1 Kerberos Version 5, Release 1.3
6 Unpacking the Source Distribution
7 ---------------------------------
9 The source distribution of Kerberos 5 comes in a gzipped tarfile,
10 krb5-1.3.tar.gz. Instructions on how to extract the entire
13 If you have the GNU tar program and gzip installed, you can simply do:
15 gtar zxpf krb5-1.3.tar.gz
17 If you don't have GNU tar, you will need to get the FSF gzip
18 distribution and use gzcat:
20 gzcat krb5-1.3.tar.gz | tar xpf -
22 Both of these methods will extract the sources into krb5-1.3/src and
23 the documentation into krb5-1.3/doc.
25 Building and Installing Kerberos 5
26 ----------------------------------
28 The first file you should look at is doc/install-guide.ps; it contains
29 the notes for building and installing Kerberos 5. The info file
30 krb5-install.info has the same information in info file format. You
31 can view this using the GNU emacs info-mode, or by using the
32 standalone info file viewer from the Free Software Foundation. This
33 is also available as an HTML file, install.html.
35 Other good files to look at are admin-guide.ps and user-guide.ps,
36 which contain the system administrator's guide, and the user's guide,
37 respectively. They are also available as info files
38 kerberos-admin.info and krb5-user.info, respectively. These files are
39 also available as HTML files.
41 If you are attempting to build under Windows, please see the
42 src/windows/README file.
47 Please report any problems/bugs/comments using the krb5-send-pr
48 program. The krb5-send-pr program will be installed in the sbin
49 directory once you have successfully compiled and installed Kerberos
50 V5 (or if you have installed one of our binary distributions).
52 If you are not able to use krb5-send-pr because you haven't been able
53 compile and install Kerberos V5 on any platform, you may send mail to
56 You may view bug reports by visiting
58 http://krbdev.mit.edu/rt/
60 and logging in as "guest" with password "guest".
62 Notes, Major Changes, and Known Bugs for 1.3
63 --------------------------------------------
65 * We now install the compile_et program, so other packages can use the
66 installed com_err library with their own error tables. (If you use
67 our com_err code, that is; see below.)
69 * The header files we install now assume ANSI/ISO C ('89, not '99).
70 We have stopped testing on SunOS 4, even with gcc. Some of our code
71 now has C89-based assumptions, like free(NULL) being well defined,
72 that will probably frustrate any attempts to run this code under SunOS
73 4 or other pre-C89 systems.
75 * Some new code, bug fixes, and cleanup for IPv6 support. [[TODO:
76 Insert list of (non-)supporting programs and libraries here.]]
78 * We have upgraded to autoconf 2.52 (or later), and the syntax for
79 specifying certain configuration options have changed. For example,
80 autoconf 2.52 configure scripts let you specify command-line options
81 like "configure CC=/some/path/foo-cc", so we have removed some of
82 our old options like --with-cc in favor of this approach.
84 * The client libraries can now use TCP to connect to the KDC. This
85 may be necessary when talking to Microsoft KDCs (domain controllers),
86 if they issue you tickets with lots of PAC data.
88 * If you have versions of the com_err, ss, or Berkeley DB packages
89 installed locally, you can use the --with-system-et,
90 --with-system-ss, and --with-system-db configure options to use them
91 rather than using the versions supplied here. Note that the
92 interfaces are assumed to be similar to those we supply; in
93 particular, some older, divergent versions of the com_err library
94 may not work with the krb5 sources. Many configure-time variables
95 can be used to help the compiler and linker find the installed
96 packages; see the build documentation for details.
98 * The AES cryptosystem has been implemented. However, support in the
99 Kerberos GSSAPI mechanism has not been written (or even fully
100 specified), so it's not fully enabled. See the documentation for
103 Major changes listed by ticket ID
104 ---------------------------------
106 * [492] PRNG breakage on 64-bit platforms no longer an issue due to
107 new PRNG implementation.
