[ SEA-GHOST MINI SHELL]
Kerberos Version 5, Release 1.15
Release Notes
The MIT Kerberos Team
Copyright and Other Notices
---------------------------
Copyright (C) 1985-2017 by the Massachusetts Institute of Technology
and its contributors. All rights reserved.
Please see the file named NOTICE for additional notices.
Documentation
-------------
Unified documentation for Kerberos V5 is available in both HTML and
PDF formats. The table of contents of the HTML format documentation
is at doc/html/index.html, and the PDF format documentation is in the
doc/pdf directory.
Additionally, you may find copies of the HTML format documentation
online at
http://web.mit.edu/kerberos/krb5-latest/doc/
for the most recent supported release, or at
http://web.mit.edu/kerberos/krb5-devel/doc/
for the release under development.
More information about Kerberos may be found at
http://web.mit.edu/kerberos/
and at the MIT Kerberos Consortium web site
http://kerberos.org/
Building and Installing Kerberos 5
----------------------------------
Build documentation is in doc/html/build/index.html or
doc/pdf/build.pdf.
The installation guide is in doc/html/admin/install.html or
doc/pdf/install.pdf.
If you are attempting to build under Windows, please see the
src/windows/README file.
Reporting Bugs
--------------
Please report any problems/bugs/comments by sending email to
krb5-bugs@mit.edu.
You may view bug reports by visiting
http://krbdev.mit.edu/rt/
and using the "Guest Login" button. Please note that the web
interface to our bug database is read-only for guests, and the primary
way to interact with our bug database is via email.
DES transition
--------------
The Data Encryption Standard (DES) is widely recognized as weak. The
krb5-1.7 release contains measures to encourage sites to migrate away
from using single-DES cryptosystems. Among these is a configuration
variable that enables "weak" enctypes, which defaults to "false"
beginning with krb5-1.8.
Major changes in 1.15.1 (2017-03-01)
------------------------------------
This is a bug fix release.
* Allow KDB modules to determine how the e_data field of principal
fields is freed
* Fix udp_preference_limit when the KDC location is configured with
SRV records
* Fix KDC and kadmind startup on some IPv4-only systems
* Fix the processing of PKINIT certificate matching rules which have
two components and no explicit relation
* Improve documentation
krb5-1.15.1 changes by ticket ID
--------------------------------
7940 PKINIT docs only work for one-component client principals
8523 Add krbPwdPolicy attributes to kerberos.ldif
8524 Add caveats to krbtgt change documentation
8525 Fix error handling in PKINIT decode_data()
8530 KDC/kadmind explicit wildcard listener addresses do not use pktinfo
8531 KDC/kadmind may fail to start on IPv4-only systems
8532 Fix GSSAPI authind attribute name in docs
8538 Need a way to free KDB module e_data
8540 Document default realm and login authorization
8552 Add GSSAPI S4U documentation
8553 Fix PKINIT two-component matching rule parsing
8554 udp_preference_limit fails with SRV records
Major changes in 1.15 (2016-12-01)
----------------------------------
Administrator experience:
* Improve support for multihomed Kerberos servers by adding options
for specifying restricted listening addresses for the KDC and
kadmind.
* Add support to kadmin for remote extraction of current keys without
changing them (requires a special kadmin permission that is excluded
from the wildcard permission), with the exception of highly
protected keys.
* Add a lockdown_keys principal attribute to prevent retrieval of the
principal's keys (old or new) via the kadmin protocol. In newly
created databases, this attribute is set on the krbtgt and kadmin
principals.
* Restore recursive dump capability for DB2 back end, so sites can
more easily recover from database corruption resulting from power
failure events.
* Add DNS auto-discovery of KDC and kpasswd servers from URI records,
in addition to SRV records. URI records can convey TCP and UDP
servers and master KDC status in a single DNS lookup, and can also
point to HTTPS proxy servers.
* Add support for password history to the LDAP back end.
* Add support for principal renaming to the LDAP back end.
* Use the getrandom system call on supported Linux kernels to avoid
blocking problems when getting entropy from the operating system.
* In the PKINIT client, use the correct DigestInfo encoding for PKCS
#1 signatures, so that some especially strict smart cards will work.
Code quality:
* Clean up numerous compilation warnings.
* Remove various infrequently built modules, including some preauth
modules that were not built by default.
Developer experience:
* Add support for building with OpenSSL 1.1.
* Use SHA-256 instead of MD5 for (non-cryptographic) hashing of
authenticators in the replay cache. This helps sites that must
build with FIPS 140 conformant libraries that lack MD5.
* Eliminate util/reconf and allow the use of autoreconf alone to
regenerate the configure script.
