1 Shishi NEWS -- History of user-visible changes. -*- outline -*-
2 Copyright (C) 2002, 2003, 2004, 2005, 2006, 2007 Simon Josefsson
3 See the end for copying conditions.
5 * Version 0.0.31 (unreleased)
7 ** Verify the KDC's certificate against a CA certificate in the client.
8 The CA is by default stored in ~/.shishi/client.ca in PEM format.
9 Suggested by Alberto Fondi <alberto.fondi@lnf.infn.it>.
11 * Version 0.0.30 (released 2006-11-01)
13 ** Update STARTTLS extension to match latest drafts.
14 Shishi now implements draft-josefsson-krb-tcp-expansion-02.txt and
15 draft-josefsson-kerberos5-starttls-02.txt.
17 ** Fix failure when reading large integers from ASN.1 structure.
18 This can manifest itself by giving error messages such as 'Replay
19 protection value (nonce) differ between request and reply.'. Added a
20 new self test "nonce" to detect errors in these routines. Reported by
23 * Version 0.0.29 (released 2006-11-01)
25 ** Add man page for ccache2shishi.
27 * Version 0.0.28 (released 2006-11-01)
29 ** New command line tool "ccache2shishi".
30 The tool will read tickets from /tmp/krb5cc_UID (by default) and will
31 write them to ~/.shishi/tickets.
33 ** A description of the ccache file format were added in doc/ccache.txt.
35 ** A self-contained standalone parser of the ccache format added.
36 See lib/ccache.h and lib/ccache.c. The intention is that they should
37 be usable outside of Shishi, and it doesn't use any Shishi specific
38 header files or functions. It also avoids heap memory handling.
40 ** New APIs to read MIT ccache files.
41 shishi_tkts_add_ccache_mem
42 shishi_tkts_add_ccache_file
43 shishi_tkts_from_ccache_mem
44 shishi_tkts_from_ccache_file
46 ** New APIs to support ccache reading.
47 shishi_enckdcreppart_authtime_set
48 shishi_enckdcreppart_starttime_set
49 shishi_enckdcreppart_renew_till_set
50 shishi_tkts_default_ccache_guess
51 shishi_tkts_default_ccache
52 shishi_tkts_default_ccache_set
54 ** Fix build errors for missing arcfour_stream when using --with-libgcrypt.
55 Reported by abhijit mitra <abhijit_kly@yahoo.co.in>.
57 * Version 0.0.27 (released 2006-09-15)
59 ** New command line tool "keytab2shishi".
60 The tool will read host keys from /etc/krb5.keytab (by default) and
61 will write them to $(prefix)/etc/shishi.keys.
63 ** New APIs to read MIT keytab files.
64 Thanks to Michael B Allen who reverse-engineered the format and
65 published a freely licensed description, available from
66 <http://www.ioplex.com/utilities/keytab.txt>. The APIs are
67 shishi_keys_add_keytab_mem, shishi_keys_add_keytab_file,
68 shishi_keys_from_keytab_mem, and shishi_keys_from_keytab_file.
70 ** New APIs to manage set of keys.
80 ** Libtasn1 updated to 0.3.6.
81 This fixes a bug that caused self-test failures in Shishi on 64-bit
84 ** Remove path from syslog messages for shishid.
86 ** Update of gnulib files.
88 ** Some minor code cleanups.
90 * Version 0.0.26 (released 2006-05-15)
92 ** Requests for service tickets (TGS) are now sent without a sub-session key.
93 This solves interop problems with Windows 2003 and Heimdal, thanks to
96 ** Fix buggy MD4 implementation on 64-bit platforms.
98 ** The Shishi PAM module in extra/pam-shishi/ is now built by default.
99 The installation path has also been changed to $prefix/lib/security,
100 but you can change it with `configure --with-pam-dir=/somewhere/else'
101 or `make install PAMDIR=/somewhere/else'.
105 ** Self-tests are now run under valgrind, if it is installed.
107 ** Updated Polish translation, thanks to Jakub Bogusz.
