Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 1 Dec 2020 04:26:24 +0000 (UTC)
From:      Cy Schubert <cy@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r556712 - head/security/krb5-devel
Message-ID:  <202012010426.0B14QOrt032746@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: cy
Date: Tue Dec  1 04:26:23 2020
New Revision: 556712
URL: https://svnweb.freebsd.org/changeset/ports/556712

Log:
  Update to the latest MIT KRB5 commit on github.
  
  This commit captures KRB5-1.19-beta. The beta announcement on
  krbdev is as follows:
  
  MIT krb5-1.19-beta1 is now available for download from
  
           https://web.mit.edu/kerberos/dist/testing.html
  
  The main MIT Kerberos web page is
  
           https://web.mit.edu/kerberos/
  
  Please send comments to the krbdev list.  We plan for the final
  release to occur in about one month.  The README file contains a more
  extensive list of changes.
  
  Major changes in 1.19
  ---------------------
  
  Administrator experience:
  
  * When a client keytab is present, the GSSAPI krb5 mech will refresh
    credentials even if the current credentials were acquired manually.
  
  * It is now harder to accidentally delete the K/M entry from a KDB.
  
  Developer experience:
  
  * gss_acquire_cred_from() now supports the "password" and "verify"
    options, allowing credentials to be acquired via password and
    verified using a keytab key.
  
  * When an application accepts a GSS security context, the new
    GSS_C_CHANNEL_BOUND_FLAG will be set if the initiator and acceptor
    both provided matching channel bindings.
  
  * Added the GSS_KRB5_NT_X509_CERT name type, allowing S4U2Self
    requests to identify the desired client principal by certificate.
  
  * PKINIT certauth modules can now cause the hw-authent flag to be set
    in issued tickets.
  
  * The krb5_init_creds_step() API will now issue the same password
    expiration warnings as krb5_get_init_creds_password().
  
  Protocol evolution:
  
  * Added client and KDC support for Microsoft's Resource-Based
    Constrained Delegation, which allows cross-realm S4U2Proxy requests.
    A third-party database module is required for KDC support.
  
  * kadmin/admin is now the preferred server principal name for kadmin
    connections, and the host-based form is no longer created by
    default.  The client will still try the host-based form as a
    fallback.
  
  * Added client and server support for Microsoft's KERB_AP_OPTIONS_CBT
    extension, which causes channel bindings to be required for the
    initiator if the acceptor provided them.  The client will send this
    option if the client_aware_gss_bindings profile option is set.
  
  User experience:
  
  * The default setting of dns_canonicalize_realm is now "fallback".
    Hostnames provided from applications will be tried in principal
    names as given (possibly with shortname qualification), falling back
    to the canonicalized name.
  
  * kinit will now issue a warning if the des3-cbc-sha1 encryption type
    is used in the reply.  This encryption type will be deprecated and
    removed in future releases.
  
  * Added kvno flags --out-cache, --no-store, and --cached-only
    (inspired by Heimdal's kgetcred).

Modified:
  head/security/krb5-devel/Makefile   (contents, props changed)
  head/security/krb5-devel/distinfo   (contents, props changed)

Modified: head/security/krb5-devel/Makefile
==============================================================================
--- head/security/krb5-devel/Makefile	Tue Dec  1 04:26:20 2020	(r556711)
+++ head/security/krb5-devel/Makefile	Tue Dec  1 04:26:23 2020	(r556712)
@@ -7,8 +7,8 @@ CATEGORIES=		security
 .if !defined(MASTERDIR)
 PKGNAMESUFFIX=		-devel
 .endif
-HASH=			f2203972a
-MIT_COMMIT_DATE=	2020.11.22
+HASH=			0293a8967
+MIT_COMMIT_DATE=	2020.11.29
 
 PATCH_SITES=		http://web.mit.edu/kerberos/advisories/
 PATCH_DIST_STRIP=	-p2

Modified: head/security/krb5-devel/distinfo
==============================================================================
--- head/security/krb5-devel/distinfo	Tue Dec  1 04:26:20 2020	(r556711)
+++ head/security/krb5-devel/distinfo	Tue Dec  1 04:26:23 2020	(r556712)
@@ -1,3 +1,3 @@
-TIMESTAMP = 1606179953
-SHA256 (krb5-krb5-1.19.2020.11.22-f2203972a_GH0.tar.gz) = 17ea26a86b72a3eab31d6b37fe9b4bb2e1c4297ac7ecc19bbf6f8f341aae1cab
-SIZE (krb5-krb5-1.19.2020.11.22-f2203972a_GH0.tar.gz) = 5166438
+TIMESTAMP = 1606796040
+SHA256 (krb5-krb5-1.19.2020.11.29-0293a8967_GH0.tar.gz) = 53d4ea3e78423bb77241ecc92f2f8bbf4ae6947a4afbbccb1daaaf82206b6b35
+SIZE (krb5-krb5-1.19.2020.11.29-0293a8967_GH0.tar.gz) = 5167980



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202012010426.0B14QOrt032746>