aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorTheo Buehler <tb@openbsd.org>2021-04-13 11:18:19 +0200
committerTheo Buehler <tb@openbsd.org>2021-04-13 11:20:15 +0200
commit2509d58f8af80e7967c53aa80e9a650d7b464ad2 (patch)
tree14f8e11fd4d72aa42d2f7e64b3ded2b047d3ba05
parent867b577d858d855140288a998f44f6c026456ad0 (diff)
downloadportable-2509d58f8af80e7967c53aa80e9a650d7b464ad2.tar.gz
portable-2509d58f8af80e7967c53aa80e9a650d7b464ad2.tar.bz2
portable-2509d58f8af80e7967c53aa80e9a650d7b464ad2.zip
Initial changelog for 3.3.2
-rw-r--r--ChangeLog295
1 files changed, 295 insertions, 0 deletions
diff --git a/ChangeLog b/ChangeLog
index 0a7dc36..41bc6cd 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -28,6 +28,301 @@ history is also available from Git.
28 28
29LibreSSL Portable Release Notes: 29LibreSSL Portable Release Notes:
30 30
313.3.2 - Development release
32
33 * This release adds support for DTLSv1.2 and continued the record layer
34 rewrite for the legacy stack. Numerous bugs and interoperability
35 issues were fixed in the new verifier. The OpenSSL 1.1 TLSv1.3 API
36 is not yet available.
37
38 * Switch finish{,_peer}_md_len from an int to a size_t.
39
40 * Fix SSL_get{,_peer}_finished() with TLSv1.3.
41
42 * Use EVP_MD_MAX_MD_SIZE instead of 2 * EVP_MD_MAX_MD_SIZE as size
43 for cert_verify_md[], finish_md[] and peer_finish_md[]. The factor 2
44 was a historical artefact.
45
46 * Corrected the return value type from ERR_peek_error() to a long.
47
48 * Avoid use of uninitialized in ASN1_time_parse which could happen
49 on parsing UTCTime if the caller didn't clear the passed struct tm.
50
51 * Destroy mutex in a tls_config object on tls_config_free().
52
53 * Free alert_data and phh_data in tls13_record_layer_free()
54 these could leak if SSL_shutdown() or tls_close() were called
55 after closing the underlying socket().
56
57 * Free struct members in their natural order for reviewability.
58
59 * Gracefully handle root certificates being both trusted and
60 untrusted.
61
62 * Handle X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE in the new
63 verifier.
64
65 * Use the legacy verifier when building auto chains.
66
67 * Use consistent namesin tls13_{client,server}_finished_{recv,send}().
68
69 * Add tls13_secret_{init,cleanup}() and use them throughout the
70 TLSv1.3 code base.
71
72 * Move the read MAC key into the TLSv1.2 record layer.
73
74 * Make tls12_record_layer_free() NULL safe.
75
76 * Search the intermediates only after searching the root certs in the
77 new verifier to avoid problems with the legacy callback.
78
79 * Bail out early after finding a single chain in the new verifier if
80 we have been called from the legacy verifier API.
81
82 * Set (invalid and likely incomplete) chain on the xsc on chain build
83 failure prior to calling the callback. This is required by things
84 like auto chain.
85
86 * Align SSL_get_shared_ciphers() with OpenSSL. This takes into account
87 that it never returned server ciphers, so now it will fail when
88 called from the client side.
89
90 * Added support for SSL_get_shared_ciphers() to TLSv1.3.
91
92 * Split the record protection from the TLSv1.2 record layer.
93
94 * Clean up sequence number handling in the new TLSv1.2 record layer.
95
96 * Clean up sequence number handling in DTLS.
97
98 * Clean up dtls1_reset_seq_numbers().
99
100 * Factor out code for explicit IV length, block size and MAC length.
101
102 * Provide record layer overhead for DTLS.
103
104 * Provide functions to determine if TLSv1.2 record protection is
105 engaged.
106
107 * Add code to handle change of cipehr state in the new TLSv1.2 record
108 layer.
109
110 * Mop up unused dtls1_build_sequence_numbers() function.
