1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152215321542155215621572158215921602161216221632164216521662167216821692170217121722173217421752176217721782179218021812182218321842185218621872188218921902191219221932194219521962197219821992200220122022203220422052206220722082209221022112212221322142215221622172218221922202221222222232224222522262227222822292230223122322233223422352236223722382239224022412242224322442245224622472248224922502251225222532254225522562257225822592260226122622263226422652266226722682269227022712272227322742275227622772278227922802281228222832284228522862287228822892290229122922293229422952296229722982299230023012302230323042305230623072308230923102311231223132314231523162317231823192320232123222323232423252326232723282329233023312332233323342335233623372338233923402341234223432344234523462347234823492350235123522353235423552356235723582359236023612362236323642365236623672368236923702371237223732374237523762377237823792380238123822383238423852386238723882389239023912392239323942395239623972398239924002401240224032404240524062407240824092410241124122413241424152416241724182419242024212422242324242425242624272428242924302431243224332434243524362437243824392440244124422443244424452446244724482449245024512452245324542455245624572458245924602461246224632464246524662467246824692470247124722473247424752476247724782479248024812482248324842485248624872488248924902491249224932494249524962497249824992500250125022503250425052506250725082509251025112512251325142515251625172518251925202521252225232524252525262527252825292530253125322533253425352536253725382539254025412542254325442545254625472548254925502551255225532554255525562557255825592560256125622563256425652566256725682569257025712572257325742575257625772578257925802581258225832584258525862587258825892590259125922593259425952596259725982599260026012602260326042605260626072608260926102611261226132614261526162617261826192620262126222623262426252626262726282629263026312632263326342635263626372638263926402641264226432644264526462647264826492650265126522653265426552656265726582659266026612662266326642665266626672668266926702671267226732674267526762677267826792680268126822683268426852686268726882689269026912692269326942695269626972698269927002701270227032704270527062707270827092710271127122713271427152716271727182719272027212722272327242725272627272728272927302731273227332734273527362737273827392740274127422743274427452746274727482749275027512752275327542755275627572758275927602761276227632764276527662767276827692770277127722773277427752776277727782779278027812782278327842785278627872788278927902791279227932794279527962797279827992800280128022803280428052806280728082809281028112812281328142815281628172818281928202821282228232824282528262827282828292830283128322833283428352836283728382839284028412842284328442845284628472848284928502851285228532854285528562857285828592860286128622863286428652866286728682869287028712872287328742875287628772878287928802881288228832884288528862887288828892890289128922893289428952896289728982899290029012902290329042905290629072908290929102911291229132914291529162917291829192920292129222923292429252926292729282929293029312932293329342935293629372938293929402941294229432944294529462947294829492950295129522953295429552956295729582959296029612962296329642965296629672968296929702971297229732974297529762977297829792980298129822983298429852986298729882989299029912992299329942995299629972998299930003001300230033004300530063007300830093010301130123013301430153016301730183019302030213022302330243025302630273028302930303031303230333034303530363037303830393040304130423043304430453046304730483049305030513052305330543055305630573058305930603061306230633064306530663067306830693070307130723073307430753076307730783079308030813082308330843085308630873088308930903091309230933094309530963097309830993100310131023103310431053106310731083109311031113112311331143115311631173118311931203121312231233124312531263127312831293130313131323133313431353136313731383139314031413142314331443145314631473148314931503151315231533154315531563157315831593160316131623163316431653166316731683169317031713172317331743175317631773178317931803181318231833184318531863187318831893190319131923193319431953196319731983199320032013202320332043205320632073208320932103211321232133214321532163217321832193220322132223223322432253226322732283229323032313232323332343235323632373238323932403241324232433244324532463247324832493250325132523253325432553256325732583259326032613262326332643265326632673268326932703271327232733274327532763277327832793280328132823283328432853286328732883289329032913292329332943295329632973298329933003301330233033304330533063307330833093310331133123313331433153316331733183319332033213322332333243325332633273328332933303331333233333334333533363337333833393340334133423343334433453346334733483349335033513352335333543355335633573358335933603361336233633364336533663367336833693370337133723373337433753376337733783379338033813382338333843385338633873388338933903391339233933394339533963397339833993400340134023403340434053406340734083409341034113412341334143415341634173418341934203421342234233424342534263427342834293430343134323433343434353436343734383439344034413442344334443445344634473448344934503451345234533454345534563457345834593460346134623463346434653466346734683469347034713472347334743475347634773478347934803481348234833484348534863487348834893490349134923493349434953496349734983499350035013502350335043505350635073508350935103511351235133514351535163517351835193520352135223523352435253526352735283529353035313532353335343535353635373538353935403541354235433544354535463547354835493550355135523553355435553556355735583559356035613562356335643565356635673568356935703571357235733574357535763577357835793580358135823583358435853586358735883589359035913592359335943595359635973598359936003601360236033604360536063607360836093610361136123613361436153616361736183619362036213622362336243625362636273628362936303631363236333634363536363637363836393640364136423643364436453646364736483649365036513652365336543655365636573658365936603661366236633664366536663667366836693670367136723673367436753676367736783679368036813682368336843685368636873688368936903691369236933694369536963697369836993700370137023703370437053706370737083709371037113712371337143715371637173718371937203721372237233724372537263727372837293730373137323733373437353736373737383739374037413742374337443745374637473748374937503751375237533754375537563757375837593760376137623763376437653766376737683769377037713772377337743775377637773778377937803781378237833784378537863787378837893790379137923793379437953796379737983799380038013802380338043805380638073808380938103811381238133814381538163817381838193820382138223823382438253826382738283829383038313832383338343835383638373838383938403841384238433844384538463847384838493850385138523853385438553856385738583859386038613862386338643865386638673868386938703871387238733874387538763877387838793880388138823883388438853886388738883889389038913892389338943895389638973898389939003901390239033904390539063907390839093910391139123913391439153916391739183919392039213922392339243925392639273928392939303931393239333934393539363937393839393940394139423943394439453946394739483949395039513952395339543955395639573958395939603961396239633964396539663967396839693970397139723973397439753976397739783979398039813982398339843985398639873988398939903991399239933994399539963997399839994000400140024003400440054006400740084009401040114012401340144015401640174018401940204021402240234024402540264027402840294030403140324033403440354036403740384039404040414042404340444045404640474048404940504051405240534054405540564057405840594060406140624063406440654066406740684069407040714072407340744075407640774078407940804081 |
- mbed TLS ChangeLog (Sorted per branch, date)
- = mbed TLS 2.25.0 branch released 2020-12-11
- API changes
- conform to version 1.0.0 of the specification.
- The underlying stream cipher is determined by the key type
- (PSA_KEY_TYPE_CHACHA20 or PSA_KEY_TYPE_ARC4).
- mbedtls_cipher_auth_decrypt() no longer accept NIST_KW contexts,
- as they have no way to check if the output buffer is large enough.
- Please use mbedtls_cipher_auth_encrypt_ext() and
- mbedtls_cipher_auth_decrypt_ext() instead. Credit to OSS-Fuzz and
- Cryptofuzz. Fixes #3665.
- Requirement changes
- warning on CMake 3.19.0. #3801
- New deprecations
- Use PSA_ALG_STREAM_CIPHER instead.
- mbedtls_cipher_auth_decrypt() are deprecated in favour of the new
- functions mbedtls_cipher_auth_encrypt_ext() and
- mbedtls_cipher_auth_decrypt_ext(). Please note that with AEAD ciphers,
- these new functions always append the tag to the ciphertext, and include
- the tag in the ciphertext length.
- Features
- ciphers, asymmetric signing/verification and key generation, validate_key
- entry point, and export_public_key interface.)
- in combined key agreement and derivation operations, as long as the key
- agreement algorithm in use matches the algorithm the key was declared with.
- This is currently non-standard behaviour, but expected to make it into a
- future revision of the PSA Crypto standard.
- mbedcrypto, mbedx509 and apidoc CMake target names. This can be used by
- external CMake projects that include this one to avoid CMake target name
- clashes. The default value of this variable is "", so default target names
- are unchanged.
- Pascal, improved by Ron Eldor.
- operations now accept the key identifier. The type psa_key_handle_t is now
- identical to psa_key_id_t instead of being platform-defined. This bridges
- the last major gap to compliance with the PSA Cryptography specification
- version 1.0.0. Opening persistent keys is still supported for backward
- compatibility, but will be deprecated and later removed in future
- releases.
- PSA_CIPHER_IV_MAX_SIZE macros have been added as defined in version
- 1.0.0 of the PSA Crypto API specification.
- Security
- mbedtls_cipher_auth_decrypt() would write past the minimum documented
- size of the output buffer when used with NIST_KW. As a result, code using
- those functions as documented with NIST_KW could have a buffer overwrite
- of up to 15 bytes, with consequences ranging up to arbitrary code
- execution depending on the location of the output buffer.
- MBEDTLS_MPI_MAX_SIZE to prevent a potential denial of service when
- generating Diffie-Hellman key pairs. Credit to OSS-Fuzz.
- which is how most uses of randomization in asymmetric cryptography
- (including key generation, intermediate value randomization and blinding)
- are implemented. This could cause failures or the silent use of non-random
- values. A random generator can fail if it needs reseeding and cannot not
- obtain entropy, or due to an internal failure (which, for Mbed TLS's own
- CTR_DRBG or HMAC_DRBG, can only happen due to a misconfiguration).
- algorithm parameters (only the size) when comparing the signature in the
- description part of the cert to the real signature. This meant that a
- NULL algorithm parameters entry would look identical to an array of REAL
- (size zero) to the library and thus the certificate would be considered
- valid. However, if the parameters do not match in *any* way then the
- certificate should be considered invalid, and indeed OpenSSL marks these
- certs as invalid when mbedtls did not.
- Many thanks to guidovranken who found this issue via differential fuzzing
- and reported it in #3629.
- in mbedtls_pkcs5_pbkdf2_hmac(), mbedtls_internal_sha*_process(),
- mbedtls_internal_md*_process() and mbedtls_internal_ripemd160_process()
- functions to erase sensitive data from memory. Reported by
- Johan Malmgren and Johan Uppman Bruce from Sectra.
- Bugfix
- when the input has trailing garbage. Fixes #2512.
- enabled but ECDSA is disabled. Contributed by jdurkop. Fixes #3294.
- instead of generating it at build time. Fixes #3524.
- invertible (mod N), instead of returning MBEDTLS_ERR_RSA_RNG_FAILED. This
- addresses a regression but is rare in practice (approx. 1 in 2/sqrt(N)).
- Found by Synopsys Coverity, fix contributed by Peter Kolbus (Garmin).
- Fixes #3647.
- Fix #3432.
- sizes (instead of PSA_ERROR_BAD_STATE in some cases) to make the
- psa_cipher_* functions compliant with the PSA Crypto API specification.
- "x25519" and "x448". These curves support ECDH but not ECDSA. If you need
- only the curves that support ECDSA, filter the list with
- mbedtls_ecdsa_can_do().
- an ECC key pair on Curve25519 or secp244k1.
- agreement and subsequent key derivation operation to be used as a key
- inside of the PSA Crypto core.
- chars. Fixes a build failure on platforms where char is unsigned. Fixes
- #3794.
- CCM, which allowed encryption with a non-standard length field.
- Fixes #3719.
- MBEDTLS_MODE_ECB to 0, since ECB mode ciphers don't use IVs.
- defined. Fix contributed in #3571.
- in a secure element.
- fails. Previously the key identifier was just ignored when creating a
- volatile key.
- range now fails.
- (an error condition) and the second operand was aliased to the result.
- could go undetected, resulting in an incorrect result.
- Fixes #2927.
- bytes. This guarantees that the corresponding parsing function can read
- the buffer back, which was the case for mbedtls_x509write_{crt,csr}_pem
- until this property was inadvertently broken in Mbed TLS 2.19.0.
- Fixes #3682.
- option on. In this configuration key management methods that are required
- for MBEDTLS_CIPHER_MODE_XTS were excluded from the build and made it fail.
- Fixes #3818. Reported by John Stroebel.
- Changes
- Reported in #3591 and fix contributed in #3592 by Daniel Otte.
- attribute. No automatic upgrade path is provided. Previously stored keys
- must be erased, or manually upgraded based on the key storage format
- specification (docs/architecture/mbed-crypto-storage-specification.md).
- Fixes #3740.
- but spurious and misleading since it looked like a mistaken attempt to
- zeroize the pointed-to buffer. Reported by Antonio de la Piedra, CEA
- Leti, France.
- = mbed TLS 2.24.0 branch released 2020-09-01
- API changes
- group families to psa_ecc_family_t and psa_dh_family_t, in line with the
- PSA Crypto API specification version 1.0.0.
- Rename associated macros as well:
- PSA_ECC_CURVE_xxx renamed to PSA_ECC_FAMILY_xxx
- PSA_DH_GROUP_xxx renamed to PSA_DH_FAMILY_xxx
- PSA_KEY_TYPE_GET_CURVE renamed to to PSA_KEY_TYPE_ECC_GET_FAMILY
- PSA_KEY_TYPE_GET_GROUP renamed to PSA_KEY_TYPE_DH_GET_FAMILY
- Default behavior changes
- through PSA Crypto with a volatile lifetime. Reported in #3288 and
- contributed by Steven Cooreman in #3382.
- Features
- a byte buffer. It is the inverse of the existing mbedtls_ecp_read_key().
- -Wformat-signedness, and fix the code that causes signed-one-bit-field
- and sign-compare warnings. Contributed by makise-homura (Igor Molchanov)
- <akemi_homura@kurisa.ch>.
- Security
- matching the expected common name (the cn argument of
- mbedtls_x509_crt_verify()) with the actual certificate name: when the
- subjecAltName extension is present, the expected name was compared to any
- name in that extension regardless of its type. This means that an
- attacker could for example impersonate a 4-bytes or 16-byte domain by
- getting a certificate for the corresponding IPv4 or IPv6 (this would
- require the attacker to control that IP address, though). Similar attacks
- using other subjectAltName name types might be possible. Found and
- reported by kFYatek in #3498.
