version 1.53, 2020/10/08 10:26:26 |
version 1.54, 2020/10/08 10:29:49 |
|
|
<li>Removed <a href="https://man.openbsd.org/mail.local">mail.local(8)</a> support for world-writable mail spools. |
<li>Removed <a href="https://man.openbsd.org/mail.local">mail.local(8)</a> support for world-writable mail spools. |
</ul> |
</ul> |
|
|
<li>LibreSSL 3.1.1 XXX <span style="color:red;">Temporary List, replace with LibreSSL ChangeLog:</span> |
<li>LibreSSL 3.2.2 |
<ul> |
<ul> |
<li>Enabled the TLSv1.3 server in <a href="https://man.openbsd.org/openssl">openssl(1)</a>. |
|
<li>Added -rls1_3 and -no_tls1_3 options to <a href="https://man.openbsd.org/openssl">openssl(1)</a> s_server. |
|
<li>Enabled TLSv1.3 support in <a href="https://man.openbsd.org/relayd">relayd(8)</a>. |
|
<li>Added a decode error alert when a TLS server provides an empty certificate list. |
|
<li>Added support for TLS 1.3 server to send certificate status messages with OCSP staples. |
|
<li>Began looking for non-expired certificates first when building a chain, making certificate validation possible for various sites that are serving expired AddTrust certificates. |
|
<li>Improved TLSv1.3 client certificate selection to allow use of EC certificates. |
|
<li>Added <a href="https://man.openbsd.org/ssl">ssl(8)</a> support for additional GOST curves and aliases for 256-bit GOST curves. |
|
<li>Enabled TLSv1.3 for the generic TLS_method(). |
|
<li>Fixed potential use-after-free and double-free issues in <a href="https://man.openbsd.org/PEM_X509_INFO_read_bio">PEM_X509_INFO_read_bio(3)</a>. |
|
<li>Corrected <a href="https://man.openbsd.org/ssl">ssl(8)</a> handling of server requests for an OCSP response. |
|
<li>Added P-521 to the list of curves supported by default for TLS. |
|
<li>Released <a href="https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-3.1.4-relnotes.txt">LibreSSL 3.1.4</a>. |
|
<li>Released <a href="https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-3.2.1-relnotes.txt">LibreSSL 3.2.1</a>. |
|
<li>Fixed a memory leak in x509_constraints_extract_names. |
|
</ul> |
|
<ul> |
|
<li>New Features |
<li>New Features |
<ul> |
<ul> |
<li>... |
<li>This is the first stable release with the new TLSv1.3 implementation |
|
enabled for both server and client. |
|
The OpenSSL TLSv1.3 API is not yet available and will be provided |
|
in an upcoming release. |
|
|
|
<li>New X509 certificate chain validator loosely based on Go's X509 validator. |
</ul> |
</ul> |
|
|
<li>API and Documentation Enhancements |
<li>API and Documentation Enhancements |
<ul> |
<ul> |
<li>... |
<li>New CMAC_Init(3) and ChaCha(3) manual pages. |
|
<li>Document SSL_set1_host(3), SSL_set_SSL_CTX(3). |
|
<li>Document PKCS7 attribute functions. |
|
<li>Document PKCS7_final(3), PKCS7_add_attribute(3). |
|
<li>Document PKCS7_get_signer_info(3). |
|
<li>Document PEM_ASN1_read(3) and PEM_ASN1_read_bio(3). |
|
<li>Document PEM_X509_INFO_read(3) and PEM_X509_INFO_read_bio(3). |
|
<li>Document PEM_def_callback(3). |
|
<li>Document EVP_read_pw_string_min(3). |
|
<li>Merge documentation of X509_get0_serialNumber from OpenSSL 1.1.1. |
|
<li>Document error handling of X509_PUBKEY_get0(3) and X509_PUBKEY_get(3) |
|
<li>Document X509_get0_pubkey_bitstr(3). |
|
<li>Document openssl(1) certhash. |
</ul> |
</ul> |
|
|
<li>Compatibility Changes |
<li>Compatibility Changes |
<ul> |
<ul> |
<li>... |
<li>Modify I/O behavior so that SSL_MODE_AUTO_RETRY is the default similar to new OpenSSL releases. |
|
<li>Add the P-521 curve to the list of curves supported by default in the client. |
|
<li>Define OPENSSL_NO_SSL_TRACE in opensslfeatures.h. |
|
<li>Make SSL_CTX_get_ciphers(NULL) return NULL rather than crash. |
|
<li>Improve TLSv1.3 client certificate selection to allow EC certificates instead of only RSA certificates. |
|
<li>Add minimal info callback support for TLSv1.3. |
|
<li>Support TLS 1.3 options in the openssl(1) command. |
|
<li>Add support for additional GOST curves from RFC 7836 and draft-deremin-rfc4491-bis. |
|
<li>Add OIDs for HMAC using the Streebog hash function. |
|
<li>Allow GOST R 34.11-2012 in PBE/PBKDF2/PKCS#5. |