109 * Version 0.0.25 (released 2006-04-27)
111 ** Fix bug in code to get service tickets.
112 The problem was in the libtasn1 DER encoder which include ASN.1 tags
113 for SEQUENCE members when calling asn1_der_coding() on a SEQUENCE
114 element, thanks to Elrond for debugging.
116 ** Improved handling of key versions.
117 Shishi should not send kvno for a session keys in TGS requests any
118 more. Internally, the UINT32_MAX kvno is now used to denote a
119 "kvno"-less (i.e., non-permenant) key, earlier 0 was used which
120 collided with the perfectly valid real kvno of 0.
122 ** Improved translation of messages in shishi.
126 * Version 0.0.24 (released 2006-04-22)
128 ** Fix bug in shishid which caused it to listen on standard input and crash.
130 ** Pre-authentication support.
131 Only the PA-ENC-TIMESTAMP, ETYPE-INFO and ETYPE-INFO2 mechanisms are
132 supported. Tested againt MIT, Heimdal, and Windows 2003 KDCs.
134 ** Clarified the copyright on lib/kerberos5.asn1.
136 ** Updated gnulib compatibility files.
138 ** Fix some memory leaks and crashes.
140 * Version 0.0.23 (released 2006-03-25)
142 ** Debian packages are available from http://josefsson.org/shishi/debian/
143 Thanks to Russ Allbery, Yvan Bassuel and Elrond for help on the Debian
146 ** Added shishi_derive_default_salt and shishi_key_from_name APIs.
147 Used to create a key from principal and password. Suggested by Elrond
148 <elrond@samba-tng.org>.
150 ** Replace internal crypto code with modules from gnulib.
152 ** Added shared library versioning script, suggested by Steve Langasek.
154 ** Improved libidn detection code.
156 ** The manual doesn't have any invariant sections.
158 ** Updated gnulib compatibility files.
162 ** Minor bugfixes and improvements.
164 * Version 0.0.22 (released 2005-08-10)
166 ** Fix build error when STARTTLS support is enabled.
168 ** The help-shishi@gnu.org mailing list is now mentioned in documentation.
170 ** Should now build with objdir != srcdir on systems that lack stdbool.h.
172 ** The license template in files were updated with the new FSF address.
174 ** The internal libtasn1 copy was updated to version 0.2.14.
176 ** Gnulib files updated, and uses within the library updated.
178 * Version 0.0.21 (released 2004-12-17)
180 ** Libtasn1 updated to 0.2.13.
182 ** Gnulib files updated, and uses within the library updated.
184 ** Fix srcdir != objdir building, reported by Mike Castle.
186 * Version 0.0.20 (released 2004-11-21)
188 ** Fix formatting of man pages, based on warnings from Doclifter.
190 ** Updated gnulib compatibility files.
192 * Version 0.0.19 (released 2004-11-12)
194 ** Documentation improvements.
195 For example, you can now browse the Shishi API manual using DevHelp.
197 ** Updated gnulib compatibility files.
199 * Version 0.0.18 (released 2004-10-15)
201 ** When generating an AP-REP, the generated EncAPRepPart is now remembered.
203 ** Fix some memory leaks.
205 ** Revamp of autogenerated documentation.
207 ** Documentation improvements.
209 ** Included libtasn1 updated to 0.2.11.
211 ** ASN.1 API cleanup:
212 shishi_new_a2d: RENAMED to shishi_asn1_to_der.
213 shishi_a2d_new_field: RENAMED to shishi_asn1_to_der_field.
214 shishi_a2d, shishi_a2d_field: REMOVED.
215 shishi_asn1_read: RENAMED to shishi_asn1_read_inline.
216 shishi_asn1_read2: RENAMED to shishi_asn1_read.
217 shishi_asn1_read2_optional: RENAMED to shishi_asn1_read_optional.
218 shishi_asn1_read_optional: MODIFIED, now allocate output.
220 ** Various other API fixes.
221 Functions that take fixed size buffers have been replaced by functions
222 that allocate dynamically sized buffer of the correct length.
