1 | Kerberos Version 5, Release 1.4.1 |
---|
2 | |
---|
3 | Release Notes |
---|
4 | The MIT Kerberos Team |
---|
5 | |
---|
6 | Unpacking the Source Distribution |
---|
7 | --------------------------------- |
---|
8 | |
---|
9 | The source distribution of Kerberos 5 comes in a tarfile, |
---|
10 | krb5-1.4.1-signed.tar. The tarfile contains a gzipped tarfile, |
---|
11 | krb5-1.4.1.tar.gz, and its corresponding PGP signature, |
---|
12 | krb5-1.4.1.tar.gz.asc. |
---|
13 | |
---|
14 | You will need the GNU gzip program, and preferably, the GNU tar |
---|
15 | program, to extract the source distribution. |
---|
16 | |
---|
17 | The distribution will extract into a subdirectory "krb5-1.4.1" of the |
---|
18 | current directory. |
---|
19 | |
---|
20 | Building and Installing Kerberos 5 |
---|
21 | ---------------------------------- |
---|
22 | |
---|
23 | The first file you should look at is doc/install-guide.ps; it contains |
---|
24 | the notes for building and installing Kerberos 5. The info file |
---|
25 | krb5-install.info has the same information in info file format. You |
---|
26 | can view this using the GNU emacs info-mode, or by using the |
---|
27 | standalone info file viewer from the Free Software Foundation. This |
---|
28 | is also available as an HTML file, install.html. |
---|
29 | |
---|
30 | Other good files to look at are admin-guide.ps and user-guide.ps, |
---|
31 | which contain the system administrator's guide, and the user's guide, |
---|
32 | respectively. They are also available as info files |
---|
33 | kerberos-admin.info and krb5-user.info, respectively. These files are |
---|
34 | also available as HTML files. |
---|
35 | |
---|
36 | If you are attempting to build under Windows, please see the |
---|
37 | src/windows/README file. |
---|
38 | |
---|
39 | Reporting Bugs |
---|
40 | -------------- |
---|
41 | |
---|
42 | Please report any problems/bugs/comments using the krb5-send-pr |
---|
43 | program. The krb5-send-pr program will be installed in the sbin |
---|
44 | directory once you have successfully compiled and installed Kerberos |
---|
45 | V5 (or if you have installed one of our binary distributions). |
---|
46 | |
---|
47 | If you are not able to use krb5-send-pr because you haven't been able |
---|
48 | compile and install Kerberos V5 on any platform, you may send mail to |
---|
49 | krb5-bugs@mit.edu. |
---|
50 | |
---|
51 | You may view bug reports by visiting |
---|
52 | |
---|
53 | http://krbdev.mit.edu/rt/ |
---|
54 | |
---|
55 | and logging in as "guest" with password "guest". |
---|
56 | |
---|
57 | Important notice regarding Kerberos 4 support |
---|
58 | --------------------------------------------- |
---|
59 | |
---|
60 | In the past few years, several developments have shown the inadequacy |
---|
61 | of the security of version 4 of the Kerberos protocol. These |
---|
62 | developments have led the MIT Kerberos Team to begin the process of |
---|
63 | ending support for version 4 of the Kerberos protocol. The plan |
---|
64 | involves the eventual removal of Kerberos 4 support from the MIT |
---|
65 | implementation of Kerberos. |
---|
66 | |
---|
67 | The Data Encryption Standard (DES) has reached the end of its useful |
---|
68 | life. DES is the only encryption algorithm supported by Kerberos 4, |
---|
69 | and the increasingly obvious inadequacy of DES motivates the |
---|
70 | retirement of the Kerberos 4 protocol. The National Institute of |
---|
71 | Standards and Technology (NIST), which had previously certified DES as |
---|
72 | a US government encryption standard, has officially announced[1] its |
---|
73 | intention to withdraw the specification of DES. |
---|
74 | |
---|
75 | NIST's action reflects the long-held opinion of the cryptographic |
---|
76 | community that DES has too small a key space to be secure. Breaking |
---|
77 | DES encryption by an exhaustive search of its key space is within the |
---|
78 | means of some individuals, many companies, and all major governments. |
---|
79 | Consequently, DES cannot be considered secure for any long-term keys, |
---|
80 | particularly the ticket-granting key that is central to Kerberos. |
---|
81 | |
---|
82 | Serious protocol flaws[2] have been found in Kerberos 4. These flaws |
---|
83 | permit attacks which require far less effort than an exhaustive search |
