1 Release Notes - Heimdal - Version Heimdal 1.5.3
4 - Fix leaking file descriptors in KDC
5 - Better socket/timeout handling in libkrb5
9 Release Notes - Heimdal - Version Heimdal 1.5.2
12 - CVE-2011-4862 Buffer overflow in libtelnet/encrypt.c in telnetd - escalation of privilege
13 - Check that key types strictly match - denial of service
15 Release Notes - Heimdal - Version Heimdal 1.5.1
18 - Fix building on Solaris, requires c99
19 - Fix building on Windows
20 - Build system updates
22 Release Notes - Heimdal - Version Heimdal 1.5
26 - Support GSS name extensions/attributes
28 - No Kerberos 4 support
29 - Basic support for MIT Admin protocol (SECGSS flavor)
30 in kadmind (extract keytab)
31 - Replace editline with libedit
33 Release Notes - Heimdal - Version Heimdal 1.4
37 - Support for reading MIT database file directly
38 - KCM is polished up and now used in production
39 - NTLM first class citizen, credentials stored in KCM
40 - Table driven ASN.1 compiler, smaller!, not enabled by default
41 - Native Windows client support
45 - Disabled write support NDBM hdb backend (read still in there) since
46 it can't handle large records, please migrate to a diffrent backend
49 Release Notes - Heimdal - Version Heimdal 1.3.3
52 - Check the GSS-API checksum exists before trying to use it [CVE-2010-1321]
53 - Check NULL pointers before dereference them [kdc]
55 Release Notes - Heimdal - Version Heimdal 1.3.2
59 - Don't mix length when clearing hmac (could memset too much)
60 - More paranoid underrun checking when decrypting packets
61 - Check the password change requests and refuse to answer empty packets
62 - Build on OpenSolaris
63 - Renumber AD-SIGNED-TICKET since it was stolen from US
64 - Don't cache /dev/*random file descriptor, it doesn't get unloaded
68 Release Notes - Heimdal - Version Heimdal 1.3.1
72 - Store KDC offset in credentials
73 - Many many more bug fixes
75 Release Notes - Heimdal - Version Heimdal 1.3.1
79 - Make work with OpenLDAPs krb5 overlay
81 Release Notes - Heimdal - Version Heimdal 1.3
85 - Partial support for MIT kadmind rpc protocol in kadmind
86 - Better support for finding keytab entries when using SPN aliases in the KDC
87 - Support BER in ASN.1 library (needed for CMS)
88 - Support decryption in Keychain private keys
89 - Support for new sqlite based credential cache
90 - Try both KDC referals and the common DNS reverse lookup in GSS-API
91 - Fix the KCM to not leak resources on failure
92 - Add IPv6 support to iprop
93 - Support localization of error strings in
94 kinit/klist/kdestroy and Kerberos library
95 - Remove Kerberos 4 support in application (still in KDC)
97 - Support i18n password in windows domains (using UTF-8)
98 - More complete API emulation of OpenSSL in hcrypto
99 - Support for ECDSA and ECDH when linking with OpenSSL
103 - Support for settin friendly name on credential caches
104 - Move to using doxygen to generate documentation.
105 - Sprinkling __attribute__((depricated)) for old function to be removed
106 - Support to export LAST-REQUST information in AS-REQ
107 - Support for client deferrals in in AS-REQ
108 - Add seek support for krb5_storage.
109 - Support for split AS-REQ, first step for IA-KERB
110 - Fix many memory leaks and bugs
111 - Improved regression test
113 - Switch to krb5_set_error_message
114 - Support krb5_crypto_*_iov
115 - Switch to use EVP for most function
116 - Use SOCK_CLOEXEC and O_CLOEXEC (close on exec)
117 - Add support for GSS_C_DELEG_POLICY_FLAG
118 - Add krb5_cc_[gs]et_config to store data in the credential caches
119 - PTY testing application
122 - Make building on AIX6 possible.