- its revocationDate was in the past according to the local clock if
- available. In particular, on builds without MBEDTLS_HAVE_TIME_DATE,
- certificates were never considered as revoked. On builds with
- MBEDTLS_HAVE_TIME_DATE, an attacker able to control the local clock (for
- example, an untrusted OS attacking a secure enclave) could prevent
- revocation of certificates via CRLs. Fixed by no longer checking the
- revocationDate field, in accordance with RFC 5280. Reported by
- yuemonangong in #3340. Reported independently and fixed by
- Raoul Strackx and Jethro Beekman in #3433.
- Encrypt-then-Mac extension, use constant code flow memory access patterns
- to extract and check the MAC. This is an improvement to the existing
- countermeasure against Lucky 13 attacks. The previous countermeasure was
- effective against network-based attackers, but less so against local
- attackers. The new countermeasure defends against local attackers, even
- if they have access to fine-grained measurements. In particular, this
- fixes a local Lucky 13 cache attack found and reported by Tuba Yavuz,
- Farhaan Fowze, Ken (Yihan) Bai, Grant Hernandez, and Kevin Butler
- (University of Florida) and Dave Tian (Purdue University).
- Diffie-Hellman. An adversary with precise enough timing and memory access
- information (typically an untrusted operating system attacking a secure
- enclave) could bypass an existing counter-measure (base blinding) and
- potentially fully recover the private key.
- Credit to OSS-Fuzz for detecting the problem and to Philippe Antoine
- for pinpointing the problematic code.
- application data from memory. Reported in #689 by
- Johan Uppman Bruce of Sectra.
- Bugfix
- permission.
- redefinition if the function is inlined.
- Reported in #3451 and fix contributed in #3452 by okhowang.
- APIs. psa_import_key and psa_export_key will now correctly expect/output
- Montgomery keys in little-endian as defined by RFC7748. Contributed by
- Steven Cooreman in #3425.
- curves. Raised by signpainter in #941 and by Taiki-San in #1412. This
- also fixes missing declarations reported by Steven Cooreman in #1147.
- curve is secp192k1. Fixes #2017.
- instead of erroring out. Contributed by Steven Cooreman in #3492.
- lower bits. Fix contributed in #3540.
- conditions. Reported and fix suggested by Guido Vranken in #3486.
- defined as a macro. First reported in #2311 and fix contributed in #3528.
- Changes
- in #3478 and fix contributed in #3479 by okhowang.
- previously could lead to stack overflow on constrained devices.
- Contributed by Doru Gucea and Simon Leet in #3464.
- in a platform header. Contributed by Abdelatif Guettouche in #3557.
- the copyright of contributors other than Arm is now acknowledged, and the
- years of publishing are no longer tracked in the source files. This also
- eliminates the need for the lines declaring the files to be part of
- MbedTLS. Fixes #3457.
- example applications which allows to provide a password for the key file
- specified through the existing key_file argument. This allows the use of
- these applications with password-protected key files. Analogously but for
- ssl_server2 only, add the command line parameter key_pwd2 which allows to
- set a password for the key file provided through the existing key_file2
- argument.
- = mbed TLS 2.23.0 branch released 2020-07-01
- Default behavior changes
- key lifetimes to encode a persistence level and the location. Although C
- prototypes do not effectively change, code calling
- psa_register_se_driver() must be modified to pass the driver's location
- instead of the keys' lifetime. If the library is upgraded on an existing
- device, keys created with the old lifetime value will not be readable or
- removable through Mbed TLS after the upgrade.
- Features
- high- and low-level error codes, complementing mbedtls_strerror()
- which constructs a string for any error code, including compound
- ones, but requires a writable buffer. Contributed by Gaurav Aggarwal
- in #3176.
- dump of an SSL context saved with mbedtls_ssl_context_save().
- parsing unsupported certificate extensions via user provided callback.
- Contributed by Nicola Di Lieto <nicola.dilieto@gmail.com> in #3243 as
- a solution to #3241.
- mbedtls_x509_crt_parse_der_with_ext_cb() if it contains unsupported
- policies (#3419).
- some BSD systems. Contributed by Nia Alarie in #3423.
- Security
- reveal an RSA private key used in a secure enclave. Noticed by Sangho Lee,
- Ming-Wei Shih, Prasun Gera, Taesoo Kim and Hyesoon Kim (Georgia Institute
- of Technology); and Marcus Peinado (Microsoft Research). Reported by Raoul
- Strackx (Fortanix) in #3394.
- mbedtls_pk_parse_key() / mbedtls_pk_parse_keyfile() (when loading a
- private key that didn't include the uncompressed public key), as well as
- mbedtls_ecp_mul() / mbedtls_ecp_mul_restartable() when called with a NULL
- f_rng argument. An attacker with access to precise enough timing and
- memory access information (typically an untrusted operating system
- attacking a secure enclave) could fully recover the ECC private key.
- Found and reported by Alejandro Cabrera Aldaya and Billy Brumley.
- hardware accelerators were used (using one of the MBEDTLS_SHAxxx_ALT
- macros). This would cause the original Lucky 13 attack to be possible in
- those configurations, allowing an active network attacker to recover
- plaintext after repeated timing measurements under some conditions.
- Reported and fix suggested by Luc Perneel in #3246.
- Bugfix
- Completes a previous fix in Mbed TLS 2.19 that only fixed the build for
- the example programs. Reported in #1430 and fix contributed by irwir.
- pathLenConstraint basic constraint value is equal to INT_MAX.
- The actual effect with almost every compiler is the intended
- behavior, so this is unlikely to be exploitable anywhere. #3192
- due to shadowed variable. Contributed by Sander Visser in #3310.
- NULL pointer argument. Contributed by Sander Visser in #3312.
- mbedtls_gcc_group_to_psa(). This allows the pk.c module to link separately
- from psa_crypto.c. Fixes #3300.
- #2855.
- when PRNG function fails. Contributed by Jonas Lejeune in #3318.
- submitted in #3333 by irwir.
- output buffer overflow if the configuration declared a buffer that was
- too small.
- fix submitted in #3421 by Nia Alarie.
- NetBSD. Contributed by Nia Alarie in #3422.
- Contributed by Sander Visser in #3311.
- using the MBEDTLS_SSL_VARIABLE_BUFFER_LENGTH feature. This caused issues
- when receiving a connection with CID, when these fields were shifted
- in ssl_parse_record_header().
- Changes
- clean of -Wformat-signedness warnings. Contributed by Kenneth Soerensen
- in #3153.
- suboptimal modular reduction in one place. Found and fix contributed by
- Aurelien Jarno in #3209.
- by irwir in #3208.
- by irwir in #3150.
- using a return command. This has been done to enable customization of the
- behavior in bare metal environments.
- Contributed by Koh M. Nakagawa in #3326.
- fit into the record buffer. Previously, such extensions were silently
- dropped. As a consequence, the TLS handshake now fails when the output
- buffer is not large enough to hold the ClientHello.
- files in tests/src. When building with make or cmake, the files in
- tests/src are compiled and the resulting object linked into each test
- executable.
- `MBEDTLS_CTR_DRBG_C` or `MBEDTLS_HMAC_DRBG_C` for some side-channel
- coutermeasures. If side channels are not a concern, this dependency can
- be avoided by enabling the new option `MBEDTLS_ECP_NO_INTERNAL_RNG`.
- Martinho. #3147
- in #3182 and fix submitted by irwir. #3217
- = mbed TLS 2.22.0 branch released 2020-04-14
- New deprecations
- SSL module for hardware acceleration of individual records.
- mbedtls_ssl_get_output_max_frag_len() and
- mbedtls_ssl_get_input_max_frag_len() to be more precise about which max
- fragment length is desired.
- Security
- (RFC 6347 section 4.2.8): an attacker able to send forged UDP packets to
- the server could cause it to drop established associations with
- legitimate clients, resulting in a Denial of Service. This could only
- happen when MBEDTLS_SSL_DTLS_CLIENT_PORT_REUSE was enabled in config.h
- (which it is by default).
- precise enough timing and memory access information (typically an
- untrusted operating system attacking a secure enclave) to fully recover
- an ECDSA private key. Found and reported by Alejandro Cabrera Aldaya,
- Billy Brumley and Cesar Pereida Garcia. CVE-2020-10932
- DTLS client when parsing the Hello Verify Request message.
- Features
- resizes the I/O buffers before and after handshakes, reducing the memory
- consumption during application data transfer.
- Bugfix
- MBEDTLS_SSL_HW_RECORD_ACCEL are enabled.
- a warning with some compilers. Fix contributed by irwir in #2856.
- #3013.
- Changes
- is back directly in the present repository.
- mbedtls_ssl_get_output_max_frag_len() and
- mbedtls_ssl_get_input_max_frag_len() to ensure that a sufficient input
- buffer is allocated by the server (if MBEDTLS_SSL_VARIABLE_BUFFER_LENGTH
- is defined), regardless of what MFL was configured for it.
- = mbed TLS 2.21.0 branch released 2020-02-20
- New deprecations
- SSLv2 ClientHello messages.
- library which allows TLS authentication to use keys stored in a
- PKCS#11 token such as a smartcard.
- Security
- operation. The overread only happens with cryptographically low
- probability (of the order of 2^-n where n is the bitsize of the curve)
- unless the RNG is broken, and could result in information disclosure or
- denial of service (application crash or extra resource consumption).
- Found by Auke Zeilstra and Peter Schwabe, using static analysis.
- read all the CRT parameters from the DER structure rather than
- reconstructing them. Found by Alejandro Cabrera Aldaya and Billy Bob
- Brumley. Reported and fix contributed by Jack Lloyd.
- ARMmbed/mbed-crypto#352
- Features
- support without SHA-384.
- API changes
- values are aligned with the upcoming release of the PSA Crypto API
- specification version 1.0.0. The main change which may break some
- existing code is that elliptic curve key types no longer encode the
- exact curve: a psa_ecc_curve_t or psa_key_type_t value only encodes
- a curve family and the key size determines the exact curve (for example,
- PSA_ECC_CURVE_SECP_R1 with 256 bits is P256R1). ARMmbed/mbed-crypto#330
- Bugfix
- Jack Lloyd in #2859. Fix submitted by jiblime in #2963.
- contributed by apple-ihack-geek in #2663.
- a cryptographic accelerator fails. ARMmbed/mbed-crypto#345
- RSA keys that would later be rejected by functions expecting private
- keys. Found by Catena cyber using oss-fuzz (issue 20467).
- accept some RSA keys with invalid values by silently fixing those values.
- = mbed TLS 2.20.0 branch released 2020-01-15
- Default behavior changes
- entropy function to obtain entropy for a nonce if the entropy size is less
- than 3/2 times the key size. In case you want to disable the extra call to
- grab entropy, you can call mbedtls_ctr_drbg_set_nonce_len() to force the
- nonce length to 0.
- Security
- MBEDTLS_ENTROPY_BLOCK_SIZE bytes or more from strong sources. In the
- default configuration, on a platform with a single entropy source, the
- entropy module formerly only grabbed 32 bytes, which is good enough for
- security if the source is genuinely strong, but less than the expected 64
- bytes (size of the entropy accumulator).
- mbedtls_internal_aes_decrypt() before exiting the function. The value of
- these variables can be used to recover the last round key. To follow best
- practice and to limit the impact of buffer overread vulnerabilities (like
- Heartbleed) we need to zeroize them before exiting the function.
- Issue reported by Tuba Yavuz, Farhaan Fowze, Ken (Yihang) Bai,
- Grant Hernandez, and Kevin Butler (University of Florida) and
- Dave Tian (Purdue University).
- constant time/constant trace, so side channel attacks can retrieve the
- blinded value, factor it (as it is smaller than RSA keys and not guaranteed
- to have only large prime factors), and then, by brute force, recover the
- key. Reported by Alejandro Cabrera Aldaya and Billy Brumley.
- timings on the comparison in the key generation enabled the attacker to
- learn leading bits of the ephemeral key used during ECDSA signatures and to
- recover the private key. Reported by Jeremy Dubeuf.
- failures could happen with alternative implementations of AES. Bug
- reported and fix proposed by Johan Uppman Bruce and Christoffer Lauri,
- Sectra.
- Features
- or from a buffer regardless of the step type.
- initial seeding. The default nonce length is chosen based on the key size
- to achieve the security strength defined by NIST SP 800-90A. You can
- change it with mbedtls_ctr_drbg_set_nonce_len().
- msopiha-linaro in ARMmbed/mbed-crypto#307.
- API changes
- key derivation function, use a buffer instead (this is now always
- possible).
- psa_asymmetric_verify() to psa_verify_hash().
- Bugfix
- submitted by irwir. Fixes #2717.
- Reported and fix submitted by irwir. Fixes #2800.
- Fixes #2801.
- unsupported algorithm. Fixes ARMmbed/mbed-crypto#254.
- to OSS-Fuzz for finding a bug in an intermediate version of the fix.
- most 2 bytes.
- mbedtls_hmac_drbg_set_entropy_len() now work if you call them before
- mbedtls_ctr_drbg_seed() or mbedtls_hmac_drbg_seed().
- Changes
- structures, which was exposed only in an internal header.
- before).
- rather than success, so that coding mistakes or memory corruption tends to
- cause functions to return this error code rather than a success. There are
- no known instances where this changes the behavior of the library: this is
- merely a robustness improvement. ARMmbed/mbed-crypto#323
- Alexander Krizhanovsky in ARMmbed/mbed-crypto#210.
- Lloyd and Fortanix Inc in ARMmbed/mbed-crypto#277.
- Alexander Krizhanovsky in ARMmbed/mbed-crypto#308.
- = mbed TLS 2.19.1 branch released 2019-09-16
- Features
- Contributed by Zachary J. Fields in PR #2949.
- TLS sessions with tools like Wireshark.
- API Changes
- mbedtls_ssl_export_keys_ext_t, so that the key exporter is discouraged
- from modifying the client/server hello.
- Bugfix
- contributed by apple-ihack-geek in #2663.
- = mbed TLS 2.19.0 branch released 2019-09-06
- Security
- predictable shared secret if a hardware accelerator failed and the other
- side of the key exchange had a similar bug.
- value, as specified in RFC 5915. Previously, the value was written
- as an ASN.1 INTEGER, which caused the size of the key to leak
- about 1 bit of information on average and could cause the value to be
- 1 byte too large for the output buffer.
