Groups | Search | Server Info | Login | Register
Groups > comp.protocols.kerberos > #5425
| Path | csiph.com!tncsrv06.tnetconsulting.net!.POSTED.mailman.mit.edu!not-for-mail |
|---|---|
| From | "Greg Hudson" <ghudson@mit.edu> |
| Newsgroups | comp.protocols.kerberos |
| Subject | krb5-1.22.1 is released |
| Date | Wed, 20 Aug 2025 18:01:31 -0400 |
| Organization | TNet Consulting |
| Lines | 132 |
| Sender | "kerberos-announce" <kerberos-announce-bounces@mit.edu> |
| Message-ID | <mailman.210.1755727339.2322.kerberos@mit.edu> (permalink) |
| References | <e58febb7-d5be-44f9-afbb-f5e63992c3f5@mit.edu> |
| MIME-Version | 1.0 |
| Content-Type | text/plain; charset="us-ascii"; Format="flowed" |
| Content-Transfer-Encoding | 7bit |
| Injection-Info | tncsrv06.tnetconsulting.net; posting-host="mailman.mit.edu:18.7.21.50"; logging-data="29132"; mail-complaints-to="newsmaster@tnetconsulting.net" |
| User-Agent | Mozilla Thunderbird |
| To | kerberos-announce@mit.edu |
| DKIM-Filter | OpenDKIM Filter v2.11.0 unknown-host (unknown-jobid) |
| Authentication-Results | mailman.mit.edu; dkim=pass (1024-bit key, unprotected) header.d=mit.edu header.i=@mit.edu header.a=rsa-sha256 header.s=selector2 header.b=oKcOaMUr; dkim=temperror header.d=mit.edu header.i=@mit.edu header.a=rsa-sha256 header.s=mailman header.b=ENKp0JLC; dkim=fail reason="signature verification failed" (1024-bit key) header.d=mit.edu header.i=@mit.edu header.a=rsa-sha256 header.s=selector2 header.b=jiI417Pu; dkim=neutral header.d=mit.edu header.i=@mit.edu header.a=rsa-sha256 header.s=outgoing header.b=BsyjnE+0 |
| ARC-Seal | i=2; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=fail; b=B0deyotOvTG7m4gJ4bShdOaI7FSPUdCF/o38RzoxK+TjlvQcBP9LZNpBe7vJvrmUqjaOI254g5BGj8Fecit8g4TjK7PSdvB9WVvBKhVk/4mwOEqTOObwmskcyq75KMFh7iXvpfDqN8SsnHT0dJ4i+Yw19fICEGWqh8CDyAPZx40d6hm9KSnfpdlrcl8pZgVaLGvi+AsaQ+xl/IZSA+AZ7BaIXzCL6WX+GCFi1JDCeNA4S0xR0RHjBtKfRLTJT5G6Q/0J+gTAMbML6J7LUAIdrwCOZunz6PxE+ssgIyQirQW/yaz7afI+evrnIGGp80E0KMnFAsIbOtpK9HJFWTXACA== |
| ARC-Message-Signature | i=2; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=GVpZGMaAkjCsgYHubFqjx9wEvzzAlj1d3LxSEJegAWk=; b=jsyV24XrZPZTCyCBlgNXuLLAyO0hRRjrZrixLi6NjlLRvQ3+pLu+KoOHYbTwhzNT4D2nReT11xrLxFaiZw2B9f6oK3/f/cqPlX41V038k9tMvemm4buo+JhqwKBi17749IOD4KebpLZjASOaUHLdl/Jyhb1dV7JHdKamS/rOMyql2+147NEvJK8rZCML1ltEH+JG8tDqtC2WONUUsBeiXml288kFo+JnTibkEdL+6wsx1znHmry82mJ8Ee06QbObABrLDKkYnPt2mY1me/QFso76Pds6zD4kbBpp5Mi33llLo1kpYCz599dP5uA05xkBdZHHoA+nqIoeEc/fFFQpPA== |
| ARC-Authentication-Results | i=2; mx.microsoft.com 1; spf=pass (sender ip is 18.7.21.50) smtp.rcpttodomain=mit.edu smtp.mailfrom=mit.edu; dmarc=pass (p=none sp=none pct=100) action=none header.from=mit.edu; dkim=pass (signature was verified) header.d=mit.edu; dkim=fail (signature did not verify) header.d=mit.edu; dkim=fail (signature did not verify) header.d=mit.edu; arc=fail (47) |
