HMAC-MD5 checksum types to use non-RC4 keys

Major changes in 1.8.2
----------------------

This is primarily a bugfix release.

* Fix vulnerabilities:
  ** CVE-2010-1320 KDC double free caused by ticket renewal
     (MITKRB5-SA-2010-004)
  ** CVE-2010-1321 GSS-API lib null pointer deref (MITKRB5-SA-2010-005)

* Allow numeric IPv6 addresses for configuring KDC locations.

krb5-1.8.2 changes by ticket ID
-------------------------------

6562    kinit not working if kdc is configured with numerical IPv6 address
6696    gss_accept_sec_context doesn't produce error tokens
6697    segfault caused by dlerror returning NULL
6698    kproplog displays incorrect iprop timestamps on 64-bit platforms
6702    CVE-2010-1320 KDC double free caused by ticket renewal
        (MITKRB5-SA-2010-004)
6711    memory leak in process_tgs_req in r23724
6718    Make KADM5_FAIL_AUTH_COUNT_INCREMENT more robust with LDAP
6722    Error handling bug in krb5_init_creds_init()
6725    CVE-2010-1321 GSS-API lib null pointer deref (MITKRB5-SA-2010-005)
6726    SPNEGO doesn't interoperate with Windows 2000
6730    kdc_tcp_ports not documented in kdc.conf.M
6734    FAST negotiation could erroneously succeed

Major changes in 1.8.1
----------------------

This is primarily a bugfix release.

* MITKRB5-SA-2010-002 CVE-2010-0628 denial of service in SPNEGO

* Support IPv6 in kpasswd client.

* Fix an authorization data type number assignment that conflicted
  with an undocumented Microsoft usage.

krb5-1.8.1 changes by ticket ID
-------------------------------

6661    [RFE] properly support IPv6 in kpasswd
6668    Two problems in kadm5_get_principal mask handling
6674    memory leak in SPNEGO
6676    Ignore improperly encoded signedpath AD elements
6678    use of freed memory in gss_import_sec_context error path
6680    the "ticket_lifetime" setting isn't documented
6681    krb5_get_init_creds_password() can crash with NULL options and
        expired keys
6683    kpasswd doesn't guess the client principal name correctly
        without a ccache
6685    handle NT_SRV_INST in service principal referrals
6687    Change KRB5_AUTHDATA_SIGNTICKET from 142 to 512
6689    krb5_typed_data not castable to krb5_pa_data on 64-bit MacOSX
6690    MITKRB5-SA-2010-002 CVE-2010-0628 denial of service in SPNEGO
6693    Fix backwards flag output in krb5_init_creds_step()

Major changes in 1.8
--------------------

The krb5-1.8 release contains a large number of changes, featuring
improvements in the following broad areas:

* Code quality
* Developer experience
* Performance
* End-user experience
* Administrator experience
* Protocol evolution

Code quality:

* Move toward test-driven development -- new features have test code,
  or at least written testing procedures.

* Remove applications to a separate distribution to simplify
  independent maintenance.

* Increase conformance to coding style

  + "The great reindent"

  + Selective refactoring

Developer experience:

* Crypto modularity -- vendors can more easily substitute their own
  crypto implementations, which might be hardware-accelerated or
  validated to FIPS 140, for the builtin crypto implementation that
  has historically shipped as part of MIT Kerberos.  Currently, only
  an OpenSSL provider is included, but others are planned for the
  future.

* Move toward improved KDB interface

* Improved API for verifying and interrogating authorization data

Performance:

* Investigate and remedy repeatedly-reported performance bottlenecks.

* Encryption performance -- new crypto API with opaque key structures,
  to allow for optimizations such as caching of derived keys

End-user experience:

* Reduce DNS dependence by implementing an interface that allows
  client library to track whether a KDC supports service principal
  referrals.

Administrator experience:

* Disable DES by default -- this reduces security exposure from using
  an increasingly insecure cipher.

* More versatile crypto configuration, to simplify migration away from
  DES -- new configuration syntax to allow inclusion and exclusion of
  specific algorithms relative to a default set.

* Account lockout for repeated login failures -- mitigates online
  password guessing attacks, and helps with some enterprise regulatory
  compliance.

* Bridge layer to allow Heimdal HDB modules to act as KDB backend
  modules.  This provides a migration path from a Heimdal to an MIT
  KDC.

Protocol evolution:

* FAST enhancements -- preauthentication framework enhancements to
  allow a client to securely negotiate the use of FAST with a KDC of
  unknown capabilities.

