12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961196219631964196519661967196819691970197119721973197419751976197719781979198019811982198319841985198619871988198919901991199219931994199519961997199819992000200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024202520262027202820292030203120322033203420352036203720382039204020412042204320442045204620472048204920502051205220532054205520562057205820592060206120622063206420652066206720682069207020712072207320742075207620772078207920802081208220832084208520862087208820892090209120922093209420952096209720982099210021012102210321042105210621072108210921102111211221132114211521162117211821192120212121222123212421252126212721282129213021312132213321342135213621372138213921402141214221432144214521462147214821492150215121522153215421552156215721582159216021612162216321642165216621672168216921702171217221732174217521762177217821792180218121822183218421852186218721882189219021912192219321942195219621972198219922002201220222032204220522062207220822092210221122122213221422152216221722182219222022212222222322242225222622272228222922302231223222332234223522362237223822392240224122422243224422452246224722482249225022512252225322542255225622572258225922602261226222632264226522662267226822692270227122722273227422752276227722782279228022812282228322842285228622872288228922902291229222932294229522962297229822992300230123022303230423052306230723082309231023112312231323142315231623172318231923202321232223232324232523262327232823292330233123322333233423352336233723382339234023412342234323442345234623472348234923502351235223532354235523562357235823592360236123622363236423652366236723682369237023712372237323742375237623772378237923802381238223832384238523862387238823892390239123922393239423952396239723982399240024012402240324042405240624072408240924102411241224132414241524162417241824192420242124222423242424252426242724282429243024312432243324342435243624372438243924402441244224432444244524462447244824492450245124522453245424552456245724582459246024612462246324642465246624672468246924702471247224732474247524762477247824792480248124822483248424852486248724882489249024912492249324942495249624972498249925002501250225032504250525062507250825092510251125122513251425152516251725182519252025212522252325242525252625272528252925302531253225332534253525362537253825392540254125422543254425452546254725482549255025512552255325542555255625572558255925602561256225632564256525662567256825692570257125722573257425752576257725782579258025812582258325842585258625872588258925902591259225932594259525962597259825992600260126022603260426052606260726082609261026112612261326142615261626172618261926202621262226232624262526262627262826292630263126322633263426352636263726382639264026412642264326442645264626472648264926502651265226532654265526562657265826592660266126622663266426652666266726682669267026712672267326742675267626772678267926802681268226832684268526862687268826892690269126922693269426952696269726982699270027012702270327042705270627072708270927102711271227132714271527162717271827192720272127222723272427252726272727282729273027312732273327342735273627372738273927402741274227432744274527462747274827492750275127522753275427552756275727582759276027612762276327642765276627672768276927702771277227732774277527762777277827792780278127822783278427852786278727882789279027912792279327942795279627972798279928002801280228032804280528062807280828092810281128122813281428152816281728182819282028212822282328242825282628272828282928302831283228332834283528362837283828392840284128422843284428452846284728482849285028512852285328542855285628572858285928602861286228632864286528662867286828692870287128722873287428752876287728782879288028812882288328842885288628872888288928902891289228932894289528962897289828992900290129022903290429052906290729082909291029112912291329142915291629172918291929202921292229232924292529262927292829292930293129322933293429352936293729382939294029412942294329442945294629472948294929502951295229532954295529562957295829592960296129622963296429652966296729682969297029712972297329742975297629772978297929802981298229832984298529862987298829892990299129922993299429952996299729982999300030013002300330043005300630073008300930103011301230133014301530163017301830193020302130223023302430253026302730283029303030313032303330343035303630373038303930403041304230433044304530463047304830493050305130523053305430553056305730583059306030613062306330643065306630673068306930703071307230733074307530763077307830793080308130823083308430853086308730883089309030913092309330943095309630973098309931003101310231033104310531063107310831093110311131123113311431153116311731183119312031213122312331243125312631273128312931303131313231333134313531363137313831393140314131423143314431453146314731483149315031513152315331543155315631573158315931603161316231633164316531663167316831693170317131723173317431753176317731783179318031813182318331843185318631873188318931903191319231933194319531963197319831993200320132023203320432053206320732083209321032113212321332143215321632173218321932203221322232233224322532263227322832293230323132323233323432353236323732383239324032413242324332443245324632473248324932503251325232533254325532563257325832593260326132623263326432653266326732683269327032713272327332743275327632773278327932803281328232833284328532863287328832893290329132923293329432953296329732983299330033013302330333043305330633073308330933103311331233133314331533163317331833193320332133223323332433253326332733283329333033313332333333343335333633373338333933403341334233433344334533463347334833493350335133523353335433553356335733583359336033613362336333643365336633673368336933703371337233733374337533763377337833793380338133823383338433853386338733883389339033913392339333943395339633973398339934003401 |
- mbed TLS ChangeLog (Sorted per branch, date)
- = mbed TLS 2.16.5 branch released 2020-02-20
- Security
- operation. The overread only happens with cryptographically low
- probability (of the order of 2^-n where n is the bitsize of the curve)
- unless the RNG is broken, and could result in information disclosure or
- denial of service (application crash or extra resource consumption).
- Found by Auke Zeilstra and Peter Schwabe, using static analysis.
- read all the CRT parameters from the DER structure rather than
- reconstructing them. Found by Alejandro Cabrera Aldaya and Billy Bob
- Brumley. Reported and fix contributed by Jack Lloyd.
- ARMmbed/mbed-crypto#352
- Bugfix
- RSA keys that would later be rejected by functions expecting private
- keys. Found by Catena cyber using oss-fuzz (issue 20467).
- RSA keys with invalid values by silently fixing those values.
- = mbed TLS 2.16.4 branch released 2020-01-15
- Security
- constant time/constant trace, so side channel attacks can retrieve the
- blinded value, factor it (as it is smaller than RSA keys and not guaranteed
- to have only large prime factors), and then, by brute force, recover the
- key. Reported by Alejandro Cabrera Aldaya and Billy Brumley.
- mbedtls_internal_aes_decrypt() before exiting the function. The value of
- these variables can be used to recover the last round key. To follow best
- practice and to limit the impact of buffer overread vulnerabilities (like
- Heartbleed) we need to zeroize them before exiting the function.
- Issue reported by Tuba Yavuz, Farhaan Fowze, Ken (Yihang) Bai,
- Grant Hernandez, and Kevin Butler (University of Florida) and
- Dave Tian (Purdue University).
- timings on the comparison in the key generation enabled the attacker to
- learn leading bits of the ephemeral key used during ECDSA signatures and to
- recover the private key. Reported by Jeremy Dubeuf.
- failures could happen with alternative implementations of AES. Bug
- reported and fix proposed by Johan Uppman Bruce and Christoffer Lauri,
- Sectra.
- Bugfix
- holding the returned value is overwritten a line after.
- Found by irwir in #2377.
- mbedtls_ctr_drbg_set_entropy_len() before the DRBG is seeded. Before,
- the initial seeding always reset the entropy length to the compile-time
- default.
- Changes
- from the cipher abstraction layer. Fixes #2198.
- NIST SP 800-90A. In particular CTR_DRBG requires an explicit nonce
- to achieve a 256-bit strength if MBEDTLS_ENTROPY_FORCE_SHA256 is set.
- = mbed TLS 2.16.3 branch released 2019-09-06
- Security
- predictable shared secret if a hardware accelerator failed and the other
- side of the key exchange had a similar bug.
- implement blinding. Because of this for the same key and message the same
- blinding value was generated. This reduced the effectiveness of the
- countermeasure and leaked information about the private key through side
- channels. Reported by Jack Lloyd.
- value, as specified in RFC 5915. Previously, the value was written
- as an ASN.1 INTEGER, which caused the size of the key to leak
- about 1 bit of information on average and could cause the value to be
- 1 byte too large for the output buffer.
- API Changes
- mbedtls_ecdsa_sign_det() but allows passing an external RNG for the
- purpose of blinding.
- Bugfix
- functions. Fixes #1628.
- PlatformToolset from the project configuration. Fixes #1430 reported by
- irwir.
- if some curves are not defined. Fixes #1591 reported by dbedev.
- Bernhard M. Wiedemann in #2357.
- that are only available in Thumb mode. Fix contributed by Aurelien Jarno
- in #2169.
- This could previously lead to segmentation faults in builds using an
- address-sanitizer and enabling but not using MBEDTLS_ECP_RESTARTABLE.
- Jens Wiklander <jens.wiklander@linaro.org> in #2363
- uninitialized variable warnings on some recent toolchains (GCC8, etc).
- Discovered and fixed by Andy Gross (Linaro), #2392.
- mbedtls_platform_zeroize(). Fixes ARMmbed/mbed-crypto#49.
- functionally incorrect code on bigendian systems which don't have
- __BYTE_ORDER__ defined. Reported by Brendan Shanks. Fixes #2622.
- Changes
- suggests). #2671
- = mbed TLS 2.16.2 branch released 2019-06-11
- Security
- belongs to a different group from the first. Before, if an application
- passed keys that belonged to different group, the first key's data was
- interpreted according to the second group, which could lead to either
- an error or a meaningless output from mbedtls_ecdh_get_params. In the
- latter case, this could expose at most 5 bits of the private key.
- Bugfix
- mbedTLS configuration only SHA-2 signed certificates are accepted.
- This certificate is used in the demo server programs, which lead the
- client programs to fail at the peer's certificate verification
- due to an unacceptable hash signature. The certificate has been
- updated to one that is SHA-256 signed. Fix contributed by
- Illya Gerasymchuk.
- were shifted by one byte, creating an invalid ASN.1 tag. Fixed by
- Christian Walther in #2239.
- Junhwan Park, #2106.
- used with negative inputs. Found by Guido Vranken in #2404. Credit to
- OSS-Fuzz.
- either used both encrypt and decrypt key schedules, or which perform padding.
- GCM and CCM were not affected. Fixed by Jack Lloyd.
- Found and fixed by irwir. #2337
- public macro MBEDTLS_X509_ID_FLAG. This could lead to invalid evaluation
- in case operators binding less strongly than subtraction were used
- for the parameter.
- sni entry parameter. Reported by inestlerode in #560.
- the example programs ssl_server2 and ssl_client2 to be run
- if MBEDTLS_FS_IO and MBEDTLS_PEM_PARSE_C are unset. Fixes #2254.
- lead to successful parsing of ill-formed X.509 CRTs. Fixes #2437.
- codes to always wrap these codes into X.509 high level error codes before
- returning. Fixes #2431.
- Changes
- provided SSL context is unset.
- Found by Coverity, reported and fixed by Peter Kolbus (Garmin). Fixes #2309.
- Contributed by Peter Kolbus (Garmin).
- improve clarity. Fixes #2258.
- = mbed TLS 2.16.1 branch released 2019-03-19
- Features
- from the default list (enabled by default). See
- https:
- Bugfix
- when MBEDTLS_ECP_ALT is defined. Reported by jwhui. Fixes #2242.
- Raised as a comment in #1996.
- previously lead to a stack overflow on constrained targets.
- in the header files, which missed the precompilation check. #971
- Previously, this could lead to functionally incorrect assembly being
- produced by some optimizing compilers, showing up as failures in
- e.g. RSA or ECC signature operations. Reported in #1722, fix suggested
- by Aurelien Jarno and submitted by Jeffrey Martin.
