Groups | Search | Server Info | Login | Register


Groups > comp.protocols.kerberos > #5425

krb5-1.22.1 is released

Path csiph.com!tncsrv06.tnetconsulting.net!.POSTED.mailman.mit.edu!not-for-mail
From "Greg Hudson" <ghudson@mit.edu>
Newsgroups comp.protocols.kerberos
Subject krb5-1.22.1 is released
Date Wed, 20 Aug 2025 18:01:31 -0400
Organization TNet Consulting
Lines 132
Sender "kerberos-announce" <kerberos-announce-bounces@mit.edu>
Message-ID <mailman.210.1755727339.2322.kerberos@mit.edu> (permalink)
References <e58febb7-d5be-44f9-afbb-f5e63992c3f5@mit.edu>
MIME-Version 1.0
Content-Type text/plain; charset="us-ascii"; Format="flowed"
Content-Transfer-Encoding 7bit
Injection-Info tncsrv06.tnetconsulting.net; posting-host="mailman.mit.edu:18.7.21.50"; logging-data="29132"; mail-complaints-to="newsmaster@tnetconsulting.net"
User-Agent Mozilla Thunderbird
To kerberos-announce@mit.edu
DKIM-Filter OpenDKIM Filter v2.11.0 unknown-host (unknown-jobid)
Authentication-Results mailman.mit.edu; dkim=pass (1024-bit key, unprotected) header.d=mit.edu header.i=@mit.edu header.a=rsa-sha256 header.s=selector2 header.b=oKcOaMUr; dkim=temperror header.d=mit.edu header.i=@mit.edu header.a=rsa-sha256 header.s=mailman header.b=ENKp0JLC; dkim=fail reason="signature verification failed" (1024-bit key) header.d=mit.edu header.i=@mit.edu header.a=rsa-sha256 header.s=selector2 header.b=jiI417Pu; dkim=neutral header.d=mit.edu header.i=@mit.edu header.a=rsa-sha256 header.s=outgoing header.b=BsyjnE+0
ARC-Seal i=2; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=fail; b=B0deyotOvTG7m4gJ4bShdOaI7FSPUdCF/o38RzoxK+TjlvQcBP9LZNpBe7vJvrmUqjaOI254g5BGj8Fecit8g4TjK7PSdvB9WVvBKhVk/4mwOEqTOObwmskcyq75KMFh7iXvpfDqN8SsnHT0dJ4i+Yw19fICEGWqh8CDyAPZx40d6hm9KSnfpdlrcl8pZgVaLGvi+AsaQ+xl/IZSA+AZ7BaIXzCL6WX+GCFi1JDCeNA4S0xR0RHjBtKfRLTJT5G6Q/0J+gTAMbML6J7LUAIdrwCOZunz6PxE+ssgIyQirQW/yaz7afI+evrnIGGp80E0KMnFAsIbOtpK9HJFWTXACA==
ARC-Message-Signature i=2; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=GVpZGMaAkjCsgYHubFqjx9wEvzzAlj1d3LxSEJegAWk=; b=jsyV24XrZPZTCyCBlgNXuLLAyO0hRRjrZrixLi6NjlLRvQ3+pLu+KoOHYbTwhzNT4D2nReT11xrLxFaiZw2B9f6oK3/f/cqPlX41V038k9tMvemm4buo+JhqwKBi17749IOD4KebpLZjASOaUHLdl/Jyhb1dV7JHdKamS/rOMyql2+147NEvJK8rZCML1ltEH+JG8tDqtC2WONUUsBeiXml288kFo+JnTibkEdL+6wsx1znHmry82mJ8Ee06QbObABrLDKkYnPt2mY1me/QFso76Pds6zD4kbBpp5Mi33llLo1kpYCz599dP5uA05xkBdZHHoA+nqIoeEc/fFFQpPA==
