Welcome the new security/krb5-116 port. This port follows MIT's
KRB5 1.16 releases.
Major changes in 1.16 (2017-12-05)
==================================
Administrator experience:
* The KDC can match PKINIT client certificates against the
"pkinit_cert_match" string attribute on the client principal entry,
using the same syntax as the existing "pkinit_cert_match" profile
option.
* The ktutil addent command supports the "-k 0" option to ignore the
key version, and the "-s" option to use a non-default salt string.
* kpropd supports a --pid-file option to write a pid file at startup,
when it is run in standalone mode.
* The "encrypted_challenge_indicator" realm option can be used to
attach an authentication indicator to tickets obtained using FAST
encrypted challenge pre-authentication.
* Localization support can be disabled at build time with the
--disable-nls configure option.
Developer experience:
* The kdcpolicy pluggable interface allows modules control whether
tickets are issued by the KDC.
* The kadm5_auth pluggable interface allows modules to control whether
kadmind grants access to a kadmin request.
* The certauth pluggable interface allows modules to control which
PKINIT client certificates can authenticate to which client
principals.
* KDB modules can use the client and KDC interface IP addresses to
determine whether to allow an AS request.
* GSS applications can query the bit strength of a krb5 GSS context
using the GSS_C_SEC_CONTEXT_SASL_SSF OID with
gss_inquire_sec_context_by_oid().
* GSS applications can query the impersonator name of a krb5 GSS
credential using the GSS_KRB5_GET_CRED_IMPERSONATOR OID with
gss_inquire_cred_by_oid().
* kdcpreauth modules can query the KDC for the canonicalized requested
client principal name, or match a principal name against the
requested client principal name with canonicalization.
Protocol evolution:
* The client library will continue to try pre-authentication
mechanisms after most failure conditions.
* The KDC will issue trivially renewable tickets (where the renewable
lifetime is equal to or less than the ticket lifetime) if requested
by the client, to be friendlier to scripts.
* The client library will use a random nonce for TGS requests instead
of the current system time.
* For the RC4 string-to-key or PAC operations, UTF-16 is supported
(previously only UCS-2 was supported).
* When matching PKINIT client certificates, UPN SANs will be matched
correctly as UPNs, with canonicalization.
User experience:
* Dates after the year 2038 are accepted (provided that the platform
time facilities support them), through the year 2106.
* Automatic credential cache selection based on the client realm will
take into account the fallback realm and the service hostname.
* Referral and alternate cross-realm TGTs will not be cached, avoiding
some scenarios where they can be added to the credential cache
multiple times.
* A German translation has been added.
2017-12-06 04:18:14 +00:00
|
|
|
bin/compile_et
|
|
|
|
bin/gss-client
|
|
|
|
bin/k5srvutil
|
|
|
|
bin/kadmin