- in X.509 module. Fixes #2212.
- Fixes #2190.
- build error. Fixed by Haijun Gu #2319.
- (e.g. config.h.bak). Fixed by Peter Kolbus (Garmin) #2407.
- mbedtls_asn1_write_bitstring().
- extensions in CSRs and CRTs that caused these bitstrings to not be encoded
- correctly as trailing zeroes were not accounted for as unused bits in the
- leading content octet. Fixes #1610.
- Changes
- instead of relying on other header files that they include.
- Inserted as an enhancement for #1371
- in RFC 7468. Found by Michael Ernst. Fixes #767.
- underlying OS actually guarantees.
- been disabled for lack of a sufficiently recent version of GnuTLS on the CI.
- they are enabled.
- = mbed TLS 2.16.0 branch released 2018-12-21
- Features
- of parameters in the API. This allows detection of obvious misuses of the
- API, such as passing NULL pointers. The API of existing functions hasn't
- changed, but requirements on parameters have been made more explicit in
- the documentation. See the corresponding API documentation for each
- function to see for which parameter values it is defined. This feature is
- disabled by default. See its API documentation in config.h for additional
- steps you have to take when enabling it.
- API Changes
- deprecated and replaced as shown below. The new functions change
- the return type from void to int to allow returning error codes when
- using MBEDTLS_<MODULE>_ALT for the underlying AES or message digest
- primitive. Fixes #1798.
- mbedtls_ctr_drbg_update() -> mbedtls_ctr_drbg_update_ret()
- mbedtls_hmac_drbg_update() -> mbedtls_hmac_drbg_update_ret()
- ARIA, CAMELLIA and Blowfish. These error codes will be replaced by
- the more generic per-module error codes MBEDTLS_ERR_xxx_BAD_INPUT_DATA.
- modules - AES, ARIA, Blowfish, CAMELLIA, CCM, GCM, DHM, ECP, ECDSA, ECDH,
- ECJPAKE, SHA, Chacha20 and Poly1305, cipher, pk, RSA, and MPI.
- Where modules have had parameter validation added, existing parameter
- checks may have changed. Some modules, such as Chacha20 had existing
- parameter validation whereas other modules had little. This has now been
- changed so that the same level of validation is present in all modules, and
- that it is now optional with the MBEDTLS_CHECK_PARAMS flag which by default
- is off. That means that checks which were previously present by default
- will no longer be.
- New deprecations
- in favor of functions that can return an error code.
- Bugfix
- assembly for AMD64 targets creating string literals greater than those
- permitted by the ISO C99 standard. Found by Aaron Jones. Fixes #482.
- through qemu user emulation. Reported and fix suggested by randombit
- in #1212. Fixes #1212.
- This could lead to a buffer overflow, but only in case ticket authentication
- was broken. Reported and fix suggested by Guido Vranken in #659.
- programs/pkey/gen_key which previously led to compilation failure
- on some toolchains. Reported by phoenixmcallister. Fixes #2170.
- hang.
- of check for certificate/key matching. Reported by Attila Molnar, #507.
- = mbed TLS 2.14.1 branch released 2018-11-30
- Security
- decryption that could lead to a Bleichenbacher-style padding oracle
- attack. In TLS, this affects servers that accept ciphersuites based on
- RSA decryption (i.e. ciphersuites whose name contains RSA but not
- (EC)DH(E)). Discovered by Eyal Ronen (Weizmann Institute), Robert Gillham
- (University of Adelaide), Daniel Genkin (University of Michigan),
- Adi Shamir (Weizmann Institute), David Wong (NCC Group), and Yuval Yarom
- (University of Adelaide, Data61). The attack is described in more detail
- in the paper available here: http:
- via branching and memory access patterns. An attacker who could submit
- a plaintext for RSA PKCS#1 v1.5 decryption but only observe the timing
- of the decryption and not its result could nonetheless decrypt RSA
- plaintexts and forge RSA signatures. Other asymmetric algorithms may
- have been similarly vulnerable. Reported by Eyal Ronen, Robert Gillham,
- Daniel Genkin, Adi Shamir, David Wong and Yuval Yarom.
- modules.
- API Changes
- mbedtls_hmac_drbg_update_ret() are similar to mbedtls_ctr_drbg_update()
- and mbedtls_hmac_drbg_update() respectively, but the new functions
- report errors whereas the old functions return void. We recommend that
- applications use the new functions.
- = mbed TLS 2.14.0 branch released 2018-11-19
- Security
- particular CA. This previously led to ignoring CRLs when the CRL's issuer
- name and the CA's subject name differed in their string encoding (e.g.,
- one using PrintableString and the other UTF8String) or in the choice of
- upper and lower case. Reported by Henrik Andersson of Bosch GmbH in issue
- #1784.
- incoming message buffer was placed within the first 64KiB of address
- space and a PSK-(EC)DHE ciphersuite was used, this allowed an attacker
- to trigger a memory access up to 64KiB beyond the incoming message buffer,
- potentially leading to an application crash or information disclosure.
- previous settings for the number of rounds made it practical for an
- adversary to construct non-primes that would be erroneously accepted as
- primes with high probability. This does not have an impact on the
- security of TLS, but can matter in other contexts with numbers chosen
- potentially by an adversary that should be prime and can be validated.
- For example, the number of rounds was enough to securely generate RSA key
- pairs or Diffie-Hellman parameters, but was insufficient to validate
- Diffie-Hellman parameters properly.
- See "Prime and Prejudice" by by Martin R. Albrecht and Jake Massimo and
- Kenneth G. Paterson and Juraj Somorovsky.
- Features
- some configurable amount of operations. This is intended to be used in
- constrained, single-threaded systems where ECC is time consuming and can
- block other operations until they complete. This is disabled by default,
- but can be enabled by MBEDTLS_ECP_RESTARTABLE at compile time and
- configured by mbedtls_ecp_set_max_ops() at runtime. It applies to the new
- xxx_restartable functions in ECP, ECDSA, PK and X.509 (CRL not supported
- yet), and to existing functions in ECDH and SSL (currently only
- implemented client-side, for ECDHE-ECDSA ciphersuites in TLS 1.2,
- including client authentication).
- operations. On CPUs where the extensions are available, they can accelerate
- MPI multiplications used in ECC and RSA cryptography. Contributed by
- Aurelien Jarno.
- signature always used a salt with the same length as the hash, and returned
- an error if this was not possible. Now the salt size may be up to two bytes
- shorter. This allows the library to support all hash and signature sizes
- that comply with FIPS 186-4, including SHA-512 with a 1024-bit key.
- than 256 bits limits the security of generated material to 128 bits.
- API Changes
- a feature that is not supported by underlying alternative
- implementations implementing cryptographic primitives. This is useful for
- hardware accelerators that don't implement all options or features.
- New deprecations
- MBEDTLS_ERR_XXX_FEATURE_UNAVAILABLE that indicate a feature is not
- supported are deprecated and are now replaced by the new equivalent
- platform error.
- form MBEDTLS_ERR_XXX_HW_ACCEL_FAILED that are deprecated and are replaced
- by the equivalent plaform error.
- mbedtls_mpi_is_prime_ext() which allows specifying the number of
- Miller-Rabin rounds.
- Bugfix
- application leading to a memory leak in case both
- MBEDTLS_MEMORY_BUFFER_ALLOC_C and MBEDTLS_MEMORY_BACKTRACE are set.
- Fixes #2069.
- invalidated keys of a lifetime of less than a 1s. Fixes #1968.
- MBEDTLS_THREADING_C is defined. Found by TrinityTonic, #1095
- which lead to accepting properly authenticated but improperly
- padded records in case of CBC ciphersuites using Encrypt-then-MAC.
- program programs/x509/cert_write. Fixes #1422.
- MBEDTLS_MODE_ECB. Found by ezdevelop. Fixes #1091.
- after use.
- of sensitive data in the example programs aescrypt2 and crypt_and_hash.
- UTF8String. Previously, the use of the PrintableString format led to
- wildcards and non-ASCII characters being unusable in some DN attributes.
- Reported by raprepo in #1860 and by kevinpt in #468. Fix contributed by
- Thomas-Dee.
- replacements of standard calloc/free functions through the macros
- MBEDTLS_PLATFORM_CALLOC_MACRO and MBEDTLS_PLATFORM_FREE_MACRO.
- Reported by ole-de and ddhome2006. Fixes #882, #1642 and #1706.
- Changes
- test the handling of large packets and small packets on the client side
- in the same way as on the server side.
- IPv6 and optionally by a build option over IPv4.
- calls, rather than Win32 API calls directly. This is necessary to avoid
- conflict with C runtime usage. Found and fixed by irwir.
- X.509 DNs. Previously, DN attributes were always written in their default
- string format (mostly PrintableString), which could lead to CRTs being
- created which used PrintableStrings in the issuer field even though the
- signing CA used UTF8Strings in its subject field; while X.509 compliant,
- such CRTs were rejected in some applications, e.g. some versions of
- Firefox, curl and GnuTLS. Reported in #1033 by Moschn. Fix contributed by
- Thomas-Dee.
- Fixes #517 reported by github-monoculture.
- use it to reduce error probability in RSA key generation to levels mandated
- by FIPS-186-4.
- = mbed TLS 2.13.1 branch released 2018-09-06
- API Changes
- whose implementation should behave as a thread-safe version of gmtime().
- This allows users to configure such an implementation at compile time when
- the target system cannot be deduced automatically, by setting the option
- MBEDTLS_PLATFORM_GMTIME_R_ALT. At this stage Mbed TLS is only able to
- automatically select implementations for Windows and POSIX C libraries.
- Bugfix
- neither gmtime_r() nor gmtime_s() are present. Fixes #1907.
- = mbed TLS 2.13.0 branch released 2018-08-31
- Security
- during certificate extensions parsing. In case of receiving malformed
- input (extensions length field equal to 0), an illegal read of one byte
- beyond the input buffer is made. Found and analyzed by Nathan Crandall.
- Features
- is controlled by the maximum fragment length as set locally or negotiated
- with the peer, as well as by a new per-connection MTU option, set using
- mbedtls_ssl_set_mtu().
- handshake when flights do not get through (RFC 6347, section 4.1.1.1,
- last paragraph).
- enabled by default.
- The maximum amount of RAM used for this can be controlled by the
- compile-time constant MBEDTLS_SSL_DTLS_MAX_BUFFERING defined
- in mbedtls/config.h.
- API Changes
- the use of datagram packing (enabled by default).
- Bugfix
- failure in the function could lead to other buffers being leaked.
- MBEDTLS_ARC4_C and MBEDTLS_CIPHER_NULL_CIPHER weren't also defined. #1890
- Fix contributed by Espressif Systems.
- This improves compliance to RFC 4492, and as a result, solves
- interoperability issues with BouncyCastle. Raised by milenamil in #1157.
- TrinityTonic in #1908.
- and mbedtls_ssl_get_record_expansion() after a session reset. Fixes #1941.