* Microsoft Services for User (S4U) compatibility: S4U2Self, also
  known as "protocol transition", allows for service to ask a KDC for
  a ticket to themselves on behalf of a client authenticated via a
  different means; S4U2Proxy allows a service to ask a KDC for a
  ticket to another service on behalf of a client.

* Anonymous PKINIT -- allows the use of public-key cryptography to
  anonymously authenticate to a realm

* Support doing constrained delegation similar to Microsoft's
  S4U2Proxy without the use of the Windows PAC.  This functionality
  uses a protocol compatible with Heimdal.

krb5-1.8 changes by ticket ID
-----------------------------

5468    delete kadmin v1 support
6206    new API for storing extra per-principal data in ccache
6434    krb5_cc_resolve() will crash if a null name param is provided
6454    Make krb5_mkt_resolve error handling work
6510    Restore limited support for static linking
6539    Enctype list configuration enhancements
6546    KDB should use enctype of stashed master key
6547    Modify kadm5 initializers to accept krb5 contexts
6563    Implement s4u extensions
6564    s4u extensions integration broke test suite...
6565    HP-UX IA64 wrong endian
6572    Implement GSS naming extensions and authdata verification
6576    Implement new APIs to allow improved crypto performance
6577    Account lockout for repeated login failures
6578    Heimdal DB bridge plugin for KDC back end
6580    Constrained delegation without PAC support
6582    Memory leak in _kadm5_init_any introduced with ipropd
6583    Unbundle applications into separate repository
6586    libkrb5 support for non-blocking AS requests
6590    allow testing even if name->addr->name mapping doesn't work
6591    fix slow behavior on Mac OS X with link-local addresses
6592    handle negative enctypes better
6593    Remove dependency on /bin/csh in test suite
6595    FAST (preauth framework) negotiation
6597    Add GSS extensions to store credentials, generate random bits
6598    gss_init_sec_context potential segfault
6599    memory leak in krb5_rd_req_decrypt_tkt_part
6600    gss_inquire_context cannot handle no target name from mechanism
6601    gsssspi_set_cred_option cannot handle mech specific option
6603    issues with SPNEGO
6605    PKINIT client should validate SAN for TGS, not service principal
6606    allow testing when offline
6607    anonymous PKINIT
6616    Fix spelling and hyphen errors in man pages
6618    Support optional creation of PID files for krb5kdc and kadmind
6620    kdc_supported_enctypes does nothing; eradicate mentions thereof
6621    disable weak crypto by default
6622    kinit_fast fails if weak enctype is among client principal keys
6623    Always treat anonymous as preauth required
6624    automated tests for anonymous pkinit
6625    yarrow code does not initialize keyblock enctype and uses
        unitialized value
6626    Restore interoperability with 1.6 addprinc -randkey
6627    Set enctype in crypto_tests to prevent memory leaks
6628    krb5int_dk_string_to_key fails to set enctype
6629    krb5int_derive_key results in cache with uninitialized values
6630    krb5int_pbkdf2_hmac_sha1 fails to set enctype on keyblock
6632    Simplify and fix FAST check for keyed checksum type
6634    Use keyed checksum type for DES FAST
6640    Make history key exempt from permitted_enctypes
6642    Add test program for decryption of overly short buffers
6643    Problem with krb5 libcom_err vs. system libcom_err
6644    Change basename of libkadm5 libraries to avoid Heimdal conflict
6645    Add krb5_allow_weak_crypto API
6648    define MIN() in lib/gssapi/krb5/prf.c
6649    Get rid of kdb_ext.h and allow out-of-tree KDB plugins
6651    Handle migration from pre-1.7 databases with master key
        kvno != 1 (1.8 pullup)
6652    Make decryption of master key list more robust
6653    set_default_enctype_var should filter not reject weak enctypes
6654    Fix greet_server build
6655    Fix cross-realm handling of AD-SIGNEDPATH
6656    krb5int_fast_free_state segfaults if state is null
6657    enc_padata can include empty sequence
6658    Implement gss_set_neg_mechs
6659    Additional memory leaks in kdc
6660    Minimal support for updating history key
6662    MITKRB5-SA-2010-001 CVE-2010-0283 KDC denial of service
6663    update mkrel to deal with changed source layout
6665    Fix cipher state chaining in OpenSSL back end
6669    doc updates for allow_weak_crypto

Acknowledgements
----------------

Past and present Sponsors of the MIT Kerberos Consortium:

    Apple
    Carnegie Mellon University
    Centrify Corporation
    Columbia University
    Cornell University
    The Department of Defense of the United States of America (DoD)
    Fidelity Investments
    Google
    Iowa State University
    MIT
    Michigan State University
    Microsoft
    The National Aeronautics and Space Administration
        of the United States of America (NASA)
    Network Appliance (NetApp)
    Nippon Telephone and Telegraph (NTT)
    Oracle
    Pennsylvania State University
    Red Hat
    Stanford University
    TeamF1, Inc.
    The University of Alaska
    The University of Michigan
    The University of Pennsylvania

Past and present members of the Kerberos Team at MIT:

    Danilo Almeida
    Jeffrey Altman
    Justin Anderson
    Richard Basch
    Mitch Berger
    Jay Berkenbilt
    Andrew Boardman
    Bill Bryant
    Steve Buckley
    Joe Calzaretta
    John Carr
    Mark Colan
    Don Davis
    Alexandra Ellwood
    Carlos Garay
    Dan Geer
    Nancy Gilman
    Matt Hancher
    Thomas Hardjono
    Sam Hartman
    Paul Hill
    Marc Horowitz
    Eva Jacobus
    Miroslav Jurisic
    Barry Jaspan
    Geoffrey King
    Kevin Koch
    John Kohl
    HaoQi Li
    Jonathan Lin
    Peter Litwack
    Scott McGuire
    Steve Miller
    Kevin Mitchell
    Cliff Neuman
    Paul Park
    Ezra Peisach
    Chris Provenzano
    Ken Raeburn
    Jon Rochlis
    Jeff Schiller
    Jen Selby
    Robert Silk
    Bill Sommerfeld
    Jennifer Steiner
    Ralph Swick
    Brad Thompson
    Harry Tsai
    Zhanna Tsitkova
    Ted Ts'o
    Marshall Vale
    Tom Yu

The following external contributors have provided code, patches, bug
reports, suggestions, and valuable resources:

    Brandon Allbery
    Russell Allbery
    Brian Almeida
    Michael B Allen
    Heinz-Ado Arnolds
    Derek Atkins
    David Bantz
    Alex Baule
    Arlene Berry
    Jeff Blaine
    Radoslav Bodo
    Emmanuel Bouillon
    Michael Calmer
    Julien Chaffraix
    Ravi Channavajhala
    Srinivas Cheruku
    Leonardo Chiquitto
    Howard Chu
    Andrea Cirulli
    Christopher D. Clausen
    Kevin Coffman
    Simon Cooper
    Sylvain Cortes
    Nalin Dahyabhai
    Dennis Davis
    Mark Deneen
    Roland Dowdeswell
    Jason Edgecombe
    Mark Eichin
    Shawn M. Emery
    Douglas E. Engert
    Peter Eriksson
    Juha Erkkilä
    Ronni Feldt
    Bill Fellows
    JC Ferguson
    William Fiveash
    Ákos Frohner
    Marcus Granado
    Scott Grizzard
    Helmut Grohne
    Steve Grubb
    Philip Guenther
    Dominic Hargreaves
    Jakob Haufe
    Jeff Hodges
    Love Hörnquist Åstrand
    Ken Hornstein
    Henry B. Hotz
    Luke Howard
    Jakub Hrozek
    Shumon Huque
    Jeffrey Hutzelman
    Wyllys Ingersoll
    Holger Isenberg
    Pavel Jindra
    Joel Johnson
    Mikkel Kruse
    Volker Lendecke
    Jan iankko Lieskovsky
    Kevin Longfellow
    Ryan Lynch
    Nathaniel McCallum
    Greg McClement
    Cameron Meadors
    Franklyn Mendez
    Markus Moeller
    Kyle Moffett
    Paul Moore
    Keiichi Mori
    Zbysek Mraz
    Edward Murrell
    Nikos Nikoleris
    Felipe Ortega
    Andrej Ota
    Dmitri Pal
    Javier Palacios
    Ezra Peisach
    W. Michael Petullo
    Mark Phalan
    Jonathan Reams
    Robert Relyea
    Martin Rex
    Jason Rogers
    Mike Roszkowski
    Guillaume Rousse
    Tom Shaw
    Peter Shoults
    Simo Sorce
    Michael Spang
    Michael Ströder
    Bjørn Tore Sund
    Rathor Vipin
    Jorgen Wahlsten
    Max (Weijun) Wang
    John Washington
    Marcus Watts
    Simon Wilkinson
    Nicolas Williams
    Ross Wilper
    Xu Qiang
    Hanz van Zijst

The above is not an exhaustive list; many others have contributed in
various ways to the MIT Kerberos development effort over the years.
Other acknowledgments (for bug reports and patches) are in the
doc/CHANGES file.
Something went wrong with that request. Please try again.