|
<li>Enable GOST_SIG_FORMAT_RS_LE when verifying certificate signatures. |
|
<li>Handle GOST in ssl_cert_dup(). |
|
<li>Stop sending GOST R 34.10-94 as a CertificateType. |
|
<li>Use IANA allocated GOST ClientCertificateTypes. |
</ul> |
</ul> |
|
|
<li>Testing and Proactive Security |
<li>Testing and Proactive Security |
<ul> |
<ul> |
<li>... |
<li>Greatly expanded test coverage via the tlsfuzzer test scripts. |
|
<li>Test interoperability with the Botan TLS client. |
</ul> |
</ul> |
|
|
<li>Internal Improvements |
<li>Internal Improvements |
<ul> |
<ul> |
<li>... |
<li>Collapse x509v3 directory into x509. |
|
<li>Add initial support for openbsd/powerpc64. |
|
<li>Improve length checks in the TLS 1.3 record layer and provide appropriate alerts for violations of record layer limits. |
|
<li>Enforce that SNI hostnames received by the TLS server are correctly formed as per RFC 5890 and RFC 6066, responding with illegal parameter for a nonconformant host name. |
|
<li>Support SSL_MODE_AUTO_RETRY in TLS 1.3 to allow the automatic retry of handshake messages. |
|
<li>Improve the handling of BIO_read()/BIO_write() failures in the TLSv1.3 stack. |
|
<li>Start replacing the existing TLSv1.2 record layer. |
|
<li>Simplify SSL method lookups. |
|
<li>Clean up and simplify SSL_get_ciphers(), SSL_set_session(), SSL_set_ssl_method() and several internal functions. |
|
<li>Refactor dtls1_new(), dtls1_hm_fragment_new(), dtls1_drain_fragments(), dtls1_clear_queues(). |
|
<li>Make the message type available in the internal TLS extensions API functions. |
|
<li>Numerous openssl(1) subcommands were converted to the new option handling. |
|
<li>Copy the session ID directly in ssl_get_prev_session() instead of handing it through several functions for copying. |
</ul> |
</ul> |
|
|
<li>Portable Improvements |
<li>Portable Improvements |
<ul> |
<ul> |
<li>... |
<li>Make pthread_mutex static initialisation work on Windows. |
|
<li>Get __STRICT_ALIGNMENT from machine/endian.h with portable build. |
</ul> |
</ul> |
|
|
<li>Bug Fixes |
<li>Bug Fixes |
<ul> |
<ul> |
<li>... |
<li>Fix an off-by-one in the CBC padding removal. |
|
<li>Enforce in the TLSv1.3 server that that ClientHello messages after a HelloRetryRequest match the original ClientHello as per RFC 8446 section 4.1.2 |
|
<li>Avoid calling freezero with a negative size if a server sends a malformed plaintext of all zeroes. |
|
<li>Correct use of sockaddr_storage instead of sockaddr in openssl(1) s_client, which could lead to using 14 bytes of stack garbage instead of an IPv6 address in DTLS mode. |
|
<li>Fix a longstanding bug in PEM_X509_INFO_read_bio(3) that could cause use-after-free and double-free issues in calling programs. |
|
<li>Zero out variable on the stack to avoid leaving garbage in the tail of short session IDs. |
|
<li>Ensure that appropriate alerts are sent on various error conditions. |
|
<li>Move state initialization from SSL_clear() to ssl3_clear() to ensure that it gets correctly reinitialized across a SSL_set_ssl_method() call. |
|
<li>Add a custom copy handler for AES keywrap to fix a use-after-free. |
|
<li>Avoid an out-of-bounds write in BN_rand(). |
|
<li>Fix numerous leaks in the UI_dup_* functions. Simplify and tidy up the code in ui_lib.c. |
|
<li>Correctly track selected ALPN length to avoid a potential segmentation fault with SSL_get0_alpn_selected() when alpn_selected is NULL. |
|
<li>Include machine/endian.h gost2814789.c in order to pick up the __STRICT_ALIGNMENT define. |
|
<li>Correctly handle ssl_cert_dup() failure in SSL_set_SSL_CTX(). |
|
<li>Fail on receiving an invalid NID in X509_ATTRIBUTE_create() instead of constructing a broken objects that may cause NULL pointer accesses. |
|
<li>Fix SSL_shutdown behavior in TLSv1.3 to match the legacy stack. The previous behavior could cause a hang. |
|
<li>Modify "openssl x509" to display invalid certificate times as invalid, and correctly deal with the failing return case from X509_cmp_time so that a certificate with an invalid NotAfter does not appear valid. |
</ul> |
</ul> |
</ul> |
</ul> |
|
|