Protocol evolution:
* Add support for the AES-SHA2 enctypes, which allows sites to conform
to Suite B crypto requirements.
krb5-1.15 changes by ticket ID
------------------------------
1093 KDC could use feature to limit listening interfaces
5889 password history doesn't work with LDAP KDB
6666 some non-default plugin directories don't build in 1.8 branch
7852 kadmin.local's ktadd -norandkey does not handle multiple kvnos
in the KDB
7985 Add krb5_get_init_creds_opt_set_pac_request
8065 Renaming principals with LDAP KDB deletes the principal
8277 iprop can choose wrong realm
8278 Add krb5_expand_hostname() API
8280 Fix impersonate_name to work with interposers
8295 kdb5_ldap_stash_service_password() stash file logic needs tweaking
8297 jsonwalker.py test fails
8298 Audit Test fails when system has IPV6 address
8299 Remove util/reconf
8329 Only run export-check.pl in maintainer mode
8344 Create KDC and kadmind log files with mode 0640
8345 Remove nss libk5crypto implementation
8348 Remove workaround when binding to udp addresses and pktinfo
isn't supported by the system
8353 Replace MD5 use in rcache with SHA-256
8354 Only store latest keys in key history entry
8355 Add kadm5_setkey_principal_4 RPC to kadmin
8364 Add get_principal_keys RPC to kadmin
8365 Add the ability to lock down principal keys
8366 Increase initial DNS buffer size
8368 Remove hdb KDB module
8371 Improve libkadm5 client RPC thread safety
8372 Use cached S4U2Proxy tickets in GSSAPI
8374 Interoperate with incomplete SPNEGO responses
8375 Allow zero cksumtype in krb5_k_verify_checksum()
8379 Add auth indicator handling to libkdb_ldap
8381 Don't fall back to master on password read error
8386 Add KDC pre-send and post-receive KDC hooks
8388 Remove port 750 from the KDC default ports
8389 Make profile includedir accept all *.conf files
8391 Add kinit long option support for all platforms
8393 Password Expiration "Never" Inconsistently Applied
8394 Add debug message filtering to krb5_klog_syslog
8396 Skip password prompt when running ksu as root
8398 Add libk5crypto support for OpenSSL 1.1.0
8399 Unconstify some krb5 GSS OIDs
8403 kinit documentation page
8404 Remove non-DFSG documentation
8405 Work around python-ldap bug in kerberos.ldif
8412 Link correct VS2015 C libraries for debug builds
8414 Use library malloc for principal, policy entries
8418 Add libkdb function to specialize principal's salt
8419 Do not indicate deprecated GSS mechanisms
8423 Add SPNEGO special case for NTLMSSP+MechListMIC
8425 Add auth-indicator authdata module
8426 test_check_allowed_to_delegate() should free unparsed princ output
8428 Minimize timing leaks in PKINIT decryption
8429 Fix Makefile for paths containing '+' character
8434 Fix memory leak in old gssrpc authentication
8436 Update libev sources to 4.22
8446 Fix leak in key change operations
8451 Add hints for -A flag to kdestroy
8456 Add the kprop-port option to kadmind
8462 Better handle failures to resolve client keytab
8464 Set prompt type for OTP preauth prompt
8465 Improve bad password inference in kinit
8466 Rename k5-queue.h macros
8471 Change KDC error for encrypted timestamp preauth
8476 Restore recursive dump functionality
8478 usability improvements for bttest
8488 Stop generating doc/CHANGES
8490 Add aes-sha2 enctype support
8494 Add krb5_db_register_keytab()
8496 Add KDC discovery from URI records
8498 Potential memory leak in prepare_error_as()
8499 Use getrandom system call on recent Linux kernels
8500 Document krb5_kt_next_entry() requirement
8502 ret_boolean in profile_get_boolean() should be krb5_boolean *
instead of int *
8504 Properly handle EOF condition on libkrad sockets
8506 PKINIT fails with PKCS#11 middlware that implements PKCS#1 V2.1
8507 Suggest unlocked iteration for mkey rollover
8508 Clarify krb5_kt_resolve() API documentation
8509 Leak in krb5_cccol_have_content with truncated ccache
8510 Update features list for 1.15
8512 Fix detection of libaceclnt for securid_sam2
8513 Add doxygen comments for RFC 8009, RFC 4757
8514 Make zap() more reliable
8516 Fix declaration without type in t_shs3.c
8520 Relicense ccapi/common/win/OldCC/autolock.hxx
8521 Allow slapd path configuration in t_kdb.py
Acknowledgements
----------------
Past Sponsors of the MIT Kerberos Consortium:
Apple
Carnegie Mellon University
Centrify Corporation
Columbia University
Cornell University
The Department of Defense of the United States of America (DoD)
Fidelity Investments
Google
Iowa State University
MIT
Michigan State University
Microsoft
MITRE Corporation
Morgan-Stanley
The National Aeronautics and Space Administration
of the United States of America (NASA)
Network Appliance (NetApp)
Nippon Telephone and Telegraph (NTT)
US Government Office of the National Coordinator for Health
Information Technology (ONC)
Oracle
Pennsylvania State University
Red Hat
Stanford University
TeamF1, Inc.
