Skip to content

Releases: jcmturner/gokrb5

Address vulnerabilities in dependencies

25 Feb 07:21
Compare
Choose a tag to compare

New version to address minor issues

27 Jul 20:01
Compare
Choose a tag to compare
  • Update dependency versions
  • Return empty string rather than default realm if there is no configuration matching SPN domain to a realm
  • deprecate use of io/ioutils package - this version required 1.16 as a minimum version of Go
  • Consistent approach for sequence numbers with MIT implementation
  • Other minor fixes - see commits for more details

Minor fixes and memory use improvement

18 Nov 13:49
663478b
Compare
Choose a tag to compare
  • memory use improvements relating to Active Directory SID string marshaling
  • fixed issue with principal name comparison causing validation failures when canonicalize configuration set to true
  • SPNEGO client improvement to discard and close response body when unauthorized
  • SPNEGO server fix for failure to parse SPNEGO tokens with request flags

Fix keytab and client network bugs

25 Jul 13:44
260a581
Compare
Choose a tag to compare

Fixes issues:

  • #395 - keytab GetEncryptionKey not returning the correct key when kvno = 0
  • #324 and #398 - client would not try remaining KDCs when first one failed

Marshal methods for KDC reply messages

14 Jun 18:44
9822c92
Compare
Choose a tag to compare

Marshal methods added for
AS_REP
TGS_REP
KRBError

Minor simplification in client method for TCP communications

Create keytabs and minor fixes

04 Apr 09:57
e4c9668
Compare
Choose a tag to compare
  • keytab: New ability to add entries to keytabs - gokrb5 can be used to create keytabs without needing ktuil
  • spnego: handle explicit ports when deriving SPN
  • Fixed some dropped errors
  • Move integration test environment resource to their own git repo: https://github.com/jcmturner/gokrb5-test
  • Update to use new Active Directory test environment

Client diagnostic

29 Feb 21:16
1a5195b
Compare
Choose a tag to compare
  • Diagnostic() method on Client helps find configuration issues

Fix logging, session leak and AD example

15 Feb 15:46
4ba5599
Compare
Choose a tag to compare

This release fixes:

  • Potential leak of the SPNEGO client session due to reuse of the same cookie jar
  • Preserves the source line references in the logging of the client and SPNEGO service
  • Fixes the AD example

Handle raw KRB5 tokens in the negotiation header

08 Feb 10:03
00ec292
Compare
Choose a tag to compare

Some clients send a raw KRB5 token in the negotiation header rather than a full SPNEGO token. This release handles this situation.

Tidy dependencies

04 Feb 22:07
9a6cc2d
Compare
Choose a tag to compare
v8.0.1

Tidy dependencies