Commit graph

8747 commits

Author SHA1 Message Date
wiz
c47d30eeab Updated gnupg21 to 2.1.21.
Noteworthy changes in version 2.1.21 (2017-05-15)
-------------------------------------------------

  * gpg,gpgsm: Fix corruption of old style keyring.gpg files.  This
    bug was introduced with version 2.1.20.  Note that the default
    pubring.kbx format was not affected.

  * gpg,dirmngr: Removed the skeleton config file support.  The
    system's standard methods for providing default configuration
    files should be used instead.

  * w32: The Windows installer now allows installion of GnuPG without
    Administrator permissions.

  * gpg: Fixed import filter property match bug.

  * scd: Removed Linux support for Cardman 4040 PCMCIA reader.

  * scd: Fixed some corner case bugs in resume/suspend handling.

  * Many minor bug fixes and code cleanup.
2017-05-16 12:08:01 +00:00
khorben
d112268402 Set myself as the maintainer 2017-05-15 15:34:12 +00:00
khorben
7db7c12abf Update security/{,py-yara} to version 3.5.0
The release notes mention:

  * Match length operator (http://yara.readthedocs.io/en/v3.5.0/writingrules.html#match-length)
  * Performance improvements
  * Less memory consumption while scanning processes
  * Exception handling when scanning memory blocks
  * Negative integers in meta fields
  * Added the --stack-size command-argument
  * Functions import_ordinal, is_dll, is_32bit and is_64bit added to PE module
  * Functions rich_signature.toolid and rich_signature.version added to PE module
  * Lots of bug fixes

The Python bindings are now released from a different tree, with the same
versioning apparently though.

"welcome to update" pettai@
2017-05-15 15:27:31 +00:00
jperkin
346da63ada Requires gettext-lib. SunOS needs an explicit -lintl. 2017-05-15 13:20:45 +00:00
adam
8bff4ce7c5 v4.1.0
Note: oauth2client is now deprecated. No more features will be added to the
libraries and the core team is turning down support. We recommend you use
google-auth and oauthlib.

New features:
* Allow customizing the GCE metadata service address via an env var.
* Store original encoded and signed identity JWT in OAuth2Credentials.
* Use jsonpickle in django contrib, if available.

Bug fixes:
* Typo fixes.
* Remove b64 padding from PKCE values, per RFC7636.
* Include LICENSE in Manifest.in.
* Fix tests and CI.
* Escape callback error code in flask_util.
2017-05-11 09:24:06 +00:00
jperkin
b4df8e4171 Requires iconv. Try to reduce the include craziness a little bit. 2017-05-11 09:22:36 +00:00
fhajny
ac4dcecfdf Update py-certbot and py-acme to 0.14.0.
Use ALTERNATIVES to handle different Python versions better.

0.14.0 - 2017-05-04

Added

- Python 3.3+ support for all Certbot packages. certbot-auto still
  currently only supports Python 2, but the acme, certbot,
  certbot-apache, and certbot-nginx packages on PyPI now fully support
  Python 2.6, 2.7, and 3.3+.
- Certbot's Apache plugin now handles multiple virtual hosts per file.
- Lockfiles to prevent multiple versions of Certbot running
  simultaneously.

Changed

- When converting an HTTP virtual host to HTTPS in Apache, Certbot
  only copies the virtual host rather than the entire contents of the
  file it's contained in.
- The Nginx plugin now includes SSL/TLS directives in a separate file
  located in Certbot's configuration directory rather than copying the
  contents of the file into every modified server block.

Fixed

- Ensure logging is configured before parts of Certbot attempt to log
  any messages.
- Support for the --quiet flag in certbot-auto.
- Reverted a change made in a previous release to make the acme and
  certbot packages always depend on argparse. This dependency is
  conditional again on the user's Python version.
- Small bugs in the Nginx plugin such as properly handling empty
  server blocks and setting server_names_hash_bucket_size during
  challenges.
2017-05-11 08:23:35 +00:00
fhajny
b40597df01 Update security/vault to 0.7.2.
0.7.2 (May 8th, 2017)

BUG FIXES:

- audit: Fix auditing entries containing certain kinds of time values


0.7.1 (May 5th, 2017)

DEPRECATIONS/CHANGES:

- LDAP Auth Backend: Group membership queries will now run as the
  binddn user when binddn/bindpass are configured, rather than as the
  authenticating user as was the case previously.

