forked from wolfSSL/wolfssl
Release Update
1. Update the usual versions. 2. Update README and ChangeLog. 3. Modify genecc and renewcerts to update two certificate files that had expired. 4. Update the expired certificate files.
This commit is contained in:
114
ChangeLog.md
114
ChangeLog.md
@@ -1,25 +1,123 @@
|
|||||||
# wolfSSL Release 4.4.1 (XX/XX/2020) **IN DEVELOPMENT**
|
# wolfSSL Release 4.5.0 (August 13, 2020)
|
||||||
|
|
||||||
If you have questions about this release, then feel free to contact us on our
|
If you have questions about this release, feel free to contact us on our
|
||||||
info@ address.
|
info@ address.
|
||||||
|
|
||||||
Release 4.4.1 of wolfSSL embedded TLS has bug fixes and new features including:
|
Release 4.5.0 of wolfSSL embedded TLS has bug fixes and new features including:
|
||||||
|
|
||||||
## New Feature Additions
|
## New Feature Additions
|
||||||
|
|
||||||
* Place holder.
|
* Added Xilinx Vitis 2019.2 example and README updates
|
||||||
|
* TLS v1.3 is now enabled by default
|
||||||
|
* Building FIPS 140-2 code and test on Solaris
|
||||||
|
* Secure renegotiation with DTLS 1.2
|
||||||
|
* Update RSA calls for hardware acceleration with Xilsecure
|
||||||
|
* Additional OpenSSL compatibility layer functions added
|
||||||
|
* Cypress PSoC6 wolfCrypt driver added
|
||||||
|
* Added STM32CubeIDE support
|
||||||
|
* Added certificate parsing and inspection to C# wrapper layer
|
||||||
|
* TLS v1.3 sniffer support added
|
||||||
|
* TSIP v1.09 for target board GR-ROSE support added
|
||||||
|
* Added support for the "X72N Envision Kit" evaluation board
|
||||||
|
* Support for ECC nonblocking using the configure options
|
||||||
|
"--enable-ecc=nonblock --enable-sp=yes,nonblock CFLAGS=-DWOLFSSL_PUBLIC_MP"
|
||||||
|
* Added wc_curve25519_make_pub function to generate a public key given the
|
||||||
|
private one
|
||||||
|
|
||||||
## Fixes
|
## Fixes
|
||||||
|
|
||||||
* Place holder.
|
* PIC32MZ hardware cache and large hashes fix
|
||||||
|
* AES-GCM use with EVP layer in compatibility layer code
|
||||||
|
* Fix for RSA_LOW_MEM with ARM build of SP code
|
||||||
|
* Sanity check on tag length with AES-CCM to conform with RFC 3610
|
||||||
|
* Fixes for 32 and 64 bit software implementations of SP code when
|
||||||
|
WOLFSSL_SP_CACHE_RESISTANT is defined
|
||||||
|
* GCC warning fixes for GCC 9 and later
|
||||||
|
* Sanity check on HKDF expand length to conform with RFC 5869
|
||||||
|
* Fixes for STM32 CubeMX HAL with AES-GCM
|
||||||
|
* Fixed point cache look up table (LUT) implementation fixes
|
||||||
|
* Fix for ARM 32bit SP code when calling div word
|
||||||
|
* Fix for potential out of bounds read when parsing CRLs
|
||||||
|
* Fix for potential out of bounds read with RSA unpadding
|
||||||
|
* AES-CCM optimized counter fix
|
||||||
|
* Updates to Xcode projects for new files and features
|
||||||
|
* Fix for adding CRL’s to a WOLFSSL_X509_STORE structure
|
||||||
|
* FIPSv2 build with opensslall build fixes
|
||||||
|
* Fixes for CryptoCell use with ECC and signature wrappers
|
||||||
|
* Fix for mod calculation with SP code dealing with 3072 bit keys
|
||||||
|
* Fix for handling certificates with multiple OU’s in name
|
||||||
|
* Fix for SP math implementation of sp_add_d and add a sanity check on
|
||||||
|
rshb range
|
||||||
|
* Fix for sanity check on padding with DES3 conversion of PEM to DER
|
||||||
|
* Sanity check for potential out of bounds read with fp_read_radix_16
|
||||||
|
|
||||||
## Improvements/Optimizations
|
## Improvements/Optimizations
|
||||||
|
|
||||||
* Place holder.
