diff options
| author | Theo Buehler <tb@openbsd.org> | 2021-04-13 11:18:19 +0200 |
|---|---|---|
| committer | Theo Buehler <tb@openbsd.org> | 2021-04-13 11:20:15 +0200 |
| commit | 2509d58f8af80e7967c53aa80e9a650d7b464ad2 (patch) | |
| tree | 14f8e11fd4d72aa42d2f7e64b3ded2b047d3ba05 | |
| parent | 867b577d858d855140288a998f44f6c026456ad0 (diff) | |
| download | portable-2509d58f8af80e7967c53aa80e9a650d7b464ad2.tar.gz portable-2509d58f8af80e7967c53aa80e9a650d7b464ad2.tar.bz2 portable-2509d58f8af80e7967c53aa80e9a650d7b464ad2.zip | |
Initial changelog for 3.3.2
| -rw-r--r-- | ChangeLog | 295 |
1 files changed, 295 insertions, 0 deletions
| @@ -28,6 +28,301 @@ history is also available from Git. | |||
| 28 | 28 | ||
| 29 | LibreSSL Portable Release Notes: | 29 | LibreSSL Portable Release Notes: |
| 30 | 30 | ||
| 31 | 3.3.2 - Development release | ||
| 32 | |||
| 33 | * This release adds support for DTLSv1.2 and continued the record layer | ||
| 34 | rewrite for the legacy stack. Numerous bugs and interoperability | ||
| 35 | issues were fixed in the new verifier. The OpenSSL 1.1 TLSv1.3 API | ||
| 36 | is not yet available. | ||
| 37 | |||
| 38 | * Switch finish{,_peer}_md_len from an int to a size_t. | ||
| 39 | |||
| 40 | * Fix SSL_get{,_peer}_finished() with TLSv1.3. | ||
| 41 | |||
| 42 | * Use EVP_MD_MAX_MD_SIZE instead of 2 * EVP_MD_MAX_MD_SIZE as size | ||
| 43 | for cert_verify_md[], finish_md[] and peer_finish_md[]. The factor 2 | ||
| 44 | was a historical artefact. | ||
| 45 | |||
| 46 | * Corrected the return value type from ERR_peek_error() to a long. | ||
| 47 | |||
| 48 | * Avoid use of uninitialized in ASN1_time_parse which could happen | ||
| 49 | on parsing UTCTime if the caller didn't clear the passed struct tm. | ||
| 50 | |||
| 51 | * Destroy mutex in a tls_config object on tls_config_free(). | ||
| 52 | |||
| 53 | * Free alert_data and phh_data in tls13_record_layer_free() | ||
| 54 | these could leak if SSL_shutdown() or tls_close() were called | ||
| 55 | after closing the underlying socket(). | ||
| 56 | |||
| 57 | * Free struct members in their natural order for reviewability. | ||
| 58 | |||
| 59 | * Gracefully handle root certificates being both trusted and | ||
| 60 | untrusted. | ||
| 61 | |||
| 62 | * Handle X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE in the new | ||
| 63 | verifier. | ||
| 64 | |||
| 65 | * Use the legacy verifier when building auto chains. | ||
| 66 | |||
| 67 | * Use consistent namesin tls13_{client,server}_finished_{recv,send}(). | ||
| 68 | |||
| 69 | * Add tls13_secret_{init,cleanup}() and use them throughout the | ||
| 70 | TLSv1.3 code base. | ||
| 71 | |||
| 72 | * Move the read MAC key into the TLSv1.2 record layer. | ||
| 73 | |||
| 74 | * Make tls12_record_layer_free() NULL safe. | ||
| 75 | |||
| 76 | * Search the intermediates only after searching the root certs in the | ||
| 77 | new verifier to avoid problems with the legacy callback. | ||
| 78 | |||
| 79 | * Bail out early after finding a single chain in the new verifier if | ||
| 80 | we have been called from the legacy verifier API. | ||
| 81 | |||
| 82 | * Set (invalid and likely incomplete) chain on the xsc on chain build | ||
| 83 | failure prior to calling the callback. This is required by things | ||
| 84 | like auto chain. | ||
| 85 | |||
| 86 | * Align SSL_get_shared_ciphers() with OpenSSL. This takes into account | ||
| 87 | that it never returned server ciphers, so now it will fail when | ||
| 88 | called from the client side. | ||
| 89 | |||