109 * [523] Client library is now compatible with the RC4-based
110 cryptosystem used by Windows 2000.
112 * [709] krb4 long lifetime support has been implemented.
114 * [880] krb5_gss_register_acceptor_identity() implemented (is called
115 gsskrb5_register_acceptor_identity() by Heimdal).
117 * [1156, 1209] It is now possible to use the system com_err to build
120 * [1174] TCP support added to client library.
122 * [1175] TCP support added to the KDC, but is disabled by default.
124 * [1176] autoconf-2.5x is now required by the build system.
126 * [1184] It is now possible to use the system Berkeley/Sleepycat DB
127 library to build this release.
129 * [1189, 1251] The KfM krb4 library source base has been merged.
131 * [1190] The default KDC master key type is now triple-DES. KDCs
132 being updated may need their config files updated if they are not
133 already specifying the master key type.
135 * [1190] The default ticket lifetime and default maximum renewable
136 ticket lifetime have been extended to one day and one week,
139 * [1191] A new script, k5srvutil, may be used to manipulate keytabs in
140 ways similar to the krb4 ksrvutil utility.
142 * [1281] The "fakeka" program, which emulates the AFS kaserver, has
143 been integrated. Thanks to Ken Hornstein.
145 * [1377, 1442, 1443] The Microsoft set-password protocol has been
146 implemented. Thanks to Paul Nelson.
148 * [1372] There is no longer a need to create a special keytab for
149 kadmind. The legacy administration daemons "kadmind4" and
150 "v5passwdd" will still require a keytab, though.
152 * [1385, 1395, 1410] The krb4 protocol vulnerabilities
153 [MITKRB5-SA-2003-004] have been worked around. Note that this will
154 disable krb4 cross-realm functionality, as well as krb4 triple-DES
155 functionality. Please see doc/krb4-xrealm.txt for details of the
158 * [1393] The xdrmem integer overflows [MITKRB5-SA-2003-003] have
161 * [1397] The krb5_principal buffer bounds problems
162 [MITKRB5-SA-2003-005] have been fixed. Thanks to Nalin Dahyabhai.
164 * [1415] Subsession key negotiation has been fixed to allow for
165 server-selected subsession keys in the future.
167 * [1418, 1429, 1446, 1484, 1486, 1487, 1535] The AES cryptosystem has
168 been implemented. It is not usable for GSSAPI, though.
170 * [1491] The client-side functionality of the krb524 library has been
171 moved into the krb5 library.
173 * [1550] SRV record support exists for Kerberos v4.
175 * [1551] The heuristic for locating the Kerberos v4 KDC by prepending
176 "kerberos." to the realm name if no config file or DNS information
177 is available has been removed.
179 * [1568, 1067] A krb524 stub library is built on Windows.
181 Minor changes listed by ticket ID
182 ---------------------------------
184 * [90] default_principal_flags documented.
186 * [175] Docs refer to appropriate example domains/IPs now.
188 * [299] kadmin no longer complains about missing kdc.conf parameters
189 when it really means krb5.conf parameters.
191 * [443] --includedir honored now.
193 * [479] unused argument in try_krb4() in login.c deleted.
195 * [590] The des_read_pw_string() function in libdes425 has been
196 aligned with the original krb4 and CNS APIs.
198 * [608] login.krb5 handles SIGHUP more sanely now and thus avoids
199 getting the session into a weird state w.r.t. job control.
201 * [620] krb4 encrypted rcp should work a little better now. Thanks to
204 * [673] Weird echoing of admin password in kadmin client worked around
205 by not using buffered stdio calls to read passwords.
207 * [677] The build system has been reworked to allow the user to set
208 CFLAGS, LDFLAGS, CPPFLAGS, etc. reasonably.
210 * [680] Related to [673], rewrite krb5_prompter_posix() to no longer
211 use longjmp(), thus avoiding some bugs relating to non-restoration
212 of terminal settings.