- implement blinding. Because of this for the same key and message the same
- blinding value was generated. This reduced the effectiveness of the
- countermeasure and leaked information about the private key through side
- channels. Reported by Jack Lloyd.
- Features
- mbedtls_ssl_session_load() to allow serializing a session, for example to
- store it in non-volatile storage, and later using it for TLS session
- resumption.
- an incoming record is valid, authentic and has not been seen before. This
- feature can be used alongside Connection ID and SSL context serialisation.
- The feature is enabled at compile-time by MBEDTLS_SSL_RECORD_CHECKING
- option.
- (https:
- with MBEDTLS_ECDH_VARIANT_EVEREST_ENABLED. This implementation is formally
- verified and significantly faster, but is only supported on x86 platforms
- (32-bit and 64-bit) using GCC, Clang or Visual Studio. Contributed by
- Christoph Wintersteiger from Microsoft Research.
- the parent process closes the client socket and continue accepting, and
- the child process closes the listening socket and handles the client
- socket. Contributed by Robert Larsen in #2803.
- API Changes
- the example programs ssl_server2 and ssl_client2 to be run
- if MBEDTLS_FS_IO and MBEDTLS_PEM_PARSE_C are unset. Fixes #2254.
- list all curves for which at least one of ECDH or ECDSA is supported, not
- just curves for which both are supported. Call mbedtls_ecdsa_can_do() or
- mbedtls_ecdh_can_do() on each result to check whether each algorithm is
- supported.
- mbedtls_ecdsa_sign_det() but allows passing an external RNG for the
- purpose of blinding.
- New deprecations
- RNG function as an input.
- is now deprecated.
- Bugfix
- lead to successful parsing of ill-formed X.509 CRTs. Fixes #2437.
- codes to always wrap these codes into X.509 high level error codes before
- returning. Fixes #2431.
- functions. Fixes #1628.
- stdarg.h where needed. Fixes #2656.
- PlatformToolset from the project configuration. Fixes #1430 reported by
- irwir.
- if some curves are not defined. Fixes #1591 reported by dbedev.
- This previously limited the maximum size of DER encoded certificates
- in mbedtls_x509write_crt_der() to 2Kb. Reported by soccerGB in #2631.
- Bernhard M. Wiedemann in #2357.
- that are only available in Thumb mode. Fix contributed by Aurelien Jarno
- in #2169.
- This could previously lead to segmentation faults in builds using an
- address-sanitizer and enabling but not using MBEDTLS_ECP_RESTARTABLE.
- Jens Wiklander <jens.wiklander@linaro.org> in #2363
- uninitialized variable warnings on some recent toolchains (GCC8, etc).
- Discovered and fixed by Andy Gross (Linaro), #2392.
- functionally incorrect code on bigendian systems which don't have
- __BYTE_ORDER__ defined. Reported by Brendan Shanks. Fixes #2622.
- Changes
- suggests). #2671
- docker-env.sh) to simplify running test suites on a Linux host. Contributed
- by Peter Kolbus (Garmin).
- test runs without variability. Contributed by Philippe Antoine (Catena
- cyber) in #2681.
- Contributed by Philippe Antoine (Catena cyber).
- code and tests are now only available via Mbed Crypto, which
- Mbed TLS references as a Git submodule.
- = mbed TLS 2.18.1 branch released 2019-07-12
- Bugfix
- stdarg.h where needed. Fixes #2656.
- Changes
- Ashley Duncan in #2609.
- = mbed TLS 2.18.0 branch released 2019-06-11
- Features
- rfc 5280 section 4.2.1.4.
- Contributed by Jack Lloyd and Fortanix Inc.
- Contributed by Jack Lloyd and Fortanix Inc.
- and the used tls-prf.
- X.509 certificate extension, specifically type hardware module name,
- as defined in RFC 4108 section 5.
- RFC 5280 section 4.2.1.4. Currently, only the "Any Policy" policy is
- supported.
- Resolves #459.
- in https:
- The Connection ID extension allows to keep DTLS connections beyond the
- lifetime of the underlying transport by adding a connection identifier
- to the DTLS record header. This identifier can be used to associated an
- incoming record with the correct connection data even after the peer has
- changed its IP or port. The feature is enabled at compile-time by setting
- MBEDTLS_SSL_DTLS_CONNECTION_ID (disabled by default), and at run-time
- through the new APIs mbedtls_ssl_conf_cid() and mbedtls_ssl_set_cid().
- API Changes
- and the used tls-prf.
- Bugfix
- were shifted by one byte, creating an invalid ASN.1 tag. Fixed by
- Christian Walther in #2239.
- Junhwan Park, #2106.
- used with negative inputs. Found by Guido Vranken in #2404. Credit to
- OSS-Fuzz.
- either used both encrypt and decrypt key schedules, or which perform padding.
- GCM and CCM were not affected. Fixed by Jack Lloyd.
- Found and fixed by irwir. #2337
- Fixed by Peter Kolbus (Garmin). #2579
- public macro MBEDTLS_X509_ID_FLAG. This could lead to invalid evaluation
- in case operators binding less strongly than subtraction were used
- for the parameter.
- sni entry parameter. Reported by inestlerode in #560.
- sequence on failure. Found and fix suggested by Philippe Antoine.
- Credit to OSS-Fuzz.
- Changes
- mbedTLS configuration only SHA-2 signed certificates are accepted.
- This certificate is used in the demo server programs, which lead the
- client programs to fail at the peer's certificate verification
- due to an unacceptable hash signature. The certificate has been
- updated to one that is SHA-256 signed. Fix contributed by
- Illya Gerasymchuk.
- provided SSL context is unset.
- Found by Coverity, reported and fixed by Peter Kolbus (Garmin). Fixes #2309.
- Contributed by Peter Kolbus (Garmin).
- improve clarity. Fixes #2258.
- = mbed TLS 2.17.0 branch released 2019-03-19
- Features
- which allows copy-less parsing of DER encoded X.509 CRTs,
- at the cost of additional lifetime constraints on the input
- buffer, but at the benefit of reduced RAM consumption.
- named bitstring in DER as required by RFC 5280 Appendix B.
- from the default list (enabled by default). See
- https:
- API Changes
- See the Features section for more information.
- for the benefit of saving RAM, by disabling the new compile-time
- option MBEDTLS_SSL_KEEP_PEER_CERTIFICATE (enabled by default for
- API stability). Disabling this option makes mbedtls_ssl_get_peer_cert()
- always return NULL, and removes the peer_cert field from the
- mbedtls_ssl_session structure which otherwise stores the peer's
- certificate.
- Security
- belongs to a different group from the first. Before, if an application
- passed keys that belonged to different group, the first key's data was
- interpreted according to the second group, which could lead to either
- an error or a meaningless output from mbedtls_ecdh_get_params. In the
- latter case, this could expose at most 5 bits of the private key.
- Bugfix
- when MBEDTLS_ECP_ALT is defined. Reported by jwhui. Fixes #2242.
- Raised as a comment in #1996.
- previously lead to a stack overflow on constrained targets.
- in the header files, which missed the precompilation check. #971
- build error. Fixed by Haijun Gu #2319.
- in X.509 module. Fixes #2212.
- Fixes #2190.
- (e.g. config.h.bak). Fixed by Peter Kolbus (Garmin) #2407.
- mbedtls_asn1_write_bitstring().
- extensions in CSRs and CRTs that caused these bitstrings to not be encoded
- correctly as trailing zeroes were not accounted for as unused bits in the
- leading content octet. Fixes #1610.
- Changes
- the peer CRT chain and session ticket twice.
- instead of relying on other header files that they include.
- Inserted as an enhancement for #1371
- in RFC 7468. Found by Michael Ernst. Fixes #767.
- for platforms that don't provide it. Based on contributions by Joris Aerts
- and Nathaniel Wesley Filardo.
- Previously, this could lead to functionally incorrect assembly being
- produced by some optimizing compilers, showing up as failures in
- e.g. RSA or ECC signature operations. Reported in #1722, fix suggested
- by Aurelien Jarno and submitted by Jeffrey Martin.
- underlying OS actually guarantees.
- been disabled for lack of a sufficiently recent version of GnuTLS on the CI.
- they are enabled.
- = mbed TLS 2.16.0 branch released 2018-12-21
- Features
- of parameters in the API. This allows detection of obvious misuses of the
- API, such as passing NULL pointers. The API of existing functions hasn't
- changed, but requirements on parameters have been made more explicit in
- the documentation. See the corresponding API documentation for each
- function to see for which parameter values it is defined. This feature is
- disabled by default. See its API documentation in config.h for additional
- steps you have to take when enabling it.
- API Changes
- deprecated and replaced as shown below. The new functions change
- the return type from void to int to allow returning error codes when
- using MBEDTLS_<MODULE>_ALT for the underlying AES or message digest
- primitive. Fixes #1798.
- mbedtls_ctr_drbg_update() -> mbedtls_ctr_drbg_update_ret()
- mbedtls_hmac_drbg_update() -> mbedtls_hmac_drbg_update_ret()
- ARIA, CAMELLIA and Blowfish. These error codes will be replaced by
- the more generic per-module error codes MBEDTLS_ERR_xxx_BAD_INPUT_DATA.
- modules - AES, ARIA, Blowfish, CAMELLIA, CCM, GCM, DHM, ECP, ECDSA, ECDH,
- ECJPAKE, SHA, Chacha20 and Poly1305, cipher, pk, RSA, and MPI.
- Where modules have had parameter validation added, existing parameter
- checks may have changed. Some modules, such as Chacha20 had existing
- parameter validation whereas other modules had little. This has now been
- changed so that the same level of validation is present in all modules, and
- that it is now optional with the MBEDTLS_CHECK_PARAMS flag which by default
- is off. That means that checks which were previously present by default
- will no longer be.
- New deprecations
- in favor of functions that can return an error code.
- Bugfix
- assembly for AMD64 targets creating string literals greater than those
- permitted by the ISO C99 standard. Found by Aaron Jones. Fixes #482.
- through qemu user emulation. Reported and fix suggested by randombit
- in #1212. Fixes #1212.
- This could lead to a buffer overflow, but only in case ticket authentication
- was broken. Reported and fix suggested by Guido Vranken in #659.
- programs/pkey/gen_key which previously led to compilation failure
- on some toolchains. Reported by phoenixmcallister. Fixes #2170.
- hang.
- of check for certificate/key matching. Reported by Attila Molnar, #507.
- = mbed TLS 2.15.1 branch released 2018-11-30
- Changes
- = mbed TLS 2.15.0 branch released 2018-11-23
- Features
- Mbed Crypto as the source of the cryptography implementation.
- the PSA Crypto API from Mbed Crypto when additionally used with the
- USE_CRYPTO_SUBMODULE build option.
- Changes
- from the cipher abstraction layer. Fixes #2198.
- = mbed TLS 2.14.1 branch released 2018-11-30
- Security
- decryption that could lead to a Bleichenbacher-style padding oracle
- attack. In TLS, this affects servers that accept ciphersuites based on
- RSA decryption (i.e. ciphersuites whose name contains RSA but not
- (EC)DH(E)). Discovered by Eyal Ronen (Weizmann Institute), Robert Gillham
- (University of Adelaide), Daniel Genkin (University of Michigan),
- Adi Shamir (Weizmann Institute), David Wong (NCC Group), and Yuval Yarom
- (University of Adelaide, Data61). The attack is described in more detail
- in the paper available here: http:
- via branching and memory access patterns. An attacker who could submit
- a plaintext for RSA PKCS#1 v1.5 decryption but only observe the timing
- of the decryption and not its result could nonetheless decrypt RSA
- plaintexts and forge RSA signatures. Other asymmetric algorithms may
- have been similarly vulnerable. Reported by Eyal Ronen, Robert Gillham,
- Daniel Genkin, Adi Shamir, David Wong and Yuval Yarom.
- modules.
- API Changes
- mbedtls_hmac_drbg_update_ret() are similar to mbedtls_ctr_drbg_update()
- and mbedtls_hmac_drbg_update() respectively, but the new functions
- report errors whereas the old functions return void. We recommend that
- applications use the new functions.
- = mbed TLS 2.14.0 branch released 2018-11-19
- Security
- particular CA. This previously led to ignoring CRLs when the CRL's issuer
- name and the CA's subject name differed in their string encoding (e.g.,
- one using PrintableString and the other UTF8String) or in the choice of
- upper and lower case. Reported by Henrik Andersson of Bosch GmbH in issue
- #1784.
- incoming message buffer was placed within the first 64KiB of address
- space and a PSK-(EC)DHE ciphersuite was used, this allowed an attacker
- to trigger a memory access up to 64KiB beyond the incoming message buffer,
- potentially leading to an application crash or information disclosure.
- previous settings for the number of rounds made it practical for an
- adversary to construct non-primes that would be erroneously accepted as
- primes with high probability. This does not have an impact on the
- security of TLS, but can matter in other contexts with numbers chosen
- potentially by an adversary that should be prime and can be validated.
- For example, the number of rounds was enough to securely generate RSA key
- pairs or Diffie-Hellman parameters, but was insufficient to validate
- Diffie-Hellman parameters properly.
- See "Prime and Prejudice" by by Martin R. Albrecht and Jake Massimo and
- Kenneth G. Paterson and Juraj Somorovsky.
- Features
- some configurable amount of operations. This is intended to be used in
- constrained, single-threaded systems where ECC is time consuming and can
- block other operations until they complete. This is disabled by default,
- but can be enabled by MBEDTLS_ECP_RESTARTABLE at compile time and
- configured by mbedtls_ecp_set_max_ops() at runtime. It applies to the new
- xxx_restartable functions in ECP, ECDSA, PK and X.509 (CRL not supported
- yet), and to existing functions in ECDH and SSL (currently only
- implemented client-side, for ECDHE-ECDSA ciphersuites in TLS 1.2,
- including client authentication).
- operations. On CPUs where the extensions are available, they can accelerate
- MPI multiplications used in ECC and RSA cryptography. Contributed by
- Aurelien Jarno.
- signature always used a salt with the same length as the hash, and returned
- an error if this was not possible. Now the salt size may be up to two bytes
- shorter. This allows the library to support all hash and signature sizes
- that comply with FIPS 186-4, including SHA-512 with a 1024-bit key.
