aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorJoel Sing <joel@sing.id.au>2020-06-01 02:33:36 +1000
committerJoel Sing <joel@sing.id.au>2020-06-01 02:33:36 +1000
commit2f8aa339c5c0d3057cc969ab90cb8e7a4fc909f7 (patch)
tree01dc13a1c3e5bb3e943ca3b153d01198a0ca3a9c
parentba5ae4fd8390249ef5a6450c45bf7bc52bf767ed (diff)
downloadportable-2f8aa339c5c0d3057cc969ab90cb8e7a4fc909f7.tar.gz
portable-2f8aa339c5c0d3057cc969ab90cb8e7a4fc909f7.tar.bz2
portable-2f8aa339c5c0d3057cc969ab90cb8e7a4fc909f7.zip
ChangeLog tweaks.
-rw-r--r--ChangeLog55
1 files changed, 28 insertions, 27 deletions
diff --git a/ChangeLog b/ChangeLog
index 21fa536..69692a2 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -30,26 +30,35 @@ LibreSSL Portable Release Notes:
30 30
313.2.0 - Development release 313.2.0 - Development release
32 32
33 * Improve length checks in record layer and provide appropriate 33 * Enable TLS 1.3 server side in addition to client by default.
34 alerts for violations of record layer limits. 34 With this change TLS 1.3 is handled entirely on the new stack
35 35 and state machine, with fallback to the legacy stack and
36 * Enforce in the server that SNI hostnames be correctly formed as 36 state machine for older versions. Note that the OpenSSL TLS 1.3
37 per RFC 6066 and RFC 5890, responding with illegal parameter for 37 API is not yet visible/available.
38 a nonconformant host name.
39 38
40 * Modify openssl(1) to clear SSL_MODE_AUTO_RETRY appropriately in 39 * Improve length checks in the TLS 1.3 record layer and provide
41 various commands. 40 appropriate alerts for violations of record layer limits.
42 41
43 * Modify io behavior so that SSL_MODE_AUTO_RETRY is the default 42 * Enforce that SNI hostnames received by the TLS server are correctly
44 similar to new OpenSSL releases. 43 formed as per RFC 5890 and RFC 6066, responding with illegal parameter
44 for a nonconformant host name.
45 45
46 * Support SSL_MODE_AUTO_RETRY in TLS 1.3 to allow the automatic 46 * Support SSL_MODE_AUTO_RETRY in TLS 1.3 to allow the automatic
47 retry of handshake messages. 47 retry of handshake messages.
48 48
49 * Modify I/O behavior so that SSL_MODE_AUTO_RETRY is the default
50 similar to new OpenSSL releases.
51
52 * Modify openssl(1) to clear SSL_MODE_AUTO_RETRY appropriately in
53 various commands.
54
49 * Add tlsfuzzer based regression tests. 55 * Add tlsfuzzer based regression tests.
50 56
57 * Support sending certificate status requests from the TLS 1.3
58 client to request OCSP staples for leaf certificates.
59
51 * Support sending certificate status replies from the TLS 1.3 server 60 * Support sending certificate status replies from the TLS 1.3 server
52 to send OCSP staples for leaf certificates. 61 in order to send OCSP staples for leaf certificates.
53 62
54 * Send correct alerts when handling failed key share extensions 63 * Send correct alerts when handling failed key share extensions
55 on the TLS 1.3 server. 64 on the TLS 1.3 server.
@@ -59,34 +68,26 @@ LibreSSL Portable Release Notes:
59 68
60 * Support TLS 1.3 options in the openssl(1) command. 69 * Support TLS 1.3 options in the openssl(1) command.
61 70
62 * Enable TLS 1.3 server side in addition to client by default. 71 * Many alert cleanups in TLS 1.3 to provide expected alerts in failure
63 With this change TLS 1.3 is handled entirely on the new stack 72 conditions.
64 and state machine, with fallback to the legacy stack and
65 state machine for older versions.
66
67 * Many alert cleanups in TLS 1.3 to provide expected alerts
68 in failure conditions.
69 73
70 * Modify "openssl x509" to display invalid certificate times as 74 * Modify "openssl x509" to display invalid certificate times as
71 invalid, and correctly deal with the failing return case from 75 invalid, and correctly deal with the failing return case from
72 X509_cmp_time so that a certificate with an invalid NotAfter does 76 X509_cmp_time so that a certificate with an invalid NotAfter does
73 not appear valid. 77 not appear valid.
74 78
75 * Support sending dummy change_cipher_spec records for middlebox 79 * Support sending dummy change_cipher_spec records for TLS 1.3 middlebox
76 compatibility. 80 compatibility.
77 81
78 * Ensure only PSS may be used with RSA in TLS 1.3. 82 * Ensure only PSS signatures are used with RSA in TLS 1.3.
79 83
80 * The client must advertise exactly the "null" compression method 84 * Ensure that TLS 1.3 clients advertise exactly the "null" compression
81 in its legacy_compression_methods, nothing else. 85 method in its legacy_compression_methods.
82 86
83 * Incorrect use of sockaddr instead of sockaddr_storage in openssl(1) 87 * Correct use of sockaddr instead of sockaddr_storage in openssl(1)
84 s_client could lead to using 14 bytes of stack garbage instead 88 s_client, which could lead to using 14 bytes of stack garbage instead
85 of an IPv6 address in DTLS mode. 89 of an IPv6 address in DTLS mode.
86 90
87 * Support sending certificate status requests from the TLS 1.3
88 client to retrieve OCSP staples for leaf certificates.
89
903.1.2 - Bug fix 913.1.2 - Bug fix
91 92
92 * A TLS client with peer verification disabled may crash when 93 * A TLS client with peer verification disabled may crash when