source: mod_gnutls/CHANGELOG @ 4b1687d

proxy-ticket
Last change on this file since 4b1687d was 4b1687d, checked in by Fiona Klute <fiona.klute@…>, 9 months ago

Changelog: Note libmsv/libcurl memory issue as known

  • Property mode set to 100644
File size: 13.6 KB
Line 
1** Version 0.10.0 (UNRELEASED)
2
3- Support for stapling multiple OCSP responses (TLS 1.3
4  only). mod_gnutls will staple for as many consecutive certificates
5  in the certificate chain as possible.
6
7- Support for TLS 1.3 post-handshake authentication, used if TLS
8  client authentication is required only for some resources on the
9  server. Rehandshake (for older TLS versions) is not supported.
10
11- The test infrastructure has been mostly rewritten in Python, note
12  the new dependencies (Python 3, Pyyaml).
13
14- Server certificates are checked for the must-staple TLS feature
15  extension, stapling must be enabled if it is present.
16
17- Compatibility fix for GnuTLS 3.6.11 in the test suite: Handle
18  certificate type in TLS session information strings.
19
20- Tests can optionally run with Valgrind for the primary HTTPD
21  instance by running ./configure with --enable-valgrind-test, see
22  test/README.md for details.
23
24- Known issue: When using MSVA client certificate validation the
25  Valgrind tests indicate memory leaks from libcurl, which is used by
26  libmsv to send requests to the MSVA. For details see the bug report:
27  https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=950359
28
29** Version 0.9.1 (2019-11-29)
30- Fix possible segfault (NULL pointer dereference) on failed TLS
31  handshake. Calling ssl_var_lookup() after a failed handshake could
32  lead to GnuTLS session information functions being called on a NULL
33  session pointer, leading to segfault.
34- Remove URLs from expected error responses in the test suite. Apache
35  HTTPD removed request URLs from canned error messages to prevent
36  misleading text/links being displayed via crafted links
37  (CVE-2019-10092). Adjust the expected error responses in our tests
38  so they can pass again.
39- Test suite: Ignore "Content-Length" header of responses. Thanks to
40  Krista Karppinen!
41- Add a section about module dependencies on socache to the handbook
42- Restructure the manpage build and move it to section 5 (config
43  files)
44- Test suite: Restructure certificate directories
45
46** Version 0.9.0 (2019-01-23)
47- Security fix: Refuse to send or receive any data over a failed TLS
48  connection (commit 72b669eae8c45dda1850e8e5b30a97c918357b51). The
49  previous behavior could lead to requests on reverse proxy TLS
50  connections being sent in plain text, and might have allowed faking
51  requests in plain text.
52- Security fix: Reject HTTP requests if they try to access virtual
53  hosts that do not match their TLS connections (commit
54  de3fad3c12f53cdbf082ad675e4b10f521a02811). Additionally check if SNI
55  and Host header match. Thanks to Krista Karppinen for contributing
56  tests!
57- OCSP stapling is now enabled by default, if possible. OCSP responses
58  are updated regularly and stored in a cache separate from the
59  session cache. The OCSP cache uses mod_socache_shmcb by default
60  (if the module is loaded, no other configuration required).
61- Session tickets are now enabled by default if using GnuTLS 3.6.4 or
62  newer. GnuTLS 3.6.4 introduced automatic rotation for the used key,
63  and TLS 1.3 takes care of other reasons not to use tickets while
64  requiring them for session resumption. Note that there is currently
65  no mechanism to synchronize ticket keys across a cluster of servers.
66- The internal cache implementation has been replaced with
67  mod_socache. Users may need to update their GnuTLSCache settings and
68  load the appropriate socache modules.
69- ALPN (required for HTTP/2) now works correctly with different
70  "Protocols" directives between virtual hosts if building with GnuTLS
71  3.6.3 or newer. Older versions require identical "Protocols"
72  directives for overlapping virtual hosts. Thanks to Vincent Tamet
73  for the bug report!
74- ALPN is now supported for proxy connections, making HTTP/2 proxy
75  connections using mod_proxy_http2 possible.
76- GnuTLSPriorities is optional now and defaults to "NORMAL" if
77  missing. The same applies to GnuTLSProxyPriorities (if TLS proxy is
78  enabled).
79- The manual is now built as a manual page, too, if pandoc is
80  available.
81- OpenPGP support has been removed.
82- Don't require pem2openpgp for tests when building without MSVA
83  support.
