summaryrefslogtreecommitdiff
path: root/doc/html/mitK5features.html
diff options
context:
space:
mode:
Diffstat (limited to 'doc/html/mitK5features.html')
-rw-r--r--doc/html/mitK5features.html82
1 files changed, 77 insertions, 5 deletions
diff --git a/doc/html/mitK5features.html b/doc/html/mitK5features.html
index 7fa633c6c643..5fd257df2576 100644
--- a/doc/html/mitK5features.html
+++ b/doc/html/mitK5features.html
@@ -15,7 +15,7 @@
<script type="text/javascript">
var DOCUMENTATION_OPTIONS = {
URL_ROOT: './',
- VERSION: '1.15.1',
+ VERSION: '1.16',
COLLAPSE_INDEX: false,
FILE_SUFFIX: '.html',
HAS_SOURCE: true
@@ -73,8 +73,8 @@
<dl class="docutils">
<dt>Releases:</dt>
<dd><ul class="first last simple">
-<li>Latest stable: <a class="reference external" href="http://web.mit.edu/kerberos/krb5-1.15/">http://web.mit.edu/kerberos/krb5-1.15/</a></li>
-<li>Supported: <a class="reference external" href="http://web.mit.edu/kerberos/krb5-1.14/">http://web.mit.edu/kerberos/krb5-1.14/</a></li>
+<li>Latest stable: <a class="reference external" href="http://web.mit.edu/kerberos/krb5-1.16/">http://web.mit.edu/kerberos/krb5-1.16/</a></li>
+<li>Supported: <a class="reference external" href="http://web.mit.edu/kerberos/krb5-1.15/">http://web.mit.edu/kerberos/krb5-1.15/</a></li>
<li>Release cycle: 9 &#8211; 12 months</li>
</ul>
</dd>
@@ -219,7 +219,7 @@ old keys. <a class="reference external" href="http://cve.mitre.org/cgi-bin/cvena
<li>Add client support for the Kerberos Cache Manager protocol. If
the host is running a Heimdal kcm daemon, caches served by the
daemon can be accessed with the KCM: cache type.</li>
-<li>When built on OS X 10.7 and higher, use &#8220;KCM:&#8221; as the default
+<li>When built on macOS 10.7 and higher, use &#8220;KCM:&#8221; as the default
cachetype, unless overridden by command-line options or
krb5-config values.</li>
<li>Add support for doing unlocked database dumps for the DB2 KDC
@@ -363,6 +363,78 @@ conform to Suite B crypto requirements.</li>
</ul>
</li>
</ul>
+<p>Release 1.16</p>
+<ul class="simple">
+<li>Administrator experience:<ul>
+<li>The KDC can match PKINIT client certificates against the
+&#8220;pkinit_cert_match&#8221; string attribute on the client principal
+entry, using the same syntax as the existing &#8220;pkinit_cert_match&#8221;
+profile option.</li>
+<li>The ktutil addent command supports the &#8220;-k 0&#8221; option to ignore the
+key version, and the &#8220;-s&#8221; option to use a non-default salt string.</li>
+<li>kpropd supports a &#8211;pid-file option to write a pid file at
+startup, when it is run in standalone mode.</li>
+<li>The &#8220;encrypted_challenge_indicator&#8221; realm option can be used to
+attach an authentication indicator to tickets obtained using FAST
+encrypted challenge pre-authentication.</li>
+<li>Localization support can be disabled at build time with the
+&#8211;disable-nls configure option.</li>
+</ul>
+</li>
+<li>Developer experience:<ul>
+<li>The kdcpolicy pluggable interface allows modules control whether
+tickets are issued by the KDC.</li>
+<li>The kadm5_auth pluggable interface allows modules to control
+whether kadmind grants access to a kadmin request.</li>
+<li>The certauth pluggable interface allows modules to control which
+PKINIT client certificates can authenticate to which client
+principals.</li>
+<li>KDB modules can use the client and KDC interface IP addresses to
+determine whether to allow an AS request.</li>
+<li>GSS applications can query the bit strength of a krb5 GSS context
+using the GSS_C_SEC_CONTEXT_SASL_SSF OID with
+gss_inquire_sec_context_by_oid().</li>
+<li>GSS applications can query the impersonator name of a krb5 GSS
+credential using the GSS_KRB5_GET_CRED_IMPERSONATOR OID with
+gss_inquire_cred_by_oid().</li>
+<li>kdcpreauth modules can query the KDC for the canonicalized
+requested client principal name, or match a principal name against
+the requested client principal name with canonicalization.</li>
+</ul>
+</li>
+<li>Protocol evolution:<ul>
+<li>The client library will continue to try pre-authentication
+mechanisms after most failure conditions.</li>
+<li>The KDC will issue trivially renewable tickets (where the
+renewable lifetime is equal to or less than the ticket lifetime)
+if requested by the client, to be friendlier to scripts.</li>
+<li>The client library will use a random nonce for TGS requests
+instead of the current system time.</li>
+<li>For the RC4 string-to-key or PAC operations, UTF-16 is supported
+(previously only UCS-2 was supported).</li>
+<li>When matching PKINIT client certificates, UPN SANs will be matched
+correctly as UPNs, with canonicalization.</li>
+</ul>
+</li>
+<li>User experience:<ul>
+<li>Dates after the year 2038 are accepted (provided that the platform
+time facilities support them), through the year 2106.</li>
+<li>Automatic credential cache selection based on the client realm
+will take into account the fallback realm and the service
+hostname.</li>
+<li>Referral and alternate cross-realm TGTs will not be cached,
+avoiding some scenarios where they can be added to the credential
+cache multiple times.</li>
+<li>A German translation has been added.</li>
+</ul>
+</li>
+<li>Code quality:<ul>
+<li>The build is warning-clean under clang with the configured warning
+options.</li>
+<li>The automated test suite runs cleanly under AddressSanitizer.</li>
+</ul>
+</li>
+</ul>
<p><cite>Pre-authentication mechanisms</cite></p>
<ul class="simple">
<li>PW-SALT <span class="target" id="index-11"></span><a class="rfc reference external" href="http://tools.ietf.org/html/rfc4120.html#section-5.2.7.3"><strong>RFC 4120</strong></a></li>
@@ -435,7 +507,7 @@ conform to Suite B crypto requirements.</li>
<div class="footer-wrapper">
<div class="footer" >
- <div class="right" ><i>Release: 1.15.1</i><br />
+ <div class="right" ><i>Release: 1.16</i><br />
&copy; <a href="copyright.html">Copyright</a> 1985-2017, MIT.
</div>
<div class="left">