123 - Bugfixes in LDAP KDC code to make it more stable
124 - Make ipropd-slave reconnect when master down gown
127 Release Notes - Heimdal - Version Heimdal 1.2.1
131 [HEIMDAL-147] - Heimdal 1.2 not compiling on Solaris
132 [HEIMDAL-151] - Make canned tests work again after cert expired
133 [HEIMDAL-152] - iprop test: use full hostname to avoid realm
135 [HEIMDAL-153] - ftp: Use the correct length for unmap, msync
137 Release Notes - Heimdal - Version Heimdal 1.2
141 [HEIMDAL-10] - Follow-up on bug report for SEGFAULT in
142 gss_display_name/gss_export_name when using SPNEGO
143 [HEIMDAL-15] - Re: [Heimdal-bugs] potential bug in Heimdal 1.1
144 [HEIMDAL-17] - Remove support for depricated [libdefaults]capath
145 [HEIMDAL-52] - hdb overwrite aliases for db databases
146 [HEIMDAL-54] - Two issues which affect credentials delegation
147 [HEIMDAL-58] - sockbuf.c calls setsockopt with bad args
148 [HEIMDAL-62] - Fix printing of sig_atomic_t
149 [HEIMDAL-87] - heimdal 1.1 not building under cygwin in hcrypto
150 [HEIMDAL-105] - rcp: sync rcp with upstream bsd rcp codebase
151 [HEIMDAL-117] - Use libtool to detect symbol versioning (Debian Bug#453241)
154 [HEIMDAL-67] - Fix locking and store credential in atomic writes
155 in the FILE credential cache
156 [HEIMDAL-106] - make compile on cygwin again
157 [HEIMDAL-107] - Replace old random key generation in des module
158 and use it with RAND_ function instead
159 [HEIMDAL-115] - Better documentation and compatibility in hcrypto
160 in regards to OpenSSL
163 [HEIMDAL-3] - pkinit alg agility PRF test vectors
164 [HEIMDAL-14] - Add libwind to Heimdal
165 [HEIMDAL-16] - Use libwind in hx509
166 [HEIMDAL-55] - Add flag to krb5 to not add GSS-API INT|CONF to
168 [HEIMDAL-74] - Add support to report extended error message back
169 in AS-REQ to support windows clients
170 [HEIMDAL-116] - test pty based application (using rkpty)
171 [HEIMDAL-120] - Use new OpenLDAP API (older deprecated)
174 [HEIMDAL-63] - Dont try key usage KRB5_KU_AP_REQ_AUTH for TGS-REQ.
175 This drop compatibility with pre 0.3d KDCs.
176 [HEIMDAL-64] - kcm: first implementation of kcm-move-cache
177 [HEIMDAL-65] - Failed to compile with --disable-pk-init
178 [HEIMDAL-80] - verify that [VU#162289]: gcc silently discards some
179 wraparound checks doesn't apply to Heimdal
181 Changes in release 1.1
183 * Read-only PKCS11 provider built-in to hx509.
185 * Documentation for hx509, hcrypto and ntlm libraries improved.
187 * Better compatibilty with Windows 2008 Server pre-releases and Vista.
189 * Mac OS X 10.5 support for native credential cache.
191 * Provide pkg-config file for Heimdal (heimdal-gssapi.pc).
195 Changes in release 1.0.2
201 Changes in release 1.0.1
203 * Serveral bug fixes to iprop.
205 * Make work on platforms without dlopen.
207 * Add RFC3526 modp group14 as default.
209 * Handle [kdc] database = { } entries without realm = stanzas.
211 * Make krb5_get_renewed_creds work.
213 * Make kaserver preauth work again.
217 Changes in release 1.0
219 * Add gss_pseudo_random() for mechglue and krb5.
221 * Make session key for the krbtgt be selected by the best encryption
224 * Better interoperability with other PK-INIT implementations.
226 * Inital support for Mac OS X Keychain for hx509.
228 * Alias support for inital ticket requests.
230 * Add symbol versioning to selected libraries on platforms that uses
231 GNU link editor: gssapi, hcrypto, heimntlm, hx509, krb5, and libkdc.
233 * New version of imath included in hcrypto.
239 Changes in release 0.8.1
241 * Make ASN.1 library less paranoid to with regard to NUL in string to
242 make it inter-operate with MIT Kerberos again.
244 * Make GSS-API library work again when using gss_acquire_cred
246 * Add symbol versioning to libgssapi when using GNU ld.
252 Changes in release 0.8
256 * HDB extensions support, used by PK-INIT.
258 * New ASN.1 compiler.
260 * GSS-API mechglue from FreeBSD.
262 * Updated SPNEGO to support RFC4178.
264 * Support for Cryptosystem Negotiation Extension (RFC 4537).