---|
84 | of the DES key space. These flaws make Kerberos 4 cross-realm |
---|
85 | authentication an unacceptable security risk and raise serious |
---|
86 | questions about the security of the entire Kerberos 4 protocol. |
---|
87 | |
---|
88 | The known insecurity of DES, combined with the recently discovered |
---|
89 | protocol flaws, make it extremely inadvisable to rely on the security |
---|
90 | of version 4 of the Kerberos protocol. These factors motivate the MIT |
---|
91 | Kerberos Team to remove support for Kerberos version 4 from the MIT |
---|
92 | implementation of Kerberos. |
---|
93 | |
---|
94 | The process of ending Kerberos 4 support began with release 1.3 of MIT |
---|
95 | Kerberos 5. In release 1.3, the KDC support for version 4 of the |
---|
96 | Kerberos protocol is disabled by default. Release 1.4 of MIT Kerberos |
---|
97 | continues to include Kerberos 4 support (also disabled by default in |
---|
98 | the KDC), but we intend to completely remove Kerberos 4 support from |
---|
99 | some future release of MIT Kerberos, possibly as early as the 1.5 |
---|
100 | release of MIT Kerberos. |
---|
101 | |
---|
102 | The MIT Kerberos Team has ended active development of Kerberos 4, |
---|
103 | except for the eventual removal of all Kerberos 4 functionality. We |
---|
104 | will continue to provide critical security fixes for Kerberos 4, but |
---|
105 | routine bug fixes and feature enhancements are at an end. |
---|
106 | |
---|
107 | We recommend that any sites which have not already done so begin a |
---|
108 | migration to Kerberos 5. Kerberos 5 provides significant advantages |
---|
109 | over Kerberos 4, including support for strong encryption, |
---|
110 | extensibility, improved cross-vendor interoperability, and ongoing |
---|
111 | development and enhancement. |
---|
112 | |
---|
113 | If you have questions or issues regarding migration to Kerberos 5, we |
---|
114 | recommend discussing them on the kerberos@mit.edu mailing list. |
---|
115 | |
---|
116 | References |
---|
117 | |
---|
118 | [1] National Institute of Standards and Technology. Announcing |
---|
119 | Proposed Withdrawal of Federal Information Processing Standard |
---|
120 | (FIPS) for the Data Encryption Standard (DES) and Request for |
---|
121 | Comments. Federal Register 04-16894, 69 FR 44509-44510, 26 July |
---|
122 | 2004. DOCID:fr26jy04-31. |
---|
123 | |
---|
124 | [2] Tom Yu, Sam Hartman, and Ken Raeburn. The Perils of |
---|
125 | Unauthenticated Encryption: Kerberos Version 4. In Proceedings of |
---|
126 | the Network and Distributed Systems Security Symposium. The |
---|
127 | Internet Society, February 2004. |
---|
128 | http://web.mit.edu/tlyu/papers/krb4peril-ndss04.pdf |
---|
129 | |
---|
130 | ---------------------------------------------------------------------- |
---|
131 | |
---|
132 | Major changes in 1.4.1 |
---|
133 | ---------------------- |
---|
134 | |
---|
135 | * [2913] The kadmin client library now performs authentication flavor |
---|
136 | fallback in a useful way when attempting to contact a pre-1.4 kadmin |
---|
137 | daemon. |
---|
138 | |
---|
139 | * [2988] Fix telnet client buffer overflow vulnerabilities. |
---|
140 | [MITKRB5-SA-2005-001] |
---|
141 | |
---|
142 | Minor changes in 1.4.1 |
---|
143 | ---------------------- |
---|
144 | |
---|
145 | Please see |
---|
146 | |
---|
147 | http://krbdev.mit.edu/rt/NoAuth/krb5-1.4/fixed-1.4.1.html |
---|
148 | |
---|
149 | for a complete list. |
---|
150 | * [2888] On Windows, restore library state to uninialized when library |
---|
151 | is unloaded. |
---|
152 | |
---|
153 | * [2906] Map ns_rr_class to ns_rr_cl for some versions of BIND. |
---|
154 | |
---|
155 | * [2916] Perform some cleanup on library unload to avoid leaks. |
---|
156 | |
---|
157 | * [2918] krb5_get_init_creds_password() now correctly handles an empty |
---|
158 | string passed in as a password argument. |
---|
159 | |
---|
160 | * [2924] gss_mech_xxx symbols are now exported on Windows. |
---|
161 | |
---|
162 | * [2942] Fix null pointer deref possible in threaded program calls to |
---|
163 | profile library. |
---|
164 | |
---|
165 | * [2949] The delta-time parser no longer conflicts with some symbols |
---|
166 | in HP-UX header files. |
---|
167 | |
---|