| DKIM-Signature | v=1; a=rsa-sha256; c=relaxed/relaxed; d=mit.edu; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=GVpZGMaAkjCsgYHubFqjx9wEvzzAlj1d3LxSEJegAWk=; b=oKcOaMUrhS7eDDhPZ9hl9ihg9o4LGj5FApWQ0H8EU7wrHLSmo4OaC1sjRTkPa1oBpWPyeuweDbX5u6TAQS/FZyRh/RtTEJkPgMiVCRPRRvej4jHFs6YNLM22pTbans7xjo8ZN6cZ1Mnx08IJLm+WILlUJFDS2OTBDoJfp+Frvhw= |
| X-MS-Exchange-Authentication-Results | spf=pass (sender IP is 18.7.21.50) smtp.mailfrom=mit.edu; dkim=pass (signature was verified) header.d=mit.edu;dkim=fail (signature did not verify) header.d=mit.edu;dkim=fail (signature did not verify) header.d=mit.edu;dmarc=pass action=none header.from=mit.edu; |
| Received-SPF | Pass (protection.outlook.com: domain of mit.edu designates 18.7.21.50 as permitted sender) receiver=protection.outlook.com; client-ip=18.7.21.50; helo=mailman.mit.edu; pr=C |
| DKIM-Filter | OpenDKIM Filter v2.11.0 unknown-host (unknown-jobid) |
| DKIM-Signature | v=1; a=rsa-sha256; c=relaxed/relaxed; d=mit.edu; s=mailman; t=1755727331; bh=GVpZGMaAkjCsgYHubFqjx9wEvzzAlj1d3LxSEJegAWk=; h=Message-ID:Date:MIME-Version:From:Subject:Content-Type:From; b=ENKp0JLCFR5l/ml7ydQg663jDMm6faovgOil5sw7vR0XPlXM9p/QS57F7xnCMO+lR WmQ0yAEST6zWWRCx6ULpQkO/S+8Qmv1jw8q4z4tkOy4m/urs3DKu0jLMf1e+F1EG5J FnRqzbzg3s5rpEK4xpdFVkpWw5Mb7L79xi1TS75CEsMpGPMVxwlWJdwBzsXHvE9otj xA1F1m7YgQj3N171UNU5TapEedEfVVem/9a47wBJgIgPLBLNo+0o8UyBBOlrHc+6Le 6DH1s6c0reXK96JOHg+nX0NLCQ+DQJIk/OQim24LI83eey+efc8ljwosv0fw8qyyP2 04WBW/TMcEcGg== |
| DKIM-Filter | OpenDKIM Filter v2.11.0 unknown-host (unknown-jobid) |
| Authentication-Results-Original | mailman.mit.edu; dkim=pass (1024-bit key, unprotected) header.d=mit.edu header.i=@mit.edu header.a=rsa-sha256 header.s=selector2 header.b=jiI417Pu; dkim=temperror header.d=mit.edu header.i=@mit.edu header.a=rsa-sha256 header.s=outgoing header.b=BsyjnE+0 |
| ARC-Seal | i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=FA9VsZm9oy7Ms1KG3yelZFHw8UVs6xzS4YbReaYTOg/Qztj+5P4L07Uo/YDWUTwnM8NdsGyQA2O9uXY5F6XQisqcwp7yA0K/RJQDC5lnYeLOq94rKgPD9/7jLzJdJfkZii2IfGHjCjOhX9R2L9owPgiHNuvjzOzVsHIuc0Ov7pqeYAqgU74lc6C8pjSr0/BOShM2HF2cVNV6EPsvCgUp33Acbhg02RVDaUQXce5LOYfLVMzgzD9gm85N2sNr6RhHrD7TPxE5JL1wC23tT+GkummZG3/5eqJVYs3r0XbgJXhbcEQAzKsMciAmIzkW5BgQvGrukG2k8SIJoNYhNXOa1w== |
| ARC-Message-Signature | i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=eoIQgGG0FbRTf2L0pueI1CvGTxahpIyB+ofn6rn+4UU=; b=atkA17VLJ/sg1u7Ceni3jXo+1Y2GCFxo0q/1monI1OnfSpXvurPn2daXJyYUHlrJI6RxMp8hkT80GCN/8S8A8BaWPMXs/YdkQItTr8qPucrwKNts4aNZ7I1D3woS9iVokoGzGsuTpH/B13+PB0Xfq1t5cb22vxKllZ4ReO7o6xKrn3EoekHAmSh+t5flAmho8SydsIXiIJns6jigslsBBPpVYDbDtRlKA2qBEStQ+5bwwXSpNuaanDKYRox7QVpgDJrX6Esq1DCodnAU/Z6YmHCijvLsqsq5r7aLDLoTTm15sdCgu2h1NgLBSrRWEh69qu4fZOxZPE3HALZ+vjBVkA== |