ARC-Authentication-Results i=2; mx.microsoft.com 1; spf=pass (sender ip is 18.7.21.50) smtp.rcpttodomain=mit.edu smtp.mailfrom=mit.edu; dmarc=pass (p=none sp=none pct=100) action=none header.from=mit.edu; dkim=pass (signature was verified) header.d=mit.edu; dkim=fail (signature did not verify) header.d=mit.edu; dkim=fail (signature did not verify) header.d=mit.edu; arc=fail (47)
DKIM-Signature v=1; a=rsa-sha256; c=relaxed/relaxed; d=mit.edu; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=GVpZGMaAkjCsgYHubFqjx9wEvzzAlj1d3LxSEJegAWk=; b=oKcOaMUrhS7eDDhPZ9hl9ihg9o4LGj5FApWQ0H8EU7wrHLSmo4OaC1sjRTkPa1oBpWPyeuweDbX5u6TAQS/FZyRh/RtTEJkPgMiVCRPRRvej4jHFs6YNLM22pTbans7xjo8ZN6cZ1Mnx08IJLm+WILlUJFDS2OTBDoJfp+Frvhw=
X-MS-Exchange-Authentication-Results spf=pass (sender IP is 18.7.21.50) smtp.mailfrom=mit.edu; dkim=pass (signature was verified) header.d=mit.edu;dkim=fail (signature did not verify) header.d=mit.edu;dkim=fail (signature did not verify) header.d=mit.edu;dmarc=pass action=none header.from=mit.edu;
Received-SPF Pass (protection.outlook.com: domain of mit.edu designates 18.7.21.50 as permitted sender) receiver=protection.outlook.com; client-ip=18.7.21.50; helo=mailman.mit.edu; pr=C
DKIM-Filter OpenDKIM Filter v2.11.0 unknown-host (unknown-jobid)
DKIM-Signature v=1; a=rsa-sha256; c=relaxed/relaxed; d=mit.edu; s=mailman; t=1755727331; bh=GVpZGMaAkjCsgYHubFqjx9wEvzzAlj1d3LxSEJegAWk=; h=Message-ID:Date:MIME-Version:From:Subject:Content-Type:From; b=ENKp0JLCFR5l/ml7ydQg663jDMm6faovgOil5sw7vR0XPlXM9p/QS57F7xnCMO+lR WmQ0yAEST6zWWRCx6ULpQkO/S+8Qmv1jw8q4z4tkOy4m/urs3DKu0jLMf1e+F1EG5J FnRqzbzg3s5rpEK4xpdFVkpWw5Mb7L79xi1TS75CEsMpGPMVxwlWJdwBzsXHvE9otj xA1F1m7YgQj3N171UNU5TapEedEfVVem/9a47wBJgIgPLBLNo+0o8UyBBOlrHc+6Le 6DH1s6c0reXK96JOHg+nX0NLCQ+DQJIk/OQim24LI83eey+efc8ljwosv0fw8qyyP2 04WBW/TMcEcGg==
DKIM-Filter OpenDKIM Filter v2.11.0 unknown-host (unknown-jobid)
Authentication-Results-Original mailman.mit.edu; dkim=pass (1024-bit key, unprotected) header.d=mit.edu header.i=@mit.edu header.a=rsa-sha256 header.s=selector2 header.b=jiI417Pu; dkim=temperror header.d=mit.edu header.i=@mit.edu header.a=rsa-sha256 header.s=outgoing header.b=BsyjnE+0
ARC-Seal i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=FA9VsZm9oy7Ms1KG3yelZFHw8UVs6xzS4YbReaYTOg/Qztj+5P4L07Uo/YDWUTwnM8NdsGyQA2O9uXY5F6XQisqcwp7yA0K/RJQDC5lnYeLOq94rKgPD9/7jLzJdJfkZii2IfGHjCjOhX9R2L9owPgiHNuvjzOzVsHIuc0Ov7pqeYAqgU74lc6C8pjSr0/BOShM2HF2cVNV6EPsvCgUp33Acbhg02RVDaUQXce5LOYfLVMzgzD9gm85N2sNr6RhHrD7TPxE5JL1wC23tT+GkummZG3/5eqJVYs3r0XbgJXhbcEQAzKsMciAmIzkW5BgQvGrukG2k8SIJoNYhNXOa1w==
