diff options
| author | Joel Sing <joel@sing.id.au> | 2020-06-01 02:33:36 +1000 |
|---|---|---|
| committer | Joel Sing <joel@sing.id.au> | 2020-06-01 02:33:36 +1000 |
| commit | 2f8aa339c5c0d3057cc969ab90cb8e7a4fc909f7 (patch) | |
| tree | 01dc13a1c3e5bb3e943ca3b153d01198a0ca3a9c | |
| parent | ba5ae4fd8390249ef5a6450c45bf7bc52bf767ed (diff) | |
| download | portable-2f8aa339c5c0d3057cc969ab90cb8e7a4fc909f7.tar.gz portable-2f8aa339c5c0d3057cc969ab90cb8e7a4fc909f7.tar.bz2 portable-2f8aa339c5c0d3057cc969ab90cb8e7a4fc909f7.zip | |
ChangeLog tweaks.
| -rw-r--r-- | ChangeLog | 55 |
1 files changed, 28 insertions, 27 deletions
| @@ -30,26 +30,35 @@ LibreSSL Portable Release Notes: | |||
| 30 | 30 | ||
| 31 | 3.2.0 - Development release | 31 | 3.2.0 - Development release |
| 32 | 32 | ||
| 33 | * Improve length checks in record layer and provide appropriate | 33 | * Enable TLS 1.3 server side in addition to client by default. |
| 34 | alerts for violations of record layer limits. | 34 | With this change TLS 1.3 is handled entirely on the new stack |
| 35 | 35 | and state machine, with fallback to the legacy stack and | |
| 36 | * Enforce in the server that SNI hostnames be correctly formed as | 36 | state machine for older versions. Note that the OpenSSL TLS 1.3 |
| 37 | per RFC 6066 and RFC 5890, responding with illegal parameter for | 37 | API is not yet visible/available. |
| 38 | a nonconformant host name. | ||
| 39 | 38 | ||
| 40 | * Modify openssl(1) to clear SSL_MODE_AUTO_RETRY appropriately in | 39 | * Improve length checks in the TLS 1.3 record layer and provide |
| 41 | various commands. | 40 | appropriate alerts for violations of record layer limits. |
| 42 | 41 | ||
| 43 | * Modify io behavior so that SSL_MODE_AUTO_RETRY is the default | 42 | * Enforce that SNI hostnames received by the TLS server are correctly |
| 44 | similar to new OpenSSL releases. | 43 | formed as per RFC 5890 and RFC 6066, responding with illegal parameter |
| 44 | for a nonconformant host name. | ||
| 45 | 45 | ||
| 46 | * Support SSL_MODE_AUTO_RETRY in TLS 1.3 to allow the automatic | 46 | * Support SSL_MODE_AUTO_RETRY in TLS 1.3 to allow the automatic |
| 47 | retry of handshake messages. | 47 | retry of handshake messages. |
| 48 | 48 | ||
| 49 | * Modify I/O behavior so that SSL_MODE_AUTO_RETRY is the default | ||
| 50 | similar to new OpenSSL releases. | ||
| 51 | |||
| 52 | * Modify openssl(1) to clear SSL_MODE_AUTO_RETRY appropriately in | ||
| 53 | various commands. | ||
| 54 | |||
| 49 | * Add tlsfuzzer based regression tests. | 55 | * Add tlsfuzzer based regression tests. |
| 50 | 56 | ||
| 57 | * Support sending certificate status requests from the TLS 1.3 | ||
| 58 | client to request OCSP staples for leaf certificates. | ||
| 59 | |||
| 51 | * Support sending certificate status replies from the TLS 1.3 server | 60 | * Support sending certificate status replies from the TLS 1.3 server |
| 52 | to send OCSP staples for leaf certificates. | 61 | in order to send OCSP staples for leaf certificates. |
| 53 | 62 | ||
| 54 | * Send correct alerts when handling failed key share extensions | 63 | * Send correct alerts when handling failed key share extensions |
| 55 | on the TLS 1.3 server. | 64 | on the TLS 1.3 server. |
| @@ -59,34 +68,26 @@ LibreSSL Portable Release Notes: | |||
| 59 | 68 | ||
| 60 | * Support TLS 1.3 options in the openssl(1) command. | 69 | * Support TLS 1.3 options in the openssl(1) command. |
| 61 | 70 | ||
| 62 | * Enable TLS 1.3 server side in addition to client by default. | 71 | * Many alert cleanups in TLS 1.3 to provide expected alerts in failure |
| 63 | With this change TLS 1.3 is handled entirely on the new stack | 72 | conditions. |
| 64 | and state machine, with fallback to the legacy stack and | ||
| 65 | state machine for older versions. | ||
| 66 | |||
| 67 | * Many alert cleanups in TLS 1.3 to provide expected alerts | ||
| 68 | in failure conditions. | ||
| 69 | 73 | ||
| 70 | * Modify "openssl x509" to display invalid certificate times as | 74 | * Modify "openssl x509" to display invalid certificate times as |
| 71 | invalid, and correctly deal with the failing return case from | 75 | invalid, and correctly deal with the failing return case from |
| 72 | X509_cmp_time so that a certificate with an invalid NotAfter does | 76 | X509_cmp_time so that a certificate with an invalid NotAfter does |
| 73 | not appear valid. | 77 | not appear valid. |
| 74 | 78 | ||
| 75 | * Support sending dummy change_cipher_spec records for middlebox | 79 | * Support sending dummy change_cipher_spec records for TLS 1.3 middlebox |
| 76 | compatibility. | 80 | compatibility. |
| 77 | 81 | ||
| 78 | * Ensure only PSS may be used with RSA in TLS 1.3. | 82 | * Ensure only PSS signatures are used with RSA in TLS 1.3. |
| 79 | 83 | ||
| 80 | * The client must advertise exactly the "null" compression method | 84 | * Ensure that TLS 1.3 clients advertise exactly the "null" compression |
| 81 | in its legacy_compression_methods, nothing else. | 85 | method in its legacy_compression_methods. |
| 82 | 86 | ||
| 83 | * Incorrect use of sockaddr instead of sockaddr_storage in openssl(1) | 87 | * Correct use of sockaddr instead of sockaddr_storage in openssl(1) |
| 84 | s_client could lead to using 14 bytes of stack garbage instead | 88 | s_client, which could lead to using 14 bytes of stack garbage instead |
| 85 | of an IPv6 address in DTLS mode. | 89 | of an IPv6 address in DTLS mode. |
| 86 | 90 | ||
| 87 | * Support sending certificate status requests from the TLS 1.3 | ||
| 88 | client to retrieve OCSP staples for leaf certificates. | ||
| 89 | |||
| 90 | 3.1.2 - Bug fix | 91 | 3.1.2 - Bug fix |
| 91 | 92 | ||
| 92 | * A TLS client with peer verification disabled may crash when | 93 | * A TLS client with peer verification disabled may crash when |
