Fix packaging on 32-bit platforms by disabling int128 dependency.
3.04 Mon 17 May 2021 10:58:37 AM EDT
- Fixed bug involving manually-specified IV not being used in some circumstances.
Release 2.7.0 (19 Jun 2021)
Added support for the ProxyCommand config file option and a corresponding proxy_command argument in the SSH connection options, allowing a subprocess to be used to make the connection to the SSH server. When the config option is used, it should be fully compatible with OpenSSH percent expansion in the command to run.
Added support for accessing terminal information as properties in the SSHServerProcess class. As part of this change, both the environment and terminal modes are now available as read-only mappings. Thanks again to velavokr for suggesitng this and submitting a PR with a proposed version of the change.
Fixed terminal information passed to pty_requested() callback to properly reflect requested terminal type, size, and modes. Thanks go to velavokr for reporting this issue and proposing a fix.
Fixed an edge case where a connection object might not be cleaned up properly if the connection request was cancelled before it was fully established.
Fixed an issue where some unit tests weren’t properly closing connection objects before exiting.
0.6.2 - 2021-06-27
Changed:
- Bump the Rust version in Dockerfile
- Use entrypoint for the docker container
- Update the docker command for quickly launching the app
0.6.1 - 2021-06-26
Changed:
- Run the container as non-root/dedicated user
- Update the docker alias in README.md
0.6.0 - 2021-06-25
Added:
- Support importing keys from the clipboard (#3)
- Add git-cliff configuration file
Changed:
- Update the keyserver link
Fixed:
- Apply clippy lints
- Update application command tests
## 2.6.6 (2021-06-11)
### Fixed
- Fix focusing search when pressing hotkey [#6603]
- Trim whitespace from TOTP key input prior to processing [#6604]
- Fix building on macOS [#6598]
- Resolve compiler warnings for unused return values [#6607]
## 2.6.5 (2021-06-07)
### Added
- Show search bar when toolbar is hidden or in overflow [#6279]
- Show countdown for clipboard clearing in status bar [#6333]
- Command line option to lock all open databases [#6511]
- Allow CSV import of bare TOTP secrets [#6211]
- Retain file creation time when saving database [#6576]
- Set permissions of saved attachments to be private to the current user [#6363]
- OPVault: Use Text instead of Name for attribute names [#6334]
### Changed
- Reports: Allow resizing of reports columns [#6435]
- Reports: Toggle showing expired entries [#6534]
- Save Always on Top setting [#6236]
- Password generator can exclude additional lookalike characters (6/G, 8/B) [#6196]
### Fixed
- Allow setting MSI properties in unattended install [#6196]
- Update MainWindow minimum size to enable smaller verticle space [#6196]
- Use application font size when setting default or monospace fonts [#6332]
- Fix notes not clearing in entry preview panel in some cases [#6481]
- macOS: Correct window activation when restoring from tray [#6575]
- macOS: Better handling of minimize after unlock when using browser integration [#6338]
- Linux: Start after the system tray is available on LXQt [#6216]
- Linux: Allow selection of modal dialogs on X11 in Auto-Type [#6204]
- KeeShare: prevent crash when file extension is missing [#6174]
2020-10-27: Hitch 1.7.0 released. This introduces support for PROXYv2 in --proxy-proxy mode,
adds new command line switches for various settings, and fixes a bug relating to an imbalance
in worker process load distribution, among other things. See the changelog for more information.
2020-08-31: Hitch 1.6.1 released. Fixes an issue in the PROXYv2 handling where we sometimes would
transmit the wrong 'verify' status for client certificate verification. (changelog)
3.1.1 (2021-05-31)
------------------
OAuth2.0 Provider - Bugfixes
* Fix acceptance of valid IPv6 addresses in URI validation
OAuth2.0 Client - Bugfixes
* Base OAuth2 Client now has a consistent way of managing the `scope`: it consistently
relies on the `scope` provided in the constructor if any, except if overridden temporarily
in a method call. Note that in particular providing a non-None `scope` in
`prepare_authorization_request` or `prepare_refresh_token` does not override anymore
`self.scope` forever, it is just used temporarily.
* MobileApplicationClient.prepare_request_uri and MobileApplicationClient.parse_request_uri_response,
ServiceApplicationClient.prepare_request_body,
and WebApplicationClient.prepare_request_uri now correctly use the default `scope` provided in
constructor.
* LegacyApplicationClient.prepare_request_body now correctly uses the default `scope` provided in constructor
OAuth2.0 Provider - Bugfixes
* client_credentials grant: fix log message
* OpenID Connect Hybrid - fix nonce not passed to add_id_token
* Different prompt values are now handled according to spec (e.g. prompt=none)
* OpenID Connect - fix Authorization: Basic parsing
General
* improved skeleton validator for public vs private client
* replace mock library with standard unittest.mock
* build isort integration
* python2 code removal
* add python3.8 support
* bump minimum versions of pyjwt and cryptography
mdigest reads the files from the argument list and computes a message
digest hash for the file content.
If the argument list is empty mdigest reads from standard in.
Packaged for wip by Matthias Ferdinand.
This library implements the SPAKE2 password-authenticated key exchange
("PAKE") algorithm. This allows two parties, who share a weak password,
to safely derive a strong shared secret (and therefore build an
encrypted+authenticated channel).
Packaged for wip by Matthias Ferdinand.
This module implements the HMAC Key Derivation function, defined at
http://tools.ietf.org/html/draft-krawczyk-hkdf-01
There are two interfaces: a functional interface, with separate extract
and expand functions as defined in the draft RFC, and a wrapper class
for these functions.
Never two without three
Maybe™️ actually™️ the last v1.0.0 release candidate!
Encrypted identity files are now supported. Regular passphrase-encrypted
age files can be used with -i, the passphrase will be requested
interactively, and the decrypted file will be read line-by-line as
a standard identity file.
Passphrases can now be requested interactively from the terminal
on Windows even if standard input is in use.
Errors are now tidier and all start with age: error: .
This version updates Tor to 0.4.5.9, including important security
fixes.
Warning:
Tor Browser will stop supporting version 2 onion services later
this year. Please see the previously published deprecation timeline.
Migrate your services and update your bookmarks to version 3 onion
services as soon as possible.
Quote from commit logs:
1.0.10 (2021-06-09)
* Support enumerating platforms for a extension
* Fixup enumerating the extensions for a platform
* Remove an extra word word
Quote from commit logs:
2.0.47 (2021-06-09)
* Support enumerating all extension names
* Support enumerating Meterpreter extension suffixs
* Fix a typo in how suffixes is spelled
* Rename a function and update a regex
Certbot 1.16.0
Changed
DNS plugins based on lexicon now require dns-lexicon >= v3.1.0
Use UTF-8 encoding for renewal configuration files
Windows installer now cleans up old Certbot dependency packages
before installing the new ones to avoid version conflicts.
This release contains a substantial command-line UX overhaul,
based on previous user research. The main goal was to streamline
and clarify output. If you would like to see more verbose output, use
the -v or -vv flags. UX improvements are an iterative process and
the Certbot team welcomes constructive feedback.
Functions certbot.crypto_util.init_save_key and certbot.crypto_util.init_save_csr,
whose behaviors rely on the global Certbot config singleton, are deprecated and will
be removed in a future release. Please use certbot.crypto_util.generate_key and
certbot.crypto_util.generate_csr instead.
Fixed
Fix TypeError due to incompatibility with lexicon >= v3.6.0
Installers (e.g. nginx, Apache) were being restarted unnecessarily after dry-run renewals.
Colors and bold text should properly render in all supported versions of Windows.
[0.5.0] - 2021-06-13
Added:
-Support setting the default signing key via options menu
Changed:
-Update Dockerfile about crate dependency location
-Update COMMANDS.md about getting/setting default signing key
-Update README.md about setting the default signing key
Trustme 0.8.0 (2021-06-08)
Features
It’s now possible to set an expiry date on server certificates, either with --expires-on in the CLI or with not_after in trustme.CA.issue_cert.
Support Python 3.10
Set correct KeyUsage and ExtendedKeyUsage extensions, per CA/B Forum baseline requirements
1.9.7p1 (2021-06-11)
What's new in Sudo 1.9.7p1
* Fixed an SELinux sudoedit bug when the edited temporary file
could not be opened. The sesh helper would still be run even
when there are no temporary files available to install.
* Fixed a compilation problem on FreeBSD.
* The sudo_noexec.so file is now built as a module on all systems
other than macOS. This makes it possible to use other libtool
implementations such as slibtool. On macOS shared libraries and
modules are not interchangeable and the version of libtool shipped
with sudo must be used.
* Fixed a few bugs in the getgrouplist() emulation on Solaris when
reading from the local group file.
* Fixed a bug in sudo_logsrvd that prevented periodic relay server
connection retries from occurring in "store_first" mode.
* Disabled the nss_search()-based getgrouplist() emulation on HP-UX
due to a crash when the group source is set to "compat" in
/etc/nsswitch.conf. This is probably due to a mismatch between
include/compat/nss_dbdefs.h and what HP-UX uses internally. On
HP-UX we now just cycle through groups the slow way using
getgrent(). Bug #978.
0.24.0 (stable)
* Use inclusive language on certificate distrust. Note: This changes
the directory and attribute names to distrust certain CAs to
"blocklist" [PR#324]
* Fix issues spotted by coverity and ASan [PR#349, PR#351]
* Integrate gettext with tools more tightly [PR#358]
* rpc: Forbid use of array of attributes [PR#365, PR#367]
* Build fixes [PR#342, PR#344, PR#345, PR#353, PR#362, PR#364]
age is a simple, modern and secure file encryption tool, format,
and Go library.
It features small explicit keys, no config options, and UNIX-style
composability
The format specification is at age-encryption.org/v1. age was
designed by @Benjojo12 and @FiloSottile.
An alternative interoperable Rust implementation is available at
github.com/str4d/rage.
Changes from 2.6.1, from the NEWS file
2.7.0 - June 1st 2021
----------------------
36 commits, 45 files changed, 1945 insertions, 177 deletions
* CVE-2021-28091: Fix signature checking on unsigned response with multiple assertions
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28091
When AuthnResponse messages are not signed (which is
permitted by the specifiation), all assertion's signatures should be
checked, but currently after the first signed assertion is checked all
following assertions are accepted without checking their signature, and
the last one is considered the main assertion.