214 * [697] login.krb5 no longer zeroes out the terminal window size.
216 * [710] decomp_ticket() in libkrb4 now looks up the local realm name
217 more correctly. Thanks to Booker Bense.
219 * [771] .rconf files are excluded from the release now.
221 * [772] LOG_AUTHPRIV syslog facility is now usable for logging on
222 systems that support it.
224 * [844] krshd now syslogs using the LOG_AUTH facility.
226 * [850] Berekely DB build is better integrated into the krb5 library
229 * [866] lib/krb5/os/localaddr.c and kdc/network.c use a common source
230 for local address enumeration now.
232 * [919] kdc/network.c problems relating to SIOCGIFCONF have been
235 * [922] An overflow in the string-to-time conversion routines has been
238 * [935] des-cbc-md4 now included in default enctypes.
240 * [939] A minor grammatical error has been fixed in a telnet client
243 * [953] des3 no longer failing on Windows due to SHA1 implementation
246 * [970] A minor inconsistency in ccache.tex has been fixed.
248 * [971] option parsing bugs rendered irrelevant by removal of unused
251 * [986] Related to [677], problems with the ordering of LDFLAGS
252 initialization rendered irrelevant by use of native autoconf
255 * [992] Related to [677], quirks with --with-cc no longer relevant as
256 AC_PROG_CC is used instead now.
258 * [999] kdc_default_options now honored in gss context initialization.
260 * [1006] Client library, as well as KDC, now perform reasonable
261 sorting of ETYPE-INFO preauthentication data.
263 * [1055] NULL pointer dereferences in code calling
264 krb5_change_password() have been fixed.
266 * [1063] Initial credentials acquisition failures related to client
267 host having a large number of local network interfaces should be
270 * [1064] Incorrect option parsing in the gssapi library is no longer
271 relevant due to removal of the "v2" mechanism.
273 * [1065, 1225] krb5_get_init_creds_password() should properly warn about
276 * [1066] printf() argument mismatches in rpc unit tests fixed.
278 * [1087] ftpd no longer requires channel bindings, allowing easier use
279 of ftp from behind a NAT.
281 * [1102] gssapi_generic.h should now work with C++.
283 * [1136] Some documentation for the setup of cross-realm
284 authentication has been added.
286 * [1164] krb5_auth_con_gen_addrs() now properly returns errno instead
287 of -1 if getpeername() fails.
289 * [1173] Address-less forwardable tickets will remain address-less
292 * [1178, 1228, 1244, 1246, 1249] Test suite has been stabilized
295 * [1188] As part of the modernization of our usage of autoconf,
296 AC_CONFIG_FILES is now used instead of passing a list of files to
299 * [1194] configure will no longer recurse out of the top of the source
300 tree when attempting to locate the top of the source tree.
302 * [1192] Documentation for the krb5 afs functionality of krb524d has
305 * [1195] Example krb5.conf file modified to include all enctypes
306 supported by the release.
308 * [1202] The KDC no longer rejects unrecognized flags.
310 * [1211] The ASN.1 code no longer passes (harmless) uninitialized
313 * [1212] libkadm5 now allows for persistent exclusive database locks.
315 * [1217] krb5_read_password() and des_read_password() are now
316 implemented via krb5_prompter_posix().
318 * [1224] For SAM challenges, omitted optional strings are no longer
319 encoded as zero-length strings.
321 * [1226] Client-side support for SAM hardware-based preauth
324 * [1229] The keytab search logic no longer fails prematurely if an
325 incorrect encryption type is found. Thanks to Wyllys Ingersoll.
327 * [1232] If the master KDC cannot be resolved, but a slave is
328 reachable, the client library now returns the real error from the
329 slave rather than the resolution failure from the master. Thanks to
332 * [1234] Assigned numbers for SAM preauth have been corrected.
333 sam-pk-for-sad implementation has been aligned.
335 * [1237] Profile-sharing optimizations from KfM have been merged.