- with TLS versions 1.1 and earlier when the server requested authentication
- without providing a list of CAs. This was due to an overly strict bounds
- check in parsing the CertificateRequest message,
- introduced in Mbed TLS 2.12.0. Fixes #1954.
- mbedtls_ssl_get_record_expansion() in case of ChachaPoly ciphersuites,
- or CBC ciphersuites in (D)TLS versions 1.1 or higher. Fixes #1913, #1914.
- (found by Catena cyber using oss-fuzz)
- and pk_decrypt example programs. Reported by Brace Stout. Fixes #1128.
- Changes
- Contributed by xueruini.
- Drozd. Fixes #1215 raised by randombit.
- CCM test vectors from RAM.
- of misusing the mbedtls_hkdf_extract() and mbedtls_hkdf_expand()
- functions. Fixes #1775. Reported by Brian J. Murray.
- = mbed TLS 2.12.0 branch released 2018-07-25
- Security
- in (D)TLS 1.0 to 1.2, that allowed an active network attacker to
- partially recover the plaintext of messages under some conditions by
- exploiting timing measurements. With DTLS, the attacker could perform
- this recovery by sending many messages in the same connection. With TLS
- or if mbedtls_ssl_conf_dtls_badmac_limit() was used, the attack only
- worked if the same secret (for example a HTTP Cookie) has been repeatedly
- sent over connections manipulated by the attacker. Connections using GCM
- or CCM instead of CBC, using hash sizes other than SHA-384, or using
- Encrypt-then-Mac (RFC 7366) were not affected. The vulnerability was
- caused by a miscalculation (for SHA-384) in a countermeasure to the
- original Lucky 13 attack. Found by Kenny Paterson, Eyal Ronen and Adi
- Shamir.
- 1.2, that allowed a local attacker, able to execute code on the local
- machine as well as manipulate network packets, to partially recover the
- plaintext of messages under some conditions by using a cache attack
- targeting an internal MD/SHA buffer. With TLS or if
- mbedtls_ssl_conf_dtls_badmac_limit() was used, the attack only worked if
- the same secret (for example a HTTP Cookie) has been repeatedly sent over
- connections manipulated by the attacker. Connections using GCM or CCM
- instead of CBC or using Encrypt-then-Mac (RFC 7366) were not affected.
- Found by Kenny Paterson, Eyal Ronen and Adi Shamir.
- on CBC, in (D)TLS 1.0 to 1.2, that allowed a local attacker, able to
- execute code on the local machine as well as manipulate network packets,
- to partially recover the plaintext of messages under some conditions (see
- previous entry) by using a cache attack targeting the SSL input record
- buffer. Connections using GCM or CCM instead of CBC or using
- Encrypt-then-Mac (RFC 7366) were not affected. Found by Kenny Paterson,
- Eyal Ronen and Adi Shamir.
- Features
- authenticator Poly1305 and AEAD construct Chacha20-Poly1305. Contributed
- by Daniel King.
- Contributed by Augustin Cavalier.
- where the outgoing buffer can be fixed at a smaller size than the incoming
- buffer, which can save some RAM. If buffer lengths are kept equal, there
- is no functional difference. Contributed by Angus Gratton, and also
- independently contributed again by Paul Sokolovsky.
- NIST SP 800-38F algorithms KW and KWP and by RFC 3394 and RFC 5649.
- Bugfix
- was creating an invalid ASN.1 tag. Found by Aryeh R. Fixes #1257.
- Found and fixed by Hirotaka Niisato in #1783.
- contributed by tabascoeye.
- return value. Found by @davidwu2000. #839
- Philippe Antoine. Fixes #1623.
- by Brendan Shanks. Part of a fix for #992.
- MBEDTLS_CIPHER_NULL_CIPHER is enabled. Found by TrinityTonic in #1719.
- Philippe Antoine from Catena cyber. #1663.
- i386 with SSE2. Found by László Langó. Fixes #1550
- the `#include` in the header files. Resolves #857
- mbedtls_pk_parse_key(). Found by Martin Boye Petersen and fixed by Dawid
- Drozd. #1098
- CBC based ciphersuite is used together with Encrypt-then-MAC. Previously,
- such a message was wrongly reported as an invalid record and therefore lead
- to the connection being terminated. Seen most often with OpenSSL using
- TLS 1.0. Reported by @kFYatek and by Conor Murphy on the forum. Fix
- contributed by Espressif Systems. Fixes #1632
- when the request_size argument is set to 0 as stated in the documentation.
- Fixes #1833.
- deep copy of the session, and the peer certificate is not lost. Fixes #926.
- Changes
- zero-length messages when using TLS 1.2. Contributed by Espressif Systems.
- when calling with a NULL salt and non-zero salt_len. Contributed by
- Brian J Murray
- Contributed by fbrosson.
- Fixed by Nick Wilson.
- = mbed TLS 2.11.0 branch released 2018-06-18
- Features
- cipher abstraction module.
- (HKDF) per RFC 5869. Contributed by Thomas Fossati.
- Contributed by Aorimn in pull request #414.
- cryptoprocessor. Private key operations can be asynchronous to allow
- non-blocking operation of the TLS server stack.
- Bugfix
- curves as well as RSA. Fixes #777 found by dbedev.
- used by user applications. Found and fixed by Fabio Alessandrelli.
- Reported by rahmanih in #683
- Changes
- versions later than 3.6. Versions of Clang earlier than this may no longer
- work. Fixes #1072
- = mbed TLS 2.10.0 branch released 2018-06-06
- Features
- (RFC 6209). Disabled by default, see MBEDTLS_ARIA_C in config.h
- API Changes
- functionality shared by multiple Mbed TLS modules. At this stage
- platform_util.h (and its associated platform_util.c) only contain
- mbedtls_platform_zeroize(), which is a critical function from a security
- point of view. mbedtls_platform_zeroize() needs to be regularly tested
- against compilers to ensure that calls to it are not removed from the
- output binary as part of redundant code elimination optimizations.
- Therefore, mbedtls_platform_zeroize() is moved to the platform module to
- facilitate testing and maintenance.
- Bugfix
- build to fail. Found by zv-io. Fixes #1651.
- Changes
- TrinityTonic. #1359.
- = mbed TLS 2.9.0 branch released 2018-04-30
- Security
- during certificate validation. Additionally, the issue could also lead to
- unnecessary callback checks being made or to some validation checks to be
- omitted. The overread could be triggered remotely, while the other issues
- would require a non DER-compliant certificate to be correctly signed by a
- trusted CA, or a trusted CA with a non DER-compliant certificate. Found by
- luocm. Fixes #825.
- function which led to an arbitrary overread of the message buffer. The
- overreads could be caused by receiving a malformed message at the point
- where an optional signature algorithms list is expected when the signature
- algorithms section is too short. In builds with debug output, the overread
- data is output with the debug data.
- which could potentially lead to the client accepting a ciphersuite it didn't
- offer or a ciphersuite that cannot be used with the TLS or DTLS version
- chosen by the server. This could lead to corruption of internal data
- structures for some configurations.
- Features
- tables during runtime, thereby reducing the RAM/ROM footprint by ~6KiB.
- Suggested and contributed by jkivilin in pull request #394.
- ECDH primitive functions (mbedtls_ecdh_gen_public(),
- mbedtls_ecdh_compute_shared()) are supported for now. Contributed by
- Nicholas Wilson in pull request #348.
- API Changes
- applications to wait for a network context to become ready before reading
- or writing.
- a check for whether more more data is pending to be processed in the
- internal message buffers.
- This function is necessary to determine when it is safe to idle on the
- underlying transport in case event-driven IO is used.
- Bugfix
- contributed by Brian J Murray and David Brown.
- in configurations that omit certain hashes or public-key algorithms.
- Fixes #1040.
- #1353
- MBEDTLS_VERSION_FEATURES in some test suites. Contributed by
- Deomid Ryabkov. Fixes #1299, #1475.
- Fixed by mnacamura.
- unable to parse keys which had only the optional parameters field of the
- ECPrivateKey structure. Found by Jethro Beekman, fixed in #1379.
- stated in the mbedtls_cipher_update() documentation. Contributed by
- Andy Leiserson.
- a file in pk_sign program. Found by kevlut in #1142.
- where data needs to be fetched from the underlying transport in order
- to make progress. Previously, this error code was also occasionally
- returned when unexpected messages were being discarded, ignoring that
- further messages could potentially already be pending to be processed
- in the internal buffers; these cases led to deadlocks when event-driven
- I/O was used. Found and reported by Hubert Mis in #772.
- function which leads to a potential one byte overread of the message
- buffer.
- decompression.
- maintained 2.7 branch. The soversion was increased in Mbed TLS
- version 2.7.1 to reflect breaking changes in that release, but the
- increment was missed in 2.8.0 and later releases outside of the 2.7 branch.
- Changes
- independently by Matthieu Volat and Arne Schwabe.
- public-key algorithms. Includes contributions by Gert van Dijk.
- configurations where the feature is disabled. Found and fixed by Gergely
- Budai.
- doesn't leak memory if the user doesn't use mbedtls_ssl_conf_psk() and
- instead incorrectly manipulates the configuration structure directly.
- Found and fix submitted by junyeonLEE in #1220.
- MBEDTLS_ASN1_PARSE_C is not enabled. This allows the use of PBKDF2
- without PBES2. Fixed by Marcos Del Sol Vives.
- for Curve25519 (other curves had it already). Contributed by Nicholas
- Wilson #481
- Krylov.
- Paul Sokolovsky in #1356.
- letter must not be prefixed by '-', such as LLVM. Found and fixed by
- Alex Hixon.
- environment variable when using the project makefiles.
- by Alexey Skalozub in #405.
- transmitting more than the required length, return an error. Raised by
- Sam O'Connor in #1245.
- HMAC functions with non-HMAC ciphersuites. Independently contributed
- by Jiayuan Chen in #1377. Fixes #1437.
- FIPS 186-4. Contributed by Jethro Beekman. #1380
- of the corresponding module is activated by defining the corresponding
- MBEDTLS_XXX_ALT macro. This means that alternative implementations do
- not need to copy the declarations, and ensures that they will have the
- same API.
- = mbed TLS 2.8.0 branch released 2018-03-16
- Default behavior changes
- that when both sides of a TLS connection negotiate the truncated
- HMAC extension, Mbed TLS can now interoperate with other
- compliant implementations, but this breaks interoperability with
- prior versions of Mbed TLS. To restore the old behavior, enable
- the (deprecated) option MBEDTLS_SSL_TRUNCATED_HMAC_COMPAT in
- config.h. Found by Andreas Walz (ivESK, Offenburg University of
- Applied Sciences).
- Security
- implementation allowed an offline 2^80 brute force attack on the
- HMAC key of a single, uninterrupted connection (with no
- resumption of the session).
- against Bellcore glitch attack.
- a crash on invalid input.
- crash on invalid input.
- extensions. Found by Falko Strenzke and Evangelos Karatsiolis.
- Features
- algorithms family when encrypting private keys using PKCS#5 v2.0.
- This allows reading encrypted PEM files produced by software that
- uses PBKDF2-SHA2, such as OpenSSL 1.1. Submitted by Antonio Quartulli,
- OpenVPN Inc. Fixes #1339
- New deprecations
- MBEDTLS_ZLIB_SUPPORT).
