diff options
| author | Theo Buehler <tb@openbsd.org> | 2020-11-19 14:49:42 +0100 |
|---|---|---|
| committer | Theo Buehler <tb@openbsd.org> | 2020-11-19 14:50:52 +0100 |
| commit | 223fbf70f537f581de15f89afef17f8c0092e166 (patch) | |
| tree | dd47b10e42c62edf950102ca2c8d677815009ae2 | |
| parent | df3d4bb57a253f85bb60567aaea5f2dd992a9fbd (diff) | |
| download | portable-223fbf70f537f581de15f89afef17f8c0092e166.tar.gz portable-223fbf70f537f581de15f89afef17f8c0092e166.tar.bz2 portable-223fbf70f537f581de15f89afef17f8c0092e166.zip | |
Initial ChangeLog for 3.3.0
| -rw-r--r-- | ChangeLog | 98 |
1 files changed, 98 insertions, 0 deletions
| @@ -28,6 +28,104 @@ history is also available from Git. | |||
| 28 | 28 | ||
| 29 | LibreSSL Portable Release Notes: | 29 | LibreSSL Portable Release Notes: |
| 30 | 30 | ||
| 31 | 3.3.0 - Development release | ||
| 32 | |||
| 33 | * Make openssl(1) s_server ignore -4 and -6 for compatibility with | ||
| 34 | OpenSSL. | ||
| 35 | |||
| 36 | * Further cleanup of the DTLS record handling. | ||
| 37 | |||
| 38 | * Continue the replacement of the TLSv1.2 record layer by | ||
| 39 | reimplementing the read side of the TLSv1.2 record handling. | ||
| 40 | |||
| 41 | * Replace DTLSv1_enc_data() with TLSv1_1_enc_data(). | ||
| 42 | |||
| 43 | * Merge d1_{clnt,srvr}.c into ssl_{clnt,srver}.c. | ||
| 44 | |||
| 45 | * Fix switching from the TLSv1.3 stack to the legacy stack after | ||
| 46 | the record rewrite by including a TLS record header for the case | ||
| 47 | that there is more than one handshake message in the TLS plaintext | ||
| 48 | record. | ||
| 49 | |||
| 50 | * Set SO_REUSEADDR on the server socket in the openssl(1) ocsp | ||
| 51 | command. | ||
| 52 | |||
| 53 | * Fix resource handling on error in OCSP_request_add0_id(). | ||
| 54 | |||
| 55 | * Add const to ssl_ciphers and tls1[23]_sigalgs* to push them into | ||
| 56 | .data.rel.ro and .rodata, respectively. | ||
| 57 | |||
| 58 | * Add a const qualifier to srtp_known_profiles. | ||
| 59 | |||
| 60 | * Simplify TLS method by removing the client and server specific | ||
| 61 | methods internally. | ||
| 62 | |||
| 63 | * Avoid casting away const in ssl_ctx_make_profiles(). | ||
| 64 | |||
| 65 | * Make sure there is enough room for stashing the handshake message | ||
| 66 | when switching to the legacy TLS stack. | ||
| 67 | |||
| 68 | * Avoid explicitly conditioning an assert on DTLS1_VERSION to make | ||
| 69 | the assert work for newer DTLS versions. | ||
| 70 | |||
| 71 | * Merge SSL_ENC_METHOD into SSL_METHOD_INTERNAL. | ||
| 72 | |||
| 73 | * Send a host header with OCSP queries to make openssl(1) ocsp | ||
| 74 | work with some widely used OCSP responders. | ||
| 75 | |||
| 76 | * Fix a memory leak in the openssl(1) s_client. | ||
| 77 | |||
| 78 | * Add a flag to mark DTLS methods as DTLS to have an easy way to | ||
| 79 | recognize DTLS methods that avoids inspecting the version number. | ||
| 80 | |||
| 81 | * Implement SSL_is_dtls() and use it internally in place of the | ||
| 82 | SSL_IS_DTLS macro. | ||
| 83 | |||
| 84 | * Unbreak DTLS retransmissions for flights that include a CCS. | ||
| 85 | |||
| 86 | * Add ability to ocspcheck(8) to parse a port in the specified | ||
| 87 | OCSP URL. | ||
| 88 | |||
| 89 | * Refactor and clean up ocspcheck(8) and add regression tests. | ||
| 90 | |||
| 91 | * If x509_verify() fails, ensure that the error is set on both | ||
| 92 | the x509_verify_ctx() and its store context to make some failures | ||
| 93 | visible from SSL_get_verify_result(). | ||
| 94 | |||
| 95 | * Use the X509_STORE_CTX get_issuer() callback from the new X.509 | ||
| 96 | verifier to fix hashed certificate directories. | ||
| 97 | |||
| 98 | * Only check BIO_should_read() on read and BIO_should_write() on | ||
| 99 | write. Previously, BIO_should_write() was also checked after read | ||
| 100 | and BIO_should_read() after write which could cause stalls in | ||
| 101 | software that uses the same BIO for read and write. | ||
| 102 | |||
| 103 | * In openssl(1) verify, also check for error on the store context | ||
| 104 | since the return value of X509_verify_cert() is unreliable in | ||
| 105 | presence of a callback that returns 1 too often. | ||
| 106 | |||
| 107 | * Implement auto chain for the TLSv1.3 server since some software | ||
| 108 | relies on this. | ||
| 109 | |||
| 110 | * Handle additional certificate error cases in the new X.509 verifier. | ||
| 111 | Keep track of the errors encountered if a verify callback tells the | ||
| 112 | verifier to continue and report them back via the error on the store | ||
| 113 | context. This mimicks the behavior of the old verifier that would | ||
| 114 | persist the first error encountered while building the chain. | ||
| 115 | |||
| 116 | * Report specific failures for "self signed certificates" in a way | ||
| 117 | compatible with the old verifier since software relies on the | ||
| 118 | error code. | ||
| 119 | |||
| 120 | * Implement key exporter for TLSv1.3. | ||
| 121 | |||
| 122 | * Plug a large memory leak in the new verifier caused by calling | ||
| 123 | X509_policy_check() repeatedly instead. | ||
| 124 | |||
| 125 | * Avoid leaking memory in x509_verify_chain_dup(). | ||
| 126 | |||
| 127 | * Various documentation improvements, particularly around TLS methods. | ||
| 128 | |||
| 31 | 3.2.2 - Stable release | 129 | 3.2.2 - Stable release |
| 32 | 130 | ||
| 33 | * This is the first stable release with the new TLSv1.3 | 131 | * This is the first stable release with the new TLSv1.3 |