168 | * [2950] Deleted profile nodes are now correctly skipped by the |
---|
169 | iterator. |
---|
170 | |
---|
171 | * [2953] Handle variant gmtime_r() on HP-UX 10. |
---|
172 | |
---|
173 | * [2955] Conditionalize the use of reverse DNS lookups in |
---|
174 | krb5_sname_to_principal(). |
---|
175 | |
---|
176 | * [2960] gssapi.h no longer leaks preprocessor symbols. |
---|
177 | |
---|
178 | * [2961] Fix some missing build dependencies in util/ss. |
---|
179 | |
---|
180 | * [2962] Fix case of @MAINT@ substitution breaking Windows build. |
---|
181 | |
---|
182 | * [2963] On windows, fix dangerous 64-bit time_t * to long * |
---|
183 | conversions. |
---|
184 | |
---|
185 | * [2964] Fix invalid return value from krb5_c_is_keyed_cksum() during |
---|
186 | error conditions. |
---|
187 | |
---|
188 | * [2971] thread_termination now correctly frees thread-specific data. |
---|
189 | |
---|
190 | * [2974] krb5_get_init_creds_keytab() no longer produces spurious |
---|
191 | KRB5_REALM_UNKNOWN errors when a master KDC is not listed in the |
---|
192 | configuration. |
---|
193 | |
---|
194 | * [2975] Fix missing semicolon in x-deltat.y which was causing some |
---|
195 | versions of Bison to produce un-compilable C files. |
---|
196 | |
---|
197 | * [2981] Restores some shared library support for HP-UX 10. |
---|
198 | |
---|
199 | * [2992] Fix some Makefile quoting problems which were preventing |
---|
200 | gssapi_krb5.h from being created on AIX 5. |
---|
201 | |
---|
202 | * [3000] Cast null pointer arguments to variadic functions, which is |
---|
203 | necessary on some 64-bit platforms. |
---|
204 | |
---|
205 | Major changes in 1.4 |
---|
206 | -------------------- |
---|
207 | |
---|
208 | * [841] Merged Athena telnetd changes for creating a new option for |
---|
209 | requiring encryption. |
---|
210 | |
---|
211 | * [1349, 2578, 2601, 2606, 2613, 2743, 2775, 2778, 2877] Add |
---|
212 | implementation of the RPCSEC_GSS authentication flavor to the RPC |
---|
213 | library. Thanks to Kevin Coffman and the CITI group at the |
---|
214 | University of Michigan. |
---|
215 | |
---|
216 | * [2061] The kadmind4 backwards-compatibility admin server and the |
---|
217 | v5passwdd backwards-compatibility password-changing server have been |
---|
218 | removed. |
---|
219 | |
---|
220 | * [1303, 2740, 2755, 2781, 2782, 2812, 2858, 2859, 2874, 2875, 2878, |
---|
221 | 2879, 2884, 2893] Thread safety for krb5 libraries. |
---|
222 | |
---|
223 | * [2410] Yarrow code now uses AES. |
---|
224 | |
---|
225 | * [2678, 2802] New client commands kcpytkt and kdeltkt for Windows. |
---|
226 | |
---|
227 | * [2688] New command mit2ms on Windows. |
---|
228 | |
---|
229 | * [2762] Merged Athena changes to allow ftpd to require encrypted |
---|
230 | passwords. |
---|
231 | |
---|
232 | * [2587] Incorporate gss_krb5_set_allowable_enctypes() and |
---|
233 | gss_krb5_export_lucid_sec_context(), which are needed for NFSv4, |
---|
234 | from Kevin Coffman. |
---|
235 | |
---|
236 | * [2841] Fix heap buffer overflow in password history |
---|
237 | mechanism. [MITKRB5-SA-2004-004] |
---|
238 | |
---|
239 | Minor changes in 1.4 |
---|
240 | -------------------- |
---|
241 | |
---|
242 | Please see |
---|
243 | |
---|
244 | http://krbdev.mit.edu/rt/NoAuth/krb5-1.4/fixed-1.4.html |
---|
245 | |
---|
246 | for a complete list. |
---|
247 | |
---|
248 | * [249] Install example config files. |
---|
249 | |
---|
250 | * [427] PATH environment variable won't be overwritten by login.krb5 |
---|
251 | if already set. |
---|
252 | |
---|
253 | * [696] Sample KDC propagation script fixed. |
---|
254 | |
---|
255 | * [868] Fixed search for res_search() and friends. |
---|
256 | |
---|
257 | * [927] Compilation on Tru64 now detects GNU linker and chooses |
---|
258 | whether to use -oldstyle_liblookup accordingly. |
---|
259 | |
---|
260 | * [1044] port-sockets.h explicitly declares h_errno if the declaration |
---|
261 | is missing. |
---|
262 | |
---|
263 | * [1210] KDC cleans up some per-listener state upon process |
---|
264 | termination to avoid spurious memory leak indications. |
---|
265 | |
---|
266 | * [1335] The server side of the Horowitz password-change protocol now |
---|
267 | checks for minimum password life. |
---|
268 | |
---|
269 | * [1345, 2730, 2757] patchlevel.h is now the master version file. |