The University of Alaska
The University of Michigan
The University of Pennsylvania
Past and present members of the Kerberos Team at MIT:
Danilo Almeida
Jeffrey Altman
Justin Anderson
Richard Basch
Mitch Berger
Jay Berkenbilt
Andrew Boardman
Bill Bryant
Steve Buckley
Joe Calzaretta
John Carr
Mark Colan
Don Davis
Sarah Day
Alexandra Ellwood
Carlos Garay
Dan Geer
Nancy Gilman
Matt Hancher
Thomas Hardjono
Sam Hartman
Paul Hill
Marc Horowitz
Eva Jacobus
Miroslav Jurisic
Barry Jaspan
Benjamin Kaduk
Geoffrey King
Kevin Koch
John Kohl
HaoQi Li
Jonathan Lin
Peter Litwack
Scott McGuire
Steve Miller
Kevin Mitchell
Cliff Neuman
Paul Park
Ezra Peisach
Chris Provenzano
Ken Raeburn
Jon Rochlis
Jeff Schiller
Jen Selby
Robert Silk
Bill Sommerfeld
Jennifer Steiner
Ralph Swick
Brad Thompson
Harry Tsai
Zhanna Tsitkova
Ted Ts'o
Marshall Vale
Tom Yu
The following external contributors have provided code, patches, bug
reports, suggestions, and valuable resources:
Ian Abbott
Brandon Allbery
Russell Allbery
Brian Almeida
Michael B Allen
Heinz-Ado Arnolds
Derek Atkins
Mark Bannister
David Bantz
Alex Baule
David Benjamin
Thomas Bernard
Adam Bernstein
Arlene Berry
Jeff Blaine
Radoslav Bodo
Sumit Bose
Emmanuel Bouillon
Philip Brown
Michael Calmer
Andrea Campi
Julien Chaffraix
Ravi Channavajhala
Srinivas Cheruku
Leonardo Chiquitto
Seemant Choudhary
Howard Chu
Andrea Cirulli
Christopher D. Clausen
Kevin Coffman
Simon Cooper
Sylvain Cortes
Ian Crowther
Arran Cudbard-Bell
Jeff D'Angelo
Nalin Dahyabhai
Mark Davies
Dennis Davis
Alex Dehnert
Mark Deneen
Günther Deschner
John Devitofranceschi
Roland Dowdeswell
Viktor Dukhovni
Jason Edgecombe
Mark Eichin
Shawn M. Emery
Douglas E. Engert
Peter Eriksson
Juha Erkkilä
Gilles Espinasse
Ronni Feldt
Bill Fellows
JC Ferguson
Remi Ferrand
Paul Fertser
William Fiveash
Jacques Florent
Ákos Frohner
Sebastian Galiano
Marcus Granado
Scott Grizzard
Helmut Grohne
Steve Grubb
Philip Guenther
Dominic Hargreaves
Robbie Harwood
Jakob Haufe
Matthieu Hautreux
Jochen Hein
Paul B. Henson
Jeff Hodges
Christopher Hogan
Love Hörnquist Åstrand
Ken Hornstein
Henry B. Hotz
Luke Howard
Jakub Hrozek
Shumon Huque
Jeffrey Hutzelman
Wyllys Ingersoll
Holger Isenberg
Spencer Jackson
Diogenes S. Jesus
Pavel Jindra
Brian Johannesmeyer
Joel Johnson
Anders Kaseorg
W. Trevor King
Patrik Kis
Mikkel Kruse
Reinhard Kugler
Tomas Kuthan
Pierre Labastie
Volker Lendecke
Jan iankko Lieskovsky
Todd Lipcon
Oliver Loch
Kevin Longfellow
Jon Looney
Nuno Lopes
Ryan Lynch
Roland Mainz
Andrei Maslennikov
Michael Mattioli
Nathaniel McCallum
Greg McClement
Cameron Meadors
Alexey Melnikov
Franklyn Mendez
Markus Moeller
Kyle Moffett
Paul Moore
Keiichi Mori
Michael Morony
Zbysek Mraz
Edward Murrell
Nikos Nikoleris
Felipe Ortega
Michael Osipov
Andrej Ota
Dmitri Pal
Javier Palacios
Tom Parker
Ezra Peisach
Zoran Pericic
W. Michael Petullo
Mark Phalan
Brett Randall
Jonathan Reams
Jonathan Reed
Robert Relyea
Martin Rex
Jason Rogers
Matt Rogers
Nate Rosenblum
Solly Ross
Mike Roszkowski
Guillaume Rousse
Andreas Schneider
Tom Shaw
Jim Shi
Peter Shoults
Simo Sorce
Michael Spang
Michael Ströder
Bjørn Tore Sund
Joe Travaglini
Tim Uglow
Rathor Vipin
Denis Vlasenko
Jorgen Wahlsten
Stef Walter
Max (Weijun) Wang
John Washington
Stef Walter
Xi Wang
Kevin Wasserman
Margaret Wasserman
Marcus Watts
Andreas Wiese
Simon Wilkinson
Nicolas Williams
Ross Wilper
Augustin Wolf
David Woodhouse
Tsu-Phong Wu
Xu Qiang
Neng Xue
Zhaomo Yang
Nickolai Zeldovich
Hanz van Zijst
Gertjan Zwartjes
The above is not an exhaustive list; many others have contributed in
various ways to the MIT Kerberos development effort over the years.
Other acknowledgments (for bug reports and patches) are in the
doc/CHANGES file.
SEA-GHOST - SHELL CODING BY SEA-GHOST