diff options
author | Theo Buehler <tb@openbsd.org> | 2021-04-13 11:18:19 +0200 |
---|---|---|
committer | Theo Buehler <tb@openbsd.org> | 2021-04-13 11:20:15 +0200 |
commit | 2509d58f8af80e7967c53aa80e9a650d7b464ad2 (patch) | |
tree | 14f8e11fd4d72aa42d2f7e64b3ded2b047d3ba05 | |
parent | 867b577d858d855140288a998f44f6c026456ad0 (diff) | |
download | portable-2509d58f8af80e7967c53aa80e9a650d7b464ad2.tar.gz portable-2509d58f8af80e7967c53aa80e9a650d7b464ad2.tar.bz2 portable-2509d58f8af80e7967c53aa80e9a650d7b464ad2.zip |
Initial changelog for 3.3.2
-rw-r--r-- | ChangeLog | 295 |
1 files changed, 295 insertions, 0 deletions
@@ -28,6 +28,301 @@ history is also available from Git. | |||
28 | 28 | ||
29 | LibreSSL Portable Release Notes: | 29 | LibreSSL Portable Release Notes: |
30 | 30 | ||
31 | 3.3.2 - Development release | ||
32 | |||
33 | * This release adds support for DTLSv1.2 and continued the record layer | ||
34 | rewrite for the legacy stack. Numerous bugs and interoperability | ||
35 | issues were fixed in the new verifier. The OpenSSL 1.1 TLSv1.3 API | ||
36 | is not yet available. | ||
37 | |||
38 | * Switch finish{,_peer}_md_len from an int to a size_t. | ||
39 | |||
40 | * Fix SSL_get{,_peer}_finished() with TLSv1.3. | ||
41 | |||
42 | * Use EVP_MD_MAX_MD_SIZE instead of 2 * EVP_MD_MAX_MD_SIZE as size | ||
43 | for cert_verify_md[], finish_md[] and peer_finish_md[]. The factor 2 | ||
44 | was a historical artefact. | ||
45 | |||
46 | * Corrected the return value type from ERR_peek_error() to a long. | ||
47 | |||
48 | * Avoid use of uninitialized in ASN1_time_parse which could happen | ||
49 | on parsing UTCTime if the caller didn't clear the passed struct tm. | ||
50 | |||
51 | * Destroy mutex in a tls_config object on tls_config_free(). | ||
52 | |||
53 | * Free alert_data and phh_data in tls13_record_layer_free() | ||
54 | these could leak if SSL_shutdown() or tls_close() were called | ||
55 | after closing the underlying socket(). | ||
56 | |||
57 | * Free struct members in their natural order for reviewability. | ||
58 | |||
59 | * Gracefully handle root certificates being both trusted and | ||
60 | untrusted. | ||
61 | |||
62 | * Handle X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE in the new | ||
63 | verifier. | ||
64 | |||
65 | * Use the legacy verifier when building auto chains. | ||
66 | |||
67 | * Use consistent namesin tls13_{client,server}_finished_{recv,send}(). | ||
68 | |||
69 | * Add tls13_secret_{init,cleanup}() and use them throughout the | ||
70 | TLSv1.3 code base. | ||
71 | |||
72 | * Move the read MAC key into the TLSv1.2 record layer. | ||
73 | |||
74 | * Make tls12_record_layer_free() NULL safe. | ||
75 | |||
76 | * Search the intermediates only after searching the root certs in the | ||
77 | new verifier to avoid problems with the legacy callback. | ||
78 | |||
79 | * Bail out early after finding a single chain in the new verifier if | ||
80 | we have been called from the legacy verifier API. | ||
81 | |||
82 | * Set (invalid and likely incomplete) chain on the xsc on chain build | ||
83 | failure prior to calling the callback. This is required by things | ||
84 | like auto chain. | ||
85 | |||
86 | * Align SSL_get_shared_ciphers() with OpenSSL. This takes into account | ||
87 | that it never returned server ciphers, so now it will fail when | ||
88 | called from the client side. | ||
89 | |||
90 | * Added support for SSL_get_shared_ciphers() to TLSv1.3. | ||
91 | |||
92 | * Split the record protection from the TLSv1.2 record layer. | ||
93 | |||
94 | * Clean up sequence number handling in the new TLSv1.2 record layer. | ||
95 | |||
96 | * Clean up sequence number handling in DTLS. | ||
97 | |||
98 | * Clean up dtls1_reset_seq_numbers(). | ||
99 | |||
100 | * Factor out code for explicit IV length, block size and MAC length. | ||
101 | |||
102 | * Provide record layer overhead for DTLS. | ||
103 | |||
104 | * Provide functions to determine if TLSv1.2 record protection is | ||
105 | engaged. | ||
106 | |||
107 | * Add code to handle change of cipehr state in the new TLSv1.2 record | ||
108 | layer. | ||
109 | |||
110 | * Mop up unused dtls1_build_sequence_numbers() function. | ||
111 | |||
112 | * Allow setting a keypair on a tls context without specifying the | ||
113 | private key and fake it internally in libtls. This removes the need | ||
114 | for privsep engines like relayd to use bogus keys. | ||
115 | |||
116 | * Skip the private key check for fake private keys. | ||
117 | |||