| ARC-Authentication-Results | i=1; mx.microsoft.com 1; spf=pass (sender ip is 18.9.28.11) smtp.rcpttodomain=mit.edu smtp.mailfrom=mit.edu; dmarc=pass (p=none sp=none pct=100) action=none header.from=mit.edu; dkim=pass (signature was verified) header.d=mit.edu; arc=none (0) |
| DKIM-Signature | v=1; a=rsa-sha256; c=relaxed/relaxed; d=mit.edu; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=eoIQgGG0FbRTf2L0pueI1CvGTxahpIyB+ofn6rn+4UU=; b=jiI417PuOlFS0cp33UzM3cge9VuX6DLGkDHspY3XnL6BYnUtEnJacUo2I1dcixLmxL1GAkIgl+O6PUKt2CjPGOK26Z+jHXZF8hle2lzI2n9BQOwDL/AhzyL9ys3M71DFhiWSWCbwv4qQ4+/FifIbMif4xjwSrSmw6AFhPiJ/4WE= |
| Authentication-Results-Original | spf=pass (sender IP is 18.9.28.11) smtp.mailfrom=mit.edu; dkim=pass (signature was verified) header.d=mit.edu;dmarc=pass action=none header.from=mit.edu; |
| Received-SPF | Pass (protection.outlook.com: domain of mit.edu designates 18.9.28.11 as permitted sender) receiver=protection.outlook.com; client-ip=18.9.28.11; helo=outgoing.mit.edu; pr=C |
| DKIM-Signature | v=1; a=rsa-sha256; c=relaxed/relaxed; d=mit.edu; s=outgoing; t=1755727293; bh=eoIQgGG0FbRTf2L0pueI1CvGTxahpIyB+ofn6rn+4UU=; h=Message-ID:Date:MIME-Version:From:Subject:Content-Type; b=BsyjnE+0um4zG8iegdfY+ShcnlMiyQP++2/REUSWGnNbKVhIm5nGZ4vNwYPYcliU4 wv4cx74KSPD9O3o+rfjOqZ49QhOTdbSmWcr3LcyDPafa02fmaR+jMsixWNesj0O3zp lVKQrDPWZJkEcV6tWHKmuPvlPm/8TR+q/psAW/25ZMaqS+RSCVawcqzKxWH0nRvoQO S3NhufSfzsDz3FuF9VCAheW+ygtmYR+R6qFdkt0/AkNSytLldpE/l+mSBTHcaWGLCL ai0FmFDxWW7JJ6XZ9legx5Gxr9VWumWQOWtsrEzwvHDYQVEWCWfX6chKWJ5+VvBSVl Jt3YUefXRXrVQ== |
| Content-Language | en-US |
| X-EOPAttributedMessage | 1 |
| X-MS-TrafficTypeDiagnostic | MN1PEPF0000ECD4:EE_|MW6PR01MB8598:EE_|SJ1PEPF0000231F:EE_|BL3PR01MB7114:EE_ |
| X-MS-Office365-Filtering-Correlation-Id | ad86f41f-372a-42c2-4af5-08dde0353949 |
| X-LD-Processed | 64afd9ba-0ecf-4acf-bc36-935f6235ba8b,ExtAddr,ExtAddr |
| X-MS-Exchange-AtpMessageProperties | SA |
| X-MS-Exchange-SenderADCheck | 1 |
| X-MS-Exchange-AntiSpam-Relay | 0 |
| X-Microsoft-Antispam-Untrusted | BCL:0; ARA:13230040|1800799024|376014|9140799003; |
| X-Microsoft-Antispam-Message-Info-Original | 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 |
| X-Forefront-Antispam-Report-Untrusted | CIP:18.9.28.11; CTRY:US; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:outgoing.mit.edu; PTR:outgoing-auth-1.mit.edu; CAT:NONE; SFS:(13230040)(1800799024)(376014)(9140799003); DIR:OUT; SFP:1101; |
| X-ExternalRecipientOutboundConnectors | 64afd9ba-0ecf-4acf-bc36-935f6235ba8b |
