source: trunk/third/krb5/README @ 21889

Revision 21889, 25.9 KB checked in by zacheiss, 20 years ago (diff)
This commit was generated by cvs2svn to compensate for changes in r21888, which included commits to RCS files with non-trunk default branches.
Line 
1                  Kerberos Version 5, Release 1.4.1
2
3                            Release Notes
4                        The MIT Kerberos Team
5
6Unpacking the Source Distribution
7---------------------------------
8
9The source distribution of Kerberos 5 comes in a tarfile,
10krb5-1.4.1-signed.tar.  The tarfile contains a gzipped tarfile,
11krb5-1.4.1.tar.gz, and its corresponding PGP signature,
12krb5-1.4.1.tar.gz.asc.
13
14You will need the GNU gzip program, and preferably, the GNU tar
15program, to extract the source distribution.
16
17The distribution will extract into a subdirectory "krb5-1.4.1" of the
18current directory.
19
20Building and Installing Kerberos 5
21----------------------------------
22
23The first file you should look at is doc/install-guide.ps; it contains
24the notes for building and installing Kerberos 5.  The info file
25krb5-install.info has the same information in info file format.  You
26can view this using the GNU emacs info-mode, or by using the
27standalone info file viewer from the Free Software Foundation.  This
28is also available as an HTML file, install.html.
29
30Other good files to look at are admin-guide.ps and user-guide.ps,
31which contain the system administrator's guide, and the user's guide,
32respectively.  They are also available as info files
33kerberos-admin.info and krb5-user.info, respectively.  These files are
34also available as HTML files.
35
36If you are attempting to build under Windows, please see the
37src/windows/README file.
38
39Reporting Bugs
40--------------
41
42Please report any problems/bugs/comments using the krb5-send-pr
43program.  The krb5-send-pr program will be installed in the sbin
44directory once you have successfully compiled and installed Kerberos
45V5 (or if you have installed one of our binary distributions).
46
47If you are not able to use krb5-send-pr because you haven't been able
48compile and install Kerberos V5 on any platform, you may send mail to
49krb5-bugs@mit.edu.
50
51You may view bug reports by visiting
52
53http://krbdev.mit.edu/rt/
54
55and logging in as "guest" with password "guest".
56
57Important notice regarding Kerberos 4 support
58---------------------------------------------
59
60In the past few years, several developments have shown the inadequacy
61of the security of version 4 of the Kerberos protocol.  These
62developments have led the MIT Kerberos Team to begin the process of
63ending support for version 4 of the Kerberos protocol.  The plan
64involves the eventual removal of Kerberos 4 support from the MIT
65implementation of Kerberos.
66
67The Data Encryption Standard (DES) has reached the end of its useful
68life.  DES is the only encryption algorithm supported by Kerberos 4,
69and the increasingly obvious inadequacy of DES motivates the
70retirement of the Kerberos 4 protocol.  The National Institute of
71Standards and Technology (NIST), which had previously certified DES as
72a US government encryption standard, has officially announced[1] its
73intention to withdraw the specification of DES.
74
75NIST's action reflects the long-held opinion of the cryptographic
76community that DES has too small a key space to be secure.  Breaking
77DES encryption by an exhaustive search of its key space is within the
78means of some individuals, many companies, and all major governments.
79Consequently, DES cannot be considered secure for any long-term keys,
80particularly the ticket-granting key that is central to Kerberos.
81
82Serious protocol flaws[2] have been found in Kerberos 4.  These flaws
83permit attacks which require far less effort than an exhaustive search
84of the DES key space.  These flaws make Kerberos 4 cross-realm
85authentication an unacceptable security risk and raise serious
86questions about the security of the entire Kerberos 4 protocol.
87
88The known insecurity of DES, combined with the recently discovered
89protocol flaws, make it extremely inadvisable to rely on the security
90of version 4 of the Kerberos protocol.  These factors motivate the MIT
91Kerberos Team to remove support for Kerberos version 4 from the MIT
92implementation of Kerberos.