This patch :
* check signatures from all assertions if the message is not signed,
* refuse messages with assertion from different issuers than the one on
the message, to prevent assertion bundling event if they are signed.
* Python: improve display of warnings in the binding generator
* replace deprecated index() by strchr() (#51385)
* Fix: new provider reference count is incremented one time too many (#51420)
* docs: update gtk-doc-tools integration (#50441)
* bindings: disable java tests when java is disabled
* Fix: python3 bindings (#51249)
* configure.ac: disable java bindings
* build: update to use origin/main
* debian: add packaging for debian-buster
* jenkins.sh: build against all available python versions (#44287)
* python: do not leak out_pyvalue if method call protocol is not respected (#44287)
* python: do not raise in valid_seq() (#44287)
* python: return NULL if get_list_of_strings() fails (#44287)
* python: return NULL if get_list_of_pygobject fails (#44287)
* python: return NULL if get_list_of_xml_nodes fails (#44287)
* python: return NULL if set_list_of_pygobject fails (#44287)
* python: return NULL if set_list_of_xml_nodes fails (#44287)
* python: return NULL if set_list_of_strings fails (#44287)
* python: return NULL if set_hashtable_of_strings fails (#44287)
* python: return NULL if set_hashtable_of_pygobject fails (#44287)
* python: free internal string buffer if needed in set_list_of_strings (#44287)
* python: check if hashtable is NULL before deallocatio (#44287)n
* python: add a failure label to method wrappers (#44287)
* python: add macro for early return (#44287)
* python: remove newline before method call (#44287)
* python: simplify get_logger_object (#44287)
* python: fix warning about discarded const modifier (#44287)
* python: replace exception by warning on logging path (#44287)
* python: use simpler call format to prevent warning about PY_SSIZE_T_CLEAN (#44287)
* python: remove deprecated PyErr_Warn (#44287)
* python: remove unused PyString_Size (#44287)
* python: Exception.message was removed in python3 (#45995)
* tools: reimplement xmlURIEscapeStr to respect RFC3986 (#45581)
* configure.ac: support php7 interpreter on CentOS 8 (#42299)
NEWS for the Nettle 3.7.3 release
This is bugfix release, fixing bugs that could make the RSA
decryption functions crash on invalid inputs.
Upgrading to the new version is strongly recommended. For
applications that want to support older versions of Nettle,
the bug can be worked around by adding a check that the RSA
ciphertext is in the range 0 < ciphertext < n, before
attempting to decrypt it.
Thanks to Paul Schaub and Justus Winter for reporting these
problems.
The new version is intended to be fully source and binary
compatible with Nettle-3.6. The shared library names are
libnettle.so.8.4 and libhogweed.so.6.4, with sonames
libnettle.so.8 and libhogweed.so.6.
Bug fixes:
* Fix crash for zero input to rsa_sec_decrypt and
rsa_decrypt_tr. Potential denial of service vector.
* Ensure that all of rsa_decrypt_tr and rsa_sec_decrypt return
failure for out of range inputs, instead of either crashing,
or silently reducing input modulo n. Potential denial of
service vector.
* Ensure that rsa_decrypt returns failure for out of range
inputs, instead of silently reducing input modulo n.
* Ensure that rsa_sec_decrypt returns failure if the message
size is too large for the given key. Unlike the other bugs,
this would typically be triggered by invalid local
configuration, rather than by processing untrusted remote
data.
v 11.2.8
============================================================
x Quiet down unnecessary debug logging (issue #191)
x [L10n] Updated he, de
x Fix meta refresh sometimes ignored on Firefox 78 ESR
(issue #192, thanks hackerncoder for report)
x Chromium-specific build-time customizations
v 11.2.8rc2
============================================================
x Quiet down unnecessary debug logging (issue #191)
x [L10n] Updated he
v 11.2.8rc1
============================================================
x Fix meta refresh sometimes ignored on Firefox 78 ESR
(issue #192, thanks hackerncoder for report)
x [l10n] Updated de
x Chromium-specific build-time customizations
v 11.2.7
============================================================
x Better prompt layout (no accidental scrollbar)
x [nscl] Fix regression causing media patches to break some
pages (thanks l0drex for report, issue #189)
v 11.2.6
============================================================
x [nscl] Various webgl blocking enhancements
x Remove also sticky-positioned elements with click+DEL on
scriptless pages (thanks skriptimaahinen for RFE)
x [L10n] Updated bn, br, ca, da, de, el, es, fr, he, is, it,
ja, lt, mk, ms, nb, nl, pl, pt_BR, ru, sq, sv_SE, tr,
zh_CN, zh_TW
x Fixed race condition causing external CSS not to be
rendered sometimes when unrestricted CSS is disabled
x Avoid document rewriting for noscript meta refresh
emulation in most cases
x [nscl] Fixed XHTML pages broken when served with
application/xml MIME type and no "object" capability
x [nscl] Switch early content script configuration to use
/nscl/service/DocStartInjection.js
x Configurable "unrestricted CSS" capability to for sites
where the CSS PP0 mitigation should be disabled
(e.g TRUSTED)
x [nscl] Fix CSS PP0 mitigation still interfering with some
WebExtensions (thanks barbaz for report)
x [XSS] Increased sensitivity and specificity of risky
operator pre-checks
v 11.2.6rc1
============================================================
x [nscl] Various webgl blocking enhancements
x Remove also sticky-positioned elements with click+DEL on
scriptless pages (thanks skriptimaahinen for RFE)
v 11.2.5rc6
============================================================
x [L10n] Updated bn, br, ca, da, de, el, es, fr, he, is, it,
ja, lt, mk, ms, nb, nl, pl, pt_BR, ru, sq, sv_SE, tr,
zh_CN, zh_TW
x Policy retrieval origin fine tuning
v 11.2.5rc5
============================================================
x Fixed hook not taking in account experimental webgl
contexts (issue #187, thanks roman567e45 for report)
v 11.2.5rc4
============================================================
x Fixed regression in NOSCRIPT emulation (thanks barbaz for
reporting)
v 11.2.5rc3
============================================================
x Fixed race condition causing external CSS not to be
rendered sometimes when unrestricted CSS is disabled
x Rename "unchecked CSS" capability to "unrestricted CSS"
x Avoid document rewriting for noscript meta refresh
emulation in most cases
v 11.2.5rc2
============================================================
x [nscl] Minor fixes from the library
x [nscl] Fixed XHTML pages broken when served with
application/xml MIME type and no "object" capability
x [nscl] Switch early content script configuration to use
/nscl/service/DocStartInjection.js
x [nscl] Refactored ContentScriptOnce.js to the library
x Rename the "csspp0" capability to "unchecked_css"
v 11.2.5rc1
============================================================
x Configurable "csspp0" capability to for sites where the
CSS PP0 mitigation should be disabled (e.g TRUSTED)
x [nscl] Fix CSS PP0 mitigation still interfering with some
WebExtensions (thanks barbaz for report)
x [XSS] Increased sensitivity and specificity of risky
operator pre-checks
This version updates Firefox to 78.11esr. This version includes
important security updates to Firefox for Desktop.
Warning:
Tor Browser will stop supporting version 2 onion services later
this year. Please see the previously published deprecation timeline.
Migrate your services and update your bookmarks to version 3 onion
services as soon as possible.
pkgsrc change: remove restriction to depeding package, requirement gpgme
package to using gnupg1 PKG_OPTIONS.
Approved by tpaul@.
1.5.0 (2021-04-10)
* Added new README.md
1.5.0RC2 (2021-03-07)
* Fixed build with libgpgme 1.3
* Fixed largefile support on 32-bit platforms
* Fixed tests in PECL archive
1.5.0RC1 (2021-02-14)
* Added support for PHP 8
* Added support for GnuPG 2.1+
* Added argument info for all functions and methods (reflection support)
* Added new function `gnupg_getengineinfo`
* Added new function `gnupg_geterrorinfo`
* Added init array argument for setting home dir and gpg binary file name
* Added additional fields to `gnupg_keyinfo` returned array
* Added parameter to `gnupg_keyinfo` to use `secret_only`
* Fixed `gnupg_deletekey` to use boolean for `allow_secret` parameter
[0.3.0] - 2021-06-05
Added:
-Add packaging status badge to README.md
-Add Matrix room link to social media section in README.md
Changed:
-Display notations of the signatures (#8)
-Update README.md about Docker alias
-Update README.md about the format of notations
-Update the example notation in README.md
-Update the style of flags
Fixed:
-Run container process as unprivileged user
0.103.2 (2021-04-07)
ClamAV 0.103.2 is a security patch release with the following fixes:
* CVE-2021-1386: Fix for UnRAR DLL load privilege escalation. Affects
0.103.1 and prior on Windows only.
* CVE-2021-1252: Fix for Excel XLM parser infinite loop. Affects 0.103.0
and 0.103.1 only.
* CVE-2021-1404: Fix for PDF parser buffer over-read; possible crash.
Affects 0.103.0 and 0.103.1 only.
* CVE-2021-1405: Fix for mail parser NULL-dereference crash. Affects
0.103.1 and prior.
* Fix possible memory leak in PNG parser.
* Fix ClamOnAcc scan on file-creation race condition so files are scanned
after their contents are written.
* FreshClam: Deprecate the SafeBrowsing config option. The SafeBrowsing
option will no longer do anything.
* For more details, see our blog post from last year about the future of the
ClamAV Safe Browsing database.
* Tip: If creating and hosting your own safebrowing.gdb database, you can
use the DatabaseCustomURL option in freshclam.conf to download it.
* FreshClam: Improved HTTP 304, 403, & 429 handling.
* FreshClam: Added back the mirrors.dat file to the database directory.
This new mirrors.dat file will store:
- A randomly generated UUID for the FreshClam User-Agent.
- A retry-after timestamp that so FreshClam won't try to update
after having received an HTTP 429 response until the Retry-After
timeout has expired.
* FreshClam will now exit with a failure in daemon mode if an HTTP 403
(Forbidden) was received, because retrying later won't help any. The
FreshClam user will have to take actions to get unblocked.
