krb5-devel-1.15.1-19.el7$>\,*HΠl+!&>8?d   S<@X\cg EE vE E E E EEEZxE P&&c&(8V9(V: VGҬEHEIEX YD \՘E]֬E^ bڐd'e,f/l1tLEu`EvtwExEy}Ckrb5-devel1.15.119.el7Development files needed to compile Kerberos 5 programsKerberos is a network authentication system. The krb5-devel package contains the header files and libraries needed for compiling Kerberos 5 programs. If you want to develop Kerberos-aware programs, you need to install this package.Zx86-01.bsys.centos.org &CentOSMITCentOS BuildSystem Development/Librarieshttp://web.mit.edu/kerberos/www/linuxx86_64]<8<0tK(+Tt P% e*I-K.Q  w"u:CTAp5 @*J/z D\,0<(ށA큤A큤A큤A큤큤ZDZ?ZDZDZ>Z>Z>Z>Z>Z>Z>Z?Z?Z?Z?Z?Z?Z?Z?Z?Z?Z?Z?Z?Z?Z?Z?Z?Z?Z?Z?Z?Z>Z>Z>Z>Z>Z>Z>Z>Z>Z>Z>Z>Z>Z>Z>Z>Z>Z>Z>Z?Z>Z?Z?Z>Z>Z?Z?Z?Z?Z?Z?Z?Z?ZDZDZDZ?96c1a2b86758d8f43a183cc263dab111c922d95a17277dfec53f9838462f39a9d519a3d36a6b454e352a06b5e2fd780f412a5c316d7b0a7d2ae5e0f852436199d9a9815b7202d67ab5aa9cabbf4592a2a18de69bf3c614fce0365352167e6a6bfa4f7d6e1ccfedd981c0c9ae74c0b14b6466800203fdb8811af643eb598bb2426fca7ce46733a4388a45a5816e4b5b2746d68ad3e04f9e2c51463f134cb802fad688eebbc1deba5df752aee033b8a80828ef126eb8abda55012c48cd3ee127e4012a0222f1cc727567deec9891b6974651d51bac4625498202f20f0929819276b264115ba56603ceaad5e6ed5502dba2629959089391a4f18c4266c66befdc542bb3e698a7f63cbdf0d4cd3d555a7e4458f596d773219d3bb7983cfd3a5b7725abb62fd8d3c15ac357900a3f26b92e361e2601c1b921417fafd2b6802df4b1ed344da573cba6fbb95524845dfdb43ca805f2f09a0dacb0345e1a34b395f1f883571caaca9ae5cf6cceec5cf7ff603571e818592c4220d62856ab624eeb25620a4da2548b519f82b39ec503866a0795a8db5bdffc8b7327cc04aa9c0445efe6d51e42fc6b44a644ca1bb5dd028f72af0e9c30848b4b469412347fdc16aecc9023659fad620169f273d26f0a118326f1e814402040d1af5ede9cb7539234ab667c38f30d536012d5785645929e0d513378137d15476695a318b2c51db5ee7e031276a3d4c6f9d03a0d6fdf5dccbeeedfa60d4e59e7281dabfb403fa283670d578e4e60ca35f3f801c5ab8c25e327bcfc4637deac0615036d9ebe9bbca0242e74d2105372661463f05652cb893535de7daa2f7cba2b107e14266c7ee6339077fe0f8f2402c067d376ec5d1b578d8fed1182d550578962bf5f4fdd4137e5b21d5df60bca1517a1155cf35c3c09899b189c9614c5ac6e28d507e55093ba1b132c84493c3ee8d1960c4cf46f1fcb2247cdf4246a22990e901e7560158a74f4b1960ee69bc81450c2105fe79955115c04c153d6523636b067d4c8aa30f7892ea4e2246bf21ba38af8239d3899a1ccb744daac2c06dcc16195a893f08ed0ce9750a12dfa5c3bf80b6b4d16b19ee03dc2e597005420d9208da57b83217d438caada4df75d3992f5f3b0f201da298c793bb7aa5902e7d72951015605756bfa47a6ec9352dbc40b6a213a521b836116968bd80d54c453b843353a9063ba0297fa13fd0260ad7557a78841ebc4ee2615488c77fa8bfaaae297d06c4fb0183680a40284a5b6c2c747fa638ed38395e970908fdce44d8a60c2a7f111d53a5023ea4d6673af6d3d12ae0f67bdecd68d2a9e8a47915de2f64535ef0da504fe4a98ff468fbb338f99c16878d9b57669f68f2d55481bf963c32e7f3c659eda34d75f66b432536f90d61fe239732636b4f9cbfd596542b77c5dd60af2d73a1d4df1eb30ba6ebcd9ec786eb76ad87680dee03796b0fa1d5fb3586a29668aaa8f71be2d7e4ba8a909c4b945f9eef24d6a4005bfee8f66e62cbfcc8f0cf4303813f466cfb087c370b83154fd56e4c841b21d622cef6b0174cbac09282112187b4e54a41bb9c8ce4b317c4cacd7ba4437c95d271e7c9cc19fd2097915b52576939c926a1f67837be0b99889186d4520695bc55c894af072ae74472704d46b1359adf2e6103d52872b8a8019829dd07baf0d80cb1269d8e712612773f26609ef572b8df6297997c7f4f2b1f4d7407afb90433803a711befb8e91e0b684dcb3790510c92e7235b64acc3e6b8f9553662504c79881a61577bca9defb2bda69c6c1e76007374610531667d1bbeacdc4244abf61807bdfed95d1fe608cf925b4c4c3af4867ad6daced031c1cd8f3333768c87d8a9f9e48ac4e92406f9e70b107d472dc2bef1a983966a97f68a9cf5cdbdb19b61e841aa2fe593eb7a69ae1857728e04af15b3551a85c57d670c35dab64bd09cd8ebf5588e4445e5de75b8e9c411ef6035b0f4f04c8185df8abfbdf5f63d4365b584fd25dbfe565a6c37205ecdf34d6c565fe38b3e2834acae10b532504251a4b3f2b856d94f1a564dbfaa4223c3d627a1cd34602c5b816f3a1142640dacaf20a5cd2f87b169c85f0847e87d6771155a70279ae5839dcbd36b4560fc4d9e26ab7570db298a16e4e485c5e6eab78c2715117b7f02ec3e2410e2f5c0a23e999ffdc57769e77aa6175768415c431f22681c02d655dc3f2056a42c8060d961524ea215041b490ebdf115144f248d829d9f2df4f13dc5062190115b3b7af426c7a38452e3d47a435258b44b457b21c0b3ea6e79a3ab2ea019b583ed64abf8ab8ba4b81578ab91dd138a6311c424f6516e7ae10f6a5a635a6f794801d21662419f9d36c89ddd76a871116ffc056c98e99f6ac065c3296dac2d11f45f32760f1dcebe9e40510de01be93ef6e88f740ea2680609f889ea91067b8beb2dab0e392e3e351fa6697f717ca274d8004131c45e60bc0700db29a0a7eb6a8bc411eccd8a9215ebb4f12281bab0dece9a91372e9bba1f3eabfd85534c4556abe58028141f026af80c2c2ed4957201d588bf00503fba02be926f80cf9073889f74017dd15feef24e7fbc59af48c3cc0b8fdacbe9af34b62d41ff32c3b8a932a58571659libgssapi_krb5.so.2.2libgssrpc.so.4.2libk5crypto.so.3.1libkdb5.so.8.0libkrad.so.0.0libkrb5.so.3.3libkrb5support.so.0.1rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootkrb5-1.15.1-19.el7.src.rpmkrb5-develkrb5-devel(x86-64)pkgconfig(gssrpc)pkgconfig(kadm-client)pkgconfig(kadm-server)pkgconfig(kdb)pkgconfig(krb5)pkgconfig(krb5-gssapi)pkgconfig(mit-krb5)pkgconfig(mit-krb5-gssapi)@@@@@@@@@@@@@@@@@@@@@@@@@@@   @ /bin/sh/usr/bin/pkg-configkeyutils-libs-develkrb5-libs(x86-64)libc.so.6()(64bit)libc.so.6(GLIBC_2.14)(64bit)libc.so.6(GLIBC_2.15)(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.3)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.4)(64bit)libcom_err-devellibcom_err.so.2()(64bit)libdl.so.2()(64bit)libgssapi_krb5.so.2()(64bit)libgssapi_krb5.so.2(gssapi_krb5_2_MIT)(64bit)libgssrpc.so.4()(64bit)libk5crypto.so.3()(64bit)libkadm5(x86-64)libkdb5.so.8()(64bit)libkeyutils.so.1()(64bit)libkrad.so.0()(64bit)libkrb5.so.3()(64bit)libkrb5.so.3(krb5_3_MIT)(64bit)libkrb5support.so.0()(64bit)libresolv.so.2()(64bit)libselinux-devellibselinux.so.1()(64bit)libverto-develpkgconfig(gssrpc)pkgconfig(kdb)pkgconfig(mit-krb5)pkgconfig(mit-krb5-gssapi)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rtld(GNU_HASH)rpmlib(PayloadIsXz)1.15.1-19.el71.15.1-19.el73.0.4-14.6.0-14.0-15.2-14.11.3Z@NNNT@N@Nj@NNNR@N@Nw.Nf @N_sN^"@N?N)f@N&@N%qN*M6@MM@MM@M@M@MM‘@M@MM@MI@MTM] M[@MRMQ0@MOMOMGM@ M@ME@M @L@L7LL@LLL*@L@L@Ls@LYV@L4l@LT@LT@LL@K^Kj@K@K @K͗@KŮ@KK@K@K@Kg@K,KK@KO@KKf@K{@KzKie@K]KY@KTM@KPXKO@KLd@KD{@KC)KA@KA@K/c@K K@K?K?KK@KJJkJ0@JG@JJ@Ji@JS8JQ@JI@JI@JHJD@J7@J)J'@J@J@IX@I@IcIo@I@@III2IpvHH@H}HwK@HSH@G@G#G߮G߮G@G­G­G­G­Gs@GG@G{|Gg@GVG@G@GaG@F@F@FFHFFvFFR@FQ@F@F@F@F~\F~\F~\F{F{F{FU~@FT,FM@FJ@F; @F; @FpFFAFoFoE{@E5@EnE@Eّ@E3@E@E@E@Ex@EE%EE@ET@>@>j@> @>->z>x[>u>g8@>g8@>?@>>Y>/@>.>%M@>d@>@==@=K@==ϛ=@=@=@=w@=H@=@=Jt@==E@=7@=@<@<<m@ - 1.15.1-19Robbie Harwood - 1.15.1-18Robbie Harwood - 1.15.1-17Robbie Harwood - 1.15.1-16Robbie Harwood - 1.15.1-15Robbie Harwood - 1.15.1-14Robbie Harwood - 1.15.1-13Robbie Harwood - 1.15.1-12Robbie Harwood - 1.15.1-11Robbie Harwood - 1.15.1-10Robbie Harwood - 1.15.1-9Robbie Harwood - 1.15.1-8Robbie Harwood - 1.15.1-7Robbie Harwood - 1.15.1-6Robbie Harwood - 1.15.1-5Robbie Harwood - 1.15.1-4Robbie Harwood - 1.15.1-3Robbie Harwood - 1.15.1-2Robbie Harwood - 1.15.1-1Robbie Harwood - 1.15-2Robbie Harwood - 1.15-1Robbie Harwood - 1.14.1-27Robbie Harwood - 1.14.1-26Robbie Harwood - 1.14.1-25Robbie Harwood - 1.14.1-24Robbie Harwood - 1.14.1-23Robbie Harwood - 1.14.1-22Robbie Harwood - 1.14.1-21Robbie Harwood - 1.14.1-20Robbie Harwood - 1.14.1-19Robbie Harwood - 1.14.1-18Robbie Harwood - 1.14.1-17Robbie Harwood - 1.14.1-16Robbie Harwood - 1.14.1-15Robbie Harwood - 1.14.1-14Robbie Harwood - 1.14.1-13Robbie Harwood - 1.14.1-12Robbie Harwood - 1.14.1-11Robbie Harwood - 1.14.1-10Robbie Harwood - 1.14.1-9Robbie Harwood - 1.14.1-8Robbie Harwood - 1.14.1-7Robbie Harwood - 1.14.1-6Robbie Harwood - 1.14.1-5Robbie Harwood - 1.14.1-4Robbie Harwood - 1.14.1-3Robbie Harwood - 1.14.1-2Robbie Harwood - 1.14.1-1Robbie Harwood - 1.13.2-12Robbie Harwood - 1.13.2-11Robbie Harwood 1.13.2-9Roland Mainz - 1.13.2-9Roland Mainz - 1.13.2-8Roland Mainz - 1.13.2-7Roland Mainz - 1.13.2-6Roland Mainz - 1.13.2-5Roland Mainz - 1.13.2-4Roland Mainz - 1.13.2-3Roland Mainz - 1.13.2-2Roland Mainz - 1.13.2-1Roland Mainz - 1.13.2-0Roland Mainz - 1.13.1-2Roland Mainz - 1.13.1-1Roland Mainz - 1.13.1-0Roland Mainz - 1.12.2-14Roland Mainz - 1.12.2-13Roland Mainz - 1.12.2-12Roland Mainz - 1.12.2-11Roland Mainz - 1.12.2-10Roland Mainz - 1.12.2-9Nalin Dahyabhai - 1.12.2-8Nalin Dahyabhai - 1.12.2-7Nalin Dahyabhai - 1.12.2-6Nalin Dahyabhai - 1.12.2-5Nalin Dahyabhai - 1.12.2-4Nalin Dahyabhai - 1.12.2-3Fedora Release Engineering - 1.12.1-15Fedora Release Engineering - 1.12.2-2Nalin Dahyabhai - 1.12.2-1Nalin Dahyabhai - 1.12.1-14Nalin Dahyabhai - 1.12.1-13Nalin Dahyabhai - 1.12.1-12Tom Callaway - 1.12.1-11Nalin Dahyabhai - 1.12.1-10Nalin Dahyabhai - 1.12.1-9Nalin Dahyabhai - 1.12.1-8Fedora Release Engineering - 1.12.1-7Nathaniel McCallum - 1.12.1-6Nalin Dahyabhai - 1.12.1-5Nalin Dahyabhai - 1.12.1-4Nalin Dahyabhai - 1.12.1-3Nalin Dahyabhai Nalin Dahyabhai - 1.12.1-2Nalin Dahyabhai - 1.12.1-1Nalin Dahyabhai - 1.12-11Nalin Dahyabhai Nalin Dahyabhai - 1.12-10Nalin Dahyabhai - 1.12-9Nalin Dahyabhai - 1.12-8Nalin Dahyabhai - 1.12-7Nalin Dahyabhai - 1.12-6Nalin Dahyabhai - 1.12-5Nalin Dahyabhai Nalin Dahyabhai - 1.12-4Nalin Dahyabhai - 1.12-3Nalin Dahyabhai - 1.12-2Nalin Dahyabhai - 1.12-1Nalin Dahyabhai - 1.12-beta2.0Nalin Dahyabhai - 1.12-beta1.0Nalin Dahyabhai - 1.11.4-2Nalin Dahyabhai - 1.11.4-1Nalin Dahyabhai - 1.11.3-31Nalin Dahyabhai - 1.11.3-30Nalin Dahyabhai - 1.11.3-29Nalin Dahyabhai - 1.11.3-28Nalin Dahyabhai - 1.11.3-27Nalin Dahyabhai - 1.12-alpha1.0Nalin Dahyabhai - 1.11.3-26Nalin Dahyabhai - 1.11.3-25Nalin Dahyabhai - 1.11.3-24Nalin Dahyabhai - 1.11.3-23Nalin Dahyabhai - 1.11.3-22Nalin Dahyabhai - 1.11.3-21Nalin Dahyabhai - 1.11.3-20Nalin Dahyabhai - 1.11.3-19Nalin Dahyabhai - 1.11.3-18Nalin Dahyabhai - 1.11.3-17Nalin Dahyabhai - 1.11.3-16Nalin Dahyabhai - 1.11.3-15Nalin Dahyabhai - 1.11.3-14Nalin Dahyabhai - 1.11.3-13Nalin Dahyabhai - 1.11.3-12Nalin Dahyabhai Nalin Dahyabhai 1.11.3-11Nalin Dahyabhai 1.11.3-10Nalin Dahyabhai 1.11.3-9Nalin Dahyabhai 1.11.3-8Nalin Dahyabhai 1.11.3-7Nalin Dahyabhai 1.11.3-6Nalin Dahyabhai 1.11.3-5Nalin Dahyabhai 1.11.3-4Nalin Dahyabhai 1.11.3-3Nalin Dahyabhai 1.11.3-2Nalin Dahyabhai 1.11.3-1Nalin Dahyabhai 1.11.2-10Nalin Dahyabhai 1.11.2-9Nalin Dahyabhai 1.11.2-8Nalin Dahyabhai 1.11.2-7Nalin Dahyabhai 1.11.2-6Nalin Dahyabhai 1.11.2-5Nathaniel McCallum 1.11.2-4Nalin Dahyabhai 1.11.2-3Nalin Dahyabhai 1.11.2-2Nalin Dahyabhai 1.11.2-1Nalin Dahyabhai 1.11.1-9Nathaniel McCallum - 1.11.1-8Nalin Dahyabhai 1.11.1-7Nalin Dahyabhai 1.11.1-6Nalin Dahyabhai 1.11.1-5Nalin Dahyabhai Nathaniel McCallum 1.11.1-4Nalin Dahyabhai 1.11.1-3Nalin Dahyabhai 1.11.1-2Nalin Dahyabhai 1.11.1-1Nalin Dahyabhai 1.11-2Nalin Dahyabhai 1.11-1Nalin Dahyabhai 1.11-0.beta2.0Nalin Dahyabhai Nalin Dahyabhai 1.11-0.beta1.0Nalin Dahyabhai 1.11-0.alpha1.1Nalin Dahyabhai 1.11-0.alpha1.0Nalin Dahyabhai Nalin Dahyabhai 1.10.3-7Nalin Dahyabhai 1.10.3-6Nalin Dahyabhai 1.10.3-5Nalin Dahyabhai Nalin Dahyabhai 1.10.3-4Nalin Dahyabhai 1.10.3-3Nalin Dahyabhai 1.10.3-2Nalin Dahyabhai 1.10.3-1Nalin Dahyabhai 1.10.2-7Nalin Dahyabhai 1.10.2-6Nalin Dahyabhai 1.10.2-5Fedora Release Engineering - 1.10.2-4Nalin Dahyabhai 1.10.2-3Nalin Dahyabhai 1.10.2-2Nalin Dahyabhai 1.10.2-1Nalin Dahyabhai Nalin Dahyabhai 1.10.1-3Nalin Dahyabhai 1.10.1-2Nalin Dahyabhai 1.10.1-1Nalin Dahyabhai 1.10-5Nathaniel McCallum - 1.10-4Nathaniel McCallum - 1.10-3Nalin Dahyabhai 1.10-2Nalin Dahyabhai 1.10-1Nathaniel McCallum - 1.10-0.beta1.2Nalin Dahyabhai 1.10-0.beta1.1Peter Robinson Nalin Dahyabhai 1.10-0.alpha2.2Nalin Dahyabhai 1.10-0.alpha2.1Nalin Dahyabhai 1.10-0.alpha1.3Nalin Dahyabhai 1.10-0.alpha1.2Nalin Dahyabhai 1.10-0.alpha1.1Nalin Dahyabhai 1.10-0.alpha1.0Fedora Release Engineering - 1.9.1-19Nalin Dahyabhai 1.9.1-18Nalin Dahyabhai 1.9.1-17Nalin Dahyabhai 1.9.1-16Tom Callaway 1.9.1-15Tom Callaway 1.9.1-14Tom Callaway 1.9.1-13Nalin Dahyabhai 1.9.1-12Nalin Dahyabhai 1.9.1-11Nalin Dahyabhai 1.9.1-10Nalin Dahyabhai 1.9.1-9Nalin Dahyabhai 1.9.1-8Nalin Dahyabhai 1.9.1-7Nalin Dahyabhai 1.9.1-6Nalin Dahyabhai 1.9.1-5Nalin Dahyabhai 1.9.1-4Nalin Dahyabhai 1.9.1-3Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai 1.9.1-2Nalin Dahyabhai Nalin Dahyabhai 1.9.1-1Nalin Dahyabhai 1.9-9Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai 1.9-8Nalin Dahyabhai 1.9-7Nalin Dahyabhai Nalin Dahyabhai 1.9-6Nalin Dahyabhai 1.9-5Nalin Dahyabhai 1.9-4Fedora Release Engineering - 1.9-3Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai 1.9-2Nalin Dahyabhai 1.9-1Nalin Dahyabhai 1.9-0.beta3.1Nalin Dahyabhai 1.9-0.beta3.0Nalin Dahyabhai 1.9-0.beta2.0Nalin Dahyabhai 1.9-0.beta1.1Nalin Dahyabhai 1.9-0.beta1.0Nalin Dahyabhai 1.8.3-8Nalin Dahyabhai 1.8.3-7Nalin Dahyabhai 1.8.3-6jkeating - 1.8.3-5Nalin Dahyabhai 1.8.3-4Nalin Dahyabhai 1.8.3-3Nalin Dahyabhai 1.8.3-2Nalin Dahyabhai 1.8.3-1Nalin Dahyabhai 1.8.2-3Nalin Dahyabhai 1.8.2-2Nalin Dahyabhai Nalin Dahyabhai 1.8.2-1Nalin Dahyabhai 1.8.1-7Nalin Dahyabhai Nalin Dahyabhai 1.8.1-6Nalin Dahyabhai 1.8.1-5Nalin Dahyabhai 1.8.1-4Nalin Dahyabhai 1.8.1-3Nalin Dahyabhai 1.8.1-2Nalin Dahyabhai 1.8.1-1Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai - 1.8-5Nalin Dahyabhai - 1.8-4Nalin Dahyabhai - 1.8-3Nalin Dahyabhai - 1.8-2Nalin Dahyabhai - 1.8-1Nalin Dahyabhai - 1.7.1-6Nalin Dahyabhai - 1.7.1-5Nalin Dahyabhai - 1.7.1-4Nalin Dahyabhai - 1.7.1-3Nalin Dahyabhai - 1.7.1-2Nalin Dahyabhai - 1.7.1-1Nalin Dahyabhai - 1.7-23Nalin Dahyabhai - 1.7-22Nalin Dahyabhai - 1.7-21Nalin Dahyabhai - 1.7-20Nalin Dahyabhai - 1.7-19Nalin Dahyabhai - 1.7-18Nalin Dahyabhai - 1.7-17Nalin Dahyabhai - 1.7-16Dennis Gregorovic Nalin Dahyabhai - 1.7-15Nalin Dahyabhai - 1.7-14Nalin Dahyabhai Nalin Dahyabhai - 1.7-13Nalin Dahyabhai Nalin Dahyabhai - 1.7-12Nalin Dahyabhai Nalin Dahyabhai - 1.7-11Nalin Dahyabhai - 1.7-10Nalin Dahyabhai - 1.7-9Nalin Dahyabhai Nalin Dahyabhai - 1.7-8Nalin Dahyabhai Nalin Dahyabhai - 1.7-7Tomas Mraz - 1.7-6Fedora Release Engineering - 1.7-5Nalin Dahyabhai 1.7-5Nalin Dahyabhai Nalin Dahyabhai 1.7-4Nalin Dahyabhai Nalin Dahyabhai 