|
|
|
|
bin/kdestroy
|
|
|
|
bin/kinit
|
|
|
|
bin/klist
|
|
|
|
bin/kpasswd
|
|
|
|
bin/krb5-config
|
|
|
|
@mode 04755
|
|
|
|
@owner root
|
|
|
|
@group wheel
|
|
|
|
bin/ksu
|
|
|
|
@mode
|
|
|
|
@owner root
|
|
|
|
@group wheel
|
|
|
|
bin/kswitch
|
|
|
|
bin/ktutil
|
|
|
|
bin/kvno
|
|
|
|
bin/sclient
|
|
|
|
bin/sim_client
|
|
|
|
bin/uuclient
|
|
|
|
include/com_err.h
|
|
|
|
include/gssapi.h
|
|
|
|
include/gssapi/gssapi.h
|
|
|
|
include/gssapi/gssapi_ext.h
|
|
|
|
include/gssapi/gssapi_generic.h
|
|
|
|
include/gssapi/gssapi_krb5.h
|
|
|
|
include/gssapi/mechglue.h
|
|
|
|
include/gssrpc/auth.h
|
|
|
|
include/gssrpc/auth_gss.h
|
|
|
|
include/gssrpc/auth_gssapi.h
|
|
|
|
include/gssrpc/auth_unix.h
|
|
|
|
include/gssrpc/clnt.h
|
|
|
|
include/gssrpc/netdb.h
|
|
|
|
include/gssrpc/pmap_clnt.h
|
|
|
|
include/gssrpc/pmap_prot.h
|
|
|
|
include/gssrpc/pmap_rmt.h
|
|
|
|
include/gssrpc/rename.h
|
|
|
|
include/gssrpc/rpc.h
|
|
|
|
include/gssrpc/rpc_msg.h
|
|
|
|
include/gssrpc/svc.h
|
|
|
|
include/gssrpc/svc_auth.h
|
|
|
|
include/gssrpc/types.h
|
|
|
|
include/gssrpc/xdr.h
|
|
|
|
include/krad.h
|
|
|
|
include/krb5.h
|
|
|
|
include/krb5/ccselect_plugin.h
|
|
|
|
include/krb5/clpreauth_plugin.h
|
|
|
|
include/krb5/hostrealm_plugin.h
|
|
|
|
include/krb5/kadm5_hook_plugin.h
|
|
|
|
include/krb5/kdcpolicy_plugin.h
|
|
|
|
include/krb5/kdcpreauth_plugin.h
|
|
|
|
include/krb5/localauth_plugin.h
|
|
|
|
include/krb5/krb5.h
|
|
|
|
include/krb5/locate_plugin.h
|
|
|
|
include/krb5/plugin.h
|
|
|
|
include/krb5/pwqual_plugin.h
|
|
|
|
include/kadm5/admin.h
|
|
|
|
include/kadm5/chpass_util_strings.h
|
|
|
|
include/krb5/kadm5_auth_plugin.h
|
|
|
|
include/kadm5/kadm_err.h
|
|
|
|
include/kdb.h
|
|
|
|
include/krb5/certauth_plugin.h
|
|
|
|
include/krb5/preauth_plugin.h
|
|
|
|
include/profile.h
|
|
|
|
include/verto-module.h
|
|
|
|
include/verto.h
|
|
|
|
lib/libcom_err.so
|
|
|
|
lib/libcom_err.so.3
|
|
|
|
lib/libcom_err.so.3.0
|
|
|
|
lib/libgssapi_krb5.so
|
|
|
|
lib/libgssapi_krb5.so.2
|
|
|
|
lib/libgssapi_krb5.so.2.2
|
|
|
|
lib/libgssrpc.so
|
|
|
|
lib/libgssrpc.so.4
|
|
|
|
lib/libgssrpc.so.4.2
|
|
|
|
lib/libk5crypto.so
|
|
|
|
lib/libk5crypto.so.3
|
|
|
|
lib/libk5crypto.so.3.1
|
|
|
|
lib/libkadm5clnt.so
|
|
|
|
lib/libkadm5clnt_mit.so
|
|
|
|
lib/libkadm5clnt_mit.so.11
|
|
|
|
lib/libkadm5clnt_mit.so.11.0
|
|
|
|
lib/libkadm5srv.so
|
|
|
|
lib/libkadm5srv_mit.so
|
|
|
|
lib/libkadm5srv_mit.so.11
|
|
|
|
lib/libkadm5srv_mit.so.11.0
|
|
|
|
lib/libkdb5.so
|
|
|
|
lib/libkdb5.so.9
|
|
|
|
lib/libkdb5.so.9.0
|
|
|
|
lib/libkrb5.so
|
|
|
|
lib/libkrb5.so.3
|
|
|
|
lib/libkrb5.so.3.3
|
|
|
|
lib/libkrb5support.so
|
|
|
|
lib/libkrb5support.so.0
|
|
|
|
lib/libkrb5support.so.0.1
|
|
|
|
lib/krb5/plugins/kdb/db2.so
|
|
|
|
lib/krb5/plugins/tls/k5tls.so
|
|
|
|
%%LDAP%%lib/krb5/plugins/kdb/kldap.so
|
|
|
|
lib/krb5/plugins/preauth/otp.so
|
|
|
|
lib/krb5/plugins/preauth/pkinit.so
|
|
|
|
lib/krb5/plugins/preauth/test.so
|
|
|
|
%%LDAP%%lib/libkdb_ldap.so
|
|
|
|
%%LDAP%%lib/libkdb_ldap.so.1