ARC-Message-Signature i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=eoIQgGG0FbRTf2L0pueI1CvGTxahpIyB+ofn6rn+4UU=; b=atkA17VLJ/sg1u7Ceni3jXo+1Y2GCFxo0q/1monI1OnfSpXvurPn2daXJyYUHlrJI6RxMp8hkT80GCN/8S8A8BaWPMXs/YdkQItTr8qPucrwKNts4aNZ7I1D3woS9iVokoGzGsuTpH/B13+PB0Xfq1t5cb22vxKllZ4ReO7o6xKrn3EoekHAmSh+t5flAmho8SydsIXiIJns6jigslsBBPpVYDbDtRlKA2qBEStQ+5bwwXSpNuaanDKYRox7QVpgDJrX6Esq1DCodnAU/Z6YmHCijvLsqsq5r7aLDLoTTm15sdCgu2h1NgLBSrRWEh69qu4fZOxZPE3HALZ+vjBVkA==
ARC-Authentication-Results i=1; mx.microsoft.com 1; spf=pass (sender ip is 18.9.28.11) smtp.rcpttodomain=mit.edu smtp.mailfrom=mit.edu; dmarc=pass (p=none sp=none pct=100) action=none header.from=mit.edu; dkim=pass (signature was verified) header.d=mit.edu; arc=none (0)
DKIM-Signature v=1; a=rsa-sha256; c=relaxed/relaxed; d=mit.edu; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=eoIQgGG0FbRTf2L0pueI1CvGTxahpIyB+ofn6rn+4UU=; b=jiI417PuOlFS0cp33UzM3cge9VuX6DLGkDHspY3XnL6BYnUtEnJacUo2I1dcixLmxL1GAkIgl+O6PUKt2CjPGOK26Z+jHXZF8hle2lzI2n9BQOwDL/AhzyL9ys3M71DFhiWSWCbwv4qQ4+/FifIbMif4xjwSrSmw6AFhPiJ/4WE=
Authentication-Results-Original spf=pass (sender IP is 18.9.28.11) smtp.mailfrom=mit.edu; dkim=pass (signature was verified) header.d=mit.edu;dmarc=pass action=none header.from=mit.edu;
Received-SPF Pass (protection.outlook.com: domain of mit.edu designates 18.9.28.11 as permitted sender) receiver=protection.outlook.com; client-ip=18.9.28.11; helo=outgoing.mit.edu; pr=C
DKIM-Signature v=1; a=rsa-sha256; c=relaxed/relaxed; d=mit.edu; s=outgoing; t=1755727293; bh=eoIQgGG0FbRTf2L0pueI1CvGTxahpIyB+ofn6rn+4UU=; h=Message-ID:Date:MIME-Version:From:Subject:Content-Type; b=BsyjnE+0um4zG8iegdfY+ShcnlMiyQP++2/REUSWGnNbKVhIm5nGZ4vNwYPYcliU4 wv4cx74KSPD9O3o+rfjOqZ49QhOTdbSmWcr3LcyDPafa02fmaR+jMsixWNesj0O3zp lVKQrDPWZJkEcV6tWHKmuPvlPm/8TR+q/psAW/25ZMaqS+RSCVawcqzKxWH0nRvoQO S3NhufSfzsDz3FuF9VCAheW+ygtmYR+R6qFdkt0/AkNSytLldpE/l+mSBTHcaWGLCL ai0FmFDxWW7JJ6XZ9legx5Gxr9VWumWQOWtsrEzwvHDYQVEWCWfX6chKWJ5+VvBSVl Jt3YUefXRXrVQ==
Content-Language en-US
X-EOPAttributedMessage 1
X-MS-TrafficTypeDiagnostic MN1PEPF0000ECD4:EE_|MW6PR01MB8598:EE_|SJ1PEPF0000231F:EE_|BL3PR01MB7114:EE_
X-MS-Office365-Filtering-Correlation-Id ad86f41f-372a-42c2-4af5-08dde0353949
X-LD-Processed 64afd9ba-0ecf-4acf-bc36-935f6235ba8b,ExtAddr,ExtAddr
X-MS-Exchange-AtpMessageProperties SA
X-MS-Exchange-SenderADCheck 1
X-MS-Exchange-AntiSpam-Relay 0
X-Microsoft-Antispam-Untrusted BCL:0; ARA:13230040|1800799024|376014|9140799003;