|
* TLS 1.3 certificate verify update to handle 8192 bit RSA keys
|
||||||
|
* wpa_supplicant support with reduced code size option
|
||||||
|
* TLS 1.3 alerts encrypted when possible
|
||||||
|
* Many minor coverity fixes added
|
||||||
|
* Error checking when parsing PKCS12 DER
|
||||||
|
* IAR warning in test.c resolved
|
||||||
|
* ATECC608A improvements for use with Harmony 3 and PIC32 MZ
|
||||||
|
* Support for AES-GCM and wc_SignatureVerifyHash with static memory and no
|
||||||
|
malloc’s
|
||||||
|
* Enable SNI by default with JNI/JSSE builds
|
||||||
|
* NetBSD GCC compiler warnings resolved
|
||||||
|
* Additional test cases and code coverage added including curve25519 and
|
||||||
|
curve448 tests
|
||||||
|
* Option for user defined mutexes with WOLFSSL_USER_MUTEX
|
||||||
|
* Sniffer API’s for loading buffer directly
|
||||||
|
* Fixes and improvements from going through the DO-178 process were added
|
||||||
|
* Doxygen updates and fixes for auto documentation generation
|
||||||
|
|
||||||
## This release of wolfSSL includes fixes for X security vulnerabilities.
|
## This release of wolfSSL includes fixes for 5 security vulnerabilities.
|
||||||
|
|
||||||
* Place holder.
|
wolfSSL version 4.5.0 contains 5 vulnerability fixes: 2 fixes for TLS 1.3,
|
||||||
|
2 side channel attack mitigations, and 1 fix for a potential private key
|
||||||
|
leak in a specific use case.
|
||||||
|
|
||||||
|
* In earlier versions of wolfSSL there exists a potential man in the middle
|
||||||
|
attack on TLS 1.3 clients. Malicious attackers with a privileged network
|
||||||
|
position can impersonate TLS 1.3 servers and bypass authentication. Users
|
||||||
|
that have applications with client side code and have TLS 1.3 turned on,
|
||||||
|
should update to the latest version of wolfSSL. Users that do not have
|
||||||
|
TLS 1.3 turned on, or that are server side only, are NOT affected by this
|
||||||
|
report. Thanks to Gerald Doussot from NCC group for the report.
|
||||||
|
* Denial of service attack on TLS 1.3 servers from repetitively sending
|
||||||
|
ChangeCipherSpecs messages. This denial of service results from the
|
||||||
|
relatively low effort of sending a ChangeCipherSpecs message versus the
|
||||||
|
effort of the server to process that message. Users with TLS 1.3 servers are
|
||||||
|
recommended to update to the most recent version of wolfSSL which limits the
|
||||||
|
number of TLS 1.3 ChangeCipherSpecs that can be received in order to avoid
|
||||||
|
this DoS attack. CVE-2020-12457 was reserved for the report. Thanks to
|
||||||
|
Lenny Wang of Tencent Security Xuanwu LAB.
|
||||||
|
* Potential cache timing attacks on public key operations in builds that are
|
||||||
|
not using SP (single precision). Users that have a system where malicious
|
||||||
|
agents could execute code on the system, are not using the SP build with
|
||||||
|
wolfSSL, and are doing private key operations on the system (such as signing
|
||||||
|
with a private key) are recommended to regenerate private keys and update to
|
||||||
|
the most recent version of wolfSSL. CVE-2020-15309 is reserved for this
|
||||||
|
issue. Thanks to Ida Bruhns from Universität zu Lübeck for the report.
|
||||||
|
* When using SGX with EC scalar multiplication the possibility of side-channel
|
||||||
|
attacks are present. To mitigate the risk of side channel attacks wolfSSL’s
|
||||||
|
single precision EC operations should be used instead. Release 4.5.0 turns
|
||||||
|
this on be default now with SGX builds and in previous versions of wolfSSL
|
||||||
|
this can be turned on by using the WOLFSSL_SP macros. Thank you to
|
||||||
|
Alejandro Cabrera Aldaya, Cesar Pereida García and Billy Bob Brumley from
|
||||||
|
the Network and Information Security Group (NISEC) at Tampere University for
|
||||||
|
the report.