1.7-3Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai 1.7-2Nalin Dahyabhai 1.7-1Nalin Dahyabhai 1.6.3-106Nalin Dahyabhai 1.6.3-105Nalin Dahyabhai 1.6.3-104Nalin Dahyabhai 1.6.3-103Nalin Dahyabhai 1.6.3-102Nalin Dahyabhai Nalin Dahyabhai 1.6.3-101Nalin Dahyabhai 1.6.3-100Nalin Dahyabhai 1.6.3-19Fedora Release Engineering - 1.6.3-18Nalin Dahyabhai 1.6.3-17Nalin Dahyabhai Tom "spot" Callaway 1.6.3-16Nalin Dahyabhai Nalin Dahyabhai 1.6.3-15Tom "spot" Callaway 1.6.3-14Nalin Dahyabhai 1.6.3-13Nalin Dahyabhai 1.6.3-12Nalin Dahyabhai 1.6.3-11Nalin Dahyabhai 1.6.3-10Nalin Dahyabhai 1.6.3-9Nalin Dahyabhai 1.6.3-8Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai 1.6.3-7Nalin Dahyabhai 1.6.3-6Nalin Dahyabhai 1.6.3-5Nalin Dahyabhai 1.6.3-4Nalin Dahyabhai 1.6.3-3Nalin Dahyabhai 1.6.3-2Nalin Dahyabhai 1.6.3-1Nalin Dahyabhai 1.6.2-10Nalin Dahyabhai Nalin Dahyabhai 1.6.2-9Nalin Dahyabhai 1.6.2-8Nalin Dahyabhai 1.6.2-7Nalin Dahyabhai 1.6.2-6Nalin Dahyabhai 1.6.2-5Nalin Dahyabhai 1.6.2-4Nalin Dahyabhai 1.6.2-3Nalin Dahyabhai 1.6.2-2Nalin Dahyabhai 1.6.2-1Nalin Dahyabhai 1.6.1-8Nalin Dahyabhai 1.6.1-7Nalin Dahyabhai 1.6.1-6Nalin Dahyabhai 1.6.1-5.1Nalin Dahyabhai 1.6.1-5Nalin Dahyabhai 1.6.1-4Nalin Dahyabhai 1.6.1-3Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai 1.6.1-2Nalin Dahyabhai 1.6.1-1Nalin Dahyabhai Nalin Dahyabhai 1.6-6Nalin Dahyabhai 1.6-5Nalin Dahyabhai 1.6-4Nalin Dahyabhai Nalin Dahyabhai 1.5-24Nalin Dahyabhai 1.6-3Nalin Dahyabhai Nalin Dahyabhai 1.6-2Nalin Dahyabhai 1.5-23Nalin Dahyabhai 1.5-22Nalin Dahyabhai Nalin Dahyabhai - 1.5-20Nalin Dahyabhai Nalin Dahyabhai 1.6-1Nalin Dahyabhai Nalin Dahyabhai - 1.5-18Nalin Dahyabhai - 1.5-17Nalin Dahyabhai - 1.5-16Nalin Dahyabhai - 1.5-14Nalin Dahyabhai - 1.5-12Nalin Dahyabhai Nalin Dahyabhai - 1.5-11Nalin Dahyabhai - 1.5-10Nalin Dahyabhai - 1.5-9.pal_18695Nalin Dahyabhai - 1.5-9Nalin Dahyabhai - 1.5-8Nalin Dahyabhai - 1.5-7Nalin Dahyabhai - 1.5-6Nalin Dahyabhai - 1.5-5Nalin Dahyabhai - 1.5-4Nalin Dahyabhai - 1.5-3Nalin Dahyabhai - 1.5-2Nalin Dahyabhai - 1.5-1.2Jesse Keating - 1.5-1.1Nalin Dahyabhai 1.5-1Nalin Dahyabhai 1.5-0Nalin Dahyabhai 1.4.3-9Nalin Dahyabhai 1.4.3-8Nalin Dahyabhai 1.4.3-7Nalin Dahyabhai 1.4.3-6Stepan Kasal 1.4.3-5Jesse Keating 1.4.3-4.1Nalin Dahyabhai 1.4.3-4Nalin Dahyabhai 1.4.3-3Matthias Clasen 1.4.3-2Jesse Keating Nalin Dahyabhai Nalin Dahyabhai 1.4.3-1Nalin Dahyabhai 1.4.2-4Nalin Dahyabhai 1.4.2-3Nalin Dahyabhai 1.4.2-2Nalin Dahyabhai 1.4.2-1Nalin Dahyabhai 1.4.1-6Nalin Dahyabhai 1.4.1-5Nalin Dahyabhai Nalin Dahyabhai 1.4.1-4Nalin Dahyabhai 1.4.1-3Martin Stransky 1.4.1-2Nalin Dahyabhai 1.4.1-1Nalin Dahyabhai 1.4-3Nalin Dahyabhai Nalin Dahyabhai 1.4-2Nalin Dahyabhai 1.4-1Nalin Dahyabhai 1.3.6-3Nalin Dahyabhai 1.3.6-2Nalin Dahyabhai 1.3.6-1Nalin Dahyabhai 1.3.5-8Martin Stransky 1.3.5-7Nalin Dahyabhai 1.3.5-6Nalin Dahyabhai 1.3.5-3Nalin Dahyabhai Nalin Dahyabhai 1.3.5-2Nalin Dahyabhai 1.3.5-1Nalin Dahyabhai Nalin Dahyabhai 1.3.4-7Nalin Dahyabhai 1.3.4-6Nalin Dahyabhai 1.3.4-5Nalin Dahyabhai 1.3.4-4Nalin Dahyabhai 1.3.4-3Nalin Dahyabhai 1.3.4-2Elliot Lee Nalin Dahyabhai 1.3.4-0.1Nalin Dahyabhai 1.3.4-0Nalin Dahyabhai 1.3.3-8Nalin Dahyabhai 1.3.3-7Nalin Dahyabhai 1.3.3-6Nalin Dahyabhai 1.3.3-5Nalin Dahyabhai 1.3.3-4Thomas Woerner 1.3.3-3Nalin Dahyabhai 1.3.3-2Nalin Dahyabhai 1.3.3-1Nalin Dahyabhai 1.3.2-1Nalin Dahyabhai 1.3.1-12Elliot Lee 1.3.1-11.1Elliot Lee 1.3.1-11Nalin Dahyabhai 1.3.1-10Nalin Dahyabhai 1.3.1-9Nalin Dahyabhai 1.3.1-8Nalin Dahyabhai Nalin Dahyabhai 1.3.1-7Nalin Dahyabhai Nalin Dahyabhai 1.3.1-6Nalin Dahyabhai 1.3.1-5Nalin Dahyabhai Nalin Dahyabhai 1.3.1-4Dan Walsh 1.3.1-3Nalin Dahyabhai 1.3.1-2Nalin Dahyabhai 1.3.1-1Nalin Dahyabhai 1.3.1-0Nalin Dahyabhai 1.3-2Nalin Dahyabhai 1.3-1Nalin Dahyabhai 1.2.8-4Nalin Dahyabhai 1.3-0.beta.4Elliot Lee Jeremy Katz 1.2.8-2Nalin Dahyabhai 1.2.8-1Nalin Dahyabhai 1.2.7-14Nalin Dahyabhai 1.2.7-13Nalin Dahyabhai 1.2.7-12Nalin Dahyabhai 1.2.7-11Nalin Dahyabhai 1.2.7-10Nalin Dahyabhai 1.2.7-9Nalin Dahyabhai 1.2.7-8Nalin Dahyabhai Nalin Dahyabhai 1.2.7-7Tim Powers Nalin Dahyabhai 1.2.7-5Bill Nottingham 1.2.7-4Jeremy Katz 1.2.7-3Jakub Jelinek 1.2.7-2Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai 1.2.7-1Nalin Dahyabhai Nalin Dahyabhai 1.2.6-5Nalin Dahyabhai 1.2.6-4Nalin Dahyabhai 1.2.6-3Nalin Dahyabhai 1.2.6-2Nalin Dahyabhai 1.2.6-1Nalin Dahyabhai 1.2.5-7Nalin Dahyabhai 1.2.5-6Nalin Dahyabhai 1.2.5-5Jakub Jelinek 1.2.5-4Tim Powers Tim Powers Nalin Dahyabhai 1.2.5-1Nalin Dahyabhai 1.2.4-1Nalin Dahyabhai 1.2.3-5Florian La Roche Nalin Dahyabhai 1.2.3-3Nalin Dahyabhai 1.2.3-2Nalin Dahyabhai 1.2.3-1Nalin Dahyabhai 1.2.2-14Nalin Dahyabhai 1.2.2-13Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Elliot Lee Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Than Ngo Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Jeff Johnson Bill Nottingham Nalin Dahyabhai Prospector Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Bill Nottingham Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai - Limit ticket lifetime to 2^31-1 seconds - Resolves: #1554723- Expose context errors in pkinit_server_plugin_init - Resolves: #1460089- Drop certauth test changes that prevented runnig it - Resolves: #1498767- Drop irrelevant DIR trigger logic - Resolves: #1431198- Fix CVE-2017-7562 (certauth eku bypass) - Resolves: #1498767- Fix CVE-2017-11368 (s4u2 request assertion failures) - Resolves: #1498768- Force-add /etc/krb5.conf.d so we can guarantee it exists - Resolves: #1431198- Add krb5 policy plugin interface - Remove soname downgrade - Resolves: #1462982- Make t_certauth.py runnable - Resolves: #1443388- Add context SSF query support - Resolves: #1472956- Remove incomplete PKINIT OCSP support - Resolves: #1460089- Add kprop.service argument file - Resolves: #1389073- Fix enterprise principal forwarding - Resolves: #1378440- Fix bug in certauth backport - Resolves: #1428484- rubygem-rkerberos still needs us to lie about soname - Resolves: #1389073- Backport certauth plugin and related pkinit changes - Note: related changes cannot be tested because RHEL does not allow binary git diffs - Resolves: #1428484- Remove duplication between subpackages - Resolves: #1254640- Add back deleted sources - Resolves: #1389073- Bump to krb5-1.15.1 (very small change) - Apply some sanity to our patches and ordering - Resolves: #1389073- Reinstate e_data free method; bumps KDB to 6.1 - Resolves: #1389073- Rebase to 1.15-final - Resolves: #1389073 - Resolves: #1367169 - Resolves: #1389072 - Resolves: #1366863- Properly handle EOF on libkrad sockets - Resolves: #1382449- Use responder in non-preauth AS reqs - Resolves: #1363690- Fix bad debug_log() call in selinux handling - Resolves: #1292153- Fix KKDCPP with TLS SNI by always presenting "Host:" header - Resolves: #1364993- Add dependency on libkadm5 to krb5-devel - Resolves: #1347403- Builders have new version of mock; adapt. - Resolves: #1290239- Fix CVE-2016-3120 - Resolves: #1361504- Make version dependencies on libkadm5 more explicit to appease rpmdiff - Resolves: #1347403- Add in upstream version of kprop port and tests - Resolves: #1292795- Fix incorrect recv() size calculation in libkrad - Resolves: #1349042- Separate out the kadm5 libs - Resolves: #1347403- Fix kprop/iprop handling of default realm - Fix t_kprop.py - Resolves: #1290561 - Resolves: #1302967 - Resolves: #1292795- Fix SPNEGO with NTLM to conform to MS-SPNG section 3.3.5.1 - Resolves: #1341726- Do not indicate depricated mechanisms when requested - Resolves: #1293908- Fix OTP module incorrectly overwriting as_key - Resolves: #1340304- Fix CVE-2016-3119 (LDAP NULL dereference) - Resolves: #1339562- Make ksu not ask for password without -n - Resolves: #1247261- Frob kadm5 soname version so that the rebase does not break things - Resolves: #1292153- Revamp selinux patch to not leak memory - Resolves: #1313457- Add snippet support in /etc/krb5.conf.d - Resolves: #1146945- Skip unnecessary mech calls in gss_inquire_cred - Resolves: #1314493- Fix impersonate_name to work with interposers - Resolves: #1284987- Fix change tracking of krb5.conf - Resolves: #1208243- Ensure log files are not world-readable - Resolves: #1256735- Clean up initscript handling in spec file - Resolves: #1283902 - Resolves: #1183058- Backport spec file changes from Fedora - Resolves: #1290239- Rebase to new upstream version 1.14.1 - Remove pax logic - Resolves: #1292153 - Resolves: #1135427 - Resolves: #1265509 - Resolves: #1265510 - Resolves: #1296241- Remove obsolete trigger to enable building of package - Resolves: #1306970- Fix CVE-2015-8631, CVE-2015-8630, and CVE-2015-8629 - Resolves: #1306970- Add patch and test case for "KDC does not return proper client principal for client referrals" - Resolves: #1259846- Ammend patch for RedHat bug #1252454 ('testsuite complains "Lifetime has increased by 32436 sec while 0 sec passed!", while rhel5-libkrb5 passes') to handle the newly introduced valgrind hits.- Add a patch to fix RH Bug #1250154 ("[s390x, ppc64, ppc64le]: kadmind does not accept ACL if kadm5.acl does not end with EOL") The code "accidently" works on x86/AMD64 because declaring a variable |char| results in an |unsigned char| by default while most other platforms (e.g. { s390x, ppc64, ppc64le, ...}) default to |signed char| (still have to use lint(1) to clean up 38 more instances of this kind of bug).- Obsolete multilib versions of server packages to fix RH bug #1251913 ("krb5 should obsolete the multilib versions of krb5-server and krb5-server-ldap"). The following packages are declared obsolete: - krb5-server-1.11.3-49.el7.i686 - krb5-server-1.11.3-49.el7.ppc - krb5-server-1.11.3-49.el7.s390 - krb5-server-ldap-1.11.3-49.el7.i686 - krb5-server-ldap-1.11.3-49.el7.ppc - krb5-server-ldap-1.11.3-49.el7.s390- Add a patch to fix RedHat bug #1252454 ('testsuite complains "Lifetime has increased by 32436 sec while 0 sec passed!", while rhel5-libkrb5 passes') so that krb5 resolves GSS creds if |time_rec| is requested.- Add a patch to fix RedHat bug #1251586 ("KDC sends multiple requests to ipa-otpd for the same authentication") which causes the KDC to send multiple retries to ipa-otpd for TCP transports while it should only be done for UDP.- the rebase to krb5 1.13.2 in vers 1.13.2-0 also fixed: - Redhat Bug #1247761 ("RFE: Minor krb5 spec file cleanup and sync with recent Fedora 22/23 changes") - Redhat Bug #1247751 ("krb5-config returns wrong -specs path") - Redhat Bug #1247608 ('Add support for multi-hop preauth mechs via |KDC_ERR_MORE_PREAUTH_DATA_REQUIRED| for RFC 6113 ("A Generalized Framework for Kerberos Pre-Authentication")') - Removed "krb5-1.10-kprop-mktemp.patch" and "krb5-1.3.4-send-pr-tempfile.patch", both are no longer used since the rebase to krb5 1.13.1- Add patch to fix Redhat Bug #1222903 ("[SELinux] AVC denials may appear when kadmind starts"). The issue was caused by an unneeded |htons()| which triggered SELinux AVC denials due to the "random" port usage.- Add fix for RedHat Bug #1164304 ("Upstream unit tests loads the installed shared libraries instead the ones from the build")- the rebase to krb5 1.13.1 in vers 1.13.1-0 also fixed: - Bug 1144498 ("Fix the race condition in the libkrb5 replay cache") - Bug 1163402 ("kdb5_ldap_util view_policy does not shows ticket flags on s390x and ppc64") - Bug 1185770 ("Missing upstream test in krb5-1.12.2: src/tests/gssapi/t_invalid.c") - Bug 1204211 ("CVE-2014-5355 krb5: unauthenticated denial of service in recvauth_common() and other")- Update to krb5-1.13.2 - drop patch for krb5-1.13.2-CVE_2015_2694_requires_preauth_bypass_in_PKINIT_enabled_KDC, fixed in krb5-1.13.2 - drop patch for krb5-1.12.1-CVE_2014_5355_fix_krb5_read_message_handling, fixed in krb5-1.13.2- the rebase to krb5 1.13.1 in vers 1.13.1-0 also fixed RH bug #1156144 ("krb5 upstream test t_kdb.py failure")- fix for CVE-2015-2694 (#1218020) "requires_preauth bypass in PKINIT-enabled KDC". In MIT krb5 1.12 and later, when the KDC is configured with PKINIT support, an unauthenticated remote attacker can bypass the requires_preauth flag on a client principal and obtain a ciphertext encrypted in the principal's long-term key. This ciphertext could be used to conduct an off-line dictionary attack against the user's password.