* Fix the FreshClam mirror-sync issue where a downloaded database is "older
than the version advertised."
* If a new CVD download gets a version that is older than advertised,
FreshClam will keep the older version and retry the update so that the
incremental update process (CDIFF patch process) will update to the latest
version.
Fix some pkglint, including renaming a patch to match the file it applies
to.
This is polkit 0.119.
Highlights:
meson build system added
CVE-2021-3560 mitigation
Build requirements
glib, gobject, gio >= 2.32
mozjs-78
gobject-introspection >= 0.6.2 (optional)
pam (optional)
ConsoleKit OR systemd
Changes since polkit 0.118:
Inigo Martinez:
meson build system added alongside autotools (many thanks!!)
Matthias Classen:
properties in text listener
René Genz:
typos fixups
Balázs Úr:
Update Hungarian translation
Hendrik Werner:
meson post-install script mod to avoid calling external processes
Kevin Backhouse, Jan Rybar:
CVE-2021-3560 mitigation
Many thanks to all contributors!
Jan Rybar et al.,
June 3, 2021
[0.2.0] - 2021-06-02
Added:
-Add installation instructions for FreeBSD
-Add Homebrew instructions to README.md
-Add NetBSD instructions to README.md
Changed:
-Update table of contents
-Support xplr for file selection (closes#2)
-Use eprintln macro while printing errors
-Update README.md about the use of xplr
Quote from commit logs:
0.1.29 (2021-03-25)
* Land #31, Consistently return nil as the failure indicator
0.1.28 (2021-03-25)
* Land #30, Fix Some RangeWalker issues
0.1.27 (2021-03-24)
* Land #28, RangeWalker Updates To Return Hostnames When Available
Relase 0.17.0 (27 May 2021)
New API:
* Keys that use explicit curve parameters can now be read and written.
Reading of explicit curves can be disabled by using the
`valid_curve_encodings` keyword argument in `VerifyingKey.from_pem()`,
`VerifyingKey.from_der()`, `SigningKey.from_pem()`, and
`SigningKey.from_der()`.
* Keys can now be written with use of explicit curve parameters,
use `curve_parameters_encoding` keyword argument of `VerifyingKey.to_pem()`,
`VerifyingKey.to_der()`, `SigningKey.to_pem(), or `SigningKey.to_der()` to
specify the format. By default `named_curve` will be used, unless the
curve doesn't have an associated OID (as will be the case for an unsupported
curve), then `explicit` encoding will be used.
* Allow specifying acceptable point formats when loading public keys
(this also fixes a minor bug where python-ecdsa would accept raw
encoding for points in PKCS#8 files). Set of accepted encodings is controlled
by `valid_encodings` keyword argument in
`ECDH.load_received_public_key_bytes()`, `VerifyingKey.from_string()`,
`VerifyingKey.from_pem()`, VerifyingKey.from_der()`.
* `PointJacobi` and `Point` now inherit from `AbstractPoint` that implements
the methods for parsing points. That added `from_bytes()` and
`to_bytes()` methods to both of them.
* Curve parameters can now be read and written to PEM and DER files. The
`Curve` class supports new `to_der()`, `from_der()`, `to_pem()`, and
`from_pem()` methods.
Doc fix:
* Describe in detail which methods can raise `RSZeroError`, and that
`SigningKey.sign_deterministic()` won't raise it.
Bug fix:
* Correctly truncate hash values larger than the curve order (only impacted
custom curves and the curves added in this release).
* Correctly handle curves for which the order is larger than the prime
(only impacted custom curves and the secp160r1 curve added in this release).
* Fix the handling of `==` and `!=` for `Public_key`, `Private_key`, `Point`,
`PointJacobi`, `VerifyingKey`, and `SigningKey` so that it behaves
consistently and in the expected way both in Python 2 and Python 3.
* Implement lock-less algorithm inside PointJacobi for keeping shared state
so that when calculation is aborted with KeyboardInterrupt, the state doesn't
become corrupted (this fixes the occasional breakage of ecdsa in interactive
shells).
New features:
* The `speed.py` script now provides performance for signature verification
without use of precomputation.
* New curves supported: secp112r1, secp112r2, secp128r1, secp160r1.
Performance:
* Use 2-ary Non-Adjacent Form for the combined multiply-add. This speeds up
single-shot verify (i.e. without precomputation) by about 4 to 5%.
* Use native Python 3.8 support for calculating multiplicative inverses.
Maintenace:
* Include Python 3.9 in PyPI keywords.
* More realistic branch coverage counting (ignore Python version-specific
branches).
* Additional test coverage to many parts of the library.
* Migrate to Github Actions for Continuous Testing.
Added:
-Add dependency installation instructions for Void Linux (#11)
Changed:
-Mention distribution-specific dependencies in README.md (#10)
-Update the formatting of requirements in README.md
-Update README.md about installation for Arch Linux
* Version 3.7.2 (released 2021-05-29)
** libgnutls: The priority string option %DISABLE_TLS13_COMPAT_MODE was added
to disable TLS 1.3 middlebox compatibility mode
** libgnutls: The Linux kernel AF_ALG based acceleration has been added.
This can be enabled with --enable-afalg configure option, when libkcapi
package is installed (#308).
** libgnutls: Fixed timing of early data exchange. Previously, the client was
sending early data after receiving Server Hello, which not only negates the
benefit of 0-RTT, but also works under certain assumptions hold (e.g., the
same ciphersuite is selected in initial and resumption handshake) (#1146).
** certtool: When signing a CSR, CRL distribution point (CDP) is no longer
copied from the signing CA by default (#1126).
** libgnutls: The GNUTLS_NO_EXPLICIT_INIT envvar has been renamed to
GNUTLS_NO_IMPLICIT_INIT to reflect the purpose (#1178). The former is now
deprecated and will be removed in the future releases.
** certtool: When producing certificates and certificate requests, subject DN
components that are provided individually will now be ordered by
assumed scale (e.g. Country before State, Organization before
OrganizationalUnit). This change also affects the order in which
certtool prompts interactively. Please rely on the template
mechanism for automated use of certtool! (#1243)
** API and ABI modifications:
gnutls_early_cipher_get: Added
gnutls_early_prf_hash_get: Added
Terminal User Interface for GnuPG.
It aims to ease the key management operations such as listing/exporting/signing
by providing an interface along with the command-line fallback for more complex
operations.
It is not trying to be a full-fledged interface for all the features that gpg
provides but it tries to bring a more interactive approach to key management.
Pkgsrc changes:
* None
Upstream changes:
v1.6.5:
May 20th, 2021
SECURITY:
* Non-Expiring Leases: Vault and Vault Enterprise renewed
nearly-expiring token leases and dynamic secret leases with a
zero-second TTL, causing them to be treated as non-expiring,
and never revoked. This issue affects Vault and Vault Enterprise
versions 0.10.0 through 1.7.1, and is fixed in 1.5.9, 1.6.5,
and 1.7.2 (CVE-2021-32923).
CHANGES:
* agent: Update to use IAM Service Account Credentials endpoint
for signing JWTs when using GCP Auto-Auth method [GH-11473]
* auth/gcp: Update to v0.8.1 to use IAM Service Account Credentials
API for signing JWTs [GH-11498]
BUG FIXES:
* core (enterprise): Fix plugins mounted in namespaces being
unable to use password policies [GH-11596]
* core: correct logic for renewal of leases nearing their expiration
time. [GH-11650]
* secrets/database: Fix marshalling to allow providing numeric
arguments to external database plugins. [GH-11451]
* secrets/database: Fixes issue for V4 database interface where
SetCredentials wasn't falling back to using RotateRootCredentials
if SetCredentials is Unimplemented [GH-11585]
* ui: Fix namespace-bug on login [GH-11182]
v1.6.4:
April 21, 2021
Release vault v1.6.4
v1.6.3
February 25, 2021
SECURITY:
* Limited Unauthenticated License Read: We addressed a security
vulnerability that allowed for the unauthenticated reading of
Vault licenses from DR Secondaries. This vulnerability affects
Vault and Vault Enterprise and is fixed in 1.6.3 (CVE-2021-27668).
CHANGES:
* secrets/mongodbatlas: Move from whitelist to access list API [GH-10966]
IMPROVEMENTS:
* ui: Clarify language on usage metrics page empty state [GH-10951]
BUG FIXES:
* auth/kubernetes: Cancel API calls to TokenReview endpoint when
request context is closed [GH-10930]
* core/identity: Fix deadlock in entity merge endpoint. [GH-10877]
* quotas: Fix duplicate quotas on performance standby nodes. [GH-10855]
* quotas/rate-limit: Fix quotas enforcing old rate limit quota paths [GH-10689]
replication (enterprise): Don't write request count data on DR Secondaries.
* Fixes DR Secondaries becoming out of sync approximately every 30s. [GH-10970]
* secrets/azure (enterprise): Forward service principal credential
creation to the primary cluster if called on a performance
standby or performance secondary. [GH-10902]
0.5.6 (2021-04-02)
* Add metadata to Gemspec file
* Change default timeout to be the same as Net::HTTP default, 60 seconds
instead of 30 seconds.
* Add support for PUT requests with Action Controller (#181)
Quote from commit logs:
1.0.7 (2021-03-22)
* Land #210, fix segfault on large tlv buffers
1.0.8 (2021-03-24)
* Land #211, add fs_search to mettle
1.0.9 (2021-04-08)
* Land #212, update dependencies and fix libeio
Quote from commit logs:
2.0.40 (2021-03-30)
* Land #480, Fix#479, fix python meterpreter resolve command
2.0.41 (2021-03-31)
* Land #481, fix request_fs_ls on inaccessible file
2.0.42 (2021-04-11)
* Add stdapi_net_resolve_host(s) support to the PHP meterpreter
* Land #483 - Avoid old PHP array indexing syntax
2.0.43 (2021-04-12)
* Land #482, add stdapi_net_resolve_hosts to php meterpreter
2.0.44 (2021-04-28)
* Land #484, Add stdapi_net_resolve_host(s) for Java
2.0.45 (2021-04-30)
* Land #486, fix python meterpreter http transport comm timeout
2.0.46 (2021-05-10)
* Land #488, fix HttpUserAgent on java/android
** Version 2.14.1 - 7 Nov 2017
* Bug Fixes
- Fixed a spelling error.