266 * A new X.509 library (hx509) and related crypto functions.
268 * A new ntlm library (heimntlm) and related crypto functions.
270 * Updated the built-in crypto library with bignum support using
271 imath, support for RSA and DH and renamed it to libhcrypto.
273 * Subsystem in the KDC, digest, that will perform the digest
274 operation in the KDC, currently supports: CHAP, MS-CHAP-V2, SASL
275 DIGEST-MD5 NTLMv1 and NTLMv2.
277 * KDC will return the "response too big" error to force TCP retries
278 for large (default 1400 bytes) UDP replies. This is common for
281 * Libkafs defaults to use 2b tokens.
283 * Default to use the API cache on Mac OS X.
285 * krb5_kuserok() also checks ~/.k5login.d directory for acl files,
286 see manpage for krb5_kuserok for description.
288 * Many, many, other updates to code and info manual and manual pages.
292 Changes in release 0.7.2
294 * Fix security problem in rshd that enable an attacker to overwrite
295 and change ownership of any file that root could write.
297 * Fix a DOS in telnetd. The attacker could force the server to crash
298 in a NULL de-reference before the user logged in, resulting in inetd
299 turning telnetd off because it forked too fast.
301 * Make gss_acquire_cred(GSS_C_ACCEPT) check that the requested name
302 exists in the keytab before returning success. This allows servers
303 to check if its even possible to use GSSAPI.
305 * Fix receiving end of token delegation for GSS-API. It still wrongly
306 uses subkey for sending for compatibility reasons, this will change
309 * telnetd, login and rshd are now more verbose in logging failed and
314 Changes in release 0.7.1
318 Changes in release 0.7
320 * Support for KCM, a process based credential cache
322 * Support CCAPI credential cache
326 * AES (and the gssapi conterpart, CFX) support
328 * Adding new and improve old documentation
332 Changes in release 0.6.6
334 * Fix security problem in rshd that enable an attacker to overwrite
335 and change ownership of any file that root could write.
337 * Fix a DOS in telnetd. The attacker could force the server to crash
338 in a NULL de-reference before the user logged in, resulting in inetd
339 turning telnetd off because it forked too fast.
341 Changes in release 0.6.5
343 * fix vulnerabilities in telnetd
345 * unbreak Kerberos 4 and kaserver
347 Changes in release 0.6.4
349 * fix vulnerabilities in telnet
351 * rshd: encryption without a separate error socket should now work
353 * telnet now uses appdefaults for the encrypt and forward/forwardable
358 Changes in release 0.6.3
360 * fix vulnerabilities in ftpd
362 * support for linux AFS /proc "syscalls"
364 * support for RFC3244 (Windows 2000 Kerberos Change/Set Password) in
367 * fix possible KDC denial of service
371 Changes in release 0.6.2
373 * Fix possible buffer overrun in v4 kadmin (which now defaults to off)
375 Changes in release 0.6.1
377 * Fixed ARCFOUR suppport
379 * Cross realm vulnerability
381 * kdc: fix denial of service attack
383 * kdc: stop clients from renewing tickets into the future
387 Changes in release 0.6
389 * The DES3 GSS-API mechanism has been changed to inter-operate with
390 other GSSAPI implementations. See man page for gssapi(3) how to turn
391 on generation of correct MIC messages. Next major release of heimdal
392 will generate correct MIC by default.