118 | * Move the private key setup to a helper function with proper error | ||
119 | checking. | ||
120 | |||
121 | * Change the internal tls_configure_ssl_keypair() function to | ||
122 | return -1 instead of 1 on failure. | ||
123 | |||
124 | * Move sequence numbers into the new TLSv1.2 record layer. | ||
125 | |||
126 | * Move AEAD handling into the new TLSv1.2 record layer. | ||
127 | |||
128 | * Remove direct assignment of aead_ctx to avoid a leak. | ||
129 | |||
130 | * Added a number of RPKI OIDs from RFC 6482, 6484, 6493, 8182, 8360, | ||
131 | draft-ietf-sidrops-rpki-rta, and draft-ietf-opsawg-finding-geofeeds. | ||
132 | |||
133 | * Fail early in legacy exporter if the master secret is not available | ||
134 | to avoid a segfault if it is called if the handshake is not | ||
135 | completed. | ||
136 | |||
137 | * Factor out legacy stack version checks. | ||
138 | |||
139 | * Correct handshake MAC/PRF for various TLSv1.2 cipher suites which | ||
140 | were originally added with the default handshake MAC and PRF rather | ||
141 | than hte SHA256 handshake MAC and PRF. | ||
142 | |||
143 | * Absorb ssl3_get_algorithm2() into ssl_get_handshake_evp_md(). | ||
144 | |||
145 | * Use dtls1_record_retrieve_buffered_record() to load buffered | ||
146 | application data. | ||
147 | |||
148 | * Enforce read ahead with DTLS. | ||
149 | |||
150 | * Remove bogus DTLS checks to disable ECC and OCSP. | ||
151 | |||
152 | * Sync cert.pem with Mozilla NSS root CAs except "GeoTrust Global CA". | ||
153 | |||
154 | * Only print the certificate file once on verification failure. | ||
155 | |||
156 | * Pull in fix for EVP_CipherUpdate() overflow from OpenSSL. | ||
157 | |||
158 | * Clean up and simplify dtls1_get_cipher(). | ||
159 | |||
160 | * Group HelloVerifyRequest decoding and add missing check for trailing | ||
161 | data. | ||
162 | |||
163 | * Revise HelloVerifyRequest handling for DTLSv1.2. | ||
164 | |||
165 | * Handle DTLS1_2_VERSION in various places. | ||
166 | |||
167 | * Add DTLSv1.2 methods. | ||
168 | |||
169 | * Make SSL{_CTX,}_get_{min,max}_proto_version() return a version of | ||
170 | zero if the minimum or maximum has been set to zero to match | ||
171 | OpenSSL's behavior. | ||
172 | |||
173 | * Rename the "truncated" label into "decode_err" and "f_err" into | ||
174 | "fatal_err". | ||
175 | |||
176 | * Factor out and change some of the legacy client version code. | ||
177 | |||
178 | * Simplify version checks in the TLSv1.3 client. Ensure that the | ||
179 | server announced TLSv1.3 and nothing higher and check that the | ||
180 | legacy_version is set to TLSv1.2 as required by RFC 8446. | ||
181 | |||
182 | * Fix an off-by-one in x509_verify_set_xsc_chain() to make sure that | ||
183 | the new validator checks for EXFLAG_CRITICAL in | ||
184 | x509_vfy_check_chain_extension() for all untrusted certs in the | ||
185 | chain. Take into account that the root is not necessarily trusted. | ||
186 | |||
187 | * Avoid passing last and depth to x509_verify_cert_error() on ENOMEM | ||
188 | |||
189 | * Rename depth to num_untrusted. | ||
190 | |||
191 | * Only use TLS versions internally rather than both TLS and DTLS | ||
192 | versions since the latter are the one's complement of the human | ||
193 | readable version numbers, which means that newer versions decrease | ||
194 | in values. | ||
195 | |||
196 | * Fix two bugs in the legacy verifier due to incorrect refactoring of | ||
197 | X509_verify_cert() for the new verifier: a return value was treated | ||
198 | as Boolean when it wasn't and thus it was not enough to decide | ||
199 | whether validation should carry on or not. | ||
200 | |||
201 | * Identify DTLS based on the version major value. | ||
202 | |||
203 | * Move handling of cipher/hash based cipher suites into the new record | ||
204 | layer. | ||
205 | |||
206 | * Add tls12_record_protection_unused() and call it from CCS functions. | ||
207 | |||
208 | * Move key/IV length checks closer to usage sites. Also add explicit | ||
209 | checks against EVP_CIPHER_{iv,key}_length(). | ||
210 | |||
211 | * Replace two handrolled tls12_record_protection_engaged(). | ||
212 | |||
213 | * Improve internal version handling: add handshake fields for our | ||
214 | minimum version, our maximum version and the TLS version negotiated | ||
215 | during the handshake. Convert most of the internal code to use these | ||
216 | version fields. | ||
217 | |||
218 | * Guard against future internal use of TLS1_get_{client,}_version() | ||
