1 Kerberos Version 5, Release 1.6
6 Unpacking the Source Distribution
7 ---------------------------------
9 The source distribution of Kerberos 5 comes in a gzipped tarfile,
10 krb5-1.6.tar.gz. Instructions on how to extract the entire
13 If you have the GNU tar program and gzip installed, you can simply do:
15 gtar zxpf krb5-1.6.tar.gz
17 If you don't have GNU tar, you will need to get the FSF gzip
18 distribution and use gzcat:
20 gzcat krb5-1.6.tar.gz | tar xpf -
22 Both of these methods will extract the sources into krb5-1.6/src and
23 the documentation into krb5-1.6/doc.
25 Building and Installing Kerberos 5
26 ----------------------------------
28 The first file you should look at is doc/install-guide.ps; it contains
29 the notes for building and installing Kerberos 5. The info file
30 krb5-install.info has the same information in info file format. You
31 can view this using the GNU emacs info-mode, or by using the
32 standalone info file viewer from the Free Software Foundation. This
33 is also available as an HTML file, install.html.
35 Other good files to look at are admin-guide.ps and user-guide.ps,
36 which contain the system administrator's guide, and the user's guide,
37 respectively. They are also available as info files
38 kerberos-admin.info and krb5-user.info, respectively. These files are
39 also available as HTML files.
41 If you are attempting to build under Windows, please see the
42 src/windows/README file.
47 Please report any problems/bugs/comments using the krb5-send-pr
48 program. The krb5-send-pr program will be installed in the sbin
49 directory once you have successfully compiled and installed Kerberos
50 V5 (or if you have installed one of our binary distributions).
52 If you are not able to use krb5-send-pr because you haven't been able
53 compile and install Kerberos V5 on any platform, you may send mail to
56 You may view bug reports by visiting
58 http://krbdev.mit.edu/rt/
60 and logging in as "guest" with password "guest".
63 ----------------------
65 krb5-1.6 changes by ticket ID
66 -----------------------------
68 Listed below are the RT tickets of bugs fixed in krb5-1.6. Please see
70 http://krbdev.mit.edu/rt/NoAuth/krb5-1.6/fixed-1.6.html
72 for a current listing with links to the complete tickets.
74 Copyright and Other Legal Notices
75 ---------------------------------
77 Copyright (C) 1985-2006 by the Massachusetts Institute of Technology.
81 Export of this software from the United States of America may require
82 a specific license from the United States Government. It is the
83 responsibility of any person or organization contemplating export to
84 obtain such a license before exporting.
86 WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
87 distribute this software and its documentation for any purpose and
88 without fee is hereby granted, provided that the above copyright
89 notice appear in all copies and that both that copyright notice and
90 this permission notice appear in supporting documentation, and that
91 the name of M.I.T. not be used in advertising or publicity pertaining
92 to distribution of the software without specific, written prior
93 permission. Furthermore if you modify this software you must label
94 your software as modified software and not distribute it in such a
95 fashion that it might be confused with the original MIT software.
96 M.I.T. makes no representations about the suitability of this software
97 for any purpose. It is provided "as is" without express or implied
100 THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
101 IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
102 WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
104 Individual source code files are copyright MIT, Cygnus Support,
105 Novell, OpenVision Technologies, Oracle, Red Hat, Sun Microsystems,
106 FundsXpress, and others.
108 Project Athena, Athena, Athena MUSE, Discuss, Hesiod, Kerberos, Moira,
109 and Zephyr are trademarks of the Massachusetts Institute of Technology
110 (MIT). No commercial use of these trademarks may be made without
111 prior written permission of MIT.
113 "Commercial use" means use of a name in a product or other for-profit
114 manner. It does NOT prevent a commercial firm from referring to the
115 MIT trademarks in order to convey information (although in doing so,
116 recognition of their trademark status should be given).
120 Portions of src/lib/crypto have the following copyright:
122 Copyright (C) 1998 by the FundsXpress, INC.
126 Export of this software from the United States of America may require
127 a specific license from the United States Government. It is the
128 responsibility of any person or organization contemplating export to
129 obtain such a license before exporting.
131 WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
132 distribute this software and its documentation for any purpose and
133 without fee is hereby granted, provided that the above copyright
134 notice appear in all copies and that both that copyright notice and
135 this permission notice appear in supporting documentation, and that
136 the name of FundsXpress. not be used in advertising or publicity pertaining
137 to distribution of the software without specific, written prior
138 permission. FundsXpress makes no representations about the suitability of
139 this software for any purpose. It is provided "as is" without express
142 THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
143 IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
144 WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
149 The following copyright and permission notice applies to the
150 OpenVision Kerberos Administration system located in kadmin/create,
151 kadmin/dbutil, kadmin/passwd, kadmin/server, lib/kadm5, and portions
154 Copyright, OpenVision Technologies, Inc., 1996, All Rights Reserved
156 WARNING: Retrieving the OpenVision Kerberos Administration system
157 source code, as described below, indicates your acceptance of the
158 following terms. If you do not agree to the following terms, do not
159 retrieve the OpenVision Kerberos administration system.
