Current File : /home/inlingua/public_html/decay_sym/root/var/softaculous/apps/libkrb/info.xml |
<soft xmlns="http://www.softaculous.com">
<overview>
<img src="logo.gif" style="float:right;" alt="" />{{overview}}
</overview>
<features>
{{features}}
</features>
<ratings>
http://www.webuzo.com/sysapps/libraries/MIT_Kerberos
</ratings>
<space>
14325760
</space>
<support>
https://kerberos.org
</support>
<version>
1.20.1
</version>
<mod>1</mod>
<mod_files>2</mod_files>
<softversion>
4.1.9
</softversion>
<major>1</major>
<release_date>15-11-2022</release_date>
<extract file="libkrb-$arch.tar.gz">$appsdir</extract>
<languages>
<english-overview>
<font size="5" color="#182e7a">MIT Kerberos</font> was originally developed for MIT's Project Athena in the 1980s and has grown to become the most widely deployed system for authentication and authorization in modern computer networks. Kerberos is currently shipped with all major computer operating systems and is uniquely positioned to become a universal solution to the distributed authentication and authorization problem of permitting universal "single sign-on" within and between federated enterprises and peer-to-peer communities. MIT has developed and maintains implementations of Kerberos software for the Apple Macintosh, Windows and Unix operating systems.
<br /><br />
Kerberos is distributed under the <a href="https://web.mit.edu/kerberos/krb5-devel/doc/mitK5license.html" target="_blank">MIT Kerberos </a> License
</english-overview>
<english-features>
<ul>
<li>Administrator experience:<ul>
<li>Added a “disable_pac” realm relation to suppress adding PAC
authdata to tickets, for realms which do not need to support S4U
requests.</li>
<li>Most credential cache types will use atomic replacement when a
cache is reinitialized using kinit or refreshed from the client
keytab.</li>
<li>kprop can now propagate databases with a dump size larger than
4GB, if both the client and server are upgraded.</li>
<li>kprop can now work over NATs that change the destination IP
address, if the client is upgraded.</li>
</ul>
</li>
<li>Developer experience:<ul>
<li>Updated the KDB interface. The sign_authdata() method is replaced
with the issue_pac() method, allowing KDB modules to add logon
info and other buffers to the PAC issued by the KDC.</li>
<li>Host-based initiator names are better supported in the GSS krb5
mechanism.</li>
</ul>
</li>
<li>Protocol evolution:<ul>
<li>Replaced AD-SIGNEDPATH authdata with minimal PACs.</li>
<li>To avoid spurious replay errors, password change requests will not
be attempted over UDP until the attempt over TCP fails.</li>
<li>PKINIT will sign its CMS messages with SHA-256 instead of SHA-1.</li>
</ul>
</li>
<li>Code quality:<ul>
<li>Updated all code using OpenSSL to be compatible with OpenSSL 3.</li>
<li>Reorganized the libk5crypto build system to allow the OpenSSL
back-end to pull in material from the builtin back-end depending
on the OpenSSL version.</li>
<li>Simplified the PRNG logic to always use the platform PRNG.</li>
<li>Converted the remaining Tcl tests to Python.</li>
</ul>
</li>
</ul>
</english-features>
</languages>
</soft>