| 90 | * Added support for SSL_get_shared_ciphers() to TLSv1.3. | ||
| 91 | |||
| 92 | * Split the record protection from the TLSv1.2 record layer. | ||
| 93 | |||
| 94 | * Clean up sequence number handling in the new TLSv1.2 record layer. | ||
| 95 | |||
| 96 | * Clean up sequence number handling in DTLS. | ||
| 97 | |||
| 98 | * Clean up dtls1_reset_seq_numbers(). | ||
| 99 | |||
| 100 | * Factor out code for explicit IV length, block size and MAC length. | ||
| 101 | |||
| 102 | * Provide record layer overhead for DTLS. | ||
| 103 | |||
| 104 | * Provide functions to determine if TLSv1.2 record protection is | ||
| 105 | engaged. | ||
| 106 | |||
| 107 | * Add code to handle change of cipehr state in the new TLSv1.2 record | ||
| 108 | layer. | ||
| 109 | |||
| 110 | * Mop up unused dtls1_build_sequence_numbers() function. | ||
| 111 | |||
| 112 | * Allow setting a keypair on a tls context without specifying the | ||
| 113 | private key and fake it internally in libtls. This removes the need | ||
| 114 | for privsep engines like relayd to use bogus keys. | ||
| 115 | |||
| 116 | * Skip the private key check for fake private keys. | ||
| 117 | |||
| 118 | * Move the private key setup to a helper function with proper error | ||
| 119 | checking. | ||
| 120 | |||
| 121 | * Change the internal tls_configure_ssl_keypair() function to | ||
| 122 | return -1 instead of 1 on failure. | ||
| 123 | |||
| 124 | * Move sequence numbers into the new TLSv1.2 record layer. | ||
| 125 | |||
| 126 | * Move AEAD handling into the new TLSv1.2 record layer. | ||
| 127 | |||
| 128 | * Remove direct assignment of aead_ctx to avoid a leak. | ||
| 129 | |||
| 130 | * Added a number of RPKI OIDs from RFC 6482, 6484, 6493, 8182, 8360, | ||
| 131 | draft-ietf-sidrops-rpki-rta, and draft-ietf-opsawg-finding-geofeeds. | ||
| 132 | |||
| 133 | * Fail early in legacy exporter if the master secret is not available | ||
| 134 | to avoid a segfault if it is called if the handshake is not | ||
| 135 | completed. | ||
| 136 | |||
| 137 | * Factor out legacy stack version checks. | ||
| 138 | |||
| 139 | * Correct handshake MAC/PRF for various TLSv1.2 cipher suites which | ||
| 140 | were originally added with the default handshake MAC and PRF rather | ||
| 141 | than hte SHA256 handshake MAC and PRF. | ||
| 142 | |||
| 143 | * Absorb ssl3_get_algorithm2() into ssl_get_handshake_evp_md(). | ||
| 144 | |||
| 145 | * Use dtls1_record_retrieve_buffered_record() to load buffered | ||
| 146 | application data. | ||
| 147 | |||
| 148 | * Enforce read ahead with DTLS. | ||
| 149 | |||
| 150 | * Remove bogus DTLS checks to disable ECC and OCSP. | ||
| 151 | |||
| 152 | * Sync cert.pem with Mozilla NSS root CAs except "GeoTrust Global CA". | ||
| 153 | |||
| 154 | * Only print the certificate file once on verification failure. | ||
| 155 | |||
| 156 | * Pull in fix for EVP_CipherUpdate() overflow from OpenSSL. | ||
| 157 | |||
| 158 | * Clean up and simplify dtls1_get_cipher(). | ||
| 159 | |||
| 160 | * Group HelloVerifyRequest decoding and add missing check for trailing | ||
| 161 | data. | ||
| 162 | |||
| 163 | * Revise HelloVerifyRequest handling for DTLSv1.2. | ||
| 164 | |||
| 165 | * Handle DTLS1_2_VERSION in various places. | ||
| 166 | |||
| 167 | * Add DTLSv1.2 methods. | ||
| 168 | |||
| 169 | * Make SSL{_CTX,}_get_{min,max}_proto_version() return a version of | ||
| 170 | zero if the minimum or maximum has been set to zero to match | ||
| 171 | OpenSSL's behavior. | ||
| 172 | |||
