The branch, master has been updated
via 60540b9eedd WHATSNEW: Start release notes for Samba 4.21.0pre1.
via e7a43421a7d VERSION: Bump version up to 4.25.0pre1...
via d753ebb10ff VERSION: Disable GIT_SNAPSHOT for the Samba 4.24.0rc1
release.
via d71f71062e4 WHATSNEW: Up to Samba 4.24.0rc1.
via c05d12c4fef tdb: version 1.4.15
from 12c502041cd lib: Delay get_iconv_handle() in strchr_m()
https://git.samba.org/?p=samba.git;a=shortlog;h=master
- Log -----------------------------------------------------------------
commit 60540b9eeddcd4c211e2e541d781541c99bb6bc8
Author: Björn Jacke <[email protected]>
Date: Tue Jan 20 14:47:57 2026 +0100
WHATSNEW: Start release notes for Samba 4.21.0pre1.
Signed-off-by: Bjoern Jacke <[email protected]>
Signed-off-by: Jule Anger <[email protected]>
Signed-off-by: Stefan Metzmacher <[email protected]>
Autobuild-User(master): Björn Jacke <[email protected]>
Autobuild-Date(master): Tue Jan 20 15:00:48 UTC 2026 on atb-devel-224
commit e7a43421a7d9b48fd7e7b22605a9ad4cd46437b5
Author: Björn Jacke <[email protected]>
Date: Tue Jan 20 14:41:27 2026 +0100
VERSION: Bump version up to 4.25.0pre1...
and re-enable GIT_SNAPSHOT.
Signed-off-by: Bjoern Jacke <[email protected]>
Signed-off-by: Jule Anger <[email protected]>
Signed-off-by: Stefan Metzmacher <[email protected]>
commit d753ebb10ff768187a8c1a47f10d858c2b1c4b39
Author: Björn Jacke <[email protected]>
Date: Tue Jan 20 14:32:16 2026 +0100
VERSION: Disable GIT_SNAPSHOT for the Samba 4.24.0rc1 release.
Signed-off-by: Bjoern Jacke <[email protected]>
Signed-off-by: Jule Anger <[email protected]>
Signed-off-by: Stefan Metzmacher <[email protected]>
commit d71f71062e4db14de4229b3e8283f20d93d8b248
Author: Björn Jacke <[email protected]>
Date: Tue Jan 20 14:37:21 2026 +0100
WHATSNEW: Up to Samba 4.24.0rc1.
Signed-off-by: Bjoern Jacke <[email protected]>
Signed-off-by: Jule Anger <[email protected]>
Signed-off-by: Stefan Metzmacher <[email protected]>
commit c05d12c4fefa0272fb06a040ff8ba2b03ab42fb3
Author: Björn Jacke <[email protected]>
Date: Tue Jan 20 14:35:03 2026 +0100
tdb: version 1.4.15
tdb: Fix parse_hex during `tdbtool storehex`
Signed-off-by: Bjoern Jacke <[email protected]>
Signed-off-by: Jule Anger <[email protected]>
Signed-off-by: Stefan Metzmacher <[email protected]>
-----------------------------------------------------------------------
Summary of changes:
VERSION | 2 +-
WHATSNEW.txt | 214 +----------------------
lib/tdb/ABI/{tdb-1.3.17.sigs => tdb-1.4.15.sigs} | 0
lib/tdb/wscript | 2 +-
4 files changed, 6 insertions(+), 212 deletions(-)
copy lib/tdb/ABI/{tdb-1.3.17.sigs => tdb-1.4.15.sigs} (100%)
Changeset truncated at 500 lines:
diff --git a/VERSION b/VERSION
index e663949d930..71ac72f057c 100644
--- a/VERSION
+++ b/VERSION
@@ -26,7 +26,7 @@ SAMBA_COPYRIGHT_STRING="Copyright Andrew Tridgell and the
Samba Team 1992-2026"
# -> "3.0.0" #
########################################################
SAMBA_VERSION_MAJOR=4
-SAMBA_VERSION_MINOR=24
+SAMBA_VERSION_MINOR=25
SAMBA_VERSION_RELEASE=0
########################################################
diff --git a/WHATSNEW.txt b/WHATSNEW.txt
index 565248a406f..addd3a5932a 100644
--- a/WHATSNEW.txt
+++ b/WHATSNEW.txt
@@ -1,12 +1,12 @@
Release Announcements
=====================
-This is the first pre candidate release of Samba 4.24. This is *not*
+This is the first pre release of Samba 4.25. This is *not*
intended for production environments and is designed for testing
purposes only. Please report any defects via the Samba bug reporting
system at https://bugzilla.samba.org/.