---|
270 | |
---|
271 | * [1364] GNU sed is no longer required to make depend on Irix. |
---|
272 | |
---|
273 | * [1383] SRV record support now handles "." target and adds trailing |
---|
274 | dots to avoid spurious multiple hostname queries. |
---|
275 | |
---|
276 | * [1497] A memory leak in the krb5 context serializer has been fixed. |
---|
277 | |
---|
278 | * [1570] Some team procedures now documented. |
---|
279 | |
---|
280 | * [1588] Automatic rebuilding of configure scripts, etc. are only done |
---|
281 | if --enable-maintainer-mode is passed to configure. |
---|
282 | |
---|
283 | * [1623] Memory management in the ftp client has been cleaned up. |
---|
284 | |
---|
285 | * [1724] DNS SRV record lookup support is unconditionally built on |
---|
286 | Unix. |
---|
287 | |
---|
288 | * [1791] Replacement for daemon() is compiled separately each time it |
---|
289 | is needed, rather than ending up in the krb5 library. |
---|
290 | |
---|
291 | * [1806] Default to building shared libraries on most platforms that |
---|
292 | support them. |
---|
293 | |
---|
294 | * [1847] Fixed daemon() replacement to build on Tru64. |
---|
295 | |
---|
296 | * [1850] Fixed some 0 vs NULL issues. |
---|
297 | |
---|
298 | * [2066] AES-only configuration now tested in test suite. |
---|
299 | |
---|
300 | * [2219] Fixed memory leak in KDC preauth handling. |
---|
301 | |
---|
302 | * [2256] Use $(CC) rather than ld to build shared libs on Tru64 and |
---|
303 | Irix. |
---|
304 | |
---|
305 | * [2276] Support for the non-standard enctype |
---|
306 | ENCTYPE_LOCAL_DES3_HMAC_SHA1 has been removed. |
---|
307 | |
---|
308 | * [2285] Test suite checks TCP access to KDC. |
---|
309 | |
---|
310 | * [2295] Minor stylistic cleanup in gss-client. |
---|
311 | |
---|
312 | * [2296, 2370, 2424] krb5_get_init_creds() APIs avoid multiple queries |
---|
313 | to master KDC. |
---|
314 | |
---|
315 | * [2379] Remove _XOPEN_EXTENDED hack previously used for HP-UX. |
---|
316 | |
---|
317 | * [2432] Only sanity-check setutent() API if utmpx.h is not present, |
---|
318 | as this was preventing recent NetBSD from configuring. |
---|
319 | |
---|
320 | * [2525] kvno.exe installed on Windows. |
---|
321 | |
---|
322 | * [2529] Fix some internal type inconsistencies in gssapi library. |
---|
323 | |
---|
324 | * [2530] Fix KRB5_CALLCONV usage in krb5_cc_resolve(). |
---|
325 | |
---|
326 | * [2537] Apply fix from John Hascall to make krb5_get_in_tkt() |
---|
327 | emulation actually honor the lifetimes in the input credentials. |
---|
328 | |
---|
329 | * [2539] Create manpage for krb524d. |
---|
330 | |
---|
331 | * [2573] The rcache code no longer attempts to close a negative file |
---|
332 | descriptor from a failed open. |
---|
333 | |
---|
334 | * [2591] The gssapi library now requires that the initiator's channel |
---|
335 | bindings match those provided by the acceptor, if the acceptor |
---|
336 | provides them at all. |
---|
337 | |
---|
338 | * [2592] Fix some HP-UX 11 compilation issues. |
---|
339 | |
---|
340 | * [2598] Fix some HP-UX 11 foreachaddr() issues. |
---|
341 | |
---|
342 | * [2600] gss_accept_sec_context() no longer leaks rcaches. |
---|
343 | |
---|
344 | * [2603] Clean up some issues relating to use of reserved namespace in |
---|
345 | k5-platform.h. |
---|
346 | |
---|
347 | * [2614] Rewrite handling of whitespace in profile library to better |
---|
348 | handle whitespace around tag names. |
---|
349 | |
---|
350 | * [2629] Fix double-negation of a preprocessor test in osconf.h. |
---|
351 | |
---|
352 | * [2637] krb5int_zap_data() uses SecureZeroMemory on Windows instead |
---|
353 | of memset(). |
---|
354 | |
---|
355 | * [2654] krb5_get_init_creds() checks for overflow/underflow on 32-bit |
---|
356 | timestamps. |
---|
357 | |
---|
358 | * [2655] krb5_get_init_creds() no longer issues requests where the |
---|
359 | renew_until time precedes the expiration time. |
---|
360 | |
---|
361 | * [2656] krb5_get_init_creds() supports ticket_lifetime libdefault. |
---|
362 | |
---|
363 | * [2657] Default ccache name is evaluated more lazily. |
---|
364 | |
---|
365 | * [2661] Handle return of ai_canonname=NULL from getaddrinfo(). |
---|
366 | |
---|
367 | * [2665] Fix leak in cc_resolve, reported by Paul Moore. |
---|
368 | |
---|