- Bugfix
- Fixes #1358.
- with flag MBEDTLS_X509_BADCERT_BAD_PK even when the key type was correct.
- In the context of SSL, this resulted in handshake failure. Reported by
- daniel in the Mbed TLS forum. #1351
- is not enabled. Set MBEDTLS_SSL_MIN_MAJOR_VERSION
- and MBEDTLS_SSL_MIN_MINOR_VERSION instead of
- MBEDTLS_SSL_MAJOR_VERSION_3 and MBEDTLS_SSL_MINOR_VERSION_1. #664
- only if __MINGW32__ not defined. Fix suggested by Thomas Glanzmann and
- Nick Wilson on issue #355
- overflow. #1179
- by Guido Vranken. #639
- parsing the subject alternative names.
- that could cause a key exchange to fail on valid data.
- could cause a key exchange to fail on valid data.
- MBEDTLS_DEPRECATED_REMOVED. #1388
- Found through fuzz testing.
- Changes
- Contributed by Mathieu Briand.
- a migration path for those depending on the library's ABI.
- Joris Aerts. #678
- = mbed TLS 2.7.0 branch released 2018-02-03
- Security
- extension. When the truncated HMAC extension is enabled and CBC is used,
- sending a malicious application packet could be used to selectively corrupt
- 6 bytes on the peer's heap, which could potentially lead to crash or remote
- code execution. The issue could be triggered remotely from either side in
- both TLS and DTLS. CVE-2018-0488
- for the key size, which could potentially lead to crash or remote code
- execution. Found by Seth Terashima, Qualcomm Product Security Initiative,
- Qualcomm Technologies Inc. CVE-2018-0487
- zeros.
- 64 KiB to the address of the SSL buffer and causing a wrap around.
- default enabled) maximum fragment length extension is disabled in the
- config and the application data buffer passed to mbedtls_ssl_write
- is larger than the internal message buffer (16384 bytes by default), the
- latter overflows. The exploitability of this issue depends on whether the
- application layer can be forced into sending such large packets. The issue
- was independently reported by Tim Nordell via e-mail and by Florin Petriuc
- and sjorsdewit on GitHub. Fix proposed by Florin Petriuc in #1022.
- Fixes #707.
- constancy of mbedtls_ssl_safer_memcmp().
- Changes were introduced in multiple places in the library.
- being leaked to memory after release.
- leaking 1 bit of the private key. Reported by prashantkspatil.
- data. Previously, trailing zero bytes were detected and omitted for the
- sake of saving memory, but potentially leading to slight timing
- differences. Reported by Marco Macchetti, Kudelski Group.
- after keypair generation.
- (server-side). Could result in application crash, but only if an ALPN
- name larger than 16 bytes had been configured on the server.
- to RFC 3526 containing parameters generated in a nothing-up-my-sleeve
- manner.
- Features
- line arguments.
- when run on a heavily-loaded machine.
- MBEDTLS_CMAC_ALT). Submitted by Steven Cooreman, Silicon Labs.
- configuration flag MBEDTLS_GCM_ALT.
- configuration flags MBEDTLS_ECDSA_SIGN_ALT, MBEDTLS_ECDSA_VERIFY_ALT and
- MBEDTLS_ECDSDA_GENKEY_AT in config.h.
- The following functions from the ECDSA module can be replaced
- with alternative implementation:
- mbedtls_ecdsa_sign(), mbedtls_ecdsa_verify() and mbedtls_ecdsa_genkey().
- new configuration flags MBEDTLS_ECDH_COMPUTE_SHARED_ALT and
- MBEDTLS_ECDH_GEN_PUBLIC_ALT in config.h.
- The following functions from the ECDH module can be replaced
- with an alternative implementation:
- mbedtls_ecdh_gen_public() and mbedtls_ecdh_compute_shared().
- the new configuration flag MBEDTLS_ECJPAKE_ALT.
- API Changes
- independent setup and export of RSA contexts. Most notably,
- mbedtls_rsa_import() and mbedtls_rsa_complete() are introduced for setting
- up RSA contexts from partial key material and having them completed to the
- needs of the implementation automatically. This allows to setup private RSA
- contexts from keys consisting of N,D,E only, even if P,Q are needed for the
- purpose or CRT and/or blinding.
- implementations of the RSA interface declared in rsa.h.
- SHA1, SHA256, SHA512) have been deprecated and replaced as shown below.
- The new functions change the return type from void to int to allow
- returning error codes when using MBEDTLS_<MODULE>_ALT.
- mbedtls_<MODULE>_starts() -> mbedtls_<MODULE>_starts_ret()
- mbedtls_<MODULE>_update() -> mbedtls_<MODULE>_update_ret()
- mbedtls_<MODULE>_finish() -> mbedtls_<MODULE>_finish_ret()
- mbedtls_<MODULE>_process() -> mbedtls_internal_<MODULE>_process()
- New deprecations
- (e.g. signing with a public key).
- Users are advised to use the extended RSA API instead.
- (mbedtls_<MODULE>_starts, mbedtls_<MODULE>_update,
- mbedtls_<MODULE>_finish and mbedtls_<MODULE>_process where <MODULE> is
- any of MD2, MD4, MD5, SHA1, SHA256, SHA512) in favor of functions
- that can return an error code.
- parameters from RFC 3526 or the newly added parameters from RFC 7919.
- Supserseded by binary encoded constants MBEDTLS_DHM_RFC3526_MODP_2048_P_BIN
- etc.
- from hex strings. Superseded by mbedtls_ssl_conf_dh_param_bin()
- accepting DHM parameters in binary form, matching the new constants.
- Bugfix
- as recommended in RFC 6347 Section 4.1.2.7.
- Found by projectgus and Jethro Beekman, #836.
- renegotiated handshakes would only accept signatures using SHA-1
- regardless of the peer's preferences, or fail if SHA-1 was disabled.
- dates on leap years with 100 and 400 intervals are handled correctly. Found
- by Nicholas Wilson. #694
- accepted. Generating these signatures required the private key.
- Found independently by Florian in the mbed TLS forum and by Mishamax.
- #878, #1019.
- toolchain. Found by gkerrien38.
- pem_aes_decrypt(), pem_des_decrypt() and pem_des3_decrypt() respectively.
- If a call to one of the functions of the cryptographic primitive modules
- failed, the error may not be noticed by the function
- mbedtls_pem_read_buffer() causing it to return invalid values. Found by
- Guido Vranken. #756
- Reported by aaronmdjones in #1001
- writing routines that prevented these functions to work with alternative
- RSA implementations. Raised by J.B. in the Mbed TLS forum. Fixes #1011.
- non-v3 CRT's.
- Found by nkolban. Fixes #845.
- MBEDTLS_SSL_RENEGOTIATION is disabled. Found by erja-gp.
- Reported by Yolan Romailler.
- fragile yet non-exploitable code-paths.
- MilenkoMitrovic, #1104
- RSA test suite where the failure of CTR DRBG initialization lead to
- freeing an RSA context and several MPI's without proper initialization
- beforehand.
- Found and fixed by Martijn de Milliano.
- MBEDTLS_PADDING_ONE_AND_ZEROS that sometimes accepted invalid padding.
- Note, this padding mode is not used by the TLS protocol. Found and fixed by
- Micha Kraus.
- mbedtls_sha512_starts() in the mbedtls_entropy_init() function.
- mbedtls_sha512_init() is called before operating on the relevant context
- structure. Do not assume that zeroizing a context is a correct way to
- reset it. Found independently by ccli8 on Github.
- and fixed by muddog.
- Changes
- and the message digest. Further, allow enabling/disabling of authority
- identifier, subject identifier and basic constraints extensions.
- particular, don't require P,Q if neither CRT nor blinding are
- used. Reported and fix proposed independently by satur9nine and sliai
- on GitHub.
- undeclared dependency of the RSA module on the ASN.1 module.
- new ones with return codes. In particular, this modifies the
- mbedtls_md_info_t structure. Propagate errors from these functions
- everywhere except some locations in the ssl_tls.c module.
- modules where the software implementation can be replaced by a hardware
- implementation.
- throughout the library.
- = mbed TLS 2.6.0 branch released 2017-08-10
- Security
- mbedtls_ssl_get_verify_result() would incorrectly return 0 when the peer's
- X.509 certificate chain had more than MBEDTLS_X509_MAX_INTERMEDIATE_CA
- (default: 8) intermediates, even when it was not trusted. This could be
- triggered remotely from either side. (With authmode set to 'required'
- (the default), the handshake was correctly aborted).
- programs/aes/aescrypt2 and programs/aes/crypt_and_hash.
- Found by Laurent Simon.
- Features
- and the context struct mbedtls_platform_context to perform
- platform-specific setup and teardown operations. The macro
- MBEDTLS_PLATFORM_SETUP_TEARDOWN_ALT allows the functions to be overridden
- by the user in a platform_alt.h file. These new functions are required in
- some embedded environments to provide a means of initialising underlying
- cryptographic acceleration hardware.
- API Changes
- API consistent with mbed TLS 2.5.0. Specifically removed the inline
- qualifier from the functions mbedtls_aes_decrypt, mbedtls_aes_encrypt,
- mbedtls_ssl_ciphersuite_uses_ec and mbedtls_ssl_ciphersuite_uses_psk. Found
- by James Cowgill. #978
- chain was not verified due to an internal error (including in the verify
- callback) or chain length limitations.
- verification of the peer's certificate failed due to an overlong chain or
- a fatal error in the verify callback.
- Bugfix
- Reported by roberto. #716
- to #if defined(MBEDTLS_THREADING_C) as the library cannot assume they will
- always be implemented by pthread support. #696
- in the case of an error. Found by redplait. #590
- Reported and fix suggested by guidovranken. #740
- compilation when using ARM Compiler 6.
- encoded X.509 CRLs. The overflow could enable maliciously constructed CRLs
- to bypass the version verification check. Found by Peng Li/Yueh-Hsun Lin,
- KNOX Security, Samsung Research America
- encoded X.509 CSRs. The overflow could enable maliciously constructed CSRs
- to bypass the version verification check. Found by Peng Li/Yueh-Hsun Lin,
- KNOX Security, Samsung Research America
- encoded X.509 certificates. The overflow could enable maliciously
- constructed certificates to bypass the certificate verification check.
- function mbedtls_time() instead. Found by wairua. #666
- arguments. Found by inestlerode. #557.
- Changes
- 64-bit division. This is useful on embedded platforms where 64-bit division
- created a dependency on external libraries. #708
- accelerator code in the library leaves concurrency handling to the
- platform. Reported by Steven Cooreman. #863
- config-no-entropy.h to reduce the RAM footprint.
- before they are pushed.
- = mbed TLS 2.5.1 released 2017-06-21
- Security
- The issue could only happen client-side with renegotiation enabled.
- Could result in DoS (application crash) or information leak
- (if the application layer sent data read from mbedtls_ssl_read()
- back to the server or to a third party). Can be triggered remotely.
- certificate verification. SHA-1 can be turned back on with a compile-time
- option if needed.
- detect it sometimes. Reported by Hugo Leisink. #810
- potential Bleichenbacher/BERserk-style attack.
