Initial ChangeLog for 3.3.0
This commit is contained in:
parent
df3d4bb57a
commit
223fbf70f5
98
ChangeLog
98
ChangeLog
@ -28,6 +28,104 @@ history is also available from Git.
|
|||||||
|
|
||||||
LibreSSL Portable Release Notes:
|
LibreSSL Portable Release Notes:
|
||||||
|
|
||||||
|
3.3.0 - Development release
|
||||||
|
|
||||||
|
* Make openssl(1) s_server ignore -4 and -6 for compatibility with
|
||||||
|
OpenSSL.
|
||||||
|
|
||||||
|
* Further cleanup of the DTLS record handling.
|
||||||
|
|
||||||
|
* Continue the replacement of the TLSv1.2 record layer by
|
||||||
|
reimplementing the read side of the TLSv1.2 record handling.
|
||||||
|
|
||||||
|
* Replace DTLSv1_enc_data() with TLSv1_1_enc_data().
|
||||||
|
|
||||||
|
* Merge d1_{clnt,srvr}.c into ssl_{clnt,srver}.c.
|
||||||
|
|
||||||
|
* Fix switching from the TLSv1.3 stack to the legacy stack after
|
||||||
|
the record rewrite by including a TLS record header for the case
|
||||||
|
that there is more than one handshake message in the TLS plaintext
|
||||||
|
record.
|
||||||
|
|
||||||
|
* Set SO_REUSEADDR on the server socket in the openssl(1) ocsp
|
||||||
|
command.
|
||||||
|
|
||||||
|
* Fix resource handling on error in OCSP_request_add0_id().
|
||||||
|
|
||||||
|
* Add const to ssl_ciphers and tls1[23]_sigalgs* to push them into
|
||||||
|
.data.rel.ro and .rodata, respectively.
|
||||||
|
|
||||||
|
* Add a const qualifier to srtp_known_profiles.
|
||||||
|
|
||||||
|
* Simplify TLS method by removing the client and server specific
|
||||||
|
methods internally.
|
||||||
|
|
||||||
|
* Avoid casting away const in ssl_ctx_make_profiles().
|
||||||
|
|
||||||
|
* Make sure there is enough room for stashing the handshake message
|
||||||
|
when switching to the legacy TLS stack.
|
||||||
|
|
||||||
|
* Avoid explicitly conditioning an assert on DTLS1_VERSION to make
|
||||||
|
the assert work for newer DTLS versions.
|
||||||
|
|
||||||
|
* Merge SSL_ENC_METHOD into SSL_METHOD_INTERNAL.
|
||||||
|
|
||||||
|
* Send a host header with OCSP queries to make openssl(1) ocsp
|
||||||
|
work with some widely used OCSP responders.
|
||||||
|
|
||||||
|
* Fix a memory leak in the openssl(1) s_client.
|
||||||
|
|
||||||
|
* Add a flag to mark DTLS methods as DTLS to have an easy way to
|
||||||
|
recognize DTLS methods that avoids inspecting the version number.
|
||||||
|
|
||||||
|
* Implement SSL_is_dtls() and use it internally in place of the
|
||||||
|
SSL_IS_DTLS macro.
|
||||||
|
|
||||||
|
* Unbreak DTLS retransmissions for flights that include a CCS.
|
||||||
|
|
||||||
|
* Add ability to ocspcheck(8) to parse a port in the specified
|
||||||
|
OCSP URL.
|
||||||
|
|
||||||
|
* Refactor and clean up ocspcheck(8) and add regression tests.
|
||||||
|
|
||||||
|
* If x509_verify() fails, ensure that the error is set on both
|
||||||
|
the x509_verify_ctx() and its store context to make some failures
|
||||||
|
visible from SSL_get_verify_result().
|
||||||
|
|
||||||
|
* Use the X509_STORE_CTX get_issuer() callback from the new X.509
|
||||||
|
verifier to fix hashed certificate directories.
|
||||||
|
|
||||||
|
* Only check BIO_should_read() on read and BIO_should_write() on
|
||||||
|
write. Previously, BIO_should_write() was also checked after read
|
||||||
|
and BIO_should_read() after write which could cause stalls in
|
||||||
|
software that uses the same BIO for read and write.
|
||||||
|
|
||||||
|
* In openssl(1) verify, also check for error on the store context
|
||||||
|
since the return value of X509_verify_cert() is unreliable in
|
||||||
|
presence of a callback that returns 1 too often.
|
||||||
|
|
||||||
|
* Implement auto chain for the TLSv1.3 server since some software
|
||||||
|
relies on this.
|
||||||
|
|
||||||
|
* Handle additional certificate error cases in the new X.509 verifier.
|
||||||
|
Keep track of the errors encountered if a verify callback tells the
|
||||||
|
verifier to continue and report them back via the error on the store
|
||||||
|
context. This mimicks the behavior of the old verifier that would
|
||||||
|
persist the first error encountered while building the chain.
|
||||||
|
|
||||||
|
* Report specific failures for "self signed certificates" in a way
|
||||||
|
compatible with the old verifier since software relies on the
|
||||||
|
error code.
|
||||||
|
|
||||||
|
* Implement key exporter for TLSv1.3.
|
||||||
|
|
||||||
|
* Plug a large memory leak in the new verifier caused by calling
|
||||||
|
X509_policy_check() repeatedly instead.
|
||||||
|
|
||||||
|
* Avoid leaking memory in x509_verify_chain_dup().
|
||||||
|
|
||||||
|
* Various documentation improvements, particularly around TLS methods.
|
||||||
|
|
||||||
3.2.2 - Stable release
|
3.2.2 - Stable release
|
||||||
|
|
||||||
* This is the first stable release with the new TLSv1.3
|
* This is the first stable release with the new TLSv1.3
|
||||||
|
Loading…
x
Reference in New Issue
Block a user