369 | * [2674] libkadm5 acl_init() API renamed to avoid conflict with MacOS |
---|
370 | X acl API. |
---|
371 | |
---|
372 | * [2684, 2710, 2728] Use BIND 8 parsing API when available. |
---|
373 | |
---|
374 | * [2685] The profile library iterators no longer get confused when |
---|
375 | modifications are made to the in-memory profile. |
---|
376 | |
---|
377 | * [2694] The krb5-config script now has a manpage. |
---|
378 | |
---|
379 | * [2704] New ccache API flag to request only information, not actual |
---|
380 | credentials. |
---|
381 | |
---|
382 | * [2705] Support for upcoming read/write MSLSA ccache. |
---|
383 | |
---|
384 | * [2706] resolv.h is included when searching for res_search() and |
---|
385 | friends, to account for symbol renaming. |
---|
386 | |
---|
387 | * [2715] The install-strip make target no longer attempts to strip |
---|
388 | scripts. |
---|
389 | |
---|
390 | * [2718] Fix memory leak in arcfour string_to_key. Reported by |
---|
391 | Derrick Schommer. |
---|
392 | |
---|
393 | * [2719] Fix memory leak in rd_cred.c. Reported by Derrick Schommer. |
---|
394 | |
---|
395 | * [2725] Fix memory leak in mk_req_extended(). Reported by Derrick |
---|
396 | Schommer. |
---|
397 | |
---|
398 | * [2729] Add some new version strings for Windows. |
---|
399 | |
---|
400 | * [2734] The ticket_lifetime libdefault now uses units of seconds by |
---|
401 | default, if no units are provided. |
---|
402 | |
---|
403 | * [2741] The profile library's error tables aren't loaded on MacOS X. |
---|
404 | |
---|
405 | * [2750] Calls to the profile library which set values no longer fail |
---|
406 | if the file is not writable. |
---|
407 | |
---|
408 | * [2751] The profile library has a new API to detect whether the |
---|
409 | default profile is writable. |
---|
410 | |
---|
411 | * [2753] An initial C implementation of CCAPI has been done. |
---|
412 | |
---|
413 | * [2754] fake-addrinfo.h includes errno.h earlier. |
---|
414 | |
---|
415 | * [2756] The profile library calls stat() less frequently on files. |
---|
416 | |
---|
417 | * [2760, 2780] The keytab implementation checks for cases where |
---|
418 | fopen() can return NULL without setting errno. Reported by Roland |
---|
419 | Dowdeswell. |
---|
420 | |
---|
421 | * [2770] com_err now creates valid prototypes for generated files. |
---|
422 | Reported by Jeremy Allison. |
---|
423 | |
---|
424 | * [2772, 2797] The krb4 library now honors the dns_fallback libdefault |
---|
425 | setting. |
---|
426 | |
---|
427 | * [2776, 2779] Solaris patches exist for the pty-close race condition |
---|
428 | bug. We check for these patches now checked, and don't apply the |
---|
429 | priocntl hack if they are present. |
---|
430 | |
---|
431 | * [2783] ftpcmds.y unconditionally defines NBBY to 8. |
---|
432 | |
---|
433 | * [2793] locate_kdc.c can compile if KRB5_DNS_LOOKUP isn't defined, |
---|
434 | though we removed the configure-time option for this. |
---|
435 | |
---|
436 | * [2795] Fixed some addrinfo problems that affected Irix. |
---|
437 | |
---|
438 | * [2796, 2840] Calling conventions for some API functions for Windows |
---|
439 | have been fixed. |
---|
440 | |
---|
441 | * [2805] Windows NSIS installer script updated. |
---|
442 | |
---|
443 | * [2808] Support library renamed on Windows. |
---|
444 | |
---|
445 | * [2815] krb5-config updated to reference new support library. |
---|
446 | |
---|
447 | * [2814, 2816] Some MSLSA ccache features depending on non-public SDK |
---|
448 | features were backed out. |
---|
449 | |
---|
450 | * [2818] Don't create empty array for addresses in MSLSA ccache. |
---|
451 | |
---|
452 | * [2832] Fix shared library build on sparc64-netbsd. |
---|
453 | |
---|
454 | * [2833, 2834, 2835] Add support for generating/installing debugging |
---|
455 | symbols on Windows. |
---|
456 | |
---|
457 | * [2838] Fix termination of incorrect string in telnetd. |
---|
458 | |
---|
459 | * [2854] Fix memory leak in ccache. |
---|
460 | |
---|
461 | * [2857] Fix memory leak in asn1_decode_generaltime(). |
---|
462 | |
---|
463 | * [2861] Minor documenation fixes. |
---|
464 | |
---|
465 | * [2864] Fix IPv6 support on Windows. |
---|
466 | |
---|
467 | * [2865] New API function krb5_is_thread_safe() to test for thread |
---|
468 | safety. |
---|
469 | |
---|