|
|
|
|
%%LDAP%%lib/libkdb_ldap.so.1.0
|
|
|
|
lib/libkrad.so
|
|
|
|
lib/libkrad.so.0
|
|
|
|
lib/libkrad.so.0.0
|
|
|
|
lib/libverto.so
|
|
|
|
lib/libverto.so.0
|
|
|
|
lib/libverto.so.0.0
|
|
|
|
libdata/pkgconfig/gssrpc.pc
|
|
|
|
libdata/pkgconfig/kadm-client.pc
|
|
|
|
libdata/pkgconfig/kadm-server.pc
|
|
|
|
libdata/pkgconfig/kdb.pc
|
|
|
|
libdata/pkgconfig/krb5-gssapi.pc
|
|
|
|
libdata/pkgconfig/krb5.pc
|
|
|
|
libdata/pkgconfig/mit-krb5-gssapi.pc
|
|
|
|
libdata/pkgconfig/mit-krb5.pc
|
2018-07-02 05:57:27 +00:00
|
|
|
man/man1/compile_et.1.gz
|
Welcome the new security/krb5-116 port. This port follows MIT's
KRB5 1.16 releases.
Major changes in 1.16 (2017-12-05)
==================================
Administrator experience:
* The KDC can match PKINIT client certificates against the
"pkinit_cert_match" string attribute on the client principal entry,
using the same syntax as the existing "pkinit_cert_match" profile
option.
* The ktutil addent command supports the "-k 0" option to ignore the
key version, and the "-s" option to use a non-default salt string.
* kpropd supports a --pid-file option to write a pid file at startup,
when it is run in standalone mode.
* The "encrypted_challenge_indicator" realm option can be used to
attach an authentication indicator to tickets obtained using FAST
encrypted challenge pre-authentication.
* Localization support can be disabled at build time with the
--disable-nls configure option.
Developer experience:
* The kdcpolicy pluggable interface allows modules control whether
tickets are issued by the KDC.
* The kadm5_auth pluggable interface allows modules to control whether
kadmind grants access to a kadmin request.
* The certauth pluggable interface allows modules to control which
PKINIT client certificates can authenticate to which client
principals.
* KDB modules can use the client and KDC interface IP addresses to
determine whether to allow an AS request.
* GSS applications can query the bit strength of a krb5 GSS context
using the GSS_C_SEC_CONTEXT_SASL_SSF OID with
gss_inquire_sec_context_by_oid().
* GSS applications can query the impersonator name of a krb5 GSS
credential using the GSS_KRB5_GET_CRED_IMPERSONATOR OID with
gss_inquire_cred_by_oid().
* kdcpreauth modules can query the KDC for the canonicalized requested
client principal name, or match a principal name against the
requested client principal name with canonicalization.
Protocol evolution:
* The client library will continue to try pre-authentication
mechanisms after most failure conditions.
* The KDC will issue trivially renewable tickets (where the renewable
lifetime is equal to or less than the ticket lifetime) if requested
by the client, to be friendlier to scripts.
* The client library will use a random nonce for TGS requests instead
of the current system time.
* For the RC4 string-to-key or PAC operations, UTF-16 is supported
(previously only UCS-2 was supported).
* When matching PKINIT client certificates, UPN SANs will be matched
correctly as UPNs, with canonicalization.
