krb5-plugin-preauth-pkinit-1.7-6.4.1<>,5KJ/=„Q^eʦ@݃@fn=Vm꽟Lv6OK*,ٻLrJsUU&TFHgQ&R}qxI#g$ |R-O l$Us7t\?H]h[JF2O R@ yEzE͡=f JiG8J3v3![3IOwiGu GveO>WDNb>5.?.d! ' [ 6W]dt |     (8:9:: -:F,G-H-I- X-$Y-<\-T]-d^-b-c.Zd.e.f.l.z.Ckrb5-plugin-preauth-pkinit1.76.4.1MIT Kerberos5 Implementation--PKINIT preauth PluginKerberos V5 is a trusted-third-party network authentication system, which can improve your network's security by eliminating the insecure practice of cleartext passwords. This package includes a PKINIT plugin. Authors: -------- The MIT Kerberos Team Sam Hartman Ken Raeburn Tom Yu KEHbuild31~XopenSUSE 11.2openSUSEMIT License (or similar)http://bugs.opensuse.orgProductivity/Networking/Securityhttp://web.mit.edu/kerberos/www/linuxi586~XAAAKE-KE-KE1KE13a5edc0a54aec6f336d64f853ccff681rootrootrootrootrootrootrootrootkrb5-1.7-6.4.1.src.rpmpkinit.so.0pkinit.so.0(HIDDEN)pkinit.so.0(pkinit.so.0)pkinit.so.0(pkinit_0_MIT)krb5-plugin-preauth-pkinitkrb5-plugin-preauth-pkinit(x86-32)  @@@@@@@@@@@@@@@@ rpmlib(PayloadFilesHavePrefix)rpmlib(CompressedFileNames)libc.so.6libc.so.6(GLIBC_2.0)libc.so.6(GLIBC_2.1)libc.so.6(GLIBC_2.1.3)libc.so.6(GLIBC_2.3.4)libc.so.6(GLIBC_2.4)libc.so.6(GLIBC_2.8)libcom_err.so.2libcrypto.so.0.9.8libdl.so.2libdl.so.2(GLIBC_2.0)libdl.so.2(GLIBC_2.1)libk5crypto.so.3libk5crypto.so.3(k5crypto_3_MIT)libkrb5.so.3libkrb5.so.3(krb5_3_MIT)rpmlib(PayloadIsLzma)4.0-13.0.4-14.4.6-14.7.1K@KXAK?JY@J&eJ @IU@ImIAI?@I HHH@HXH*@G@GGhGbp@GUA@G0W@G@FwF@FFޚ@F^FF@FFq-Fm9@FAF9F,F&@F#e@FF @E@E݅Eّ@Eb@EEE@E@E@EI@EO#EAEDDq@D+@DĶ@Dmc@suse.demc@suse.demc@suse.decoolo@novell.commc@suse.demc@suse.demc@suse.deolh@suse.demc@suse.deolh@suse.deolh@suse.demc@suse.demc@suse.demc@suse.demc@suse.demc@suse.dero@suse.demc@suse.demc@suse.demc@suse.demc@suse.demc@suse.demc@suse.demc@suse.demc@suse.demc@suse.demc@suse.demc@suse.demc@suse.demc@suse.demc@suse.demc@suse.desschober@suse.demc@suse.demc@suse.demc@suse.demc@suse.demc@suse.demc@suse.demc@suse.demc@suse.demc@suse.demc@suse.demc@suse.demc@suse.demc@suse.demc@suse.demc@suse.demc@suse.demc@suse.demc@suse.demc@suse.demc@suse.demc@suse.demc@suse.demc@suse.demc@suse.demc@suse.de- fix a bug where an unauthenticated remote attacker could cause a GSS-API application including the Kerberos administration daemon (kadmind) to crash. CVE-2010-0628, MITKRB5-SA-2010-002 (bnc#582557)- fix KDC denial of service CVE-2010-0283, MITKRB5-SA-2010-001 (bnc#571781)- fix KDC denial of service in cross-realm referral processing CVE-2009-3295, MITKRB5-SA-2009-003 (bnc#561347) - fix integer underflow in AES and RC4 decryption CVE-2009-4212, MITKRB5-SA-2009-004 (bnc#561351)- readd lost baselibs.conf- update to final 1.7 release- update to version 1.7 Beta2 * Incremental propagation support for the KDC database. * Flexible Authentication Secure Tunneling (FAST), a preauthentiation framework that can protect the AS exchange from dictionary attack. * Implement client and KDC support for GSS_C_DELEG_POLICY_FLAG, which allows a GSS application to request credential delegation only if permitted by KDC policy. * Fix CVE-2009-0844, CVE-2009-0845, CVE-2009-0846, CVE-2009-0847 -- various vulnerabilities in SPNEGO and ASN.1 code.- update to pre 1.7 version * Remove support for version 4 of the Kerberos protocol (krb4). * New libdefaults configuration variable "allow_weak_crypto". * Client library now follows client principal referrals, for compatibility with Windows. * KDC can issue realm referrals for service principals based on domain names. * Encryption algorithm negotiation (RFC 4537). * In the replay cache, use a hash over the complete ciphertext to avoid false-positive replay indications. * Microsoft GSS_WrapEX, implemented using the gss_iov API, which is similar to the equivalent SSPI functionality. * DCE RPC, including three-leg GSS context setup and unencapsulated GSS tokens. * NTLM recognition support in GSS-API, to facilitate dropping in an NTLM implementation. * KDC support for principal aliases, if the back end supports them. * Microsoft set/change password (RFC 3244) protocol in kadmind. * Master key rollover support.