111
112 * Allow setting a keypair on a tls context without specifying the
113 private key and fake it internally in libtls. This removes the need
114 for privsep engines like relayd to use bogus keys.
115
116 * Skip the private key check for fake private keys.
117
118 * Move the private key setup to a helper function with proper error
119 checking.
120
121 * Change the internal tls_configure_ssl_keypair() function to
122 return -1 instead of 1 on failure.
123
124 * Move sequence numbers into the new TLSv1.2 record layer.
125
126 * Move AEAD handling into the new TLSv1.2 record layer.
127
128 * Remove direct assignment of aead_ctx to avoid a leak.
129
130 * Added a number of RPKI OIDs from RFC 6482, 6484, 6493, 8182, 8360,
131 draft-ietf-sidrops-rpki-rta, and draft-ietf-opsawg-finding-geofeeds.
132
133 * Fail early in legacy exporter if the master secret is not available
134 to avoid a segfault if it is called if the handshake is not
135 completed.
136
137 * Factor out legacy stack version checks.
138
139 * Correct handshake MAC/PRF for various TLSv1.2 cipher suites which
140 were originally added with the default handshake MAC and PRF rather
141 than hte SHA256 handshake MAC and PRF.
142
143 * Absorb ssl3_get_algorithm2() into ssl_get_handshake_evp_md().
144
145 * Use dtls1_record_retrieve_buffered_record() to load buffered
146 application data.
147
148 * Enforce read ahead with DTLS.
149
150 * Remove bogus DTLS checks to disable ECC and OCSP.
151
152 * Sync cert.pem with Mozilla NSS root CAs except "GeoTrust Global CA".
153
154 * Only print the certificate file once on verification failure.
155
156 * Pull in fix for EVP_CipherUpdate() overflow from OpenSSL.
157
158 * Clean up and simplify dtls1_get_cipher().
159
160 * Group HelloVerifyRequest decoding and add missing check for trailing
161 data.
162
163 * Revise HelloVerifyRequest handling for DTLSv1.2.
164
165 * Handle DTLS1_2_VERSION in various places.
166
167 * Add DTLSv1.2 methods.
168
169 * Make SSL{_CTX,}_get_{min,max}_proto_version() return a version of
170 zero if the minimum or maximum has been set to zero to match
171 OpenSSL's behavior.
172
173 * Rename the "truncated" label into "decode_err" and "f_err" into
174 "fatal_err".
175
176 * Factor out and change some of the legacy client version code.
177
178 * Simplify version checks in the TLSv1.3 client. Ensure that the
179 server announced TLSv1.3 and nothing higher and check that the
180 legacy_version is set to TLSv1.2 as required by RFC 8446.
181
182 * Fix an off-by-one in x509_verify_set_xsc_chain() to make sure that
183 the new validator checks for EXFLAG_CRITICAL in
184 x509_vfy_check_chain_extension() for all untrusted certs in the
185 chain. Take into account that the root is not necessarily trusted.
186
187 * Avoid passing last and depth to x509_verify_cert_error() on ENOMEM
188
189 * Rename depth to num_untrusted.
190
191 * Only use TLS versions internally rather than both TLS and DTLS
192 versions since the latter are the one's complement of the human
193 readable version numbers, which means that newer versions decrease
194 in values.
195
196 * Fix two bugs in the legacy verifier due to incorrect refactoring of
197 X509_verify_cert() for the new verifier: a return value was treated
198 as Boolean when it wasn't and thus it was not enough to decide
199 whether validation should carry on or not.
200
201 * Identify DTLS based on the version major value.
202
203 * Move handling of cipher/hash based cipher suites into the new record
204 layer.
205
206 * Add tls12_record_protection_unused() and call it from CCS functions.
207
208 * Move key/IV length checks closer to usage sites. Also add explicit
209 checks against EVP_CIPHER_{iv,key}_length().
210
211 * Replace two handrolled tls12_record_protection_engaged().
212
213 * Improve internal version handling: add handshake fields for our
214 minimum version, our maximum version and the TLS version negotiated
215 during the handshake. Convert most of the internal code to use these
216 version fields.