User experience:
* Dates after the year 2038 are accepted (provided that the platform
time facilities support them), through the year 2106.
* Automatic credential cache selection based on the client realm will
take into account the fallback realm and the service hostname.
* Referral and alternate cross-realm TGTs will not be cached, avoiding
some scenarios where they can be added to the credential cache
multiple times.
* A German translation has been added.
2017-12-06 04:18:14 +00:00
|
|
|
man/man1/k5srvutil.1.gz
|
|
|
|
man/man1/kadmin.1.gz
|
|
|
|
man/man1/kdestroy.1.gz
|
2018-07-02 05:57:27 +00:00
|
|
|
man/man1/kinit.1.gz
|
|
|
|
man/man1/klist.1.gz
|
|
|
|
man/man1/kpasswd.1.gz
|
|
|
|
man/man1/krb5-config.1.gz
|
Welcome the new security/krb5-116 port. This port follows MIT's
KRB5 1.16 releases.
Major changes in 1.16 (2017-12-05)
==================================
Administrator experience:
* The KDC can match PKINIT client certificates against the
"pkinit_cert_match" string attribute on the client principal entry,
using the same syntax as the existing "pkinit_cert_match" profile
option.
* The ktutil addent command supports the "-k 0" option to ignore the
key version, and the "-s" option to use a non-default salt string.
* kpropd supports a --pid-file option to write a pid file at startup,
when it is run in standalone mode.
* The "encrypted_challenge_indicator" realm option can be used to
attach an authentication indicator to tickets obtained using FAST
encrypted challenge pre-authentication.
* Localization support can be disabled at build time with the
--disable-nls configure option.
Developer experience:
* The kdcpolicy pluggable interface allows modules control whether
tickets are issued by the KDC.
* The kadm5_auth pluggable interface allows modules to control whether
kadmind grants access to a kadmin request.
* The certauth pluggable interface allows modules to control which
PKINIT client certificates can authenticate to which client
principals.
* KDB modules can use the client and KDC interface IP addresses to
determine whether to allow an AS request.
* GSS applications can query the bit strength of a krb5 GSS context
using the GSS_C_SEC_CONTEXT_SASL_SSF OID with
gss_inquire_sec_context_by_oid().
* GSS applications can query the impersonator name of a krb5 GSS
credential using the GSS_KRB5_GET_CRED_IMPERSONATOR OID with
gss_inquire_cred_by_oid().
* kdcpreauth modules can query the KDC for the canonicalized requested
client principal name, or match a principal name against the
requested client principal name with canonicalization.
Protocol evolution:
* The client library will continue to try pre-authentication
mechanisms after most failure conditions.
* The KDC will issue trivially renewable tickets (where the renewable
lifetime is equal to or less than the ticket lifetime) if requested
by the client, to be friendlier to scripts.
* The client library will use a random nonce for TGS requests instead
of the current system time.
* For the RC4 string-to-key or PAC operations, UTF-16 is supported
(previously only UCS-2 was supported).
* When matching PKINIT client certificates, UPN SANs will be matched
correctly as UPNs, with canonicalization.
User experience:
* Dates after the year 2038 are accepted (provided that the platform
time facilities support them), through the year 2106.
* Automatic credential cache selection based on the client realm will
take into account the fallback realm and the service hostname.
* Referral and alternate cross-realm TGTs will not be cached, avoiding
some scenarios where they can be added to the credential cache
multiple times.
* A German translation has been added.
2017-12-06 04:18:14 +00:00
|
|
|
man/man1/ksu.1.gz
|
2018-07-02 05:57:27 +00:00
|
|
|
man/man1/kswitch.1.gz
|
Welcome the new security/krb5-116 port. This port follows MIT's
KRB5 1.16 releases.
Major changes in 1.16 (2017-12-05)
==================================
Administrator experience:
* The KDC can match PKINIT client certificates against the
"pkinit_cert_match" string attribute on the client principal entry,
using the same syntax as the existing "pkinit_cert_match" profile
option.