- obsolete also old heimdal-lib-XXbit and heimdal-devel-XXbit- do not query IPv6 addresses if no IPv6 address exists on this host [bnc#449143]- use Obsoletes: -XXbit only for ppc64 to help solver during distupgrade (bnc#437293)- obsolete old -XXbit packages (bnc#437293)- in case we use ldap as database backend, ldap should be started before krb5kdc- add new fixes to post 1.6.3 patch * fix mem leak in krb5_gss_accept_sec_context() * keep minor_status * kadm5_decrypt_key: A ktype of -1 is documented as meaning "to be ignored" * Reject socket fds > FD_SETSIZE- add patches from SVN post 1.6.3 * krb5_string_to_keysalts: Fix an infinite loop * fix some mutex issues * better recovery from corrupt rcache files * some more small fixes- add case-insensitive.dif (FATE#300771) - minor fixes for ktutil man page - reduce rpmlint warnings- Fall back to TCP on kdc-unresolvable/unreachable errors. - restore valid sequence number before generating requests (fix changing passwords in mixed ipv4/ipv6 enviroments)- added baselibs.conf file to build xxbit packages for multilib support- modify krb5-config to not output rpath and cflags in --libs (bnc#378270)- fix two security bugs: * MITKRB5-SA-2008-001(CVE-2008-0062, CVE-2008-0063) fix double free [bnc#361373] * MITKRB5-SA-2008-002(CVE-2008-0947, CVE-2008-0948) Memory corruption while too many open file descriptors [bnc#363151] - change default config file. Comment out the examples.- fix several security bugs: * CVE-2007-5894 apparent uninit length * CVE-2007-5902 integer overflow * CVE-2007-5971 free of non-heap pointer and double-free * CVE-2007-5972 double fclose() [#346745, #346748, #346746, #346749, #346747]- improve GSSAPI error messages- add coreutils to PreReq- update to krb5 version 1.6.3 * fix CVE-2007-3999, CVE-2007-4743 svc_auth_gss.c buffer overflow * fix CVE-2007-4000 modify_policy vulnerability * Add PKINIT support - remove patches which are upstream now - enhance init scripts and xinetd profiles- update krb5-1.6.2-post.dif * If a KDC returns KDC_ERR_SVC_UNAVAILABLE, it appears that that the client library will not failover to the next KDC. [#310540]- update krb5-1.6.2-post.dif * new -S sname option for kvno * read_entropy_from_device on partial read will not fill buffer * Bail out if encoded "ticket" doesn't decode correctly. * patch for referrals loop- fix a problem with the originally published patch for MITKRB5-SA-2007-006 - CVE-2007-3999 [#302377]- fix execute arbitrary code (MITKRB5-SA-2007-006 - CVE-2007-3999,2007-4000) [#302377]- add krb5-1.6.2-post.dif * during the referrals loop, check to see if the session key enctype of a returned credential for the final service is among the enctypes explicitly selected by the application, and retry with old_use_conf_ktypes if it is not. * If mkstemp() is available, the new ccache file gets created but the subsequent open(O_CREAT|O_EXCL) call fails because the file was already created by mkstemp(). Apply patch from Apple to keep the file descriptor open.- update to version 1.6.2 - remove krb5-1.6.1-post.dif all fixes are included in this release- change requires to libcom_err-devel- update krb5-1.6.1-post.dif * fix leak in krb5_walk_realm_tree * rd_req_decoded needs to deal with referral realms * fix buffer overflow in kadmind (MITKRB5-SA-2007-005 - CVE-2007-2798) [#278689] * fix kadmind code execution bug (MITKRB5-SA-2007-004 - CVE-2007-2442 - CVE-2007-2443) [#271191]- fix unstripped-binary-or-object rpmlint warning- fixing rpmlint warnings and errors: * merged logrotate scripts kadmin and krb5kdc into a single file krb5-server. * moved heimdal2mit-DumpConvert.pl and simple_convert_krb5conf.pl from /usr/share/doc/packages/krb5 to /usr/lib/mit/helper. adapted krb5.spec and README.ConvertHeimdalMIT accordingly. * added surpression filter for "devel-file-in-non-devel-package /usr/lib/libgssapi_krb5.so" (see [#147912]). * set default runlevel of init scripts in chkconfig line to 3 and 5- fix uninitialized salt length - add extra check for keytab file- adding krb5-1.6.1-post.dif * fix segfault in krb5_get_init_creds_password * remove debug output in ftp client * profile stores empty string values without double quotes- update to final 1.6.1 version- add plugin directories to main package- update to version 1.6.1 Beta1 - remove obsolete patches (krb5-1.6-post.dif, krb5-1.6-patchlevel.dif) - rework compile_pie patch- update krb5-1.6-post.dif * fix kadmind stack overflow in krb5_klog_syslog (MITKRB5-SA-2007-002 - CVE-2007-0957) [#253548] * fix double free attack in the RPC library (MITKRB5-SA-2007-003 - CVE-2007-1216) [#252487] * fix krb5 telnetd login injection (MIT-SA-2007-001 - CVE-2007-0956) [#247765]- add ncurses-devel and bison to BuildRequires - rework some patches- move SuSEFirewall service definitions to /etc/sysconfig/SuSEfirewall2.d/services- add firewall definition to krb5-server, FATE #300687- update krb5-1.6-post.dif - move some applications into the right package- update krb5-1.6-post.dif- krb5-1.6-fix-passwd-tcp.dif and krb5-1.6-fix-sendto_kdc-memset.dif are now upstream. Remove patches. - fix leak in krb5_kt_resolve and krb5_kt_wresolve- fix "local variable used before set" in ftp.c [#237684]- krb5-devel should require keyutils-devel- update to version 1.6 * Major changes in 1.6 include * Partial client implementation to handle server name referrals. * Pre-authentication plug-in framework, donated by Red Hat. * LDAP KDB plug-in, donated by Novell. - remove obsolete patches- fix for kadmind (via RPC library) calls uninitialized function pointer (CVE-2006-6143)(Bug #225990) krb5-1.5-MITKRB5-SA-2006-002-fix-code-exec.dif - fix for kadmind (via GSS-API mechglue) frees uninitialized pointers (CVE-2006-6144)(Bug #225992) krb5-1.5-MITKRB5-SA-2006-003-fix-free-of-uninitialized-pointer.dif- Fix Requires in krb5-devel [Bug #231008]- fix "local variable used before set" [#217692] - fix strncat warning- add a default kadm5.dict file - require $network on daemon start- fix function call with too few arguments [#203837]- update to version 1.5.1 - remove obsolete patches which are now included upstream * krb5-1.4.3-MITKRB5-SA-2006-001-setuid-return-checks.dif * trunk-fix-uninitialized-vars.dif- krb5 setuid return check fixes krb5-1.4.3-MITKRB5-SA-2006-001-setuid-return-checks.dif [#182351]- remove update-messages- add check for krb5_prop in services to kpropd init script. [#192446]- update to version 1.5 * KDB abstraction layer, donated by Novell. * plug-in architecture, allowing for extension modules to be loaded at run-time. * multi-mechanism GSS-API implementation ("mechglue"), donated by Sun Microsystems * Simple and Protected GSS-API negotiation mechanism ("SPNEGO") implementation, donated by Sun Microsystems - remove obsolete patches and add some newbuild31 1269450056 \ ] _ l1.7-6.4.11.7-6.4.1krb5pluginspreauthpkinit.so/usr/lib//usr/lib/krb5//usr/lib/krb5/plugins//usr/lib/krb5/plugins/preauth/-fomit-frame-pointer -fmessage-length=0 -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -gobs://build.opensuse.org/openSUSE:11.2:Update:Test/standard/b949b61555425e936d617cccea1d9546-krb5cpiolzma2i586-suse-linuxHUBqLC?]"k%O^͵ ҶVDu&E8@ObqGRtY%/у%z$V <8/);KI!/I2tA7W${|b*6nw'>X~Z~ N}8[fWF"FQ>V(A_h'Yoy_Lmq? w?eOkЙto SC_kHك̌f̌ שCLB9VA@ `u"B? 6kJ4sHVu=2 KFΛk-ZuPe_/fZ戕 | e+ Z[V5:C<:1<2|g1|rP2gH>QA 14-ON-s.(zҧkbIZ2K{т-vC u&7l:%JR^zE#{7^osE&k3NaPy8tܵdn51O/ b^"edQGXrKv}N{H(y_xD+fb<] lZUI'2? C?T!2+wWOwGPuOt0GId-Ozyd2Ht< > BN]z q{?)Xo蠣baeA*#V3x2P$TZsH xNcmm _zbfJ R;G(;s`r. \Q%# iXF[wדZYf'K$'1wp r.pW'/z)3\ĄGûb\ =$