337 * [1240] Windows calling conventions for krb5int_c_combine_keys() have
340 * [1242] Build system incompatibilities with Debian's chimeric
341 autoconf installation have been worked around.
343 * [1256] Incorrect sizes passed to memset() in combine_keys()
344 operations have been corrected.
346 * [1260] Client credential lookup now gets new service tickets in
347 preference to attempting to use expired ticketes. Thanks to Ben
350 * [1262, 1572] Sequence numbers are now unsigned; negative sequence
351 numbers will be accepted for the purposes of backwards
354 * [1263] A heuristic for matching the incorrectly encoded sequence
355 numbers emitted by Heimdal implementations has been written.
357 * [1284] kshd accepts connections by IPv6 now.
359 * [1292] kvno manpage title fixed.
361 * [1293] Source files no longer explicitly attempt to declare errno.
363 * [1304] kadmind4 no longer leaves sa_flags uninitialized.
365 * [1305] Expired tickets now cause KfM to pop up a password dialog.
367 * [1309] krb5_send_tgs() no longer leaks the storage associated with
370 * [1310] kadm5_get_either() no longer leaks regexp library memory.
372 * [1311] Output from krb5-config no longer contains spurious uses of
375 * [1324] The KDC no longer logs an inappropriate "no matching key"
376 error when an encrypted timestamp preauth password is incorrect.
378 * [1342] gawk is no longer required for building kerbsrc.zip for the
381 * [1346] gss_krb5_ccache_name() no longer attempts to return a pointer
384 * [1352] GSS_C_PROT_READY_FLAG is no longer asserted inappropriately
385 during GSSAPI context establishment.
387 * [1356] krb5_gss_accept_sec_context() no longer attempts to validate
388 a null credential if one is passed in.
390 * [1362] The "-a user" option to telnetd now does the right thing.
391 Thanks to Nathan Neulinger.
393 * [1363] ksu no longer inappropriately syslogs to stderr.
395 * [1357] krb__get_srvtab_name() no longer leaks memory.
397 * [1373] Handling of SAM preauth no longer attempts to stuff a size_t
398 into an unsigned int.
400 * [1387] BIND versions later than 8 now supported.
402 * [1392] The getaddrinfo() wrapper should work better on AIX.
404 * [1400] If DO_TIME is not set in the auth_context, and no replay
405 cache is available, no replay cache will be used.
407 * [1406, 1108] libdb is no longer installed. If you installed
408 krb5-1.3-alpha1, you should ensure that no spurious libdb is left in
411 * [1412] ETYPE_INFO handling no longer goes into an infinite loop.
413 * [1414] libtelnet is now built using the same library build framework
414 as the rest of the tree.
416 * [1417] A minor memory leak in krb5_read_password() has been fixed.
418 * [1419] A memory leak in asn1_decode_kdc_req_body() has been fixed.
420 * [1435] inet_ntop() is now emulated when needed.
422 * [1439] krb5_free_pwd_sequences() now correctly frees the entire
423 sequence of elements.
425 * [1440] errno is no longer explicitly declared.
427 * [1441] kadmind should now return useful errors if an unrecognized
428 version is received in a changepw request.
430 * [1454, 1480, 1517, 1525] The etype-info2 preauth type is now
433 * [1459] (KfM/KLL internal) config file resolution can now be
434 prevented from accessing the user's homedir.
436 * [1463] Preauth handling in the KDC has been reorganized.
438 * [1470] Double-free in client-side preauth code fixed.
440 * [1473] Ticket forwarding when the TGS and the end service have
441 different enctypes should work somewhat better now.
443 * [1474] ASN.1 testsuite memory management has been cleaned up a
444 little to allow for memory leak checking.
446 * [1476] Documentation updated to reflect default krb4 mode.
448 * [1482] RFC-1964 OIDs now provided using the suggested symbolic
451 * [1483, 1528] KRB5_DEPRECATED is now false by default on all
454 * [1488] The KDC will now return integrity errors if a decryption
455 error is responsible for preauthentication failure.