93
94The process of ending Kerberos 4 support began with release 1.3 of MIT
95Kerberos 5.  In release 1.3, the KDC support for version 4 of the
96Kerberos protocol is disabled by default.  Release 1.4 of MIT Kerberos
97continues to include Kerberos 4 support (also disabled by default in
98the KDC), but we intend to completely remove Kerberos 4 support from
99some future release of MIT Kerberos, possibly as early as the 1.5
100release of MIT Kerberos.
101
102The MIT Kerberos Team has ended active development of Kerberos 4,
103except for the eventual removal of all Kerberos 4 functionality.  We
104will continue to provide critical security fixes for Kerberos 4, but
105routine bug fixes and feature enhancements are at an end.
106
107We recommend that any sites which have not already done so begin a
108migration to Kerberos 5.  Kerberos 5 provides significant advantages
109over Kerberos 4, including support for strong encryption,
110extensibility, improved cross-vendor interoperability, and ongoing
111development and enhancement.
112
113If you have questions or issues regarding migration to Kerberos 5, we
114recommend discussing them on the kerberos@mit.edu mailing list.
115
116                              References
117
118[1] National Institute of Standards and Technology.  Announcing
119    Proposed Withdrawal of Federal Information Processing Standard
120    (FIPS) for the Data Encryption Standard (DES) and Request for
121    Comments.  Federal Register 04-16894, 69 FR 44509-44510, 26 July
122    2004.  DOCID:fr26jy04-31.
123
124[2] Tom Yu, Sam Hartman, and Ken Raeburn. The Perils of
125    Unauthenticated Encryption: Kerberos Version 4. In Proceedings of
126    the Network and Distributed Systems Security Symposium. The
127    Internet Society, February 2004.
128    http://web.mit.edu/tlyu/papers/krb4peril-ndss04.pdf
129
130----------------------------------------------------------------------
131
132Major changes in 1.4.1
133----------------------
134
135* [2913] The kadmin client library now performs authentication flavor
136  fallback in a useful way when attempting to contact a pre-1.4 kadmin
137  daemon.
138
139* [2988] Fix telnet client buffer overflow vulnerabilities.
140  [MITKRB5-SA-2005-001]
141
142Minor changes in 1.4.1
143----------------------
144
145Please see
146
147http://krbdev.mit.edu/rt/NoAuth/krb5-1.4/fixed-1.4.1.html
148
149for a complete list.
150* [2888] On Windows, restore library state to uninialized when library
151  is unloaded.
152
153* [2906] Map ns_rr_class to ns_rr_cl for some versions of BIND.
154
155* [2916] Perform some cleanup on library unload to avoid leaks.
156
157* [2918] krb5_get_init_creds_password() now correctly handles an empty
158  string passed in as a password argument.
159
160* [2924] gss_mech_xxx symbols are now exported on Windows.
161
162* [2942] Fix null pointer deref possible in threaded program calls to
163  profile library.
164
165* [2949] The delta-time parser no longer conflicts with some symbols
166  in HP-UX header files.
167
168* [2950] Deleted profile nodes are now correctly skipped by the
169  iterator.
170
171* [2953] Handle variant gmtime_r() on HP-UX 10.
172
173* [2955] Conditionalize the use of reverse DNS lookups in
174  krb5_sname_to_principal().
175
176* [2960] gssapi.h no longer leaks preprocessor symbols.
177
178* [2961] Fix some missing build dependencies in util/ss.
179
180* [2962] Fix case of @MAINT@ substitution breaking Windows build.
181
182* [2963] On windows, fix dangerous 64-bit time_t * to long *
183  conversions.
184
185* [2964] Fix invalid return value from krb5_c_is_keyed_cksum() during
186  error conditions.
187
188* [2971] thread_termination now correctly frees thread-specific data.