-Samba 4.24 will be the next version of the Samba suite.
+Samba 4.25 will be the next version of the Samba suite.
UPGRADING
@@ -16,207 +16,6 @@ UPGRADING
NEW FEATURES/CHANGES
====================
-Authentication information audit support
-----------------------------------------
-
-There are some Active Directory attributes that are not secret, but
-are relied on in some forms of authentication. Changes to these
-attributes could indicate surreptitious activity. The
-"dsdb_password_audit" and "dsdb_password_json_audit" debug classes now
-log changes to the following attributes:
-
- * altSecurityIdentities
- * dNSHostName
- * msDS-AdditionalDnsHostName
- * msDS-KeyCredentialLink
- * servicePrincipalName
-
-For the JSON logs, changes to these will be logged with the "action"
-field set to "Auth info change".
-
-
-vfs_streams_xattr can hold larger streams
------------------------------------------
-
-On Linux the size of a single extended attribute is limited to 65536
-bytes of size. For some file systems, this is also the overall limit
-of space for xattrs, but for example xfs can hold more than that 64k
-of extended xattrs, although the individual xattr is still limited to
-64k. Setting
-
-streams_xattr:max xattrs per stream = 1
-
-to a higher value than 1 will allow Samba to shard the stream to more
-than one xattr. It has an artificial limit of 16 for a maximum stream
-length of 1MB.
-
-
-Support for remote password management (Entra ID SSPR, Keycloak)
-----------------------------------------------------------------
-
-When a system such as Entra ID or Keycloak wants to change a user's
-password in its own database as well as in AD, it will use a password
-reset, meaning it does not transmit the old password to the domain
-controller. Normally a password reset avoids password history and age
-checks, which would allow a cloud password change to bypass
-on-premises password policies. To address this, a password reset using
-the "policy hints" control should respect password policies, as if it
-were an ordinary password change. Both Entra ID and Keycloak use this,
-but until now Samba did not understand this control, and would reject
-these reset requests.
-
-Now Samba AD will recognise the policy hints control and enforce local
-policy. This allows Microsoft Entra self-service password reset (SSPR)
-to work, and for Keycloak to work with the "password policy hints
-enabled" option.
-
-
-Kerberos PKINIT KeyTrust logon support
---------------------------------------
-
-Samba servers configured with the embedded heimdal KDC and running as an ADDC,
-now support "Windows Hello for Business Key-Trust logons". This allows the
-PKINIT authentication mechanism to be used with self-signed keys.
-
-The samba-tool computer and user commands have a new "keytrust"
-sub-command which allows for the setting and viewing of the public key
-details for computer and user accounts. This stores the public key
-details in msDS-KeyCredentialLink attribute of the account.
-
-
-msDS-KeyCredentialLink validation
----------------------------------
-
-Updates to the msDS-KeyCredentialLink attribute are validated against the
-rules specified by MS-ADTS 3.1.1.5.3.1.1.6.
-
-Kerberos PKINIT strong/flexible key mappings
---------------------------------------------
-
-Samba servers configured with the embedded heimdal KDC and running as an ADDC
-now support "Windows Strong and Flexible key mappings" as outlined in
-Microsoft KB5014754: Certificate-based authentication changes on Windows domain
-controllers.
-
-The default enforcement mode ("full") allows only strong certificate
-mappings. The smb.conf option
-
- strong certificate binding enforcement = compatibility
-
-will allow weak mappings where the certificate is newer than the user
-account. The option "none" will allow any mappings.
-
-The mappings for an account should be placed in the altSecurityIdentities
-attribute and follow the syntax documented in KB5014754.
-
-
-Kerberos PKINIT SID extension
------------------------------
-
-PKINIT authentication now supports certificates containing an Object SID
-extension (extension 1.3.6.1.4.1.311.25.2), this is considered to be a STRONG
-mapping for KB5014754.
-
-The computer and user samba-tool commands have a new sub-command
-"generate-csr" to generate certificate signing requests.
-
-
-KDC includes PAC by default
----------------------------
-
-Samba will ignore the value provided by the client in "PA-PAC-REQUEST"
-and always include a PAC in responses, unless "kdc always generate
-pac" is set to "no".