|
||||||
|
* Leak of private key in the case that PEM format private keys are bundled in
|
||||||
|
with PEM certificates into a single file. This is due to the
|
||||||
|
misclassification of certificate type versus private key type when parsing
|
||||||
|
through the PEM file. To be affected, wolfSSL would need to have been built
|
||||||
|
with OPENSSL_EXTRA (--enable-opensslextra). Some build variants such as
|
||||||
|
--enable-all and --enable-opensslall also turn on this code path, checking
|
||||||
|
wolfssl/options.h for OPENSSL_EXTRA will show if the macro was used with the
|
||||||
|
build. If having built with the opensslextra enable option and having placed
|
||||||
|
PEM certificates with PEM private keys in the same file when loading up the
|
||||||
|
certificate file, then we recommend updating wolfSSL for this use case and
|
||||||
|
also recommend regenerating any private keys in the file.
|
||||||
|
|
||||||
For additional vulnerability information visit the vulnerability page at
|
For additional vulnerability information visit the vulnerability page at
|
||||||
https://www.wolfssl.com/docs/security-vulnerabilities/
|
https://www.wolfssl.com/docs/security-vulnerabilities/
|
||||||
|
202
README
202
README
@@ -73,120 +73,126 @@ should be used for the enum name.
|
|||||||
*** end Notes ***
|
*** end Notes ***
|
||||||
|
|
||||||
|
|
||||||
# wolfSSL Release 4.4.0 (04/22/2020)
|
# wolfSSL Release 4.5.0 (August 13, 2020)
|
||||||
|
|
||||||
If you have questions about this release, feel free to contact us on our
|
If you have questions about this release, feel free to contact us on our
|
||||||
info@ address.
|
info@ address.
|
||||||
|
|
||||||
Release 4.4.0 of wolfSSL embedded TLS has bug fixes and new features including:
|
Release 4.5.0 of wolfSSL embedded TLS has bug fixes and new features including:
|
||||||
|
|
||||||
## New Feature Additions
|
## New Feature Additions
|
||||||
|
|
||||||
* Hexagon support.
|
* Added Xilinx Vitis 2019.2 example and README updates
|
||||||
* DSP builds to offload ECC verify operations.
|
* TLS v1.3 is now enabled by default
|
||||||
* Certificate Manager callback support.
|
* Building FIPS 140-2 code and test on Solaris
|
||||||
* New APIs for running updates to ChaCha20/Poly1305 AEAD.
|
* Secure renegotiation with DTLS 1.2
|
||||||
* Support for use with Apache.
|
* Update RSA calls for hardware acceleration with Xilsecure
|
||||||
* Add support for IBM s390x.
|
* Additional OpenSSL compatibility layer functions added
|
||||||
* PKCS8 support for ED25519.
|
* Cypress PSoC6 wolfCrypt driver added
|
||||||
* OpenVPN support.
|
* Added STM32CubeIDE support
|
||||||
* Add P384 curve support to SP.
|
* Added certificate parsing and inspection to C# wrapper layer
|
||||||
* Add BIO and EVP API.
|
* TLS v1.3 sniffer support added
|
||||||
* Add AES-OFB mode.
|
* TSIP v1.09 for target board GR-ROSE support added
|
||||||
* Add AES-CFB mode.
|
* Added support for the "X72N Envision Kit" evaluation board
|
||||||
* Add Curve448, X448, and Ed448.
|
* Support for ECC nonblocking using the configure options
|
||||||
* Add Renesas Synergy S7G2 build and hardware acceleration.
|
"--enable-ecc=nonblock --enable-sp=yes,nonblock CFLAGS=-DWOLFSSL_PUBLIC_MP"
|
||||||
|
* Added wc_curve25519_make_pub function to generate a public key given the
|
||||||
|
private one
|
||||||
|
|
||||||
## Fixes
|
## Fixes
|
||||||
|
|
||||||
* Fix for RSA public encrypt / private sign with RSA key sizes over 2048-bit.
|
* PIC32MZ hardware cache and large hashes fix
|
||||||
* Correct misspellings.
|
* AES-GCM use with EVP layer in compatibility layer code
|
||||||
* Secure renegotiation fix.
|
* Fix for RSA_LOW_MEM with ARM build of SP code
|
||||||
* Fix memory leak when using ATECC and non-SECP256R1 curves for sign, verify,
|
* Sanity check on tag length with AES-CCM to conform with RFC 3610
|
||||||
or shared secret.
|
* Fixes for 32 and 64 bit software implementations of SP code when
|
||||||
* Fix for K64 MMCAU with `WOLFSSL_SMALL_STACK_CACHE`.
|
WOLFSSL_SP_CACHE_RESISTANT is defined
|
||||||
* Fix the RSA verify only build.
