Kerberos 5 Release 1.2
Kerberos 5 Release 1.2.8 is now available
The MIT Kerberos Team announces the availability of the
krb5-1.2.8 release. The README file may be found
here. The
detached PGP signature is available
without going through the download page. Major changes include:
- [1402, 1385, 1395, 1410, 1411] The krb4 protocol vulnerabilities
[MITKRB5-SA-2003-004] have been worked around.
- [1403, 1393] The xdrmem integer overflows [MITKRB5-SA-2003-003] have
been fixed.
- [1405, 1397] The krb5_principal buffer bounds problems
[MITKRB5-SA-2003-005] have been fixed. Thanks to Nalin Dahyabhai.
Kerberos 5 Release 1.2.7 is now available
The MIT Kerberos Team announces the availability of the
krb5-1.2.7 release. The README file may be found
here. The
detached PGP signature is available
without going through the download page. Major changes include:
- [1238] The exploitable buffer overflow in kadmind4
[MITKRB5-SA-2002-002] has been patched. Thanks to Johan Danielsson,
Love Hornquist-Astrand, and Assar Westerlund.
- [1230, 1236] Hierarchical cross-realm has been repaired somewhat.
Terminating NUL characters are no longer generated, and are ignored
on receipt.
Kerberos 5 Release 1.2.6 is now available
The MIT Kerberos Team announces the availability of the
krb5-1.2.6 release. The README file may be found
here. The
detached PGP signature is available
without going through the download page. Major changes include:
- The security vulnerability in xdr_array() [MITKRB5-SA-2002-001] has
been patched. Thanks to Jeffrey Hutzelman and Nikolai Zeldovich.
- A NULL pointer dereference in kadmind has been fixed
[krb5-admin/1140]. Thanks to Mark Levinson.
- There was a botched buffer overflow patch in kadmind4 that caused
problems with kadmind4 acl handling. It has been fixed. Thanks to
Mark Silis.
- Correct ETYPE_INFO padata are now generated. Thanks to Lubos
Kejzlar.
- A bug in AFS salt handling has been worked
around. [krb5-clients/1146] Thanks to Wolfgang Friebel.
- The KDC, in handling both krb5 and krb4 TGS_REQs, now honors the
DISALLOW_ALL_TIX and DISALLOW_SVR attributes on the server
principal. This also now happens with krb524d.
- krb524d will now, by default, convert krb5 tickets for afs service
princpals to special tokens that are actually just the EncryptedData
part of a krb5 Ticket structure. This may be overridden; please
consult src/krb524/README for details.
- Patches from Sleepycat have been applied to the btree backend of the
Brekeley DB library; these fix potential problems with the page free
and page split operations.
- The kdb5_util dump command has additional options to allow for
reversed or recursive (for btree only) dumps of the principal
database. This permits the recovery of prinicpals that might
otherwise be omitted in a database dump in the presence of certain
types of corruption.
- The dump command in kdb5_util now handles master key conversion
without crashing.
Kerberos 5 Release 1.2.5 is now available
The MIT Kerberos Team announces the availability of the
krb5-1.2.5 release. The README file may be found
here. The
detached PGP signature
is available without going through the download page. Major
changes include:
- On MacOS X and on Windows, we have reduced the set of
exported symbol names in order to move towards a stable API in
the future.
- For Heimdal (and possibly Microsoft) compatibility, we now
accept encrypted delegated credentials in gssapi.
Historically, the MIT implementation has sent delegated gssapi
credentials "in the clear", but still encrypted in the AP-REQ.
- IP address checks have been removed from rd_cred; this
improves compatibility with Heimdal.
Kerberos 5 Release 1.2.4 is now available
The MIT Kerberos Team announces the availability of the
krb5-1.2.4 release. This is primarily a bugfix release. The
README file may be found here.
Major changes include:
- The one-character bug introduced into the login.krb5 program
that caused 8-character usernames to be rejected in some
circumstances has been fixed.