-
-
-KDC can insist clients request canonicalization
------------------------------------------------
-
-Canonicalization of principal client names is not mandatory in
-Kerberos (per RFC4120), but must be requested by the client. In some
-circumstances allows a client to deceive Active Directory member
-servers (known as the "dollar ticket" attack).
-
-The new configuration option "kdc require canonicalization" can be
-used to require that clients request canonicalization; if they do not,
-their AS_REQ requests will be rejected as if the account was unknown.
-
-The default value is "no", for backward compatibility. Windows clients
-will ask for canonicalization by default, so in Windows-heavy
-environments it is safe and recommended to set this to "yes".
-
-KDC can avoid potentially confusing canonicalization
-----------------------------------------------------
-
-Currently when the client does not request canonicalization, when the
-KDC looks up a name and there is no match it will append a "$" to the
-name and try again. An attacker who can create arbitrary machine
-accounts can sometimes get tickets for Unix users by mimicking their
-names (the "dollar ticket" attack).
-
-The configuration option
-
- kdc name match implicit dollar without canonicalization = no
-
-can be used to disable this behaviour for clients that do not request
-canonicalization. Probably this only affects traditional Unix clients,
-as Windows clients use canonicalization. If affected clients want a
-ticket for a machine account, they will have to use the full name
-including the dollar (e.g. "server$", not "server").
-
-If the "kdc require canonicalization" option cannot be set to "yes"
-(because some clients do not request canonicalization) setting this
-option to "no" is a good alternative.
-
-
-KDC provides Kerberos acceptors with canonical client names
------------------------------------------------------------
-
-By default the KDC will now send Kerberos services the canonicalized
-name (the sAMAccountName from the PAC) rather than trusting the cname.
-
-To return to the old behaviour, use
-
- krb5 acceptor report canonical client name = no
-
-in the smb.conf.
-
-This currently affects Heimdal KDC only, not MIT.
-
-
-KDC recommended configuration:
------------------------------
-strong certificate binding enforcement full
-kdc always include pac yes
-kdc require canonicalization yes
-
-If unable to use "kdc require canonicalization" = "yes", then
-"kdc name match implicit dollar without implicit canonicalization" should be
-set to "no" if possible.
-
-samba tool
-----------
-
-Two new sub-commands have been added to the user and computer commands:
-
-user|computer generate-csr
- Generate a Certificate signing request for an account containing the
- Object SID extension (extension 1.3.6.1.4.1.311.25.2)
-
-user|computer keytrust
- Add the public key details of a self signed certificate to an account.
- The command supports PEM and DER encoded public keys.
-
-
-New AIO rate-limiting VFS module
---------------------------------
-A new VFS stackable module has been introduced to implement rate-limiting for
-asynchronous I/O operations. Administrators can now enforce throughput ceilings
-by defining limits in either operations per second or bytes per second. The
-module utilizes a token-based algorithm to calculate real-time I/O load; when
-limits are exceeded, it dynamically injects millisecond delays into async
-operations to maintain the defined threshold.
-
REMOVED FEATURES
================
@@ -227,17 +26,12 @@ smb.conf changes
Parameter Name Description Default
-------------- ----------- -------
- strong certificate binding enforcement New full
- certificate backdating compensation New 0
- kdc always include pac New yes
- kdc require canonicalization New no
- kdc name match implicit dollar without canonicalization
- New yes
+
KNOWN ISSUES
============
-https://wiki.samba.org/index.php/Release_Planning_for_Samba_4.24#Release_blocking_bugs
+https://wiki.samba.org/index.php/Release_Planning_for_Samba_4.25#Release_blocking_bugs
#######################################
diff --git a/lib/tdb/ABI/tdb-1.3.17.sigs b/lib/tdb/ABI/tdb-1.4.15.sigs
similarity index 100%
copy from lib/tdb/ABI/tdb-1.3.17.sigs
copy to lib/tdb/ABI/tdb-1.4.15.sigs
diff --git a/lib/tdb/wscript b/lib/tdb/wscript
index cbb5c8bac43..55dc4bf43d7 100644
--- a/lib/tdb/wscript
+++ b/lib/tdb/wscript
@@ -1,7 +1,7 @@
#!/usr/bin/env python
APPNAME = 'tdb'
-VERSION = '1.4.14'
+VERSION = '1.4.15'
import sys, os
--
Samba Shared Repository