457 * [1492] The autom4te.cache directories are now deleted from the
460 * [1501] Writable keytabs are registered by default.
462 * [1515] The check for cross-realm TGTs no longer reads past the end
465 * [1518] The kdc_default_options option is now actually honored.
467 * [1519] The changepw protocol implementation in kadmind now logs
470 * [1520] Documentation of OS-specific build options has been updated.
472 * [1536] A missing prototype for krb5_db_iterate_ext() has been
475 * [1537] An incorrect path to kdc.conf show in the kdc.conf manpage
478 * [1540] verify_as_reply() will only check the "renew-till" time
479 against the "till" time if the RENEWABLE is not set in the request.
481 * [1547] gssftpd no longer uses vfork(), as this was causing problems
484 * [1549] SRV records with a value of "." are now interpreted as a lack
485 of support for the protocol.
487 * [1553] The undocumented (and confusing!) kdc_supported_enctypes
488 kdc.conf variable is no longer used.
490 * [1560] Some spurious double-colons in password prompts have been
493 * [1571] The test suite tries a little harder to get a root shell.
495 * [1573] The KfM build process now sets localstatedir=/var/db.
497 * [1576, 1575] The client library no longer requests RENEWABLE_OK if
498 the renew lifetime is greater than the ticket lifetime.
500 --[ DELETE BEFORE RELEASE ---changes to unreleased code, etc.--- ]--
502 * [1054] KRB-CRED messages for RC4 are encrypted now.
504 * [1177] krb5-1-2-2-branch merged onto trunk.
506 * [1193] Punted comment about reworking key storage architecture.
508 * [1208] install-headers target implemented.
510 * [1223] asn1_decode_oid, asn1_encode_oid implemented
512 * [1248] RC4 is explicitly excluded from combine_keys.
514 * [1276] Generated dependencies handle --without-krb4 properly now.
516 * [1384, 1413] Use of autoconf-2.52 in util/reconf will now cause a
519 * [1388] DNS support is turned on in KfM.
521 * [1391] Fix kadmind startup failure with krb4 vuln patch.
523 * [1409] get_ad_tkt() now prompts for password if there are no tickets
526 * [1447] vts_long() and vts_short() work now.
528 * [1462] KfM adds exports of set_pw calls.
530 * [1477] compile_et output not used in err_txt.c.
532 * [1495] KfM now exports string_to_key_with_params.
534 * [1512, 1522] afs_string_to_key now works with etype_info2.
536 * [1514] krb5int_populate_gic_opt returns void now.
538 * [1521] Using an afs3 salt for an AES key no longer causes
541 * [1533] krb524.h no longer contains invalid Mac pragmas.
543 * [1546] krb_mk_req_creds() no longer zeros the session key.
545 * [1554] The krb4 string-to-key iteration now accounts correctly for
546 the decrypt-in-place semantics of libdes425.
548 * [1557] KerberosLoginPrivate.h is now correctly included for the use
549 of __KLAllowHomeDirectoryAccess() in init_os_ctx.c (for KfM).
551 * [1558] KfM exports the new krb524 interface.
553 * [1563] krb__get_srvtaname() no longer returns a pointer that is
554 free()d upon a subsequent call.
556 * [1569] A debug statement has been removed from krb524init.
558 Copyright Notice and Legal Administrivia
559 ----------------------------------------
561 Copyright (C) 1985-2003 by the Massachusetts Institute of Technology.
565 Export of this software from the United States of America may require
566 a specific license from the United States Government. It is the
567 responsibility of any person or organization contemplating export to
568 obtain such a license before exporting.