- Made relative path mode on Win32 to work.
** Version 2.14 - 12 Sep 2017
* New Features
- Optimizations to the fuzzy hashing engine. (hash generator can run as twice
as fast and comparison can run 1.5 through 5 times faster [heavily depends
on the data and platform] than the previous release)
* Bug Fixes
- Fixed issue when certain memory allocation is failed.
YARA v4.1.1
* BUGFIX: Accept the "+" character as valid in DLL names (#1501).
* BUGFIX: Buffer overrun in "macho" module.
* BUGFIX: Undefined behavior in Windows implementation of yr_filemap_xxx functions (#1302).
* BUGFIX: Crash due to consecutive jumps in hex strings (#1492).
The yara-python repository does not offer a corresponding release.
Since version 3.11.0:
YARA v4.1.0
* New operators icontains, endswith, iendswith, startswith, istartswith.
* Accept \t escape sequence in text strings.
* Add --no-follow-links command-line option to yara.
* Prevent yara from following links to "." (@1D2D).
* Implemented non-blocking scanning API (@simonhf).
* When a string causes too many matches, YARA raises a warning instead of failing (@wxsBSD).
* BUGFIX: The use of --timeout could hang yara when scanning directories or lists of files (#1481).
* BUGFIX: Incorrect parsing of PE certificates (#1443).
* BUGFIX: Short-circuit evaluation not working fine with undefined expressions.
YARA v4.1.0-rc2
* Don't raise warnings for non-ASCII strings.
YARA v4.1.0-rc1
* New operators icontains, endswith, iendswith, startswith, istartswith.
* Raise warnings for non-ascii strings.
* Accept \t escape sequence in text strings.
* Add --no-follow-links command-line option to yara.
* Prevent yara from following links to "." (@1D2D).
* Implemented non-blocking scanning API (@simonhf).
* When a string causes too many matches, YARA raises a warning instead of failing.
YARA v4.0.5
* BUGFIX: Fix bug in "macho" module introduced in v4.0.4.
YARA v4.0.4
* BUGFIX: Multiple out-of-bounds reads in "macho" module.
Credits to Luis Merino from X41 D-SEC GmbH for reporting these issues.
YARA v4.0.3
* BUGFIX: Multiple out-of-bounds read in "dotnet" module.
YARA v4.0.2
* BUGFIX: Use-after-free bug in PE module (#1287).
* BUGFIX: Incorrect errors in rules when a single rule is badly formatted (#1294).
* BUGFIX: Assertion failed with rules that have invalid syntax (#1295).
* BUGFIX: Integer overflow causing missed matches on files larger than 2GB (#1304).
* BUGFIX: Crashes in Mac OS while scanning binaries with a signature that can't be verified (#1309).
YARA v4.0.1
* Update sandboxed API (#1276).
* BUGFIX: Fix regression in exports parsing in PE module (2bf67e6).
* BUGFIX: Fix unaligned accesses in ARM (e1654ae).
YARA v4.0.0
* New string modifiers base64 and base64wide (#1185).
* New string modifier private (#1096).
* Iterators for dictionaries and arrays (#1141).
* Multiple API changes.
* Memory footprint greatly reduced, specially when compiling large numbers of rules.
* New commmand-line option --scan-list (#1261).
* Added pdb_path field to "pe" module.
* Added export_details array to "pe" module.
* Added exports_index functions to "pe" module.
* Improvements to "cuckoo" module.
* BUGFIX: PE files with multiple signatures are parsed correctly (#940).
* BUGFIX: Fix PE rich header parsing (#1164).
* BUGFIX: Buffer overruns in "dotnet" module (#1167, #1173).
libpe is the PE library used by pev - the PE file toolkit purely written in C
and available to many platforms. The features include:
* Support for both 32 and 64-bits PE files.
* ssdeep support (built-in libfuzzy).
* Disassemble support (built-in libudis86).
* Imphash support.
* Crypographic digests calculation (using OpeenSSL).
Upstream changes:
0.13 2021-05-03T15:37:39Z
- use --installed option while executing brew --prefix (PR#9 @skaji++)
0.12 2021-03-05T08:54:55Z
- backport from Net::SSLeay 1.90 (PR#7)
- use `brew --prefix` for OPENSSL_PREFIX if available (PR#8)
What's new in Sudo 1.9.7
* The "fuzz" Makefile target now runs all the fuzzers for 8192
passes (can be overridden via the FUZZ_RUNS variable). This makes
it easier to run the fuzzers in-tree. To run a fuzzer indefinitely,
set FUZZ_RUNS=-1, e.g. "make FUZZ_RUNS=-1 fuzz".
* Fixed fuzzing on FreeBSD where the ld.lld linker returns an
error by default when a symbol is multiply-defined.
* Added support for determining local IPv6 addresses on systems
that lack the getifaddrs() function. This now works on AIX,
HP-UX and Solaris (at least).
* Fixed a bug introduced in sudo 1.9.6 that caused "sudo -V" to
report a usage error. Also, when invoked as sudoedit, sudo now
allows a more restricted set of options that matches the usage
statement and documentation.
* Fixed a crash in sudo_sendlog when the specified certificate
or key does not exist or is invalid.
* Fixed a compilation error when sudo is configured with the
--disable-log-client option.
* Sudo's limited support for SUCCESS=return entries in nsswitch.conf
is now documented.
* Sudo now requires autoconf 2.70 or higher to regenerate the
configure script.
* sudo_logsrvd now has a relay mode which can be used to create
a hierarchy of log servers. By default, when a relay server is
defined, messages from the client are forwarded immediately to
the relay. However, if the "store_first" setting is enabled,
the log will be stored locally until the command completes and
then relayed.
* Sudo now links with OpenSSL by default if it is available unless
the --disable-openssl configure option is used or both the
--disable-log-client and --disable-log-server configure options
are specified.
* Fixed configure's Python version detection when the version minor
number is more than a single digit, for example Python 3.10.
* The sudo Python module tests now pass for Python 3.10.
* Sudo will now avoid changing the datasize resource limit
as long as the existing value is at least 1GB. This works around
a problem on 64-bit HP-UX where it is not possible to exactly
restore the original datasize limit.
* Fixed a race condition that could result in a hang when sudo is
executed by a process where the SIGCHLD handler is set to SIG_IGN.
* Fixed an out-of-bounds read in sudoedit and visudo when the
EDITOR, VISUAL or SUDO_EDITOR environment variables end in an
unescaped backslash. Also fixed the handling of quote characters
that are escaped by a backslash.
* Fixed a bug that prevented the "log_server_verify" sudoers option
from taking effect.
* The sudo_sendlog utility has a new -s option to cause it to stop
sending I/O records after a user-specified elapsed time. This
can be used to test the I/O log restart functionality of sudo_logsrvd.
* Fixed a crash introduced in sudo 1.9.4 in sudo_logsrvd when
attempting to restart an interrupted I/O log transfer.
* The TLS connection timeout in the sudoers log client was previously
hard-coded to 10 seconds. It now uses the value of log_server_timeout.
* The configure script now outputs a summary of the user-configurable
options at the end, separate from output of configure script tests.
* Corrected the description of which groups may be specified via the
-g option in the Runas_Spec section.
An implementation of the Double Ratchet cryptographic ratchet described by
https://whispersystems.org/docs/specifications/doubleratchet/, written in C and
C++11 and exposed as a C API.
This library also includes an implementation of the Megolm cryptographic
ratchet.
pkgsrc changes:
---------------
o Add a patch to localize the path of rebar by defining the REBAR
variable in MAKE_ENV.
upstream changes:
-----------------
Version 1.1.12
o Updating p1_utils to version 1.0.22.
Version 1.1.11
o Add missing applicaitons in fast_tls.app
upstream changes:
-----------------
Version 1.0.12
o Updating yconf to version 1.0.11.
Version 1.0.11
o Updating yconf to version 1.0.10.
o Add missing applicaitons to p1_acme.app
* Noteworthy changes in release 4.17.0 (2021-05-13) [stable]
- Print deprecation messages for deprecated macros, thanks to Tim Rühsen.
- Fix some clang issues due to illegal pointers, thanks to Stefan Weil.
- Restore handling of SIZE nodes, thanks to Dmitry Baryshkov.
- Fix memory leak caught by oss-fuzz, thanks to Dmitry Baryshkov.
- Gtk-doc fixes, thanks to Dmitry Baryshkov.
- Fix bugs unveiled by Static Analysis, reported by Simo Sorce.
- Update gnulib files and many build fixes.
Release 2.6.0 (1 May 2021)
Added support for the HostKeyAlias client config option and a corresponding host_key_alias option, allowing known_hosts lookups and host certificate validation to be done against a different hoetname than what is used to make the connection. Thanks go to Pritam Baral for contributing this feature!
Added the capability to specify client channel options as connection options, allowing them to be set in a connect() call or as values in SSHClientConnectionOptions. These values will act as defaults for any sessions opened on the connection but can still be overridden via arguments in the create_session() call.
Added support for dynamically updating SSH options set up in a listen() or listen_reverse() call. A new SSHAcceptor class is now returned by these calls which has an update() method which takes the same keyword arguments as SSHClientConnectionOptions or SSHServerConnectionOptions, allowing you to update any of the options on an existing listener except those involved in setting up the listening sockets themselves. Updates will apply to future connections accepted by that listener.
Added support for a number of algorithms supported by the ssh.com Tectia SSH client/server:
Key exchange:
diffie-hellman-group14-sha256@ssh.com (enabled by default)
diffie-hellman-group14-sha224@ssh.com (available but not default)
diffie-hellman-group15-sha256@ssh.comdiffie-hellman-group15-sha384@ssh.comdiffie-hellman-group16-sha384@ssh.comdiffie-hellman-group16-sha512@ssh.comdiffie-hellman-group18-sha512@ssh.com
HMAC:
hmac-sha256-2@ssh.com (all enabled by default)
hmac-sha224@ssh.comhmac-sha256@ssh.comhmac-sha384@ssh.comhmac-sha512@ssh.com
RSA public key algorithms:
ssh-rsa-sha224@ssh.com (all enabled by default)
ssh-rsa-sha256@ssh.comssh-rsa-sha384@ssh.comssh-rsa-sha512@ssh.com
Encryption:
seed-cbc@ssh.com (available but not default)
Added a new ‘ignore-failure’ value to the x11_forwarding argument in create_session(). When specified, AsyncSSH will attempt to set up X11 forwarding but ignore failures, behaving as if forwarding was never requested instead of raising a ConnectionOpenError.