394 * More complete GSS-API support
396 * Better AFS support: kdc (524) supports 2b; 524 in kdc and AFS
397 support in applications no longer requires Kerberos 4 libs
399 * Kerberos 4 support in kdc defaults to turned off (includes ka and 524)
403 Changes in release 0.5.2
405 * kdc: add option for disabling v4 cross-realm (defaults to off)
409 Changes in release 0.5.1
411 * kadmind: fix remote exploit
413 * kadmind: add option to disable kerberos 4
415 * kdc: make sure kaserver token life is positive
417 * telnet: use the session key if there is no subkey
419 * fix EPSV parsing in ftp
423 Changes in release 0.5
425 * add --detach option to kdc
427 * allow setting forward and forwardable option in telnet from
428 .telnetrc, with override from command line
430 * accept addresses with or without ports in krb5_rd_cred
432 * make it work with modern openssl
434 * use our own string2key function even with openssl (that handles weak
437 * more system-specific requirements in login
439 * do not use getlogin() to determine root in su
441 * telnet: abort if telnetd does not support encryption
443 * update autoconf to 2.53
445 * update config.guess, config.sub
449 Changes in release 0.4e
451 * improve libcrypto and database autoconf tests
453 * do not care about salting of server principals when serving v4 requests
455 * some improvements to gssapi library
457 * test for existing compile_et/libcom_err
463 Changes in release 0.4d
465 * fix some problems when using libcrypto from openssl
467 * handle /dev/ptmx `unix98' ptys on Linux
469 * add some forgotten man pages
471 * rsh: clean-up and add man page
473 * fix -A and -a in builtin-ls in tpd
475 * fix building problem on Irix
477 * make `ktutil get' more efficient
481 Changes in release 0.4c
483 * fix buffer overrun in telnetd
485 * repair some of the v4 fallback code in kinit
487 * add more shared library dependencies
489 * simplify and fix hprop handling of v4 databases
491 * fix some building problems (osf's sia and osfc2 login)
495 Changes in release 0.4b
497 * update the shared library version numbers correctly
499 Changes in release 0.4a
501 * corrected key used for checksum in mk_safe, unfortunately this
502 makes it backwards incompatible
504 * update to autoconf 2.50, libtool 1.4
506 * re-write dns/config lookups (krb5_krbhst API)
508 * make order of using subkeys consistent
514 * remove rfc2052 support, now only rfc2782 is supported
516 * always build with kaserver protocol support in the KDC (assuming
517 KRB4 is enabled) and support for reading kaserver databases in
520 Changes in release 0.3f
522 * change default keytab to ANY:FILE:/etc/krb5.keytab,krb4:/etc/srvtab,
523 the new keytab type that tries both of these in order (SRVTAB is
524 also an alias for krb4:)
526 * improve error reporting and error handling (error messages should
527 be more detailed and more useful)
529 * improve building with openssl
531 * add kadmin -K, rcp -F
533 * fix two incorrect weak DES keys
535 * fix building of kaserver compat in KDC
537 * the API is closer to what MIT krb5 is using
539 * more compatible with windows 2000
541 * removed some memory leaks
545 Changes in release 0.3e
547 * rcp program included
549 * fix buffer overrun in ftpd
551 * handle omitted sequence numbers as zeroes to handle MIT krb5 that
552 cannot generate zero sequence numbers
554 * handle v4 /.k files better
556 * configure/portability fixes
558 * fixes in parsing of options to kadmin (sub-)commands
560 * handle errors in kadmin load better
564 Changes in release 0.3d
568 * fix a bug in 3des gss-api mechanism, making it compatible with the
569 specification and the MIT implementation
571 * make telnetd only allow a specific list of environment variables to
572 stop it from setting `sensitive' variables
574 * try to use an existing libdes
576 * lib/krb5, kdc: use correct usage type for ap-req messages. This
577 should improve compatability with MIT krb5 when using 3DES
580 * kdc: fix memory allocation problem
582 * update config.guess and config.sub
584 * lib/roken: more stuff implemented
586 * bug fixes and portability enhancements
588 Changes in release 0.3c
590 * lib/krb5: memory caches now support the resolve operation
592 * appl/login: set PATH to some sane default
594 * kadmind: handle several realms
596 * bug fixes (including memory leaks)
598 Changes in release 0.3b
600 * kdc: prefer default-salted keys on v5 requests
602 * kdc: lowercase hostnames in v4 mode
604 * hprop: handle more types of MIT salts
606 * lib/krb5: fix memory leak
610 Changes in release 0.3a:
612 * implement arcfour-hmac-md5 to interoperate with W2K
614 * modularise the handling of the master key, and allow for other
615 encryption types. This makes it easier to import a database from
616 some other source without having to re-encrypt all keys.