- Update to krb5-1.13.1 - patch krb5-1.12-selinux-label was updated and renamed to krb5-1.13-selinux-label - patch krb5-1.11-dirsrv-accountlock was updated and renamed to krb5-1.13-dirsrv-accountlock - drop patch for krb5-1.12-pwdch-fast, fixed in krb5-1.13 - drop patch for krb5-1.12ish-kpasswd_tcp, fixed in krb5-1.13 - drop patch for krb5-master-rcache-internal-const, no longer needed - drop patch for krb5-master-rcache-acquirecred-cleanup, no longer needed - drop patch for krb5-master-rcache-acquirecred-source, no longer needed - drop patch for krb5-master-rcache-acquirecred-test, no longer needed - drop patch for krb5-master-move-otp-sockets, no longer needed - drop patch for krb5-master-mechd, no longer needed - drop patch for krb5-master-strdupcheck, no longer needed - drop patch for krb5-master-compatible-keys, no longer needed - drop patch for krb5-1.12-system-exts, fixed in krb5-1.13 - drop patch for 0001-In-ksu-merge-krb5_ccache_copy-and-_restricted, no longer needed - drop patch for 0002-In-ksu-don-t-stat-not-on-disk-ccache-residuals, no longer needed - drop patch for 0003-Use-an-intermediate-memory-cache-in-ksu, no longer needed - drop patch for 0004-Make-ksu-respect-the-default_ccache_name-setting, no longer needed - drop patch for 0005-Copy-config-entries-to-the-ksu-target-ccache, no longer needed - drop patch for 0006-Use-more-randomness-for-ksu-secondary-cache-names, no longer needed - drop patch for 0007-Make-krb5_cc_new_unique-create-DIR-directories, no longer needed - drop patch for krb5-1.12-kpasswd-skip-address-check, fixed in krb5-1.13 - drop patch for 0000-Refactor-cm-functions-in-sendto_kdc.c, no longer needed - drop patch for 0001-Simplify-sendto_kdc.c, no longer needed - drop patch for 0002-Add-helper-to-determine-if-a-KDC-is-the-master, no longer needed - drop patch for 0003-Use-k5_transport-_strategy-enums-for-k5_sendto, no longer needed - drop patch for 0004-Build-support-for-TLS-used-by-HTTPS-proxy-support, no longer needed - drop patch for 0005-Add-ASN.1-codec-for-KKDCP-s-KDC-PROXY-MESSAGE, no longer needed - drop patch for 0006-Dispatch-style-protocol-switching-for-transport, no longer needed - drop patch for 0007-HTTPS-transport-Microsoft-KKDCPP-implementation, no longer needed - drop patch for 0008-Load-custom-anchors-when-using-KKDCP, no longer needed - drop patch for 0009-Check-names-in-the-server-s-cert-when-using-KKDCP, no longer needed - drop patch for 0010-Add-some-longer-form-docs-for-HTTPS, no longer needed - drop patch for 0011-Have-k5test.py-provide-runenv-to-python-tests, no longer needed - drop patch for 0012-Add-a-simple-KDC-proxy-test-server, no longer needed - drop patch for 0013-Add-tests-for-MS-KKDCP-client-support, no longer needed - drop patch for krb5-1.12ish-tls-plugins, fixed in krb5-1.13.1 - drop patch for krb5-1.12-nodelete-plugins, fixed in krb5-1.13.1 - drop patch for krb5-1.12-ksu-untyped-default-ccache-name, fixed in krb5-1.13.1 - drop patch for krb5-1.12-ksu-no-ccache, fixed in krb5-1.13.1 - drop patch for krb5-ksu_not_working_with_default_principal, fixed in krb5-1.13.1 - drop patch for CVE_2014_5353_fix_LDAP_misused_policy_name_crash, fixed in krb5-1.13.1 - drop patch for CVE_2014_5354_support_keyless_principals_in_ldap, fixed in krb5-1.13.1 - drop patch for kinit -C loops (MIT/krb5 bug #243), fixed in krb5-1.13.1 - drop patch for CVEs { 2014-9421, 2014-9422, 2014-9423, 2014-5352 }, fixed in krb5-1.13.1 - added patch krb5-1.14-Support-KDC_ERR_MORE_PREAUTH_DATA_REQUIRED - added patch krb5-1.12.1-CVE_2014_5355_fix_krb5_read_message_handling - Minor spec cleanup- fix for kinit -C loops (#1184629, MIT/krb5 issue 243, "Do not loop on principal unknown errors").- fix for CVE-2014-5352 (#1179856) "gss_process_context_token() incorrectly frees context (MITKRB5-SA-2015-001)" - fix for CVE-2014-9421 (#1179857) "kadmind doubly frees partial deserialization results (MITKRB5-SA-2015-001)" - fix for CVE-2014-9422 (#1179861) "kadmind incorrectly validates server principal name (MITKRB5-SA-2015-001)" - fix for CVE-2014-9423 (#1179863) "libgssrpc server applications leak uninitialized bytes (MITKRB5-SA-2015-001)"- fix for CVE-2014-5354 (#1174546) "krb5: NULL pointer dereference when using keyless entries"- fix for CVE-2014-5353 (#1174543) "Fix LDAP misused policy name crash"- In ksu, without the -e flag, also check .k5users (#1105489) When ksu was explicitly told to spawn a shell, a line in .k5users which listed "*" as the allowed command would cause the principal named on the line to be considered as a candidate for authentication. When ksu was not passed a command to run, which implicitly meant that the invoking user wanted to run the target user's login shell, knowledge that the principal was a valid candidate was ignored, which could cause a less optimal choice of the default target principal. This doesn't impact the authorization checks which we perform later. Patch by Nalin Dahyabhai - Undo libkadmclnt SONAME change (from 8 to 9) which originally happened in the krb5 1.12 rebase (#1166012) but broke rubygem-rkerberos (sort of ruby language bindings for libkadmclnt&co.) dependicies, as side effect of rubygem-rkerberos using private interfaces in libkadmclnt.- fix the problem where the %license file has been a dangling symlink - ksu: pull in fix from pull #206 to avoid breakage when the default_ccache_name doesn't include a cache type as a prefix - ksu: pull in a proposed fix for pull #207 to avoid breakage when the invoking user doesn't already have a ccache- pull in patch from master to load plugins with RTLD_NODELETE, when defined (RT#7947)- backport patch to make the client skip checking the server's reply address when processing responses to password-change requests, which between NAT and upcoming HTTPS support, can cause us to erroneously report an error to the user when the server actually reported success (RT#7886) - backport support for accessing KDCs and kpasswd services via HTTPS proxies (marked by being specified as https URIs instead as hostnames or hostname-and-port), such as the one implemented in python-kdcproxy (RT#7929, #109919), and pick up a subsequent patch to build HTTPS as a plugin- backport fix for trying all compatible keys when not being strict about acceptor names while reading AP-REQs (RT#7883, #1078888) - define _GNU_SOURCE in files where we use EAI_NODATA, to make sure that it's declared (#1059730,#1084068,#1109102)- kpropd hasn't bothered with -S since 1.11; stop trying to use that flag in the systemd unit file- pull in upstream fix for an incorrect check on the value returned by a strdup() call (#1132062)- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_22_Mass_Rebuild- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_22_Mass_Rebuild- update to 1.12.2 - drop patch for RT#7820, fixed in 1.12.2 - drop patch for #231147, fixed as RT#3277 in 1.12.2 - drop patch for RT#7818, fixed in 1.12.2 - drop patch for RT#7836, fixed in 1.12.2 - drop patch for RT#7858, fixed in 1.12.2 - drop patch for RT#7924, fixed in 1.12.2 - drop patch for RT#7926, fixed in 1.12.2 - drop patches for CVE-2014-4341/CVE-2014-4342, included in 1.12.2 - drop patch for CVE-2014-4343, included in 1.12.2 - drop patch for CVE-2014-4344, included in 1.12.2 - drop patch for CVE-2014-4345, included in 1.12.2 - replace older proposed changes for ksu with backports of the changes after review and merging upstream (#1015559, #1026099, #1118347)- incorporate fix for MITKRB5-SA-2014-001 (CVE-2014-4345)- gssapi: pull in upstream fix for a possible NULL dereference in spnego (CVE-2014-4344)- gssapi: pull in proposed fix for a double free in initiators (David Woodhouse, CVE-2014-4343, #1117963)- fix license handling- pull in fix for denial of service by injection of malformed GSSAPI tokens (CVE-2014-4341, CVE-2014-4342, #1116181)- pull in changes from upstream which add processing of the contents of /etc/gss/mech.d/*.conf when loading GSS modules (#1102839)- pull in fix for building against tcl 8.6 (#1107061)- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild- Backport fix for change password requests when using FAST (RT#7868)- spnego: pull in patch from master to restore preserving the OID of the mechanism the initiator requested when we have multiple OIDs for the same mechanism, so that we reply using the same mechanism OID and the initiator doesn't get confused (#1066000, RT#7858)- pull in patch from master to move the default directory which the KDC uses when computing the socket path for a local OTP daemon from the database directory (/var/kerberos/krb5kdc) to the newly-added run directory (/run/krb5kdc), in line with what we're expecting in 1.13 (RT#7859, more of #1040056 as #1063905) - add a tmpfiles.d configuration file to have /run/krb5kdc created at boot-time - own /var/run/krb5kdc- refresh nss_wrapper and add socket_wrapper to the %check environment- add currently-proposed changes to teach ksu about credential cache collections and the default_ccache_name setting (#1015559,#1026099)- pull in multiple changes to allow replay caches to be added to a GSS credential store as "rcache"-type credentials (RT#7818/#7819/#7836,- update to 1.12.1 - drop patch for RT#7794, included now - drop patch for RT#7797, included now - drop patch for RT#7803, included now - drop patch for RT#7805, included now - drop patch for RT#7807, included now - drop patch for RT#7045, included now - drop patches for RT#7813 and RT#7815, included now - add patch to always retrieve the KDC time offsets from keyring caches, so that we don't mistakenly interpret creds as expired before their time when our clock is ahead of the KDC's (RT#7820, #1030607)- update the PIC patch for iaesx86.s to not use ELF relocations to the version that landed upstream (RT#7815, #1045699)- pass -Wl,--warn-shared-textrel to the compiler when we're creating shared libraries- amend the PIC patch for iaesx86.s to also save/restore ebx in the functions where we modify it, because the ELF spec says we need to- grab a more-commented version of the most recent patch from upstream master - make a guess at making the 32-bit AES-NI implementation sufficiently position-independent to not require execmod permissions for libk5crypto (more of #1045699)- add patch from Dhiru Kholia for the AES-NI implementations to allow libk5crypto to be properly marked as not needing an executable stack on arches where they're used (#1045699, and so many others)- revert that last change for a bit while sorting out execstack when we use AES-NI (#1045699)- add yasm as a build requirement for AES-NI support, on arches that have yasm and AES-NI- pull in fix from master to make reporting of errors encountered by the SPNEGO mechanism work better (RT#7045, part of #1043962)- update a test wrapper to properly handle things that the new libkrad does, and add python-pyrad as a build requirement so that we can run its tests- revise previous patch to initialize one more element- backport fixes to krb5_copy_context (RT#7807, #1044735/#1044739)- pull in fix from master to return a NULL pointer rather than allocating zero bytes of memory if we read a zero-length input token (RT#7794, part of - pull in fix from master to ignore an empty token from an acceptor if we've already finished authenticating (RT#7797, part of #1043962) - pull in fix from master to avoid a memory leak when a mechanism's init_sec_context function fails (RT#7803, part of #1043962) - pull in fix from master to avoid a memory leak in a couple of error cases which could occur while obtaining acceptor credentials (RT#7805, part of #1043962)- update to 1.12 final- update to beta2 - drop obsolete backports for storing KDC time offsets and expiration times in keyring credential caches- rebase to master - update to beta1 - drop obsolete backport of fix for RT#7706- pull in fix to store KDC time offsets in keyring credential caches (RT#7768, - pull in fix to set expiration times on credentials stored in keyring credential caches (RT#7769, #1031724)- update to 1.11.4 - drop patch for RT#7650, obsoleted - drop patch for RT#7706, obsoleted as RT#7723 - drop patch for CVE-2013-1418/CVE-2013-6800, included in 1.11.4- switch to the simplified version of the patch for #1029110 (RT#7764)- check more thoroughly for errors when resolving KEYRING ccache names of type "persistent", which should only have a numeric UID as the next part of the name (#1029110)- incorporate upstream patch for remote crash of KDCs which serve multiple realms simultaneously (RT#7756, CVE-2013-1418/CVE-2013-6800,- drop patch to add additional access() checks to ksu - they add to breakage when non-FILE: caches are in use (#1026099), shouldn't be resulting in any benefit, and clash with proposed changes to fix its cache handling- add some minimal description to the top of the wrapper scripts we use when starting krb5kdc and kadmind to describe why they exist (tooling)- initial update to alpha1 - drop backport of persistent keyring support - drop backport for RT#7689 - drop obsolete patch for fixing a use-before-init in a test program - drop obsolete patch teaching config.guess/config.sub about aarch64-linux - drop backport for RT#7598 - drop backport for RT#7172 - drop backport for RT#7642 - drop backport for RT#7643 - drop patches from master to not test GSSRPC-over-UDP and to not depend on the portmapper, which are areas where our build systems often give us trouble, too; obsolete - drop backports for RT#7682 - drop backport for RT#7709 - drop backport for RT#7590 and partial backport for RT#7680 - drop OTP backport - drop backports for RT#7656 and RT#7657 - BuildRequires: libedit-devel to prefer it - BuildRequires: pkgconfig, since configure uses it- create and own /etc/gss (#1019937)- pull up fix for importing previously-exported credential caches in the gssapi library (RT# 7706, #1019420)- backport the callback to use the libkrb5 prompter when we can't load PEM files for PKINIT (RT#7590, includes part of #965721/#1016690) - extract the rest of the fix #965721/#1016690 from the changes for RT#7680- fix trigger scriptlet's invocation of sed (#1016945)- rebuild with keyutils 1.5.8 (part of #1012043)- switch to the version of persistent-keyring that was just merged to master (RT#7711), along with related changes to kinit (RT#7689) - go back to setting default_ccache_name to a KEYRING type- pull up fix for not calling a kdb plugin's check-transited-path method before calling the library's default version, which only knows how to read what's in the configuration file (RT#7709, #1013664)- configure --without-krb5-config so that we don't pull in the old default ccache name when we want to stop setting a default ccache name at configure- time- fix broken dependency on awk (should be gawk, rdieter)- add missing dependency on newer keyutils-libs (#1012034)- back out setting default_ccache_name to the new default for now, resetting it to the old default while the kernel/keyutils bits get sorted (sgallagh)- add explicit build-time dependency on a version of keyutils that's new enough to include keyctl_get_persistent() (more of #991148)- incorporate Simo's updated backport of his updated persistent-keyring changes (more of #991148)- don't break during %check when the session keyring is revoked- pull the newer F21 defaults back to F20 (sgallagh)- only apply the patch to autocreate /run/user/0 when we're hard-wiring the default ccache location to be under it; otherwise it's unnecessary- don't let comments intended for one scriptlet become part of the "script" that gets passed to ldconfig as part of another one (Mattias Ellert, #1005675)- incorporate Simo's backport of his persistent-keyring changes (#991148) - restore build-time default DEFCCNAME on Fedora 21 and later and EL, and instead set default_ccache_name in the default krb5.conf's [libdefaults] section (#991148) - on releases where we expect krb5.conf to be configured with a default_ccache_name, add it whenever we upgrade from an older version of the package that wouldn't have included it in its default configuration file (#991148)- take another stab at accounting for UnversionedDocdirs for the -libs subpackage (spotted by ssorce) - switch to just the snapshot of nss_wrapper we were using, since we no longer need to carry anything that isn't in the cwrap.org repository (ssorce)- drop a patch we weren't not applying (build tooling) - wrap kadmind and kpropd in scripts which check for the presence/absence of files which dictate particular exit codes before exec'ing the actual binaries, instead of trying to use ConditionPathExists in the unit files to accomplish that, so that we exit with failure properly when what we expect isn't actually in effect on the system (#800343)- attempt to account for UnversionedDocdirs for the -libs subpackage- tweak configuration files used during tests to try to reduce the number of conflicts encountered when builds for multiple arches land on the same builder- pull up changes to allow GSSAPI modules to provide more functions (RT#7682, #986564/#986565)- use (a bundled, for now, copy of) nss_wrapper to let us run some of the self-tests at build-time in more places than we could previously (#978756) - cover inconsistencies in whether or not there's a local caching nameserver that's willing to answer when the build environment doesn't have a resolver configuration, so that nss_wrapper's faking of the local hostname can be complete- specify dependencies on the same arch of krb5-libs by using the %{?