Kerberos 5 Release 1.22.1
    
    
    The MIT Kerberos Team announces the availability of the
      krb5-1.22.1 release.  The detached PGP
      signature is available without going through the download
      page, if you wish to verify the authenticity of a distribution
      you have obtained elsewhere.
    
Please see the README file for a
      more complete list of changes.
    
You may also see the current full
      list
	of fixed bugs tracked in our RT bugtracking system.
    
PAC transitions
    Beginning with release 1.20, the KDC will include minimal PACs
      in tickets instead of AD-SIGNEDPATH authdata.  S4U requests
      (protocol transition and constrained delegation) must now
      contain valid PACs in the incoming tickets.  Beginning with
      release 1.21, service ticket PACs will contain a new KDC
      checksum buffer, to mitigate a hash collision attack against the
      old KDC checksum.  If only some KDCs in a realm have been
      upgraded across versions 1.20 or 1.21, the upgraded KDCs will
      reject S4U requests containing tickets from non-upgraded KDCs
      and vice versa.
    
Triple-DES and RC4 transitions
    Beginning with the krb5-1.21 release, the KDC will not issue
      tickets with triple-DES or RC4 session keys unless explicitly
      configured using the new allow_des3 and allow_rc4 variables in
      [libdefaults].  To facilitate the negotiation of session keys,
      the KDC will assume that all services can handle aes256-sha1
      session keys unless the service principal has a session_enctypes
      string attribute.
    
Beginning with the krb5-1.19 release, a warning will be issued
      if initial credentials are acquired using the des3-cbc-sha1
      encryption type.  Beginning with the krb5-1.21 release, a
      warning will also be issued for the arcfour-hmac encryption
      type.  In future releases, these encryption types will be
      disabled by default and eventually removed.
    
Beginning with the krb5-1.18 release, all support for
      single-DES encryption types has been removed.
    
Major changes in 1.22.1 (2025-08-20)
    
      - Fix a vulnerability in GSS MIC verification
        [CVE-2025-57736].
    
Major changes in 1.22 (2025-08-05)
    
      - User experience
      
- 
	
	  - The libdefaults configuration variable "request_timeout"
            can be set to limit the total timeout for KDC requests.
            When making a KDC request, the client will now wait
            indefinitely (or until the request timeout has elapsed) on
            a KDC which accepts a TCP connection, without contacting
            any additional KDCs.  Clients will make fewer DNS queries
            in some configurations.
	  
- The realm configuration variable "sitename" can be set
            to cause the client to query site-specific DNS records
            when making KDC requests.
	
 
- Administrator experience
      
- 
	
	  - Principal aliases are supported in the DB2 and LMDB KDB
            modules and in the kadmin protocol.  (The LDAP KDB module
            has supported aliases since release 1.7.)
	  
- UNIX domain sockets are supported for the Kerberos and
            kpasswd protocols.
	  
- systemd socket activation is supported for krb5kdc and
	    kadmind.
      
 
- Developer experience
      
- 
	
	  - KDB modules can be be implemented in terms of other
            modules using the new krb5_db_load_module() function.
	  
- The profile library supports the modification of empty
            profiles and the copying of modified profiles, making it
            possible to construct an in-memory profile and pass it to
            krb5_init_context_profile().
	  
- GSS-API applications can pass the GSS_C_CHANNEL_BOUND
            flag to gss_init_sec_context() to request strict
            enforcement of channel bindings by the acceptor.
	
 
- Protocol evolution
      
- 
	
	  - The PKINIT preauth module supports elliptic curve client
           certificates, ECDH key exchange, and the Microsoft
           paChecksum2 field.
	  
- The IAKERB implementation has been changed to comply
            with the most recent draft standard and to support realm
            discovery.
	  
- Message-Authenticator is supported in the RADIUS
            implementation used by the OTP kdcpreauth module.
	
 
- Code quality
      
- 
	
	  - Removed old-style function declarations, to accomodate
            compilers which have removed support for them.
	  
- Added OSS-Fuzz to the project's continuous integration
            infrastructure.
	  
- Rewrote the GSS per-message token parsing code for
	    improved safety.
	
 
You may retrieve the Kerberos 5 Release 1.22.1 source from
      here.
      If you need to acquire the sources from some other distribution
      site, you may verify them against the detached
      PGP signature for krb5-1.22.1.
    
    $Id: krb5-1.22.1.html,v 1.1 2025/08/20 20:18:45 ghudson Exp $
    MIT Kerberos
    [ home ]
    [ contact ]