git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@2490 ec53bebd-3082-4978-b11e-865c3cabbd6b
This commit is contained in:
Johan Danielsson
1997-07-20 05:55:52 +00:00
parent aebebed645
commit eaeb092997
2 changed files with 79 additions and 64 deletions

132
TODO
View File

@@ -2,121 +2,125 @@
$Id$ $Id$
- admin * admin
* add password changing protocol add some kind of remote admin protocol
* add some kind of remote admin protocol ** kpasswd
- appl send a reply from the server
* more programs here * appl
- appl/rsh more programs here
* forwarding is not implemented at all. ** appl/rsh
* perhaps rsh and rshd should be able to handle `traditional' forwarding is not implemented at all.
rsh-protocol as well.
- appl/telnet perhaps rsh and rshd should be able to handle `traditional'
rsh-protocol as well.
* forwarding not implemented. ** appl/telnet
- appl/test forwarding not implemented.
* should test more stuff ** appl/test
- doc should test more stuff
* there's some room for improvement here. * doc
- kdc there's some room for improvement here.
* implement support for interoperability with kerberos V4. * kdc
* needs a configuration file. implement support for interoperability with kerberos V4.
* the requirement for preauthentication should be configurable. needs a configuration file.
- kuser the requirement for preauthentication should be configurable.
* kinit misses lots of useful options. * kuser
* kinit should try to give better error messages. ** kinit
- lib misses lots of useful options.
- lib/asn1 should try to give better error messages.
- lib/auth * lib
* PAM and afskauthlib ** lib/asn1
- lib/des ** lib/auth
* md4, md5, and sha doesn't work on Crays. There might be some other PAM and afskauthlib
code that that doesn't work either.
- lib/editline ** lib/des
- lib/error md4, md5, and sha doesn't work on Crays.
- lib/gssapi ** lib/editline
* acquire_cred, release_cred, process_context_token, context_time, ** lib/error
display_status, compare_names, export_name, inquire_cred,
wrap_size_limit, add_cred, inquire_cred_by_mech, export_sec_context,
import_sec_context, inquire_names_for_mech, inquire_mechs_for_name,
canonicalize_name, and duplicate_name not implemented.
* import_name only understands GSS_C_NT_HOSTBASED_SERVICE and GSS_C_NO_OID. ** lib/gssapi
* get_mic, wrap: always uses the remote_subkey acquire_cred, release_cred, process_context_token, context_time,
display_status, compare_names, export_name, inquire_cred,
wrap_size_limit, add_cred, inquire_cred_by_mech, export_sec_context,
import_sec_context, inquire_names_for_mech, inquire_mechs_for_name,
canonicalize_name, and duplicate_name not implemented.
* only DES MAC MD5 and DES implemented. import_name only understands GSS_C_NT_HOSTBASED_SERVICE and
GSS_C_NO_OID.
* wrap and unwrap always uses DES for sealing even if conf is not get_mic, wrap: always uses the remote_subkey
requested.
* minor_status is never set only DES MAC MD5 and DES implemented.
* init_sec_context: `initiator_cred_handle' and `time_req' ignored. wrap and unwrap always uses DES for sealing even if conf is not
requested.
* accept_sec_context: the first principal in the srvtab is always used. minor_status is never set
* accept_sec_context: `acceptor_cred_handle' is ignored. init_sec_context: `initiator_cred_handle' and `time_req' ignored.
* input channel bindings are not supported accept_sec_context: the first principal in the srvtab is always used.
* delegation not implemented accept_sec_context: `acceptor_cred_handle' is ignored.
* anonymous credentials not implemented input channel bindings are not supported
- lib/hdb delegation not implemented
* implement encryption of database entries and master keys. anonymous credentials not implemented
- lib/krb5 ** lib/hdb
* replay cache not implemented implement encryption of database entries and master keys.
* the following encryption types have been implemented: DES-CBC-CRC, ** lib/krb5
DES-CBC-MD4, DES-CBC-MD5
* supports the following checksums: CRC32, RSA-MD4, RSA-MD5, replay cache not implemented
RSA-MD4-DES, RSA-MD5-DES
* always generates a new subkey in an authenticator the following encryption types have been implemented: DES-CBC-CRC,
DES-CBC-MD4, DES-CBC-MD5
* probably leaks memory when errors occur supports the following checksums: CRC32, RSA-MD4, RSA-MD5,
RSA-MD4-DES, RSA-MD5-DES
* should the sequence numbers be XORed? always generates a new subkey in an authenticator
* encryption and checksum type is still hardcoded in some places. probably leaks memory when errors occur
* postdated, renewable, and forwardable tickets are not supported. should the sequence numbers be XORed?
- lib/roken encryption and checksum type is still hardcoded in some places.
- lib/sl postdated, renewable, and forwardable tickets are not supported.
** lib/roken
** lib/sl

11
fix-export Executable file
View File

@@ -0,0 +1,11 @@
#! /bin/sh
echo "fixing distribution in $1..."
cd $1
aclocal
autoconf
autoheader
automake
(cd doc; makeinfo heimdal.texi)
rm fix-export