|
* GCC warning fixes for GCC 9 and later
|
||||||
* Fix in SP C implementation for small stack.
|
* Sanity check on HKDF expand length to conform with RFC 5869
|
||||||
* Fix using the auth key id extension is set, hash might not be present.
|
* Fixes for STM32 CubeMX HAL with AES-GCM
|
||||||
* Fix when flattening certificate structure to include the subject alt names.
|
* Fixed point cache look up table (LUT) implementation fixes
|
||||||
* Fixes for building with ECC sign/verify only.
|
* Fix for ARM 32bit SP code when calling div word
|
||||||
* Fix for ECC and no cache resistance.
|
* Fix for potential out of bounds read when parsing CRLs
|
||||||
* Fix memory leak in DSA.
|
* Fix for potential out of bounds read with RSA unpadding
|
||||||
* Fix build on minGW.
|
* AES-CCM optimized counter fix
|
||||||
* Fix `PemToDer()` call in `ProcessBuffer()` to set more than ECC.
|
* Updates to Xcode projects for new files and features
|
||||||
* Fix for using RSA without SHA-512.
|
* Fix for adding CRL’s to a WOLFSSL_X509_STORE structure
|
||||||
* Add some close tags to the echoserver HTTP example output.
|
* FIPSv2 build with opensslall build fixes
|
||||||
* Miscellaneous fixes and updates for static analysis reports.
|
* Fixes for CryptoCell use with ECC and signature wrappers
|
||||||
* Fixes for time structure support.
|
* Fix for mod calculation with SP code dealing with 3072 bit keys
|
||||||
* Fixes for VxWorks support.
|
* Fix for handling certificates with multiple OU’s in name
|
||||||
* Fixes for Async crypto support.
|
* Fix for SP math implementation of sp_add_d and add a sanity check on
|
||||||
* Fix cache resist compile to work with SP C code.
|
rshb range
|
||||||
* Fixes for Curve25519 x64 asm.
|
* Fix for sanity check on padding with DES3 conversion of PEM to DER
|
||||||
* Fix for SP x64 div.
|
* Sanity check for potential out of bounds read with fp_read_radix_16
|
||||||
* Fix for DTLS edge case where CCS and Finished come out of order and the
|
|
||||||
retransmit pool gets flushed.
|
|
||||||
* Fix for infinite loop in SHA-1 with small inputs. Thanks to Peter W.
|
|
||||||
* Fix for FIPS Hmac where `wc_HmacInit()` isn't used. `wc_HmacSetKey()` needs
|
|
||||||
to initialize the Hmac structure. Type is set to NONE, and checked against
|
|
||||||
NONE, not 0.
|
|
||||||
* Fixes for SP RSA private operations.
|
|
||||||
* Fixes for Xilinx SDK and Zynq UltraScale+ MPSoC
|
|
||||||
* Fix leak when building with HAVE_AESGCM and NO_AES_DECRYPT. Thanks G.G.
|
|
||||||
* Fixes for building ECC without ASN.
|
|
||||||
* Fix for async TLSv1.3 issues.
|
|
||||||
* Fix `wc_KeyPemToDer()` with PKCS1 and empty key.
|
|
||||||
* Omit `-fomit-frame-pointer` from CFLAGS in configure.ac.
|
|
||||||
|
|
||||||
## Improvements/Optimizations
|
## Improvements/Optimizations
|
||||||
|
|
||||||
* Qt 5.12 and 5.13 support.
|
* TLS 1.3 certificate verify update to handle 8192 bit RSA keys
|
||||||
* Added more digest types to Cryptocell RSA sign/verify.
|
* wpa_supplicant support with reduced code size option
|
||||||
* Some memory usage improvements.
|
* TLS 1.3 alerts encrypted when possible
|
||||||
* Speed improvements for mp_rand.
|
* Many minor coverity fixes added
|
||||||
* Improvements to CRL and OCSP support.
|
* Error checking when parsing PKCS12 DER
|
||||||
* Refactor Poly1305 AEAD/MAC to reduce duplicate code.
|
* IAR warning in test.c resolved
|
||||||
* Add blinding to RSA key gen.
|
* ATECC608A improvements for use with Harmony 3 and PIC32 MZ
|
||||||
* Improvements to blinding.
|
* Support for AES-GCM and wc_SignatureVerifyHash with static memory and no
|
||||||
* Improvement and expansion of OpenSSL Compatibility Layer.