- Bugfix
- valid C and they prevented the test from compiling in Visual Studio 2015
- and with GCC using the -Wpedantic compilation option.
- resulting in compatibility problems with Chrome. Found by hfloyrd. #823
- when sending the alert failed. The fix makes sure not to hide the error
- that triggered the alert.
- peer after sending a fatal alert to refuse a renegotiation attempt.
- Previous behaviour was to keep processing data even after the alert has
- been sent.
- MBEDTLS_SSL_VERIFY_OPTIONAL. Found by Jethro Beekman. #864
- fatal errors in authentication mode MBEDTLS_SSL_VERIFY_OPTIONAL and to
- reflect bad EC curves within verification result.
- modulus 1 and therefore to hang. Found by blaufish. #641.
- a negative MPI. Previously the result was always negative. Found by Guido
- Vranken.
- that was triggered uppon reading an empty line. Found by Guido Vranken.
- Changes
- sending the fatal alert and just drop the connection.
- misunderstanding and potentially dangerous use of the API. Pointed out
- by Jean-Philippe Aumasson.
- = mbed TLS 2.5.0 branch released 2017-05-17
- Security
- (rsa_rsaes_pkcs1_v15_decrypt(), rsa_rsaes_oaep_decrypt). Found by Laurent
- Simon.
- against side-channel attacks like the cache attack described in
- https:
- Found and fix proposed by Michael Schwarz, Samuel Weiser, Daniel Gruss,
- Clémentine Maurice and Stefan Mangard.
- Features
- This involved exposing parts of the internal interface to enable
- replacing the core functions and adding and alternative, module level
- replacement support for enabling the extension of the interface.
- suppressing the CA list in Certificate Request messages. The default
- behaviour has not changed, namely every configured CAs name is included.
- API Changes
- by the functions shown below. The new functions change the return type from
- void to int to allow returning error codes when using MBEDTLS_AES_ALT,
- MBEDTLS_AES_DECRYPT_ALT or MBEDTLS_AES_ENCRYPT_ALT.
- mbedtls_aes_decrypt() -> mbedtls_internal_aes_decrypt()
- mbedtls_aes_encrypt() -> mbedtls_internal_aes_encrypt()
- Bugfix
- recent versions of the library. Found by Kyle Keen.
- initialising. Found by sznaider. #667 #843
- The PK and RSA modules use different types for passing hash length and
- without these checks the type cast could lead to data loss. Found by Guido
- Vranken.
- = mbed TLS 2.4.2 branch released 2017-03-08
- Security
- using RSA through the PK module in 64-bit systems. The issue was caused by
- some data loss when casting a size_t to an unsigned int value in the
- functions rsa_verify_wrap(), rsa_sign_wrap(), rsa_alt_sign_wrap() and
- mbedtls_pk_sign(). Found by Jean-Philippe Aumasson.
- mbedtls_x509_crl_parse(). A string containing a CRL followed by trailing
- characters after the footer could result in the execution of an infinite
- loop. The issue can be triggered remotely. Found by Greg Zaverucha,
- Microsoft.
- CertificateVerify messages, to prevent SLOTH attacks against TLS 1.2.
- Introduced by interoperability fix for #513.
- when verifying the validity of a key on secp224k1. This could be
- triggered remotely for example with a maliciously constructed certificate
- and potentially could lead to remote code execution on some platforms.
- Reported independently by rongsaws and Aleksandar Nikolic, Cisco Talos
- team. #569 CVE-2017-2784
- Bugfix
- traversing a chain of trusted CA. The issue would cause both flags,
- MBEDTLS_X509_BADCERT_NOT_TRUSTED and MBEDTLS_X509_BADCERT_EXPIRED, to be
- set when the verification conditions are not met regardless of the cause.
- Found by Harm Verhagen and inestlerode. #665 #561
- mbedtls_ssl_set_bio_timeout in compat-1.3.h, by removing it.
- Found by omlib-lin. #673
- x509_csr.c that are reported when building mbed TLS with a config.h that
- does not define MBEDTLS_PEM_PARSE_C. Found by omnium21. #562
- would compare 64 bits of the record counter instead of 48 bits as indicated
- in RFC 6347 Section 4.3.1. This could cause the execution of the
- renegotiation routines at unexpected times when the protocol is DTLS. Found
- by wariua. #687
- the input string in PEM format to extract the different components. Found
- by Eyal Itkin.
- cause buffer bound checks to be bypassed. Found by Eyal Itkin.
- cause buffer bound checks to be bypassed. Found by Eyal Itkin.
- cause buffer bound checks to be bypassed. Found by Eyal Itkin.
- cause buffer bound checks to be bypassed. Found by Eyal Itkin.
- Li/Yueh-Hsun Lin, KNOX Security, Samsung Research America.
- by missing calls to mbedtls_pem_free() in cases when a
- MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT error was encountered. Found and
- fix proposed by Guido Vranken. #722
- Studio 2015 as well as the files themselves, to remove a build warning
- generated in Visual Studio 2015. Reported by Steve Valliere. #742
- Raised and fix suggested by Alan Gillingham in the mbed TLS forum. #771
- number to write in hexadecimal is negative and requires an odd number of
- digits. Found and fixed by Guido Vranken.
- by inestlerode. #555
- = mbed TLS 2.4.1 branch released 2016-12-13
- Changes
- Recommendation for Block Cipher Modes of Operation: The CMAC Mode for
- Authentication – October 2016
- = mbed TLS 2.4.0 branch released 2016-10-17
- Security
- with RFC-5116 and could lead to session key recovery in very long TLS
- sessions. "Nonce-Disrespecting Adversaries Practical Forgery Attacks on GCM in
- TLS" - H. Bock, A. Zauner, S. Devlin, J. Somorovsky, P. Jovanovic.
- https:
- mbedtls_x509write_csr_der() when the signature is copied to the buffer
- without checking whether there is enough space in the destination. The
- issue cannot be triggered remotely. Found by Jethro Beekman.
- Features
- NIST SP 800-38B, RFC-4493 and RFC-4615.
- is functioning correctly.
- scripts, which is also now called by all.sh.
- configure the maximum length of a file path that can be buffered when
- calling mbedtls_x509_crt_parse_path().
- library features that do not require an entropy source.
- to configure the minimum number of bytes for entropy sources using the
- mbedtls_hardware_poll() function.
- Bugfix
- may need time but not the standard C library abstraction, and added
- configuration consistency checks to check_config.h
- when GCM is used. Found by udf2457. #441
- enabled unless others were also present. Found by David Fernandez. #428
- a contribution from Tobias Tangemann. #541
- certificates are provided.
- mbedtls_asn1_get_int(). Found and fixed by Guido Vranken. #599
- and double frees. Found by Niklas Amnebratt.
- builds where the configuration MBEDTLS_PEM_WRITE_C is not defined. Found
- by inestlerode. #559.
- data structure until after error checks are successful. Found by
- subramanyam-c. #622
- mbedtls_gcm_finish(). Found by cmiatpaar. #602
- ssl_parse_hello_verify_request() for DTLS. Found by Guido Vranken.
- Found by subramanyam-c. #626
- where the limited hash choices prevented the client from sending its
- certificate. Found by teumas. #513
- Changes
- missing self-tests to the test suites, to ensure self-tests are only
- executed once.
- through the symbol YOTTA_CFG_MBEDTLS_TARGET_CONFIG_FILE.
- features. Contributed by Aviv Palivoda.
- naming collision in projects which also have files with the common name
- net.c. For consistency, the corresponding header file, net.h, is marked as
- deprecated, and its contents moved to net_sockets.h.
- longer disregard certificates with unrecognised fields.
- = mbed TLS 2.3.0 branch released 2016-06-28
- Security
- required by PKCS1 v2.2
- mbedtls_rsa_rsaes_pkcs1_v15_encrypt and mbedtls_rsa_rsaes_oaep_encrypt
- (not triggerable remotely in (D)TLS).
- mbedtls_rsa_rsaes_oaep_decrypt. It is not triggerable remotely in
- SSL/TLS.
- Features
- function.
- Bugfix
- arguments where the same (in-place doubling). Found and fixed by Janos
- Follath. #309
- in the previous patch release. Found by Robert Scheck. #390 #391
- ECDSA was disabled in config.h . The leak didn't occur by default.
- expired or not yet valid certificate was parsed before a valid certificate
- in the trusted certificate list.
- buffer after DER certificates to be included in the raw representation.
- dereference possible.
- mbedtls_ssl_conf_curves. #373
- Changes
- don't use the optimized assembly for bignum multiplication. This removes
- the need to pass -fomit-frame-pointer to avoid a build error with -O0.
- Skalozub).
- ignored, as required by RFC6101.
- = mbed TLS 2.2.1 released 2016-01-05
- Security
- allocate memory. Only used for certificate generation, not triggerable
- remotely in SSL/TLS. Found by Rafał Przywara. #367
- SLOTH attack on TLS 1.2 server authentication (other attacks from the
- SLOTH paper do not apply to any version of mbed TLS or PolarSSL).
- https:
- Bugfix
- when the first intermediate certificate has pathLenConstraint=0. Found by
- Nicholas Wilson. Introduced in mbed TLS 2.2.0. #280
- JayaraghavendranK. #372
- with some peers over unreliable links. Avoid dropping an entire DTLS
- datagram if a single record in a datagram is unexpected, instead only
- drop the record and look at subsequent records (if any are present) in
- the same datagram. Found by jeannotlapin. #345
- = mbed TLS 2.2.0 released 2015-11-04
- Security
- once and some allocation fails. Cannot be forced remotely. Found by Guido
- Vranken, Intelworks.
- mbedtls_x509_crt_parse_path() is passed a path longer than 2GB. Cannot be
- triggered remotely. Found by Guido Vranken, Intelworks.
- Cannot be triggered remotely unless you create X.509 certificates based
- on untrusted input or write keys of untrusted origin. Found by Guido
- Vranken, Intelworks.
- certificates. Found by Nicholas Wilson, fix and tests provided by
- Janos Follath. #280 and #319
- Features
- Disabled by default as the specification might still change.
- block. (Potential uses include EAP-TLS and Thread.)
- Bugfix
- resulting in some valid X.509 being incorrectly rejected. Found and fix
- provided by Janos Follath. #319
- exchange. Found and fix provided by Chris Hammond. #270
- ECHD-ECDSA if the only key exchange. Multiple reports. #310
- not being properly ignored. Found by mancha and Kasom Koht-arsa, #308
- size/curve against the profile. Before that, there was no way to set a
- minimum key size for end-entity certificates with RSA keys. Found by
- Matthew Page of Scannex Electronics Ltd.
- Found by Kurt Danielson. #292
- certificates to be rejected by some applications, including OS X
- Keychain. Found and fixed by Jonathan Leroy, Inikup.
- Changes
- or -1.
- = mbed TLS 2.1.2 released 2015-10-06
- Security
- overflow of the hostname or session ticket. Found by Guido Vranken,
- Intelworks.
- once in the same handhake and mbedtls_ssl_conf_psk() was used.
- Found and patch provided by Guido Vranken, Intelworks. Cannot be forced
- remotely.
