krb5-1.15-beta1 is available
Wang Weijun
weijun.wang at oracle.com
Sat Oct 22 21:41:41 EDT 2016
Typo? http://web.mit.edu.ezproxyberklee.flo.org/kerberos/dist/testing.html shows "MIT Kerberos 5 Release 1.15 beta 2".
--Max
> On Oct 21, 2016, at 4:15 AM, Tom Yu <tlyu at mit.edu> wrote:
>
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> MIT krb5-1.15-beta1 is now available for download from
>
> http://web.mit.edu.ezproxyberklee.flo.org/kerberos/dist/testing.html
>
> The main MIT Kerberos web page is
>
> http://web.mit.edu.ezproxyberklee.flo.org/kerberos/
>
> Please send comments to the krbdev list. We plan for the final release
> to occur in about a month. The README file contains a more extensive
> list of changes.
>
> Major changes in 1.15
> =====================
>
> Administrator experience:
>
> * Add support to kadmin for remote extraction of current keys without
> changing them (requires a special kadmin permission that is excluded
> from the wildcard permission), with the exception of highly
> protected keys.
>
> * Add a lockdown_keys principal attribute to prevent retrieval of the
> principal's keys (old or new) via the kadmin protocol. In newly
> created databases, this attribute is set on the krbtgt and kadmin
> principals.
>
> * Restore recursive dump capability for DB2 back end, so sites can
> more easily recover from database corruption resulting from power
> failure events.
>
> * Add DNS auto-discovery of KDC and kpasswd servers from URI records,
> in addition to SRV records. URI records can convey TCP and UDP
> servers and master KDC status in a single DNS lookup, and can also
> point to HTTPS proxy servers.
>
> * Add support for password history to the LDAP back end.
>
> * Add support for principal renaming to the LDAP back end.
>
> * Use the getrandom system call on supported Linux kernels to avoid
> blocking problems when getting entropy from the operating system.
>
> Code quality:
>
> * Clean up numerous compilation warnings.
>
> * Remove various infrequently built modules, including some preauth
> modules that were not built by default.
>
> Developer experience:
>
> * Add support for building with OpenSSL 1.1.
>
> * Use SHA-256 instead of MD5 for (non-cryptographic) hashing of
> authenticators in the replay cache. This helps sites that must
> build with FIPS 140 conformant libraries that lack MD5.
>
> Protocol evolution:
>
> * Add support for the AES-SHA2 enctypes, which allows sites to conform
> to Suite B crypto requirements.
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1
>
> iQGcBAEBAgAGBQJYCSX1AAoJEKMvF/0AVcMFiLkL/Rc2kNbM7MdJUhBrNR88/YLZ
> hnqkp5C9fTXY3EoY/uitsGmJCkAFaCfP00IfYavtkWLD6QB8rq5DccOvPkvnNFsW
> iPDtp5NzUPcGiVwjsfpv9Y9kitkjmLFg2L5OSUOTLWQk1M4uDNp5xaVb9jMYBXSX
> 25BXSz6HGEVBKl37WaqIXqtiAWRHpUiT20gq5t6RsHkGQ5+QHraczMTPmLdMdcKX
> /PQuVAhaXGViEbBUO6nCx6WpAiR5DU/mtbWz1tAwB8yOzUKK7JKg3bQBtw2ex/+6
> ZPbdWl4aGOsY2WPItPmG3EshtfC8pKN11DP21Dd2sTQfgbGfBHjTa7z/2QE1a8bo
> ZGOLmbbmsBtu9kDLNVlMmC8EXSQghw6JhNnbzIFaqDqFPfRcF/vIPE1Wq5luMkE6
> k1j11yLmQgLqx2dVwidL1TUb6UYNuWOAGJG6a1mUtHwPESYsW69Jond728MfEc5s
> YHZeIV+rUPaLu9paAfUDdFItoQrDoCvWhtNqzExrBg==
> =i9Hw
> -----END PGP SIGNATURE-----
> _______________________________________________
> krbdev mailing list krbdev at mit.edu
> https://mailman-mit-edu.ezproxyberklee.flo.org/mailman/listinfo/krbdev
More information about the krbdev
mailing list