|
malloc’s
|
||||||
* Improvements to ChaCha20.
|
* Enable SNI by default with JNI/JSSE builds
|
||||||
* Improvements to X.509 processing.
|
* NetBSD GCC compiler warnings resolved
|
||||||
* Improvements to ECC support.
|
* Additional test cases and code coverage added including curve25519 and
|
||||||
* Improvement in detecting 64-bit support.
|
curve448 tests
|
||||||
* Refactor to combine duplicate ECC parameter parsing code.
|
* Option for user defined mutexes with WOLFSSL_USER_MUTEX
|
||||||
* Improve keyFormat to be set by algId and let later key parsing produce fail.
|
* Sniffer API’s for loading buffer directly
|
||||||
* Add test cases for 3072-bit and 4096-bit RSA keys.
|
* Fixes and improvements from going through the DO-178 process were added
|
||||||
* Improve signature wrapper and DH test cases.
|
* Doxygen updates and fixes for auto documentation generation
|
||||||
* Improvements to the configure.ac script.
|
|
||||||
* Added constant time RSA q modinv p.
|
|
||||||
* Improve performance of SP Intel 64-bit asm.
|
|
||||||
* Added a few more functions to the ABI list.
|
|
||||||
* Improve TLS bidirectional shutdown behavior.
|
|
||||||
* OpenSSH 8.1 support.
|
|
||||||
* Improve performance of RSA/DH operations on x64.
|
|
||||||
* Add support for PKCS7/CMS Enveloped data with fragmented encrypted content.
|
|
||||||
* Example linker description for FIPS builds to enforce object ordering.
|
|
||||||
* C# wrapper improvements. Added TLS client example and TLSv1.3 methods.
|
|
||||||
* Allow setting MTU in DTLS.
|
|
||||||
* Improve PKCS12 create for outputting encrypted bundles.
|
|
||||||
* Constant time EC map to affine for private operations.
|
|
||||||
* Improve performance of RSA public key ops with TFM.
|
|
||||||
* Smaller table version of AES encrypt/decrypt.
|
|
||||||
* Support IAR with position independent code (ROPI).
|
|
||||||
* Improve speed of AArch64 assembly.
|
|
||||||
* Support AES-CTR on esp32.
|
|
||||||
* Add a no malloc option for small SP math.
|
|
||||||
|
|
||||||
## This release of wolfSSL includes fixes for 2 security vulnerabilities.
|
## This release of wolfSSL includes fixes for 5 security vulnerabilities.
|
||||||
|
|
||||||
* For fast math, use a constant time modular inverse when mapping to affine
|
wolfSSL version 4.5.0 contains 5 vulnerability fixes: 2 fixes for TLS 1.3,
|
||||||
when operation involves a private key - keygen, calc shared secret, sign.
|
2 side channel attack mitigations, and 1 fix for a potential private key
|
||||||
Thank you to Alejandro Cabrera Aldaya, Cesar Pereida García and
|
leak in a specific use case.
|
||||||
Billy Bob Brumley from the Network and Information Security Group (NISEC)
|
|
||||||
at Tampere University for the report.
|
|
||||||
|
|
||||||
* Change constant time and cache resistant ECC mulmod. Ensure points being
|
* In earlier versions of wolfSSL there exists a potential man in the middle
|
||||||
operated on change to make constant time. Thank you to Pietro Borrello at
|
attack on TLS 1.3 clients. Malicious attackers with a privileged network
|
||||||
Sapienza University of Rome.
|
position can impersonate TLS 1.3 servers and bypass authentication. Users
|
||||||
|
that have applications with client side code and have TLS 1.3 turned on,
|
||||||
|
should update to the latest version of wolfSSL. Users that do not have
|
||||||
|
TLS 1.3 turned on, or that are server side only, are NOT affected by this
|
||||||
|
report. Thanks to Gerald Doussot from NCC group for the report.
|
||||||
|
* Denial of service attack on TLS 1.3 servers from repetitively sending
|
||||||
|
ChangeCipherSpecs messages. This denial of service results from the
|
||||||
|
relatively low effort of sending a ChangeCipherSpecs message versus the
|
||||||
|
effort of the server to process that message. Users with TLS 1.3 servers are
|
||||||
|
recommended to update to the most recent version of wolfSSL which limits the
|
||||||
|
number of TLS 1.3 ChangeCipherSpecs that can be received in order to avoid
|
||||||
|
this DoS attack. CVE-2020-12457 was reserved for the report. Thanks to
|
||||||
|
Lenny Wang of Tencent Security Xuanwu LAB.