* The ktutil addent command supports the "-k 0" option to ignore the
key version, and the "-s" option to use a non-default salt string.
* kpropd supports a --pid-file option to write a pid file at startup,
when it is run in standalone mode.
* The "encrypted_challenge_indicator" realm option can be used to
attach an authentication indicator to tickets obtained using FAST
encrypted challenge pre-authentication.
* Localization support can be disabled at build time with the
--disable-nls configure option.
Developer experience:
* The kdcpolicy pluggable interface allows modules control whether
tickets are issued by the KDC.
* The kadm5_auth pluggable interface allows modules to control whether
kadmind grants access to a kadmin request.
* The certauth pluggable interface allows modules to control which
PKINIT client certificates can authenticate to which client
principals.
* KDB modules can use the client and KDC interface IP addresses to
determine whether to allow an AS request.
* GSS applications can query the bit strength of a krb5 GSS context
using the GSS_C_SEC_CONTEXT_SASL_SSF OID with
gss_inquire_sec_context_by_oid().
* GSS applications can query the impersonator name of a krb5 GSS
credential using the GSS_KRB5_GET_CRED_IMPERSONATOR OID with
gss_inquire_cred_by_oid().
* kdcpreauth modules can query the KDC for the canonicalized requested
client principal name, or match a principal name against the
requested client principal name with canonicalization.
Protocol evolution:
* The client library will continue to try pre-authentication
mechanisms after most failure conditions.
* The KDC will issue trivially renewable tickets (where the renewable
lifetime is equal to or less than the ticket lifetime) if requested
by the client, to be friendlier to scripts.
* The client library will use a random nonce for TGS requests instead
of the current system time.
* For the RC4 string-to-key or PAC operations, UTF-16 is supported
(previously only UCS-2 was supported).
* When matching PKINIT client certificates, UPN SANs will be matched
correctly as UPNs, with canonicalization.
User experience:
* Dates after the year 2038 are accepted (provided that the platform
time facilities support them), through the year 2106.
* Automatic credential cache selection based on the client realm will
take into account the fallback realm and the service hostname.
* Referral and alternate cross-realm TGTs will not be cached, avoiding
some scenarios where they can be added to the credential cache
multiple times.
* A German translation has been added.
2017-12-06 04:18:14 +00:00
|
|
|
man/man1/ktutil.1.gz
|
|
|
|
man/man1/kvno.1.gz
|
2018-07-02 05:57:27 +00:00
|
|
|
man/man1/sclient.1.gz
|
2018-07-02 05:57:37 +00:00
|
|
|
man/man3/com_err.3.gz
|
Welcome the new security/krb5-116 port. This port follows MIT's
KRB5 1.16 releases.
Major changes in 1.16 (2017-12-05)
==================================
Administrator experience:
* The KDC can match PKINIT client certificates against the
"pkinit_cert_match" string attribute on the client principal entry,
using the same syntax as the existing "pkinit_cert_match" profile
option.
* The ktutil addent command supports the "-k 0" option to ignore the
key version, and the "-s" option to use a non-default salt string.
* kpropd supports a --pid-file option to write a pid file at startup,
when it is run in standalone mode.
* The "encrypted_challenge_indicator" realm option can be used to
attach an authentication indicator to tickets obtained using FAST
encrypted challenge pre-authentication.
* Localization support can be disabled at build time with the
--disable-nls configure option.
Developer experience:
* The kdcpolicy pluggable interface allows modules control whether
tickets are issued by the KDC.
* The kadm5_auth pluggable interface allows modules to control whether
kadmind grants access to a kadmin request.
* The certauth pluggable interface allows modules to control which
PKINIT client certificates can authenticate to which client
principals.
* KDB modules can use the client and KDC interface IP addresses to
determine whether to allow an AS request.