470 | * [2870, 2881] Fix crash in MSLSA ccache. |
---|
471 | |
---|
472 | * [2871] Handle read() returning -1 in prng.c. |
---|
473 | |
---|
474 | * [2872] Fix memory leak in DNS lookup code. |
---|
475 | |
---|
476 | * [2887] Fix null pointer dereference in krb5_unparse_name(). |
---|
477 | |
---|
478 | * [2892] Fix some gcc-4.0 compatibility problems. |
---|
479 | |
---|
480 | * [2891] lib/kdb/keytab.c no longer accesses an uninitialized variable. |
---|
481 | |
---|
482 | Copyright Notice and Legal Administrivia |
---|
483 | ---------------------------------------- |
---|
484 | |
---|
485 | Copyright (C) 1985-2005 by the Massachusetts Institute of Technology. |
---|
486 | |
---|
487 | All rights reserved. |
---|
488 | |
---|
489 | Export of this software from the United States of America may require |
---|
490 | a specific license from the United States Government. It is the |
---|
491 | responsibility of any person or organization contemplating export to |
---|
492 | obtain such a license before exporting. |
---|
493 | |
---|
494 | WITHIN THAT CONSTRAINT, permission to use, copy, modify, and |
---|
495 | distribute this software and its documentation for any purpose and |
---|
496 | without fee is hereby granted, provided that the above copyright |
---|
497 | notice appear in all copies and that both that copyright notice and |
---|
498 | this permission notice appear in supporting documentation, and that |
---|
499 | the name of M.I.T. not be used in advertising or publicity pertaining |
---|
500 | to distribution of the software without specific, written prior |
---|
501 | permission. Furthermore if you modify this software you must label |
---|
502 | your software as modified software and not distribute it in such a |
---|
503 | fashion that it might be confused with the original MIT software. |
---|
504 | M.I.T. makes no representations about the suitability of this software |
---|
505 | for any purpose. It is provided "as is" without express or implied |
---|
506 | warranty. |
---|
507 | |
---|
508 | THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR |
---|
509 | IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED |
---|
510 | WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE. |
---|
511 | |
---|
512 | Individual source code files are copyright MIT, Cygnus Support, |
---|
513 | OpenVision, Oracle, Sun Soft, FundsXpress, and others. |
---|
514 | |
---|
515 | Project Athena, Athena, Athena MUSE, Discuss, Hesiod, Kerberos, Moira, |
---|
516 | and Zephyr are trademarks of the Massachusetts Institute of Technology |
---|
517 | (MIT). No commercial use of these trademarks may be made without |
---|
518 | prior written permission of MIT. |
---|
519 | |
---|
520 | "Commercial use" means use of a name in a product or other for-profit |
---|
521 | manner. It does NOT prevent a commercial firm from referring to the |
---|
522 | MIT trademarks in order to convey information (although in doing so, |
---|
523 | recognition of their trademark status should be given). |
---|
524 | |
---|
525 | ---- |
---|
526 | |
---|
527 | The following copyright and permission notice applies to the |
---|
528 | OpenVision Kerberos Administration system located in kadmin/create, |
---|
529 | kadmin/dbutil, kadmin/passwd, kadmin/server, lib/kadm5, and portions |
---|
530 | of lib/rpc: |
---|
531 | |
---|
532 | Copyright, OpenVision Technologies, Inc., 1996, All Rights Reserved |
---|
533 | |
---|
534 | WARNING: Retrieving the OpenVision Kerberos Administration system |
---|
535 | source code, as described below, indicates your acceptance of the |
---|
536 | following terms. If you do not agree to the following terms, do not |
---|
537 | retrieve the OpenVision Kerberos administration system. |
---|
538 | |
---|
539 | You may freely use and distribute the Source Code and Object Code |
---|
540 | compiled from it, with or without modification, but this Source |
---|
541 | Code is provided to you "AS IS" EXCLUSIVE OF ANY WARRANTY, |
---|
542 | INCLUDING, WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY OR |
---|
543 | FITNESS FOR A PARTICULAR PURPOSE, OR ANY OTHER WARRANTY, WHETHER |
---|
544 | EXPRESS OR IMPLIED. IN NO EVENT WILL OPENVISION HAVE ANY LIABILITY |
---|
545 | FOR ANY LOST PROFITS, LOSS OF DATA OR COSTS OF PROCUREMENT OF |
---|