224 * Version 0.0.17 (released 2004-08-08)
226 ** Revamp of gnulib compatibility files.
230 * Version 0.0.16 (released 2004-08-01)
232 ** New environment variables to override defaults in Shishi library.
233 SHISHI_USER specifies default client username, SHISHI_HOME specifies
234 user Shishi home directory (for configuration file, ticket cache,
235 etc), SHISHI_TICKETS the ticket cache file, SHISHI_CONFIG for the
236 system configuration file, SHISHI_KEYS for system wide host keys.
238 ** Experimental KDC now handle non-default ticket life time.
240 ** Nettle is now preferred over Libgcrypt, even if Libgcrypt is available.
241 Use configure parameter --with-libgcrypt to override. Nettle is the
242 minimalistic crypto library included with Shishi.
244 ** The pkg-config script no longer use the linker parameter -R.
246 ** Libtasn1 updated to 0.2.10.
248 ** Many gnulib compatibility files were updated.
250 ** Cross compile builds should work.
251 It should work for any sane cross compile target, but the only tested
252 platform is uClibc/uClinux on Motorola Coldfire.
254 * Version 0.0.15 (released 2004-04-18)
256 ** Sequence numbers in Authenticator and EncAPRepPart are now randomized.
258 ** Low-level fixes of AES Cipher Text Stealing mode.
259 Also added more AES/CTS self tests.
261 ** Configuration tokens spelled correctly ("verbose-noice" -> "verbose-noise").
263 ** Polish translation added, by Jakub Bogusz.
265 ** Various bugfixes and cleanups.
267 * Version 0.0.14 (released 2004-01-22)
269 ** High-level AP interface now support setting raw checksum field values.
270 This is needed for certain applications that, like GSS-API, put
271 non-standard data in the checksum field of the Authenticator in a
274 ** Various minor bugfixes.
276 * Version 0.0.13 (released 2004-01-15)
278 ** Fixed salt calculation in shisa.
279 The earlier salt computed was incorrect, so existing keys in your
280 Shisa database, that were derived from passwords, are incorrect, and
283 ** Fixed shisa key file parser to handle keys with leading whitespace.
284 The parser used fscanf, which skip whitespace. If your cryptographic
285 key (not passwords), in binary format, had leading whitespace, it
286 would fail to read the correct key.
288 ** Fix shishid crash on startup when sockets can't be opened.
290 ** Various minor bugfixes.
292 * Version 0.0.12 (released 2004-01-02)
294 ** The user database library Shisa has been improved.
295 Shisa now support multiple keys for users, and you can now selectively
296 add and remove keys via the command line interface.
298 ** The Shishi client and Shishid KDC now support TLS resumption.
299 This improve TLS handshake speed, in particular for the normal AS plus
300 TGS combination. Currently the TLS resume database is only stored in
301 memory, so if either the client or server process is restarted, the
302 TLS resume information is lost. This add --resume-limit to Shishid,
303 which can be used to specify the size of the TLS resume database (or
306 ** The KDC has been cleaned up and the error handling is more robust.
308 ** The Shisa programming API is documented in the manual.
310 * Version 0.0.11 (released 2003-12-21)
312 ** The Shishi library now support X.509 authenticated KDC connections via TLS.
313 The client currently do not check server authentication, however this
314 is no worse than existing UDP/TCP connections. If client certificates
315 are available, the X.509 client certificate is simply sent (via TLS
316 handshake) to the KDC for possible pre-authentication purposes.
318 ** The KDC now support X.509 authentication.
319 If server certificates are available, X.509 authenticated TLS may be
320 negotiated. The KDC currently only use the client certificate details
321 for logging purposes. However, it do verify client certificate
322 against CA certificates, if those are available.
324 ** The KDC has been cleaned up and the error handling is more robust.
326 * Version 0.0.10 (released 2003-12-16)
328 ** The TLS support in Shishid now works.
330 ** All command line interfaces now uses getopt instead of argp.
