Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: pam_krb5-32bit | Distribution: SUSE Linux Enterprise 15 |
Version: 2.4.13 | Vendor: SUSE LLC <https://www.suse.com/> |
Release: 1.36 | Build date: Thu May 31 10:12:38 2018 |
Group: Productivity/Networking/Security | Build host: sheep57 |
Size: 145488 | Source RPM: pam_krb5-2.4.13-1.36.src.rpm |
Packager: https://www.suse.com/ | |
Url: https://pagure.io/pam_krb5 | |
Summary: A Pluggable Authentication Module for Kerberos 5 |
This PAM module supports authentication against a Kerberos KDC. It also supports updating your Kerberos password.
BSD-3-Clause or LGPL-2.1+
* Wed Jul 26 2017 josef.moellers@suse.com - Update to 2.4.13: * Fix a memory leak on FAST-capable clients * Learn to run 'kdc' and 'kpasswdd', if appropriate * Add the ability to specify a server principal * Drop _pam_krb5_stash_chown_keyring functionality * Fix a configure syntax error * Handle ccname templates that don't include a type * Fix a memory leak (static analysis) * default to subsequent_prompt=false for chauthtok * Don't close descriptors for fork-without-exec * Handle PKINIT without duplicate prompting * Add support for rxkad-k5-kdf [pam_krb5-LINGUAS.dif] * Wed May 28 2014 ckornacker@suse.com - serialize make process to prevent build failures on s390 * Tue Apr 16 2013 mc@suse.de - update to version 2.4.4 * drop configuration settings that duplicated library settings * drop the existing_ticket option * drop krb4 support * add support for preserving configuration information in ccaches * add support for creating and cleaning up DIR: ccaches * finish cleaning up KEYRING: ccaches * add experimental "armor" and "armor_strategy" options * handle creation of /run/user/XXX for FILE: and DIR: caches * handle different function signatures for krb5_trace_callback * avoid overriding the primary when updating DIR: caches - obsolets patches (upstream): * pam_krb5-2.2.0-0.5-configure_ac.dif * use-urandom-for-tests.dif * Thu Mar 07 2013 cfarrell@suse.com - license update: BSD-3-Clause or LGPL-2.1+ it is a dual license - hence the operator is ^or^ not ^and^ * Fri Mar 01 2013 coolo@suse.com - update license to new format * Tue Aug 23 2011 mc@suse.de - disable checks during build. Does not work reliable in the buildservice * Sun Aug 21 2011 mc@novell.com - update to version 2.3.13 * don't bother creating a v5 ccache in "external" mode * add a "trace" option to enable libkrb5 tracing, if available * avoid trying to get password-change creds twice * use an in-memory ccache when obtaining tokens using v5 creds * turn off creds==session in "sshd" * add a "validate_user_user" option to control trying to perform user-to-user authentication to validate TGTs when a keytab is not available * add an "ignore_k5login" option to control whether or not the module will use the krb5_kuserok() function to perform additional authorization checks * turn on validation by default - verify_ap_req_nofail controls how we treat errors reading keytab files now * add an "always_allow_localname" option when we can use krb5_aname_to_localname() to second-guess the krb5_kuserok() check * prefer krb5_change_password() to krb5_set_password() * Tue Mar 01 2011 mc@suse.de - make pam_sm_setcred less verbose (bnc#641008) * Fri Nov 19 2010 coolo@novell.com - remove autoreconf call - breaks more than it helps * Mon Mar 22 2010 mc@suse.de - update to version 2.3.11 * create credentials before trying to look up the location of the user's home directory via krb5_kuserok() * Thu Mar 04 2010 mc@suse.de - update to version 2.3.10-3 * add a "chpw_prompt" option * add a "multiple_ccaches" option * fine-tune the logic for selecting which key we use for validating credentials * fixes * Mon Feb 01 2010 jengelh@medozas.de - package baselibs.conf * Tue Nov 03 2009 coolo@novell.com - updated patches to apply with fuzz=0 * Mon Jul 27 2009 mc@novell.com - version 2.3.7 * when refreshing credentials, store the new creds in the default ccache if $KRB5CCNAME isn't set. * prefer a "host" key, if one is found, when validating TGTs * Wed Jun 24 2009 sbrabec@suse.cz - Supplement pam-32bit/pam-64bit in baselibs.conf (bnc#354164). * Mon Jun 15 2009 mc@suse.de - compile fixes for krb5 1.7 * Mon Jun 08 2009 mc@suse.de - update to version 2.3.5 * make prompting behavior for non-existent accounts and users who just press enter match up with those who aren't/don't (#502602, CVE-2009-1384) * Wed May 20 2009 mc@suse.de - update to version 2.3.4 * don't request password-changing credentials using the same options we use for ticket-granting tickets * close a couple of open pipes to defunct processes, fix a couple of debug messages * fix ccache permissions bypass when the "existing_ticket" option is used (CVE-2008-3825, which affects 2.2.0-2.2.25, 2.3.0, and 2.3.1) - obsolete a lot of patches.
/lib/security /lib/security/pam_krb5.so /lib/security/pam_krb5afs.so
Generated by rpm2html 1.8.1
Fabrice Bellet, Tue Jul 9 16:00:25 2024