- mbedtls_pk_parse_key(file)() when the password is > 129 bytes.
- Found by Guido Vranken, Intelworks. Not triggerable remotely.
- Found by Guido Vranken, Intelworks. Not exploitable remotely in the context
- of TLS, but might be in other uses. On 32 bit machines, requires reading a
- string of close to or larger than 1GB to exploit; on 64 bit machines, would
- require reading a string of close to or larger than 2^62 bytes.
- on crafted PEM input data. Found and fix provided by Guido Vranken,
- Intelworks. Not triggerable remotely in TLS. Triggerable remotely if you
- accept PEM data from an untrusted source.
- buffer is 512MB or larger on 32-bit platforms. Found by Guido Vranken,
- Intelworks. Not trigerrable remotely in TLS.
- the same mbedtls_ssl_config object and memory allocation fails. Found by
- Guido Vranken, Intelworks. Cannot be forced remotely.
- authentication against a crafted CA cert. Cannot be triggered remotely
- unless you allow third parties to pick trust CAs for client auth.
- Found by Guido Vranken, Intelworks.
- Bugfix
- zhasha (#278).
- Changes
- domain names are compliant with RFC 1035.
- (#291)
- = mbed TLS 2.1.1 released 2015-09-17
- Security
- signatures. (Found by Florian Weimer, Red Hat.)
- https:
- tries to continue the handshake after it failed (a misuse of the API).
- (Found and patch provided by Fabian Foerg, Gotham Digital Science using
- afl-fuzz.)
- Bugfix
- caused some handshakes to fail.
- Changes
- use of mbedtls_x509_crt_profile_next. (found by NWilson)
- connection, if cookie verification is available
- (MBEDTLS_SSL_DTLS_HELLO_VERIFY defined in config.h, and usable cookie
- callbacks set with mbedtls_ssl_conf_dtls_cookies()), this will be
- detected and mbedtls_ssl_read() will return
- MBEDTLS_ERR_SSL_CLIENT_RECONNECT - it is then possible to start a new
- handshake with the same context. (See RFC 6347 section 4.2.8.)
- = mbed TLS 2.1.0 released 2015-09-04
- Features
- Bugfix
- Leisink).
- Sears).
- (found by Benoit Lecocq).
- installed (found by Rawi666).
- (found by robotanarchy) (#232).
- tests (found by robotanarchy) (#232).
- with make.
- be always used (found by dcb314) (#235)
- result trying to unlock an unlocked mutex on invalid input (found by
- Fredrik Axelsson) (#257)
- SSL_MAX_CONTENT_LEN or higher - not triggerrable remotely (found by
- Aleksandrs Saveljevs) (#238)
- MBEDTLS_SHAxxx_ALT (found by Henrik) (#239)
- Changes
- end of the default config.h by defining MBEDTLS_USER_CONFIG_FILE on the
- compiler's command line.
- trusted, no later cert is checked. (suggested by hannes-landeholm)
- (#220).
- Hugo Leisink) (#210).
- length.
- = mbed TLS 2.0.0 released 2015-07-13
- Features
- with custom implementation (eg hardware accelerated), complementing the
- ability to override the whole module.
- preserve forward secrecy, and allows sharing across multiple contexts.
- which algorithms and key sizes (curves for ECDSA) are acceptable.
- mbedtls_ssl_conf_dhm_min_bitlen() and mbedtls_ssl_conf_sig_hashes().
- parameters.
- API Changes
- You now need to link to all of them if you use TLS for example.
- Some names have been further changed to make them more consistent.
- Migration helpers scripts/rename.pl and include/mbedtls/compat-1.3.h are
- provided. Full list of renamings in scripts/data_files/rename-1.3-2.0.txt
- mbedtls_cipher_info_t.key_length -> key_bitlen
- mbedtls_cipher_context_t.key_length -> key_bitlen
- mbedtls_ecp_curve_info.size -> bit_size
- been split into an _init() that returns void and another function that
- should generally be the first function called on this context after init:
- mbedtls_ssl_init() -> mbedtls_ssl_setup()
- mbedtls_ccm_init() -> mbedtls_ccm_setkey()
- mbedtls_gcm_init() -> mbedtls_gcm_setkey()
- mbedtls_hmac_drbg_init() -> mbedtls_hmac_drbg_seed(_buf)()
- mbedtls_ctr_drbg_init() -> mbedtls_ctr_drbg_seed()
- Note that for mbedtls_ssl_setup(), you need to be done setting up the
- ssl_config structure before calling it.
- ssl_set_session() and ssl_set_client_transport_id(), plus
- ssl_legacy_renegotiation()) have been renamed to mbedtls_ssl_conf_xxx()
- (see rename.pl and compat-1.3.h above) and their first argument's type
- changed from ssl_context to ssl_config.
- additional callback for read-with-timeout).
- implementations (SNI, PSK) instead of their *conf counterparts:
- mbedtls_ssl_set_hs_own_cert()
- mbedtls_ssl_set_hs_ca_chain()
- mbedtls_ssl_set_hs_psk()
- using mbedtls_ssl_set_hostname().
- pointer, parameters reordered).
- place of mbedtls_ssl_conf_session_tickets() to enable session tickets.
- mbedtls_ssl_get_verify_result()
- mbedtls_x509_ctr_verify_info()
- mbedtls_x509_crt_verify() (flags, f_vrfy -> needs to be updated)
- mbedtls_ssl_conf_verify() (f_vrfy -> needs to be updated)
- parameter:
- mbedtls_base64_encode()
- mbedtls_base64_decode()
- mbedtls_mpi_write_string()
- mbedtls_dhm_calc_secret()
- changed type to "mbedtls_net_context *".
- return void.
- ecdsa_write_signature_det() was deprecated.
- mbedtls_x509write_crt_set_key_usage() changed from int to unsigned.
- available if POLARSSL_PEM_PARSE_C is defined (it never worked without).
- strings; use the new *_len variables instead of strlen().
- mbedtls_pk_parse_public_key() and mbedtls_dhm_parse_dhm() now expect the
- length parameter to include the terminating null byte for PEM input.
- layer and the memory_buffer_alloc module changed accordingly.
- (Thanks to Mansour Moufid for helping with the replacement.)
- (support for renegotiation now needs explicit enabling in config.h).
- in config.h
- between TCP and UDP, using the macros NET_PROTO_TCP or NET_PROTO_UDP.
- Their 'port' argument type is changed to a string.
- Removals
- mbedtls_ecp_muladd().
- (use generic functions from md.h)
- waiting function.
- been removed (compiler is required to support 32-bit operations).
- New deprecations
- argument (allowing memory savings if HMAC is not used)
- Semi-API changes (technically public, morally private)
- not supposed to be included by users.
- Default behavior changes
- default ciphersuite list returned by ssl_list_ciphersuites()
- compile time.
- enabled in the default configuration, this is only noticeable if using a
- custom config.h
- chain verification.
- mbedtls_cipher_info_from_string()
- mbedtls_ecp_curve_info_from_name()
- mbedtls_md_info_from_string()
- mbedtls_ssl_ciphersuite_from_string()
- mbedtls_version_check_feature()
- Requirement changes
- API changes from the 1.4 preview branch
- new prototype, and mbedtls_ssl_set_read_timeout().
- mbedtls_ssl_conf_transport()
- mbedtls_ssl_conf_max_version()
- mbedtls_ssl_conf_min_version()
- instead, see mbedtls_ssl_set_timer_cb(), with the Timing module providing
- an example implementation, see mbedtls_timing_delay_context and
- mbedtls_timing_set/get_delay().
- after a successful net_accept().
- Changes
- thread-safe if MBEDTLS_THREADING_C is enabled.
- more (at the expense of performance) MBEDTLS_SHA256_SMALLER.
- = mbed TLS 1.3 branch
- Security
- extendedKeyUsage on the leaf certificate was lost (results not accessible
- via ssl_get_verify_results()).
- https:
- Features
- (contributed by Peter Dettman).
- (contributed by Daniel Kahn Gillmor).
- the platform layer.
- layer (helps get rid of unwanted references).
- cross-compilation easier (thanks to Alon Bar-Lev).
- if POLARSSL_MEMORY_BUFFER_ALLOC_C and POLARSSL_MEMORY_DEBUG are defined.
- speed and RAM (heap only for now) usage.
- reduced configurations (PSK-CCM and NSA suite B).
- warnings on use of deprecated functions (with GCC and Clang only).
- errors on use of deprecated functions.
- Bugfix
- entropy_free() to crash (thanks to Rafał Przywara).
- once on the same context.
- by Bruno Pape).
- (detected by Clang's 3.6 UBSan).
- initialized but not set (found by pravic).
- doing it at runtime (using uname) rather that compile time.
- ssl_write() is called before the handshake is finished (introduced in
- 1.3.10) (first reported by Martin Blumenstingl).
- rejected.
- versions of mingw64 (found by kxjhlele).
- platforms.
- POLARSSL_SSL_SSESSION_TICKETS where both enabled in config.h (introduced
- in 1.3.10).
- Gergely Budai).
- curve picked by the server was actually allowed.
- Changes
- Junod).
- more flexible (warning: OFLAGS is not used any more) (see the README)
- (contributed by Alon Bar-Lev).
- performance impact was bad for some users (this was introduced in 1.3.10).
- (suggested by Thorsten Mühlfelder).
- "minimize" others (eg use stddef.h if only size_t is needed).
- brackets for uniformity with the rest of the code.
- = mbed TLS 1.3.10 released 2015-02-09
- Security
- full and polarssl_free() is called (found by Mark Hasemeyer)
- (only possible if POLARSSL_MEMORY_BUFFER_ALLOC_C is enabled, which it is
- not by default).
- crafted X.509 certificate (TLS server is not affected if it doesn't ask for a
- client certificate) (found using Codenomicon Defensics).
- (TLS server is not affected if it doesn't ask for a client certificate)
- (found using Codenomicon Defensics).
- (TLS server is not affected if it doesn't ask for a client certificate)
- (found using Codenomicon Defensics).
- Bleichenbacher-style attack in the RSA and RSA-PSK key exchanges
- (reported by Sebastian Schinzel).
- Features
- length of an X.509 verification chain.
- for pre-1.2 clients when multiple certificates are available.
- a compatible enough libc (eg uClibc).
- while using the default ciphersuite list.
- ciphersuite/certificate.
- Bugfix
- add_len (found by Jean-Philippe Aumasson) (not triggerable remotely).
- if memory_buffer_alloc_init() was called with buf not aligned and len not
- a multiple of POLARSSL_MEMORY_ALIGN_MULTIPLE (not triggerable remotely).
- by Julian Ospald).
- multiple of 8 (found by Gergely Budai).
- Peter Vaskovic).
- to a failed verification (found by Fredrik Axelsson).
- key exchanges enabled needs certificates. This fixes a possible interop
- issue with some servers when a zero-length extension was sent. (Reported
- by Peter Dettman.)
- (found by Hendrik van den Boogaard).
- Changes
- switch back to random with POLARSSL_SSL_AEAD_RANDOM_IV in config.h).
- but none of them is usable due to external factors such as no certificate
- with a suitable (extended)KeyUsage or curve or no PSK set.