189
190* [2974] krb5_get_init_creds_keytab() no longer produces spurious
191  KRB5_REALM_UNKNOWN errors when a master KDC is not listed in the
192  configuration.
193
194* [2975] Fix missing semicolon in x-deltat.y which was causing some
195  versions of Bison to produce un-compilable C files.
196
197* [2981] Restores some shared library support for HP-UX 10.
198
199* [2992] Fix some Makefile quoting problems which were preventing
200  gssapi_krb5.h from being created on AIX 5.
201
202* [3000] Cast null pointer arguments to variadic functions, which is
203  necessary on some 64-bit platforms.
204
205Major changes in 1.4
206--------------------
207
208* [841] Merged Athena telnetd changes for creating a new option for
209  requiring encryption.
210
211* [1349, 2578, 2601, 2606, 2613, 2743, 2775, 2778, 2877] Add
212  implementation of the RPCSEC_GSS authentication flavor to the RPC
213  library.  Thanks to Kevin Coffman and the CITI group at the
214  University of Michigan.
215
216* [2061] The kadmind4 backwards-compatibility admin server and the
217  v5passwdd backwards-compatibility password-changing server have been
218  removed.
219
220* [1303, 2740, 2755, 2781, 2782, 2812, 2858, 2859, 2874, 2875, 2878,
221  2879, 2884, 2893] Thread safety for krb5 libraries.
222
223* [2410] Yarrow code now uses AES.
224
225* [2678, 2802] New client commands kcpytkt and kdeltkt for Windows.
226
227* [2688] New command mit2ms on Windows.
228
229* [2762] Merged Athena changes to allow ftpd to require encrypted
230  passwords.
231
232* [2587] Incorporate gss_krb5_set_allowable_enctypes() and
233  gss_krb5_export_lucid_sec_context(), which are needed for NFSv4,
234  from Kevin Coffman.
235
236* [2841] Fix heap buffer overflow in password history
237  mechanism. [MITKRB5-SA-2004-004]
238
239Minor changes in 1.4
240--------------------
241
242Please see
243
244http://krbdev.mit.edu/rt/NoAuth/krb5-1.4/fixed-1.4.html
245
246for a complete list.
247
248* [249] Install example config files.
249
250* [427] PATH environment variable won't be overwritten by login.krb5
251  if already set.
252
253* [696] Sample KDC propagation script fixed.
254
255* [868] Fixed search for res_search() and friends.
256
257* [927] Compilation on Tru64 now detects GNU linker and chooses
258  whether to use -oldstyle_liblookup accordingly.
259
260* [1044] port-sockets.h explicitly declares h_errno if the declaration
261  is missing.
262
263* [1210] KDC cleans up some per-listener state upon process
264  termination to avoid spurious memory leak indications.
265
266* [1335] The server side of the Horowitz password-change protocol now
267  checks for minimum password life.
268
269* [1345, 2730, 2757] patchlevel.h is now the master version file.
270
271* [1364] GNU sed is no longer required to make depend on Irix.
272
273* [1383] SRV record support now handles "." target and adds trailing
274  dots to avoid spurious multiple hostname queries.
275
276* [1497] A memory leak in the krb5 context serializer has been fixed.
277
278* [1570] Some team procedures now documented.
279
280* [1588] Automatic rebuilding of configure scripts, etc. are only done
281  if --enable-maintainer-mode is passed to configure.
282
283* [1623] Memory management in the ftp client has been cleaned up.
284
285* [1724] DNS SRV record lookup support is unconditionally built on
286  Unix.
287
288* [1791] Replacement for daemon() is compiled separately each time it
289  is needed, rather than ending up in the krb5 library.
290
291* [1806] Default to building shared libraries on most platforms that
292  support them.
293
294* [1847] Fixed daemon() replacement to build on Tru64.
295
296* [1850] Fixed some 0 vs NULL issues.
297
298* [2066] AES-only configuration now tested in test suite.
299
300* [2219] Fixed memory leak in KDC preauth handling.