570 WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
571 distribute this software and its documentation for any purpose and
572 without fee is hereby granted, provided that the above copyright
573 notice appear in all copies and that both that copyright notice and
574 this permission notice appear in supporting documentation, and that
575 the name of M.I.T. not be used in advertising or publicity pertaining
576 to distribution of the software without specific, written prior
577 permission. Furthermore if you modify this software you must label
578 your software as modified software and not distribute it in such a
579 fashion that it might be confused with the original MIT software.
580 M.I.T. makes no representations about the suitability of this software
581 for any purpose. It is provided "as is" without express or implied
584 THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
585 IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
586 WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
588 Individual source code files are copyright MIT, Cygnus Support,
589 OpenVision, Oracle, Sun Soft, FundsXpress, and others.
591 Project Athena, Athena, Athena MUSE, Discuss, Hesiod, Kerberos, Moira,
592 and Zephyr are trademarks of the Massachusetts Institute of Technology
593 (MIT). No commercial use of these trademarks may be made without
594 prior written permission of MIT.
596 "Commercial use" means use of a name in a product or other for-profit
597 manner. It does NOT prevent a commercial firm from referring to the
598 MIT trademarks in order to convey information (although in doing so,
599 recognition of their trademark status should be given).
603 The following copyright and permission notice applies to the
604 OpenVision Kerberos Administration system located in kadmin/create,
605 kadmin/dbutil, kadmin/passwd, kadmin/server, lib/kadm5, and portions
608 Copyright, OpenVision Technologies, Inc., 1996, All Rights Reserved
610 WARNING: Retrieving the OpenVision Kerberos Administration system
611 source code, as described below, indicates your acceptance of the
612 following terms. If you do not agree to the following terms, do not
613 retrieve the OpenVision Kerberos administration system.
615 You may freely use and distribute the Source Code and Object Code
616 compiled from it, with or without modification, but this Source
617 Code is provided to you "AS IS" EXCLUSIVE OF ANY WARRANTY,
618 INCLUDING, WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY OR
619 FITNESS FOR A PARTICULAR PURPOSE, OR ANY OTHER WARRANTY, WHETHER
620 EXPRESS OR IMPLIED. IN NO EVENT WILL OPENVISION HAVE ANY LIABILITY
621 FOR ANY LOST PROFITS, LOSS OF DATA OR COSTS OF PROCUREMENT OF
622 SUBSTITUTE GOODS OR SERVICES, OR FOR ANY SPECIAL, INDIRECT, OR
623 CONSEQUENTIAL DAMAGES ARISING OUT OF THIS AGREEMENT, INCLUDING,
624 WITHOUT LIMITATION, THOSE RESULTING FROM THE USE OF THE SOURCE
625 CODE, OR THE FAILURE OF THE SOURCE CODE TO PERFORM, OR FOR ANY
628 OpenVision retains all copyrights in the donated Source Code. OpenVision
629 also retains copyright to derivative works of the Source Code, whether
630 created by OpenVision or by a third party. The OpenVision copyright
631 notice must be preserved if derivative works are made based on the
634 OpenVision Technologies, Inc. has donated this Kerberos
635 Administration system to MIT for inclusion in the standard
636 Kerberos 5 distribution. This donation underscores our
637 commitment to continuing Kerberos technology development
638 and our gratitude for the valuable work which has been
639 performed by MIT and the Kerberos community.
643 Portions contributed by Matt Crawford <crawdad@fnal.gov> were
644 work performed at Fermi National Accelerator Laboratory, which is
645 operated by Universities Research Association, Inc., under
646 contract DE-AC02-76CHO3000 with the U.S. Department of Energy.
648 ---- The implementation of the Yarrow pseudo-random number generator
649 in src/lib/crypto/yarrow has the following copyright:
651 Copyright 2000 by Zero-Knowledge Systems, Inc.
653 Permission to use, copy, modify, distribute, and sell this software
654 and its documentation for any purpose is hereby granted without fee,
655 provided that the above copyright notice appear in all copies and that
656 both that copyright notice and this permission notice appear in
657 supporting documentation, and that the name of Zero-Knowledge Systems,
658 Inc. not be used in advertising or publicity pertaining to
659 distribution of the software without specific, written prior
660 permission. Zero-Knowledge Systems, Inc. makes no representations
661 about the suitability of this software for any purpose. It is
662 provided "as is" without express or implied warranty.