X-Microsoft-Antispam-Message-Info-Original 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
X-Forefront-Antispam-Report-Untrusted CIP:18.9.28.11; CTRY:US; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:outgoing.mit.edu; PTR:outgoing-auth-1.mit.edu; CAT:NONE; SFS:(13230040)(1800799024)(376014)(9140799003); DIR:OUT; SFP:1101;
X-ExternalRecipientOutboundConnectors 64afd9ba-0ecf-4acf-bc36-935f6235ba8b
X-Auto-Response-Suppress DR, OOF, AutoReply
X-MS-Exchange-Transport-CrossTenantHeadersStamped MW6PR01MB8598
X-Mailman-Approved-At Wed, 20 Aug 2025 18:02:10 -0400
X-BeenThere kerberos-announce@mit.edu
X-Mailman-Version 2.1.34
Precedence list
Errors-To kerberos-announce-bounces@mit.edu
X-MS-Exchange-Transport-CrossTenantHeadersStripped SJ1PEPF0000231F.namprd03.prod.outlook.com
X-MS-PublicTrafficType Email
X-MS-Office365-Filtering-Correlation-Id-Prvs 91f34fde-df7c-4d0d-4eac-08dde0352048
X-Microsoft-Antispam BCL:0; ARA:13230040|35042699022|82310400026|36860700013|1800799024|4022899009|376014|14060799003;
X-Microsoft-Antispam-Message-Info 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
X-Forefront-Antispam-Report CIP:18.7.21.50; CTRY:US; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:mailman.mit.edu; PTR:mailman.mit.edu; CAT:NONE; SFS:(13230040)(35042699022)(82310400026)(36860700013)(1800799024)(4022899009)(376014)(14060799003); DIR:OUT; SFP:1101;
X-OriginatorOrg mit.edu
X-MS-Exchange-CrossTenant-OriginalArrivalTime 20 Aug 2025 22:02:15.1334 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id ad86f41f-372a-42c2-4af5-08dde0353949
X-MS-Exchange-CrossTenant-Id 64afd9ba-0ecf-4acf-bc36-935f6235ba8b
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp TenantId=64afd9ba-0ecf-4acf-bc36-935f6235ba8b; Ip=[18.7.21.50]; Helo=[mailman.mit.edu]
X-MS-Exchange-CrossTenant-AuthSource SJ1PEPF0000231F.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped BL3PR01MB7114
X-BeenThere kerberos@mit.edu
List-Id The Kerberos Authentication System Mailing List <kerberos.mit.edu>
List-Unsubscribe <https://mailman.mit.edu/mailman/options/kerberos>, <mailto:kerberos-request@mit.edu?subject=unsubscribe>
List-Archive <http://mailman.mit.edu/pipermail/kerberos/>
List-Post <mailto:kerberos@mit.edu>
List-Help <mailto:kerberos-request@mit.edu?subject=help>
List-Subscribe <https://mailman.mit.edu/mailman/listinfo/kerberos>, <mailto:kerberos-request@mit.edu?subject=subscribe>
X-Mailman-Original-Message-ID <e58febb7-d5be-44f9-afbb-f5e63992c3f5@mit.edu>
Xref csiph.com comp.protocols.kerberos:5425