Extended support for replacing certificates in an SSHKeyPair, allowing alternate certificates to be used with SSH agent and PKCS11 keys. This provides a way to use X.509 certificates with an SSH agent key or OpenSSH certificates with a PKCS11 key.
Extended the config file parser to support ‘=’ as a delimiter between keywords and arguments. While this syntax appears to be rarely used, it is supported by OpenSSH.
Updated Fido2 support to use version 0.9.1 of the fido2 package, which included some changes that were not backward compatible with 0.8.1.
Fixed problem with setting config options with percent substitutions to ‘none’. Percent subsitution should not be performed in this case. Thanks go to Yuqing Miao for finding and reporting this issue!
Fixed return type of filenames in SFTPClient scandir() and readlink() when the argument passed in is a Path value. Previously, the return value in this case was bytes, but that was only meant to apply when the input argument was passed as bytes.
Fixed a race condition related to closing a channel before it is fully open, preventing a client from potentially hanging forever if a session was closed while the client was still attempting to request a PTY or make other requests as part of opening the session.
Fixed a potential race condition related to making parallel calls to SFTPClient makedirs() which try to create the same directory or a common parent directory.
Fixed RFC 4716 parser to allow colons in header values.
Improved error message when AsyncSSH is unable to get the local username on a client. Thanks go to Matthew Plachter for reporting this issue.
This might need proper reworking to safely detect the krb5 version
and/or header location without guessing. Asking krb5-config might
be a solution also to tell between heimdal and mit-krb5 from
--version output.
This is needed for example for qt5-qtbase to pick up a pkgsrc-installed
heimdal instead of possibly a mix of system mit-krb5 libs with pkgsrc
headers, for its network auth that recently got GSSAPI.
It makes sense to provide the same pkg-config package name if heimdal and
mit-krb5 should be transparently compatible at that front.
Add ruby-rotp package version 6.2.0 required by Redmine 4.2.
The Ruby One Time Password Library
A ruby library for generating and validating one time passwords (HOTP &
TOTP) according to RFC 4226 and RFC 6238.
ROTP is compatible with Google Authenticator available for Android and
iPhone and any other TOTP based implementations.
Many websites use this for multi-factor authentication, such as GMail,
Facebook, Amazon EC2, WordPress, and Salesforce. You can find a more
complete list here:
https://en.wikipedia.org/wiki/Google_Authenticator#Usage.
Required by new version of textproc/ruby-kramdown-rfc2629.
Ensure net/https uses OpenSSL::SSL::VERIFY_PEER to verify SSL
certificates and provides certificate bundle in case OpenSSL cannot
find one.
Upstream changes:
OpenDNSSEC 2.1.9 - 2021-05-03
* OPENDNSSEC-955: Prevent concurrency between C_Login/C_OpenSession and
C_FindObject in PKCS#11 operations as some HSMs do not like this and
the key may (transiently) not be available.
* OPENDNSSEC-956: Harden the signing procedure to still sign zones for
which there are unused keys specified in the signconf. These are
included by the enforcer because there may be (outdated) signatures
for them, but the signer doesn't need this reference anymore in 2.1.
However this was left in for backwards compatibility (probably).
Now it should be more obvious when a package needs it as a dependency,
as it will fail loudly if it isn't declared as a tool.
While here, some duplicate dependencies on itstool were removed from the
MATE packages
This release of Mbed TLS provides bug fixes, minor enhancements and new features. This release includes fixes for security issues.
API changes
Renamed the PSA Crypto API output buffer size macros to bring them in line
with version 1.0.0 of the specification.
The API glue function mbedtls_ecc_group_of_psa() now takes the curve size
in bits rather than bytes, with an additional flag to indicate if the
size may have been rounded up to a whole number of bytes.
Renamed the PSA Crypto API AEAD tag length macros to bring them in line
with version 1.0.0 of the specification.
Default behavior changes
In mbedtls_rsa_context objects, the ver field was formerly documented
as always 0. It is now reserved for internal purposes and may take
different values.
New deprecations
PSA_KEY_EXPORT_MAX_SIZE, PSA_HASH_SIZE, PSA_MAC_FINAL_SIZE,
PSA_BLOCK_CIPHER_BLOCK_SIZE, PSA_MAX_BLOCK_CIPHER_BLOCK_SIZE and
PSA_ALG_TLS12_PSK_TO_MS_MAX_PSK_LEN have been renamed, and the old names
deprecated.
PSA_ALG_AEAD_WITH_DEFAULT_TAG_LENGTH and PSA_ALG_AEAD_WITH_TAG_LENGTH
have been renamed, and the old names deprecated.
Features
The PSA crypto subsystem can now use HMAC_DRBG instead of CTR_DRBG.
CTR_DRBG is used by default if it is available, but you can override
this choice by setting MBEDTLS_PSA_HMAC_DRBG_MD_TYPE at compile time.
Fix#3354.
Automatic fallback to a software implementation of ECP when
MBEDTLS_ECP_xxx_ALT accelerator hooks are in use can now be turned off
through setting the new configuration flag MBEDTLS_ECP_NO_FALLBACK.
The PSA crypto subsystem can now be configured to use less static RAM by
tweaking the setting for the maximum amount of keys simultaneously in RAM.
MBEDTLS_PSA_KEY_SLOT_COUNT sets the maximum number of volatile keys that
can exist simultaneously. It has a sensible default if not overridden.
Partial implementation of the PSA crypto driver interface: Mbed TLS can
now use an external random generator instead of the library's own
entropy collection and DRBG code. Enable MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG
and see the documentation of mbedtls_psa_external_get_random() for details.
Applications using both mbedtls_xxx and psa_xxx functions (for example,
applications using TLS and MBEDTLS_USE_PSA_CRYPTO) can now use the PSA
random generator with mbedtls_xxx functions. See the documentation of
mbedtls_psa_get_random() for details.
In the PSA API, the policy for a MAC or AEAD algorithm can specify a
minimum MAC or tag length thanks to the new wildcards
PSA_ALG_AT_LEAST_THIS_LENGTH_MAC and
PSA_ALG_AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG.
Security
Fix a security reduction in CTR_DRBG when the initial seeding obtained a
nonce from entropy. Applications were affected if they called
mbedtls_ctr_drbg_set_nonce_len(), if they called
mbedtls_ctr_drbg_set_entropy_len() with a size that was 3/2 times the key
length, or when the entropy module uses SHA-256 and CTR_DRBG uses AES-256.
In such cases, a random nonce was necessary to achieve the advertised
security strength, but the code incorrectly used a constant instead of
entropy from the nonce.
Found by John Stroebel in #3819 and fixed in #3973.
Fix a buffer overflow in mbedtls_mpi_sub_abs() when calculating
|A| - |B| where |B| is larger than |A| and has more limbs (so the
function should return MBEDTLS_ERR_MPI_NEGATIVE_VALUE). Only
applications calling mbedtls_mpi_sub_abs() directly are affected:
all calls inside the library were safe since this function is
only called with |A| >= |B|. Reported by Guido Vranken in #4042.
Fix an errorneous estimation for an internal buffer in
mbedtls_pk_write_key_pem(). If MBEDTLS_MPI_MAX_SIZE is set to an odd
value the function might fail to write a private RSA keys of the largest
supported size.
Found by Daniel Otte, reported in #4093 and fixed in #4094.
Fix a stack buffer overflow with mbedtls_net_poll() and
mbedtls_net_recv_timeout() when given a file descriptor that is
beyond FD_SETSIZE. Reported by FigBug in #4169.
Guard against strong local side channel attack against base64 tables by
making access aceess to them use constant flow code.
Bugfix
Fix use-after-scope error in programs/ssl/ssl_client2.c and ssl_server2.c
Fix memory leak that occured when calling psa_close_key() on a
wrapped key with MBEDTLS_PSA_CRYPTO_SE_C defined.
Fix an incorrect error code if an RSA private operation glitched.
Fix a memory leak in an error case in psa_generate_derived_key_internal().
Fix a resource leak in CTR_DRBG and HMAC_DRBG when MBEDTLS_THREADING_C
is enabled, on platforms where initializing a mutex allocates resources.
This was a regression introduced in the previous release. Reported in
#4017, #4045 and #4071.
Ensure that calling mbedtls_rsa_free() or mbedtls_entropy_free()
twice is safe. This happens for RSA when some Mbed TLS library functions
fail. Such a double-free was not safe when MBEDTLS_THREADING_C was
enabled on platforms where freeing a mutex twice is not safe.
Fix a resource leak in a bad-arguments case of mbedtls_rsa_gen_key()
when MBEDTLS_THREADING_C is enabled on platforms where initializing
a mutex allocates resources.
Fixes a bug where, if the library was configured to include support for
both the old SE interface and the new PSA driver interface, external keys were
not loaded from storage. This was fixed by #3996.
This change makes 'mbedtls_x509write_crt_set_basic_constraints'
consistent with RFC 5280 4.2.1.9 which says: "Conforming CAs MUST
include this extension in all CA certificates that contain public keys
used to validate digital signatures on certificates and MUST mark the
extension as critical in such certificates." Previous to this change,
the extension was always marked as non-critical. This was fixed by
#3698.
Changes
A new library C file psa_crypto_client.c has been created to contain
the PSA code needed by a PSA crypto client when the PSA crypto
implementation is not included into the library.
On recent enough versions of FreeBSD and DragonFlyBSD, the entropy module
now uses the getrandom syscall instead of reading from /dev/urandom.
Who should update
We recommend all users should update to take advantage of the bug fixes contained in this release at an appropriate point in their development lifecycle.
# New Features
- Support for DTLSv1.2.
- Continued rewrite of the record layer for the legacy stack.
