aboutsummaryrefslogtreecommitdiff
path: root/crypto/krb5/README
diff options
context:
space:
mode:
Diffstat (limited to 'crypto/krb5/README')
-rw-r--r--crypto/krb5/README216
1 files changed, 122 insertions, 94 deletions
diff --git a/crypto/krb5/README b/crypto/krb5/README
index 6d6f7f16e3da..d1de8357e388 100644
--- a/crypto/krb5/README
+++ b/crypto/krb5/README
@@ -1,4 +1,4 @@
- Kerberos Version 5, Release 1.21
+ Kerberos Version 5, Release 1.22
Release Notes
The MIT Kerberos Team
@@ -6,7 +6,7 @@
Copyright and Other Notices
---------------------------
-Copyright (C) 1985-2024 by the Massachusetts Institute of Technology
+Copyright (C) 1985-2025 by the Massachusetts Institute of Technology
and its contributors. All rights reserved.
Please see the file named NOTICE for additional notices.
@@ -97,130 +97,145 @@ removed.
Beginning with the krb5-1.18 release, all support for single-DES
encryption types has been removed.
-Major changes in 1.21.3 (2024-06-26)
+Major changes in 1.22.1 (2025-08-20)
------------------------------------
This is a bug fix release.
-* Fix vulnerabilities in GSS message token handling [CVE-2024-37370,
- CVE-2024-37371].
+* Fix a vulnerability in GSS MIC verification [CVE-2025-57736].
-* Fix a potential bad pointer free in krb5_cccol_have_contents().
-
-* Fix a memory leak in the macOS ccache type.
-
-krb5-1.21.2 changes by ticket ID
---------------------------------
-
-9102 Eliminate sim_client include of getopt.h
-9103 segfault trying to free a garbage pointer
-9104 Work around Doxygen 1.9.7 change
-9107 In PKINIT, check for null PKCS7 enveloped fields
-9109 memory leak on macos
-9115 Fix leak in KDC NDR encoding
-9125 Formatting error in realm_config.rst
-9128 Fix vulnerabilities in GSS message token handling
-
-Major changes in 1.21.2 (2023-08-14)
-------------------------------------
-
-This is a bug fix release.
-
-* Fix double-free in KDC TGS processing [CVE-2023-39975].
-
-krb5-1.21.2 changes by ticket ID
+krb5-1.22.1 changes by ticket ID
--------------------------------
-9101 Fix double-free in KDC TGS processing
+9181 verify_mic_v3 broken in 1.22
-Major changes in 1.21.1 (2023-07-10)
-------------------------------------
+Major changes in 1.22 (2025-08-05)
+----------------------------------
-This is a bug fix release.
+User experience:
-* Fix potential uninitialized pointer free in kadm5 XDR parsing
- [CVE-2023-36054].
+* The libdefaults configuration variable "request_timeout" can be set
+ to limit the total timeout for KDC requests. When making a KDC
+ request, the client will now wait indefinitely (or until the request
+ timeout has elapsed) on a KDC which accepts a TCP connection,
+ without contacting any additional KDCs. Clients will make fewer DNS
+ queries in some configurations.
-krb5-1.21.1 changes by ticket ID
---------------------------------
+* The realm configuration variable "sitename" can be set to cause the
+ client to query site-specific DNS records when making KDC requests.
-9099 Ensure array count consistency in kadm5 RPC
+Administrator experience:
-Major changes in 1.21 (2023-06-05)
-----------------------------------
+* Principal aliases are supported in the DB2 and LMDB KDB modules and
+ in the kadmin protocol. (The LDAP KDB module has supported aliases
+ since release 1.7.)
-User experience:
+* UNIX domain sockets are supported for the Kerberos and kpasswd
+ protocols.
-* Added a credential cache type providing compatibility with the macOS
- 11 native credential cache.
+* systemd socket activation is supported for krb5kdc and kadmind.
Developer experience:
-* libkadm5 will use the provided krb5_context object to read
- configuration values, instead of creating its own.
+* KDB modules can be be implemented in terms of other modules using
+ the new krb5_db_load_module() function.
-* Added an interface to retrieve the ticket session key from a GSS
- context.
+* The profile library supports the modification of empty profiles and
+ the copying of modified profiles, making it possible to construct an
+ in-memory profile and pass it to krb5_init_context_profile().
-Protocol evolution:
+* GSS-API applications can pass the GSS_C_CHANNEL_BOUND flag to
+ gss_init_sec_context() to request strict enforcement of channel
+ bindings by the acceptor.
-* The KDC will no longer issue tickets with RC4 or triple-DES session
- keys unless explicitly configured with the new allow_rc4 or
- allow_des3 variables respectively.