Show key headers only | View raw


The MIT Kerberos Team announces the availability of MIT Kerberos 5
Release 1.22.1.  Please see below for a list of some major changes
included, or consult the README file in the source tree for a more
detailed list of significant changes.

RETRIEVING KERBEROS 5 RELEASE 1.22.1
====================================

You may retrieve the Kerberos 5 Release 1.22.1 source from the
following URL:

         https://kerberos.org/dist/

The homepage for the krb5-1.22.1 release is:

         https://web.mit.edu/kerberos/krb5-1.22/

Further information about Kerberos 5 may be found at the following
URL:

         https://web.mit.edu/kerberos/

and at the MIT Kerberos Consortium web site:

         https://www.kerberos.org/


PAC transitions
===============

Beginning with release 1.20, the KDC will include minimal PACs in
tickets instead of AD-SIGNEDPATH authdata.  S4U requests (protocol
transition and constrained delegation) must now contain valid PACs in
the incoming tickets.  Beginning with release 1.21, service ticket
PACs will contain a new KDC checksum buffer, to mitigate a hash
collision attack against the old KDC checksum.  If only some KDCs in a
realm have been upgraded across versions 1.20 or 1.21, the upgraded
KDCs will reject S4U requests containing tickets from non-upgraded
KDCs and vice versa.

Triple-DES and RC4 transitions
==============================

Beginning with the krb5-1.21 release, the KDC will not issue tickets
with triple-DES or RC4 session keys unless explicitly configured using
the new allow_des3 and allow_rc4 variables in [libdefaults].  To
facilitate the negotiation of session keys, the KDC will assume that
all services can handle aes256-sha1 session keys unless the service
principal has a session_enctypes string attribute.

Beginning with the krb5-1.19 release, a warning will be issued if
initial credentials are acquired using the des3-cbc-sha1 encryption
type.  Beginning with the krb5-1.21 release, a warning will also be
issued for the arcfour-hmac encryption type.  In future releases,
these encryption types will be disabled by default and eventually
removed.

Beginning with the krb5-1.18 release, all support for single-DES
encryption types has been removed.


Major changes in 1.22.1 (2025-08-20)
====================================

This is a bug fix release.

* Fix a vulnerability in GSS MIC verification [CVE-2025-57736].

Major changes in 1.22 (2025-08-05)
==================================

User experience:

* The libdefaults configuration variable "request_timeout" can be set
   to limit the total timeout for KDC requests.  When making a KDC
   request, the client will now wait indefinitely (or until the request
   timeout has elapsed) on a KDC which accepts a TCP connection,
   without contacting any additional KDCs.  Clients will make fewer DNS
   queries in some configurations.

* The realm configuration variable "sitename" can be set to cause the
   client to query site-specific DNS records when making KDC requests.

Administrator experience:

* Principal aliases are supported in the DB2 and LMDB KDB modules and
   in the kadmin protocol.  (The LDAP KDB module has supported aliases
   since release 1.7.)

* UNIX domain sockets are supported for the Kerberos and kpasswd
   protocols.

* systemd socket activation is supported for krb5kdc and kadmind.

Developer experience:

* KDB modules can be be implemented in terms of other modules using
   the new krb5_db_load_module() function.

* The profile library supports the modification of empty profiles and
   the copying of modified profiles, making it possible to construct an
   in-memory profile and pass it to krb5_init_context_profile().

* GSS-API applications can pass the GSS_C_CHANNEL_BOUND flag to
   gss_init_sec_context() to request strict enforcement of channel
   bindings by the acceptor.

Protocol evolution:

* The PKINIT preauth module supports elliptic curve client
   certificates, ECDH key exchange, and the Microsoft paChecksum2
   field.

* The IAKERB implementation has been changed to comply with the most
   recent draft standard and to support realm discovery.

* Message-Authenticator is supported in the RADIUS implementation used
   by the OTP kdcpreauth module.

Code quality:

* Removed old-style function declarations, to accomodate compilers
   which have removed support for them.

* Added OSS-Fuzz to the project's continuous integration
   infrastructure.

* Rewrote the GSS per-message token parsing code for improved safety.
_______________________________________________
kerberos-announce mailing list
kerberos-announce@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos-announce

Back to comp.protocols.kerberos | Previous | Next | Find similar


Thread

krb5-1.22.1 is released "Greg Hudson" <ghudson@mit.edu> - 2025-08-20 18:01 -0400

csiph-web