161 You may freely use and distribute the Source Code and Object Code
162 compiled from it, with or without modification, but this Source
163 Code is provided to you "AS IS" EXCLUSIVE OF ANY WARRANTY,
164 INCLUDING, WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY OR
165 FITNESS FOR A PARTICULAR PURPOSE, OR ANY OTHER WARRANTY, WHETHER
166 EXPRESS OR IMPLIED. IN NO EVENT WILL OPENVISION HAVE ANY LIABILITY
167 FOR ANY LOST PROFITS, LOSS OF DATA OR COSTS OF PROCUREMENT OF
168 SUBSTITUTE GOODS OR SERVICES, OR FOR ANY SPECIAL, INDIRECT, OR
169 CONSEQUENTIAL DAMAGES ARISING OUT OF THIS AGREEMENT, INCLUDING,
170 WITHOUT LIMITATION, THOSE RESULTING FROM THE USE OF THE SOURCE
171 CODE, OR THE FAILURE OF THE SOURCE CODE TO PERFORM, OR FOR ANY
174 OpenVision retains all copyrights in the donated Source Code. OpenVision
175 also retains copyright to derivative works of the Source Code, whether
176 created by OpenVision or by a third party. The OpenVision copyright
177 notice must be preserved if derivative works are made based on the
180 OpenVision Technologies, Inc. has donated this Kerberos
181 Administration system to MIT for inclusion in the standard
182 Kerberos 5 distribution. This donation underscores our
183 commitment to continuing Kerberos technology development
184 and our gratitude for the valuable work which has been
185 performed by MIT and the Kerberos community.
189 Portions contributed by Matt Crawford <crawdad@fnal.gov> were
190 work performed at Fermi National Accelerator Laboratory, which is
191 operated by Universities Research Association, Inc., under
192 contract DE-AC02-76CHO3000 with the U.S. Department of Energy.
196 The implementation of the Yarrow pseudo-random number generator in
197 src/lib/crypto/yarrow has the following copyright:
199 Copyright 2000 by Zero-Knowledge Systems, Inc.
201 Permission to use, copy, modify, distribute, and sell this software
202 and its documentation for any purpose is hereby granted without fee,
203 provided that the above copyright notice appear in all copies and that
204 both that copyright notice and this permission notice appear in
205 supporting documentation, and that the name of Zero-Knowledge Systems,
206 Inc. not be used in advertising or publicity pertaining to
207 distribution of the software without specific, written prior
208 permission. Zero-Knowledge Systems, Inc. makes no representations
209 about the suitability of this software for any purpose. It is
210 provided "as is" without express or implied warranty.
212 ZERO-KNOWLEDGE SYSTEMS, INC. DISCLAIMS ALL WARRANTIES WITH REGARD TO
213 THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND
214 FITNESS, IN NO EVENT SHALL ZERO-KNOWLEDGE SYSTEMS, INC. BE LIABLE FOR
215 ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
216 WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
217 ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTUOUS ACTION, ARISING OUT
218 OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
222 The implementation of the AES encryption algorithm in
223 src/lib/crypto/aes has the following copyright:
225 Copyright (c) 2001, Dr Brian Gladman <brg@gladman.uk.net>, Worcester, UK.
230 The free distribution and use of this software in both source and binary
231 form is allowed (with or without changes) provided that:
233 1. distributions of this source code include the above copyright
234 notice, this list of conditions and the following disclaimer;
236 2. distributions in binary form include the above copyright
237 notice, this list of conditions and the following disclaimer
238 in the documentation and/or other associated materials;
240 3. the copyright holder's name is not used to endorse products
241 built using this software without specific written permission.
245 This software is provided 'as is' with no explcit or implied warranties
246 in respect of any properties, including, but not limited to, correctness
247 and fitness for purpose.
251 Portions contributed by Red Hat, including the preauthentication
252 plugins, contain the following copyright:
254 Copyright (c) 2006 Red Hat, Inc.
255 Portions copyright (c) 2006 Massachusetts Institute of Technology
258 Redistribution and use in source and binary forms, with or without
259 modification, are permitted provided that the following conditions
262 * Redistributions of source code must retain the above copyright
263 notice, this list of conditions and the following disclaimer.
265 * Redistributions in binary form must reproduce the above
266 copyright notice, this list of conditions and the following
267 disclaimer in the documentation and/or other materials provided
268 with the distribution.
270 * Neither the name of Red Hat, Inc., nor the names of its
271 contributors may be used to endorse or promote products derived
272 from this software without specific prior written permission.