- than 256 bits limits the security of generated material to 128 bits.
- API Changes
- a feature that is not supported by underlying alternative
- implementations implementing cryptographic primitives. This is useful for
- hardware accelerators that don't implement all options or features.
- New deprecations
- MBEDTLS_ERR_XXX_FEATURE_UNAVAILABLE that indicate a feature is not
- supported are deprecated and are now replaced by the new equivalent
- platform error.
- form MBEDTLS_ERR_XXX_HW_ACCEL_FAILED that are deprecated and are replaced
- by the equivalent plaform error.
- mbedtls_mpi_is_prime_ext() which allows specifying the number of
- Miller-Rabin rounds.
- Bugfix
- application leading to a memory leak in case both
- MBEDTLS_MEMORY_BUFFER_ALLOC_C and MBEDTLS_MEMORY_BACKTRACE are set.
- Fixes #2069.
- invalidated keys of a lifetime of less than a 1s. Fixes #1968.
- MBEDTLS_THREADING_C is defined. Found by TrinityTonic, #1095
- which lead to accepting properly authenticated but improperly
- padded records in case of CBC ciphersuites using Encrypt-then-MAC.
- program programs/x509/cert_write. Fixes #1422.
- MBEDTLS_MODE_ECB. Found by ezdevelop. Fixes #1091.
- after use.
- of sensitive data in the example programs aescrypt2 and crypt_and_hash.
- UTF8String. Previously, the use of the PrintableString format led to
- wildcards and non-ASCII characters being unusable in some DN attributes.
- Reported by raprepo in #1860 and by kevinpt in #468. Fix contributed by
- Thomas-Dee.
- replacements of standard calloc/free functions through the macros
- MBEDTLS_PLATFORM_CALLOC_MACRO and MBEDTLS_PLATFORM_FREE_MACRO.
- Reported by ole-de and ddhome2006. Fixes #882, #1642 and #1706.
- Changes
- test the handling of large packets and small packets on the client side
- in the same way as on the server side.
- IPv6 and optionally by a build option over IPv4.
- calls, rather than Win32 API calls directly. This is necessary to avoid
- conflict with C runtime usage. Found and fixed by irwir.
- X.509 DNs. Previously, DN attributes were always written in their default
- string format (mostly PrintableString), which could lead to CRTs being
- created which used PrintableStrings in the issuer field even though the
- signing CA used UTF8Strings in its subject field; while X.509 compliant,
- such CRTs were rejected in some applications, e.g. some versions of
- Firefox, curl and GnuTLS. Reported in #1033 by Moschn. Fix contributed by
- Thomas-Dee.
- Fixes #517 reported by github-monoculture.
- use it to reduce error probability in RSA key generation to levels mandated
- by FIPS-186-4.
- = mbed TLS 2.13.1 branch released 2018-09-06
- API Changes
- whose implementation should behave as a thread-safe version of gmtime().
- This allows users to configure such an implementation at compile time when
- the target system cannot be deduced automatically, by setting the option
- MBEDTLS_PLATFORM_GMTIME_R_ALT. At this stage Mbed TLS is only able to
- automatically select implementations for Windows and POSIX C libraries.
- Bugfix
- neither gmtime_r() nor gmtime_s() are present. Fixes #1907.
- = mbed TLS 2.13.0 branch released 2018-08-31
- Security
- during certificate extensions parsing. In case of receiving malformed
- input (extensions length field equal to 0), an illegal read of one byte
- beyond the input buffer is made. Found and analyzed by Nathan Crandall.
- Features
- is controlled by the maximum fragment length as set locally or negotiated
- with the peer, as well as by a new per-connection MTU option, set using
- mbedtls_ssl_set_mtu().
- handshake when flights do not get through (RFC 6347, section 4.1.1.1,
- last paragraph).
- enabled by default.
- The maximum amount of RAM used for this can be controlled by the
- compile-time constant MBEDTLS_SSL_DTLS_MAX_BUFFERING defined
- in mbedtls/config.h.
- API Changes
- the use of datagram packing (enabled by default).
- Bugfix
- failure in the function could lead to other buffers being leaked.
- MBEDTLS_ARC4_C and MBEDTLS_CIPHER_NULL_CIPHER weren't also defined. #1890
- Fix contributed by Espressif Systems.
- This improves compliance to RFC 4492, and as a result, solves
- interoperability issues with BouncyCastle. Raised by milenamil in #1157.
- TrinityTonic in #1908.
- and mbedtls_ssl_get_record_expansion() after a session reset. Fixes #1941.
- with TLS versions 1.1 and earlier when the server requested authentication
- without providing a list of CAs. This was due to an overly strict bounds
- check in parsing the CertificateRequest message,
- introduced in Mbed TLS 2.12.0. Fixes #1954.
- mbedtls_ssl_get_record_expansion() in case of ChachaPoly ciphersuites,
- or CBC ciphersuites in (D)TLS versions 1.1 or higher. Fixes #1913, #1914.
- (found by Catena cyber using oss-fuzz)
- and pk_decrypt example programs. Reported by Brace Stout. Fixes #1128.
- Changes
- Contributed by xueruini.
- Drozd. Fixes #1215 raised by randombit.
- CCM test vectors from RAM.
- of misusing the mbedtls_hkdf_extract() and mbedtls_hkdf_expand()
- functions. Fixes #1775. Reported by Brian J. Murray.
- = mbed TLS 2.12.0 branch released 2018-07-25
- Security
- in (D)TLS 1.0 to 1.2, that allowed an active network attacker to
- partially recover the plaintext of messages under some conditions by
- exploiting timing measurements. With DTLS, the attacker could perform
- this recovery by sending many messages in the same connection. With TLS
- or if mbedtls_ssl_conf_dtls_badmac_limit() was used, the attack only
- worked if the same secret (for example a HTTP Cookie) has been repeatedly
- sent over connections manipulated by the attacker. Connections using GCM
- or CCM instead of CBC, using hash sizes other than SHA-384, or using
- Encrypt-then-Mac (RFC 7366) were not affected. The vulnerability was
- caused by a miscalculation (for SHA-384) in a countermeasure to the
- original Lucky 13 attack. Found by Kenny Paterson, Eyal Ronen and Adi
- Shamir.
- 1.2, that allowed a local attacker, able to execute code on the local
- machine as well as manipulate network packets, to partially recover the
- plaintext of messages under some conditions by using a cache attack
- targeting an internal MD/SHA buffer. With TLS or if
- mbedtls_ssl_conf_dtls_badmac_limit() was used, the attack only worked if
- the same secret (for example a HTTP Cookie) has been repeatedly sent over
- connections manipulated by the attacker. Connections using GCM or CCM
- instead of CBC or using Encrypt-then-Mac (RFC 7366) were not affected.
- Found by Kenny Paterson, Eyal Ronen and Adi Shamir.
- on CBC, in (D)TLS 1.0 to 1.2, that allowed a local attacker, able to
- execute code on the local machine as well as manipulate network packets,
- to partially recover the plaintext of messages under some conditions (see
- previous entry) by using a cache attack targeting the SSL input record
- buffer. Connections using GCM or CCM instead of CBC or using
- Encrypt-then-Mac (RFC 7366) were not affected. Found by Kenny Paterson,
- Eyal Ronen and Adi Shamir.
- Features
- authenticator Poly1305 and AEAD construct Chacha20-Poly1305. Contributed
- by Daniel King.
- Contributed by Augustin Cavalier.
- where the outgoing buffer can be fixed at a smaller size than the incoming
- buffer, which can save some RAM. If buffer lengths are kept equal, there
- is no functional difference. Contributed by Angus Gratton, and also
- independently contributed again by Paul Sokolovsky.
- NIST SP 800-38F algorithms KW and KWP and by RFC 3394 and RFC 5649.
- Bugfix
- was creating an invalid ASN.1 tag. Found by Aryeh R. Fixes #1257.
- Found and fixed by Hirotaka Niisato in #1783.
- contributed by tabascoeye.
- return value. Found by @davidwu2000. #839
- Philippe Antoine. Fixes #1623.
- by Brendan Shanks. Part of a fix for #992.
- MBEDTLS_CIPHER_NULL_CIPHER is enabled. Found by TrinityTonic in #1719.
- Philippe Antoine from Catena cyber. #1663.
- i386 with SSE2. Found by László Langó. Fixes #1550
- the `#include` in the header files. Resolves #857
- mbedtls_pk_parse_key(). Found by Martin Boye Petersen and fixed by Dawid
- Drozd. #1098
- CBC based ciphersuite is used together with Encrypt-then-MAC. Previously,
- such a message was wrongly reported as an invalid record and therefore lead
- to the connection being terminated. Seen most often with OpenSSL using
- TLS 1.0. Reported by @kFYatek and by Conor Murphy on the forum. Fix
- contributed by Espressif Systems. Fixes #1632
- when the request_size argument is set to 0 as stated in the documentation.
- Fixes #1833.
- deep copy of the session, and the peer certificate is not lost. Fixes #926.
- Changes
- zero-length messages when using TLS 1.2. Contributed by Espressif Systems.
- when calling with a NULL salt and non-zero salt_len. Contributed by
- Brian J Murray
- Contributed by fbrosson.
- Fixed by Nick Wilson.
- = mbed TLS 2.11.0 branch released 2018-06-18
- Features
- cipher abstraction module.
- (HKDF) per RFC 5869. Contributed by Thomas Fossati.
- Contributed by Aorimn in pull request #414.
- cryptoprocessor. Private key operations can be asynchronous to allow
- non-blocking operation of the TLS server stack.
- Bugfix
- curves as well as RSA. Fixes #777 found by dbedev.
- used by user applications. Found and fixed by Fabio Alessandrelli.
- Reported by rahmanih in #683
- Changes
- versions later than 3.6. Versions of Clang earlier than this may no longer
- work. Fixes #1072
- = mbed TLS 2.10.0 branch released 2018-06-06
- Features
- (RFC 6209). Disabled by default, see MBEDTLS_ARIA_C in config.h
- API Changes
- functionality shared by multiple Mbed TLS modules. At this stage
- platform_util.h (and its associated platform_util.c) only contain
- mbedtls_platform_zeroize(), which is a critical function from a security
- point of view. mbedtls_platform_zeroize() needs to be regularly tested
- against compilers to ensure that calls to it are not removed from the
- output binary as part of redundant code elimination optimizations.
- Therefore, mbedtls_platform_zeroize() is moved to the platform module to
- facilitate testing and maintenance.
- Bugfix
- build to fail. Found by zv-io. Fixes #1651.
- Changes
- TrinityTonic. #1359.
- = mbed TLS 2.9.0 branch released 2018-04-30
- Security
- during certificate validation. Additionally, the issue could also lead to
- unnecessary callback checks being made or to some validation checks to be
- omitted. The overread could be triggered remotely, while the other issues
- would require a non DER-compliant certificate to be correctly signed by a
- trusted CA, or a trusted CA with a non DER-compliant certificate. Found by
- luocm. Fixes #825.
- function which led to an arbitrary overread of the message buffer. The
- overreads could be caused by receiving a malformed message at the point
- where an optional signature algorithms list is expected when the signature
- algorithms section is too short. In builds with debug output, the overread
- data is output with the debug data.
- which could potentially lead to the client accepting a ciphersuite it didn't
- offer or a ciphersuite that cannot be used with the TLS or DTLS version
- chosen by the server. This could lead to corruption of internal data
- structures for some configurations.
- Features
- tables during runtime, thereby reducing the RAM/ROM footprint by ~6KiB.
- Suggested and contributed by jkivilin in pull request #394.
- ECDH primitive functions (mbedtls_ecdh_gen_public(),
- mbedtls_ecdh_compute_shared()) are supported for now. Contributed by
- Nicholas Wilson in pull request #348.
- API Changes
- applications to wait for a network context to become ready before reading
- or writing.
- a check for whether more more data is pending to be processed in the
- internal message buffers.
- This function is necessary to determine when it is safe to idle on the
- underlying transport in case event-driven IO is used.
- Bugfix
- contributed by Brian J Murray and David Brown.
- in configurations that omit certain hashes or public-key algorithms.
- Fixes #1040.
- #1353
- MBEDTLS_VERSION_FEATURES in some test suites. Contributed by
- Deomid Ryabkov. Fixes #1299, #1475.
- Fixed by mnacamura.
- unable to parse keys which had only the optional parameters field of the
- ECPrivateKey structure. Found by Jethro Beekman, fixed in #1379.
- stated in the mbedtls_cipher_update() documentation. Contributed by
- Andy Leiserson.
- a file in pk_sign program. Found by kevlut in #1142.
- where data needs to be fetched from the underlying transport in order
- to make progress. Previously, this error code was also occasionally
- returned when unexpected messages were being discarded, ignoring that
- further messages could potentially already be pending to be processed
- in the internal buffers; these cases led to deadlocks when event-driven
- I/O was used. Found and reported by Hubert Mis in #772.
- function which leads to a potential one byte overread of the message
- buffer.
- decompression.
- maintained 2.7 branch. The soversion was increased in Mbed TLS
- version 2.7.1 to reflect breaking changes in that release, but the
- increment was missed in 2.8.0 and later releases outside of the 2.7 branch.
- Changes
- independently by Matthieu Volat and Arne Schwabe.
- public-key algorithms. Includes contributions by Gert van Dijk.
- configurations where the feature is disabled. Found and fixed by Gergely
- Budai.
- doesn't leak memory if the user doesn't use mbedtls_ssl_conf_psk() and
- instead incorrectly manipulates the configuration structure directly.
- Found and fix submitted by junyeonLEE in #1220.
- MBEDTLS_ASN1_PARSE_C is not enabled. This allows the use of PBKDF2
- without PBES2. Fixed by Marcos Del Sol Vives.
- for Curve25519 (other curves had it already). Contributed by Nicholas
- Wilson #481
- Krylov.
- Paul Sokolovsky in #1356.
- letter must not be prefixed by '-', such as LLVM. Found and fixed by
- Alex Hixon.
- environment variable when using the project makefiles.
- by Alexey Skalozub in #405.
- transmitting more than the required length, return an error. Raised by
- Sam O'Connor in #1245.
- HMAC functions with non-HMAC ciphersuites. Independently contributed
- by Jiayuan Chen in #1377. Fixes #1437.
