aboutsummaryrefslogtreecommitdiff
path: root/security/krb5-118
Commit message (Collapse)AuthorAgeFilesLines
* all: Remove all other $FreeBSD keywords.Mathieu Arnold2021-04-062-3/+0
|
* Remove # $FreeBSD$ from Makefiles.Mathieu Arnold2021-04-061-1/+0
|
* Update 1.18.2 --> 1.18.3Cy Schubert2020-11-182-4/+4
| | | | Notes: svn path=/head/; revision=555619
* Update 1.18.1 --> 1.18.2Cy Schubert2020-05-222-4/+4
| | | | | | | | | | | | | | | | | | | | This is a bug fix release. * Fix a SPNEGO regression where an acceptor using the default credential would improperly filter mechanisms, causing a negotiation failure. * Fix a bug where the KDC would fail to issue tickets if the local krbtgt principal's first key has a single-DES enctype. * Add stub functions to allow old versions of OpenSSL libcrypto to link against libkrb5. * Fix a NegoEx bug where the client name and delegated credential might not be reported. Notes: svn path=/head/; revision=536249
* Update 1.18 --> 1.18.1Cy Schubert2020-04-142-4/+4
| | | | Notes: svn path=/head/; revision=531718
* Fix build with libressl.Cy Schubert2020-02-211-0/+11
| | | | | | | | | | | The new softpkcs11 test makes explicit OpenSSL calls which are unsupported in LibreSSL. Remove this one test to allow krb5-118 to build with libressl. PR: 244249 Notes: svn path=/head/; revision=526600
* Pacify portlint.Mark Linimon2020-02-191-5/+5
| | | | | | | Approved by: portmgr (tier-2 blanket), followup Notes: svn path=/head/; revision=526496
* Add compiler:c++11-lang to USES to fix build on GCC-based systems:Mark Linimon2020-02-191-1/+1
| | | | | | | | | edwards25519_fiat.h:14: error: expected '=', ',', ';', 'asm' or '__attribute__' before 'fiat_25519_int128' Approved by: portmgr (tier-2 blanket) Notes: svn path=/head/; revision=526494
* Welcome the new KRB5 1.18 (krb5-118)Cy Schubert2020-02-1914-0/+615
In addition, deprecate krb5-116 to retire one year after the release of krb5-118: Feb 12, 2021. Major changes in 1.18 (2020-02-12) ================================== Administrator experience: * Remove support for single-DES encryption types. * Change the replay cache format to be more efficient and robust. Replay cache filenames using the new format end with ".rcache2" by default. * setuid programs will automatically ignore environment variables that normally affect krb5 API functions, even if the caller does not use krb5_init_secure_context(). * Add an "enforce_ok_as_delegate" krb5.conf relation to disable credential forwarding during GSSAPI authentication unless the KDC sets the ok-as-delegate bit in the service ticket. * Use the permitted_enctypes krb5.conf setting as the default value for default_tkt_enctypes and default_tgs_enctypes. Developer experience: * Implement krb5_cc_remove_cred() for all credential cache types. * Add the krb5_pac_get_client_info() API to get the client account name from a PAC. Protocol evolution: * Add KDC support for S4U2Self requests where the user is identified by X.509 certificate. (Requires support for certificate lookup from a third-party KDB module.) * Remove support for an old ("draft 9") variant of PKINIT. * Add support for Microsoft NegoEx. (Requires one or more third-party GSS modules implementing NegoEx mechanisms.) * Honor the transited-policy-checked ticket flag on application servers, eliminating the requirement to configure capaths on servers in some scenarios. User experience: * Add support for "dns_canonicalize_hostname=fallback""`, causing host-based principal names to be tried first without DNS canonicalization, and again with DNS canonicalization if the un-canonicalized server is not found. * Expand single-component hostnames in host-based principal names when DNS canonicalization is not used, adding the system's first DNS search path as a suffix. Add a "qualify_shortname" krb5.conf relation to override this suffix or disable expansion. Code quality: * The libkrb5 serialization code (used to export and import krb5 GSS security contexts) has been simplified and made type-safe. * The libkrb5 code for creating KRB-PRIV, KRB-SAFE, and KRB-CRED messages has been revised to conform to current coding practices. * The test suite has been modified to work with macOS System Integrity Protection enabled. * The test suite incorporates soft-pkcs11 so that PKINIT PKCS11 support can always be tested. Notes: svn path=/head/; revision=526479