- Numerous bugs and interoperability issues were fixed in the new
verifier. A few bugs and incompatibilities remain, so this release
uses the old verifier by default.
- The OpenSSL 1.1 TLSv1.3 API is not yet available.
# Portable Improvements
- Added '--enable-libtls-only' build option, which builds and
installs a statically-linked libtls, skipping libcrypto and libssl.
This is useful for systems that ship with OpenSSL but wish to also
package libtls.
- Update getentropy on Windows to use Cryptography Next Generation
(CNG). wincrypt is deprecated and no longer works with newer Windows
environments, such as in Windows Store apps.
# API and Documentation Enhancements
- Add a number of RPKI OIDs from RFC 6482, 6484, 6493, 8182, 8360,
draft-ietf-sidrops-rpki-rta, and draft-ietf-opsawg-finding-geofeeds.
- Add support for
[SSL_get_shared_ciphers(3)](https://man.openbsd.org/SSL_get_shared_ciphers.3)
with TLSv1.3.
- Add DTLSv1.2 methods.
- Implement SSL_is_dtls(3) and use it internally in place of the
SSL_IS_DTLS macro.
- Provide
[EVP_PKEY_new_CMAC_KEY(3)](https://man.openbsd.org/EVP_PKEY_new_CMAC_KEY.3).
- Add missing prototype for
[d2i_DSAPrivateKey_fp(3)](https://man.openbsd.org/d2i_DSAPrivateKey_fp.3) to x509.h.
- Add DTLSv1.2 to [openssl(1)](https://man.openbsd.org/openssl.1)
s_server and s_client protocol message logging.
- Provide
[SSL_use_certificate_chain_file(3)](https://man.openbsd.org/SSL_use_certificate_chain_file.3).
- Provide
[SSL_set_hostflags(3)](https://man.openbsd.org/SSL_set_hostflags.3)
and
[SSL_get0_peername(3)](https://man.openbsd.org/SSL_get0_peername.3).
- Provide various DTLSv1.2 specific functions and defines.
- Document meaning of '*' in the genrsa output.
- Updated documentation for
SSL_get_shared_ciphers(3)](https://man.openbsd.org/SSL_get_shared_ciphers.3).
- Add documentation for
[SSL_get_finished(3)](https://man.openbsd.org/SSL_get_finished.3).
- Document
[EVP_PKEY_new_CMAC_key(3)](https://man.openbsd.org/EVP_PKEY_new_CMAC_key.3).
- Document
[SSL_use_certificate_chain_file(3)](https://man.openbsd.org/SSL_use_certificate_chain_file.3).
- Document
[SSL_set_hostflags(3)](https://man.openbsd.org/SSL_set_hostflags.3)
and
[SSL_get0_peername(3)](https://man.openbsd.org/SSL_get0_peername.3).
- Update [SSL_get_version(3)](https://man.openbsd.org/SSL_get_version.3)
manual for DTLSv.1.2 support.
- Make supported protocols and options for DHE params more prominent in
[tls_config_set_protocols(3)](https://man.openbsd.org/tls_config_set_protocols.3).
- Various documentation improvements around TLS methods.
# Compatibility Changes
- Make [openssl(1)](https://man.openbsd.org/openssl.3) s_server ignore
-4 and -6 for compatibility with OpenSSL.
- Set SO_REUSEADDR on the server socket in the
[openssl(1)](https://man.openbsd.org/openssl.1) ocsp command.
- Send a host header with OCSP queries to make
[openssl(1)](https://man.openbsd.org/openssl.1) ocsp work with some
widely used OCSP responders.
- Add ability to [ocspcheck(8)](https://man.openbsd.org/ocspcheck.8) to
parse a port in the specified OCSP URL.
- Implement auto chain for the TLSv1.3 server since some software
relies on this.
- Implement key exporter for TLSv1.3.
- Align
[SSL_get_shared_ciphers(3)](https://man.openbsd.org/SSL_get_shared_ciphers.3)
with OpenSSL. This takes into account that it never returned server
ciphers, so now it will fail when called from the client side.
- Sync cert.pem with Mozilla NSS root CAs except "GeoTrust Global CA".
- Make
[SSL{_CTX,}_get_{min,max}_proto_version(3)](https://man.openbsd.org/SSL_CTX_get_min_proto_version.3)
return a version of zero if the minimum or maximum has been set to
zero to match OpenSSL's behavior.
- Add DTLSv1.2 support to
[openssl(1)](https://man.openbsd.org/openssl.1) s_client/s_server.
# Testing and Proactive Security
- Malformed ASN.1 in a certificate revocation list or a timestamp
response token can lead to a NULL pointer dereference.
- Pull in fix for
[EVP_CipherUpdate(3)](https://man.openbsd.org/EVP_CipherUpdate.3)
overflow from OpenSSL.
- Use EXFLAG_INVALID to handle out of memory and parse errors in
x509v3_cache_extensions().
- Refactor and clean up
[ocspcheck(8)](https://man.openbsd.org/ocspcheck.8) and add
regression tests.
# Internal Improvements
- Further cleanup of the DTLS record handling.
- Continue the replacement of the TLSv1.2 record layer by reimplementing
the read side of the TLSv1.2 record handling.
- Replace DTLSv1_enc_data() with TLSv1_1_enc_data().
- Merge d1_{clnt,srvr}.c into ssl_{clnt,srvr}.c.
- Add const to ssl_ciphers and tls1[23]_sigalgs* to push them into
.data.rel.ro and .rodata, respectively.
- Add a const qualifier to srtp_known_profiles.
- Simplify TLS method by removing the client and server specific methods
internally.
- Avoid casting away const in ssl_ctx_make_profiles().
- Avoid explicitly conditioning an assert on DTLS1_VERSION to make the
assert work for newer DTLS versions.
- Merge SSL_ENC_METHOD into SSL_METHOD_INTERNAL.
- Add a flag to mark DTLS methods as DTLS to have an easy way to
recognize DTLS methods that avoids inspecting the version number.
- Mark a few more internal static tables const.
- Switch finish{,_peer}_md_len from an int to a size_t.
- Use EVP_MD_MAX_MD_SIZE instead of 2 * EVP_MD_MAX_MD_SIZE as size for
cert_verify_md[], finish_md[] and peer_finish_md[]. The factor 2 was a
historical artefact.
- Free struct members in tls13_record_layer_free() in their natural
order for reviewability.
- Use consistent names in tls13_{client,server}_finished_{recv,send}().
- Add tls13_secret_{init,cleanup}() and use them throughout the TLSv1.3
code base.
- Move the read MAC key into the TLSv1.2 record layer.
- Make tls12_record_layer_free() NULL safe.
- Split the record protection from the TLSv1.2 record layer.
- Clean up sequence number handling in the new TLSv1.2 record layer.
- Clean up sequence number handling in DTLS.
- Clean up dtls1_reset_seq_numbers().
- Factor out code for explicit IV length, block size and MAC length from
tls12_record_layer_open_record_protected_cipher().
- Provide record layer overhead for DTLS.
- Provide functions to determine if TLSv1.2 record protection is
engaged.
- Add code to handle change of cipher state in the new TLSv1.2
record layer.
- Mop up now unused dtls1_build_sequence_numbers() function.
- Allow setting a keypair on a tls context without specifying the
private key, and fake it internally in libtls. This removes the need
for privsep engines like relayd to use bogus keys.
- Skip the private key check for fake private keys.
- Move the private key setup from tls_configure_ssl_keypair() to a
helper function with proper error checking.
- Change the internal tls_configure_ssl_keypair() function to return -1
instead of 1 on failure.
- Move sequence numbers into the new TLSv1.2 record layer.
- Move AEAD handling into the new TLSv1.2 record layer.
- Factor out legacy stack version checks.
- Correct handshake MAC/PRF for various TLSv1.2 cipher suites which were
originally added with the default handshake MAC and PRF rather than
the SHA256 handshake MAC and PRF.
- Absorb ssl3_get_algorithm2() into ssl_get_handshake_evp_md().
- Use dtls1_record_retrieve_buffered_record() to load buffered
application data.
- Enforce read ahead with DTLS.
- Remove bogus DTLS checks that disabled ECC and OCSP.
- Clean up and simplify dtls1_get_cipher().
- Group HelloVerifyRequest decoding and add missing check for
trailing data.
- Revise HelloVerifyRequest handling for DTLSv1.2.
- Handle DTLS1_2_VERSION in various places.
- Rename the "truncated" label into "decode_err" and the "f_err" label
into "fatal_err".
- Factor out and change some of the legacy client version code.
- Simplify version checks in the TLSv1.3 client. Ensure that the server
announced TLSv1.3 and nothing higher and check that the legacy_version
is set to TLSv1.2 as required by RFC 8446.
- Only use TLS versions internally rather than both TLS and DTLS
versions since the latter are the one's complement of the human
readable version numbers, which means that newer versions
decrease in value.
- Identify DTLS based on the version major value.
- Move handling of cipher/hash based cipher suites into the new
record layer.
- Add tls12_record_protection_unused() and call it from CCS functions.
- Move key/IV length checks closer to usage sites. Also add explicit
checks against
[EVP_CIPHER_{iv,key}_length()](https://man.openbsd.org/EVP_CIPHER_iv_length.3).
- Replace two handrolled tls12_record_protection_engaged().
- Improve internal version handling: add handshake fields for our
minimum version, our maximum version and the TLS version negotiated
during the handshake. Convert most of the internal code to use these
version fields.
- Guard against future internal use of
TLS1_get_{client,}_version() macros.
- Remove the internal ssl_downgrade_max_version() function which is no
longer needed.
- Add support for DTLSv1.2 version handling.
- Remove no longer needed read ahead workarounds in the s_client
and s_server.
- Split TLSv1.3 record protection from record layer.
- Move the TLSv1.3 handshake struct inside the shared handshake struct.
- Fully initialize rrec in tls12_record_layer_open_record_protected() to
avoid confusing some static analyzers.
- Use tls_set_errorx() on OCSP_basic_verify() failure since the latter
does not set errno.
- Convert openssl(1) x509 to new option handling and do the usual clean
up that goes along with it.
- Add SSL_HANDSHAKE_TLS12 for TLSv1.2 specific handshake data.