| X-Auto-Response-Suppress | DR, OOF, AutoReply |
| X-MS-Exchange-Transport-CrossTenantHeadersStamped | MW6PR01MB8598 |
| X-Mailman-Approved-At | Wed, 20 Aug 2025 18:02:10 -0400 |
| X-BeenThere | kerberos-announce@mit.edu |
| X-Mailman-Version | 2.1.34 |
| Precedence | list |
| Errors-To | kerberos-announce-bounces@mit.edu |
| X-MS-Exchange-Transport-CrossTenantHeadersStripped | SJ1PEPF0000231F.namprd03.prod.outlook.com |
| X-MS-PublicTrafficType | |
| X-MS-Office365-Filtering-Correlation-Id-Prvs | 91f34fde-df7c-4d0d-4eac-08dde0352048 |
| X-Microsoft-Antispam | BCL:0; ARA:13230040|35042699022|82310400026|36860700013|1800799024|4022899009|376014|14060799003; |
| X-Microsoft-Antispam-Message-Info | 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 |
| X-Forefront-Antispam-Report | CIP:18.7.21.50; CTRY:US; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:mailman.mit.edu; PTR:mailman.mit.edu; CAT:NONE; SFS:(13230040)(35042699022)(82310400026)(36860700013)(1800799024)(4022899009)(376014)(14060799003); DIR:OUT; SFP:1101; |
| X-OriginatorOrg | mit.edu |
| X-MS-Exchange-CrossTenant-OriginalArrivalTime | 20 Aug 2025 22:02:15.1334 (UTC) |
| X-MS-Exchange-CrossTenant-Network-Message-Id | ad86f41f-372a-42c2-4af5-08dde0353949 |
| X-MS-Exchange-CrossTenant-Id | 64afd9ba-0ecf-4acf-bc36-935f6235ba8b |
| X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp | TenantId=64afd9ba-0ecf-4acf-bc36-935f6235ba8b; Ip=[18.7.21.50]; Helo=[mailman.mit.edu] |
| X-MS-Exchange-CrossTenant-AuthSource | SJ1PEPF0000231F.namprd03.prod.outlook.com |
| X-MS-Exchange-CrossTenant-AuthAs | Anonymous |
| X-MS-Exchange-CrossTenant-FromEntityHeader | HybridOnPrem |
| X-MS-Exchange-Transport-CrossTenantHeadersStamped | BL3PR01MB7114 |
| X-BeenThere | kerberos@mit.edu |
| List-Id | The Kerberos Authentication System Mailing List <kerberos.mit.edu> |
| List-Unsubscribe | <https://mailman.mit.edu/mailman/options/kerberos>, <mailto:kerberos-request@mit.edu?subject=unsubscribe> |
| List-Archive | <http://mailman.mit.edu/pipermail/kerberos/> |
| List-Post | <mailto:kerberos@mit.edu> |
| List-Help | <mailto:kerberos-request@mit.edu?subject=help> |
| List-Subscribe | <https://mailman.mit.edu/mailman/listinfo/kerberos>, <mailto:kerberos-request@mit.edu?subject=subscribe> |
| X-Mailman-Original-Message-ID | <e58febb7-d5be-44f9-afbb-f5e63992c3f5@mit.edu> |
| Xref | csiph.com comp.protocols.kerberos:5425 |
Show key headers only | View raw
The MIT Kerberos Team announces the availability of MIT Kerberos 5
Release 1.22.1. Please see below for a list of some major changes
included, or consult the README file in the source tree for a more
detailed list of significant changes.