301
302* [2256] Use $(CC) rather than ld to build shared libs on Tru64 and
303  Irix.
304
305* [2276] Support for the non-standard enctype
306  ENCTYPE_LOCAL_DES3_HMAC_SHA1 has been removed.
307
308* [2285] Test suite checks TCP access to KDC.
309
310* [2295] Minor stylistic cleanup in gss-client.
311
312* [2296, 2370, 2424] krb5_get_init_creds() APIs avoid multiple queries
313  to master KDC.
314
315* [2379] Remove _XOPEN_EXTENDED hack previously used for HP-UX.
316
317* [2432] Only sanity-check setutent() API if utmpx.h is not present,
318  as this was preventing recent NetBSD from configuring.
319
320* [2525] kvno.exe installed on Windows.
321
322* [2529] Fix some internal type inconsistencies in gssapi library.
323
324* [2530] Fix KRB5_CALLCONV usage in krb5_cc_resolve().
325
326* [2537] Apply fix from John Hascall to make krb5_get_in_tkt()
327  emulation actually honor the lifetimes in the input credentials.
328
329* [2539] Create manpage for krb524d.
330
331* [2573] The rcache code no longer attempts to close a negative file
332  descriptor from a failed open.
333
334* [2591] The gssapi library now requires that the initiator's channel
335  bindings match those provided by the acceptor, if the acceptor
336  provides them at all.
337
338* [2592] Fix some HP-UX 11 compilation issues.
339
340* [2598] Fix some HP-UX 11 foreachaddr() issues.
341
342* [2600] gss_accept_sec_context() no longer leaks rcaches.
343
344* [2603] Clean up some issues relating to use of reserved namespace in
345  k5-platform.h.
346
347* [2614] Rewrite handling of whitespace in profile library to better
348  handle whitespace around tag names.
349
350* [2629] Fix double-negation of a preprocessor test in osconf.h.
351
352* [2637] krb5int_zap_data() uses SecureZeroMemory on Windows instead
353  of memset().
354
355* [2654] krb5_get_init_creds() checks for overflow/underflow on 32-bit
356  timestamps.
357
358* [2655] krb5_get_init_creds() no longer issues requests where the
359  renew_until time precedes the expiration time.
360
361* [2656] krb5_get_init_creds() supports ticket_lifetime libdefault.
362
363* [2657] Default ccache name is evaluated more lazily.
364
365* [2661] Handle return of ai_canonname=NULL from getaddrinfo().
366
367* [2665] Fix leak in cc_resolve, reported by Paul Moore.
368
369* [2674] libkadm5 acl_init() API renamed to avoid conflict with MacOS
370  X acl API.
371
372* [2684, 2710, 2728] Use BIND 8 parsing API when available.
373
374* [2685] The profile library iterators no longer get confused when
375  modifications are made to the in-memory profile.
376
377* [2694] The krb5-config script now has a manpage.
378
379* [2704] New ccache API flag to request only information, not actual
380  credentials.
381
382* [2705] Support for upcoming read/write MSLSA ccache.
383
384* [2706] resolv.h is included when searching for res_search() and
385  friends, to account for symbol renaming.
386
387* [2715] The install-strip make target no longer attempts to strip
388  scripts.
389
390* [2718] Fix memory leak in arcfour string_to_key.  Reported by
391  Derrick Schommer.
392
393* [2719] Fix memory leak in rd_cred.c.  Reported by Derrick Schommer.
394
395* [2725] Fix memory leak in mk_req_extended().  Reported by Derrick
396  Schommer.
397
398* [2729] Add some new version strings for Windows.
399
400* [2734] The ticket_lifetime libdefault now uses units of seconds by
401  default, if no units are provided.
402
403* [2741] The profile library's error tables aren't loaded on MacOS X.
404
405* [2750] Calls to the profile library which set values no longer fail
406  if the file is not writable.
407
408* [2751] The profile library has a new API to detect whether the
409  default profile is writable.