- FIPS 186-4. Contributed by Jethro Beekman. #1380
- of the corresponding module is activated by defining the corresponding
- MBEDTLS_XXX_ALT macro. This means that alternative implementations do
- not need to copy the declarations, and ensures that they will have the
- same API.
- = mbed TLS 2.8.0 branch released 2018-03-16
- Default behavior changes
- that when both sides of a TLS connection negotiate the truncated
- HMAC extension, Mbed TLS can now interoperate with other
- compliant implementations, but this breaks interoperability with
- prior versions of Mbed TLS. To restore the old behavior, enable
- the (deprecated) option MBEDTLS_SSL_TRUNCATED_HMAC_COMPAT in
- config.h. Found by Andreas Walz (ivESK, Offenburg University of
- Applied Sciences).
- Security
- implementation allowed an offline 2^80 brute force attack on the
- HMAC key of a single, uninterrupted connection (with no
- resumption of the session).
- against Bellcore glitch attack.
- a crash on invalid input.
- crash on invalid input.
- extensions. Found by Falko Strenzke and Evangelos Karatsiolis.
- Features
- algorithms family when encrypting private keys using PKCS#5 v2.0.
- This allows reading encrypted PEM files produced by software that
- uses PBKDF2-SHA2, such as OpenSSL 1.1. Submitted by Antonio Quartulli,
- OpenVPN Inc. Fixes #1339
- New deprecations
- MBEDTLS_ZLIB_SUPPORT).
- Bugfix
- Fixes #1358.
- with flag MBEDTLS_X509_BADCERT_BAD_PK even when the key type was correct.
- In the context of SSL, this resulted in handshake failure. Reported by
- daniel in the Mbed TLS forum. #1351
- is not enabled. Set MBEDTLS_SSL_MIN_MAJOR_VERSION
- and MBEDTLS_SSL_MIN_MINOR_VERSION instead of
- MBEDTLS_SSL_MAJOR_VERSION_3 and MBEDTLS_SSL_MINOR_VERSION_1. #664
- only if __MINGW32__ not defined. Fix suggested by Thomas Glanzmann and
- Nick Wilson on issue #355
- overflow. #1179
- by Guido Vranken. #639
- parsing the subject alternative names.
- that could cause a key exchange to fail on valid data.
- could cause a key exchange to fail on valid data.
- MBEDTLS_DEPRECATED_REMOVED. #1388
- Found through fuzz testing.
- Changes
- Contributed by Mathieu Briand.
- a migration path for those depending on the library's ABI.
- Joris Aerts. #678
- = mbed TLS 2.7.0 branch released 2018-02-03
- Security
- extension. When the truncated HMAC extension is enabled and CBC is used,
- sending a malicious application packet could be used to selectively corrupt
- 6 bytes on the peer's heap, which could potentially lead to crash or remote
- code execution. The issue could be triggered remotely from either side in
- both TLS and DTLS. CVE-2018-0488
- for the key size, which could potentially lead to crash or remote code
- execution. Found by Seth Terashima, Qualcomm Product Security Initiative,
- Qualcomm Technologies Inc. CVE-2018-0487
- zeros.
- 64 KiB to the address of the SSL buffer and causing a wrap around.
- default enabled) maximum fragment length extension is disabled in the
- config and the application data buffer passed to mbedtls_ssl_write
- is larger than the internal message buffer (16384 bytes by default), the
- latter overflows. The exploitability of this issue depends on whether the
- application layer can be forced into sending such large packets. The issue
- was independently reported by Tim Nordell via e-mail and by Florin Petriuc
- and sjorsdewit on GitHub. Fix proposed by Florin Petriuc in #1022.
- Fixes #707.
- constancy of mbedtls_ssl_safer_memcmp().
- Changes were introduced in multiple places in the library.
- being leaked to memory after release.
- leaking 1 bit of the private key. Reported by prashantkspatil.
- data. Previously, trailing zero bytes were detected and omitted for the
- sake of saving memory, but potentially leading to slight timing
- differences. Reported by Marco Macchetti, Kudelski Group.
- after keypair generation.
- (server-side). Could result in application crash, but only if an ALPN
- name larger than 16 bytes had been configured on the server.
- to RFC 3526 containing parameters generated in a nothing-up-my-sleeve
- manner.
- Features
- line arguments.
- when run on a heavily-loaded machine.
- MBEDTLS_CMAC_ALT). Submitted by Steven Cooreman, Silicon Labs.
- configuration flag MBEDTLS_GCM_ALT.
- configuration flags MBEDTLS_ECDSA_SIGN_ALT, MBEDTLS_ECDSA_VERIFY_ALT and
- MBEDTLS_ECDSDA_GENKEY_AT in config.h.
- The following functions from the ECDSA module can be replaced
- with alternative implementation:
- mbedtls_ecdsa_sign(), mbedtls_ecdsa_verify() and mbedtls_ecdsa_genkey().
- new configuration flags MBEDTLS_ECDH_COMPUTE_SHARED_ALT and
- MBEDTLS_ECDH_GEN_PUBLIC_ALT in config.h.
- The following functions from the ECDH module can be replaced
- with an alternative implementation:
- mbedtls_ecdh_gen_public() and mbedtls_ecdh_compute_shared().
- the new configuration flag MBEDTLS_ECJPAKE_ALT.
- API Changes
- independent setup and export of RSA contexts. Most notably,
- mbedtls_rsa_import() and mbedtls_rsa_complete() are introduced for setting
- up RSA contexts from partial key material and having them completed to the
- needs of the implementation automatically. This allows to setup private RSA
- contexts from keys consisting of N,D,E only, even if P,Q are needed for the
- purpose or CRT and/or blinding.
- implementations of the RSA interface declared in rsa.h.
- SHA1, SHA256, SHA512) have been deprecated and replaced as shown below.
- The new functions change the return type from void to int to allow
- returning error codes when using MBEDTLS_<MODULE>_ALT.
- mbedtls_<MODULE>_starts() -> mbedtls_<MODULE>_starts_ret()
- mbedtls_<MODULE>_update() -> mbedtls_<MODULE>_update_ret()
- mbedtls_<MODULE>_finish() -> mbedtls_<MODULE>_finish_ret()
- mbedtls_<MODULE>_process() -> mbedtls_internal_<MODULE>_process()
- New deprecations
- (e.g. signing with a public key).
- Users are advised to use the extended RSA API instead.
- (mbedtls_<MODULE>_starts, mbedtls_<MODULE>_update,
- mbedtls_<MODULE>_finish and mbedtls_<MODULE>_process where <MODULE> is
- any of MD2, MD4, MD5, SHA1, SHA256, SHA512) in favor of functions
- that can return an error code.
- parameters from RFC 3526 or the newly added parameters from RFC 7919.
- Supserseded by binary encoded constants MBEDTLS_DHM_RFC3526_MODP_2048_P_BIN
- etc.
- from hex strings. Superseded by mbedtls_ssl_conf_dh_param_bin()
- accepting DHM parameters in binary form, matching the new constants.
- Bugfix
- as recommended in RFC 6347 Section 4.1.2.7.
- Found by projectgus and Jethro Beekman, #836.
- renegotiated handshakes would only accept signatures using SHA-1
- regardless of the peer's preferences, or fail if SHA-1 was disabled.
- dates on leap years with 100 and 400 intervals are handled correctly. Found
- by Nicholas Wilson. #694
- accepted. Generating these signatures required the private key.
- Found independently by Florian in the mbed TLS forum and by Mishamax.
- #878, #1019.
- toolchain. Found by gkerrien38.
- pem_aes_decrypt(), pem_des_decrypt() and pem_des3_decrypt() respectively.
- If a call to one of the functions of the cryptographic primitive modules
- failed, the error may not be noticed by the function
- mbedtls_pem_read_buffer() causing it to return invalid values. Found by
- Guido Vranken. #756
- Reported by aaronmdjones in #1001
- writing routines that prevented these functions to work with alternative
- RSA implementations. Raised by J.B. in the Mbed TLS forum. Fixes #1011.
- non-v3 CRT's.
- Found by nkolban. Fixes #845.
- MBEDTLS_SSL_RENEGOTIATION is disabled. Found by erja-gp.
- Reported by Yolan Romailler.
- fragile yet non-exploitable code-paths.
- MilenkoMitrovic, #1104
- RSA test suite where the failure of CTR DRBG initialization lead to
- freeing an RSA context and several MPI's without proper initialization
- beforehand.
- Found and fixed by Martijn de Milliano.
- MBEDTLS_PADDING_ONE_AND_ZEROS that sometimes accepted invalid padding.
- Note, this padding mode is not used by the TLS protocol. Found and fixed by
- Micha Kraus.
- mbedtls_sha512_starts() in the mbedtls_entropy_init() function.
- mbedtls_sha512_init() is called before operating on the relevant context
- structure. Do not assume that zeroizing a context is a correct way to
- reset it. Found independently by ccli8 on Github.
- and fixed by muddog.
- Changes
- and the message digest. Further, allow enabling/disabling of authority
- identifier, subject identifier and basic constraints extensions.
- particular, don't require P,Q if neither CRT nor blinding are
- used. Reported and fix proposed independently by satur9nine and sliai
- on GitHub.
- undeclared dependency of the RSA module on the ASN.1 module.
- new ones with return codes. In particular, this modifies the
- mbedtls_md_info_t structure. Propagate errors from these functions
- everywhere except some locations in the ssl_tls.c module.
- modules where the software implementation can be replaced by a hardware
- implementation.
- throughout the library.
- = mbed TLS 2.6.0 branch released 2017-08-10
- Security
- mbedtls_ssl_get_verify_result() would incorrectly return 0 when the peer's
- X.509 certificate chain had more than MBEDTLS_X509_MAX_INTERMEDIATE_CA
- (default: 8) intermediates, even when it was not trusted. This could be
- triggered remotely from either side. (With authmode set to 'required'
- (the default), the handshake was correctly aborted).
- programs/aes/aescrypt2 and programs/aes/crypt_and_hash.
- Found by Laurent Simon.
- Features
- and the context struct mbedtls_platform_context to perform
- platform-specific setup and teardown operations. The macro
- MBEDTLS_PLATFORM_SETUP_TEARDOWN_ALT allows the functions to be overridden
- by the user in a platform_alt.h file. These new functions are required in
- some embedded environments to provide a means of initialising underlying
- cryptographic acceleration hardware.
- API Changes
- API consistent with mbed TLS 2.5.0. Specifically removed the inline
- qualifier from the functions mbedtls_aes_decrypt, mbedtls_aes_encrypt,
- mbedtls_ssl_ciphersuite_uses_ec and mbedtls_ssl_ciphersuite_uses_psk. Found
- by James Cowgill. #978
- chain was not verified due to an internal error (including in the verify
- callback) or chain length limitations.
- verification of the peer's certificate failed due to an overlong chain or
- a fatal error in the verify callback.
- Bugfix
- Reported by roberto. #716
- to #if defined(MBEDTLS_THREADING_C) as the library cannot assume they will
- always be implemented by pthread support. #696
- in the case of an error. Found by redplait. #590
- Reported and fix suggested by guidovranken. #740
- compilation when using ARM Compiler 6.
- encoded X.509 CRLs. The overflow could enable maliciously constructed CRLs
- to bypass the version verification check. Found by Peng Li/Yueh-Hsun Lin,
- KNOX Security, Samsung Research America
- encoded X.509 CSRs. The overflow could enable maliciously constructed CSRs
- to bypass the version verification check. Found by Peng Li/Yueh-Hsun Lin,
- KNOX Security, Samsung Research America
- encoded X.509 certificates. The overflow could enable maliciously
- constructed certificates to bypass the certificate verification check.
- function mbedtls_time() instead. Found by wairua. #666
- arguments. Found by inestlerode. #557.
- Changes
- 64-bit division. This is useful on embedded platforms where 64-bit division
- created a dependency on external libraries. #708
- accelerator code in the library leaves concurrency handling to the
- platform. Reported by Steven Cooreman. #863
- config-no-entropy.h to reduce the RAM footprint.
- before they are pushed.
- = mbed TLS 2.5.1 released 2017-06-21
- Security
- The issue could only happen client-side with renegotiation enabled.
- Could result in DoS (application crash) or information leak
- (if the application layer sent data read from mbedtls_ssl_read()
- back to the server or to a third party). Can be triggered remotely.
- certificate verification. SHA-1 can be turned back on with a compile-time
- option if needed.
- detect it sometimes. Reported by Hugo Leisink. #810
- potential Bleichenbacher/BERserk-style attack.
- Bugfix
- valid C and they prevented the test from compiling in Visual Studio 2015
- and with GCC using the -Wpedantic compilation option.
- resulting in compatibility problems with Chrome. Found by hfloyrd. #823
- when sending the alert failed. The fix makes sure not to hide the error
- that triggered the alert.
- peer after sending a fatal alert to refuse a renegotiation attempt.
- Previous behaviour was to keep processing data even after the alert has
- been sent.
- MBEDTLS_SSL_VERIFY_OPTIONAL. Found by Jethro Beekman. #864
- fatal errors in authentication mode MBEDTLS_SSL_VERIFY_OPTIONAL and to
- reflect bad EC curves within verification result.
- modulus 1 and therefore to hang. Found by blaufish. #641.
- a negative MPI. Previously the result was always negative. Found by Guido
- Vranken.
- that was triggered uppon reading an empty line. Found by Guido Vranken.
- Changes
- sending the fatal alert and just drop the connection.
- misunderstanding and potentially dangerous use of the API. Pointed out
- by Jean-Philippe Aumasson.
- = mbed TLS 2.5.0 branch released 2017-05-17
- Security
- (rsa_rsaes_pkcs1_v15_decrypt(), rsa_rsaes_oaep_decrypt). Found by Laurent
- Simon.
- against side-channel attacks like the cache attack described in
- https:
- Found and fix proposed by Michael Schwarz, Samuel Weiser, Daniel Gruss,
- Clémentine Maurice and Stefan Mangard.
- Features
- This involved exposing parts of the internal interface to enable
- replacing the core functions and adding and alternative, module level
- replacement support for enabling the extension of the interface.
- suppressing the CA list in Certificate Request messages. The default
- behaviour has not changed, namely every configured CAs name is included.