- Rename new_cipher to cipher to align naming with keyblock or other
parts of the handshake data.
- Move the TLSv1.2 record number increment into the new record layer.
- Move finished and peer finished into the handshake struct.
- Remove pointless assignment in SSL_get0_alpn_selected().
- Add some error checking to openssl(1) x509.
# Bug Fixes
- Move point-on-curve check to set_affine_coordinates to avoid verifying
ECDSA signatures with unchecked public keys.
- Fix [SSL_is_server(3)](https://man.openbsd.org/SSL_is_server.3) to
behave as documented by re-introducing the client-specific methods.
- Avoid undefined behavior due to memcpy(NULL, NULL, 0).
- Make SSL_get{,_peer}_finished() work when used with TLSv1.3.
- Correct the return value type from ERR_peek_error() to a long.
- Avoid use of uninitialized in ASN1_time_parse() which could happen on
parsing UTCTime if the caller did not initialize the passed struct tm.
- Destroy the mutex in a tls_config object on tls_config_free().
- Free alert_data and phh_data in tls13_record_layer_free(). These could
leak if [SSL_shutdown(3)](https://man.openbsd.org/SSL_shutdown.3) or
[tls_close(3)](https://man.openbsd.org/tls_close.3) were called after
closing the underlying socket().
- Gracefully handle root certificates being both trusted and untrusted.
- Handle X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE in the new verifier.
- Use the legacy verifier when building auto chains for TLS.
- Search the intermediates only after searching the root certs in the
new verifier to avoid problems with the legacy callback.
- Bail out early after finding a single chain in the new verifier, if we
have been called via the legacy verifier API.
- Set (invalid and likely incomplete) chain on the xsc on chain build
failure prior to calling the callback. This is required by various
callers, including auto chain.
- Remove direct assignment of aead_ctx to avoid a leak.
- Fail early in legacy exporter if the master secret is not available to
avoid a segfault if it is called when the handshake is not completed.
- Only print the certificate file once on verification failure.
- Fix an off-by-one in x509_verify_set_xsc_chain() to make sure that the
new validator checks for EXFLAG_CRITICAL in
x509_vfy_check_chain_extension() for all untrusted certs in the chain.
Take into account that the root is not necessarily trusted.
- Avoid passing last and depth to x509_verify_cert_error() on ENOMEM.
- Fix two bugs in the legacy verifier that resulted from refactoring
of [X509_verify_cert(3)](https://man.openbsd.org/X509_verify_cert.3)
for the new verifier: a return value was incorrectly treated as
boolean, making it insufficient to decide whether validation should
carry on or not.
- Fix checks for memory caps of constraints names. There are internal
caps on the number of name constraints and other names, that the new
name constraints code allocates per cert chain. These limits were
checked too late, making them only partially effective.
- Fix a copy-paste error - skid was confused with an akid when checking
for EXFLAG_INVALID. This broke OCSP validation with certain mirrors.
- Avoid a use-after-scope in tls13_cert_add().
- Avoid mangled output in BIO_debug_callback().
- Fix client initiated renegotiation by replacing use of
s->internal-type with s->server.
- Avoid transcript initialization when sending a TLS HelloRequest,
fixing server initiated renegotiation.
- Avoid leaking param->name in x509_verify_param_zero().
- Avoid a leak in an error path in openssl(1) x509.
- When sending an alert in TLSv1.3, only set its error code when no
other error was set previously. Certain clients rely on specific
SSL_R_ error codes to identify that they are dealing with a self
signed cert.
- When switching from the TLSv1.3 stack to the legacy stack include a
TLS record header. This is necessary if there is more than one
handshake message in the TLS plaintext record.
- Fix resource handling on error in OCSP_request_add0_id().
- Make sure there is enough room for stashing the handshake message when
switching to the legacy TLS stack.
- Fix a memory leak in the openssl(1) s_client.
- Unbreak DTLS retransmissions for flights that include a CCS.
- If x509_verify() fails, ensure that the error is set on both the
x509_verify_ctx() and its store context to make some failures visible
from SSL_get_verify_result().
- Use the X509_STORE_CTX get_issuer() callback from the new X.509
verifier to fix hashed certificate directories.
- Only check
[BIO_should_read(3)](https://man.openbsd.org/BIO_should_read.3) on
read and
[BIO_should_write(3)](https://man.openbsd.org/BIO_should_write.3) on
write. Previously,
[BIO_should_write(3)](https://man.openbsd.org/BIO_should_write.3) was
also checked after read and
[BIO_should_read(3)](https://man.openbsd.org/BIO_should_read.3) after
write which could cause stalls in software that uses the same BIO for
read and write.
- In [openssl(1)](https://man.openbsd.org/openssl.1) verify, also check
for error on the store context since the return value of
[X509_verify_cert(3)](https://man.openbsd.org/X509_verify_cert.3) is
unreliable in presence of a callback that returns 1 too often.
- Handle additional certificate error cases in the new X.509 verifier.
Keep track of the errors encountered if a verify callback tells the
verifier to continue and report them back via the error on the store
context. This mimics the behavior of the old verifier that would
persist the first error encountered while building the chain.
- Report specific failures for "self signed certificates" in a way
compatible with the old verifier since software relies on the
error code.
- Plug a large memory leak in the new verifier caused by calling
X509_policy_check(3) repeatedly.
- Avoid leaking memory in x509_verify_chain_dup().
1.90 2021-01-21
- New stable release incorporating all changes from developer releases
1.89_01 to 1.89_05.
- Summary of major changes since version 1.88:
- Formalised libssl version support policy: all stable versions of OpenSSL
in the 0.9.8 - 1.1.1 branches (with the exception of 0.9.8 - 0.9.8b) and
all stable releases of LibreSSL in the 2.0 - 3.1 series are supported.
The LibreSSL 3.2 series is not yet fully supported because its TLSv1.3
implementation is not currently libssl-compatible.
- Added support for LibreSSL on Windows when built with Visual C++.
- Exposed P_X509_CRL_add_extensions, several SSL_CIPHER functions, and
several stack functions.
- Fixed crashes in the callback functions CTX_set_next_proto_select_cb and
CTX_set_alpn_select_cb.
- The test suite is now compatible with OpenSSL 1.1.1e onwards, as well as
OpenSSL security level 2 (the default on many Linux distributions).
1.89_05 2021-01-21
- Expose SSL_get_ciphers. Thanks to github user dylc5190.
- Expose SSL_CIPHER_get_version and fix SSL_CIPHER_description
and SSL_CIPHER_get_bits. Also fixed and enhanced
documentation for these and related SSL_CIPHER functions.
- Clarify libssl version support policy: all stable versions of OpenSSL in
the 0.9.8 - 1.1.1 branches (with the exception of 0.9.8 - 0.9.8b) and all
stable releases of LibreSSL in the 2.0 - 3.1 series are supported.
- Direct bug reports to the GitHub repository, since rt.cpan.org will shut
down on 2021-03-01.
1.89_04 2021-01-13
- Fix crashes in the callback functions CTX_set_next_proto_select_cb() and
CTX_set_alpn_select_cb() caused by the use of a pointer returned by
SSL_select_next_proto() which may already have been freed under certain
circumstances. Fixes GH-222. Thanks to dylc5190 for the report.
- Remove the dependency on the AES128-SHA cipher suite in the test script
64_ticket_sharing.t. Fixes GH-231.
- Remove checks and warnings in Makefile.PL relating to the use of RSAref,
which was removed from OpenSSL in version 0.9.7.
1.89_03 2020-12-12
- Expose the following functions:
- X509_STORE_CTX_get0_cert, X509_STORE_CTX_get1_chain
- sk_X509_pop, sk_X509_shift, sk_X509_unshift,
- sk_X509_insert, sk_X509_delete, sk_x509_value, sk_X509_num
Thanks to Dan Freed.
- Correct the minimum OpenSSL version required for the following functions
to be made available (previously they were all declared to be present in
1.1.0-pre1, which caused Net::SSLeay to crash at run-time when built
against OpenSSL versions between 1.1.0-pre1 and 1.1.0-pre3):
- CTX_set_max_proto_version (added in 1.1.0-pre2)
- CTX_set_min_proto_version (added in 1.1.0-pre2)
- SESSION_up_ref (added in 1.1.0-pre4)
- set_max_proto_version (added in 1.1.0-pre2)
- set_min_proto_version (added in 1.1.0-pre2)
- Correct the minimum OpenSSL version required for get_SSL_CTX and SSL_ctrl
to be made available (previously they were declared to be present from
0.9.8f onwards, when in reality they are available in all 0.9.8 versions).
- Replace the PKI used by the test suite with one generated by the
generate-test-pki helper script. All entities in the new PKI have 2048-bit
RSA private keys and CSRs, certificates and CRLs with SHA-256 digests,
allowing the test suite to execute under OpenSSL security level 2 (now the
default security level for OpenSSL in many Linux distributions).
- Initialise libssl consistently in the test suite.
- Don't rely on the availability of specific SSL/TLS protocol versions or
cipher suites in the test suite; instead, dynamically select from any of
the available protocol versions and cipher suites permitted by libssl.
Fixes RT#132425. Thanks to Graham Ollis for the initial report of the test
suite failing on Ubuntu 20.04 with the Ubuntu-packaged OpenSSL, whose
configuration forbids the use of TLSv1.1 and below at run-time by default.
1.89_02 2020-08-07
- Add support for the P_X509_CRL_add_extensions function. Thanks to
Manuel Mausz for the patch.
- X509_get_subjectAltNames now knows how to return
GEN_RID. The returned value is an ASN OID in text format
with current maximum length of 2500 characters. Updated
t/local/33_x509_create_cert.t to use GEN_RID and all other
supported types with certificate request and signed
certificate. These relate to GitHub issue GH-149 opened by
s482dcaw.
- Support for 64-bit Windows versions of OpenSSL from 1.0.0-beta1
through to 1.0.0b has been withdrawn due to malfunctions occurring in
Perl programs that use fork(). This mainly affects users of Strawberry
Perl x64 5.12.3.20180709, which ships with OpenSSL 1.0.0-beta4.