84
85** Version 0.8.4 (2018-04-13)
86- Support Apache HTTPD 2.4.33 API for proxy TLS connections
87- Support TLS for HTTP/2 connections with mod_http2
88- Fix configuration of OCSP stapling callback
89
90** Version 0.8.3 (2017-10-20)
91- Use GnuTLS' default DH parameters by default
92- Handle long Server Name Indication data and gracefully ignore
93  unknown SNI types
94- Send SNI for proxy connections
95- Deprecate OpenPGP support like GnuTLS did (will be removed
96  completely in a future release)
97- Do not announce session ticket support for proxy connections
98- Minor documentation updates (SSL_CLIENT_I_DN, reference for SNI)
99- Test suite: Simplify handling of proxy backend servers and OCSP
100  responders
101- Test suite: stability/compatibility fixes
102
103** Version 0.8.2 (2017-01-08)
104- Test suite: Ensure CRLF line ends in HTTP headers
105- Test suite, gen_ocsp_index.c: Handle serial as fixed order byte array
106
107** Version 0.8.1 (2016-12-20)
108- Bugfix: Use APR_SIZE_T_FMT for portable apr_size_t formatting
109
110** Version 0.8.0 (2016-12-11)
111- New: Support for OCSP stapling
112- Bugfix: Access to DBM cache is locked using global mutex
113  "gnutls-cache"
114- Bugfix: GnuTLSSessionTickets is now disabled by default as described
115  in the handbook
116- Fixed memory leak while checking proxy backend certificate
117- Fixed memory leaks in post_config
118- Safely delete session ticket key (requires GnuTLS >= 3.4)
119- Improved error handling in post_config hook
120- Various handbook updates
121- Internal API documentation can be generated using Doxygen
122- Unused code has been removed (conditionals for GnuTLS 2.x and Apache
123  versions before 2.2, internal Lua bytecode structure last used in
124  2011).
125- Test suite: Fixed locking for access to the PGP keyring of the test
126  certificate authority
127- mod_gnutls can be built using Clang (unsupported)
128
129** Version 0.7.5 (2016-05-28)
130- Sunil Mohan Adapa reported retry loops during session shutdown in
131  cleanup_gnutls_session() due to gnutls_bye() incorrectly returning
132  GNUTLS_E_INTERRUPTED or GNUTLS_E_AGAIN. Setting the GnuTLS session
133  errno in mgs_transport_write() fixes the problem.
134- Import Daniel Kahn Gillmor's patches for GnuPG v2 support from the
135  Debian package.
136- Build system improvements that allow VPATH builds and get "make
137  distcheck" to work
138
139** Version 0.7.4 (2016-04-13)
140- Support SoftHSM 2 for PKCS #11 testing
141- Increase verbosity of test logs
142
143** Version 0.7.3 (2016-01-12)
144- Update test suite for compatibility with GnuTLS 3.4, which has
145  stricter key usage checks and priorities than 3.3.
146- Write non-HTML output to mod_status reports if AP_STATUS_SHORT is
147  set (mod_status sets it for requests with the "auto" parameter, e.g.
148  https://localhost/server-status?auto).
149- Register "ssl_is_https" function so the special mod_rewrite variable
150  %{HTTPS} works correctly with mod_gnutls. The new test case for this
151  requires Wget or curl. Fixes Debian bug #514005.
152- Test suite servers listen on IPv4 *and* IPv6 loopback addresses by
153  default (other addresses configurable), which should fix failures
154  due to localhost randomly resolving to either on some distributions.
155- Isolate tests using network namespaces, if possible. This avoids
156  port conflicts with other test cases (so they can run in parallel)
157  and host services.
158- Support for local Apache drop-in config files in the test suite
159  (e.g. to load additional modules needed on Fedora).
160- Try to use markdown to build HTML documentation if pandoc is not
161  available.
162- Disable use of flock if it is unavailable or does not support
163  timeouts (the latter caused the build to fail on Debian Hurd).
164- New test: Disable TLS 1.0 (regression test for Debian bug #754960).
165
166** Version 0.7.2 (2015-11-21)
167- Bugfix: Non-blocking reads in the input filter could lead to a busy
168  wait in the gnutls_io_input_read function, causing high load on
169  Keep-Alive connections waiting for data, until either more data
170  could be received or the connection was closed. The fix is to pass
171  EAGAIN/EINTR results up to the input filter so they can be handled
172  properly.
173- Close TLS session if the input filter receives EOF (mostly relevant
174  for proper termination of proxy connections).
175- Remove dependency on APR Memcache, which is replaced by the newer
176  version included in the APR Utility Library (libaprutil).
177- Remove dependency on bc. It was used for floating point arithmetic
178  in the test suite, the calculations have been changed to use
179  integers and pure bash code.
180
181** Version 0.7.1 (2015-10-18)
182- Improved handling of PKCS #11 modules: mod_gnutls now loads either
183  modules specified using GnuTLSP11Module, or the system defaults, but
184  not both. Thanks to Nikos Mavrogiannopoulos for the report and
185  initial patch!
186- Initialize variables to safe defaults during client certificate
187  verification. Certain error code paths did not set them, but they
188  should never be hit due to config validation. This adds another line
189  of defense.
190- Enable C99 support via autoconf
191- Test suite improvements. Most importantly, automake now handles
192  environment setup without any external make calls. Rules to build
193  the certificates are included from the old test makefile. Note that
194  the dependency on GNU make is not new (the test makefile always used
195  GNU make syntax), it just wasn't listed explicitly.
196
197** Version 0.7 (2015-07-12)
198- Security fix for TLS client authentication (CVE-2015-2091)
199- Bug fixes that enable support for reverse proxy operation
200- Various test suite improvements. Tests are configured through autoconf,
201  so the test suite now works for builds without Monkeysphere support.
