SEARCH
NEW RPMS
DIRECTORIES
ABOUT
FAQ
VARIOUS
BLOG

 
 
Changelog for pam_krb5-debugsource-2.4.4-9.5.x86_64.rpm :

* Wed May 28 2014 ckornackerAATTsuse.com- serialize make process to prevent build failures on s390
* Tue Apr 16 2013 mcAATTsuse.de- update to version 2.4.4
* drop configuration settings that duplicated library settings
* drop the existing_ticket option
* drop krb4 support
* add support for preserving configuration information in ccaches
* add support for creating and cleaning up DIR: ccaches
* finish cleaning up KEYRING: ccaches
* add experimental \"armor\" and \"armor_strategy\" options
* handle creation of /run/user/XXX for FILE: and DIR: caches
* handle different function signatures for krb5_trace_callback
* avoid overriding the primary when updating DIR: caches- obsolets patches (upstream):
* pam_krb5-2.2.0-0.5-configure_ac.dif
* use-urandom-for-tests.dif
* Thu Mar 07 2013 cfarrellAATTsuse.com- license update: BSD-3-Clause or LGPL-2.1+ it is a dual license - hence the operator is ^or^ not ^and^
* Fri Mar 01 2013 cooloAATTsuse.com- update license to new format
* Tue Aug 23 2011 mcAATTsuse.de- disable checks during build. Does not work reliable in the buildservice
* Sun Aug 21 2011 mcAATTnovell.com- update to version 2.3.13
* don\'t bother creating a v5 ccache in \"external\" mode
* add a \"trace\" option to enable libkrb5 tracing, if available
* avoid trying to get password-change creds twice
* use an in-memory ccache when obtaining tokens using v5 creds
* turn off creds==session in \"sshd\"
* add a \"validate_user_user\" option to control trying to perform user-to-user authentication to validate TGTs when a keytab is not available
* add an \"ignore_k5login\" option to control whether or not the module will use the krb5_kuserok() function to perform additional authorization checks
* turn on validation by default - verify_ap_req_nofail controls how we treat errors reading keytab files now
* add an \"always_allow_localname\" option when we can use krb5_aname_to_localname() to second-guess the krb5_kuserok() check
* prefer krb5_change_password() to krb5_set_password()
* Tue Mar 01 2011 mcAATTsuse.de- make pam_sm_setcred less verbose (bnc#641008)
* Fri Nov 19 2010 cooloAATTnovell.com- remove autoreconf call - breaks more than it helps
* Mon Mar 22 2010 mcAATTsuse.de- update to version 2.3.11
* create credentials before trying to look up the location of the user\'s home directory via krb5_kuserok()
* Thu Mar 04 2010 mcAATTsuse.de- update to version 2.3.10-3
* add a \"chpw_prompt\" option
* add a \"multiple_ccaches\" option
* fine-tune the logic for selecting which key we use for validating credentials
* fixes
* Mon Feb 01 2010 jengelhAATTmedozas.de- package baselibs.conf
* Tue Nov 03 2009 cooloAATTnovell.com- updated patches to apply with fuzz=0
* Mon Jul 27 2009 mcAATTnovell.com- version 2.3.7
* when refreshing credentials, store the new creds in the default ccache if $KRB5CCNAME isn\'t set.
* prefer a \"host\" key, if one is found, when validating TGTs
* Wed Jun 24 2009 sbrabecAATTsuse.cz- Supplement pam-32bit/pam-64bit in baselibs.conf (bnc#354164).
* Mon Jun 15 2009 mcAATTsuse.de- compile fixes for krb5 1.7
* Mon Jun 08 2009 mcAATTsuse.de- update to version 2.3.5
* make prompting behavior for non-existent accounts and users who just press enter match up with those who aren\'t/don\'t (#502602, CVE-2009-1384)
* Wed May 20 2009 mcAATTsuse.de- update to version 2.3.4
* don\'t request password-changing credentials using the same options we use for ticket-granting tickets
* close a couple of open pipes to defunct processes, fix a couple of debug messages
* fix ccache permissions bypass when the \"existing_ticket\" option is used (CVE-2008-3825, which affects 2.2.0-2.2.25, 2.3.0, and 2.3.1)- obsolete a lot of patches.
 
ICM