+Protocol evolution:
-* The KDC will assume that all services can handle aes256-sha1 session
- keys unless the service principal has a session_enctypes string
- attribute.
+* The PKINIT preauth module supports elliptic curve client
+ certificates, ECDH key exchange, and the Microsoft paChecksum2
+ field.
-* Support for PAC full KDC checksums has been added to mitigate an
- S4U2Proxy privilege escalation attack.
+* The IAKERB implementation has been changed to comply with the most
+ recent draft standard and to support realm discovery.
-* The PKINIT client will advertise a more modern set of supported CMS
- algorithms.
+* Message-Authenticator is supported in the RADIUS implementation used
+ by the OTP kdcpreauth module.
Code quality:
-* Removed unused code in libkrb5, libkrb5support, and the PKINIT
- module.
+* Removed old-style function declarations, to accomodate compilers
+ which have removed support for them.
-* Modernized the KDC code for processing TGS requests, the code for
- encrypting and decrypting key data, the PAC handling code, and the
- GSS library packet parsing and composition code.
+* Added OSS-Fuzz to the project's continuous integration
+ infrastructure.
-* Improved the test framework's detection of memory errors in daemon
- processes when used with asan.
+* Rewrote the GSS per-message token parsing code for improved safety.
-krb5-1.21 changes by ticket ID
+krb5-1.22 changes by ticket ID
------------------------------
-9052 Support macOS 11 native credential cache
-9053 Make kprop work for dump files larger than 4GB
-9054 Replace macros with typedefs in gssrpc types.h
-9055 Use SHA-256 instead of SHA-1 for PKINIT CMS digest
-9057 Omit LDFLAGS from krb5-config --libs output
-9058 Add configure variable for default PKCS#11 module
-9059 Use context profile for libkadm5 configuration
-9066 Set reasonable supportedCMSTypes in PKINIT
-9069 Update error checking for OpenSSL CMS_verify
-9071 Add and use ts_interval() helper
-9072 Avoid small read overrun in UTF8 normalization
-9076 Use memmove() in Unicode functions
-9077 Fix aclocal.m4 syntax error for autoconf 2.72
-9078 Fix profile crash on memory exhaustion
-9079 Fix preauth crash on memory exhaustion
-9080 Fix gic_keytab crash on memory exhaustion
-9082 Fix policy DB fallback error handling
-9083 Fix kpropd crash with unrecognized option
-9084 Add PAC full checksums
-9085 Fix read overruns in SPNEGO parsing
-9086 Fix possible double-free during KDB creation
-9087 Fix meridian type in getdate.y
-9088 Use control flow guard flag in Windows builds
-9089 Add pac_privsvr_enctype string attribute
-9090 Convey realm names to certauth modules
-9091 Add GSS_C_INQ_ODBC_SESSION_KEY
-9092 Fix maintainer-mode build for binutils 2.37
-9093 Add PA-REDHAT-PASSKEY padata type
+7721 Primary KDC lookups happen sooner than necessary
+7899 Client waits before moving on after KDC_ERR_SVC_UNAVAILABLE
+8618 ksu doesn't exit nonzero
+9094 Get arm64-windows builds working
+9095 PKINIT ECDH support
+9096 Enable PKINIT if at least one group is available
+9100 Add ecdsa-with-sha512/256 to supportedCMSTypes
+9105 Wait indefinitely on KDC TCP connections
+9106 Add request_timeout configuration parameter
+9108 Remove PKINIT RSA support
+9110 profile library null dereference when modifying empty profile
+9111 Correct PKINIT EC cert signature metadata
+9112 Support PKCS11 EC client certs in PKINIT
+9113 Improve PKCS11 error reporting in PKINIT
+9114 Build fails with link-time optimization
+9116 Improve error message for DES kadmin/history key
+9118 profile write operation interactions with reloading
+9119 Make profile_copy() work on dirty profiles
+9120 profile final flag limitations
+9121 Don't flush libkrb5 context profiles
+9122 Add GSS flag to include KERB_AP_OPTIONS_CBT
+9123 Correct IAKERB protocol implementation
+9124 Support site-local KDC discovery via DNS
+9126 Handle empty initial buffer in IAKERB initiator
+9130 make krb5_get_default_config_files public