_isa} suffix, to avoid dragging 32-bit libraries onto 64-bit systems (#980155)- special-case /run/user/0, attempting to create it when resolving a directory cache below it fails due to ENOENT and we find that it doesn't already exist, either, before attempting to create the directory cache (maybe helping, maybe just making things more confusing for #961235)- update to 1.11.3 - drop patch for RT#7605, fixed in this release - drop patch for CVE-2002-2443, fixed in this release - drop patch for RT#7369, fixed in this release - pull upstream fix for breaking t_skew.py by adding the patch for #961221- respin with updated version of patch for RT#7650 (#969331)- don't forget to set the SELinux label when creating the directory for a DIR: ccache - pull in proposed fix for attempts to get initial creds, which end up following referrals, incorrectly trying to always use master KDCs if they talked to a master at any point (should fix RT#7650)- pull in patches from master to not test GSSRPC-over-UDP and to not depend on the portmapper, which are areas where our build systems often give us trouble, too- backport fix for not being able to verify the list of transited realms in GSS acceptors (RT#7639, #959685) - backport fix for not being able to pass an empty password to the get-init-creds APIs and have them actually use it (RT#7642, #960001) - add backported proposed fix to use the unauthenticated server time as the basis for computing the requested credential expiration times, rather than the client's idea of the current time, which could be significantly incorrect (#961221)- pull in upstream fix to start treating a KRB5CCNAME value that begins with DIR:: the same as it would a DIR: value with just one ccache file in it (RT#7172, #965574)- pull up fix for UDP ping-pong flaw in kpasswd service (CVE-2002-2443,- Update otp patches - Merge otp patches into a single patch - Add keycheck patch- pull the changing of the compiled-in default ccache location to DIR:/run/user/%{uid}/krb5cc back into F19, in line with SSSD and the most recent pam_krb5 build- correct some configuration file paths which the KDC_DIR patch missed- update to 1.11.2 - drop pulled in patch for RT#7586, included in this release - drop pulled in patch for RT#7592, included in this release - pull in fix for keeping track of the message type when parsing FAST requests in the KDC (RT#7605, #951843) (also #951965)- move the compiled-in default ccache location from the previous default of FILE:/tmp/krb5cc_%{uid} to DIR:/run/user/%{uid}/krb5cc (part of #949588)- Update otp backport patches (libk5radius => libkrad)- when testing the RPC library, treat denials from the local portmapper the same as a portmapper-not-running situation, to allow other library tests to be run while building the package- create and own /var/kerberos/krb5/user instead of /var/kerberos/kdc/user, since that's what the libraries actually look for - add buildrequires on nss-myhostname, in an attempt to get more of the tests to run properly during builds - pull in Simo's patch to recognize "client_keytab" as a key type which can be passed in to gss_acquire_cred_from() (RT#7598)- pull up Simo's patch to mark the correct mechanism on imported GSSAPI contexts (RT#7592) - go back to using reconf to run autoconf and autoheader (part of #925640) - add temporary patch to use newer config.guess/config.sub (more of #925640)- fix a version comparison to expect newer texlive build requirements when %{_rhel} > 6 rather than when it's > 7- Add libverto-devel requires for krb5-devel - Add otp support- fix a memory leak when acquiring credentials using a keytab (RT#7586, #911110)- prebuild PDF docs to reduce multilib differences (internal tooling, #884065) - drop the kerberos-iv portreserve file, and drop the rest on systemd systems - escape uses of macros in comments (more of #884065)- update to 1.11.1 - drop patch for noticing negative timeouts being passed to the poll() wrapper in the client transmit functions- set "rdns = false" in the default krb5.conf (#908323,#908324)- update to 1.11 release- update to 1.11 beta 2- when building with our bundled copy of libverto, package it in with -libs rather than with -server (#886049)- update to 1.11 beta 1- handle releases where texlive packaging wasn't yet as complicated as it is in Fedora 18 - fix an uninitialized-variable error building one of the test programs- move the rather large pile of html and pdf docs to -workstation, so that just having something that links to the libraries won't drag them onto a system, and we avoid having to sort out hard-coded paths that include %{_libdir} showing up in docs in multilib packages - actually create %{_var}/kerberos/kdc/user, so that it can be packaged - correct the list of packaged man pages - don't dummy up required tex stylesheets, require them - require pdflatex and makeindex- update to 1.11 alpha 1 - drop backported patch for RT #7406 - drop backported patch for RT #7407 - drop backported patch for RT #7408 - the new docs system generates PDFs, so stop including them as sources - drop backported patch to allow deltat.y to build with the usual warning flags and the current gcc - drop backported fix for disabling use of a replay cache when verifying initial credentials - drop backported fix for teaching PKINIT clients which trust the KDC's certificate directly to verify signed-data messages that are signed with the KDC's certificate, when the blobs don't include a copy of the KDC's certificate - drop backported patches to make keytab-based authentication attempts work better when the client tells the KDC that it supports a particular cipher, but doesn't have a key for it in the keytab - drop backported fix for avoiding spurious clock skew when a TGT is decrypted long after the KDC sent it to the client which decrypts it - move the cross-referenced HTML docs into the -libs package to avoid broken internal links - drop patches to fixup paths in man pages, shouldn't be needed any more- tag a couple of other patches which we still need to be applied during %{?_rawbuild} builds (zmraz)- actually pull up the patch for RT#7063, and not some other ticket (#773496)- add patch based on one from Filip Krska to not call poll() with a negative timeout when the caller's intent is for us to just stop calling it (#838548)- on EL6, conflict with libsmbclient before 3.5.10-124, which is when it stopped linking with a symbol which we no longer export (#771687) - pull up patch for RT#7063, in which not noticing a prompt for a long time throws the client library's idea of the time difference between it and the KDC really far out of whack (#773496) - add a backport of more patches to set the client's list of supported enctypes when using a keytab to be the list of types of keys in the keytab, plus the list of other types the client supports but for which it doesn't have keys, in that order, so that KDCs have a better chance of being able to issue tickets with session keys of types that the client can use (#837855)- cut down the number of times we load SELinux labeling configuration from a minimum of two times to actually one (more of #845125)- backport patch to disable replay detection in krb5_verify_init_creds() while reading the AP-REQ that's generated in the same function (RT#7229)- undo rename from krb5-pkinit-openssl to krb5-pkinit on EL6 - version the Obsoletes: on the krb5-pkinit-openssl to krb5-pkinit rename - reintroduce the init scripts for non-systemd releases - forward-port %{?_rawbuild} annotations from EL6 packaging- update to 1.10.3, rolling in the fixes from MITKRB5-SA-2012-001- selinux: hang on to the list of selinux contexts, freeing and reloading it only when the file we read it from is modified, freeing it when the shared library is being unloaded (#845125)- go back to not messing with library file paths on Fedora 17: it breaks file path dependencies in other packages, and since Fedora 17 is already released, breaking that is our fault- add upstream patch to fix freeing an uninitialized pointer and dereferencing another uninitialized pointer in the KDC (MITKRB5-SA-2012-001, CVE-2012-1014 and CVE-2012-1015, #844779 and #844777) - fix a thinko in whether or not we mess around with devel .so symlinks on systems without a separate /usr (sbose)- Rebuilt for https://fedoraproject.org/wiki/Fedora_18_Mass_Rebuild- backport a fix to allow a PKINIT client to handle SignedData from a KDC that's signed with a certificate that isn't in the SignedData, but which is available as an anchor or intermediate on the client (RT#7183)- back out this labeling change (dwalsh): - when building the new label for a file we're about to create, also mix in the current range, in addition to the current user- update to 1.10.2 - when building the new label for a file we're about to create, also mix in the current range, in addition to the current user - also package the PDF format admin, user, and install guides - drop some PDFs that no longer get built right - add a backport of Stef's patch to set the client's list of supported enctypes to match the types of keys that we have when we are using a keytab to try to get initial credentials, so that a KDC won't send us an AS reply that we can't encrypt (RT#2131, #748528) - don't shuffle around any shared libraries on releases with no-separate-/usr, since /usr/lib is the same place as /lib - add explicit buildrequires: on 'hostname', for the tests, on systems where it's in its own package, and require net-tools, which used to provide the command, everywhere- skip the setfscreatecon() if fopen() is passed "rb" as the open mode (part of #819115)- have -server require /usr/share/dict/words, which we set as the default dict_file in kdc.conf (#817089)- change back dns_lookup_kdc to the default setting (Stef Walter, #805318) - comment out example.com examples in default krb5.conf (Stef Walter, #805320)- update to 1.10.1 - drop the KDC crash fix - drop the KDC lookaside cache fix - drop the fix for kadmind RPC ACLs (CVE-2012-1012)- when removing -workstation, remove our files from the info index while the file is still there, in %preun, rather than %postun, and use the compressed file's name (#801035)- Fix string RPC ACLs (RT#7093); CVE-2012-1012- Add upstream lookaside cache behavior fix (RT#7082)- add patch to accept keytab entries with vno==0 as matches when we're searching for an entry with a specific name/kvno (#230382/#782211,RT#3349)- update to 1.10 final- Add upstream crashfix patch (RT#7081)- update to beta 1- mktemp was long obsoleted by coreutils- modify the deltat grammar to also tell gcc (4.7) to suppress "maybe-uninitialized" warnings in addition to the "uninitialized" warnings it's already being told to suppress (RT#7080)- update to alpha 2 - drop a couple of patches which were integrated for alpha 2- pull in patch for RT#7046: tag a ccache containing credentials obtained via S4U2Proxy with the principal name of the proxying principal (part of #761317) so that the default principal name can be set to that of the client for which it is proxying, which results in the ccache looking more normal to consumers of the ccache that don't care that there's proxying going on - pull in patch for RT#7047: allow tickets obtained via S4U2Proxy to be cached (more of #761317) - pull in patch for RT#7048: allow PAC verification to only bother trying to verify the signature with keys that it's given (still more of #761317)- apply upstream patch to fix a null pointer dereference when processing TGS requests (CVE-2011-1530, #753748)- correct a bug in the fix for #754001 so that the file creation context is consistently reset- update to 1.10 alpha 1 - on newer releases where we can assume NSS >= 3.13, configure PKINIT to build using NSS - on newer releases where