Kerberos 5 Release 1.19
    
    
    The MIT Kerberos Team announces the availability of the
      krb5-1.19 release.  The detached PGP
      signature is available without going through the download
      page, if you wish to verify the authenticity of a distribution
      you have obtained elsewhere.
    
Please see the README file for a
      more complete list of changes.
    
You may also see the current full
      list
	of fixed bugs tracked in our RT bugtracking system.
    
Triple-DES transition
    Beginning with the krb5-1.19 release, a warning will be issued
      if initial credentials are acquired using the des3-cbc-sha1
      encryption type.  In future releases, this encryption type will
      be disabled by default and eventually removed.
    
Beginning with the krb5-1.18 release, single-DES encryption
      types have been removed.
    
Major changes in 1.19 (2021-02-01)
    
      - Administrator experience
      
- 
	
	  - When a client keytab is present, the GSSAPI krb5 mech
            will refresh credentials even if the current credentials
            were acquired manually.
	  
- It is now harder to accidentally delete the K/M entry from a KDB.
	
 
- Developer experience
      
- 
	
	  - gss_acquire_cred_from() now supports the "password" and
            "verify" options, allowing credentials to be acquired via
            password and verified using a keytab key.
          
- When an application accepts a GSS security context, the
            new GSS_C_CHANNEL_BOUND_FLAG will be set if the initiator
            and acceptor both provided matching channel bindings.
	  
- Added the GSS_KRB5_NT_X509_CERT name type, allowing
	    S4U2Self requests to identify the desired client principal
	    by certificate.
	  
- PKINIT certauth modules can now cause the hw-authent
	    flag to be set in issued tickets.
	  
- The krb5_init_creds_step() API will now issue the same
	    password expiration warnings as
	    krb5_get_init_creds_password().
	
 
- Protocol evolution
      
- 
	
	  - Added client and KDC support for Microsoft's
	    Resource-Based Constrained Delegation, which allows
	    cross-realm S4U2Proxy requests.  A third-party database
	    module is required for KDC support.
	  
- kadmin/admin is now the preferred server principal name
	    for kadmin connections, and the host-based form is no
	    longer created by default.  The client will still try the
	    host-based form as a fallback.
	  
- Added client and server support for Microsoft's
	    KERB_AP_OPTIONS_CBT extension, which causes channel
	    bindings to be required for the initiator if the acceptor
	    provided them.  The client will send this option if the
	    client_aware_gss_bindings profile option is set.
	
 
- User experience
      
- 
	
	  - kinit will now issue a warning if the des3-cbc-sha1
	    encryption type is used in the reply.  This encryption
	    type will be deprecated and removed in future releases.
	  
- Added kvno flags --out-cache, --no-store, and
	    --cached-only (inspired by Heimdal's kgetcred).
	
 
You may retrieve the Kerberos 5 Release 1.19 source from
      here.
      If you need to acquire the sources from some other distribution
      site, you may verify them against the detached
      PGP signature for krb5-1.19.
    
    $Id: krb5-1.19.html,v 1.6 2021/02/13 20:56:19 ghudson Exp $
    MIT Kerberos
    [ home ]
    [ contact ]