From owner-svn-ports-head@freebsd.org Sun Jan 24 03:36:51 2021 Return-Path: Delivered-To: svn-ports-head@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 7C6724E98D7; Sun, 24 Jan 2021 03:36:51 +0000 (UTC) (envelope-from cy@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4DNdw16PQyz3stV; Sun, 24 Jan 2021 03:36:49 +0000 (UTC) (envelope-from cy@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id BEC831CE6F; Sun, 24 Jan 2021 03:36:48 +0000 (UTC) (envelope-from cy@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 10O3amk5047764; Sun, 24 Jan 2021 03:36:48 GMT (envelope-from cy@FreeBSD.org) Received: (from cy@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 10O3amu7047762; Sun, 24 Jan 2021 03:36:48 GMT (envelope-from cy@FreeBSD.org) Message-Id: <202101240336.10O3amu7047762@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: cy set sender to cy@FreeBSD.org using -f From: Cy Schubert Date: Sun, 24 Jan 2021 03:36:48 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r562442 - head/security/krb5-devel X-SVN-Group: ports-head X-SVN-Commit-Author: cy X-SVN-Commit-Paths: head/security/krb5-devel X-SVN-Commit-Revision: 562442 X-SVN-Commit-Repository: ports MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-head@freebsd.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: SVN commit messages for the ports tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 24 Jan 2021 03:36:51 -0000 Author: cy Date: Sun Jan 24 03:36:48 2021 New Revision: 562442 URL: https://svnweb.freebsd.org/changeset/ports/562442 Log: Update to the latest MIT KRB5 commit on github. This commit captures KRB5-1.19-beta2. The beta2 announcement on krbdev is as follows: MIT krb5-1.19-beta2 is now available for download from https://web.mit.edu/kerberos/dist/testing.html The main MIT Kerberos web page is https://web.mit.edu/kerberos/ Please send comments to the krbdev list. We plan for the final release to occur in about one month. The README file contains a more extensive list of changes. Major changes in 1.19 --------------------- Administrator experience: * When a client keytab is present, the GSSAPI krb5 mech will refresh credentials even if the current credentials were acquired manually. * It is now harder to accidentally delete the K/M entry from a KDB. Developer experience: * gss_acquire_cred_from() now supports the "password" and "verify" options, allowing credentials to be acquired via password and verified using a keytab key. * When an application accepts a GSS security context, the new GSS_C_CHANNEL_BOUND_FLAG will be set if the initiator and acceptor both provided matching channel bindings. * Added the GSS_KRB5_NT_X509_CERT name type, allowing S4U2Self requests to identify the desired client principal by certificate. * PKINIT certauth modules can now cause the hw-authent flag to be set in issued tickets. * The krb5_init_creds_step() API will now issue the same password expiration warnings as krb5_get_init_creds_password(). Protocol evolution: * Added client and KDC support for Microsoft's Resource-Based Constrained Delegation, which allows cross-realm S4U2Proxy requests. A third-party database module is required for KDC support. * kadmin/admin is now the preferred server principal name for kadmin connections, and the host-based form is no longer created by default. The client will still try the host-based form as a fallback. * Added client and server support for Microsoft's KERB_AP_OPTIONS_CBT extension, which causes channel bindings to be required for the initiator if the acceptor provided them. The client will send this option if the client_aware_gss_bindings profile option is set. User experience: * kinit will now issue a warning if the des3-cbc-sha1 encryption type is used in the reply. This encryption type will be deprecated and removed in future releases. * Added kvno flags --out-cache, --no-store, and --cached-only (inspired by Heimdal's kgetcred). Modified: head/security/krb5-devel/Makefile (contents, props changed) head/security/krb5-devel/distinfo (contents, props changed) Modified: head/security/krb5-devel/Makefile ============================================================================== --- head/security/krb5-devel/Makefile Sun Jan 24 03:36:44 2021 (r562441) +++ head/security/krb5-devel/Makefile Sun Jan 24 03:36:48 2021 (r562442) @@ -7,8 +7,8 @@ CATEGORIES= security .if !defined(MASTERDIR) PKGNAMESUFFIX= -devel .endif -HASH= 722b77ba3 -MIT_COMMIT_DATE= 2020.12.15 +HASH= 5f5e29c5f +MIT_COMMIT_DATE= 2021.01.11 PATCH_SITES= http://web.mit.edu/kerberos/advisories/ PATCH_DIST_STRIP= -p2 Modified: head/security/krb5-devel/distinfo ============================================================================== --- head/security/krb5-devel/distinfo Sun Jan 24 03:36:44 2021 (r562441) +++ head/security/krb5-devel/distinfo Sun Jan 24 03:36:48 2021 (r562442) @@ -1,3 +1,3 @@ -TIMESTAMP = 1609787279 -SHA256 (krb5-krb5-1.19.2020.12.15-722b77ba3_GH0.tar.gz) = c0cf5e05ba0987ddd09fc440ce401d5d341cf30f7aca91c90bae0b3ada75e52e -SIZE (krb5-krb5-1.19.2020.12.15-722b77ba3_GH0.tar.gz) = 5167963 +TIMESTAMP = 1611458945 +SHA256 (krb5-krb5-1.19.2021.01.11-5f5e29c5f_GH0.tar.gz) = 969e3fb2fc7ecc3eb3ff9bf80475571d7a1bb8d194722a86f660f1af116e9491 +SIZE (krb5-krb5-1.19.2021.01.11-5f5e29c5f_GH0.tar.gz) = 5169557