we build PKINIT using NSS, configure libk5crypto to build using NSS - rename krb5-pkinit-openssl to krb5-pkinit on newer releases where we're expecting to build PKINIT using NSS instead - during %check, run check in the library and kdc subdirectories, which should be able to run inside of the build system without issue- Rebuilt for glibc bug#747377- apply upstream patch to fix a null pointer dereference with the LDAP kdb backend (CVE-2011-1527, #744125), an assertion failure with multiple kdb backends (CVE-2011-1528), and a null pointer dereference with multiple kdb backends (CVE-2011-1529) (#737711)- pull in patch from trunk to rename krb5int_pac_sign() to krb5_pac_sign() and make it public (#745533)- kadmin.service: fix #723723 again - kadmin.service,krb5kdc.service: remove optional use of $KRB5REALM in command lines, because systemd parsing doesn't handle alternate value shell variable syntax - kprop.service: add missing Type=forking so that systemd doesn't assume simple - kprop.service: expect the ACL configuration to be there, not absent - handle a harder-to-trigger assertion failure that starts cropping up when we exit the transmit loop on time (#739853)- hardcode pid file as option in krb5kdc.service- fix pid path in krb5kdc.service- convert to systemd- pull in upstream patch for RT#6952, confusion following referrals for cross-realm auth (#734341) - pull in build-time deps for the tests- switch to the upstream patch for #727829- handle an assertion failure that starts cropping up when the patch for using poll (#701446) meets servers that aren't running KDCs or against which the connection fails for other reasons (#727829, #734172)- override the default build rules to not delete temporary y.tab.c files, so that they can be packaged, allowing debuginfo files which point to them do so usefully (#729044)- build shared libraries with partial RELRO support (#723995) - filter out potentially multiple instances of -Wl,-z,relro from krb5-config output, now that it's in the buildroot's default LDFLAGS - pull in a patch to fix losing track of the replay cache FD, from SVN by way of Kevin Coffman- kadmind.init: drop the attempt to detect no-database-present errors (#723723), which is too fragile in cases where the database has been manually moved or is accessed through another kdb plugin- backport fixes to teach libkrb5 to use descriptors higher than FD_SETSIZE to talk to a KDC by using poll() if it's detected at compile-time (#701446, RT#6905)- pull a fix from SVN to try to avoid triggering a PTR lookup in getaddrinfo() during krb5_sname_to_principal(), and to let getaddrinfo() decide whether or not to ask for an IPv6 address based on the set of configured interfaces (#717378, RT#6922) - pull a fix from SVN to use AI_ADDRCONFIG more often (RT#6923)- apply upstream patch by way of Burt Holzman to fall back to a non-referral method in cases where we might be derailed by a KDC that rejects the canonicalize option (for example, those from the RHEL 2.1 or 3 era) (#715074)- pull a fix from SVN to get libgssrpc clients (e.g. kadmin) authenticating using the old protocol over IPv4 again (RT#6920)- incorporate a fix to teach the file labeling bits about when replay caches are expunged (#576093)- switch to the upstream patch for #707145- klist: don't trip over referral entries when invoked with -s (#707145, RT#6915)- fixup URL in a comment - when built with NSS, require 3.12.10 rather than 3.12.9- update to 1.9.1: - drop no-longer-needed patches for CVE-2010-4022, CVE-2011-0281, CVE-2011-0282, CVE-2011-0283, CVE-2011-0284, CVE-2011-0285- kadmind: add upstream patch to fix free() on an invalid pointer (#696343, MITKRB5-SA-2011-004, CVE-2011-0285)- don't discard the error code from an error message received in response to a change-password request (#658871, RT#6893)- override INSTALL_SETUID at build-time so that ksu is installed into the buildroot with the right permissions (part of #225974)- backport change from SVN to fix a computed-value-not-used warning in kpropd (#684065)- turn off NSS as the backend for libk5crypto for now to work around its DES string2key not working (#679012) - add revised upstream patch to fix double-free in KDC while returning typed-data with errors (MITKRB5-SA-2011-003, CVE-2011-0284, #674325)- throw in a not-applied-by-default patch to try to make pkinit debugging into a run-time boolean option named "pkinit_debug"- turn on NSS as the backend for libk5crypto, adding nss-devel as a build dependency when that switch is flipped- krb5kdc init script: prototype some changes to do a quick spot-check of the TGS and kadmind keys and warn if there aren't any non-weak keys on file for them (to flush out parts of #651466)- add upstream patches to fix standalone kpropd exiting if the per-client child process exits with an error (MITKRB5-SA-2011-001), a hang or crash in the KDC when using the LDAP kdb backend, and an uninitialized pointer use in the KDC (MITKRB5-SA-2011-002) (CVE-2010-4022, #664009, CVE-2011-0281, #668719, CVE-2011-0282, #668726, CVE-2011-0283, #676126)- Rebuilt for https://fedoraproject.org/wiki/Fedora_15_Mass_Rebuild- fix a compile error in the SELinux labeling patch when -DDEBUG is used (Sumit Bose)- properly advertise that the kpropd init script now supports force-reload (Zbysek Mraz, #630587)- pkinit: when verifying signed data, use the CMS APIs for better interoperability (#636985, RT#6851)- update to 1.9 final- fix link flags and permissions on shared libraries (ausil)- update to 1.9 beta 3- update to 1.9 beta 2- drop not-needed-since-1.8 build dependency on rsh (ssorce)- start moving to 1.9 with beta 1 - drop patches for RT#5755, RT#6762, RT#6774, RT#6775 - drop no-longer-needed backport patch for #539423 - drop no-longer-needed patch for CVE-2010-1322 - if WITH_NSS is set, built with --with-crypto-impl=nss (requires NSS 3.12.9)- incorporate upstream patch to fix uninitialized pointer crash in the KDC's authorization data handling (CVE-2010-1322, #636335)- rebuild- pull down patches from trunk to implement k5login_authoritative and k5login_directory settings for krb5.conf (#539423)- Rebuilt for gcc bug 634757- fix reading of keyUsage extensions when attempting to select pkinit client certs (part of #629022, RT#6775) - fix selection of pkinit client certs when one or more don't include a subjectAltName extension (part of #629022, RT#6774)- build with -fstack-protector-all instead of the default -fstack-protector, so that we add checking to more functions (i.e., all of them) (#629950) - also link binaries with -Wl,-z,relro,-z,now (part of #629950)- fix a logic bug in computing key expiration times (RT#6762, #627022)- update to 1.8.3 - drop backports of fixes for gss context expiration and error table registration/deregistration mismatch - drop patch for upstream #6750- tell krb5kdc and kadmind to create pid files, since they can - add logrotate configuration files for krb5kdc and kadmind (#462658) - fix parsing of the pidfile option in the KDC (upstream #6750)- libgssapi: pull in patch from svn to stop returning context-expired errors when the ticket which was used to set up the context expires (#605366, upstream #6739)- pull up fix for upstream #6745, in which the gssapi library would add the wrong error table but subsequently attempt to unload the right one- update to 1.8.2 - drop patches for CVE-2010-1320, CVE-2010-1321- rebuild- ksu: move session management calls to before we drop privileges, like su does (#596887), and don't skip the PAM account check for root or the same user (more of #540769)- make krb5-server-ldap also depend on the same version-release of krb5-libs, as the other subpackages do, if only to make it clearer than it is when we just do it through krb5-server - drop explicit linking with libtinfo for applications that use libss, now that readline itself links with libtinfo (as of readline-5.2-3, since fedora 7 or so) - go back to building without strict aliasing (compiler warnings in gssrpc)- add patch to correct GSSAPI library null pointer dereference which could be triggered by malformed client requests (CVE-2010-1321, #582466)- fix output of kprop's init script's "status" and "reload" commands (#588222)- incorporate patch to fix double-free in the KDC (CVE-2010-1320, #581922)- fix a typo in kerberos.ldif- update to 1.8.1 - no longer need patches for #555875, #561174, #563431, RT#6661, CVE-2010-0628 - replace buildrequires on tetex-latex with one on texlive-latex, which is the package that provides it now- kdc.conf: no more need to suggest a v4 mode, or listening on the v4 port- drop patch to suppress key expiration warnings sent from the KDC in the last-req field, as the KDC is expected to just be configured to either send them or not as a particular key approaches expiration (#556495)- add upstream fix for denial-of-service in SPNEGO (CVE-2010-0628, #576325) - kdc.conf: no more need to suggest keeping keys with v4-compatible salting- remove the krb5-appl bits (the -workstation-clients and -workstation-servers subpackages) now that krb5-appl is its own package - replace our patch for #563431 (kpasswd doesn't fall back to guessing your principal name using your user name if you don't have a ccache) with the one upstream uses- add documentation for the ticket_lifetime option (#561174)- pull up patch to get the client libraries to correctly perform password changes over IPv6 (Sumit Bose, RT#6661)- update to 1.8 - temporarily bundling the krb5-appl package (split upstream as of 1.8) until its package review is complete - profile.d scriptlets are now only needed by -workstation-clients - adjust paths in init scripts - drop upstreamed fix for KDC denial of service (CVE-2010-0283) - drop patch to check the user's password correctly using crypt(), which isn't a code path we hit when we're using PAM- fix a null pointer dereference and crash introduced in our PAM patch that would happen if ftpd was given the name of a user who wasn't known to the local system, limited to being triggerable by gssapi-authenticated clients by the default xinetd config (Olivier Fourdan, #569472)- fix a regression (not labeling a kdb database lock file correctly, #569902)- move the package changelog to the end to match the usual style (jdennis) - scrub out references to $RPM_SOURCE_DIR (jdennis) - include a symlink to the readme with the name LICENSE so that people can find it more easily (jdennis)- pull up the change to make kpasswd's behavior better match the docs when there's no ccache (#563431)- apply patch from upstream to fix KDC denial of service (CVE-2010-0283,- update to 1.7.1 - don't trip AD lockout on wrong password (#542687, #554351) - incorporates fixes for CVE-2009-4212 and CVE-2009-3295 - fixes gss_krb5_copy_ccache() when SPNEGO is used - move sim_client/sim_server, gss-client/gss-server, uuclient/uuserver to the devel subpackage, better lining up with the expected krb5/krb5-appl split in 1.8 - drop kvno,kadmin,k5srvutil,ktutil from -workstation-servers, as it already depends on -workstation which also includes them- tighten up default permissions on kdc.conf and kadm5.acl (#558343)- use portreserve correctly -- portrelease takes the basename of the file whose entries should be released, so we need three files, not one- suppress warnings of impending password expiration if expiration is more than seven days away when the KDC reports it via the last-req field, just as we already do when it reports expiration via the key-expiration field (#556495) - link with libtinfo rather than libncurses, when we can, in future RHEL- krb5_get_init_creds_password: check opte->flags instead of options->flags when checking whether or not we get to use the prompter callback (#555875)- use portreserve to make sure the KDC can always bind to the kerberos-iv port, kpropd can always bind to the krb5_prop port, and that kadmind can always bind to the kerberos-adm port (#555279) - correct inadvertent use of macros in the changelog (rpmlint)- add upstream patch for integer underflow during AES and RC4 decryption (CVE-2009-4212), via Tom Yu (#545015)- put the conditional back for the -devel subpackage - back down to the earlier version of the patch for #551764; the backported alternate version was incomplete- use %global instead of %define - pull up proposed patch for creating previously-not-there lock files for kdb databases when 'kdb5_util' is called to 'load' (#551764)- fix conditional for future RHEL- add upstream patch for KDC crash during referral processing (CVE-2009-3295), via Tom Yu (#545002)- refresh patch for #542868 from trunk- move man pages that live in the -libs subpackage into the regular %{_mandir} tree where they'll still be found if that package is the only one installed (#529319)- and put it back in- back that last change out- try to make gss_krb5_copy_ccache() work correctly for spnego (#542868)- make krb5-config suppress CFLAGS output when called with --libs (#544391)- ksu: move account management checks to before we drop privileges, like su does (#540769) - selinux: set the user part of file creation contexts to match the current context instead of what we looked up - configure with --enable-dns-for-realm instead of --enable-dns, which isn't recognized any more- move /etc/pam.d/ksu from krb5-workstation-servers to krb5-workstation, where it's actually needed (#538703)- add some conditional logic to simplify building on older Fedora releases- don't forget the README- specify the location of the subsystem lock when using the status() function in the kadmind and kpropd init scripts, so that we get the right error when we're dead but have a lock file - requires initscripts 8.99 (#521772)- if the init script fails to start krb5kdc/kadmind/kpropd because it's already running (according to status()), return 0 (part of #521772)- work around a compile problem with new openssl- rebuilt with new openssl- Rebuilt for https://fedoraproject.org/wiki/Fedora_12_Mass_Rebuild- rebuild to pick up the current forms of various patches- simplify the man pages patch by only preprocessing the files we care about and moving shared configure.in logic into a shared function - catch the case of ftpd printing file sizes using %i, when they might be bigger than an int now- try to merge and clean up all the large file support for ftp and rcp - ftpd no longer prints a negative length when sending a large file from a 32-bit host- pam_rhosts_auth.so's been gone, use pam_rhosts.so instead- switch buildrequires: and requires: on e2fsprogs-devel into buildrequires: and requires: on libss-devel, libcom_err-devel, per sandeen on fedora-devel-list- fix a type mismatch in krb5_copy_error_message() - ftp: fix some odd use of strlen() - selinux labeling: use selabel_open() family of functions rather than matchpathcon(), bail on it if attempting to get the mutex lock fails- compile with %{?