FEATURES:

- AWS IAM Authentication
- MSSQL Physical Backend
- Lease Listing and Lookup
- TOTP Secret Backend
- Database Secret Backend & Secure Plugins (Beta)

IMPROVEMENTS:

- auth/cert: Support for constraints on subject Common Name and
  DNS/email Subject Alternate Names in certificates
- auth/ldap: Use the binding credentials to search group membership
  rather than the user credentials
- cli/revoke: Add -self option to allow revoking the currently active
  token
- core: Randomize x coordinate in Shamir shares
- tidy: Improvements to auth/token/tidy and sys/leases/tidy to handle
  more cleanup cases
- secret/pki: Add no_store option that allows certificates to be
  issued without being stored. This removes the ability to look up
  and/or add to a CRL but helps with scaling to very large numbers of
  certificates.
- secret/pki: If used with a role parameter, the sign-verbatim/<role>
  endpoint honors the values of generate_lease, no_store, ttl and
  max_ttl from the given role
- secret/pki: Add role parameter allow_glob_domains that enables
  defining names in allowed_domains containing * glob patterns
- secret/pki: Update certificate storage to not use characters that
  are not supported on some filesystems
- storage/etcd3: Add discovery_srv option to query for SRV records to
  find servers
- storage/s3: Support max_parallel option to limit concurrent
  outstanding requests
- storage/s3: Use pooled transport for http client
- storage/swift: Allow domain values for V3 authentication

BUG FIXES:

- api: Respect a configured path in Vault's address
- auth/aws-ec2: New bounds added as criteria to allow role creation
- auth/ldap: Don't lowercase groups attached to users
- cli: Don't panic if vault write is used with the force flag but no
  path
- core: Help operations should request forward since standbys may not
  have appropriate info
- replication: Fix enabling secondaries when certain mounts already
  existed on the primary
- secret/mssql: Update mssql driver to support queries with colons
- secret/pki: Don't lowercase O/OU values in certs
- secret/pki: Don't attempt to validate IP SANs if none are provided
2017-05-10 18:21:27 +00:00
adam
62f6a769cf Changes 0.26.0:
Unknown
2017-05-10 17:03:42 +00:00
jperkin
cbaf4dda0f Requires termcap. 2017-05-10 10:45:26 +00:00
adam
e6c748cc3a Changes 17.0.0:
- Added ``OpenSSL.X509Store.set_time()`` to set a custom verification time when verifying certificate chains.
- Added a collection of functions for working with OCSP stapling.
  None of these functions make it possible to validate OCSP assertions, only to staple them into the handshake and to retrieve the stapled assertion if provided.
  Users will need to write their own code to handle OCSP assertions.
  We specifically added: ``Context.set_ocsp_server_callback``, ``Context.set_ocsp_client_callback``, and ``Connection.request_ocsp``.
- Changed the ``SSL`` module's memory allocation policy to avoid zeroing memory it allocates when unnecessary.
  This reduces CPU usage and memory allocation time by an amount proportional to the size of the allocation.
  For applications that process a lot of TLS data or that use very lage allocations this can provide considerable performance improvements.
- Automatically set ``SSL_CTX_set_ecdh_auto()`` on ``OpenSSL.SSL.Context``.
- Fix empty exceptions from ``OpenSSL.crypto.load_privatekey()``.
2017-05-09 16:49:07 +00:00
adam
fcb985622d Changes 0.22.0:
Added parser.peek()
Implemented proper support for BER-encoded indefinite length strings of all kinds - core.BitString, core.OctetString and all of the core classes that are natively represented as Python unicode strings
Fixed a bug with encoding LDAP URLs in x509.URI
Correct x509.DNSName to allow a leading ., such as when used with x509.NameConstraints
Fixed an issue with dumping the parsed contents of core.Any when explicitly tagged
Custom setup.py clean now accepts the short -a flag for compatibility
2017-05-09 16:28:38 +00:00
adam
0b85e26315 Version 3.4.2 - released 2016-03-26
- Fixed dates in CHANGELOG.txt
2017-05-09 12:37:14 +00:00
adam
549bbbda3a Changes 1.1.5:
Bug fixes.
2017-05-09 11:39:07 +00:00
joerg
ce56e8baa1 Unconditionally use standard headers, nothing defines the guards. 2017-05-04 18:29:48 +00:00
ryoon
23abec1292 Update to 0.69
* Convert to use GTK 3 to fix build