618 * allow for better control over which encryption types are created
620 * make kinit fallback to v4 if given a v4 KDC
622 * make klist work better with v4 and v5, and add some more MIT
623 compatibility options
625 * make the kdc listen on the krb524 (4444) port for compatibility
626 with MIT krb5 clients
628 * implement more DCE/DFS support, enabled with --enable-dce, see
629 lib/kdfs and appl/dceutils
631 * make the sequence numbers work correctly
635 Changes in release 0.2t:
639 Changes in release 0.2s:
641 * add OpenLDAP support in hdb
643 * login will get v4 tickets when it receives forwarded tickets
645 * xnlock supports both v5 and v4
647 * repair source routing for telnet
649 * fix building problems with krb4 (krb_mk_req)
653 Changes in release 0.2r:
655 * fix realloc memory corruption bug in kdc
657 * `add --key' and `cpw --key' in kadmin
659 * klist supports listing v4 tickets
661 * update config.guess and config.sub
663 * make v4 -> v5 principal name conversion more robust
665 * support for anonymous tickets
669 * telnetd: do not negotiate KERBEROS5 authentication if there's no keytab.
671 * use and set expiration and not password expiration when dumping
672 to/from ka server databases / krb4 databases
674 * make the code happier with 64-bit time_t
676 * follow RFC2782 and by default do not look for non-underscore SRV names
678 Changes in release 0.2q:
680 * bug fix in tcp-handling in kdc
682 * bug fix in expand_hostname
684 Changes in release 0.2p:
686 * bug fix in `kadmin load/merge'
688 * bug fix in krb5_parse_address
690 Changes in release 0.2o:
692 * gss_{import,export}_sec_context added to libgssapi
694 * new option --addresses to kdc (for listening on an explicit set of
697 * bug fixes in the krb4 and kaserver emulation part of the kdc
701 Changes in release 0.2n:
703 * more robust parsing of dump files in kadmin
704 * changed default timestamp format for log messages to extended ISO
705 8601 format (Y-M-DTH:M:S)
706 * changed md4/md5/sha1 APIes to be de-facto `standard'
707 * always make hostname into lower-case before creating principal
708 * small bits of more MIT-compatability
711 Changes in release 0.2m:
713 * handle glibc's getaddrinfo() that returns several ai_canonname
719 Changes in release 0.2l:
723 Changes in release 0.2k:
727 * make struct sockaddr_storage in roken work better on alphas
729 * some missing [hn]to[hn]s fixed.
731 * allow users to change their own passwords with kadmin (with initial
734 * fix stupid bug in parsing KDC specification
736 * add `ktutil change' and `ktutil purge'
738 Changes in release 0.2j:
742 * ftpd works in passive mode
744 * should build on cygwin
746 * work around broken IPv6-code on OpenBSD 2.6, also add configure
747 option --disable-ipv6
749 Changes in release 0.2i:
751 * use getaddrinfo in the missing places.
753 * fix SRV lookup for admin server
755 * use get{addr,name}info everywhere. and implement it in terms of
756 getipnodeby{name,addr} (which uses gethostbyname{,2} and
759 Changes in release 0.2h:
761 * fix typo in kx (now compiles)
763 Changes in release 0.2g:
767 * repair appl/test programs
768 * sockaddr_storage works on solaris (alignment issues)
769 * works better with non-roken getaddrinfo
771 * some non standard C constructs removed
773 Changes in release 0.2f:
775 * support SRV records for kpasswd
776 * look for both _kerberos and krb5-realm when doing host -> realm mapping
778 Changes in release 0.2e:
780 * changed copyright notices to remove `advertising'-clause.
781 * get{addr,name}info added to roken and used in the other code
782 (this makes things work much better with hosts with both v4 and v6
783 addresses, among other things)
784 * do pre-auth for both password and key-based get_in_tkt
785 * support for having several databases
786 * new command `del_enctype' in kadmin
787 * strptime (and new strftime) add to roken
788 * more paranoia about finding libdb
791 Changes in release 0.2d:
793 * new configuration option [libdefaults]default_etypes_des
794 * internal ls in ftpd builds without KRB4
795 * kx/rsh/push/pop_debug tries v5 and v4 consistenly
799 Changes in release 0.2c:
801 * bug fixes (see ChangeLog's for details)
803 Changes in release 0.2b:
806 * actually bump shared library versions
808 Changes in release 0.2a:
810 * a new program verify_krb5_conf for checking your /etc/krb5.conf
811 * add 3DES keys when changing password
812 * support null keys in database
813 * support multiple local realms
814 * implement a keytab backend for AFS KeyFile's
815 * implement a keytab backend for v4 srvtabs
816 * implement `ktutil copy'
817 * support password quality control in v4 kadmind
818 * improvements in v4 compat kadmind
819 * handle the case of having the correct cred in the ccache but with
820 the wrong encryption type better
821 * v6-ify the remaining programs.