* GSS applications can query the bit strength of a krb5 GSS context
using the GSS_C_SEC_CONTEXT_SASL_SSF OID with
gss_inquire_sec_context_by_oid().
* GSS applications can query the impersonator name of a krb5 GSS
credential using the GSS_KRB5_GET_CRED_IMPERSONATOR OID with
gss_inquire_cred_by_oid().
* kdcpreauth modules can query the KDC for the canonicalized requested
client principal name, or match a principal name against the
requested client principal name with canonicalization.
Protocol evolution:
* The client library will continue to try pre-authentication
mechanisms after most failure conditions.
* The KDC will issue trivially renewable tickets (where the renewable
lifetime is equal to or less than the ticket lifetime) if requested
by the client, to be friendlier to scripts.
* The client library will use a random nonce for TGS requests instead
of the current system time.
* For the RC4 string-to-key or PAC operations, UTF-16 is supported
(previously only UCS-2 was supported).
* When matching PKINIT client certificates, UPN SANs will be matched
correctly as UPNs, with canonicalization.
User experience:
* Dates after the year 2038 are accepted (provided that the platform
time facilities support them), through the year 2106.
* Automatic credential cache selection based on the client realm will
take into account the fallback realm and the service hostname.
* Referral and alternate cross-realm TGTs will not be cached, avoiding
some scenarios where they can be added to the credential cache
multiple times.
* A German translation has been added.
2017-12-06 04:18:14 +00:00
|
|
|
man/man5/.k5identity.5.gz
|
|
|
|
man/man5/.k5login.5.gz
|
|
|
|
man/man5/k5identity.5.gz
|
|
|
|
man/man5/k5login.5.gz
|
2018-07-02 05:57:27 +00:00
|
|
|
man/man5/kadm5.acl.5.gz
|
|
|
|
man/man5/kdc.conf.5.gz
|
|
|
|
man/man5/krb5.conf.5.gz
|
Welcome the new security/krb5-116 port. This port follows MIT's
KRB5 1.16 releases.
Major changes in 1.16 (2017-12-05)
==================================
Administrator experience:
* The KDC can match PKINIT client certificates against the
"pkinit_cert_match" string attribute on the client principal entry,
using the same syntax as the existing "pkinit_cert_match" profile
option.
* The ktutil addent command supports the "-k 0" option to ignore the
key version, and the "-s" option to use a non-default salt string.
* kpropd supports a --pid-file option to write a pid file at startup,
when it is run in standalone mode.
* The "encrypted_challenge_indicator" realm option can be used to
attach an authentication indicator to tickets obtained using FAST
encrypted challenge pre-authentication.
* Localization support can be disabled at build time with the
--disable-nls configure option.
Developer experience:
* The kdcpolicy pluggable interface allows modules control whether
tickets are issued by the KDC.
* The kadm5_auth pluggable interface allows modules to control whether
kadmind grants access to a kadmin request.
* The certauth pluggable interface allows modules to control which
PKINIT client certificates can authenticate to which client
principals.
* KDB modules can use the client and KDC interface IP addresses to
determine whether to allow an AS request.
* GSS applications can query the bit strength of a krb5 GSS context
using the GSS_C_SEC_CONTEXT_SASL_SSF OID with
gss_inquire_sec_context_by_oid().
* GSS applications can query the impersonator name of a krb5 GSS
credential using the GSS_KRB5_GET_CRED_IMPERSONATOR OID with
gss_inquire_cred_by_oid().
* kdcpreauth modules can query the KDC for the canonicalized requested
client principal name, or match a principal name against the
requested client principal name with canonicalization.
Protocol evolution:
* The client library will continue to try pre-authentication
mechanisms after most failure conditions.
* The KDC will issue trivially renewable tickets (where the renewable
lifetime is equal to or less than the ticket lifetime) if requested
by the client, to be friendlier to scripts.
* The client library will use a random nonce for TGS requests instead
of the current system time.