Changelog:
These features are new in 0.69 (released 2017-04-29):

    Security fix: the Windows PuTTY binaries should no longer be vulnerable to hijacking by specially named DLLs in the same directory, even the names we missed when we thought we'd fixed this in 0.68. See vuln-indirect-dll-hijack-2.
    Windows PuTTY should work with MIT Kerberos again, after our DLL hijacking defences broke it.
    Jump lists should now appear again on the PuTTY shortcut in the Windows Start Menu.
    You can now explicitly configure SSH terminal mode settings not to be sent to the server, if your server objects to them.
2017-05-04 12:52:35 +00:00
maya
c1257222b3 libressl: update to 2.5.4
We have released LibreSSL 2.5.4, which will be arriving in the
LibreSSL directory of your local OpenBSD mirror soon. It includes the following
changes:

  * Reverted a previous change that forced consistency between return
    value and error code when specifing a certificate verification
    callback, since this breaks the documented API. When a user supplied
    callback always returns 1, and later code checks the error code to
    potentially abort post verification, this will result in incorrect
    successul certificate verification.

  * Switched Linux getrandom() usage to non-blocking mode, continuing to
    use fallback mechanims if unsuccessful. This works around a design
    flaw in Linux getrandom(2) where early boot usage in a library makes
    it impossible to recover if getrandom(2) is not yet initialized.

  * Fixed a bug caused by the return value being set early to signal
    successful DTLS cookie validation. This can mask a later failure and
    result in a positive return value being returned from
    ssl3_get_client_hello(), when it should return a negative value to
    propagate the error.

  * Fixed a build error on non-x86/x86_64 systems running Solaris.

We have released LibreSSL 2.5.3, based on OpenBSD 6.1, which will be the new
stable release series. LibreSSL 2.3.x support has also ended. LibreSSL 2.5.3
contains the following changes from the previous stable release.

 * libtls now supports ALPN and SNI

 * libtls adds a new callback interface for integrating custom IO functions.
    Thanks to Tobias Pape.

 * libtls now handles 4 cipher suite groups:
    "secure" (TLSv1.2+AEAD+PFS)
    "compat" (HIGH:!aNULL)
    "legacy" (HIGH:MEDIUM:!aNULL)
    "insecure" (ALL:!aNULL:!eNULL)
   This allows for flexibility and finer grained control, rather than having
   two extremes (an issue raised by Marko Kreen some time ago).

 * Tightened error handling for tls_config_set_ciphers().

 * libtls now always loads CA, key and certificate files at the time the
   configuration function is called. This simplifies code and results in a single
   memory based code path being used to provide data to libssl.

 * Added support for OCSP intermediate certificates.

 * Added functions used by stunnel and exim from BoringSSL - this brings in
   X509_check_host, X509_check_email, X509_check_ip, and X509_check_ip_asc.

 * Added initial support for iOS, thanks to Jacob Berkman.

 * Improved behavior of arc4random on Windows when using memory leak analysis
   software.

 * Correctly handle an EOF that occurs prior to the TLS handshake completing.
    Reported by Vasily Kolobkov, based on a diff from Marko Kreen.

 * Limit the support of the "backward compatible" ssl2 handshake to only be
   used if TLS 1.0 is enabled.

 * Fix incorrect results in certain cases on 64-bit systems when BN_mod_word()
   can return incorrect results. BN_mod_word() now can return an error condition.
   Thanks to Brian Smith.