- at runtime with ssl_set_truncated_hmac().
- = PolarSSL 1.3.9 released 2014-10-20
- Security
- TLS 1.2 (found by Darren Bane) (introduced in 1.3.8).
- (server is not affected if it doesn't ask for a client certificate)
- (found using Codenomicon Defensics).
- (not affected if ECC support was compiled out) (found using Codenomicon
- Defensics).
- Bugfix
- are defined but not POLARSSL_HAVE_TIME (found by Stephane Di Vito).
- renegotation was pending, and on client when a HelloRequest was received.
- write callback returned WANT_WRITE when requesting renegotiation.
- with non-blocking I/O.
- Vialletelle).
- Changes
- standard defining how to use SHA-2 with SSL 3.0).
- ambiguous on how to encode some packets with SSL 3.0).
- RSA is disabled, larger if POLARSSL_MPI_MAX_SIZE is larger.
- POLARSSL_ERR_SSL_UNEXPECTED_MESSAGE on harmless alerts.
- RSA keys.
- RelativeDistinguishedName are not accepted any more.
- = PolarSSL 1.3.8 released 2014-07-11
- Security
- It was possible to crash the server (and client) using crafted messages
- when a GCM suite was chosen.
- Features
- modules (certificates, CRLs and CSRs).
- from the default list (inactive by default).
- (ssl_set_renegotiation_enforced())
- ciphersuites to use and save some memory if the list is small.
- Changes
- required on some platforms (e.g. OpenBSD)
- against unwanted compiler optimizations
- strongest offered by client.
- usage pattern
- Bugfix
- size (found by TrustInSoft)
- Heinecke)
- use with some ciphersuites and versions (RC4 in all versions, CBC with
- versions < TLS 1.1).
- rejected with CBC-based ciphersuites and TLS >= 1.1
- to 32 bytes with CBC-based ciphersuites and TLS >= 1.1
- been removed in 1.3.6.)
- CA for use as an end entity certificate. (This had been removed in
- 1.3.6.)
- interpret semicolons as comment delimiters (found by Barry K. Nathan).
- caused some handshakes to fail.
- exchange that caused some handshakes to fail with other implementations.
- (Failure rate <= 1/255 with common DHM moduli.)
- tight buffers)
- by Hui Dong)
- = PolarSSL 1.3.7 released on 2014-05-02
- Features
- run-time
- Changes
- checked and filled in the relevant module headers
- Bugfix
- (found by Matthew Page)
- Karger)
- ciphersuites, for full SSL frames of data.
- ServerHello when no extensions are present (found by Matthew Page)
- big-endian platform when size was not an integer number of limbs
- (found by Barry K. Nathan)
- = PolarSSL 1.3.6 released on 2014-04-11
- Features
- certificates (POLARSSL_X509_CHECK_KEY_USAGE)
- (POLARSSL_X509_CHECK_EXTENDED_KEY_USAGE)
- Changes
- but shorter than the supplied length.
- Security
- (Found by Watson Ladd.)
- This affects certificates in the user-supplied chain except the top
- certificate. If the user-supplied chain contains only one certificates,
- it is not affected (ie, its notAfter date is properly checked).
- TrustInSoft)
- Bugfix
- calculation of RR.
- Gergely Budai).
- (found by Gergely Budai)
- Shuo Chen).
- error if the output buffer was just 1 byte too small.
- indication (found by Thijs Alkemade)
- stored in RAM due to missing 'const's (found by Gergely Budai).
- = PolarSSL 1.3.5 released on 2014-03-26
- Features
- (POLARSSL_ENTROPY_FORCE_SHA256)
- interoperability against OpenSSL and PolarSSL
- Changes
- now thread-safe if POLARSSL_THREADING_C defined
- that prevented bignum.c from compiling. (Reported by Rafael Baptista.)
- testing against GnuTLS
- Security
- "triple handshake" attack when authentication mode is 'optional' (the
- attack was already impossible when authentication is required).
- TrustInSoft)
- Bugfix
- statistics
- Alex Wilson.)
- send() would return an EAGAIN error when sending the ticket.
- client certificate.
- containing a client certificate
- out_ctr failed
- of one of them failed
- = PolarSSL 1.3.4 released on 2014-01-27
- Features
- Bugfix
- Sauerbeck)
- Security
- TrustInSoft)
- = PolarSSL 1.3.3 released on 2013-12-31
- Features
- (POLARSSL_SSL_SRV_RESPECT_CLIENT_PREFERENCE)
- Changes
- Bugfix
- TrustInSoft)
- ssl_write_certificate() (found by TrustInSoft)
- Security
- TrustInSoft)
- = PolarSSL 1.3.2 released on 2013-11-04
- Features
- Changes
- Bugfix
- = PolarSSL 1.3.1 released on 2013-10-15
- Features
- Changes
- Bugfix
- = PolarSSL 1.3.0 released on 2013-10-01
- Features
- (ECDHE-based ciphersuites)
- (ECDSA-based ciphersuites)
- (ISO/IEC 7816-4) padding and zero padding in the cipher layer
- ns_cert_type)
- issuer_key_identifier, etc)
- the same host (Not to be confused with SNI!)
- Changes
- individually
- Cipher and MD information
- dynamically set (Better support for hardware acceleration)
- prototypes for the RSA sign and verify functions changed as a result
- and maximum protocol version
- (Ability to keep old as well with POLARSSL_ERROR_STRERROR_BC)
- (POLARSSL_X509_ALLOW_EXTENSIONS_NON_V3)
- Bugfix
- Security
- (found by Cyril Arnaud and Pierre-Alain Fouque)
- = Version 1.2.14 released 2015-05-??
- Security
- crash it remotely (found by Caj Larsson).
- client to crash the server remotely if client authentication is enabled
- (found using Codenomicon Defensics).
- https:
- Bugfix
- versions of mingw64 (found by kxjhlele).
- platforms (found with Coverity Scan).
- = Version 1.2.13 released 2015-02-16
- Note: Although PolarSSL has been renamed to mbed TLS, no changes reflecting
- this will be made in the 1.2 branch at this point.
- Security
- crafted X.509 certificate (TLS server is not affected if it doesn't ask
- for a client certificate) (found using Codenomicon Defensics).
- (TLS server is not affected if it doesn't ask for a client certificate)
- (found using Codenomicon Defensics).
- (TLS server is not affected if it doesn't ask for a client certificate)
- found using Codenomicon Defensics).
- (TLS server is not affected if it doesn't ask for a client certificate).
- Bugfix
- add_len (found by Jean-Philippe Aumasson) (not triggerable remotely).
- in 1.2.12).
- Peter Vaskovic).
- to a failed verification (found by Fredrik Axelsson).
- key exchanges enabled needs certificates. This fixes a possible interop
- issue with some servers when a zero-length extension was sent. (Reported
- by Peter Dettman.)
- (found by Hendrik van den Boogaard).
- Changes
- length of an X.509 verification chain (default = 8).
- = Version 1.2.12 released 2014-10-24
- Security
- (server is not affected if it doesn't ask for a client certificate).
- (Found using Codenomicon Defensics.)
- Bugfix
- Vialletelle).
- with non-blocking I/O.
- renegotation was pending, and on client when a HelloRequest was received.
- Changes
- RelativeDistinguishedName are not accepted any more.
- POLARSSL_ERR_SSL_UNEXPECTED_MESSAGE on harmless alerts.
- = Version 1.2.11 released 2014-07-11
- Features
- Changes
- that prevented bignum.c from compiling. (Reported by Rafael Baptista.)
- against unwanted compiler optimizations
- Security
- "triple handshake" attack when authentication mode is optional (the
- attack was already impossible when authentication is required).
- TrustInSoft)
- It was possible to crash the server (and client) using crafted messages
- when a GCM suite was chosen.
- Bugfix
- TrustInSoft)
- ssl_write_certificate() (found by TrustInSoft)
- Alex Wilson.)
- out_ctr failed
- of one of them failed
- calculation of RR.
- when no extensions are present (found by Matthew Page)
- big-endian platform when size was not an integer number of limbs
- size (found by TrustInSoft)
- interpret semicolons as comment delimiters (found by Barry K. Nathan).
- tight buffers)
- = Version 1.2.10 released 2013-10-07
- Changes
- Bugfix
- = Version 1.2.9 released 2013-10-01
- Changes
- Bugfix
- Security
- (found by Cyril Arnaud and Pierre-Alain Fouque)
- = Version 1.2.8 released 2013-06-19
- Features
- settings without editing header files by using POLARSSL_CONFIG_OPTIONS
- Changes
- and specific DER parser functions for the PKCS#1 and unencrypted
- PKCS#8 private key formats
- symmetric cipher and hash algorithms (e.g. POLARSSL_AES_ALT in
- config.h)
- old PBKDF2 module
- Bugfix
- supports secure renegotiation
- instead of the x509parse_crt() wrapper that can also parse PEM
- certificates
- Security
- PEM-encoded certificates has been fixed (found by Jack Lloyd)
- = Version 1.2.7 released 2013-04-13
- Features
- Changes
- Bugfix
- = Version 1.2.6 released 2013-03-11
- Bugfix
- 128-bits (found by Yawning Angel)
- Changes
- rsa_pkcs1_sign() and rsa_pkcs1_verify() to separate PKCS#1 v1.5 and
- PKCS#1 v2.1 functions
- or rsa_rsaes_oaep_decrypt()
- POLARSSL_SSL_SRV_SUPPORT_SSLV2_CLIENT_HELLO is set
- information (not the entire chain)
- Security
- ssl_decrypt_buf()
- rsa_rsaes_pkcs1_v15_decrypt() and rsa_pkcs1_decrypt() for PKCS#1 v1.5
- operations
- = Version 1.2.5 released 2013-02-02
- Changes
- disabled by default and can be enabled with POLARSSL_SSL_DEBUG_ALL
- interoperability can be switched on/off with the flag
- POLARSSL_SSL_ALL_ALERT_MESSAGES
- Security
- ssl_decrypt_buf() due to badly formatted padding
- = Version 1.2.4 released 2013-01-25
- Changes
- SSL core
- Bugfix
- without DN list
- = Version 1.2.3 released 2012-11-26
- Bugfix
- = Version 1.2.2 released 2012-11-24
- Changes
- data
- Bugfixes
- = Version 1.2.1 released 2012-11-20
- Changes
- bottom-up (Peer cert depth is 0)
- Bugfixes
- Pégourié-Gonnard)
- Pégourié-Gonnard)
- = Version 1.2.0 released 2012-10-31
- Features
- ciphersuites (POLARSSL_ENABLE_WEAK_CIPHERSUITES). They are disabled by
- default!
- Alternative Name extension
- example application (programs/ssl/o_p_test) (requires OpenSSL)
- Changes
- to not match CN if subjectAltName extension is present (Closes ticket #56)
- POLARSSL_MODE_CFB, to also handle different block size CFB modes.