_smp_mflags} (Steve Grubb) - drop the bit where we munge part of the error table header, as it's not needed any more- add and own %{_libdir}/krb5/plugins/authdata- update to 1.7 - no need to work around build issues with ASN1BUF_OMIT_INLINE_FUNCS - configure recognizes --enable/--disable-pkinit now - configure can take --disable-rpath now - no more libdes425, krb524d, krb425.info - kadmin/k5srvutil/ktutil are user commands now - new kproplog - FAST encrypted-challenge plugin is new - drop static build logic - drop pam_krb5-specific configuration from the default krb5.conf - drop only-use-v5 flags being passed to various things started by xinetd - put %{krb5prefix}/sbin in everyone's path, too (#504525)- add an auth stack to ksu's PAM configuration so that pam_setcred() calls won't just fail- make PAM support for ksu also set PAM_RUSER- extend PAM support to ksu: perform account and session management for the target user - pull up and merge James Leddy's changes to also set PAM_RHOST in PAM-aware network-facing services- fix a typo in a ksu error message (Marek Mahut) - "rev" works the way the test suite expects now, so don't disable tests that use it- add LSB-style init script info- explicitly run the pdf generation script using sh (part of #225974)- add patches for read overflow and null pointer dereference in the implementation of the SPNEGO mechanism (CVE-2009-0844, CVE-2009-0845) - add patch for attempt to free uninitialized pointer in libkrb5 (CVE-2009-0846) - add patch to fix length validation bug in libkrb5 (CVE-2009-0847) - put the krb5-user .info file into just -workstation and not also -workstation-clients- turn off krb4 support (it won't be part of the 1.7 release, but do it now) - use triggeruns to properly shut down and disable krb524d when -server and -workstation-servers gets upgraded, because it's gone now - move the libraries to /%{_lib}, but leave --libdir alone so that plugins get installed and are searched for in the same locations (#473333) - clean up buildprereq/prereqs, explicit mktemp requires, and add the ldconfig for the -server-ldap subpackage (part of #225974) - escape possible macros in the changelog (part of #225974) - fixup summary texts (part of #225974) - take the execute bit off of the protocol docs (part of #225974) - unflag init scripts as configuration files (part of #225974) - make the kpropd init script treat 'reload' as 'restart' (part of #225974)- libgssapi_krb5: backport fix for some errors which can occur when we fail to set up the server half of a context (CVE-2009-0845)- Rebuilt for https://fedoraproject.org/wiki/Fedora_11_Mass_Rebuild- rebuild- if we successfully change the user's password during an attempt to get initial credentials, but then fail to get initial creds from a non-master using the new password, retry against the master (#432334)- fix license tag- clear fuzz out of patches, dropping a man page patch which is no longer necessary - quote %{__cc} where needed because it includes whitespace now - define ASN1BUF_OMIT_INLINE_FUNCS at compile-time (for now) to keep building- build with -fno-strict-aliasing, which is needed because the library triggers these warnings - don't forget to label principal database lock files - fix the labeling patch so that it doesn't break bootstrapping- generate src/include/krb5/krb5.h before building - fix conditional for sparcv9- ftp: use the correct local filename during mget when the 'case' option is enabled (#442713)- stop exporting kadmin keys to a keytab file when kadmind starts -- the daemon's been able to use the database directly for a long long time now - belatedly add aes128,aes256 to the default set of supported key types- libgssapi_krb5: properly export the acceptor subkey when creating a lucid context (Kevin Coffman, via the nfs4 mailing list)- add fixes from MITKRB5-SA-2008-001 for use of null or dangling pointer when v4 compatibility is enabled on the KDC (CVE-2008-0062, CVE-2008-0063, - add fixes from MITKRB5-SA-2008-002 for array out-of-bounds accesses when high-numbered descriptors are used (CVE-2008-0947, #433596) - add backport bug fix for an attempt to free non-heap memory in libgssapi_krb5 (CVE-2007-5901, #415321) - add backport bug fix for a double-free in out-of-memory situations in libgssapi_krb5 (CVE-2007-5971, #415351)- rework file labeling patch to not depend on fragile preprocessor trickery, in another attempt at fixing #428355 and friends- ftp: add patch to fix "runique on" case when globbing fixes applied - stop adding a redundant but harmless call to initialize the gssapi internals- add patch to suppress double-processing of /etc/krb5.conf when we build with --sysconfdir=/etc, thereby suppressing double-logging (#231147)- remove a patch, to fix problems with interfaces which are "up" but which have no address assigned, which conflicted with a different fix for the same problem in 1.5 (#200979)- ftp: don't lose track of a descriptor on passive get when the server fails to open a file- in login, allow PAM to interact with the user when they've been strongly authenticated - in login, signal PAM when we're changing an expired password that it's an expired password, so that when cracklib flags a password as being weak it's treated as an error even if we're running as root- drop netdb patch - kdb_ldap: add patch to treat 'nsAccountLock: true' as an indication that the DISALLOW_ALL_TIX flag is set on an entry, for better interop with Fedora, Netscape, Red Hat Directory Server (Simo Sorce)- patch to avoid depending on to define NI_MAXHOST and NI_MAXSERV- enable patch for key-expiration reporting - enable patch to make kpasswd fall back to TCP if UDP fails (#251206) - enable patch to make kpasswd use the right sequence number on retransmit - enable patch to allow mech-specific creds delegated under spnego to be found when searching for creds- some init script cleanups - drop unquoted check and silent exit for "$NETWORKING" (#426852, #242502) - krb524: don't barf on missing database if it looks like we're using kldap, same as for kadmin - return non-zero status for missing files which cause startup to fail (#242502)- allocate space for the nul-terminator in the local pathname when looking up a file context, and properly free a previous context (Jose Plans, #426085)- rebuild- update to 1.6.3, dropping now-integrated patches for CVE-2007-3999 and CVE-2007-4000 (the new pkinit module is built conditionally and goes into the -pkinit-openssl package, at least for now, to make a buildreq loop with openssl avoidable)- make proper use of pam_loginuid and pam_selinux in rshd and ftpd- make krb5.conf %verify(not md5 size mtime) in addition to %config(noreplace), like /etc/nsswitch.conf (#329811)- apply the fix for CVE-2007-4000 instead of the experimental patch for setting ok-as-delegate flags- move the db2 kdb plugin from -server to -libs, because a multilib libkdb might need it- also perform PAM session and credential management when ftpd accepts a client using strong authentication, missed earlier - also label kadmind log files and files created by the db2 plugin- incorporate updated fix for CVE-2007-3999 (CVE-2007-4743) - fix incorrect call to "test" in the kadmin init script (#252322,#287291)- incorporate fixes for MITKRB5-SA-2007-006 (CVE-2007-3999, CVE-2007-4000)- cover more cases in labeling files on creation - add missing gawk build dependency- rebuild- kdc.conf: default to listening for TCP clients, too (#248415)- update to 1.6.2 - add "buildrequires: texinfo-tex" to get texi2pdf- incorporate fixes for MITKRB5-SA-2007-004 (CVE-2007-2442,CVE-2007-2443) and MITKRB5-SA-2007-005 (CVE-2007-2798)- reintroduce missing %postun for the non-split_workstation case- rebuild- rebuild- add missing pam-devel build requirement, force selinux-or-fail build- rebuild- label all files at creation-time according to the SELinux policy (#228157)- perform PAM account / session management in krshd (#182195,#195922) - perform PAM authentication and account / session management in ftpd - perform PAM authentication, account / session management, and password- changing in login.krb5 (#182195,#195922)- preprocess kerberos.ldif into a format FDS will like better, and include that as a doc file as well- switch man pages to being generated with the right paths in them - drop old, incomplete SELinux patch - add patch from Greg Hudson to make srvtab routines report missing-file errors at same point that keytab routines do (#241805)- pull patch from svn to undo unintentional chattiness in ftp - pull patch from svn to handle NULL krb5_get_init_creds_opt structures better in a couple of places where they're expected- update to 1.6.1 - drop no-longer-needed patches for CVE-2007-0956,CVE-2007-0957,CVE-2007-1216 - drop patch for sendto bug in 1.6, fixed in 1.6.1- kadmind.init: don't fail outright if the default principal database isn't there if it looks like we might be using the kldap plugin - kadmind.init: attempt to extract the key for the host-specific kadmin service when we try to create the keytab- omit dependent libraries from the krb5-config --libs output, as using shared libraries (no more static libraries) makes them unnecessary and they're not part of the libkrb5 interface (patch by Rex Dieter, #240220) (strips out libkeyutils, libresolv, libdl)- pull in keyutils as a build requirement to get the "KEYRING:" ccache type, because we've merged- fix an uninitialized length value which could cause a crash when parsing key data coming from a directory server - correct a typo in the krb5.conf man page ("ldap_server"->"ldap_servers")- move the default acl_file, dict_file, and admin_keytab settings to the part of the default/example kdc.conf where they'll actually have an effect (#236417)- merge security fixes from RHSA-2007:0095- add patch to correct unauthorized access via krb5-aware telnet daemon (#229782, CVE-2007-0956) - add patch to fix buffer overflow in krb5kdc and kadmind (#231528, CVE-2007-0957) - add patch to fix double-free in kadmind (#231537, CVE-2007-1216)- back out buildrequires: keyutils-libs-devel for now- add buildrequires: on keyutils-libs-devel to enable use of keyring ccaches, dragging keyutils-libs in as a dependency- fix bug ID in changelog* Thu Mar 15 2007 Nalin Dahyabhai 1.5-21 - add preliminary patch to fix buffer overflow in krb5kdc and kadmind (#231528, CVE-2007-0957) - add preliminary patch to fix double-free in kadmind (#231537, CVE-2007-1216)- add patch to build semi-useful static libraries, but don't apply it unless we need them- temporarily back out %post changes, fix for #143289 for security update - add preliminary patch to correct unauthorized access via krb5-aware telnet- make profile.d scriptlets mode 644 instead of 755 (part of #225974)- clean up quoting of command-line arguments passed to the krsh/krlogin wrapper scripts- initial update to 1.6, pre-package-reorg - move workstation daemons to a new subpackage (#81836, #216356, #217301), and make the new subpackage require xinetd (#211885)- make use of install-info more failsafe (Ville Skyttä, #223704) - preserve timestamps on shell scriptlets at %install-time- move to using pregenerated PDF docs to cure multilib conflicts (#222721)- update backport of the preauth module interface (part of #194654)- apply fixes from Tom Yu for MITKRB5-SA-2006-002 (CVE-2006-6143) (#218456) - apply fixes from Tom Yu for MITKRB5-SA-2006-003 (CVE-2006-6144) (#218456)- update backport of the preauth module interface- update backport of the preauth module interface - add proposed patches 4566, 4567 - add proposed edata reporting interface for KDC - add temporary placeholder for module global context fixes- don't bail from the KDC init script if there's no database, it may be in a different location than the default (fenlason) - remove the [kdc] section from the default krb5.conf -- doesn't seem to have been applicable for a while- rename krb5.sh and krb5.csh so that they don't overlap (#210623) - way-late application of added error info in kadmind.init (#65853)- add backport of in-development preauth module interface (#208643)- provide docs in PDF format instead of as tex source (Enrico Scholz, #209943)- add missing shebang headers to krsh and krlogin wrapper scripts (#209238)- set SS_LIB at configure-time so that libss-using apps get working readline support (#197044)- switch to the updated patch for MITKRB-SA-2006-001- apply patch to address MITKRB-SA-2006-001 (CVE-2006-3084)- ensure that the gssapi library's been initialized before walking the internal mechanism list in gss_release_oid(), needed if called from gss_release_name() right after a gss_import_name() (#198092)- rebuild- pull up latest revision of patch to reduce lockups in rsh/rshd- rebuild- rebuild- build- update to 1.5- mark profile.d config files noreplace (Laurent