* For the RC4 string-to-key or PAC operations, UTF-16 is supported
(previously only UCS-2 was supported).
* When matching PKINIT client certificates, UPN SANs will be matched
correctly as UPNs, with canonicalization.
User experience:
* Dates after the year 2038 are accepted (provided that the platform
time facilities support them), through the year 2106.
* Automatic credential cache selection based on the client realm will
take into account the fallback realm and the service hostname.
* Referral and alternate cross-realm TGTs will not be cached, avoiding
some scenarios where they can be added to the credential cache
multiple times.
* A German translation has been added.
2017-12-06 04:18:14 +00:00
|
|
|
man/man8/kadmin.local.8.gz
|
2018-07-02 05:57:27 +00:00
|
|
|
man/man8/kadmind.8.gz
|
Welcome the new security/krb5-116 port. This port follows MIT's
KRB5 1.16 releases.
Major changes in 1.16 (2017-12-05)
==================================
Administrator experience:
* The KDC can match PKINIT client certificates against the
"pkinit_cert_match" string attribute on the client principal entry,
using the same syntax as the existing "pkinit_cert_match" profile
option.
* The ktutil addent command supports the "-k 0" option to ignore the
key version, and the "-s" option to use a non-default salt string.
* kpropd supports a --pid-file option to write a pid file at startup,
when it is run in standalone mode.
* The "encrypted_challenge_indicator" realm option can be used to
attach an authentication indicator to tickets obtained using FAST
encrypted challenge pre-authentication.
* Localization support can be disabled at build time with the
--disable-nls configure option.
Developer experience:
* The kdcpolicy pluggable interface allows modules control whether
tickets are issued by the KDC.
* The kadm5_auth pluggable interface allows modules to control whether
kadmind grants access to a kadmin request.
* The certauth pluggable interface allows modules to control which
PKINIT client certificates can authenticate to which client
principals.
* KDB modules can use the client and KDC interface IP addresses to
determine whether to allow an AS request.
* GSS applications can query the bit strength of a krb5 GSS context
using the GSS_C_SEC_CONTEXT_SASL_SSF OID with
gss_inquire_sec_context_by_oid().
* GSS applications can query the impersonator name of a krb5 GSS
credential using the GSS_KRB5_GET_CRED_IMPERSONATOR OID with
gss_inquire_cred_by_oid().
* kdcpreauth modules can query the KDC for the canonicalized requested
client principal name, or match a principal name against the
requested client principal name with canonicalization.
Protocol evolution:
* The client library will continue to try pre-authentication
mechanisms after most failure conditions.
* The KDC will issue trivially renewable tickets (where the renewable
lifetime is equal to or less than the ticket lifetime) if requested
by the client, to be friendlier to scripts.
* The client library will use a random nonce for TGS requests instead
of the current system time.
* For the RC4 string-to-key or PAC operations, UTF-16 is supported
(previously only UCS-2 was supported).
* When matching PKINIT client certificates, UPN SANs will be matched
correctly as UPNs, with canonicalization.
User experience:
* Dates after the year 2038 are accepted (provided that the platform
time facilities support them), through the year 2106.
* Automatic credential cache selection based on the client realm will
take into account the fallback realm and the service hostname.
* Referral and alternate cross-realm TGTs will not be cached, avoiding
some scenarios where they can be added to the credential cache
multiple times.
* A German translation has been added.
2017-12-06 04:18:14 +00:00
|
|
|
man/man8/kdb5_ldap_util.8.gz
|
|
|
|
man/man8/kdb5_util.8.gz
|
|
|
|
man/man8/kprop.8.gz
|
|
|
|
man/man8/kpropd.8.gz
|
|
|
|
man/man8/kproplog.8.gz
|
2018-07-02 05:57:27 +00:00
|
|
|
man/man8/krb5kdc.8.gz
|
Welcome the new security/krb5-116 port. This port follows MIT's
KRB5 1.16 releases.