RETRIEVING KERBEROS 5 RELEASE 1.22.1
====================================
You may retrieve the Kerberos 5 Release 1.22.1 source from the
following URL:
https://kerberos.org/dist/
The homepage for the krb5-1.22.1 release is:
https://web.mit.edu/kerberos/krb5-1.22/
Further information about Kerberos 5 may be found at the following
URL:
https://web.mit.edu/kerberos/
and at the MIT Kerberos Consortium web site:
https://www.kerberos.org/
PAC transitions
===============
Beginning with release 1.20, the KDC will include minimal PACs in
tickets instead of AD-SIGNEDPATH authdata. S4U requests (protocol
transition and constrained delegation) must now contain valid PACs in
the incoming tickets. Beginning with release 1.21, service ticket
PACs will contain a new KDC checksum buffer, to mitigate a hash
collision attack against the old KDC checksum. If only some KDCs in a
realm have been upgraded across versions 1.20 or 1.21, the upgraded
KDCs will reject S4U requests containing tickets from non-upgraded
KDCs and vice versa.
Triple-DES and RC4 transitions
==============================
Beginning with the krb5-1.21 release, the KDC will not issue tickets
with triple-DES or RC4 session keys unless explicitly configured using
the new allow_des3 and allow_rc4 variables in [libdefaults]. To
facilitate the negotiation of session keys, the KDC will assume that
all services can handle aes256-sha1 session keys unless the service
principal has a session_enctypes string attribute.
Beginning with the krb5-1.19 release, a warning will be issued if
initial credentials are acquired using the des3-cbc-sha1 encryption
type. Beginning with the krb5-1.21 release, a warning will also be
issued for the arcfour-hmac encryption type. In future releases,
these encryption types will be disabled by default and eventually
removed.
Beginning with the krb5-1.18 release, all support for single-DES
encryption types has been removed.
Major changes in 1.22.1 (2025-08-20)
====================================
This is a bug fix release.
* Fix a vulnerability in GSS MIC verification [CVE-2025-57736].
Major changes in 1.22 (2025-08-05)
==================================
User experience:
* The libdefaults configuration variable "request_timeout" can be set
to limit the total timeout for KDC requests. When making a KDC
request, the client will now wait indefinitely (or until the request
timeout has elapsed) on a KDC which accepts a TCP connection,
without contacting any additional KDCs. Clients will make fewer DNS
queries in some configurations.
* The realm configuration variable "sitename" can be set to cause the
client to query site-specific DNS records when making KDC requests.
Administrator experience:
* Principal aliases are supported in the DB2 and LMDB KDB modules and
in the kadmin protocol. (The LDAP KDB module has supported aliases
since release 1.7.)
* UNIX domain sockets are supported for the Kerberos and kpasswd
protocols.
* systemd socket activation is supported for krb5kdc and kadmind.
Developer experience:
* KDB modules can be be implemented in terms of other modules using
the new krb5_db_load_module() function.
* The profile library supports the modification of empty profiles and
the copying of modified profiles, making it possible to construct an
in-memory profile and pass it to krb5_init_context_profile().
* GSS-API applications can pass the GSS_C_CHANNEL_BOUND flag to
gss_init_sec_context() to request strict enforcement of channel
bindings by the acceptor.
Protocol evolution:
* The PKINIT preauth module supports elliptic curve client
certificates, ECDH key exchange, and the Microsoft paChecksum2
field.
* The IAKERB implementation has been changed to comply with the most
recent draft standard and to support realm discovery.
* Message-Authenticator is supported in the RADIUS implementation used
by the OTP kdcpreauth module.
Code quality:
* Removed old-style function declarations, to accomodate compilers
which have removed support for them.
* Added OSS-Fuzz to the project's continuous integration
infrastructure.
* Rewrote the GSS per-message token parsing code for improved safety.
_______________________________________________
kerberos-announce mailing list
kerberos-announce@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos-announce
Back to comp.protocols.kerberos | Previous | Next | Find similar
krb5-1.22.1 is released "Greg Hudson" <ghudson@mit.edu> - 2025-08-20 18:01 -0400
csiph-web