 * Added constant-time updates to address CVE-2016-0702

 * Fixed undefined behavior in BN_GF2m_mod_arr()

 * Removed unused Cryptographic Message Support (CMS)

 * More conversions of long long idioms to time_t

 * Improved compatibility by avoiding printing NULL strings with printf.

 * Reverted change that cleans up the EVP cipher context in EVP_EncryptFinal()
   and EVP_DecryptFinal(). Some software relies on the previous behaviour.

 * Avoid unbounded memory growth in libssl, which can be triggered by a TLS
   client repeatedly renegotiating and sending OCSP Status Request TLS extensions.

 * Avoid falling back to a weak digest for (EC)DH when using SNI with libssl.

 * X509_cmp_time() now passes a malformed GeneralizedTime field as an error.
   Reported by Theofilos Petsios.

 * Detect zero-length encrypted session data early, instead of when malloc(0)
   fails or the HMAC check fails. Noted independently by jsing@ and Kurt Cancemi.

 * Check for and handle failure of HMAC_{Update,Final} or EVP_DecryptUpdate().

 * Massive update and normalization of manpages, conversion to mandoc format.
   Many pages were rewritten for clarity and accuracy. Portable doc links are
   up-to-date with a new conversion tool.

 * Curve25519 Key Exchange support.

 * Support for alternate chains for certificate verification.

 * Code cleanups, CBB conversions, further unification of DTLS/SSL handshake
   code, further ASN1 macro expansion and removal.

 * Private symbols are now hidden in libssl and libcrypto.

 * Friendly certificate verification error messages in libtls, peer
   verification is now always enabled.

 * Added OCSP stapling support to libtls and nc.

 * Added ocspcheck utility to validate a certificate against its OCSP responder
   and save the reply for stapling

 * Enhanced regression tests and error handling for libtls.

 * Added explicit constant and non-constant time BN functions, defaulting to
   constant time wherever possible.

 * Moved many leaked implementation details in public structs behind opaque
   pointers.

 * Added ticket support to libtls.

 * Added support for setting the supported EC curves via
   SSL{_CTX}_set1_groups{_list}() - also provide defines for the previous
   SSL{_CTX}_set1_curves{_list} names. This also changes the default list of
   curves to be X25519, P-256 and P-384. All other curves must be manually
   enabled.

 * Added -groups option to openssl(1) s_client for specifying the curves to be
   used in a colon-separated list.

 * Merged client/server version negotiation code paths into one, reducing much
   duplicate code.

 * Removed error function codes from libssl and libcrypto.

 * Fixed an issue where a truncated packet could crash via an OOB read.

 * Added SSL_OP_NO_CLIENT_RENEGOTIATION option that disallows client-initiated
   renegotiation. This is the default for libtls servers.

 * Avoid a side-channel cache-timing attack that can leak the ECDSA private
   keys when signing. This is due to BN_mod_inverse() being used without the
   constant time flag being set. Reported by Cesar Pereida Garcia and Billy
   Brumley (Tampere University of Technology). The fix was developed by Cesar
   Pereida Garcia.

 * iOS and MacOS compatibility updates from Simone Basso and Jacob Berkman.

 * Added the recallocarray(3) memory allocation function, and converted various
   places in the library to use it, such as CBB and BUF_MEM_grow. recallocarray(3)
   is similar to reallocarray. Newly allocated memory is cleared similar to
   calloc(3). Memory that becomes unallocated while shrinking or moving existing
   allocations is explicitly discarded by unmapping or clearing to 0.

 * Added new root CAs from SECOM Trust Systems / Security Communication of Japan.

 * Added EVP interface for MD5+SHA1 hashes.

 * Fixed DTLS client failures when the server sends a certificate request.

 * Correct handling of padding when upgrading an SSLv2 challenge into an
   SSLv3/TLS connection.

 * Allow protocols and ciphers to be set on a TLS config object in libtls.

 * Improved nc(1) TLS handshake CPU usage and server-side error reporting.