Major changes in 1.16 (2017-12-05)
==================================
Administrator experience:
* The KDC can match PKINIT client certificates against the
"pkinit_cert_match" string attribute on the client principal entry,
using the same syntax as the existing "pkinit_cert_match" profile
option.
* The ktutil addent command supports the "-k 0" option to ignore the
key version, and the "-s" option to use a non-default salt string.
* kpropd supports a --pid-file option to write a pid file at startup,
when it is run in standalone mode.
* The "encrypted_challenge_indicator" realm option can be used to
attach an authentication indicator to tickets obtained using FAST
encrypted challenge pre-authentication.
* Localization support can be disabled at build time with the
--disable-nls configure option.
Developer experience:
* The kdcpolicy pluggable interface allows modules control whether
tickets are issued by the KDC.
* The kadm5_auth pluggable interface allows modules to control whether
kadmind grants access to a kadmin request.
* The certauth pluggable interface allows modules to control which
PKINIT client certificates can authenticate to which client
principals.
* KDB modules can use the client and KDC interface IP addresses to
determine whether to allow an AS request.
* GSS applications can query the bit strength of a krb5 GSS context
using the GSS_C_SEC_CONTEXT_SASL_SSF OID with
gss_inquire_sec_context_by_oid().
* GSS applications can query the impersonator name of a krb5 GSS
credential using the GSS_KRB5_GET_CRED_IMPERSONATOR OID with
gss_inquire_cred_by_oid().
* kdcpreauth modules can query the KDC for the canonicalized requested
client principal name, or match a principal name against the
requested client principal name with canonicalization.
Protocol evolution:
* The client library will continue to try pre-authentication
mechanisms after most failure conditions.
* The KDC will issue trivially renewable tickets (where the renewable
lifetime is equal to or less than the ticket lifetime) if requested
by the client, to be friendlier to scripts.
* The client library will use a random nonce for TGS requests instead
of the current system time.
* For the RC4 string-to-key or PAC operations, UTF-16 is supported
(previously only UCS-2 was supported).
* When matching PKINIT client certificates, UPN SANs will be matched
correctly as UPNs, with canonicalization.
User experience:
* Dates after the year 2038 are accepted (provided that the platform
time facilities support them), through the year 2106.
* Automatic credential cache selection based on the client realm will
take into account the fallback realm and the service hostname.
* Referral and alternate cross-realm TGTs will not be cached, avoiding
some scenarios where they can be added to the credential cache
multiple times.
* A German translation has been added.
2017-12-06 04:18:14 +00:00
|
|
|
man/man8/sserver.8.gz
|
|
|
|
sbin/gss-server
|
|
|
|
sbin/kadmin.local
|
|
|
|
sbin/kadmind
|
|
|
|
%%LDAP%%sbin/kdb5_ldap_util
|
|
|
|
sbin/kdb5_util
|
|
|
|
sbin/kprop
|
|
|
|
sbin/kpropd
|
|
|
|
sbin/kproplog
|
|
|
|
sbin/krb5-send-pr
|
|
|
|
sbin/krb5kdc
|
|
|
|
sbin/sim_server
|
|
|
|
sbin/sserver
|
|
|
|
sbin/uuserver
|
|
|
|
share/et/et_c.awk
|
|
|
|
share/et/et_h.awk
|
|
|
|
%%NLS%%share/locale/de/LC_MESSAGES/mit-krb5.mo
|
|
|
|
%%NLS%%share/locale/en_US/LC_MESSAGES/mit-krb5.mo
|
|
|
|
%%LDAP%%%%DATADIR%%/kerberos.schema
|
|
|
|
%%LDAP%%%%DATADIR%%/kerberos.ldif
|
|
|
|
@dir lib/krb5/plugins/authdata
|
|
|
|
@dir lib/krb5/plugins/libkrb5
|
|
|
|
@dir var/run/krb5kdc
|
|
|
|
@dir var/krb5kdc
|