| 173 | * Rename the "truncated" label into "decode_err" and "f_err" into | ||
| 174 | "fatal_err". | ||
| 175 | |||
| 176 | * Factor out and change some of the legacy client version code. | ||
| 177 | |||
| 178 | * Simplify version checks in the TLSv1.3 client. Ensure that the | ||
| 179 | server announced TLSv1.3 and nothing higher and check that the | ||
| 180 | legacy_version is set to TLSv1.2 as required by RFC 8446. | ||
| 181 | |||
| 182 | * Fix an off-by-one in x509_verify_set_xsc_chain() to make sure that | ||
| 183 | the new validator checks for EXFLAG_CRITICAL in | ||
| 184 | x509_vfy_check_chain_extension() for all untrusted certs in the | ||
| 185 | chain. Take into account that the root is not necessarily trusted. | ||
| 186 | |||
| 187 | * Avoid passing last and depth to x509_verify_cert_error() on ENOMEM | ||
| 188 | |||
| 189 | * Rename depth to num_untrusted. | ||
| 190 | |||
| 191 | * Only use TLS versions internally rather than both TLS and DTLS | ||
| 192 | versions since the latter are the one's complement of the human | ||
| 193 | readable version numbers, which means that newer versions decrease | ||
| 194 | in values. | ||
| 195 | |||
| 196 | * Fix two bugs in the legacy verifier due to incorrect refactoring of | ||
| 197 | X509_verify_cert() for the new verifier: a return value was treated | ||
| 198 | as Boolean when it wasn't and thus it was not enough to decide | ||
| 199 | whether validation should carry on or not. | ||
| 200 | |||
| 201 | * Identify DTLS based on the version major value. | ||
| 202 | |||
| 203 | * Move handling of cipher/hash based cipher suites into the new record | ||
| 204 | layer. | ||
| 205 | |||
| 206 | * Add tls12_record_protection_unused() and call it from CCS functions. | ||
| 207 | |||
| 208 | * Move key/IV length checks closer to usage sites. Also add explicit | ||
| 209 | checks against EVP_CIPHER_{iv,key}_length(). | ||
| 210 | |||
| 211 | * Replace two handrolled tls12_record_protection_engaged(). | ||
| 212 | |||
| 213 | * Improve internal version handling: add handshake fields for our | ||
| 214 | minimum version, our maximum version and the TLS version negotiated | ||
| 215 | during the handshake. Convert most of the internal code to use these | ||
| 216 | version fields. | ||
| 217 | |||
| 218 | * Guard against future internal use of TLS1_get_{client,}_version() | ||
| 219 | macros. | ||
| 220 | |||
| 221 | * Remove the internal ssl_downgrade_max_version() which is no longer | ||
| 222 | needed. | ||
| 223 | |||
| 224 | * Fix checks for memory caps of constraints names. There are internal | ||
| 225 | caps on the number of name constraints and other names that the new | ||
| 226 | name constraints code allocates per cert chain. These checks were | ||
| 227 | checked too late, making these caps only partially effective. | ||
| 228 | |||
| 229 | * Use EXFLAG_INVALID to handle out of memory and parse errors in | ||
| 230 | x509v3_cache_extensions(). | ||
| 231 | |||
| 232 | * Add support for DTLSv1.2 version handling. | ||
| 233 | |||
| 234 | * Enable DTLSv1.2 support. | ||
| 235 | |||
| 236 | * Add DTLSv1.2 support to openssl s_client/s_server. | ||
| 237 | |||
| 238 | * Remove no longer needed read ahead workarounds in the s_client and | ||
| 239 | s_server. | ||
| 240 | |||
| 241 | * Fix a copy-paste error a skid was confused with an akid when | ||
| 242 | checking for EXFLAG_INVALID. This broke OCSP validation with | ||
| 243 | certain mirrors. | ||
| 244 | |||
| 245 | * Made supported protocols and list of DHE more prominent in | ||