822 * internal ls in ftpd
823 * rename strcpy_truncate/strcat_truncate to strlcpy/strlcat
824 * add `ank --random-password' and `cpw --random-password' in kadmin
825 * some programs and documentation for trying to talk to a W2K KDC
828 Changes in release 0.1m:
830 * support for getting default from krb5.conf for kinit/kf/rsh/telnet.
831 From Miroslav Ruda <ruda@ics.muni.cz>
832 * v6-ify hprop and hpropd
833 * support numeric addresses in krb5_mk_req
834 * shadow support in login and su. From Miroslav Ruda <ruda@ics.muni.cz>
835 * make rsh/rshd IPv6-aware
836 * make the gssapi sample applications better at reporting errors
838 * handle systems with v6-aware libc and non-v6 kernels (like Linux
839 with glibc 2.1) better
840 * hide failure of ERPT in ftp
843 Changes in release 0.1l:
845 * make ftp and ftpd IPv6-aware
846 * add inet_pton to roken
847 * more IPv6-awareness
848 * make mini_inetd v6 aware
850 Changes in release 0.1k:
852 * bump shared libraries versions
853 * add roken version of inet_ntop
854 * merge more changes to rshd
856 Changes in release 0.1j:
858 * restore back to the `old' 3DES code. This was supposed to be done
859 in 0.1h and 0.1i but I did a CVS screw-up.
860 * make telnetd handle v6 connections
862 Changes in release 0.1i:
864 * start using `struct sockaddr_storage' which simplifies the code
865 (with a fallback definition if it's not defined)
866 * bug fixes (including in hprop and kf)
867 * don't use mawk which seems to mishandle roken.awk
868 * get_addrs should be able to handle v6 addresses on Linux (with the
869 required patch to the Linux kernel -- ask within)
870 * rshd builds with shadow passwords
872 Changes in release 0.1h:
874 * kf: new program for forwarding credentials
876 * make forwarding credentials work with MIT code
877 * better conversion of ka database
878 * add etc/services.append
879 * correct `modified by' from kpasswdd
882 Changes in release 0.1g:
884 * kgetcred: new program for explicitly obtaining tickets
889 Changes in release 0.1f;
891 * experimental support for v4 kadmin protokoll in kadmind
894 Changes in release 0.1e:
896 * try to handle old DCE and MIT kdcs
897 * support for older versions of credential cache files and keytabs
898 * postdated tickets work
899 * support for password quality checks in kpasswdd
900 * new flag --enable-kaserver for kdc
902 * prototype su program
903 * updated (some) manpages
904 * support for KDC resource records
905 * should build with --without-krb4
908 Changes in release 0.1d:
910 * Support building with DB2 (uses 1.85-compat API)
911 * Support krb5-realm.DOMAIN in DNS
912 * new `ktutil srvcreate'
913 * v4/kafs support in klist/kdestroy
916 Changes in release 0.1c:
918 * fix ASN.1 encoding of signed integers
919 * somewhat working `ktutil get'
920 * some documentation updates
921 * update to Autoconf 2.13 and Automake 1.4
922 * the usual bug fixes
924 Changes in release 0.1b:
926 * some old -> new crypto conversion utils
929 Changes in release 0.1a:
933 * make sure we ask for DES keys in gssapi
934 * support signed ints in ASN1
937 Changes in release 0.0u:
941 Changes in release 0.0t:
943 * more robust parsing of krb5.conf
944 * include net{read,write} in lib/roken
947 Changes in release 0.0s:
949 * kludges for parsing options to rsh
950 * more robust parsing of krb5.conf
951 * removed some arbitrary limits
954 Changes in release 0.0r:
956 * default options for some programs
959 Changes in release 0.0q:
961 * support for building shared libraries with libtool
964 Changes in release 0.0p:
966 * keytab moved to /etc/krb5.keytab
967 * avoid false detection of IPv6 on Linux
968 * Lots of more functionality in the gssapi-library
969 * hprop can now read ka-server databases
972 Changes in release 0.0o:
974 * FTP with GSSAPI support.
977 Changes in release 0.0n:
979 * Incremental database propagation.
980 * Somewhat improved kadmin ui; the stuff in admin is now removed.
981 * Some support for using enctypes instead of keytypes.
982 * Lots of other improvement and bug fixes, see ChangeLog for details.