202- Add support for TLS connections to back end servers when operating as a
203  reverse proxy (X.509 authentication only at the moment).
204- PKCS #11 support for server keys and certificates
205- Use strict compiler arguments by default (-Wall -Werror -Wextra)
206- Allow limiting the size of certificates exported as SSL_SERVER_CERT
207  and SSL_CLIENT_CERT through the GnuTLSExportCertificates directive
208
209** Version 0.6 (2014-02-17)
210- Generating DH Params instead of using static ones.
211- Now considering ServerAlias Directives.
212- Major Legacy Code Cleanup.
213- html and pdf and manual documentation generated from markdown sources
214- support monkeysphere validation agent (MSVA) client-certificate verification
215- wider test suite
216- GnuTLSExportCertificates off by default
217
218** Version 0.5.10 (2011-07-12)
219- Patched a bug responsible for excessive memory consumption by mod_gnutls.
220- Support for proxying from SSL to plain HTTP was added (ie. proxy termination).
221
222** Version 0.5.9 (2010-09-24)
223- GnuTLSCache none is now an allowed option.
224- Corrected behavior in Keep-Alive connections (do not
225  terminate the connection prematurely)
226- The GnuTLSCache variable now can be given the specific
227  option "gdbm" instead of "dbm". "dbm" will use the berkeley
228  db type of libapr while gdbm will force gdbm to be used.
229  sdbm is no longer being used due to serious limitations.
230
231** Version 0.5.8 (2010-08-18)
232- Session tickets are enabled by default.
233- Fixes some segmentation faults noticed in some
234  configurations.
235
236** Version 0.5.7 (2010-07-01)
237- Force usage of SDBM. For some reason the default in
238  my system had issues after reaching a limit of entries.
239  SDBM seems stable so force it.
240- Optimizations in session caching.
241- Added support for session tickets. This allows a
242  server to avoid using a session cache and still support
243  session resumption. This is at the cost of transporting
244  session data during handshake. New option
245  GnuTLSSessionTickets [on|off]
246- Depend on gnutls 2.10.0 to force support for safe
247  renegotiation.
248
249** Version 0.5.6 (2010-03-24)
250- Corrected issue with firefox and long POST data (by
251  handling EINTR and EAGAIN errors in read).
252- Added support for chained client certificates
253- Corrected more issues related to double frees
254http://issues.outoforder.cc/view.php?id=102
255
256** Version 0.5.5 (2009-06-13)
257- Removed limits on CA certificate loading. Reported by
258  Sander Marechal and Jack Bates.
259- Do not allow sending empty TLS packets even when instructed to.
260  This had the side effect of clients closing connection.
261
262** Version 0.5.4 (2009-01-04)
263- mod_gnutls.h: modified definition to extern to avoid compilation
264  errors in darwin.
265- Added patch to fix issue with mod_proxy. Investigation and patch by Alain
266  Knaff.
267- libgnutls detection uses pkg-config.
268
269** Version 0.5.3 (2008-10-16)
270- Corrected bug to allow having an OpenPGP-only web site.
271- Increased Max handshake tries due to interrupted system calls.
272
273** Version 0.5.2 (2008-06-29)
274- Depend on gnutls 2.4 which has openpgp support in main library.
275
276** Version 0.5.1 (2008-03-05)
277- Added --disable-srp configure option
278- Better check for memcache (patch by Guillaume Rousse)
279- Corrected possible memory leak in DBM support for resuming sessions.
280
281** Version 0.5.0-alpha (2008-01-24)
282- Added support for OpenPGP keys. The new directives are:
283  GnuTLSPGPKeyringFile, GnuTLSPGPCertificateFile, GnuTLSPGPKeyFile
284
285** Version 0.4.2 (2007-12-10)
286- Added support for sending a certificate chain.
287- Corrected bug which did not allow the TLS session cache to be used.
288- Do not allow resuming sessions on different servers.
289
290** Version 0.4.1 (2007-12-03)
291- Added support for subject alternative names in certificates.
292Only one per certificate is supported.
293- New enviroment variables: SSL_CLIENT_M_VERSION, SSL_CLIENT_S_SAN%,
294SSL_CLIENT_S_TYPE, SSL_SERVER_M_VERSION, SSL_SERVER_S_SAN%, SSL_SERVER_S_TYPE
295- The compatibility mode can now be enabled explicitely with the
296%COMPAT keyword at the GnuTLSPriorities string. It is no longer the default.
297- Check for GnuTLSPriorities directive. This corrects a segfault. Thanks
298to David Hrbáč.
299- Better handling of GnuTLSDHFile and GnuTLSRSAFile.
300- No longer default paths for RSA and DH parameter files.
Note: See TracBrowser for help on using the repository browser.