 * Add a constant time version of BN_gcd and use it default for BN_gcd to avoid
   the possibility of sidechannel timing attacks against RSA private key
   generation - Thanks to Alejandro Cabrera


We have released LibreSSL 2.5.2, which will be arriving in the
LibreSSL directory of your local OpenBSD mirror soon. It includes the following
changes:

    * Added the recallocarray(3) memory allocation function, and converted
      various places in the library to use it, such as CBB and BUF_MEM_grow.
      recallocarray(3) is similar to reallocarray. Newly allocated memory
      is cleared similar to calloc(3). Memory that becomes unallocated
      while shrinking or moving existing allocations is explicitly
      discarded by unmapping or clearing to 0.

    * Added new root CAs from SECOM Trust Systems / Security Communication
      of Japan.

    * Added EVP interface for MD5+SHA1 hashes.

    * Fixed DTLS client failures when the server sends a certificate
      request.

    * Correct handling of padding when upgrading an SSLv2 challenge into
      an SSLv3/TLS connection.

    * Allow protocols and ciphers to be set on a TLS config object in
      libtls.

    * Improved nc(1) TLS handshake CPU usage and server-side error
      reporting.

The LibreSSL project continues improvement of the codebase to reflect modern,
safe programming practices. We welcome feedback and improvements from the
broader community. Thanks to all of the contributors who helped make this
release possible.
2017-05-03 11:19:04 +00:00
jperkin
6b547497bb Convert CXXFLAGS setting C++ standard to USE_LANGUAGES. 2017-05-03 08:38:38 +00:00
fhajny
63c1b051c2 Update go-crypto to state as of 20170502, no changelog available.
Fix build on (at least) SunOS by depending on go-sys.
2017-05-02 17:06:30 +00:00
ryoon
76884737ca Recursive revbump from boost update 2017-04-30 01:21:19 +00:00
schmonz
7d6bd89899 Wrap long command line. Replace LOCALBASE with PREFIX. 2017-04-27 20:21:51 +00:00
jperkin
2256c96e07 Fix to use PKG_SYSCONFDIR. Bump PKGREVISION for all packages using the
shared Makefile.common.
2017-04-27 13:56:46 +00:00
wiz
ac6c55fc7a Updated scrypt to 1.2.1.
Significant changes since 1.2.0:
* A new -v option instructs scrypt to print the key derivation parameters
  it has selected.
* A new --version option prints the version number of the scrypt utility.
* A new -P option make scrypt read the passphrase from standard input; this
  is designed for scripts which pipe a passphrase in from elsewhere.
* A new -f option makes 'scrypt dec' ignore the amount of memory or CPU time
  it thinks decrypting a file will take, and proceed anyway; this may be useful
  in cases where scrypt's estimation is wrong.
* The '-M maxmem' option now accepts "humanized" inputs, e.g., "-M 1GB".

There are also a variety of less visible changes: Performance improvements
in the SHA256 routines, minor bug and compiler warning fixes, the addition
of a test suite, and some minor code reorganization.
2017-04-26 14:54:59 +00:00
jperkin
5279457ba1 Put back dependency on bash again, the script uses the "local" keyword.
Bump PKGREVISION.
2017-04-25 12:16:47 +00:00
markd
95424eae50 Add py-requests-kerberos 2017-04-23 05:40:08 +00:00
markd
2d9b6bf026 Add py-requests-kerberos 0.11.0
Requests is an HTTP library, written in Python, for human beings. This
library adds optional Kerberos/GSSAPI authentication support and supports
mutual authentication.
2017-04-23 05:39:26 +00:00
markd
c510696099 Merge upstream pull request #52 from kwlzn/kwlzn/none_principal_fix
Allow `authGSSClientInit` principal kwarg to be None.
2017-04-23 05:35:27 +00:00
adam
75a9285105 Revbump after icu update 2017-04-22 21:03:07 +00:00
taca
d3cc142d0b Remove "used by" line for security/libprelude-ruby/Makefile. 2017-04-22 17:51:16 +00:00
taca
dc58600cc8 Remove libprelude-ruby package which is not maintained for long time and
depends on ruby18.
2017-04-22 17:49:50 +00:00
taca
a934eb428b Delete libprelude-ruby. 2017-04-22 17:49:19 +00:00
taca
109b2cc273 Update ruby-airbrussh to 1.2.0.
## [1.2.0][] (2017-04-14)