+9131 Adjust removed cred detection in FILE ccache
+9132 Change krb5_get_credentials() endtime behavior
+9133 Add acceptor-side IAKERB realm discovery
+9135 Replace Windows installer FilesInUse dialog text
+9139 Block library unloading to avoid finalizer races
+9141 Fix krb5_crypto_us_timeofday() microseconds check
+9142 Generate and verify message MACs in libkrad
+9143 Fix memory leak in PAC checksum verification
+9144 Fix potential PAC processing crash
+9145 Prevent late initialization of GSS error map
+9146 Allow null keyblocks in IOV checksum functions
+9147 Add numeric constants to krad.h and use them
+9148 Fix krb5_ldap_list_policy() filtering loop
+9149 Use getentropy() when available
+9151 Add kadmind support for disabling listening
+9152 Default kdc_tcp_listen to kdc_listen value
+9153 Fix LDAP module leak on authentication error
+9154 Components of the X509_user_identity string cannot contain ':'
+9155 UNIX domain socket support
+9156 Allow KDB module stacking
+9157 Add support for systemd socket activation
+9158 Set missing mask flags for kdb5_util operations
+9159 Prevent overflow when calculating ulog block size
+9160 Allow only one salt type per enctype in key data
+9161 Improve ulog block resize efficiency
+9162 Build PKINIT on Windows
+9163 Add alias support
+9164 Add database format documentation
+9165 Display NetBIOS ticket addresses in klist
+9166 Add PKINIT paChecksum2 from MS-PKCA v20230920
+9167 Add initiator-side IAKERB realm discovery
+9168 Fix IAKERB accept_sec_context null pointer crash
+9169 Fix IAKERB error handling
+9170 Avoid gss_inquire_attrs_for_mech() null outputs
+9171 Fix getsockname() call in Windows localaddr
+9172 Check lengths in xdr_krb5_key_data()
+9173 Limit -keepold for self-service key changes
+9179 Avoid large numbers of refresh_time cache entries
Acknowledgements
----------------
@@ -338,6 +353,7 @@ reports, suggestions, and valuable resources:
Toby Blake
Radoslav Bodo
Alexander Bokovoy
+ Zoltan Borbely
Sumit Bose
Emmanuel Bouillon
Isaac Boukris
@@ -359,6 +375,7 @@ reports, suggestions, and valuable resources:
Andrea Cirulli
Christopher D. Clausen
Kevin Coffman
+ Gerald Combs
Simon Cooper
Sylvain Cortes
Ian Crowther
@@ -368,6 +385,7 @@ reports, suggestions, and valuable resources:
Nalin Dahyabhai
Mark Davies
Dennis Davis
+ Rull Deef
Alex Dehnert
Misty De Meo
Mark Deneen
@@ -377,6 +395,7 @@ reports, suggestions, and valuable resources:
Roland Dowdeswell
Ken Dreyer
Dorian Ducournau
+ Francis Dupont
Viktor Dukhovni
Jason Edgecombe
Mark Eichin
@@ -385,6 +404,7 @@ reports, suggestions, and valuable resources:
Peter Eriksson
Juha Erkkilä
Gilles Espinasse
+ Valery Fedorenko
Sergey Fedorov
Ronni Feldt
Bill Fellows
@@ -398,6 +418,7 @@ reports, suggestions, and valuable resources:
Oliver Freyermuth
Ákos Frohner
Sebastian Galiano
+ Ilya Gladyshev
Marcus Granado
Dylan Gray
Norm Green
@@ -405,6 +426,7 @@ reports, suggestions, and valuable resources:
Helmut Grohne
Steve Grubb
Philip Guenther
+ Feng Guo
Timo Gurr
Dominic Hargreaves
Robbie Harwood
@@ -440,10 +462,12 @@ reports, suggestions, and valuable resources:
Zentaro Kavanagh
Mubashir Kazia
W. Trevor King
+ Steffen Kieß
Patrik Kis
Martin Kittel
Thomas Klausner
Tomasz Kłoczko
+ Ivan Korytov
Matthew Krupcale
Mikkel Kruse
Reinhard Kugler
@@ -476,6 +500,7 @@ reports, suggestions, and valuable resources:
Alexey Melnikov
Ivan A. Melnikov
Franklyn Mendez
+ Stefan Metzmacher
Mantas Mikulėnas
Markus Moeller
Kyle Moffett
@@ -487,6 +512,7 @@ reports, suggestions, and valuable resources:
Sam Morris
Zbysek Mraz
Edward Murrell
+ Bahaa Naamneh
Joshua Neuheisel
Nikos Nikoleris
Demi Obenour
@@ -524,6 +550,7 @@ reports, suggestions, and valuable resources:
Jens Schleusener
Ryan Schmidt
Andreas Schneider
+ Eli Schwartz
Paul Seyfert
Tom Shaw
Jim Shi
@@ -538,6 +565,7 @@ reports, suggestions, and valuable resources:
Bjørn Tore Sund
Ondřej Surý
Joseph Sutton
+ Alexey Tikhonov
Joe Travaglini
Sergei Trofimovich
Greg Troxel