410
411* [2753] An initial C implementation of CCAPI has been done.
412
413* [2754] fake-addrinfo.h includes errno.h earlier.
414
415* [2756] The profile library calls stat() less frequently on files.
416
417* [2760, 2780] The keytab implementation checks for cases where
418  fopen() can return NULL without setting errno.  Reported by Roland
419  Dowdeswell.
420
421* [2770] com_err now creates valid prototypes for generated files.
422  Reported by Jeremy Allison.
423
424* [2772, 2797] The krb4 library now honors the dns_fallback libdefault
425  setting.
426
427* [2776, 2779] Solaris patches exist for the pty-close race condition
428  bug.  We check for these patches now checked, and don't apply the
429  priocntl hack if they are present.
430
431* [2783] ftpcmds.y unconditionally defines NBBY to 8.
432
433* [2793] locate_kdc.c can compile if KRB5_DNS_LOOKUP isn't defined,
434  though we removed the configure-time option for this.
435
436* [2795] Fixed some addrinfo problems that affected Irix.
437
438* [2796, 2840] Calling conventions for some API functions for Windows
439  have been fixed.
440
441* [2805] Windows NSIS installer script updated.
442
443* [2808] Support library renamed on Windows.
444
445* [2815] krb5-config updated to reference new support library.
446
447* [2814, 2816] Some MSLSA ccache features depending on non-public SDK
448  features were backed out.
449
450* [2818] Don't create empty array for addresses in MSLSA ccache.
451
452* [2832] Fix shared library build on sparc64-netbsd.
453
454* [2833, 2834, 2835] Add support for generating/installing debugging
455  symbols on Windows.
456
457* [2838] Fix termination of incorrect string in telnetd.
458
459* [2854] Fix memory leak in ccache.
460
461* [2857] Fix memory leak in asn1_decode_generaltime().
462
463* [2861] Minor documenation fixes.
464
465* [2864] Fix IPv6 support on Windows.
466
467* [2865] New API function krb5_is_thread_safe() to test for thread
468  safety.
469
470* [2870, 2881] Fix crash in MSLSA ccache.
471
472* [2871] Handle read() returning -1 in prng.c.
473
474* [2872] Fix memory leak in DNS lookup code.
475
476* [2887] Fix null pointer dereference in krb5_unparse_name().
477
478* [2892] Fix some gcc-4.0 compatibility problems.
479
480* [2891] lib/kdb/keytab.c no longer accesses an uninitialized variable.
481
482Copyright Notice and Legal Administrivia
483----------------------------------------
484
485Copyright (C) 1985-2005 by the Massachusetts Institute of Technology.
486
487All rights reserved.
488
489Export of this software from the United States of America may require
490a specific license from the United States Government.  It is the
491responsibility of any person or organization contemplating export to
492obtain such a license before exporting.
493
494WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
495distribute this software and its documentation for any purpose and
496without fee is hereby granted, provided that the above copyright
497notice appear in all copies and that both that copyright notice and
498this permission notice appear in supporting documentation, and that
499the name of M.I.T. not be used in advertising or publicity pertaining
500to distribution of the software without specific, written prior
501permission.  Furthermore if you modify this software you must label
502your software as modified software and not distribute it in such a
503fashion that it might be confused with the original MIT software.
504M.I.T. makes no representations about the suitability of this software
505for any purpose.  It is provided "as is" without express or implied
506warranty.
507
508THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
509IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
510WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
511
512Individual source code files are copyright MIT, Cygnus Support,
513OpenVision, Oracle, Sun Soft, FundsXpress, and others.
514
515Project Athena, Athena, Athena MUSE, Discuss, Hesiod, Kerberos, Moira,
516and Zephyr are trademarks of the Massachusetts Institute of Technology
517(MIT).  No commercial use of these trademarks may be made without
518prior written permission of MIT.
519
520"Commercial use" means use of a name in a product or other for-profit
521manner.  It does NOT prevent a commercial firm from referring to the
522MIT trademarks in order to convey information (although in doing so,
523recognition of their trademark status should be given).