546 | SUBSTITUTE GOODS OR SERVICES, OR FOR ANY SPECIAL, INDIRECT, OR |
---|
547 | CONSEQUENTIAL DAMAGES ARISING OUT OF THIS AGREEMENT, INCLUDING, |
---|
548 | WITHOUT LIMITATION, THOSE RESULTING FROM THE USE OF THE SOURCE |
---|
549 | CODE, OR THE FAILURE OF THE SOURCE CODE TO PERFORM, OR FOR ANY |
---|
550 | OTHER REASON. |
---|
551 | |
---|
552 | OpenVision retains all copyrights in the donated Source Code. OpenVision |
---|
553 | also retains copyright to derivative works of the Source Code, whether |
---|
554 | created by OpenVision or by a third party. The OpenVision copyright |
---|
555 | notice must be preserved if derivative works are made based on the |
---|
556 | donated Source Code. |
---|
557 | |
---|
558 | OpenVision Technologies, Inc. has donated this Kerberos |
---|
559 | Administration system to MIT for inclusion in the standard |
---|
560 | Kerberos 5 distribution. This donation underscores our |
---|
561 | commitment to continuing Kerberos technology development |
---|
562 | and our gratitude for the valuable work which has been |
---|
563 | performed by MIT and the Kerberos community. |
---|
564 | |
---|
565 | ---- |
---|
566 | |
---|
567 | Portions contributed by Matt Crawford <crawdad@fnal.gov> were |
---|
568 | work performed at Fermi National Accelerator Laboratory, which is |
---|
569 | operated by Universities Research Association, Inc., under |
---|
570 | contract DE-AC02-76CHO3000 with the U.S. Department of Energy. |
---|
571 | |
---|
572 | ---- The implementation of the Yarrow pseudo-random number generator |
---|
573 | in src/lib/crypto/yarrow has the following copyright: |
---|
574 | |
---|
575 | Copyright 2000 by Zero-Knowledge Systems, Inc. |
---|
576 | |
---|
577 | Permission to use, copy, modify, distribute, and sell this software |
---|
578 | and its documentation for any purpose is hereby granted without fee, |
---|
579 | provided that the above copyright notice appear in all copies and that |
---|
580 | both that copyright notice and this permission notice appear in |
---|
581 | supporting documentation, and that the name of Zero-Knowledge Systems, |
---|
582 | Inc. not be used in advertising or publicity pertaining to |
---|
583 | distribution of the software without specific, written prior |
---|
584 | permission. Zero-Knowledge Systems, Inc. makes no representations |
---|
585 | about the suitability of this software for any purpose. It is |
---|
586 | provided "as is" without express or implied warranty. |
---|
587 | |
---|
588 | ZERO-KNOWLEDGE SYSTEMS, INC. DISCLAIMS ALL WARRANTIES WITH REGARD TO |
---|
589 | THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND |
---|
590 | FITNESS, IN NO EVENT SHALL ZERO-KNOWLEDGE SYSTEMS, INC. BE LIABLE FOR |
---|
591 | ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES |
---|
592 | WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN |
---|
593 | ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTUOUS ACTION, ARISING OUT |
---|
594 | OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
---|
595 | |
---|
596 | ---- The implementation of the AES encryption algorithm in |
---|
597 | src/lib/crypto/aes has the following copyright: |
---|
598 | |
---|
599 | Copyright (c) 2001, Dr Brian Gladman <brg@gladman.uk.net>, Worcester, UK. |
---|
600 | All rights reserved. |
---|
601 | |
---|
602 | LICENSE TERMS |
---|
603 | |
---|
604 | The free distribution and use of this software in both source and binary |
---|
605 | form is allowed (with or without changes) provided that: |
---|
606 | |
---|
607 | 1. distributions of this source code include the above copyright |
---|
608 | notice, this list of conditions and the following disclaimer; |
---|
609 | |
---|
610 | 2. distributions in binary form include the above copyright |
---|
611 | notice, this list of conditions and the following disclaimer |
---|
612 | in the documentation and/or other associated materials; |
---|
613 | |
---|
614 | 3. the copyright holder's name is not used to endorse products |
---|
615 | built using this software without specific written permission. |
---|
616 | |
---|
617 | DISCLAIMER |
---|
618 | |
---|
619 | This software is provided 'as is' with no explcit or implied warranties |
---|
620 | in respect of any properties, including, but not limited to, correctness |
---|
621 | and fitness for purpose. |
---|
622 | |