* [#95](https://github.com/mattbrictson/airbrussh/pull/95): colorize LogMessage label on WARN level and above - [@klyonrad](https://github.com/klyonrad)
* [#106](https://github.com/mattbrictson/airbrussh/pull/106): Remove the `log_file` parameter from the `CommandFormatter#exit_message` method; it was unused - [@mattbrictson](https://github.com/mattbrictson)
2017-04-22 16:45:24 +00:00
taca
bace8bbcc8 Update ruby-sshkit to 1.13.1.
## [1.13.1][] (2017-03-31)

### Breaking changes

  * None

### Bug fixes

  * [#397](https://github.com/capistrano/sshkt/pull/397): Fix NoMethodError assign_defaults with net-ssh older than 4.0.0 - [@shirosaki](https://github.com/shirosaki)

## [1.13.0][] (2017-03-24)

### Breaking changes

  * None

### New features

  * [#372](https://github.com/capistrano/sshkit/pull/372): Use cp_r in local backend with recursive option - [@okuramasafumi](https://github.com/okuramasafumi)

### Bug fixes

  * [#390](https://github.com/capistrano/sshkit/pull/390): Properly wrap Ruby StandardError w/ add'l context - [@mattbrictson](https://github.com/mattbrictson)
  * [#392](https://github.com/capistrano/sshkit/pull/392): Fix open two connections with changed cache key - [@shirosaki](https://github.com/shirosaki)
2017-04-22 16:43:35 +00:00
jperkin
0e8c127ce1 Pull in required dependencies. 2017-04-21 13:40:18 +00:00
jperkin
3b141760d3 Use BSD_INSTALL. 2017-04-21 13:33:31 +00:00
jperkin
ae5f663695 Honour existing LDFLAGS. 2017-04-21 13:22:00 +00:00
dsainty
eabf642486 Darwin does have sendfile(), but the API differs from ZoneMinder's expectation.
Inhibit its use on Darwin to fix the build.
2017-04-20 09:59:39 +00:00
wiz
76ab60256c Add upstream bug report URL. 2017-04-20 09:55:28 +00:00
wiz
e494b42aa4 Remove unneeded patch, confirmed by hans. 2017-04-20 09:50:37 +00:00
wiz
50bf9b585b Updated p5-IO-Socket-SSL to 2.048.
2.048 2017/04/16
- fixed small memory leaks during destruction of socket and context, RT#120643
2017-04-19 13:46:18 +00:00
jperkin
ac4dcc786d Reset MAINTAINER after tonnerre resigned. 2017-04-19 11:24:36 +00:00
wiz
8060e7c110 Updated gnupg21 to 2.1.20.
Based on PR 52165 by Jonathan Schleifer.

Noteworthy changes in version 2.1.20 (2017-04-03)
-------------------------------------------------

  * gpg: New properties 'expired', 'revoked', and 'disbaled' for the
    import and export filters.

  * gpg: New command --quick-set-primary-uid.

  * gpg: New compliance field for the --with-colon key listing.

  * gpg: Changed the key parser to generalize the processing of local
    meta data packets.

  * gpg: Fixed assertion failure in the TOFU trust model.

  * gpg: Fixed exporting of zero length user ID packets.

  * scd: Improved support for multiple readers.

  * scd: Fixed timeout handling for key generation.

  * agent: New option --enable-extended-key-format.

  * dirmngr: Do not add a keyserver to a new dirmngr.conf.  Dirmngr
    uses a default keyserver.

  * dimngr: Do not treat TLS warning alerts as severe error when
    building with GNUTLS.

  * dirmngr: Actually take /etc/hosts in account.

  * wks: Fixed client problems on Windows.  Published keys are now set
    to world-readable.

  * tests: Fixed creation of temporary directories.