332 * Version 0.0.9 (released 2003-12-12)
334 ** An information storage system added, called Shisa.
335 Shisa is used by KDCs (e.g., Shishid) to find information about
336 principals. Shisa can be extended to support various backends, such
337 as LDAP and SQL databases, but currently only a file system based
338 database is supported. Shisa consists of two parts, a library
339 (libshisa, see db/) and a command line tool (shisa, see src/). Shisa
340 is designed to be concurrent write safe, i.e., multiple writers to the
341 same database is permitted. This is very much work in progress.
343 ** A new tool 'shisa' added to add/remove/list/modify the Shisa database.
345 ** The Administration and Reference Manual has been (re)written.
346 There is now a step-by-step walk-through on creating the database for
347 a new realm, adding a few principals, starting the server and testing
348 it by getting tickets.
350 ** Shishid (the KDC server) now read keys via the Shisa database.
351 The old hostkeys-alike file based "database" is no longer supported.
353 ** A sample Shisa database and host keys are created during installation.
354 The default realm name (typically your hostname) is used, which might
355 not be what you prefer, but should get you started.
357 ** Improve behaviour with poorly synchronized clocks.
358 Earlier newly acquired tickets were discarded if they were not yet
359 valid when you acquire them. Now tickets are only discarded when
360 their end time is in the past.
362 ** Support for DES and 3DES without integrity checking re-added.
363 Those encryption algorithms are needed by GSS Wrap/Unwrap, but was
364 accidently removed from Shishi during an earlier cleanup.
366 ** When Libgcrypt is used, ARCFOUR now handle streamed operations.
367 This is needed for, e.g., rsh in the Shishi patched version of GNU
370 ** Paths to configurations files and host keys changed.
371 The configuration files and host keys are now stored (by default, but
372 see next entry) in $prefix/etc/shishi/, instead of, as it was before,
373 in $prefix/etc (for configuration and host keys) and
374 $prefix/share/shishi (for user configuration file template).
376 ** Paths to configurations, host keys and the database root now configurable.
377 The configure parameters --with-conf-dir, --with-skel-dir,
378 --with-key-dir, and --with-db-dir can be used to specify the location
379 of shishi.conf and shisa.conf (system configuration files),
380 shishi.skel (user configuration file template), shishi.keys (host
381 specific keys) and the Shisa database root, respectively.
383 ** IANA allocated Telnet Encrypt command 12 for the AES-CCM mode.
385 ** Autoconf 2.59, Automake 1.8, and Libtool from CVS is used.
387 ** Some more self tests were added.
389 * Version 0.0.8 (released 2003-10-16)
391 ** Passwords are processed with SASLprep instead of KRBprep.
393 ** Authorization improvements.
395 ** Documentation additions.
396 Protocol descriptions for STARTTLS, AES-CCM encrypted telnet, and
399 ** Support for upgrading TCP connections to KDC to TLS supported (STARTTLS).
400 STARTTLS support will be compiled in automatically, if you have GNUTLS
401 installed, but can be disabled unconditionally by configuring with
402 --disable-tls. Use the 'realm-kdc' configuration token to specify
403 which KDCs the client should use it against, e.g.,
404 'realm-kdc=MYREALM.ORG,kdc.myrealm.org/tls'.
406 * Version 0.0.7 (released 2003-09-21)
408 ** Encryption types can now be referred to using shorter aliases.
409 E.g., you can write "aes" instead of "aes256-cts-hmac-sha1-96".
411 ** ARCFOUR encryption support according to draft-brezak-win2k-krb-rc4-hmac-04.
413 ** DES-CBC-CRC now works.
415 * Version 0.0.6 (released 2003-09-14)
417 ** Proxiable, proxy, forwardable and forwarded tickets supported.
418 See the User Manual for discussion and examples.
420 ** Man pages for all public functions are included.
422 ** Installed versions of Libgcrypt and libtasn1 used where possible.
423 Shishi need Libgcrypt 1.1.44 or later, and libtasn1 0.2.5 or later.
424 If a usable version is not found, the internal Nettle (crypto/) and/or
425 libminitasn1 (asn1/) libraries are used instead.