Rineau, #196447)- add buildprereq for autoconf- further munge krb5-config so that 'libdir=/usr/lib' is given even on 64-bit architectures, to avoid multilib conflicts; other changes will conspire to strip out the -L flag which uses this, so it should be harmless (#192692)- adjust the patch which removes the use of rpath to also produce a krb5-config which is okay in multilib environments (#190118) - make the name-of-the-tempfile comment which compile_et adds to error code headers always list the same file to avoid conflicts on multilib installations - strip SIZEOF_LONG out of krb5.h so that it doesn't conflict on multilib boxes - strip GSS_SIZEOF_LONG out of gssapi.h so that it doesn't conflict on mulitlib boxes- Fix formatting typo in kinit.1 (krb5-kinit-man-typo.patch)- bump again for double-long bug on ppc(64)- give a little bit more information to the user when kinit gets the catch-all I/O error (#180175)- rebuild properly when pthread_mutexattr_setrobust_np() is defined but not declared, such as with recent glibc when _GNU_SOURCE isn't being used- Use full paths in krb5.sh to avoid path lookups- rebuilt- login: don't truncate passwords before passing them into crypt(), in case they're significant (#149476)- update to 1.4.3 - make ksu setuid again (#137934, others)- mark %{krb5prefix}/man so that files which are packaged within it are flagged as %doc (#168163)- add an xinetd configuration file for encryption-only telnetd, parallelling the kshell/ekshell pair (#167535)- change the default configured encryption type for KDC databases to the compiled-in default of des3-hmac-sha1 (#57847)- update to 1.4.2, incorporating the fixes for MIT-KRB5-SA-2005-002 and MIT-KRB5-SA-2005-003- rebuild- fix telnet client environment variable disclosure the same way NetKit's telnet client did (CAN-2005-0488) (#159305) - keep apps which call krb5_principal_compare() or krb5_realm_compare() with malformed or NULL principal structures from crashing outright (Thomas Biege) (#161475)- apply fixes from draft of MIT-KRB5-SA-2005-002 (CAN-2005-1174,CAN-2005-1175) (#157104) - apply fixes from draft of MIT-KRB5-SA-2005-003 (CAN-2005-1689) (#159755)- fix double-close in keytab handling - add port of fixes for CAN-2004-0175 to krb5-aware rcp (#151612)- prevent spurious EBADF in krshd when stdin is closed by the client while the command is running (#151111)- add deadlock patch, removed old patch- update to 1.4.1, incorporating fixes for CAN-2005-0468 and CAN-2005-0469 - when starting the KDC or kadmind, if KRB5REALM is set via the /etc/sysconfig file for the service, pass it as an argument for the -r flag- drop krshd patch for now- add draft fix from Tom Yu for slc_add_reply() buffer overflow (CAN-2005-0469) - add draft fix from Tom Yu for env_opt_add() buffer overflow (CAN-2005-0468)- don't include into the telnet client when we're not using curses- update to 1.4 - v1.4 kadmin client requires a v1.4 kadmind on the server, or use the "-O" flag to specify that it should communicate with the server using the older protocol - new libkrb5support library - v5passwdd and kadmind4 are gone - versioned symbols - pick up $KRB5KDC_ARGS from /etc/sysconfig/krb5kdc, if it exists, and pass it on to krb5kdc - pick up $KADMIND_ARGS from /etc/sysconfig/kadmin, if it exists, and pass it on to kadmind - pick up $KRB524D_ARGS from /etc/sysconfig/krb524, if it exists, and pass it on to krb524d *instead of* "-m" - set "forwardable" in [libdefaults] in the default krb5.conf to match the default setting which we supply for pam_krb5 - set a default of 24h for "ticket_lifetime" in [libdefaults], reflecting the compiled-in default- rebuild- rebuild- update to 1.3.6, which includes the previous fix- apply fix from Tom Yu for MITKRB5-SA-2004-004 (CAN-2004-1189)- fix deadlock during file transfer via rsync/krsh - thanks goes to James Antill for hint- rebuild- fix predictable-tempfile-name bug in krb5-send-pr (CAN-2004-0971, #140036)- silence compiler warning in kprop by using an in-memory ccache with a fixed name instead of an on-disk ccache with a name generated by tmpnam()- fix globbing patch port mode (#139075)- fix segfault in telnet due to incorrect checking of gethostbyname_r result codes (#129059)- remove rc4-hmac:norealm and rc4-hmac:onlyrealm from the default list of supported keytypes in kdc.conf -- they produce exactly the same keys as rc4-hmac:normal because rc4 string-to-key ignores salts - nuke kdcrotate -- there are better ways to balance the load on KDCs, and the SELinux policy for it would have been scary-looking - update to 1.3.5, mainly to include MITKRB5SA 2004-002 and 2004-003- rebuild- rebuild- incorporate revised fixes from Tom Yu for CAN-2004-0642, CAN-2004-0644, CAN-2004-0772- rebuild- incorporate fixes from Tom Yu for CAN-2004-0642, CAN-2004-0772 (MITKRB5-SA-2004-002, #130732) - incorporate fixes from Tom Yu for CAN-2004-0644 (MITKRB5-SA-2004-003, #130732)- fix indexing error in server sorting patch (#127336)- rebuilt- update to 1.3.4 final- update to 1.3.4 beta1 - remove MITKRB5-SA-2004-001, included in 1.3.4- rebuild- rebuild- apply updated patch from MITKRB5-SA-2004-001 (revision 2004-06-02)- rebuild- apply patch from MITKRB5-SA-2004-001 (#125001)- removed rpath- re-enable large file support, fell out in 1.3-1 - patch rcp to use long long and %lld format specifiers when reporting file sizes on large files- update to 1.3.3- update to 1.3.2- rebuild- rebuilt- rebuilt- catch krb4 send_to_kdc cases in kdc preference patch- remove patch to set TERM in klogind which, combined with the upstream fix in 1.3.1, actually produces the bug now (#114762)- when iterating over lists of interfaces which are "up" from getifaddrs(), skip over those which have no address (#113347)- prefer the kdc which last replied to a request when sending requests to kdcs- fix combination of --with-netlib and --enable-dns (#82176)- remove libdefault ticket_lifetime option from the default krb5.conf, it is ignored by libkrb5- fix bug in patch to make rlogind start login with a clean environment a la netkit rlogin, spotted and fixed by Scott McClung- include profile.d scriptlets in krb5-devel so that krb5-config will be in the path if krb5-workstation isn't installed, reported by Kir Kolyshkin- add more etypes (arcfour) to the default enctype list in kdc.conf - don't apply previous patch, refused upstream- fix 32/64-bit bug storing and retrieving the issue_date in v4 credentials- Don't check for write access on /etc/krb5.conf if SELinux- fixup some int/pointer varargs wackiness- rebuild- update to 1.3.1- pull fix for non-compliant encoding of salt field in etype-info2 preauth data from 1.3.1 beta 1, until 1.3.1 is released.- update to 1.3- correctly use stdargs- test update to 1.3 beta 4 - ditch statglue build option - krb5-devel requires e2fsprogs-devel, which now provides libss and libcom_err- rebuilt- gcc 3.3 doesn't implement varargs.h, include stdarg.h instead- update to 1.2.8- fix double-free of enc_part2 in krb524d- update to latest patch kit for MITKRB5-SA-2003-004- add patch included in MITKRB5-SA-2003-003 (CAN-2003-0028)- add patches from patchkit from MITKRB5-SA-2003-004 (CAN-2003-0138 and CAN-2003-0139)- rebuild- fix buffer underrun in unparsing certain principals (CAN-2003-0082)- add patch to document the reject-bad-transited option in kdc.conf- add patch to fix server-side crashes when principals have no components (CAN-2003-0072)- add patch from Mark Cox for exploitable bugs in ftp client- rebuilt- use PICFLAGS when building code from the ktany patch- debloat- include .so.* symlinks as well as .so.*.*- always #include to access errno, never do it directly - enable LFS on a bunch of other 32-bit arches- increase the maximum name length allowed by kuserok() to the higher value used in development versions- install src/krb524/README as README.krb524 in the -servers package, includes information about converting for AFS principals- update to 1.2.7 - disable use of tcl- update to 1.2.7-beta2 (internal only, not for release), dropping dnsparse and kadmind4 fixes- add patch for buffer overflow in kadmind4 (not used by default)- drop a hunk from the dnsparse patch which is actually redundant (thanks to Tom Yu)- patch to handle truncated dns responses- remove hashless key types from the default kdc.conf, they're not supposed to be there, noted by Sam Hartman on krbdev- update to 1.2.6- use %{_lib} for the sake of multilib systems- add patch from Tom Yu for exploitable bugs in rpc code used in kadmind- fix bug in krb5.csh which would cause the path check to always succeed- build even libdb.a with -fPIC and $RPM_OPT_FLAGS.- automated rebuild- automated rebuild- update to 1.2.5 - disable statglue- update to 1.2.4- rebuild in new environment - reenable statglue- prereq chkconfig for the server subpackage- build without -g3, which gives us large static libraries in -devel- reintroduce ld.so.conf munging in the -libs %post- rename the krb5 package back to krb5-libs; the previous rename caused something of an uproar - update to 1.2.3, which includes the FTP and telnetd fixes - configure without --enable-dns-for-kdc --enable-dns-for-realm, which now set the default behavior instead of enabling the feature (the feature is enabled by --enable-dns, which we still use) - reenable optimizations on Alpha - support more encryption types in the default kdc.conf (heads-up from post to comp.protocols.kerberos by Jason Heiss)- rename the krb5-libs package to krb5 (naming a subpackage -libs when there is no main package is silly) - move defaults for PAM to the appdefaults section of krb5.conf -- this is the area where the krb5_appdefault_* functions look for settings) - disable statglue (warning: breaks binary compatibility with previous packages, but has to be broken at some point to work correctly with unpatched versions built with newer versions of glibc)- bump release number and rebuild- add patch to fix telnetd vulnerability- tweak statglue.c to fix stat/stat64 aliasing problems - be cleaner in use of gcc to build shlibs- use gcc to build shared libraries- add patch to support "ANY" keytab type (i.e., "default_keytab_name = ANY:FILE:/etc/krb5.keytab,SRVTAB:/etc/srvtab" patch from Gerald Britton, #42551) - build with -D_FILE_OFFSET_BITS=64 to get large file I/O in ftpd (#30697) - patch ftpd to use long long and %lld format specifiers to support the SIZE command on large files (also #30697) - don't use LOG_AUTH as an option value when calling openlog() in ksu (#45965) - implement reload in krb5kdc and kadmind init scripts (#41911) - lose the krb5server init script (not using it any more)- Bump release + rebuild.- pass some structures by address instead of on the stack in krb5kdc- rebuild in new environment- add patch from Tom Yu to fix ftpd overflows (#37731)- disable optimizations on the alpha again- add in glue code to make sure that libkrb5 continues to provide a weak copy of stat()- build alpha with -O0 for now- fix the kpropd init script- update to 1.2.2, which fixes some bugs relating to empty ETYPE-INFO - re-enable optimization on Alpha- build alpha with -O0 for now - own %{_var}/kerberos- own the directories which are created for each package (#26342)- gettextize init scripts- add some comments to the ksu patches for the curious - re-enable optimization on alphas- fix krb5-send-pr (#18932) and move it from -server to -workstation - buildprereq libtermcap-devel - temporariliy disable optimization on alphas - gettextize init scripts- force -fPIC- rebuild in new environment- add bison as a BuildPrereq (#20091)- change /usr/dict/words to /usr/share/dict/words in default kdc.conf (#20000)- apply kpasswd bug fixes from David Wragg- make krb5-libs obsolete the old krb5-configs package (#18351) - don't quit from the kpropd init script if there's no principal database so that you can propagate the first time without running kpropd manually - don't complain if /etc/ld.so.conf doesn't exist in the -libs %post- fix credential forwarding problem in klogind (goof in KRB5CCNAME handling) (#11588) - fix heap corruption bug in FTP client (#14301)- fix summaries and descriptions - switched the default transfer protocol from PORT to PASV as proposed on bugzilla (#16134), and to match the regular ftp package's behavior- rebuild to compress man pages.