217
218 * Guard against future internal use of TLS1_get_{client,}_version()
219 macros.
220
221 * Remove the internal ssl_downgrade_max_version() which is no longer
222 needed.
223
224 * Fix checks for memory caps of constraints names. There are internal
225 caps on the number of name constraints and other names that the new
226 name constraints code allocates per cert chain. These checks were
227 checked too late, making these caps only partially effective.
228
229 * Use EXFLAG_INVALID to handle out of memory and parse errors in
230 x509v3_cache_extensions().
231
232 * Add support for DTLSv1.2 version handling.
233
234 * Enable DTLSv1.2 support.
235
236 * Add DTLSv1.2 support to openssl s_client/s_server.
237
238 * Remove no longer needed read ahead workarounds in the s_client and
239 s_server.
240
241 * Fix a copy-paste error a skid was confused with an akid when
242 checking for EXFLAG_INVALID. This broke OCSP validation with
243 certain mirrors.
244
245 * Made supported protocols and list of DHE more prominent in
246 tls_config_set_protocols.3. Various mdoc improvements for that
247 manual.
248
249 * Avoid a use-after-scope in tls13_cert_add()
250
251 * Split TLSv1.3 record protection from record layer.
252
253 * Move the TLSv1.3 handshake struct inside the shared handshake
254 struct.
255
256 * Fully initialize rrec in tls12_record_layer_open_record_protected()
257 to avoid confusing certain static analyzers.
258
259 * Use tls_set_errorx() on OCSP_basic_verify() failure since the latter
260 does not set errno.
261
262 * Convert openssl(1) x509 to new option handling and do the usual
263 clean up that goeas along with it.
264
265 * Add SSL_HANDSHAKE_TLS12 for TLSv1.2 specific handshake data.
266
267 * Rename new_cipher to cipher to align naming with keyblock or other
268 parts of the handshake data.
269
270 * Avoid mangled output in BIO_debug_callback().
271
272 * Fix client side renegotiation by replacing use of s->internal-type
273 with s->server.
274
275 * Avoid a symbol collision with SSL_is_dtls() between libssl and
276 openssl(1) in static builds.
277
278 * Move the TLSv1.2 record number increment into the new record layer.
279
280 * Move finished and peer finished into the handshake struct.
281
282 * Avoid transcript initialization when sending a TLS HelloRequest
283 to fix server side renegotiation.
284
285 * Remove pointless assignment in SSL_get0_alpn_selected().
286
287 * Provide EVP_PKEY_new_CMAC_KEY(3).
288
289 * Add missing prototype for d2i_DSAPrivateKey_fp(3) to x509.h.
290
291 * Show DTLSv1.2 message with openssl(1) s_server and s_client.
292
293 * Avoid leaking param->name in x509_verify_param_zero().
294
295 * Avoid a leak in an error path in openssl x509.
296
297 * Add some error checking to openssl x509.
298
299 * When sending an alert in TLSv1.3, only set its error code when no
300 other error was set previously. Certain clients rely on specific
301 SSL_R_ error codes to determine that they deal with a self signed
302 cert.
303
304 * Provide SSL_use_certificate_chain_file(3).
305
306 * Provide SSL_set_hostflags(3) and SSL_get0_peername(3).
307
308 * Provide various DTLSv1.2 specific functions and defines.
309
310 * Remove workarounds for SSL_is_dtls() in openssl(1).
311
312 * Document meaning of '*' in the genrsa output.
313
314 * Updated documentation for SSL_get_shared_ciphers(3).
315
316 * Add documentation for SSL_get_finished(3).
317
318 * Document EVP_PKEY_new_CMAC_key(3)
319
320 * Document SSL_use_certificate_chain_file(3).
321
322 * Document SSL_set_hostflags(3) and SSL_get0_peername(3).
323
324 * Update SSL_get_version.3 manualf or DTLSv.1.2 support.
325
313.3.1 - Security fix 3263.3.1 - Security fix
32 327
33 * Malformed ASN.1 in a certificate revocation list or a timestamp 328 * Malformed ASN.1 in a certificate revocation list or a timestamp