- API Changes
- by the functions shown below. The new functions change the return type from
- void to int to allow returning error codes when using MBEDTLS_AES_ALT,
- MBEDTLS_AES_DECRYPT_ALT or MBEDTLS_AES_ENCRYPT_ALT.
- mbedtls_aes_decrypt() -> mbedtls_internal_aes_decrypt()
- mbedtls_aes_encrypt() -> mbedtls_internal_aes_encrypt()
- Bugfix
- recent versions of the library. Found by Kyle Keen.
- initialising. Found by sznaider. #667 #843
- The PK and RSA modules use different types for passing hash length and
- without these checks the type cast could lead to data loss. Found by Guido
- Vranken.
- = mbed TLS 2.4.2 branch released 2017-03-08
- Security
- using RSA through the PK module in 64-bit systems. The issue was caused by
- some data loss when casting a size_t to an unsigned int value in the
- functions rsa_verify_wrap(), rsa_sign_wrap(), rsa_alt_sign_wrap() and
- mbedtls_pk_sign(). Found by Jean-Philippe Aumasson.
- mbedtls_x509_crl_parse(). A string containing a CRL followed by trailing
- characters after the footer could result in the execution of an infinite
- loop. The issue can be triggered remotely. Found by Greg Zaverucha,
- Microsoft.
- CertificateVerify messages, to prevent SLOTH attacks against TLS 1.2.
- Introduced by interoperability fix for #513.
- when verifying the validity of a key on secp224k1. This could be
- triggered remotely for example with a maliciously constructed certificate
- and potentially could lead to remote code execution on some platforms.
- Reported independently by rongsaws and Aleksandar Nikolic, Cisco Talos
- team. #569 CVE-2017-2784
- Bugfix
- traversing a chain of trusted CA. The issue would cause both flags,
- MBEDTLS_X509_BADCERT_NOT_TRUSTED and MBEDTLS_X509_BADCERT_EXPIRED, to be
- set when the verification conditions are not met regardless of the cause.
- Found by Harm Verhagen and inestlerode. #665 #561
- mbedtls_ssl_set_bio_timeout in compat-1.3.h, by removing it.
- Found by omlib-lin. #673
- x509_csr.c that are reported when building mbed TLS with a config.h that
- does not define MBEDTLS_PEM_PARSE_C. Found by omnium21. #562
- would compare 64 bits of the record counter instead of 48 bits as indicated
- in RFC 6347 Section 4.3.1. This could cause the execution of the
- renegotiation routines at unexpected times when the protocol is DTLS. Found
- by wariua. #687
- the input string in PEM format to extract the different components. Found
- by Eyal Itkin.
- cause buffer bound checks to be bypassed. Found by Eyal Itkin.
- cause buffer bound checks to be bypassed. Found by Eyal Itkin.
- cause buffer bound checks to be bypassed. Found by Eyal Itkin.
- cause buffer bound checks to be bypassed. Found by Eyal Itkin.
- Li/Yueh-Hsun Lin, KNOX Security, Samsung Research America.
- by missing calls to mbedtls_pem_free() in cases when a
- MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT error was encountered. Found and
- fix proposed by Guido Vranken. #722
- Studio 2015 as well as the files themselves, to remove a build warning
- generated in Visual Studio 2015. Reported by Steve Valliere. #742
- Raised and fix suggested by Alan Gillingham in the mbed TLS forum. #771
- number to write in hexadecimal is negative and requires an odd number of
- digits. Found and fixed by Guido Vranken.
- by inestlerode. #555
- = mbed TLS 2.4.1 branch released 2016-12-13
- Changes
- Recommendation for Block Cipher Modes of Operation: The CMAC Mode for
- Authentication – October 2016
- = mbed TLS 2.4.0 branch released 2016-10-17
- Security
- with RFC-5116 and could lead to session key recovery in very long TLS
- sessions. "Nonce-Disrespecting Adversaries Practical Forgery Attacks on GCM in
- TLS" - H. Bock, A. Zauner, S. Devlin, J. Somorovsky, P. Jovanovic.
- https:
- mbedtls_x509write_csr_der() when the signature is copied to the buffer
- without checking whether there is enough space in the destination. The
- issue cannot be triggered remotely. Found by Jethro Beekman.
- Features
- NIST SP 800-38B, RFC-4493 and RFC-4615.
- is functioning correctly.
- scripts, which is also now called by all.sh.
- configure the maximum length of a file path that can be buffered when
- calling mbedtls_x509_crt_parse_path().
- library features that do not require an entropy source.
- to configure the minimum number of bytes for entropy sources using the
- mbedtls_hardware_poll() function.
- Bugfix
- may need time but not the standard C library abstraction, and added
- configuration consistency checks to check_config.h
- when GCM is used. Found by udf2457. #441
- enabled unless others were also present. Found by David Fernandez. #428
- a contribution from Tobias Tangemann. #541
- certificates are provided.
- mbedtls_asn1_get_int(). Found and fixed by Guido Vranken. #599
- and double frees. Found by Niklas Amnebratt.
- builds where the configuration MBEDTLS_PEM_WRITE_C is not defined. Found
- by inestlerode. #559.
- data structure until after error checks are successful. Found by
- subramanyam-c. #622
- mbedtls_gcm_finish(). Found by cmiatpaar. #602
- ssl_parse_hello_verify_request() for DTLS. Found by Guido Vranken.
- Found by subramanyam-c. #626
- where the limited hash choices prevented the client from sending its
- certificate. Found by teumas. #513
- Changes
- missing self-tests to the test suites, to ensure self-tests are only
- executed once.
- through the symbol YOTTA_CFG_MBEDTLS_TARGET_CONFIG_FILE.
- features. Contributed by Aviv Palivoda.
- naming collision in projects which also have files with the common name
- net.c. For consistency, the corresponding header file, net.h, is marked as
- deprecated, and its contents moved to net_sockets.h.
- longer disregard certificates with unrecognised fields.
- = mbed TLS 2.3.0 branch released 2016-06-28
- Security
- required by PKCS1 v2.2
- mbedtls_rsa_rsaes_pkcs1_v15_encrypt and mbedtls_rsa_rsaes_oaep_encrypt
- (not triggerable remotely in (D)TLS).
- mbedtls_rsa_rsaes_oaep_decrypt. It is not triggerable remotely in
- SSL/TLS.
- Features
- function.
- Bugfix
- arguments where the same (in-place doubling). Found and fixed by Janos
- Follath. #309
- in the previous patch release. Found by Robert Scheck. #390 #391
- ECDSA was disabled in config.h . The leak didn't occur by default.
- expired or not yet valid certificate was parsed before a valid certificate
- in the trusted certificate list.
- buffer after DER certificates to be included in the raw representation.
- dereference possible.
- mbedtls_ssl_conf_curves. #373
- Changes
- don't use the optimized assembly for bignum multiplication. This removes
- the need to pass -fomit-frame-pointer to avoid a build error with -O0.
- Skalozub).
- ignored, as required by RFC6101.
- = mbed TLS 2.2.1 released 2016-01-05
- Security
- allocate memory. Only used for certificate generation, not triggerable
- remotely in SSL/TLS. Found by Rafał Przywara. #367
- SLOTH attack on TLS 1.2 server authentication (other attacks from the
- SLOTH paper do not apply to any version of mbed TLS or PolarSSL).
- https:
- Bugfix
- when the first intermediate certificate has pathLenConstraint=0. Found by
- Nicholas Wilson. Introduced in mbed TLS 2.2.0. #280
- JayaraghavendranK. #372
- with some peers over unreliable links. Avoid dropping an entire DTLS
- datagram if a single record in a datagram is unexpected, instead only
- drop the record and look at subsequent records (if any are present) in
- the same datagram. Found by jeannotlapin. #345
- = mbed TLS 2.2.0 released 2015-11-04
- Security
- once and some allocation fails. Cannot be forced remotely. Found by Guido
- Vranken, Intelworks.
- mbedtls_x509_crt_parse_path() is passed a path longer than 2GB. Cannot be
- triggered remotely. Found by Guido Vranken, Intelworks.
- Cannot be triggered remotely unless you create X.509 certificates based
- on untrusted input or write keys of untrusted origin. Found by Guido
- Vranken, Intelworks.
- certificates. Found by Nicholas Wilson, fix and tests provided by
- Janos Follath. #280 and #319
- Features
- Disabled by default as the specification might still change.
- block. (Potential uses include EAP-TLS and Thread.)
- Bugfix
- resulting in some valid X.509 being incorrectly rejected. Found and fix
- provided by Janos Follath. #319
- exchange. Found and fix provided by Chris Hammond. #270
- ECHD-ECDSA if the only key exchange. Multiple reports. #310
- not being properly ignored. Found by mancha and Kasom Koht-arsa, #308
- size/curve against the profile. Before that, there was no way to set a
- minimum key size for end-entity certificates with RSA keys. Found by
- Matthew Page of Scannex Electronics Ltd.
- Found by Kurt Danielson. #292
- certificates to be rejected by some applications, including OS X
- Keychain. Found and fixed by Jonathan Leroy, Inikup.
- Changes
- or -1.
- = mbed TLS 2.1.2 released 2015-10-06
- Security
- overflow of the hostname or session ticket. Found by Guido Vranken,
- Intelworks.
- once in the same handhake and mbedtls_ssl_conf_psk() was used.
- Found and patch provided by Guido Vranken, Intelworks. Cannot be forced
- remotely.
- mbedtls_pk_parse_key(file)() when the password is > 129 bytes.
- Found by Guido Vranken, Intelworks. Not triggerable remotely.
- Found by Guido Vranken, Intelworks. Not exploitable remotely in the context
- of TLS, but might be in other uses. On 32 bit machines, requires reading a
- string of close to or larger than 1GB to exploit; on 64 bit machines, would
- require reading a string of close to or larger than 2^62 bytes.
- on crafted PEM input data. Found and fix provided by Guido Vranken,
- Intelworks. Not triggerable remotely in TLS. Triggerable remotely if you
- accept PEM data from an untrusted source.
- buffer is 512MB or larger on 32-bit platforms. Found by Guido Vranken,
- Intelworks. Not trigerrable remotely in TLS.
- the same mbedtls_ssl_config object and memory allocation fails. Found by
- Guido Vranken, Intelworks. Cannot be forced remotely.
- authentication against a crafted CA cert. Cannot be triggered remotely
- unless you allow third parties to pick trust CAs for client auth.
- Found by Guido Vranken, Intelworks.
- Bugfix
- zhasha (#278).
- Changes
- domain names are compliant with RFC 1035.
- (#291)
- = mbed TLS 2.1.1 released 2015-09-17
- Security
- signatures. (Found by Florian Weimer, Red Hat.)
- https:
- tries to continue the handshake after it failed (a misuse of the API).
- (Found and patch provided by Fabian Foerg, Gotham Digital Science using
- afl-fuzz.)
- Bugfix
- caused some handshakes to fail.
- Changes
- use of mbedtls_x509_crt_profile_next. (found by NWilson)
- connection, if cookie verification is available
- (MBEDTLS_SSL_DTLS_HELLO_VERIFY defined in config.h, and usable cookie
- callbacks set with mbedtls_ssl_conf_dtls_cookies()), this will be
- detected and mbedtls_ssl_read() will return
- MBEDTLS_ERR_SSL_CLIENT_RECONNECT - it is then possible to start a new
- handshake with the same context. (See RFC 6347 section 4.2.8.)
- = mbed TLS 2.1.0 released 2015-09-04
- Features
- Bugfix
- Leisink).
- Sears).
- (found by Benoit Lecocq).
- installed (found by Rawi666).
- (found by robotanarchy) (#232).
- tests (found by robotanarchy) (#232).
- with make.
- be always used (found by dcb314) (#235)
- result trying to unlock an unlocked mutex on invalid input (found by
- Fredrik Axelsson) (#257)
- SSL_MAX_CONTENT_LEN or higher - not triggerrable remotely (found by
- Aleksandrs Saveljevs) (#238)
- MBEDTLS_SHAxxx_ALT (found by Henrik) (#239)
- Changes
- end of the default config.h by defining MBEDTLS_USER_CONFIG_FILE on the
- compiler's command line.
- trusted, no later cert is checked. (suggested by hannes-landeholm)
- (#220).
- Hugo Leisink) (#210).
- length.
- = mbed TLS 2.0.0 released 2015-07-13
- Features
- with custom implementation (eg hardware accelerated), complementing the
- ability to override the whole module.
- preserve forward secrecy, and allows sharing across multiple contexts.
- which algorithms and key sizes (curves for ECDSA) are acceptable.
- mbedtls_ssl_conf_dhm_min_bitlen() and mbedtls_ssl_conf_sig_hashes().
- parameters.
- API Changes
- You now need to link to all of them if you use TLS for example.
- Some names have been further changed to make them more consistent.
- Migration helpers scripts/rename.pl and include/mbedtls/compat-1.3.h are
- provided. Full list of renamings in scripts/data_files/rename-1.3-2.0.txt
- mbedtls_cipher_info_t.key_length -> key_bitlen
- mbedtls_cipher_context_t.key_length -> key_bitlen
- mbedtls_ecp_curve_info.size -> bit_size
- been split into an _init() that returns void and another function that
- should generally be the first function called on this context after init:
- mbedtls_ssl_init() -> mbedtls_ssl_setup()
- mbedtls_ccm_init() -> mbedtls_ccm_setkey()
- mbedtls_gcm_init() -> mbedtls_gcm_setkey()
- mbedtls_hmac_drbg_init() -> mbedtls_hmac_drbg_seed(_buf)()
- mbedtls_ctr_drbg_init() -> mbedtls_ctr_drbg_seed()
- Note that for mbedtls_ssl_setup(), you need to be done setting up the
- ssl_config structure before calling it.
- ssl_set_session() and ssl_set_client_transport_id(), plus
- ssl_legacy_renegotiation()) have been renamed to mbedtls_ssl_conf_xxx()
- (see rename.pl and compat-1.3.h above) and their first argument's type
- changed from ssl_context to ssl_config.
- additional callback for read-with-timeout).
- implementations (SNI, PSK) instead of their *conf counterparts:
- mbedtls_ssl_set_hs_own_cert()
- mbedtls_ssl_set_hs_ca_chain()
- mbedtls_ssl_set_hs_psk()
- using mbedtls_ssl_set_hostname().