- The handling of key version numbers has been modified in
places. The current formats of the keytab and srvtab files,
as well as parts of the remote kadmin protocol, handle key
version numbers as 8-bit quantities, when in fact they are
32-bit quantities; the modifications attempt to work around
these deficiencies to some degree.
- Some issues with multiple enctype support in GSSAPI
credential forwarding have been fixed.
Minor changes include:
- A few compilation problems have been fixed.
- New test cases have been added to the test suite to exercise
some of the new changes.
Kerberos 5 Release 1.2.3 is now available
The MIT Kerberos Team announces the availability of the
krb5-1.2.3 release. This is primarily a bugfix release. The
README file may be found here.
Major changes include:
- Certain problems with shared library builds have been eliminated or
reduced on Linux and HP-UX.
- Various bugs in single-DES enctype similarity have been fixed; the
1.0.x behavior of treating all single-DES enctype as equivalent has
been restored for now. This may go away in a future release. Note
that SUPPORT_DESMD5 will be treated as always false for now.
- The KDC will now log a number of enctype parameters associated with
KDC requests, in order to allow easier debugging of enctype-related
problems.
- A client will no longer attempt obtain a forwarded TGT with a
session key enctype that the target server won't understand.
- Triple-DES should work on Windows now. The SHA-1 implementation had
a Windows-specific bug preventing it from working in most cases.
- Various bugs in pty handling have been fixed.
- Bogus utmp files with garbage characters in their names should not
get created on Solaris. Also, utmp/wtmp handling code has been
mostly rewritten, eliminating numerous bugs.
- Potential buffer-overrun problems and null-pointer dereferences have
been fixed in ftpd, telnetd, login.krb5, and SHA-1. The first three
may be exploitable under certain conditions; the SHA-1 bug probably
isn't, as far as we know.
- For multiple-hop interrealm authentication, the realm transit path
checking has been rewritten. The old code had a serious bug where
some of the transited realms may not have been checked against the
computed path. It was therefore possible to forge a remote client
name in certain cases. We strongly recommend updating application
server code where non-local principals may be found on ACLs.
- In conjunction with the above fix, we've implemented KDC checking of
the realm transit path, as described in the IETF's current
kerberos-revisions draft, and set up the KDC to refuse to issue
tickets with unacceptable transit paths. (Strictly speaking,
according to the Kerberos specification, enforcement of these checks
is supposed to be left to the application servers.) Thus, if your
application servers can't be updated promptly but your KDC can, you
can still prevent such tickets from being issued. This checking is
controlled by a per-realm flag, and is enabled by default.
- On AIX systems, the rlogin server should no longer hang when
control-C is pressed.
- New databases will be created in btree format by default. We
believe the btree code to be less buggy than the hash format code we
have been using. This should not affect the use of any existing
databases, only newly created ones, and even that should be a
transparent change.
Kerberos 5 Release 1.2.2 is now available
The MIT Kerberos Team announces the availability of the
krb5-1.2.2 release. This is primarily a bugfix release. The
README file may be found here.
Major changes include:
- The KDC dump format has been updated to include
per-principal policy information. This will require updating
your slave KDCs before your master if you want things to still
work.
- A library bug that prevented kprop from working properly
with DES3 keys has been fixed.
- kpasswd should no longer coredump when there is no
kadmin_server line in krb5.conf.
- ASN.1 parsing has been improved to deal with indefinite
encodings, such as those emitted by DCE-1.0 derived systems.
- Preauthentication handling code in the initial ticket APIs
has been fixed to handle zero-length ETYPE_INFO sequences
without causing a NULL pointer dereference.
- The replay cache should no longer leak temporary files.
Related hard-to-analyze filename bugs in the rcache code
should also be fixed.
- Library builds should now work on AIX.
- KDC local address search code should now work on AIX.