219 | macros. | ||
220 | |||
221 | * Remove the internal ssl_downgrade_max_version() which is no longer | ||
222 | needed. | ||
223 | |||
224 | * Fix checks for memory caps of constraints names. There are internal | ||
225 | caps on the number of name constraints and other names that the new | ||
226 | name constraints code allocates per cert chain. These checks were | ||
227 | checked too late, making these caps only partially effective. | ||
228 | |||
229 | * Use EXFLAG_INVALID to handle out of memory and parse errors in | ||
230 | x509v3_cache_extensions(). | ||
231 | |||
232 | * Add support for DTLSv1.2 version handling. | ||
233 | |||
234 | * Enable DTLSv1.2 support. | ||
235 | |||
236 | * Add DTLSv1.2 support to openssl s_client/s_server. | ||
237 | |||
238 | * Remove no longer needed read ahead workarounds in the s_client and | ||
239 | s_server. | ||
240 | |||
241 | * Fix a copy-paste error a skid was confused with an akid when | ||
242 | checking for EXFLAG_INVALID. This broke OCSP validation with | ||
243 | certain mirrors. | ||
244 | |||
245 | * Made supported protocols and list of DHE more prominent in | ||
246 | tls_config_set_protocols.3. Various mdoc improvements for that | ||
247 | manual. | ||
248 | |||
249 | * Avoid a use-after-scope in tls13_cert_add() | ||
250 | |||
251 | * Split TLSv1.3 record protection from record layer. | ||
252 | |||
253 | * Move the TLSv1.3 handshake struct inside the shared handshake | ||
254 | struct. | ||
255 | |||
256 | * Fully initialize rrec in tls12_record_layer_open_record_protected() | ||
257 | to avoid confusing certain static analyzers. | ||
258 | |||
259 | * Use tls_set_errorx() on OCSP_basic_verify() failure since the latter | ||
260 | does not set errno. | ||
261 | |||
262 | * Convert openssl(1) x509 to new option handling and do the usual | ||
263 | clean up that goeas along with it. | ||
264 | |||
265 | * Add SSL_HANDSHAKE_TLS12 for TLSv1.2 specific handshake data. | ||
266 | |||
267 | * Rename new_cipher to cipher to align naming with keyblock or other | ||
268 | parts of the handshake data. | ||
269 | |||
270 | * Avoid mangled output in BIO_debug_callback(). | ||
271 | |||
272 | * Fix client side renegotiation by replacing use of s->internal-type | ||
273 | with s->server. | ||
274 | |||
275 | * Avoid a symbol collision with SSL_is_dtls() between libssl and | ||
276 | openssl(1) in static builds. | ||
277 | |||
278 | * Move the TLSv1.2 record number increment into the new record layer. | ||
279 | |||
280 | * Move finished and peer finished into the handshake struct. | ||
281 | |||
282 | * Avoid transcript initialization when sending a TLS HelloRequest | ||
283 | to fix server side renegotiation. | ||
284 | |||
285 | * Remove pointless assignment in SSL_get0_alpn_selected(). | ||
286 | |||
287 | * Provide EVP_PKEY_new_CMAC_KEY(3). | ||
288 | |||
289 | * Add missing prototype for d2i_DSAPrivateKey_fp(3) to x509.h. | ||
290 | |||
291 | * Show DTLSv1.2 message with openssl(1) s_server and s_client. | ||
292 | |||
293 | * Avoid leaking param->name in x509_verify_param_zero(). | ||
294 | |||
295 | * Avoid a leak in an error path in openssl x509. | ||
296 | |||
297 | * Add some error checking to openssl x509. | ||
298 | |||
299 | * When sending an alert in TLSv1.3, only set its error code when no | ||
300 | other error was set previously. Certain clients rely on specific | ||
301 | SSL_R_ error codes to determine that they deal with a self signed | ||
302 | cert. | ||
303 | |||
304 | * Provide SSL_use_certificate_chain_file(3). | ||
305 | |||
306 | * Provide SSL_set_hostflags(3) and SSL_get0_peername(3). | ||
307 | |||
308 | * Provide various DTLSv1.2 specific functions and defines. | ||
309 | |||
310 | * Remove workarounds for SSL_is_dtls() in openssl(1). | ||
311 | |||
312 | * Document meaning of '*' in the genrsa output. | ||
313 | |||
314 | * Updated documentation for SSL_get_shared_ciphers(3). | ||
315 | |||
316 | * Add documentation for SSL_get_finished(3). | ||
317 | |||
318 | * Document EVP_PKEY_new_CMAC_key(3) | ||
319 | |||
320 | * Document SSL_use_certificate_chain_file(3). | ||
321 | |||
322 | * Document SSL_set_hostflags(3) and SSL_get0_peername(3). | ||
323 | |||
324 | * Update SSL_get_version.3 manualf or DTLSv.1.2 support. | ||
325 | |||
31 | 3.3.1 - Security fix | 326 | 3.3.1 - Security fix |
32 | 327 | ||
33 | * Malformed ASN.1 in a certificate revocation list or a timestamp | 328 | * Malformed ASN.1 in a certificate revocation list or a timestamp |