- pointer, parameters reordered).
- place of mbedtls_ssl_conf_session_tickets() to enable session tickets.
- mbedtls_ssl_get_verify_result()
- mbedtls_x509_ctr_verify_info()
- mbedtls_x509_crt_verify() (flags, f_vrfy -> needs to be updated)
- mbedtls_ssl_conf_verify() (f_vrfy -> needs to be updated)
- parameter:
- mbedtls_base64_encode()
- mbedtls_base64_decode()
- mbedtls_mpi_write_string()
- mbedtls_dhm_calc_secret()
- changed type to "mbedtls_net_context *".
- return void.
- ecdsa_write_signature_det() was deprecated.
- mbedtls_x509write_crt_set_key_usage() changed from int to unsigned.
- available if POLARSSL_PEM_PARSE_C is defined (it never worked without).
- strings; use the new *_len variables instead of strlen().
- mbedtls_pk_parse_public_key() and mbedtls_dhm_parse_dhm() now expect the
- length parameter to include the terminating null byte for PEM input.
- layer and the memory_buffer_alloc module changed accordingly.
- (Thanks to Mansour Moufid for helping with the replacement.)
- (support for renegotiation now needs explicit enabling in config.h).
- in config.h
- between TCP and UDP, using the macros NET_PROTO_TCP or NET_PROTO_UDP.
- Their 'port' argument type is changed to a string.
- Removals
- mbedtls_ecp_muladd().
- (use generic functions from md.h)
- waiting function.
- been removed (compiler is required to support 32-bit operations).
- New deprecations
- argument (allowing memory savings if HMAC is not used)
- Semi-API changes (technically public, morally private)
- not supposed to be included by users.
- Default behavior changes
- default ciphersuite list returned by ssl_list_ciphersuites()
- compile time.
- enabled in the default configuration, this is only noticeable if using a
- custom config.h
- chain verification.
- mbedtls_cipher_info_from_string()
- mbedtls_ecp_curve_info_from_name()
- mbedtls_md_info_from_string()
- mbedtls_ssl_ciphersuite_from_string()
- mbedtls_version_check_feature()
- Requirement changes
- API changes from the 1.4 preview branch
- new prototype, and mbedtls_ssl_set_read_timeout().
- mbedtls_ssl_conf_transport()
- mbedtls_ssl_conf_max_version()
- mbedtls_ssl_conf_min_version()
- instead, see mbedtls_ssl_set_timer_cb(), with the Timing module providing
- an example implementation, see mbedtls_timing_delay_context and
- mbedtls_timing_set/get_delay().
- after a successful net_accept().
- Changes
- thread-safe if MBEDTLS_THREADING_C is enabled.
- more (at the expense of performance) MBEDTLS_SHA256_SMALLER.
- = mbed TLS 1.3 branch
- Security
- extendedKeyUsage on the leaf certificate was lost (results not accessible
- via ssl_get_verify_results()).
- https:
- Features
- (contributed by Peter Dettman).
- (contributed by Daniel Kahn Gillmor).
- the platform layer.
- layer (helps get rid of unwanted references).
- cross-compilation easier (thanks to Alon Bar-Lev).
- if POLARSSL_MEMORY_BUFFER_ALLOC_C and POLARSSL_MEMORY_DEBUG are defined.
- speed and RAM (heap only for now) usage.
- reduced configurations (PSK-CCM and NSA suite B).
- warnings on use of deprecated functions (with GCC and Clang only).
- errors on use of deprecated functions.
- Bugfix
- entropy_free() to crash (thanks to Rafał Przywara).
- once on the same context.
- by Bruno Pape).
- (detected by Clang's 3.6 UBSan).
- initialized but not set (found by pravic).
- doing it at runtime (using uname) rather that compile time.
- ssl_write() is called before the handshake is finished (introduced in
- 1.3.10) (first reported by Martin Blumenstingl).
- rejected.
- versions of mingw64 (found by kxjhlele).
- platforms.
- POLARSSL_SSL_SSESSION_TICKETS where both enabled in config.h (introduced
- in 1.3.10).
- Gergely Budai).
- curve picked by the server was actually allowed.
- Changes
- Junod).
- more flexible (warning: OFLAGS is not used any more) (see the README)
- (contributed by Alon Bar-Lev).
- performance impact was bad for some users (this was introduced in 1.3.10).
- (suggested by Thorsten Mühlfelder).
- "minimize" others (eg use stddef.h if only size_t is needed).
- brackets for uniformity with the rest of the code.
- = mbed TLS 1.3.10 released 2015-02-09
- Security
- full and polarssl_free() is called (found by Mark Hasemeyer)
- (only possible if POLARSSL_MEMORY_BUFFER_ALLOC_C is enabled, which it is
- not by default).
- crafted X.509 certificate (TLS server is not affected if it doesn't ask for a
- client certificate) (found using Codenomicon Defensics).
- (TLS server is not affected if it doesn't ask for a client certificate)
- (found using Codenomicon Defensics).
- (TLS server is not affected if it doesn't ask for a client certificate)
- (found using Codenomicon Defensics).
- Bleichenbacher-style attack in the RSA and RSA-PSK key exchanges
- (reported by Sebastian Schinzel).
- Features
- length of an X.509 verification chain.
- for pre-1.2 clients when multiple certificates are available.
- a compatible enough libc (eg uClibc).
- while using the default ciphersuite list.
- ciphersuite/certificate.
- Bugfix
- add_len (found by Jean-Philippe Aumasson) (not triggerable remotely).
- if memory_buffer_alloc_init() was called with buf not aligned and len not
- a multiple of POLARSSL_MEMORY_ALIGN_MULTIPLE (not triggerable remotely).
- by Julian Ospald).
- multiple of 8 (found by Gergely Budai).
- Peter Vaskovic).
- to a failed verification (found by Fredrik Axelsson).
- key exchanges enabled needs certificates. This fixes a possible interop
- issue with some servers when a zero-length extension was sent. (Reported
- by Peter Dettman.)
- (found by Hendrik van den Boogaard).
- Changes
- switch back to random with POLARSSL_SSL_AEAD_RANDOM_IV in config.h).
- but none of them is usable due to external factors such as no certificate
- with a suitable (extended)KeyUsage or curve or no PSK set.
- at runtime with ssl_set_truncated_hmac().
- = PolarSSL 1.3.9 released 2014-10-20
- Security
- TLS 1.2 (found by Darren Bane) (introduced in 1.3.8).
- (server is not affected if it doesn't ask for a client certificate)
- (found using Codenomicon Defensics).
- (not affected if ECC support was compiled out) (found using Codenomicon
- Defensics).
- Bugfix
- are defined but not POLARSSL_HAVE_TIME (found by Stephane Di Vito).
- renegotation was pending, and on client when a HelloRequest was received.
- write callback returned WANT_WRITE when requesting renegotiation.
- with non-blocking I/O.
- Vialletelle).
- Changes
- standard defining how to use SHA-2 with SSL 3.0).
- ambiguous on how to encode some packets with SSL 3.0).
- RSA is disabled, larger if POLARSSL_MPI_MAX_SIZE is larger.
- POLARSSL_ERR_SSL_UNEXPECTED_MESSAGE on harmless alerts.
- RSA keys.
- RelativeDistinguishedName are not accepted any more.
- = PolarSSL 1.3.8 released 2014-07-11
- Security
- It was possible to crash the server (and client) using crafted messages
- when a GCM suite was chosen.
- Features
- modules (certificates, CRLs and CSRs).
- from the default list (inactive by default).
- (ssl_set_renegotiation_enforced())
- ciphersuites to use and save some memory if the list is small.
- Changes
- required on some platforms (e.g. OpenBSD)
- against unwanted compiler optimizations
- strongest offered by client.
- usage pattern
- Bugfix
- size (found by TrustInSoft)
- Heinecke)
- use with some ciphersuites and versions (RC4 in all versions, CBC with
- versions < TLS 1.1).
- rejected with CBC-based ciphersuites and TLS >= 1.1
- to 32 bytes with CBC-based ciphersuites and TLS >= 1.1
- been removed in 1.3.6.)
- CA for use as an end entity certificate. (This had been removed in
- 1.3.6.)
- interpret semicolons as comment delimiters (found by Barry K. Nathan).
- caused some handshakes to fail.
- exchange that caused some handshakes to fail with other implementations.
- (Failure rate <= 1/255 with common DHM moduli.)
- tight buffers)
- by Hui Dong)
- = PolarSSL 1.3.7 released on 2014-05-02
- Features
- run-time
- Changes
- checked and filled in the relevant module headers
- Bugfix
- (found by Matthew Page)
- Karger)
- ciphersuites, for full SSL frames of data.
- ServerHello when no extensions are present (found by Matthew Page)
- big-endian platform when size was not an integer number of limbs
- (found by Barry K. Nathan)
- = PolarSSL 1.3.6 released on 2014-04-11
- Features
- certificates (POLARSSL_X509_CHECK_KEY_USAGE)
- (POLARSSL_X509_CHECK_EXTENDED_KEY_USAGE)
- Changes
- but shorter than the supplied length.
- Security
- (Found by Watson Ladd.)
- This affects certificates in the user-supplied chain except the top
- certificate. If the user-supplied chain contains only one certificates,
- it is not affected (ie, its notAfter date is properly checked).
- TrustInSoft)
- Bugfix
- calculation of RR.
- Gergely Budai).
- (found by Gergely Budai)
- Shuo Chen).
- error if the output buffer was just 1 byte too small.
- indication (found by Thijs Alkemade)
- stored in RAM due to missing 'const's (found by Gergely Budai).
- = PolarSSL 1.3.5 released on 2014-03-26
- Features
- (POLARSSL_ENTROPY_FORCE_SHA256)
- interoperability against OpenSSL and PolarSSL
- Changes
- now thread-safe if POLARSSL_THREADING_C defined
- that prevented bignum.c from compiling. (Reported by Rafael Baptista.)
- testing against GnuTLS
- Security
- "triple handshake" attack when authentication mode is 'optional' (the
- attack was already impossible when authentication is required).
- TrustInSoft)
- Bugfix
- statistics
- Alex Wilson.)
- send() would return an EAGAIN error when sending the ticket.
- client certificate.
- containing a client certificate
- out_ctr failed
- of one of them failed
- = PolarSSL 1.3.4 released on 2014-01-27
- Features
- Bugfix
- Sauerbeck)
- Security
- TrustInSoft)
- = PolarSSL 1.3.3 released on 2013-12-31
- Features
- (POLARSSL_SSL_SRV_RESPECT_CLIENT_PREFERENCE)
- Changes
- Bugfix
- TrustInSoft)
- ssl_write_certificate() (found by TrustInSoft)
- Security
- TrustInSoft)
- = PolarSSL 1.3.2 released on 2013-11-04
- Features
- Changes
- Bugfix
- = PolarSSL 1.3.1 released on 2013-10-15
- Features
- Changes
- Bugfix
- = PolarSSL 1.3.0 released on 2013-10-01
- Features
- (ECDHE-based ciphersuites)
- (ECDSA-based ciphersuites)
- (ISO/IEC 7816-4) padding and zero padding in the cipher layer
- ns_cert_type)
- issuer_key_identifier, etc)
- the same host (Not to be confused with SNI!)
- Changes
- individually
- Cipher and MD information
- dynamically set (Better support for hardware acceleration)
- prototypes for the RSA sign and verify functions changed as a result
- and maximum protocol version
- (Ability to keep old as well with POLARSSL_ERROR_STRERROR_BC)
- (POLARSSL_X509_ALLOW_EXTENSIONS_NON_V3)
- Bugfix
- Security
- (found by Cyril Arnaud and Pierre-Alain Fouque)
- = Version 1.2.14 released 2015-05-??
- Security
- crash it remotely (found by Caj Larsson).
- client to crash the server remotely if client authentication is enabled
- (found using Codenomicon Defensics).
- https:
- Bugfix
- versions of mingw64 (found by kxjhlele).
- platforms (found with Coverity Scan).
- = Version 1.2.13 released 2015-02-16
- Note: Although PolarSSL has been renamed to mbed TLS, no changes reflecting
- this will be made in the 1.2 branch at this point.
- Security
- crafted X.509 certificate (TLS server is not affected if it doesn't ask
- for a client certificate) (found using Codenomicon Defensics).
- (TLS server is not affected if it doesn't ask for a client certificate)
- (found using Codenomicon Defensics).
- (TLS server is not affected if it doesn't ask for a client certificate)
- found using Codenomicon Defensics).
- (TLS server is not affected if it doesn't ask for a client certificate).
- Bugfix
- add_len (found by Jean-Philippe Aumasson) (not triggerable remotely).
- in 1.2.12).
- Peter Vaskovic).
- to a failed verification (found by Fredrik Axelsson).
- key exchanges enabled needs certificates. This fixes a possible interop
- issue with some servers when a zero-length extension was sent. (Reported
- by Peter Dettman.)
- (found by Hendrik van den Boogaard).
- Changes
- length of an X.509 verification chain (default = 8).
- = Version 1.2.12 released 2014-10-24
- Security
- (server is not affected if it doesn't ask for a client certificate).
- (Found using Codenomicon Defensics.)
- Bugfix
- Vialletelle).
- with non-blocking I/O.
- renegotation was pending, and on client when a HelloRequest was received.
- Changes
- RelativeDistinguishedName are not accepted any more.
- POLARSSL_ERR_SSL_UNEXPECTED_MESSAGE on harmless alerts.
- = Version 1.2.11 released 2014-07-11
- Features
- Changes
- that prevented bignum.c from compiling. (Reported by Rafael Baptista.)
- against unwanted compiler optimizations
- Security
- "triple handshake" attack when authentication mode is optional (the
- attack was already impossible when authentication is required).
- TrustInSoft)
- It was possible to crash the server (and client) using crafted messages
- when a GCM suite was chosen.
- Bugfix
- TrustInSoft)
- ssl_write_certificate() (found by TrustInSoft)
- Alex Wilson.)
- out_ctr failed
- of one of them failed
- calculation of RR.
- when no extensions are present (found by Matthew Page)
- big-endian platform when size was not an integer number of limbs
- size (found by TrustInSoft)
- interpret semicolons as comment delimiters (found by Barry K. Nathan).