Affected users should build Net-SSLeay against OpenSSL 1.0.0c or
above; users of Strawberry Perl x64 5.12.3.20180709 may instead find
it easier to upgrade to Strawberry Perl x64 5.14.4.1 or above. See
https://github.com/radiator-software/p5-net-ssleay/issues/189 for more
information.
1.89_01 2020-03-22
- Fix the repository URL in Makefile.PL (git:// rather than git@),
which was preventing it from being added to META.json. Thanks to
Dan Book.
- When building Net-SSLeay, exit if an OpenSSL executable cannot be
found in PATH. Fixes RT#131060. Thanks to Nigel Horne for the report.
- Remove non-OCSP external tests, many of which unnecessarily duplicate
local tests or fail for reasons outside of our control. Fixes
RT#129542. Thanks to Andreas Vögele for the bug report that
ultimately led to this change.
- Add support for LibreSSL on Windows when built with Visual C++.
Thanks to Graham Ollis for the patch.
- In SSL_CTX_free() and SSL_free(), clean callback-related data from
the global hash after freeing ctx, not before. This allows callbacks
to be executed during freeing. Thanks to Steffen Ullrich for the
patch.
- t/local/07_sslecho.t started failing with OpenSSL 1.1.1e. Updated
the test file with missing calls to Net::SSLeay::shutdown(). Also
added one call in SSLeay.pm sslcat() function. Enabling SSLeay trace
level 3 showed 'unexpected eof while reading' errors which were added
to OpenSSL with commit db943f43. This fixes GitHub issue GH-160
reported by Brett T. Warden.
- t/local/01_pod.t now requires Test::Pod 1.41 to work with Pod syntax
used with Net::SSLeay 1.88 and later. This fixes GitHub issue GH-147
reported by Ulrik Haugen.
2.070 2021/02/26
- changed bugtracker in Makefile.PL to github, away from obsolete rt.cpan.org
2.069 2021/01/22
- IO::Socket::Utils CERT_asHash and CERT_create now support subject and issuer
with multiple same parts (like multiple OU). In this case an array ref instead
of a scalar is used as hash value.
https://github.com/noxxi/p5-io-socket-ssl/issues/95
1.02 - 2021-04-09
- Work around an issue with CLI options for deleting secret keys in gpg 2.2
1.01 - 2021-01-26
- Make $gnupg->call('foo') update the internal GnuPG version number.
- Localize tainted PATH env to make exec happy
2.18 2020-11-25 Abhijit Menon-Sen <ams@toroid.org>
* Fix Makefile.PL to use -I. when executing tab/tables.pl, so that
it can find tab/misc.h (suggested by Tim V)
1.16 - 2021-04-01
* Add non-blocksized encoding support to streaming modes
* Explicitly use downgraded strings
1.15 - 2020-10-10
* Use standard uint8_t and uint32_t from stdint.h
3.03 Sun 18 Apr 2021 10:54:19 PM EDT
- Fixed bug which caused an extraneous block of garbage data to be appended to encrypted
string when "nopadding" specified and plaintext is even multiple of blocksize.
3.02
- CTR mode now requires the Math::Int128 module, which gives a ~5x performance
boost over Math::BigInt.
3.01
- Warn when the deprecated opensslv1 PBKDF (key derivation function) is used
for encryption. Turn off with -nodeprecate=>1 or by choosing a different
PBKDF, such as -pbkdf=>'pbkdf2'.
- Fix a regression when passing the legacy -salt=>1 argument.
3.00 Sun Feb 7 10:28:08 EST 2021
- Released version 3.00 in recognition of multiple new features
and cleanups.
2.37 Sun Feb 7 10:20:17 EST 2021
- Added better argument checking.
- Fixed long-standing standard padding bug: plaintext ending with
bytes between 0x00 and 0x0A would be truncated in some conditions.
- Fixed Rijndael_compat padding.
2.36 Wed 03 Feb 2021 09:19:06 AM EST
- Add support for OFB, CFB and CTR chain modes.
- New dependency: Math::BigInt
2.35 Sun Jan 31 22:02:42 EST 2021
- Add support for PBKDF2 key derivation algorithm
- New dependencies: Digest::SHA, Crypt::PBKDF2, Crypt::Cipher::AES
2.34 Fri Jan 29 18:08:12 EST 2021
- Support for openssl SHA-256 key derivation algorithm
PBKDF2 is a secure password hashing algorithm that uses the techniques
of "key strengthening" to make the complexity of a brute-force
attack arbitrarily high. PBKDF2 uses any other cryptographic hash
or cipher (by convention, usually HMAC-SHA1, but Crypt::PBKDF2 is
fully pluggable), and allows for an arbitrary number of iterations
of the hashing function, and a nearly unlimited output hash size
(up to 2**32 - 1 times the size of the output of the backend hash).
The hash is salted, as any password hash should be, and the salt
may also be of arbitrary size.
* Add Eq instance for Ctx
* Add start and startlazy producing Ctx
* Introduce new use-cbits cabal flag in order to add support for
FFI-less cryptohash-sha256-pure pass-thru
Version 1.5.5
* QUIC support #419#427#428#430#433#441
* Server ECDSA for P-256 #436
* Sort ciphersuites based on hardware-acceleration support #439
* Sending no_application_protocol #440
* Internal improvements #426#431
Version 1.5.4
* Restore interoperability with early Java 6 #422
* Test cleanups for timeout and async usage #416
0.28
* Add hash constant time capability
* Prevent possible overflow during hashing by hashing in 4GB chunks
0.27
* Optimise AES GCM and CCM
* Optimise P256R1 implementation
* Various AES-NI building improvements
* Add better ECDSA support
* Add XSalsa derive
* Implement square roots for ECC binary curve
* Various tests and benchmarks
gcc on solaris/illumos defines __STDC_VERSION__ in c++ mode where _Noreturn
does not exist.
This causes breakage when building c++17 programs that use openssl.
### Version 5.59, 2021.04.05, urgency: HIGH
* Security bugfixes
- OpenSSL DLLs updated to version 1.1.1k.
* New features
- Client-side "protocol = ldap" support (thx to Bart
Dopheide and Seth Grover).
* Bugfixes
- The test suite fixed not to require external connectivity.
- Fixed paths in generated manuals (thx to Tatsuki Makino).
- Fixed configuration reload when compression is used.
- Fixed compilation with early releases of OpenSSL 1.1.1.
Noteworthy changes in version 1.9.3 (2021-04-19)
------------------------------------------------
* Bug fixes:
- Fix build problems on i386 using gcc-4.7.
- Fix checksum calculation in OCB decryption for AES on s390.
- Fix a regression in gcry_mpi_ec_add related to certain usages of
curve 25519.
- Fix a symbol not found problem on Apple M1.
- Fix for Apple iOS getentropy peculiarity.
- Make keygrip computation work for compressed points.
* Performance:
- Add x86_64 VAES/AVX2 accelerated implementation of Camellia.
- Add x86_64 VAES/AVX2 accelerated implementation of AES.
- Add VPMSUMD acceleration for GCM mode on PPC.
* Internal changes.
- Harden MPI conditional code against EM leakage.
- Harden Elgamal by introducing exponent blinding.
- Fix memory leaks in the error code paths of EdDSA.
Changes:
3.11.13
-------
- Update user_guide.md
- Removed the previous CI/CD configuration
3.11.12
-------
- format: write characterization tests for parse.go
- Moved the DNS resolvers package to another repository
- Increased speed of the Google certificate transparency data source
- Addressing crash during cleanup issue #599
- Added the Security Weekly interview information
3.11.11
-------
- Improved data source service performance
- Addressing #519 by noticing expired contexts quickly
3.11.10
-------
- Support for the AMASS_CONFIG environment variable
Certbot 1.14.0
Changed
certbot-auto no longer checks for updates on any operating system.
The module acme.magic_typing is deprecated and will be removed in a future release.
Please use the built-in module typing instead.
The DigitalOcean plugin now creates TXT records for the DNS-01 challenge with a lower 30s TTL.
Fixed
Don't output an empty line for a hidden certificate when certbot certificates is being used
in combination with --cert-name or -d.
i would post a changelog, but loading the honeyd forum fails with this:
SQL ERROR [ mysql4 ]
Table './phpbb2/phpbb3_sessions' is marked as crashed and should be repaired [145]
An sql error occurred while fetching this page. Please contact an administrator if this problem persists.
This release is from 2007.
upstream has disappeared, this doesn't build with modern C++ compilers,
and i can't find any other packages from which to steal packages to fix
it in any other packaging systems.
development of this module appears to have been inactive upstream for
years so there's no support for modern openssl available.
the other packaging systems with a package for this are macports and
opensuse, neither of which have patches.
- fixes build with openssl 1.1
- add support for mbedtls as an option
- avoids regenerating autoconf bits
2020-11-17 - Version 1.27
* core: handle PIN expiration after C_Login as C_Login may take a while
* core: return explict success when plugin&play and no threading and no
safefork, thanks to Tunnelblick
2020-01-21 - Version 1.26
* openssl: build with openssl ec disabled
* openssl: support RSA_NO_PADDING padding, thanks to Selva Nair
* core: reduce mutex lock scope of add/remove provider, thanks to Frank Morgner
* core: improve the fork fixup sequence
2018-08-16 - Version 1.25.1
* core: build with threading disabled
2018-08-04 - Version 1.25
* core: do not attempt to initialize provider with fork mode is not safe. Too
many providers do not follow the PKCS#11 spec.
2018-06-15 - Version 1.24
* build: support libressl-2.7
2018-06-02 - Version 1.23
* build: cleanups.
* openssl: rework support 1.1.
2017-02-12 - Version 1.22
* spec: minor cleanups.
2017-01-06 - Version 1.21
* mbedtls: fix missing logic if issur certificate, thanks to Steffan Karger
2016-12-08 - Version 1.20
* polarssl: support polarssl-1.3, thanks to Steffan Karger.
* certificate: ignore certificate object without CKA_ID.
* openssl: fix memory leak, thanks to ASPj.
* openssl: support 1.1 and libressl, thanks to Daiki Ueno.
2013-10-11 - Version 1.11
* openssl: support generic pkey.
* openssl: add dsa support.
* openssl: add ecdsa support, thanks for Sanaullah for testing.