427 ** It is possible to enable and disable part of the system at compile time.
428 See --disable-des, --disable-3des, --disable-aes, --disable-md,
429 --disable-null, and --enable-arcfour.
431 ** The internal crypto interface now fully modularized.
432 If you wish to add support for a new low-level cryptographic library,
433 to, e.g., utilize specialized hardware, it is now easy to do so. Two
434 wrappers for Nettle (lib/nettle.c) and Libgcrypt (lib/libgcrypt.c) are
437 ** Logging destination for warnings and informational messages can be changed.
438 By default, message are sent to stderr for clients, and syslog for
439 servers. See the new API functions shishi_outputtype and
440 shishi_set_outputtype for more information.
442 * Version 0.0.5 (released 2003-09-07)
444 ** Server host name to realm mapping via DNS supported.
446 ** SAFE functions improved.
447 Example code of a client using integrity protected application data
448 exchanges is in examples/client-safe.c and examples/server.c.
450 ** PRIV functions added.
451 Example code of a client using privacy protected application data
452 exchanges is in examples/client-priv.c.
454 ** Documentation improvements.
455 E.g., a reference manual was added, that document the configuration
456 file, and the shishi and shishid parameters.
458 ** Various API changes.
460 * Version 0.0.4 (released 2003-08-31)
462 ** The rsh/rlogin client 'rsh-redone' ported to Shishi, by Nicolas Pouvesle.
463 The client is located in extra/rsh-redone/. It supports
464 authentication and encryption. It interoperate with other
467 ** Authenticator subkeys are supported, and is used by default in AP/TGS.
468 Some KDCs does not understand subkeys in TGS requests, and use the
469 session key instead. Shishi detect and work around this problem but
472 ** Simplistic key distribution center (KDC) is working.
473 See the Administration Manual for a walk through on how to get it up
476 ** Various API changes.
478 * Version 0.0.3 (released 2003-08-22)
480 ** Documentation fixes.
484 * Version 0.0.2 (released 2003-08-17)
486 ** Command line handling of the 'shishi' application rewritten.
487 See the (updated) user manual and --help output for the new story.
489 ** It is possible to acquire renewable tickets.
491 ** Example client and server included.
492 Application data protection is not supported, but authentication is
493 demonstrated. The files are in src/client.c and src/server.c.
495 ** New configuration verbs: 'ticket-life' and 'renew-life'.
497 ** AES ciphers didn't work when nettle was used.
499 ** Cleanups, bug fixes and improved portability.
501 * Version 0.0.1 (released 2003-08-10)
503 ** InetUtils copy removed.
504 The patches (also found in extra/inetutils.diff) are forwarded upstream.
506 ** Libidn copy removed.
507 Libidn is optional, but recommended. It is used automatically if
508 present on your system.
510 ** Gettext not included.
511 Due to some conflicts between libtool and gettext, if you want i18n on
512 platforms that does not already have a useful gettext implementation,
513 you can install GNU gettext before building this package. If you
514 don't care about i18n, this package should work fine (except for i18n,
517 ** Low-level crypto uses nettle if libgcrypt is not installed.
518 Libgcrypt is not shipped with Shishi any more, instead a more
519 streamlined crypto implementation based on nettle is included.
520 Specify --with-libgcrypt to use libgcrypt.
522 ** Libtasn1 updated and replaced by "minitasn1" from gnutls.
523 Specify --with-system-libtasn1 to link with the installed libtasn1, if
526 ** KDC addresses are now found via DNS SRV RRs as a last resort.
527 This is only enabled if libresolv and resolv.h is found on your
530 ** Argp and other compatibility files replaced by gl/ directory.
532 ** Cleanups, bug fixes and various improvements.
534 * Version 0.0.0 (released 2003-06-02)
538 ----------------------------------------------------------------------
539 Copying and distribution of this file, with or without modification,
540 are permitted in any medium without royalty provided the copyright
541 notice and this notice are preserved.