524
525----
526
527The following copyright and permission notice applies to the
528OpenVision Kerberos Administration system located in kadmin/create,
529kadmin/dbutil, kadmin/passwd, kadmin/server, lib/kadm5, and portions
530of lib/rpc:
531
532   Copyright, OpenVision Technologies, Inc., 1996, All Rights Reserved
533
534   WARNING: Retrieving the OpenVision Kerberos Administration system
535   source code, as described below, indicates your acceptance of the
536   following terms.  If you do not agree to the following terms, do not
537   retrieve the OpenVision Kerberos administration system.
538
539   You may freely use and distribute the Source Code and Object Code
540   compiled from it, with or without modification, but this Source
541   Code is provided to you "AS IS" EXCLUSIVE OF ANY WARRANTY,
542   INCLUDING, WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY OR
543   FITNESS FOR A PARTICULAR PURPOSE, OR ANY OTHER WARRANTY, WHETHER
544   EXPRESS OR IMPLIED.  IN NO EVENT WILL OPENVISION HAVE ANY LIABILITY
545   FOR ANY LOST PROFITS, LOSS OF DATA OR COSTS OF PROCUREMENT OF
546   SUBSTITUTE GOODS OR SERVICES, OR FOR ANY SPECIAL, INDIRECT, OR
547   CONSEQUENTIAL DAMAGES ARISING OUT OF THIS AGREEMENT, INCLUDING,
548   WITHOUT LIMITATION, THOSE RESULTING FROM THE USE OF THE SOURCE
549   CODE, OR THE FAILURE OF THE SOURCE CODE TO PERFORM, OR FOR ANY
550   OTHER REASON.
551
552   OpenVision retains all copyrights in the donated Source Code. OpenVision
553   also retains copyright to derivative works of the Source Code, whether
554   created by OpenVision or by a third party. The OpenVision copyright
555   notice must be preserved if derivative works are made based on the
556   donated Source Code.
557
558   OpenVision Technologies, Inc. has donated this Kerberos
559   Administration system to MIT for inclusion in the standard
560   Kerberos 5 distribution.  This donation underscores our
561   commitment to continuing Kerberos technology development
562   and our gratitude for the valuable work which has been
563   performed by MIT and the Kerberos community.
564
565----
566
567    Portions contributed by Matt Crawford <crawdad@fnal.gov> were
568    work performed at Fermi National Accelerator Laboratory, which is
569    operated by Universities Research Association, Inc., under
570    contract DE-AC02-76CHO3000 with the U.S. Department of Energy.
571
572---- The implementation of the Yarrow pseudo-random number generator
573in src/lib/crypto/yarrow has the following copyright:
574
575Copyright 2000 by Zero-Knowledge Systems, Inc.
576
577Permission to use, copy, modify, distribute, and sell this software
578and its documentation for any purpose is hereby granted without fee,
579provided that the above copyright notice appear in all copies and that
580both that copyright notice and this permission notice appear in
581supporting documentation, and that the name of Zero-Knowledge Systems,
582Inc. not be used in advertising or publicity pertaining to
583distribution of the software without specific, written prior
584permission.  Zero-Knowledge Systems, Inc. makes no representations
585about the suitability of this software for any purpose.  It is
586provided "as is" without express or implied warranty.
587
588ZERO-KNOWLEDGE SYSTEMS, INC. DISCLAIMS ALL WARRANTIES WITH REGARD TO
589THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND
590FITNESS, IN NO EVENT SHALL ZERO-KNOWLEDGE SYSTEMS, INC. BE LIABLE FOR
591ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
592WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
593ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTUOUS ACTION, ARISING OUT
594OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
595
596---- The implementation of the AES encryption algorithm in
597src/lib/crypto/aes has the following copyright:
598
599 Copyright (c) 2001, Dr Brian Gladman <brg@gladman.uk.net>, Worcester, UK.
600 All rights reserved.
601
602 LICENSE TERMS
603
604 The free distribution and use of this software in both source and binary
605 form is allowed (with or without changes) provided that:
606
607   1. distributions of this source code include the above copyright
608      notice, this list of conditions and the following disclaimer;
609
610   2. distributions in binary form include the above copyright
611      notice, this list of conditions and the following disclaimer
612      in the documentation and/or other associated materials;
613
614   3. the copyright holder's name is not used to endorse products
615      built using this software without specific written permission.