---|
623 | ---- The implementation of the RPCSEC_GSS authentication flavor in |
---|
624 | src/lib/rpc has the following copyright: |
---|
625 | |
---|
626 | Copyright (c) 2000 The Regents of the University of Michigan. |
---|
627 | All rights reserved. |
---|
628 | |
---|
629 | Copyright (c) 2000 Dug Song <dugsong@UMICH.EDU>. |
---|
630 | All rights reserved, all wrongs reversed. |
---|
631 | |
---|
632 | Redistribution and use in source and binary forms, with or without |
---|
633 | modification, are permitted provided that the following conditions |
---|
634 | are met: |
---|
635 | |
---|
636 | 1. Redistributions of source code must retain the above copyright |
---|
637 | notice, this list of conditions and the following disclaimer. |
---|
638 | 2. Redistributions in binary form must reproduce the above copyright |
---|
639 | notice, this list of conditions and the following disclaimer in the |
---|
640 | documentation and/or other materials provided with the distribution. |
---|
641 | 3. Neither the name of the University nor the names of its |
---|
642 | contributors may be used to endorse or promote products derived |
---|
643 | from this software without specific prior written permission. |
---|
644 | |
---|
645 | THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED |
---|
646 | WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF |
---|
647 | MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE |
---|
648 | DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE |
---|
649 | FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR |
---|
650 | CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF |
---|
651 | SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR |
---|
652 | BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF |
---|
653 | LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING |
---|
654 | NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS |
---|
655 | SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
---|
656 | |
---|
657 | Acknowledgments |
---|
658 | --------------- |
---|
659 | |
---|
660 | Appreciation Time!!!! There are far too many people to try to thank |
---|
661 | them all; many people have contributed to the development of Kerberos |
---|
662 | V5. This is only a partial listing.... |
---|
663 | |
---|
664 | Thanks to Kevin Coffman and the CITI group at the University of |
---|
665 | Michigan for providing patches for implementing RPCSEC_GSS |
---|
666 | authentication in the RPC library. |
---|
667 | |
---|
668 | Thanks to Derrick Schommer for reporting multiple memory leaks. |
---|
669 | |
---|
670 | Thanks to Quanah Gibson-Mount of Stanford University for helping |
---|
671 | exercise the thread support code. |
---|
672 | |
---|
673 | Thanks to Michael Tautschnig for reporting the heap buffer overflow in |
---|
674 | the password history mechanism. [MITKRB5-SA-2004-004] |
---|
675 | |
---|
676 | Thanks to Wyllys Ingersoll for finding a buffer-size problem in the |
---|
677 | RPCSEC_GSS implementation. |
---|
678 | |
---|
679 | Thanks to iDEFENSE for bringing to our attention the vulnerabilities |
---|
680 | in the telnet client. [MITKRB5-SA-2005-001] |
---|
681 | |
---|
682 | Thanks to the members of the Kerberos V5 development team at MIT, both |
---|
683 | past and present: Danilo Almeida, Jeffrey Altman, Jay Berkenbilt, |
---|
684 | Richard Basch, Mitch Berger, John Carr, Don Davis, Alexandra Ellwood, |
---|
685 | Nancy Gilman, Matt Hancher, Sam Hartman, Paul Hill, Marc Horowitz, Eva |
---|
686 | Jacobus, Miroslav Jurisic, Barry Jaspan, Geoffrey King, John Kohl, |
---|
687 | Peter Litwack, Scott McGuire, Kevin Mitchell, Cliff Neuman, Paul Park, |
---|
688 | Ezra Peisach, Chris Provenzano, Ken Raeburn, Jon Rochlis, Jeff |
---|
689 | Schiller, Jen Selby, Brad Thompson, Harry Tsai, Ted Ts'o, Marshall |
---|
690 | Vale, Tom Yu. |
---|
691 | |
---|
692 | Very special thanks go to Marshall Vale, our departing team leader. |
---|
693 | Over the past few years, Marshall has been extremely valuable to us as |
---|
694 | mentor, advisor, manager, and friend. Marshall's devotion as a |
---|
695 | champion of Kerberos has helped our team immensely through many trials |
---|
696 | and hardships. We will miss him tremendously, and we wish him the |
---|
697 | best in his future endeavors. |
---|