ChangeLog tweaks.

This commit is contained in:
Joel Sing 2020-06-01 02:33:36 +10:00
parent ba5ae4fd83
commit 2f8aa339c5

View File

@ -30,26 +30,35 @@ LibreSSL Portable Release Notes:
3.2.0 - Development release 3.2.0 - Development release
* Improve length checks in record layer and provide appropriate * Enable TLS 1.3 server side in addition to client by default.
alerts for violations of record layer limits. With this change TLS 1.3 is handled entirely on the new stack
and state machine, with fallback to the legacy stack and
state machine for older versions. Note that the OpenSSL TLS 1.3
API is not yet visible/available.
* Enforce in the server that SNI hostnames be correctly formed as * Improve length checks in the TLS 1.3 record layer and provide
per RFC 6066 and RFC 5890, responding with illegal parameter for appropriate alerts for violations of record layer limits.
a nonconformant host name.
* Modify openssl(1) to clear SSL_MODE_AUTO_RETRY appropriately in * Enforce that SNI hostnames received by the TLS server are correctly
various commands. formed as per RFC 5890 and RFC 6066, responding with illegal parameter
for a nonconformant host name.
* Modify io behavior so that SSL_MODE_AUTO_RETRY is the default
similar to new OpenSSL releases.
* Support SSL_MODE_AUTO_RETRY in TLS 1.3 to allow the automatic * Support SSL_MODE_AUTO_RETRY in TLS 1.3 to allow the automatic
retry of handshake messages. retry of handshake messages.
* Modify I/O behavior so that SSL_MODE_AUTO_RETRY is the default
similar to new OpenSSL releases.
* Modify openssl(1) to clear SSL_MODE_AUTO_RETRY appropriately in
various commands.
* Add tlsfuzzer based regression tests. * Add tlsfuzzer based regression tests.
* Support sending certificate status requests from the TLS 1.3
client to request OCSP staples for leaf certificates.
* Support sending certificate status replies from the TLS 1.3 server * Support sending certificate status replies from the TLS 1.3 server
to send OCSP staples for leaf certificates. in order to send OCSP staples for leaf certificates.
* Send correct alerts when handling failed key share extensions * Send correct alerts when handling failed key share extensions
on the TLS 1.3 server. on the TLS 1.3 server.
@ -59,34 +68,26 @@ LibreSSL Portable Release Notes:
* Support TLS 1.3 options in the openssl(1) command. * Support TLS 1.3 options in the openssl(1) command.
* Enable TLS 1.3 server side in addition to client by default. * Many alert cleanups in TLS 1.3 to provide expected alerts in failure
With this change TLS 1.3 is handled entirely on the new stack conditions.
and state machine, with fallback to the legacy stack and
state machine for older versions.
* Many alert cleanups in TLS 1.3 to provide expected alerts
in failure conditions.
* Modify "openssl x509" to display invalid certificate times as * Modify "openssl x509" to display invalid certificate times as
invalid, and correctly deal with the failing return case from invalid, and correctly deal with the failing return case from
X509_cmp_time so that a certificate with an invalid NotAfter does X509_cmp_time so that a certificate with an invalid NotAfter does
not appear valid. not appear valid.
* Support sending dummy change_cipher_spec records for middlebox * Support sending dummy change_cipher_spec records for TLS 1.3 middlebox
compatibility. compatibility.
* Ensure only PSS may be used with RSA in TLS 1.3. * Ensure only PSS signatures are used with RSA in TLS 1.3.
* The client must advertise exactly the "null" compression method * Ensure that TLS 1.3 clients advertise exactly the "null" compression
in its legacy_compression_methods, nothing else. method in its legacy_compression_methods.
* Incorrect use of sockaddr instead of sockaddr_storage in openssl(1) * Correct use of sockaddr instead of sockaddr_storage in openssl(1)
s_client could lead to using 14 bytes of stack garbage instead s_client, which could lead to using 14 bytes of stack garbage instead
of an IPv6 address in DTLS mode. of an IPv6 address in DTLS mode.
* Support sending certificate status requests from the TLS 1.3
client to retrieve OCSP staples for leaf certificates.
3.1.2 - Bug fix 3.1.2 - Bug fix
* A TLS client with peer verification disabled may crash when * A TLS client with peer verification disabled may crash when