- move initscript back- disable servers by default to keep linuxconf from thinking they need to be started when they don't- automatic rebuild- change cleanup code in post to not tickle chkconfig - add grep as a Prereq: for -libs- move condrestarts to postun - make xinetd configs noreplace - add descriptions to xinetd configs - add /etc/init.d as a prereq for the -server package - patch to properly truncate $TERM in krlogind- update to 1.2.1 - back out Tom Yu's patch, which is a big chunk of the 1.2 -> 1.2.1 update - start using the official source tarball instead of its contents- Tom Yu's patch to fix compatibility between 1.2 kadmin and 1.1.1 kadmind - pull out 6.2 options in the spec file (sonames changing in 1.2 means it's not compatible with other stuff in 6.2, so no need)- tweak graceful start/stop logic in post and preun- update to the 1.2 release - ditch a lot of our patches which went upstream - enable use of DNS to look up things at build-time - disable use of DNS to look up things at run-time in default krb5.conf - change ownership of the convert-config-files script to root.root - compress PS docs - fix some typos in the kinit man page - run condrestart in server post, and shut down in preun- only remove old krb5server init script links if the init script is there- disable kshell and eklogin by default- patch mkdir/rmdir problem in ftpcmd.y - add condrestart option to init script - split the server init script into three pieces and add one for kpropd- make sure workstation servers are all disabled by default - clean up krb5server init script- apply second set of buffer overflow fixes from Tom Yu - fix from Dirk Husung for a bug in buffer cleanups in the test suite - work around possibly broken rev binary in running test suite - move default realm configs from /var/kerberos to %{_var}/kerberos- make ksu and v4rcp owned by root- use %{_infodir} to better comply with FHS - move .so files to -devel subpackage - tweak xinetd config files (bugs #11833, #11835, #11836, #11840) - fix package descriptions again- change a LINE_MAX to 1024, fix from Ken Raeburn - add fix for login vulnerability in case anyone rebuilds without krb4 compat - add tweaks for byte-swapping macros in krb.h, also from Ken - add xinetd config files - make rsh and rlogin quieter - build with debug to fix credential forwarding - add rsh as a build-time req because the configure scripts look for it to determine paths- fix config_subpackage logic- remove setuid bit on v4rcp and ksu in case the checks previously added don't close all of the problems in ksu - apply patches from Jeffrey Schiller to fix overruns Chris Evans found - reintroduce configs subpackage for use in the errata - add PreReq: sh-utils- fix double-free in the kdc (patch merged into MIT tree) - include convert-config-files script as a documentation file- patch ksu man page because the -C option never works - add access() checks and disable debug mode in ksu - modify default ksu build arguments to specify more directories in CMD_PATH and to use getusershell()- fix configure stuff for ia64- add LDCOMBINE=-lc to configure invocation to use libc versioning (bug #10653) - change Requires: for/in subpackages to include %{version}- add man pages for kerberos(1), kvno(1), .k5login(5) - add kvno to -workstation- Merge krb5-configs back into krb5-libs. The krb5.conf file is marked as a %config file anyway. - Make krb5.conf a noreplace config file.- Make klogind pass a clean environment to children, like NetKit's rlogind does.- Don't enable the server by default. - Compress info pages. - Add defaults for the PAM module to krb5.conf- Correct copyright: it's exportable now, provided the proper paperwork is filed with the government.- apply Mike Friedman's patch to fix format string problems - don't strip off argv[0] when invoking regular rsh/rlogin- run kadmin.local correctly at startup- pass absolute path to kadm5.keytab if/when extracting keys at startup- fix info page insertions- tweak server init script to automatically extract kadm5 keys if /var/kerberos/krb5kdc/kadm5.keytab doesn't exist yet - adjust package descriptions- fix for potentially gzipped man pages- fix comments in krb5-configs- move /usr/kerberos/bin to end of PATH- install kadmin header files- patch around TIOCGTLC defined on alpha and remove warnings from libpty.h - add installation of info docs - remove krb4 compat patch because it doesn't fix workstation-side servers- remove hesiod dependency at build-time- rebuild on 1.1.1- clean up init script for server, verify that it works [jlkatz] - clean up rotation script so that rc likes it better - add clean stanza- backed out ncurses and makeshlib patches - update for krb5-1.1 - add KDC rotation to rc.boot, based on ideas from Michael's C version- added -lncurses to telnet and telnetd makefiles- added krb5.csh and krb5.sh to /etc/profile.d- broke out configuration files- fixed server package so that it works now- started changelog (previous package from zedz.net) - updated existing 1.0.5 RPM from Eos Linux to krb5 1.0.6 - added --force to makeinfo commands to skip errors during build  !"#$%&'()*+,-./0123456789:;<=>?@ABCDE1.15.1-19.el71.15.1-19.el71.15.11.15.11.15.11.15.11.15.11.15.11.15.11.15.1 gss-clientkrb5-configsim_clientuuclientgssapigssapi.hgssapi.hgssapi_ext.hgssapi_generic.hgssapi_krb5.hmechglue.hgssrpcauth.hauth_gss.hauth_gssapi.hauth_unix.hclnt.hnetdb.hpmap_clnt.hpmap_prot.hpmap_rmt.hrename.hrpc.hrpc_msg.hsvc.hsvc_auth.htypes.hxdr.hkadm5admin.hchpass_util_strings.hkadm_err.hkdb.hkrad.hkrb5krb5.hccselect_plugin.hcertauth_plugin.hclpreauth_plugin.hhostrealm_plugin.hkadm5_hook_plugin.hkdcpolicy_plugin.hkdcpreauth_plugin.hkrb5.hlocalauth_plugin.hlocate_plugin.hplugin.hpreauth_plugin.hpwqual_plugin.hprofile.hlibgssapi_krb5.solibgssrpc.solibk5crypto.solibkdb5.solibkrad.solibkrb5.solibkrb5support.sogssrpc.pckadm-client.pckadm-server.pckdb.pckrb5-gssapi.pckrb5.pcmit-krb5-gssapi.pcmit-krb5.pcgss-serversim_serveruuserverkrb5-config.1.gz/usr/bin//usr/include//usr/include/gssapi//usr/include/gssrpc//usr/include/kadm5//usr/include/krb5//usr/lib64//usr/lib64/pkgconfig//usr/sbin//usr/share/man/man1/-O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mtune=genericdrpmxz2x86_64-redhat-linux-gnu ELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked (uses shared libs), for GNU/Linux 2.6.32, BuildID[sha1]=81e4e704adbd20fe4353d17b789f55fe1b00b103, strippedPOSIX shell script, ASCII text executableELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked (uses shared libs), for GNU/Linux 2.6.32, BuildID[sha1]=e7a8a855758a08f1362828dabd95224dc2dff585, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked (uses shared libs), for GNU/Linux 2.6.32, BuildID[sha1]=4d5cab546ef4018fb2a86ea56888796ac110783f, strippeddirectoryC source, ASCII textASCII textC source, UTF-8 Unicode textpkgconfig fileELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked (uses shared libs), for GNU/Linux 2.6.32, BuildID[sha1]=f483559629ce196b7f3cc8b092be5ba86ee7e233, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked (uses shared libs), for GNU/Linux 2.6.32, BuildID[sha1]=8eabe42bc5b3ff26607374b46eaa5f6ab8c8eeac, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked (uses shared libs), for GNU/Linux 2.6.32, BuildID[sha1]=3dcf1f8a43ba92312acbc96c6bb5ea0b0547f6d3, strippedtroff or preprocessor input, ASCII text, with very long lines (gzip compressed data, from Unix, max compression) ./0123458<@EHKNPbo RRR RR RRRRR RRRRR RR$RR R RRRRR RRRRR RR$RR R RRRR RRRRR RR$RRRRRRRPRR PRR RPRRR PRR RRPRR PRRP RRPRRRR RRR RRRRR RRRRR RR$RR RRRR RRRRR RR$R R RRRRR RRRRR RR$?7zXZ !#,Vqe]"k%nyv^D(nm&?i|}CwͼRW&/ @#Q^t:6 x81HOz pVӷ]|a:]ܦm=Em Yޔ%7Gۀ:GVB"}eQÓ+T[; l46`BMى<}4ldv"__0Z2+G<6_֨r߅OC-]$69*ꟍ_Is/ju~*ypX[DzO^-[Hnﶧx^5sRTF䡯UDʻ*K*F^%`J^bZ${nO̾fT9C@VZ &;I*=мN;-_\ vRYCF0UJJZ&QZT?w5@%F^* "d+I(6K$(w֐$(5eN@)+ۺm?@^rdO)J#ʤo3 {29@iO eADbF'a 2Eqo uq. dhLigϠ'7άp;kC-mBH/ֲxu2{ICgTG;X8_R8#c },l:OHYFpRp(A%K&S,ܨrm\Rʳǭ2LlWQ _9w2aR~t+_a #q7~&Uf+}b&EhJ"jx~F>,N n(v~EE P^7 Wݖ >ݼ,9S%l-AJ39ӾHOvs2" %*ފ??yJ|VUٷDyT i)lQGc L5vRgGA$'ӥ?!}D]Gc☳VH_[zip92kRH:̭IY~W=cvAZ!HfL8aMb,)"+*ݫ-AM䞚YgGQef;7:?H5&X]݂mJHx]߶<ȯtP>=L,Aq6Ľp+Jr RnVն-s.ˊ}X"_Ө@bÚd!5+pP |T@Z k_z z?<#1Fit%_#.rC+ذQP͍+{B!(6F`{]@aN.09ˠO]pz𣘚IjUF| l49.p XI1@;|.^kЌ8ȄtqIH`34_@UEL){Fތkњ<uV*ԄeRRd; ߘY6!2{qV KtWGG65u6‫rJ]~$-V-NNKM/=3;l@:ih >j̘㡕܄wge0D(mzә޹:g#ġ߽߅#L~4%߼@=>pB@>ı$2"钚o.l9/K߰PӍ6\{e9a  Џ\ecgx땂r]ڠMbGl9  O%~=uE1|jI*~Cb09%x9BRipk,(9$7J&^?[ OU4 9 N'tx04,YnP@ٮ vyѬD'^%4N!iz?7d6LE>GH=xDr[YFكa5vEEڕ2,ݥfm qRCBld[@Hp<$)՟/~˭v촄K͑fоYw|tsBN1,pUAcm%(Kq٨/#؋#c~ C$W@(gqE@>L&xjdt{ҽe}x̼GfhkAtxp,C("ݲZ=+c\J!E]z|d\@Q8'f G$FGՊ³V3B!p}^ccQB$Eĩ3f,p9p:(Wo`]7telzDړ:CX0W4H%;h')iCr.&IF/ЁR҄yD]=p˱B&4b)ҝ6IT-}Ex3t)GHSDa/i,fA¡FH:MDp S>0;R]4ߎUFg{xo%">43.` agFKN+XZc-)ff9ayJ!ݹRYRV`!]Ɉg¿xCBg+ N7ʸV.iSO7TBe~,bCN50 )[I|Cx9?bSt#7bkwJ^U0kKJWyG_MQxicZP.S1ʖoMu߾%c:Xz#/MƕkȣNtX8C2|aXUT Yѐަ}P頽P0!!kM,dOX\2HgҫPsڇB´؍⌇1S2qT%^JzJ(P 資skIh*/OmkV̎J:kD \8m6>Ҏ ]2d4vN!&<Ό,#l1l$&z\[Lk{ "US 0cJpn&S"hܵ^.d3z Z`B~rDOF+2^X y)0wqzధʊ~WHbK|" w7kkbvqBZp.Y섫Шia+=>FE[D5 uh6Mu% ^kARID'xc #`9'^'=Fs[ g^qPYh^,Df9,nuyWo8 -^vZ~&{RZh||^zgA4;;:Kc V4J7W,~]-J|ߜ:8`5jlg: 6tixZW~]O yp9*e᭩8*Gغ`nOrɛ_[HtS +v+f\Ҭ`f^zYWq^pϼ* 7Su'ajH)r,zl2Y)Ncɳ%'l-g} gBp qyNM>bE pਐ@O ZROz79Ek;vEX๱$I-+ϼ G!"E/%;gExH4Dx`nl^';HjcO&jr.ntItWC<`t7=߭ ? H8tjy6PxGs ƈ='1x@XokZ ,'=ɚFn̝?y/dP5;8D@2f(6>LApI WdSJѶ!2=%%x5%C97 >)ZA!ޒhȲ;@nxCRhެZW{d5iF=ڡD='v\hH\HU}nzgvg1YЬ> kn#27E&=S?\܉aԍC3_|}c6$`W"k)Yߥ ),/4S,tEն$A8W}_)bXa-r?k;WwJ]8!5ɒI e|-/W9L *(w:e{p)ȯ8IU*C F<S"AaO5T OIC` 5-(>Ani#ɨVm%\/!&) > (3s/]`;ب_|~&D/S<(_:UKdlT_E_eЈ0o~g=ؘ '$L{-).wBMDQO0M7T9sP* I"% 0ECZl( IVwʚIZ<,ڸQMAhYuK8VOlvP 8(B_৾_\daMA{ݴG9@[~FvA F ŁqM|K IY;t$Q N~Rԗ1O06ݮPYgӆ6, -7h_@5o#-Oh, h5N!OA(}Q-_Go!l.?cQs۲r4Rxbw7;YXQKſ ]JXxN+>@P>/g9FvgBu5Lc,JI}Do՝@~A }`FwbX*nږ-sGg|>H7x!;0qb0(]jGD&~“bQJ =߱4אVL-b{y VdGԜA+] G_ FGzG8Eb1NA$]YrYk§ph`u^HшWO8׆Rn߁Ȭ+#;`% 34KNft4]NT~ P`5.]2& & Kb;uvNr""LUBm+nCZ KJl Dǘ; 6g]cݱ|mpHH7u7^^14Px|يN}Gw'](/6u(;+Tz$Ŭƫc@~27(;0Aw.ť#N:_k.Ɏd|WT U/Q7ߐl5` )¯kA RZ𲈽ySY5ÈdsJ%on5nh{8<eMa|C.2?ȕG٠}h8PZu-}p0"JR8T+ݭ}L3= qF^( . K祽HDJ_aQwSw d5%P,.G"4B@F9Ēj@qxлWiR,Y!=pVp+ɿ?ڐSddPK͝ 62R`X9*k1(J5EDp>X@R١E@G XgikZ09ռJX%a,2wk[H7yq^c+s:941Chٗ:AY:78+{ҘREC! 9Q], (IeH(3EZ8 ^= #mr .$'':̕A2)t[F߱>xTC6nc{2 CqhSLuz_*kڛBa l3Tp!@꾄8w6.g\:ua78Z pW_lRjXq?>P$j"."'$g[%t1!peR6چ>mԗKM\vdl [h؃_'i2'bK]مIQwDf/021F<@2ߝr,ʣ\ !1 j]90#Jc53clEX_Ј{*s6c PZ?.7,,mwYDQJ]*׿  #8cpvsd>Xٿ\\p]X(v5=w瑊L[J'L~əhBvߊfϱ}g=!㛩v+󐙯1?rqqmW ~uM&[b&B~ǓlO&n%:Zzç^ >73sl5)S.FE ǔJ#xKsKoN̸sv`%qYN(2Xan|i_喺qx;qbo/2 %%ӽ*kb4W Dp[[F^(uT H;^̻=L? y׽@'ϩT!X||FP&ٶĺfHǫ0&u=!tLѝ#6JXN@&jLAywVvk_f=\S|Z3YXH %hi6>gځv1>"Q*5W+3 օq1d`%)/{iѤ‰As2vݯb7+mWq}B\vG,J$Oňfhp_^KzB)'a»_c"SSJo &w<)> KG>,}rsJTӸP2uKAWDG8aQZ"Pm=m6qe`DE>UDE촭c]͘xi šYu=Śau{#5[?^@eAD"'G$Cq԰Z$N:}ٺv.REěK,hg{[/ԇ.&̓iM9J -5Ja%ی'ࣲ-9{Li~U)IWk_#. L*-BNRڂ}20,=OK%ZK=B!ːJ۶ZO! >ؗ(#/[&meTeJ묲jO=C,eV^Eip]h5S:i(PX!Bj.Bkd%J_8HžKAkԇP?,He~(Ї)< 6TO :f`bNC=5WjeA;)m̹;PWwzyBVWϧ/Us!2 Xw;)l"wpCӞ1)CDu`>i:):T4/foBSӨWӀcJa̒w" V&`l'HEv%pXUU`rRQHY|@;9W727m:Sfunf=PFg:Gk!hR{5V1]ߋJ2*jʊm*{{ (0=Q}\*3/ߍ1jU?ZNy1dKژa/`]YjN^@ h 7Eh[xM0F }}i&1wS$ j3+1bq{p?*֍[Xew'ړj Ei!>hhHN9i}>oj&Vhw?經N$2_e M{UHU6E0*<#*NB]ߋe/_T?87Db_<-36pje{laƖœ&?`jWtn tp#=C:wHm矔HIXٰ9}>J\؜H$ xT__t$\g"`OVVB(LLvKs/_<|$__*MMqbdJR0=!DHv$2 E6,mA=o'ˑ.^B*u-^rC;8+h x h[xuu*V6zƕ~P)a>"kݺDc(iHi<ZF%'rx(OhM"m0VRY3 V,qo7k'nq-PҍHTI!kQgЇ^k;HH~/{[J qPӾ#25W Zۄ7So0 -MV+ ^4 XFCKlo%Mc-0Ԁ#ڱW[V=):@DƴQͬY<|G/')E΍Ժ'Z2e X"^dV aAE 䎣/.mE[A;vI3kxTd(ަvw:M`Io Sx2TJ +wBb} yH$:A78)Qs?9J8C]oK̩` /_`ꏕH .|ˁ fQ Sna3ć#klN0ݍ51kGFeI-:jR'L[m,U$^:|ol~.E-|kq&7JE* kh`U\⚩3R#ͯ-׶k "3/,YQZgI`|PPQ&38:9Dď?F _MX^fbRjb>+1[:DX`(Z?:OM vI\~ބKZ\deK3!̱w? d.K|'6 Nih8<̬N5"e@dY@õnWs0gHC(ay:[`|&qL}9eyVsw-;;>qG `kF{ɽp&2 bNFk k 7* pOeudq0Ai&M; Je}HheBz[m ʷ![SG:ŝwrCNuzNFi[([*È)oeGGm 2?TД,K/3jlz^65-2"B#>E0IdmC%UyFB p(eMB#A^my~B>ʸ0we.d"`m\LAR8WHH^St F$ioL>i ʜeب&8IE1ݪQl^.Q$>ng֏kfbfM-M*rRKr3H>Eb~Żn=T)5 i^teyF8;7HS_?*"(L蟊mѼDW+=1 M̂.k}Z=130o b"~58L˻LF@o(Mv&|0P\ ew|-&YV_7Pj)'3&nކ@+WTvg(6F@ZE<.a.:EN8PU\p~zַj};(&u~>Lv:à$vmd>sUQG8F g!p]JB1PV ii)Z8pS ٱ],QFkIl$DEFHr(w9ݬ5Yq¢@X 2XoؕpA)2)Nat#hv&r(Xo °]_b+$sฬ]y;iaQy(a.+ca+D^ȟCi_v߬-+wʝ/<s*}`9:7ԓac )o* 4WlLV^7m˦_lI/>uXN=Q#PQxd meQtYU#mO1Bۗw9 =CU4+%S`؇I_[! g].?; ]) [TT +SR~j_twb8zV< 7곖&o?0s8ӲOĦxW^R<hH(.)|uqXXL+-EՑPJK*6 sřx/ʹxD[*yxղ zfض"Mv2'kg`jl۪R@S톔/u9>&Ʌ!>e 1Rki]CwQٶ#UxT>U_*+ y6]Wyt3ɤVOƇȧM墔#n (oI4n~E [v5 A@Wzh,$Pf10bk5bX[߳.jW)510߁[zX}3Ŕ)N`ҟV#SFd`D`XE=PdV֎tPR.^2a8I> O{sܭpͪ.<1yW΢C{UA؄[N;-== a".s;~te%z5|pTIMwa`Kw/a?/<5gX%Ν ?KElEVEwJ v၆u,ּcA`xLek{Q R3{mopt넏PRCQ/wk}(ֈP>.MOɤGpr/F6Ode=h<A3j+dZ7M|+ވlz*67~?? K1}lzy:#*gQ}IMa%mra>tIGPÇG&ߣ;mW<gEHowgYbKΉPҬF& ~* H8"v5ߗdo;cnJq!eiVހ,},Kq^?u4$;Ɇ](o%A*5XI8 ͍Ѵ0g|_U7"N#<c-tTԲ _J&KzBsk]cLL_8k1>lC'ܮؓ{k'1oe g~f%!օ[%}1 ,Pz*WeALwpÖdz-^|zY;Խx!I'l@[n"WR`Wҥ ,0}cPRs,;uU;G-W^qR&atv@!GfuwՎ\KeG4 LXvwda?9x7Wf?(`\v8 Y ܦ3qi?D&fd S k, Q|{N%Qe^* y/Cw6kAS(8 ;:9'm>o/IF1fK܍\8}3eFA ?K(%(w bb&H=o`A cJ9rUA4˗ŪO}}<+3(J{07k6vF9}:Sϝ=wh_$?otgI w~C+z&{pݏPF vILSLC>5PFe^v=sk,KA<>s{{Q T@_<ݼuo,w573:Xvn+eRAe6K(ETC . hIdnk)Z|o]J> @m /GZC[ xP2IXa}nFX`U\dPN"CˌJ/@,32Uĩާ謙cxP%qX4BMG=Іד=5 򕸲hfpep艻'HÛ'h9^M{!Ja]n1.BTcx MjW xJ3Ϧ7HgXT83]F>_ U5n&t2PϺ[ ]%l_l+c,';9ۅ'Ƚ7dj3o-w0rk3|ltl'K6j Gv6S )z}; m:Tp()"+@cxh HvjC̀2rK{q<&D\u~ Rngã>.!oUkgTzIi^:Ŋ(ؿe0lW^x{lo?ǼdܰBT~ɞY,{S8筲c5 IwI֔k:([o |YE|Z6T^"[HTB5l3V}&ڛ +Vklmoik#L 4GY*oc?{8'[jkmZXiBf6$fO_h ˆKfsKjѭҘYN4CT;$0;dރ<%4-T. -9kd(kAU=ߦJ[Q#ܶORBϋ6@+O4Ocm6Ggn[>Y m؋qGwh´a/@GOU@ 2^-'Xks2A_DoXuf𡬒ˑfo= r=m=`^1ݓ &mcp,O˺]bI";l ?I@q̀$2 \ q⩑`n}SX=Q:C6i i#?ޭUlP4VzOE,BJ&w4Vbn?uiFgw&J+yWίPxrI% "'*ߏ1hCM{:'iGV0%7pi+.xK6Fͺ}@6 AQ H⃱|6& O;'YtH$^1D G=JӼX@**to|+,%LDL@)_}V c[?u6R@vekzOyK1|dp%Gs34,NA ֱl>.Ø *`?(тeK.$ Fv#F{o=oEo2Mdj^tdq:aM;X;BF>;VOi:{+h)̡ R]wE#i&!ESrl,Ėnr`wJ9\pƠ^;ʯ1!~cP/v탙S:G!@#0l?~L\zDzN֝d)q;yE=\3]1' }B%jwjϑ Xy}eSP'j~fCmF}A؍5ޜ}=CO=@G6/]C"^Mz9QB01okmMXH&,az]PgWB3eyjsk)x*tq5 W}}Z8#tV7PM0mh&[DڰN'=' <)7RDYY]hw(w/=l^*|xѼ|M,G/~$R)@,]VHe/z˷Q !m6j(8'/tF󁠉 0`,e!f7Ϧ[SO^Q2OX]dR$}js:cl ܁z/mQͲwGOR9f.y014<] b״R[zi.fie $\cKw ÕБp >Jr J/tNտDlAΤCQx^>-e}[Goؓ[9  yiB][$@/v], 2QpH@:dZfF,k_+fW3HF$:Qti=ytd;Ru۵lRϲ3n""\xAQ~P$ ̢hDq0G-|LшJR\{-b4w]4m˧krT 3w m:GαiIjT$ovE#~Kd :2{A!K cSs>n+b i-YL Gj$Cl4ʱB&c|Elw we]3Ju8]Esd[v oOr$0qiDG\rm".;=T,+ 4 ϐ$0Iwa' `V / =peY,^ieC_l=Npl{G^ڭ^E^HmYj1{?B&CwݳT_RCkE2SrFwenJsv)sLLn\cǸ83KRѲNa)ۣDC$:g BRL6E9ιS[D{m?=rށG2D ++gL*tGSE(%~ oIN"s{X*a ḸӨĜf)ӌ?,#$~!&ƎklhɻS^^ʺPjŘpj؏P 4~SxMp #mKh_g ÏD?z@Gڳ{M"Ő-`DjAJ8:_J nBȸc|j='UZ8?#0HQQ3#@4-4q: [#r 68dEnnA0{.2rwFIT6GgNυg}=i Eܪ>M%m֨f K(q/-yNNȬ5qeYsƞ=b^G5fN Dٚ$U W}=fnpxˢ'#lxn&@3Ku37<롺\& b{WO$rTq6eE f徆 n#iϚ܈3^1r %;|pe=_겠$=Ig1O}J4ڻǠƸTݿk@(Æ:\Q6I,L/7lWfIGS@@(XPgUWFɘ6Yv3ڥņ?Nz{J'&P]PȑE  4OM-cȀ 1dî&-/q+$Q(8H \?ݦ+K(eT`R"ivgߋu @I g#O{@Y2?fc!]^S$-.'`A`^]ED9p0 խڦ8xN#fvJzy.aO=/.|,zvVݞV#-m<:XM)vL&|qnTGO-d+ _G6'D~pV1L C'!vPBuh"4oĝ7~y$g7wk!PԷ6SCG.$*Qf->?W /q<9C_Z[bkDK¥Hۊd06_e 5W Ƽ2HFk|)$# "$bt0ľ41w3UM1q{ģ˝&=^f͑T)X?IQ룰:2hܧG)4'mM&ԯ/COT/=E=5j漙ݐ2#5R|.&|F˼'iDBt7 7ac:7mNw%;PE$/7ٖ!Q%vpJٴY_DX! zôY\A@,@BE%)EwJPG~dĨ-/W'OM{],ffF4)h0HK @92mke-c܀ |a>U S_bиnpJ%69le^r6|E EɡcJDN0AґW[^oҴ~ *ɰ:gaWm wa߼dbM/xWg8L8+'igf y/JmҖ&P&넚ǝiu7& dg6K5Rh ʰ/HqݏA[@^ik2B]3{.@;/kS<GStoWfasV܏* NDhT.Xaa{B?1RIji >:} ק1,;Nٍ+t E54gݨ" 1H͏_qo`ݘK igĞ]Vqg)#Ȃl؏_=AH(KIjq &,4A&k*B-frh2_Ze}e^eS%_hnؖڹI>B_>g_sR_*W36Ųξc[O{,FJIN~Iԙ !8#Z>(C $/sHO@A¶(HDG.t=j Sl;D(p002g1_u0Ӄ'"z \i3W\xs?(e>bP5Tnm>z{jmt!tߪFmWUPSD4u#Ap:2s0'ؠw7/@L3G=qT㘋-i!\VA|j~xeA[V\߰JS1/BOf-[(@7¯JT@y.9?ۮZT5ՙz:VA:&zqE;=˔_0mJ(!`DS<<ڰas4k ^7ź 5yx\ܔ- i!PnuV,4$E۪:!ᅪkPn(_E<w/-;sC@g&fEޒKhD4\aF ~TcOT:w쯽K(+vK7 riY`Iw{&nohb+Vu ^ G% Uk]v;~ ^:\λ>xJAOf3,D ["?]xY{zgHib̀rQ+J%kkg7@.ƟBM6MrTSCx8%d-ai.}' THg pҋJ=L>EMlO2!NQQ`cYn67/i9P(C@-ZyB?rw/i(뻃E)b[-{AW}NwB5)CTyOt{DFRh _I™L߁&_2u fmҺ/ZVeI1Q!&s;w")#c7\&Vom=Є(,mY- 쉁]BVrL YZ