- The yacc grammar for the ftp daemon has been modified to be
compilable on HP/UX with Bison; namespace pollution from
system headers was causing trouble before.
Kerberos 5 Release 1.2.1 is Now Available
The MIT Kerberos Team announces the availibility of MIT Kerberos 5
Release 1.2.1. This is primarily a bugfix release. Changes
include:
A bug in the gssapi library that prevented kadmin clients
from working has been fixed. For some reason this was not
caught during beta testing.
login.c now correctly sets the default ccache name.
A memory leak in conv_princ.c has been fixed.
Kerberos 5 Release 1.2 is Now Available
The MIT Kerberos team is proud to announce the availability of MIT
Kerberos 5 Release 1.2. Major features include:
Triple DES support, for session keys as well as user or
service keys, should be nearly complete in this release. Much
of the work that has been needed is generic
multiple-cryptosystem support, so the addition of another
cryptosystem should be much easier.
DNS support for locating KDCs is enabled by default. DNS
support for looking up the realm of a host is compiled in but
disabled by default (due to some concerns with DNS spoofing).
We recommend that you publish your KDC information through
DNS even if you intend to rely on config files at your own
site; otherwise, sites that wish to communicate with you will
have to keep their config files updated with your information.
One of the goals of this code is to reduce the client-side
configuration maintenance requirements as much as is possible,
without compromising security.
See the administrator's guide for information on setting up
DNS information for your realm.
One important effect of this for developers is that on many
systems, "-lresolv" must be added to the compiler command line
when linking Kerberos programs.
Configure-time options are available to control the
inclusion of the DNS code and the setting of the defaults.
Entries in krb5.conf will also modify the behavior if the code
has been compiled in.
Numerous buffer-overrun problems have been found and
fixed. Many of these were in locations we don't expect can be
exploited in any useful way (for example, overrunning a buffer
of MAXPATHLEN bytes if a compiled-in pathname is too long, in
a program that has no special privileges). It may be possible
to exploit a few of these to compromise system security.
Partial support for IPv6 addresses has been added. It
can be enabled or disabled at configure time with
--enable-ipv6 or --disable-ipv6; by default, the configure
script will search for certain types and macros, and enable
the IPv6 code if they're found. The IPv6 support at this time
mostly consists of including the addresses in credentials.
A protocol change has been made to the "rcmd" suite
(rlogin, rsh, rcp) to address several security problems
described in Kris Hildrum's paper presented at NDSS 2000. New
command-line options have been added to control the selection
of protocol, since the revised protocol is not compatible with
the old one.
A security problem in login.krb5 has been fixed. This
problem was only present if the krb4 compatibility code was
not compiled in.
A security problem with ftpd has been fixed. An error in
the in the yacc grammar permitted potential root access.
The client programs kinit, klist and kdestroy have been
changed to incorporate krb4 support. New command-line options
control whether krb4 behavior, krb5 behavior, or both are
used.
Patches from Frank Cusack for much better hardware
preauth support have been incorporated.
Patches from Matt Crawford extend the kadmin ACL syntax
so that restrictions can be imposed on what certain
administrators may do to certain accounts.
A KDC on a host with multiple network addresses will now
respond to a client from the address that the client used to
contact it. The means used to implement this will however
cause the KDC not to listen on network addresses configured
after the KDC has started.
Many more changes have been made; please see the README file in
the sources for more details.
Please note that the HTML versions of these documents are
converted from texinfo, and that the conversion is imperfect.
If you want PostScript or GNU info versions, please download
the documentation tarball.
You may retrieve the Kerberos 5 Release 1.2 source from
here.
If you need to acquire the sources from some other distribution
site, perhaps due to problems with our export control web pages,
you may verify them against the detached
PGP signature for krb5-1.2.8.
$Id: index.html,v 1.13 2003/07/17 22:28:54 tlyu Exp $
MIT Kerberos
[ home ]
[ contact ]