616
617 DISCLAIMER
618
619 This software is provided 'as is' with no explcit or implied warranties
620 in respect of any properties, including, but not limited to, correctness
621 and fitness for purpose.
622
623---- The implementation of the RPCSEC_GSS authentication flavor in
624src/lib/rpc has the following copyright:
625
626  Copyright (c) 2000 The Regents of the University of Michigan.
627  All rights reserved.
628 
629  Copyright (c) 2000 Dug Song <dugsong@UMICH.EDU>.
630  All rights reserved, all wrongs reversed.
631
632  Redistribution and use in source and binary forms, with or without
633  modification, are permitted provided that the following conditions
634  are met:
635
636  1. Redistributions of source code must retain the above copyright
637     notice, this list of conditions and the following disclaimer.
638  2. Redistributions in binary form must reproduce the above copyright
639     notice, this list of conditions and the following disclaimer in the
640     documentation and/or other materials provided with the distribution.
641  3. Neither the name of the University nor the names of its
642     contributors may be used to endorse or promote products derived
643     from this software without specific prior written permission.
644
645  THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
646  WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
647  MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
648  DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
649  FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
650  CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
651  SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
652  BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
653  LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
654  NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
655  SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
656
657Acknowledgments
658---------------
659
660Appreciation Time!!!!  There are far too many people to try to thank
661them all; many people have contributed to the development of Kerberos
662V5.  This is only a partial listing....
663
664Thanks to Kevin Coffman and the CITI group at the University of
665Michigan for providing patches for implementing RPCSEC_GSS
666authentication in the RPC library.
667
668Thanks to Derrick Schommer for reporting multiple memory leaks.
669
670Thanks to Quanah Gibson-Mount of Stanford University for helping
671exercise the thread support code.
672
673Thanks to Michael Tautschnig for reporting the heap buffer overflow in
674the password history mechanism.  [MITKRB5-SA-2004-004]
675
676Thanks to Wyllys Ingersoll for finding a buffer-size problem in the
677RPCSEC_GSS implementation.
678
679Thanks to iDEFENSE for bringing to our attention the vulnerabilities
680in the telnet client.  [MITKRB5-SA-2005-001]
681
682Thanks to the members of the Kerberos V5 development team at MIT, both
683past and present: Danilo Almeida, Jeffrey Altman, Jay Berkenbilt,
684Richard Basch, Mitch Berger, John Carr, Don Davis, Alexandra Ellwood,
685Nancy Gilman, Matt Hancher, Sam Hartman, Paul Hill, Marc Horowitz, Eva
686Jacobus, Miroslav Jurisic, Barry Jaspan, Geoffrey King, John Kohl,
687Peter Litwack, Scott McGuire, Kevin Mitchell, Cliff Neuman, Paul Park,
688Ezra Peisach, Chris Provenzano, Ken Raeburn, Jon Rochlis, Jeff
689Schiller, Jen Selby, Brad Thompson, Harry Tsai, Ted Ts'o, Marshall
690Vale, Tom Yu.
691
692Very special thanks go to Marshall Vale, our departing team leader.
693Over the past few years, Marshall has been extremely valuable to us as
694mentor, advisor, manager, and friend.  Marshall's devotion as a
695champion of Kerberos has helped our team immensely through many trials
696and hardships.  We will miss him tremendously, and we wish him the
697best in his future endeavors.
Note: See TracBrowser for help on using the repository browser.