Date: Tue, 1 Dec 2020 04:26:24 +0000 (UTC) From: Cy Schubert <cy@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r556712 - head/security/krb5-devel Message-ID: <202012010426.0B14QOrt032746@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: cy Date: Tue Dec 1 04:26:23 2020 New Revision: 556712 URL: https://svnweb.freebsd.org/changeset/ports/556712 Log: Update to the latest MIT KRB5 commit on github. This commit captures KRB5-1.19-beta. The beta announcement on krbdev is as follows: MIT krb5-1.19-beta1 is now available for download from https://web.mit.edu/kerberos/dist/testing.html The main MIT Kerberos web page is https://web.mit.edu/kerberos/ Please send comments to the krbdev list. We plan for the final release to occur in about one month. The README file contains a more extensive list of changes. Major changes in 1.19 --------------------- Administrator experience: * When a client keytab is present, the GSSAPI krb5 mech will refresh credentials even if the current credentials were acquired manually. * It is now harder to accidentally delete the K/M entry from a KDB. Developer experience: * gss_acquire_cred_from() now supports the "password" and "verify" options, allowing credentials to be acquired via password and verified using a keytab key. * When an application accepts a GSS security context, the new GSS_C_CHANNEL_BOUND_FLAG will be set if the initiator and acceptor both provided matching channel bindings. * Added the GSS_KRB5_NT_X509_CERT name type, allowing S4U2Self requests to identify the desired client principal by certificate. * PKINIT certauth modules can now cause the hw-authent flag to be set in issued tickets. * The krb5_init_creds_step() API will now issue the same password expiration warnings as krb5_get_init_creds_password(). Protocol evolution: * Added client and KDC support for Microsoft's Resource-Based Constrained Delegation, which allows cross-realm S4U2Proxy requests. A third-party database module is required for KDC support. * kadmin/admin is now the preferred server principal name for kadmin connections, and the host-based form is no longer created by default. The client will still try the host-based form as a fallback. * Added client and server support for Microsoft's KERB_AP_OPTIONS_CBT extension, which causes channel bindings to be required for the initiator if the acceptor provided them. The client will send this option if the client_aware_gss_bindings profile option is set. User experience: * The default setting of dns_canonicalize_realm is now "fallback". Hostnames provided from applications will be tried in principal names as given (possibly with shortname qualification), falling back to the canonicalized name. * kinit will now issue a warning if the des3-cbc-sha1 encryption type is used in the reply. This encryption type will be deprecated and removed in future releases. * Added kvno flags --out-cache, --no-store, and --cached-only (inspired by Heimdal's kgetcred). Modified: head/security/krb5-devel/Makefile (contents, props changed) head/security/krb5-devel/distinfo (contents, props changed) Modified: head/security/krb5-devel/Makefile ============================================================================== --- head/security/krb5-devel/Makefile Tue Dec 1 04:26:20 2020 (r556711) +++ head/security/krb5-devel/Makefile Tue Dec 1 04:26:23 2020 (r556712) @@ -7,8 +7,8 @@ CATEGORIES= security .if !defined(MASTERDIR) PKGNAMESUFFIX= -devel .endif -HASH= f2203972a -MIT_COMMIT_DATE= 2020.11.22 +HASH= 0293a8967 +MIT_COMMIT_DATE= 2020.11.29 PATCH_SITES= http://web.mit.edu/kerberos/advisories/ PATCH_DIST_STRIP= -p2 Modified: head/security/krb5-devel/distinfo ============================================================================== --- head/security/krb5-devel/distinfo Tue Dec 1 04:26:20 2020 (r556711) +++ head/security/krb5-devel/distinfo Tue Dec 1 04:26:23 2020 (r556712) @@ -1,3 +1,3 @@ -TIMESTAMP = 1606179953 -SHA256 (krb5-krb5-1.19.2020.11.22-f2203972a_GH0.tar.gz) = 17ea26a86b72a3eab31d6b37fe9b4bb2e1c4297ac7ecc19bbf6f8f341aae1cab -SIZE (krb5-krb5-1.19.2020.11.22-f2203972a_GH0.tar.gz) = 5166438 +TIMESTAMP = 1606796040 +SHA256 (krb5-krb5-1.19.2020.11.29-0293a8967_GH0.tar.gz) = 53d4ea3e78423bb77241ecc92f2f8bbf4ae6947a4afbbccb1daaaf82206b6b35 +SIZE (krb5-krb5-1.19.2020.11.29-0293a8967_GH0.tar.gz) = 5167980
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202012010426.0B14QOrt032746>