| 246 | tls_config_set_protocols.3. Various mdoc improvements for that | ||
| 247 | manual. | ||
| 248 | |||
| 249 | * Avoid a use-after-scope in tls13_cert_add() | ||
| 250 | |||
| 251 | * Split TLSv1.3 record protection from record layer. | ||
| 252 | |||
| 253 | * Move the TLSv1.3 handshake struct inside the shared handshake | ||
| 254 | struct. | ||
| 255 | |||
| 256 | * Fully initialize rrec in tls12_record_layer_open_record_protected() | ||
| 257 | to avoid confusing certain static analyzers. | ||
| 258 | |||
| 259 | * Use tls_set_errorx() on OCSP_basic_verify() failure since the latter | ||
| 260 | does not set errno. | ||
| 261 | |||
| 262 | * Convert openssl(1) x509 to new option handling and do the usual | ||
| 263 | clean up that goeas along with it. | ||
| 264 | |||
| 265 | * Add SSL_HANDSHAKE_TLS12 for TLSv1.2 specific handshake data. | ||
| 266 | |||
| 267 | * Rename new_cipher to cipher to align naming with keyblock or other | ||
| 268 | parts of the handshake data. | ||
| 269 | |||
| 270 | * Avoid mangled output in BIO_debug_callback(). | ||
| 271 | |||
| 272 | * Fix client side renegotiation by replacing use of s->internal-type | ||
| 273 | with s->server. | ||
| 274 | |||
| 275 | * Avoid a symbol collision with SSL_is_dtls() between libssl and | ||
| 276 | openssl(1) in static builds. | ||
| 277 | |||
| 278 | * Move the TLSv1.2 record number increment into the new record layer. | ||
| 279 | |||
| 280 | * Move finished and peer finished into the handshake struct. | ||
| 281 | |||
| 282 | * Avoid transcript initialization when sending a TLS HelloRequest | ||
| 283 | to fix server side renegotiation. | ||
| 284 | |||
| 285 | * Remove pointless assignment in SSL_get0_alpn_selected(). | ||
| 286 | |||
| 287 | * Provide EVP_PKEY_new_CMAC_KEY(3). | ||
| 288 | |||
| 289 | * Add missing prototype for d2i_DSAPrivateKey_fp(3) to x509.h. | ||
| 290 | |||
| 291 | * Show DTLSv1.2 message with openssl(1) s_server and s_client. | ||
| 292 | |||
| 293 | * Avoid leaking param->name in x509_verify_param_zero(). | ||
| 294 | |||
| 295 | * Avoid a leak in an error path in openssl x509. | ||
| 296 | |||
| 297 | * Add some error checking to openssl x509. | ||
| 298 | |||
| 299 | * When sending an alert in TLSv1.3, only set its error code when no | ||
| 300 | other error was set previously. Certain clients rely on specific | ||
| 301 | SSL_R_ error codes to determine that they deal with a self signed | ||
| 302 | cert. | ||
| 303 | |||
| 304 | * Provide SSL_use_certificate_chain_file(3). | ||
| 305 | |||
| 306 | * Provide SSL_set_hostflags(3) and SSL_get0_peername(3). | ||
| 307 | |||
| 308 | * Provide various DTLSv1.2 specific functions and defines. | ||
| 309 | |||
| 310 | * Remove workarounds for SSL_is_dtls() in openssl(1). | ||
| 311 | |||
| 312 | * Document meaning of '*' in the genrsa output. | ||
| 313 | |||
| 314 | * Updated documentation for SSL_get_shared_ciphers(3). | ||
| 315 | |||
| 316 | * Add documentation for SSL_get_finished(3). | ||
| 317 | |||
| 318 | * Document EVP_PKEY_new_CMAC_key(3) | ||
| 319 | |||
| 320 | * Document SSL_use_certificate_chain_file(3). | ||
| 321 | |||
| 322 | * Document SSL_set_hostflags(3) and SSL_get0_peername(3). | ||
| 323 | |||
| 324 | * Update SSL_get_version.3 manualf or DTLSv.1.2 support. | ||
| 325 | |||
| 31 | 3.3.1 - Security fix | 326 | 3.3.1 - Security fix |
| 32 | 327 | ||
| 33 | * Malformed ASN.1 in a certificate revocation list or a timestamp | 328 | * Malformed ASN.1 in a certificate revocation list or a timestamp |