- tight buffers)
- = Version 1.2.10 released 2013-10-07
- Changes
- Bugfix
- = Version 1.2.9 released 2013-10-01
- Changes
- Bugfix
- Security
- (found by Cyril Arnaud and Pierre-Alain Fouque)
- = Version 1.2.8 released 2013-06-19
- Features
- settings without editing header files by using POLARSSL_CONFIG_OPTIONS
- Changes
- and specific DER parser functions for the PKCS#1 and unencrypted
- PKCS#8 private key formats
- symmetric cipher and hash algorithms (e.g. POLARSSL_AES_ALT in
- config.h)
- old PBKDF2 module
- Bugfix
- supports secure renegotiation
- instead of the x509parse_crt() wrapper that can also parse PEM
- certificates
- Security
- PEM-encoded certificates has been fixed (found by Jack Lloyd)
- = Version 1.2.7 released 2013-04-13
- Features
- Changes
- Bugfix
- = Version 1.2.6 released 2013-03-11
- Bugfix
- 128-bits (found by Yawning Angel)
- Changes
- rsa_pkcs1_sign() and rsa_pkcs1_verify() to separate PKCS#1 v1.5 and
- PKCS#1 v2.1 functions
- or rsa_rsaes_oaep_decrypt()
- POLARSSL_SSL_SRV_SUPPORT_SSLV2_CLIENT_HELLO is set
- information (not the entire chain)
- Security
- ssl_decrypt_buf()
- rsa_rsaes_pkcs1_v15_decrypt() and rsa_pkcs1_decrypt() for PKCS#1 v1.5
- operations
- = Version 1.2.5 released 2013-02-02
- Changes
- disabled by default and can be enabled with POLARSSL_SSL_DEBUG_ALL
- interoperability can be switched on/off with the flag
- POLARSSL_SSL_ALL_ALERT_MESSAGES
- Security
- ssl_decrypt_buf() due to badly formatted padding
- = Version 1.2.4 released 2013-01-25
- Changes
- SSL core
- Bugfix
- without DN list
- = Version 1.2.3 released 2012-11-26
- Bugfix
- = Version 1.2.2 released 2012-11-24
- Changes
- data
- Bugfixes
- = Version 1.2.1 released 2012-11-20
- Changes
- bottom-up (Peer cert depth is 0)
- Bugfixes
- Pégourié-Gonnard)
- Pégourié-Gonnard)
- = Version 1.2.0 released 2012-10-31
- Features
- ciphersuites (POLARSSL_ENABLE_WEAK_CIPHERSUITES). They are disabled by
- default!
- Alternative Name extension
- example application (programs/ssl/o_p_test) (requires OpenSSL)
- Changes
- to not match CN if subjectAltName extension is present (Closes ticket #56)
- POLARSSL_MODE_CFB, to also handle different block size CFB modes.
- in SSL/TLS
- Bugfix
- Hui Dong)
- #52)
- RFC 2313
- with carry rollover (found by Ruslan Yushchenko)
- Security
- Vanderbeken)
- = Version 1.1.8 released on 2013-10-01
- Bugfix
- Security
- both TrustInSoft and Paul Brodeur of Leviathan Security Group)
- = Version 1.1.7 released on 2013-06-19
- Changes
- Bugfix
- instead of the x509parse_crt() wrapper that can also parse PEM
- certificates
- Security
- PEM-encoded certificates has been fixed (found by Jack Lloyd)
- = Version 1.1.6 released on 2013-03-11
- Bugfix
- Changes
- disabled by default and can be enabled with POLARSSL_SSL_DEBUG_ALL
- Security
- ssl_decrypt_buf()
- rsa_rsaes_pkcs1_v15_decrypt() and rsa_pkcs1_decrypt() for PKCS#1 v1.5
- operations
- = Version 1.1.5 released on 2013-01-16
- Bugfix
- with carry rollover
- #52)
- Pégourié-Gonnard)
- Pégourié-Gonnard)
- RFC 2313
- Security
- Vanderbeken)
- = Version 1.1.4 released on 2012-05-31
- Bugfix
- = Version 1.1.3 released on 2012-04-29
- Bugfix
- = Version 1.1.2 released on 2012-04-26
- Bugfix
- Hui Dong)
- Security
- Frama-C team at CEA LIST)
- Yushchenko)
- = Version 1.1.1 released on 2012-01-23
- Bugfix
- (Closes ticket #47, found by Hugo Leisink)
- = Version 1.1.0 released on 2011-12-22
- Features
- SSL contexts without needing to set all non-connection-specific
- data and pointers again. Adapted ssl_server to use this functionality.
- supported version to a server to help buggy server implementations.
- (Closes ticket #36)
- introspection functions (Closes ticket #40)
- custom entropy sources and added some generic and platform dependent
- entropy sources
- Changes
- encryption and private key for decryption. (Closes ticket #34)
- So now there is a module that is controlled with POLARSSL_ASN1_PARSE_C.
- parity bits, to prevent mistakes in copying data. (Closes ticket #33)
- (Credits go to Marco Lizza)
- trade-off
- management (Closes ticket #44)
- havege_rand() to havege_random() to prevent mistakes. Lots of changes as
- a consequence in library code and programs
- x509parse_crtfile(). With permissive parsing the parsing does not stop on
- encountering a parse-error. Beware that the meaning of return values has
- changed!
- Bugfix
- ticket #37)
- before version numbers
- standard 1 byte version sometimes used by Microsoft. (Closes ticket #38)
- smaller than the hash length. (Closes ticket #41)
- appended with '....' after first 28 octets
- certificates and CRLs
- = Version 1.0.0 released on 2011-07-27
- Features
- Changes
- codes instead of integers
- Bugfix
- #18)
- = Version 0.99-pre5 released on 2011-05-26
- Features
- (AES CTR, Camellia CTR, XTEA CBC) including the option to
- enable and disable individual modes when needed
- by undefining POLARSSL_FS_IO
- error codes and their description.
- functions.
- Changes
- instead of int for buffer lengths and loop variables for
- better unsigned / signed use. Renamed internal bigint types
- t_int and t_dbl to t_uint and t_udbl in the process
- argument and do not accept variable argument lists anymore.
- is now done with a PLUS instead of an OR as error codes
- used are negative.
- net_recv() now returns 0 on EOF instead of
- POLARSSL_ERR_NET_CONN_RESET. ssl_fetch_input() returns
- POLARSSL_ERR_SSL_CONN_EOF on an EOF from its f_recv() function.
- ssl_read() returns 0 if a POLARSSL_ERR_SSL_CONN_EOF is received
- after the handshake.
- POLARSSL_ERR_NET_WANT_WRITE instead of the ambiguous
- POLARSSL_ERR_NET_TRY_AGAIN
- = Version 0.99-pre4 released on 2011-04-01
- Features
- for the RSAES-OAEP and RSASSA-PSS operations.
- functionality as well.
- with random data (Fixed ticket #10)
- Changes
- displays actual bit size of the value.
- does not zeroize memory in advance anymore. Use rsa_init()
- before parsing a key or keyfile!
- Bugfix
- platform (32-bit / 64-bit) (Fixes ticket #19, found by Mads
- Kiilerich and Mihai Militaru)
- #18, found by Nikolay Epifanov)
- length salt lengths
- = Version 0.99-pre3 released on 2011-02-28
- This release replaces version 0.99-pre2 which had possible copyright issues.
- Features
- are now supported as well (Fixes ticket #5)
- printing of X509 CRLs from file
- Changes
- ticket #13). Also possible to remove PEM support for
- systems only using DER encoding
- Bugfixes
- after 1950
- (found by Mads Kiilerich)
- certificates (found by Mads Kiilerich)
- to negotiate anonymous connection (Fixes ticket #12,
- found by Boris Krasnovskiy)
- Security fixes
- Diffie Hellman key exchange (thanks to Larry Highsmith,
- Subreption LLC)
- = Version 0.99-pre1 released on 2011-01-30
- Features
- Note: Most of these features have been donated by Fox-IT
- certificate fields, including Key Usage
- against the available CRLs
- applications:
- + Added generic message digest and cipher wrapper
- + Improved information about current capabilities,
- status, objects and configuration
- + Added verification callback on certificate chain
- verification to allow external blacklisting
- + Additional example programs to show usage
- libpkcs11-helper library
- Changes
- the existing date check
- of ssl_session have been renamed to ciphersuites and
- ciphersuite respectively. This clarifies the difference
- with the generic cipher layer and is better naming
- altogether
- = Version 0.14.0 released on 2010-08-16
- Features
- SSL_EDH_RSA_CAMELLIA_128_SHA ciphersuites
- Changes
- Now using random fuction provided to function and
- changed the prototype of rsa_pkcs1_encrypt(),
- rsa_init() and rsa_gen_key().
- future confusion
- Bug fixes
- kkert)
- generator
- = Version 0.13.1 released on 2010-03-24
- Bug fixes
- = Version 0.13.0 released on 2010-03-21
- Features
- ssl_client2
- printing of X509 certificates from file or SSL
- connection.
- Changes
- in a function to allow easy future expansion
- identical interface (returning int result values)
- for specific use-cases
- Bug fixes
- certificate in the chain in ssl_write_certificate() and
- ssl_write_certificate_request() (found by fatbob)
- (found by Frank de Brabander)
- Smbat Tonoyan)
- = Version 0.12.1 released on 2009-10-04
- Changes
- tagging system.
- the defines.
- Bug fixes
- by Eduardo)
- = Version 0.12.0 released on 2009-07-28
- Features
- Base64, MPI, SHA-family, MD-family, HMAC-SHA-family,
- Camellia, DES, 3-DES, RSA PKCS#1, XTEA, Diffie-Hellman
- and X509parse.
- Changes
- this is mind when checking for errors.
- to indicate invalid key lengths.
- Bug fixes
- Gabriel)
- Apples (found by Martin van Hensbergen)
- required HMAC ipad and opad variables are not cleared.
- (found by code coverage tests)
- POLARSSL_HAVE_LONGLONG not defined (found by Giles
- Bathgate).
- mpi_read_string() (found by code coverage tests).
- rsa_check_pubkey() and rsa_check_privkey() (found by
- code coverage tests).
- value in mpi_add_abs() (found by code coverage tests).
- value in mpi_sub_abs() (found by code coverage tests).
- value in mpi_mod_mpi() and mpi_mod_int(). Resulting
- change also affects mpi_write_string() (found by code
- coverage tests).
- code coverage tests).
- = Version 0.11.1 released on 2009-05-17
- SHA-512 in rsa_pkcs1_sign()
- = Version 0.11.0 released on 2009-05-03
- input numbers are even and added testcases to check
- (found by Pierre Habouzit).
- one way hash functions with the PKCS#1 v1.5 signing and
- verification.
- POLARSSL_GENPRIME block.
- handling of 'full' certificate chains (found by Mathias
- Olsson).
- load_file()
- systems (Found by Gernot).
- padlock and timing code.
- responsible for crashes and unwanted behaviour.
- SSL/TLS code.
- (found by Felix von Leitner).
- = Version 0.10.0 released on 2009-01-12
- SSL_RSA_CAMELLIA_256_SHA and SSL_EDH_RSA_CAMELLIA_256_SHA
- rsa_pkcs1_decrypt (found by Christophe Devine)
- ================================================================
- XySSL ChangeLog
- = Version 0.9 released on 2008-03-16
- be sent twice in non-blocking mode when send returns EAGAIN
- not be swapped in the SSLv2 ClientHello (found by Greg Robson)
- not swapped on PadLock; also fixed compilation on older versions
- of gcc (bug reported by David Barrett)
- output data is non-aligned by falling back to the software
- implementation, as VIA Nehemiah cannot handle non-aligned buffers
- Robson-Garth; some x509write.c fixes by Pascal Vizeli, thanks to
- Matthew Page who reported several bugs
- an INTEGER instead of a BOOLEAN for BasicConstraints::cA.
- (patch contributed by David Patino)
- string is passed as the CN (bug reported by spoofy)
- selftest and benchmark to not test ciphers that have been disabled
- serial number, setup correct server port in the ssl client example
- peer may cause xyssl to loop indefinitely by sending a certificate
- for which the RSA signature check fails (bug reported by Benoit)
- HMAC-MD5, HMAC-SHA1, HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512
- Daniel Bleichenbacher attack on PKCS#1 v1.5 padding, as well
- as the Klima-Pokorny-Rosa extension of Bleichenbacher's attack
- David Barrett and Dusan Semen
- = Version 0.8 released on 2007-10-20
- than 64 bytes, thanks to Stephane Desneux and gary ng
- message digests, which fixes IE6/IE7 client authentication
- RSA_PUBLIC and RSA_PRIVATE, as suggested by David Barrett
- the sign of zero as positive in mpi_init() (reported
- by Jonathan M. McCune)
- = Version 0.7 released on 2007-07-07
- connections from being established with non-blocking I/O
- dh_client, dh_server, rsa_genkey, rsa_sign, rsa_verify
- how to create a test PKI
- = Version 0.6 released on 2007-04-01
- time, to reduce the memory footprint on embedded systems
- havege_struct for this processor, thanks to David Patiño
- thanks to Peking University and the OSU Open Source Lab
- was not being correctly defined on ARM and MIPS
- = Version 0.5 released on 2007-03-01
- (thanks to Benjamin Newman), HP-UX, FreeBSD and Solaris
- size of 16384 bytes to be rejected
- = Version 0.4 released on 2007-02-01
- generated) and in ssl_parse_client_hello (max. client
- version was not properly set), thanks to Didier Rebeix
- cipherlists larger than 96 bytes were incorrectly rejected
- = Version 0.3 released on 2007-01-01
- thanks to Xosé Antón Otero Ferreira
- the bignum code is no longer dependent on long long
- and 486 processors, thanks to Arnaud Cornet
- = Version 0.2 released on 2006-12-01
- valid RSA keys to be dismissed (thanks to oldwolf)
- the Miller-Rabin primality test
- I'd also like to thank Younès Hafri for the CRUX linux port,
- Khalil Petit who added XySSL into pkgsrc and Arnaud Cornet
- who maintains the Debian package :-)
- = Version 0.1 released on 2006-11-01
|