274 THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS
275 IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
276 TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
277 PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER
278 OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
279 EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
280 PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
281 PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
282 LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
283 NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
284 SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
288 The implementations of GSSAPI mechglue in GSSAPI-SPNEGO in
289 src/lib/gssapi, including the following files:
291 lib/gssapi/generic/gssapi_err_generic.et
292 lib/gssapi/mechglue/g_accept_sec_context.c
293 lib/gssapi/mechglue/g_acquire_cred.c
294 lib/gssapi/mechglue/g_canon_name.c
295 lib/gssapi/mechglue/g_compare_name.c
296 lib/gssapi/mechglue/g_context_time.c
297 lib/gssapi/mechglue/g_delete_sec_context.c
298 lib/gssapi/mechglue/g_dsp_name.c
299 lib/gssapi/mechglue/g_dsp_status.c
300 lib/gssapi/mechglue/g_dup_name.c
301 lib/gssapi/mechglue/g_exp_sec_context.c
302 lib/gssapi/mechglue/g_export_name.c
303 lib/gssapi/mechglue/g_glue.c
304 lib/gssapi/mechglue/g_imp_name.c
305 lib/gssapi/mechglue/g_imp_sec_context.c
306 lib/gssapi/mechglue/g_init_sec_context.c
307 lib/gssapi/mechglue/g_initialize.c
308 lib/gssapi/mechglue/g_inquire_context.c
309 lib/gssapi/mechglue/g_inquire_cred.c
310 lib/gssapi/mechglue/g_inquire_names.c
311 lib/gssapi/mechglue/g_process_context.c
312 lib/gssapi/mechglue/g_rel_buffer.c
313 lib/gssapi/mechglue/g_rel_cred.c
314 lib/gssapi/mechglue/g_rel_name.c
315 lib/gssapi/mechglue/g_rel_oid_set.c
316 lib/gssapi/mechglue/g_seal.c
317 lib/gssapi/mechglue/g_sign.c
318 lib/gssapi/mechglue/g_store_cred.c
319 lib/gssapi/mechglue/g_unseal.c
320 lib/gssapi/mechglue/g_userok.c
321 lib/gssapi/mechglue/g_utils.c
322 lib/gssapi/mechglue/g_verify.c
323 lib/gssapi/mechglue/gssd_pname_to_uid.c
324 lib/gssapi/mechglue/mglueP.h
325 lib/gssapi/mechglue/oid_ops.c
326 lib/gssapi/spnego/gssapiP_spnego.h
327 lib/gssapi/spnego/spnego_mech.c
329 are subject to the following license:
331 Copyright (c) 2004 Sun Microsystems, Inc.
333 Permission is hereby granted, free of charge, to any person obtaining a
334 copy of this software and associated documentation files (the
335 "Software"), to deal in the Software without restriction, including
336 without limitation the rights to use, copy, modify, merge, publish,
337 distribute, sublicense, and/or sell copies of the Software, and to
338 permit persons to whom the Software is furnished to do so, subject to
339 the following conditions:
341 The above copyright notice and this permission notice shall be included
342 in all copies or substantial portions of the Software.
344 THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
345 OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
346 MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
347 IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY
348 CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,
349 TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
350 SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
352 includes documentation and software developed at the
353 University of California at Berkeley, which includes this copyright
356 Copyright (C) 1983 Regents of the University of California.
359 Redistribution and use in source and binary forms, with or without
360 modification, are permitted provided that the following conditions
363 1. Redistributions of source code must retain the above copyright
364 notice, this list of conditions and the following disclaimer.
366 2. Redistributions in binary form must reproduce the above
367 copyright notice, this list of conditions and the following
368 disclaimer in the documentation and/or other materials provided
369 with the distribution.
371 3. Neither the name of the University nor the names of its
372 contributors may be used to endorse or promote products derived
373 from this software without specific prior written permission.
375 THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
376 ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
377 IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
378 ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
379 FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
380 DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
381 OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
382 HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
383 LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
384 OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
390 Thanks to Sun Microsystems for donating their implementations of
393 Thanks to the members of the Kerberos V5 development team at MIT, both
394 past and present: Danilo Almeida, Jeffrey Altman, Richard Basch, Jay
395 Berkenbilt, Mitch Berger, Andrew Boardman, Joe Calzaretta, John Carr,
396 Don Davis, Alexandra Ellwood, Nancy Gilman, Matt Hancher, Sam Hartman,
397 Paul Hill, Marc Horowitz, Eva Jacobus, Miroslav Jurisic, Barry Jaspan,
398 Geoffrey King, John Kohl, Peter Litwack, Scott McGuire, Kevin
399 Mitchell, Cliff Neuman, Paul Park, Ezra Peisach, Chris Provenzano, Ken
400 Raeburn, Jon Rochlis, Jeff Schiller, Jen Selby, Brad Thompson, Harry
401 Tsai, Ted Ts'o, Marshall Vale, Tom Yu.