krb5-1.3.2 is released (fwd)
Cy Schubert
Cy.Schubert at komquats.com
Thu Feb 26 19:26:07 PST 2004
Just a quick heads up, I'm currently working on this. It's building on
-CURRENT. Yet to be done, testing on -CURRENT, build & test on -STABLE, and
verification of pkg-plist currency. I will post patches to the krb5 port to
-security and -ports and assuming I don't get negative feedback, I will
commit sometime late Saturday or on Sunday when I return from my trip
Vancouver.
As crypto-publish.org does not yet distribute krb5-1.3.2, the
cryto-publish.org section of the Makefile will continue to install
krb5-1.3.1_3. This of course assumes pkg-plist compatibility. If changes
need to be made to pkg-plist, crypto-publish.org fetch support will be
temporarily disabled until they can post krb5-1.3.2 on their website.
Cheers,
--
Cy Schubert <Cy.Schubert at komquats.com> http://www.komquats.com/
BC Government . FreeBSD UNIX
Cy.Schubert at osg.gov.bc.ca . cy at FreeBSD.org
http://www.gov.bc.ca/ . http://www.FreeBSD.org/
------- Forwarded Message
Date: Thu, 26 Feb 2004 20:15:12 -0500
From: Tom Yu <tlyu at MIT.EDU>
To: kerberos-announce at MIT.EDU
Subject: krb5-1.3.2 is released
- -----BEGIN PGP SIGNED MESSAGE-----
The MIT Kerberos Team announces the availability of MIT Kerberos 5
Release 1.3.2. Please see below for a list of some major changes
since krb5-1.3.1, or consult the README file in the source tree for a
more detailed list of significant changes.
RETRIEVING KERBEROS 5 RELEASE 1.3.2
===================================
You may retrieve the Kerberos 5 Release 1.3.2 source from the
following URL:
http://web.mit.edu/kerberos/dist/
The homepage for the krb5-1.3.2 release is:
http://web.mit.edu/kerberos/krb5-1.3/
Further information about Kerberos 5 may be found at the following
URL:
http://web.mit.edu/kerberos/
MAJOR CHANGES SINCE RELEASE 1.3.1
=================================
* Support for AES in GSSAPI has been implemented. This corresponds to
the in-progress work in the IETF (CFX).
* Added a new ccache type "MSLSA:" for read-only access to the MS
Windows LSA cache.
* On Windows, krb5.exe now has a checkbox to request addressless
tickets.
* To avoid compatibility problems, unrecognized TGS options will now
be ignored.
* 128-bit AES has been added to the default enctypes.
* AES cryptosystem now chains IVs. This WILL break backwards
compatibility for the kcmd applications, if they are using AES
session keys.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (SunOS)
iQCVAwUBQD6aI6bDgE/zdoE9AQH+bwQAlC2pvr+DbnYNw8NzlBAng6Hpqf3b5StJ
sZDakTpcOSalnouKv5TxRjLyG9hu9kz7e1Vl1/b9BDU5ROx9yTZnIV5PSxVO8JzR
QjfCM/hp1k+UeEtc81b63Thw//le4PBMc+8NM03Rmyiro4780SXKcbgyV+yF5ijD
Bj8AOFxdc1A=
=uPfm
- -----END PGP SIGNATURE-----
_______________________________________________
kerberos-announce mailing list
kerberos-announce at mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos-announce
------- End of Forwarded Message
More information about the freebsd-security
mailing list