  * A socket directory for a non standard GNUGHOME is now created on
    the fly under /run/user.  Thus "gpgconf --create-socketdir" is now
    optional.  The use of "gpgconf --remove-socketdir" to clean up
    obsolete socket directories is however recommended to avoid
    cluttering /run/user with useless directories.

  * Fixed build problems on some platforms.



Noteworthy changes in version 2.1.19 (2017-03-01)
-------------------------------------------------

  * gpg: Print a warning if Tor mode is requested but the Tor daemon
    is not running.

  * gpg: New status code DECRYPTION_KEY to print the actual private
    key used for decryption.

  * gpgv: New options --log-file and --debug.

  * gpg-agent: Revamp the prompts to ask for card PINs.

  * scd: Support for multiple card readers.

  * scd: Removed option --debug-disable-ticker.  Ticker is used
    only when it is required to watch removal of device/card.

  * scd: Improved detection of card inserting and removal.

  * dirmngr: New option --disable-ipv4.

  * dirmngr: New option --no-use-tor to explicitly disable the use of
    Tor.

  * dirmngr: The option --allow-version-check is now required even if
    the option --use-tor is also used.

  * dirmngr: Handle a missing nsswitch.conf gracefully.

  * dirmngr: Avoid PTR lookups for keyserver pools.  The are only done
    for the debug command "keyserver --hosttable".

  * dirmngr: Rework the internal certificate cache to support classes
    of certificates.  Load system provided certificates on startup.
    Add options --tls, --no-crl, and --systrust to the "VALIDATE"
    command.

  * dirmngr: Add support for the ntbtls library.

  * wks: Create mails with a "WKS-Phase" header.  Fix detection of
    Draft-2 mode.

  * The Windows installer is now build with limited TLS support.

  * Many other bug fixes and new regression tests.

  See-also: gnupg-announce/2017q1/000402.html
2017-04-16 07:21:48 +00:00
bsiegert
65e3f16e8f Revbump all Go packages after the Go 1.8.1 update. 2017-04-13 15:12:03 +00:00
fhajny
d796337616 Fix py-requests dependency version 2017-04-11 06:32:32 +00:00
joerg
62d925b17b Update to Botan 2.1.0, the new stable branch.
Some of the more important changes:

- Fix incorrect truncation in Bcrypt. Passwords in length between 56 and
  72 characters were truncated at 56 characters. Found and reported by
  Solar Designer. (CVE-2017-7252) (GH #938)
- Fix a bug in X509 DN string comparisons that could result in out of
  bound reads. This could result in information leakage, denial of
  service, or potentially incorrect certificate validation results.
  Found independently by Cisco Talos team and OSS-Fuzz. (CVE-2017-2801)
- Correct minimum work factor for Bcrypt password hashes. All other
  implementations require the work factor be at least 4. Previously
  Botan simply required it be greater than zero. (GH #938)
- Converge on a single side channel silent EC blinded multiply
  algorithm. Uses Montgomery ladder with order/2 bits scalar blinding
  and point randomization now by default. (GH #893)
- Add ability to search for certificates using the SHA-256 of the
  distinguished name. (GH #900)
- Support a 0-length IV in ChaCha stream cipher. Such an IV is treated
  identically to an 8-byte IV of all zeros.
- Previously Botan forbid any use of times past 2037 to avoid Y2038
  issues. Now this restriction is only in place on systems which have a
  32-bit time_t. (GH #933 fixing #917)
- Fix a longstanding bug in modular exponentiation which caused most
  exponentiations modulo an even number to have an incorrect result;
  such moduli occur only rarely in cryptographic contexts. (GH #754)
- Fix a bug in BigInt multiply operation, introduced in 1.11.30, which
  could cause incorrect results. Found by OSS-Fuzz fuzzing the ressol
  function, where the bug manifested as an incorrect modular
  exponentiation. OSS-Fuzz bug #287
- Fix a bug that meant the “ietf/modp/6144” and “ietf/modp/8192”
  discrete log groups used an incorrect value for the generator,
  specifically the value (p-1)/2 was used instead of the correct value
  of 2.
- DL_Group strong generation previously set the generator to 2. However
  sometimes 2 generates the entire group mod p, rather than the subgroup
  mod q. This is invalid by X9.42 standard, and exposes incautious
  applications to small subgroup attacks. Now DL_Group uses the smallest
  g which is a quadratic residue. (GH #818)
- The default TLS policy now requires 2048 or larger DH groups by
  default.
- The default Path_Validation_Restrictions constructor has changed to
  require at least 110 bit signature strength. This means 1024 bit RSA
  certificates and also SHA-1 certificates are rejected by default. Both
  settings were already the default for certificate validation in TLS
  handshake, but this changes it for applications also.
- Fix integer overflow during BER decoding, found by Falko Strenzke.
  This bug is not thought to be directly exploitable but upgrading ASAP
  is advised. (CVE-2016-9132)
- Add post-quantum signature scheme XMSS. Provides either 128 or 256 bit
  (post-quantum) security, with small public and private keys, fast
  verification, and reasonably small signatures (2500 bytes for 128-bit
  security). Signature generation is very slow, on the order of seconds.
  And very importantly the signature scheme is stateful: each leaf index
  must only be used once, or all security is lost. In the appropriate
  system where signatures are rarely generated (such as code signing)
  XMSS makes an excellent choice. (GH #717 #736)
- Add support for client-side OCSP stapling to TLS. (GH #738)
- Previously both public and private keys performed automatic self
  testing after generation or loading. However this often caused
  unexpected application performance problems, and so has been removed.
  Instead applications must call check_key explicitly. (GH #704)
- Fix TLS session resumption bugs which caused resumption failures if an
  application used a single session cache for both TLS and DTLS. (GH
  #688)
- The default TLS policy now disables static RSA ciphersuites, all DSA
  ciphersuites, and the AES CCM-8 ciphersuites. Disabling static RSA by
  default protects servers from oracle attacks, as well as enforcing a
  forward secure ciphersuite. Some applications may be forced to
  re-enable RSA for interop reasons. DSA and CCM-8 are rarely used, and
  likely should not be negotiated outside of special circumstances.
- The default TLS policy now prefers ChaCha20Poly1305 cipher over any
  AES mode.
- The default TLS policy now orders ECC curve preferences in order by
  performance, with x25519 first, then P-256, then P-521, then the rest.
2017-04-10 21:14:45 +00:00
joerg
5c32c49829 Update Botan to 1.10.16:
Fix a bug in X509 DN string comparisons that could result in out of
    bound reads. This could result in information leakage, denial of
    service, or potentially incorrect certificate validation results.
    (CVE-2017-2801)

    Avoid throwing during a destructor since this is undefined in
    C++11 and rarely a good idea. (GH #930)


    Fix a bug causing modular exponentiations done modulo even numbers
    to almost always be incorrect, unless the values were small. This
    bug is not known to affect any cryptographic operation in Botan. (GH
    #754)

    Avoid use of C++11 std::to_string in some code added in 1.10.14
    (GH #747 #834)

    Fix integer overflow during BER decoding, found by Falko Strenzke.
    This bug is not thought to be directly exploitable but upgrading ASAP
    is advised. (CVE-2016-9132)

    Fix two cases where (in error situations) an exception would be thrown
    from a destructor, causing a call to std::terminate.

    When RC4 is disabled in the build, also prevent it from being included
    in the OpenSSL provider. (GH #638)
2017-04-10 20:26:31 +00:00
jperkin
74fbb72171 Avoid unsupported xgetbv instruction on older Darwin assemblers. 2017-04-10 10:43:49 +00:00
fhajny
14073b64fe Fix stale and missing dependencies in py-acme and py-certbot. PKGREVISION++ 2017-04-10 10:29:38 +00:00
adam
0267f2ef12 Revision 0.0.8
- Wheel distribution format now supported
- Fix to misspelled rfc2459.id_at_sutname variable
- Fix to misspelled rfc2459.NameConstraints component tag ID
- Fix to misspelled rfc2459.GeneralSubtree component default status
2017-04-08 21:25:26 +00:00
schmonz
0a4b8168cb Update HOMEPAGE. 2017-04-08 18:36:51 +00:00