664 ZERO-KNOWLEDGE SYSTEMS, INC. DISCLAIMS ALL WARRANTIES WITH REGARD TO
665 THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND
666 FITNESS, IN NO EVENT SHALL ZERO-KNOWLEDGE SYSTEMS, INC. BE LIABLE FOR
667 ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
668 WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
669 ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTUOUS ACTION, ARISING OUT
670 OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
672 ---- The implementation of the AES encryption algorithm in
673 src/lib/crypto/aes has the following copyright:
675 Copyright (c) 2001, Dr Brian Gladman <brg@gladman.uk.net>, Worcester, UK.
680 The free distribution and use of this software in both source and binary
681 form is allowed (with or without changes) provided that:
683 1. distributions of this source code include the above copyright
684 notice, this list of conditions and the following disclaimer;
686 2. distributions in binary form include the above copyright
687 notice, this list of conditions and the following disclaimer
688 in the documentation and/or other associated materials;
690 3. the copyright holder's name is not used to endorse products
691 built using this software without specific written permission.
695 This software is provided 'as is' with no explcit or implied warranties
696 in respect of any properties, including, but not limited to, correctness
697 and fitness for purpose.
704 Appreciation Time!!!! There are far too many people to try to thank
705 them all; many people have contributed to the development of Kerberos
706 V5. This is only a partial listing....
708 Thanks to Paul Vixie and the Internet Software Consortium for funding
709 the work of Barry Jaspan. This funding was invaluable for the OV
710 administration server integration, as well as the 1.0 release
713 Thanks to John Linn, Scott Foote, and all of the folks at OpenVision
714 Technologies, Inc., who donated their administration server for use in
715 the MIT release of Kerberos.
717 Thanks to Jeff Bigler, Mark Eichin, Marc Horowitz, Nancy Gilman, Ken
718 Raeburn, and all of the folks at Cygnus Support, who provided
719 innumerable bug fixes and portability enhancements to the Kerberos V5
720 tree. Thanks especially to Jeff Bigler, for the new user and system
721 administrator's documentation.
723 Thanks to Doug Engert from ANL for providing many bug fixes, as well
724 as testing to ensure DCE interoperability.
726 Thanks to Ken Hornstein at NRL for providing many bug fixes and
727 suggestions, and for working on SAM preauthentication.
729 Thanks to Matt Crawford at FNAL for bugfixes and enhancements.
731 Thanks to Sean Mullan and Bill Sommerfeld from Hewlett Packard for
732 their many suggestions and bug fixes.
734 Thanks to Nalin Dahyabhai of RedHat and Chris Evans for locating and
735 providing patches for numerous buffer overruns.
737 Thanks to Christopher Thompson and Marcus Watts for discovering the
740 Thanks to Paul Nelson of Thursby Software Systems for implementing the
741 Microsoft set password protocol.
743 Thanks to the members of the Kerberos V5 development team at MIT, both
744 past and present: Danilo Almeida, Jay Berkenbilt, Richard Basch, Mitch
745 Berger, John Carr, Don Davis, Alexandra Ellwood, Nancy Gilman, Matt
746 Hancher, Sam Hartman, Paul Hill, Marc Horowitz, Eva Jacobus, Miroslav
747 Jurisic, Barry Jaspan, Geoffrey King, John Kohl, Peter Litwack, Scott
748 McGuire, Kevin Mitchell, Cliff Neuman, Paul Park, Ezra Peisach, Chris
749 Provenzano, Ken Raeburn, Jon Rochlis, Jeff Schiller, Jen Selby, Brad
750 Thompson, Harry Tsai, Ted Ts'o, Marshall Vale, Tom Yu.