- in SSL/TLS
- Bugfix
- Hui Dong)
- #52)
- RFC 2313
- with carry rollover (found by Ruslan Yushchenko)
- Security
- Vanderbeken)
- = Version 1.1.8 released on 2013-10-01
- Bugfix
- Security
- both TrustInSoft and Paul Brodeur of Leviathan Security Group)
- = Version 1.1.7 released on 2013-06-19
- Changes
- Bugfix
- instead of the x509parse_crt() wrapper that can also parse PEM
- certificates
- Security
- PEM-encoded certificates has been fixed (found by Jack Lloyd)
- = Version 1.1.6 released on 2013-03-11
- Bugfix
- Changes
- disabled by default and can be enabled with POLARSSL_SSL_DEBUG_ALL
- Security
- ssl_decrypt_buf()
- rsa_rsaes_pkcs1_v15_decrypt() and rsa_pkcs1_decrypt() for PKCS#1 v1.5
- operations
- = Version 1.1.5 released on 2013-01-16
- Bugfix
- with carry rollover
- #52)
- Pégourié-Gonnard)
- Pégourié-Gonnard)
- RFC 2313
- Security
- Vanderbeken)
- = Version 1.1.4 released on 2012-05-31
- Bugfix
- = Version 1.1.3 released on 2012-04-29
- Bugfix
- = Version 1.1.2 released on 2012-04-26
- Bugfix
- Hui Dong)
- Security
- Frama-C team at CEA LIST)
- Yushchenko)
- = Version 1.1.1 released on 2012-01-23
- Bugfix
- (Closes ticket #47, found by Hugo Leisink)
- = Version 1.1.0 released on 2011-12-22
- Features
- SSL contexts without needing to set all non-connection-specific
- data and pointers again. Adapted ssl_server to use this functionality.
- supported version to a server to help buggy server implementations.
- (Closes ticket #36)
- introspection functions (Closes ticket #40)
- custom entropy sources and added some generic and platform dependent
- entropy sources
- Changes
- encryption and private key for decryption. (Closes ticket #34)
- So now there is a module that is controlled with POLARSSL_ASN1_PARSE_C.
- parity bits, to prevent mistakes in copying data. (Closes ticket #33)
- (Credits go to Marco Lizza)
- trade-off
- management (Closes ticket #44)
- havege_rand() to havege_random() to prevent mistakes. Lots of changes as
- a consequence in library code and programs
- x509parse_crtfile(). With permissive parsing the parsing does not stop on
- encountering a parse-error. Beware that the meaning of return values has
- changed!
- Bugfix
- ticket #37)
- before version numbers
- standard 1 byte version sometimes used by Microsoft. (Closes ticket #38)
- smaller than the hash length. (Closes ticket #41)
- appended with '....' after first 28 octets
- certificates and CRLs
- = Version 1.0.0 released on 2011-07-27
- Features
- Changes
- codes instead of integers
- Bugfix
- #18)
- = Version 0.99-pre5 released on 2011-05-26
- Features
- (AES CTR, Camellia CTR, XTEA CBC) including the option to
- enable and disable individual modes when needed
- by undefining POLARSSL_FS_IO
- error codes and their description.
- functions.
- Changes
- instead of int for buffer lengths and loop variables for
- better unsigned / signed use. Renamed internal bigint types
- t_int and t_dbl to t_uint and t_udbl in the process
- argument and do not accept variable argument lists anymore.
- is now done with a PLUS instead of an OR as error codes
- used are negative.
- net_recv() now returns 0 on EOF instead of
- POLARSSL_ERR_NET_CONN_RESET. ssl_fetch_input() returns
- POLARSSL_ERR_SSL_CONN_EOF on an EOF from its f_recv() function.
- ssl_read() returns 0 if a POLARSSL_ERR_SSL_CONN_EOF is received
- after the handshake.
- POLARSSL_ERR_NET_WANT_WRITE instead of the ambiguous
- POLARSSL_ERR_NET_TRY_AGAIN
- = Version 0.99-pre4 released on 2011-04-01
- Features
- for the RSAES-OAEP and RSASSA-PSS operations.
- functionality as well.
- with random data (Fixed ticket #10)
- Changes
- displays actual bit size of the value.
- does not zeroize memory in advance anymore. Use rsa_init()
- before parsing a key or keyfile!
- Bugfix
- platform (32-bit / 64-bit) (Fixes ticket #19, found by Mads
- Kiilerich and Mihai Militaru)
- #18, found by Nikolay Epifanov)
- length salt lengths
- = Version 0.99-pre3 released on 2011-02-28
- This release replaces version 0.99-pre2 which had possible copyright issues.
- Features
- are now supported as well (Fixes ticket #5)
- printing of X509 CRLs from file
- Changes
- ticket #13). Also possible to remove PEM support for
- systems only using DER encoding
- Bugfixes
- after 1950
- (found by Mads Kiilerich)
- certificates (found by Mads Kiilerich)
- to negotiate anonymous connection (Fixes ticket #12,
- found by Boris Krasnovskiy)
- Security fixes
- Diffie Hellman key exchange (thanks to Larry Highsmith,
- Subreption LLC)
- = Version 0.99-pre1 released on 2011-01-30
- Features
- Note: Most of these features have been donated by Fox-IT
- certificate fields, including Key Usage
- against the available CRLs
- applications:
- + Added generic message digest and cipher wrapper
- + Improved information about current capabilities,
- status, objects and configuration
- + Added verification callback on certificate chain
- verification to allow external blacklisting
- + Additional example programs to show usage
- libpkcs11-helper library
- Changes
- the existing date check
- of ssl_session have been renamed to ciphersuites and
- ciphersuite respectively. This clarifies the difference
- with the generic cipher layer and is better naming
- altogether
- = Version 0.14.0 released on 2010-08-16
- Features
- SSL_EDH_RSA_CAMELLIA_128_SHA ciphersuites
- Changes
- Now using random fuction provided to function and
- changed the prototype of rsa_pkcs1_encrypt(),
- rsa_init() and rsa_gen_key().
- future confusion
- Bug fixes
- kkert)
- generator
- = Version 0.13.1 released on 2010-03-24
- Bug fixes
- = Version 0.13.0 released on 2010-03-21
- Features
- ssl_client2
- printing of X509 certificates from file or SSL
- connection.
- Changes
- in a function to allow easy future expansion
- identical interface (returning int result values)
- for specific use-cases
- Bug fixes
- certificate in the chain in ssl_write_certificate() and
- ssl_write_certificate_request() (found by fatbob)
- (found by Frank de Brabander)
- Smbat Tonoyan)
- = Version 0.12.1 released on 2009-10-04
- Changes
- tagging system.
- the defines.
- Bug fixes
- by Eduardo)
- = Version 0.12.0 released on 2009-07-28
- Features
- Base64, MPI, SHA-family, MD-family, HMAC-SHA-family,
- Camellia, DES, 3-DES, RSA PKCS#1, XTEA, Diffie-Hellman
- and X509parse.
- Changes
- this is mind when checking for errors.
- to indicate invalid key lengths.
- Bug fixes
- Gabriel)
- Apples (found by Martin van Hensbergen)
- required HMAC ipad and opad variables are not cleared.
- (found by code coverage tests)
- POLARSSL_HAVE_LONGLONG not defined (found by Giles
- Bathgate).
- mpi_read_string() (found by code coverage tests).
- rsa_check_pubkey() and rsa_check_privkey() (found by
- code coverage tests).
- value in mpi_add_abs() (found by code coverage tests).
- value in mpi_sub_abs() (found by code coverage tests).
- value in mpi_mod_mpi() and mpi_mod_int(). Resulting
- change also affects mpi_write_string() (found by code
- coverage tests).
- code coverage tests).
- = Version 0.11.1 released on 2009-05-17
- SHA-512 in rsa_pkcs1_sign()
- = Version 0.11.0 released on 2009-05-03
- input numbers are even and added testcases to check
- (found by Pierre Habouzit).
- one way hash functions with the PKCS#1 v1.5 signing and
- verification.
- POLARSSL_GENPRIME block.
- handling of 'full' certificate chains (found by Mathias
- Olsson).
- load_file()
- systems (Found by Gernot).
- padlock and timing code.
- responsible for crashes and unwanted behaviour.
- SSL/TLS code.
- (found by Felix von Leitner).
- = Version 0.10.0 released on 2009-01-12
- SSL_RSA_CAMELLIA_256_SHA and SSL_EDH_RSA_CAMELLIA_256_SHA
- rsa_pkcs1_decrypt (found by Christophe Devine)
- ================================================================
- XySSL ChangeLog
- = Version 0.9 released on 2008-03-16
- be sent twice in non-blocking mode when send returns EAGAIN
- not be swapped in the SSLv2 ClientHello (found by Greg Robson)
- not swapped on PadLock; also fixed compilation on older versions
- of gcc (bug reported by David Barrett)
- output data is non-aligned by falling back to the software
- implementation, as VIA Nehemiah cannot handle non-aligned buffers
- Robson-Garth; some x509write.c fixes by Pascal Vizeli, thanks to
- Matthew Page who reported several bugs
- an INTEGER instead of a BOOLEAN for BasicConstraints::cA.
- (patch contributed by David Patino)
- string is passed as the CN (bug reported by spoofy)
- selftest and benchmark to not test ciphers that have been disabled
- serial number, setup correct server port in the ssl client example
- peer may cause xyssl to loop indefinitely by sending a certificate
- for which the RSA signature check fails (bug reported by Benoit)
- HMAC-MD5, HMAC-SHA1, HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512
- Daniel Bleichenbacher attack on PKCS#1 v1.5 padding, as well
- as the Klima-Pokorny-Rosa extension of Bleichenbacher's attack
- David Barrett and Dusan Semen
- = Version 0.8 released on 2007-10-20
- than 64 bytes, thanks to Stephane Desneux and gary ng
- message digests, which fixes IE6/IE7 client authentication
- RSA_PUBLIC and RSA_PRIVATE, as suggested by David Barrett
- the sign of zero as positive in mpi_init() (reported
- by Jonathan M. McCune)
- = Version 0.7 released on 2007-07-07
- connections from being established with non-blocking I/O
- dh_client, dh_server, rsa_genkey, rsa_sign, rsa_verify
- how to create a test PKI
- = Version 0.6 released on 2007-04-01
- time, to reduce the memory footprint on embedded systems
- havege_struct for this processor, thanks to David Patiño
- thanks to Peking University and the OSU Open Source Lab
- was not being correctly defined on ARM and MIPS
- = Version 0.5 released on 2007-03-01
- (thanks to Benjamin Newman), HP-UX, FreeBSD and Solaris
- size of 16384 bytes to be rejected
- = Version 0.4 released on 2007-02-01
- generated) and in ssl_parse_client_hello (max. client
- version was not properly set), thanks to Didier Rebeix
- cipherlists larger than 96 bytes were incorrectly rejected
- = Version 0.3 released on 2007-01-01
- thanks to Xosé Antón Otero Ferreira
- the bignum code is no longer dependent on long long
- and 486 processors, thanks to Arnaud Cornet
- = Version 0.2 released on 2006-12-01
- valid RSA keys to be dismissed (thanks to oldwolf)
- the Miller-Rabin primality test
- I'd also like to thank Younès Hafri for the CRUX linux port,
- Khalil Petit who added XySSL into pkgsrc and Arnaud Cornet
- who maintains the Debian package :-)
- = Version 0.1 released on 2006-11-01
|