|
||||||
|
* Potential cache timing attacks on public key operations in builds that are
|
||||||
|
not using SP (single precision). Users that have a system where malicious
|
||||||
|
agents could execute code on the system, are not using the SP build with
|
||||||
|
wolfSSL, and are doing private key operations on the system (such as signing
|
||||||
|
with a private key) are recommended to regenerate private keys and update to
|
||||||
|
the most recent version of wolfSSL. CVE-2020-15309 is reserved for this
|
||||||
|
issue. Thanks to Ida Bruhns from Universität zu Lübeck for the report.
|
||||||
|
* When using SGX with EC scalar multiplication the possibility of side-channel
|
||||||
|
attacks are present. To mitigate the risk of side channel attacks wolfSSL’s
|
||||||
|
single precision EC operations should be used instead. Release 4.5.0 turns
|
||||||
|
this on be default now with SGX builds and in previous versions of wolfSSL
|
||||||
|
this can be turned on by using the WOLFSSL_SP macros. Thank you to
|
||||||
|
Alejandro Cabrera Aldaya, Cesar Pereida García and Billy Bob Brumley from
|
||||||
|
the Network and Information Security Group (NISEC) at Tampere University for
|
||||||
|
the report.
|
||||||
|
* Leak of private key in the case that PEM format private keys are bundled in
|
||||||
|
with PEM certificates into a single file. This is due to the
|
||||||
|
misclassification of certificate type versus private key type when parsing
|
||||||
|
through the PEM file. To be affected, wolfSSL would need to have been built
|
||||||
|
with OPENSSL_EXTRA (--enable-opensslextra). Some build variants such as
|
||||||
|
--enable-all and --enable-opensslall also turn on this code path, checking
|
||||||
|
wolfssl/options.h for OPENSSL_EXTRA will show if the macro was used with the
|
||||||
|
build. If having built with the opensslextra enable option and having placed
|
||||||
|
PEM certificates with PEM private keys in the same file when loading up the
|
||||||
|
certificate file, then we recommend updating wolfSSL for this use case and
|
||||||
|
also recommend regenerating any private keys in the file.
|
||||||
|
|
||||||
For additional vulnerability information visit the vulnerability page at
|
For additional vulnerability information visit the vulnerability page at
|
||||||
https://www.wolfssl.com/docs/security-vulnerabilities/
|
https://www.wolfssl.com/docs/security-vulnerabilities/
|
||||||
|
202
README.md
202
README.md
@@ -73,120 +73,126 @@ should be used for the enum name.
|
|||||||
*** end Notes ***
|
*** end Notes ***
|
||||||
|
|
||||||
|
|
||||||
# wolfSSL Release 4.4.0 (04/22/2020)
|
# wolfSSL Release 4.5.0 (August 13, 2020)
|
||||||
|
|
||||||
If you have questions about this release, feel free to contact us on our
|
If you have questions about this release, feel free to contact us on our
|
||||||
info@ address.
|
info@ address.
|
||||||
|
|
||||||
Release 4.4.0 of wolfSSL embedded TLS has bug fixes and new features including:
|
Release 4.5.0 of wolfSSL embedded TLS has bug fixes and new features including:
|
||||||
|
|
||||||
## New Feature Additions
|
## New Feature Additions
|
||||||
|
|
||||||
* Hexagon support.
|
* Added Xilinx Vitis 2019.2 example and README updates
|
||||||
* DSP builds to offload ECC verify operations.
|
* TLS v1.3 is now enabled by default
|
||||||
* Certificate Manager callback support.
|
* Building FIPS 140-2 code and test on Solaris
|
||||||
* New APIs for running updates to ChaCha20/Poly1305 AEAD.
|
* Secure renegotiation with DTLS 1.2
|
||||||
* Support for use with Apache.
|
* Update RSA calls for hardware acceleration with Xilsecure
|
||||||
* Add support for IBM s390x.
|
* Additional OpenSSL compatibility layer functions added
|
||||||
* PKCS8 support for ED25519.
|
* Cypress PSoC6 wolfCrypt driver added
|
||||||
* OpenVPN support.
|
* Added STM32CubeIDE support
|
||||||
* Add P384 curve support to SP.
|
* Added certificate parsing and inspection to C# wrapper layer
|
||||||
* Add BIO and EVP API.
|
* TLS v1.3 sniffer support added
|
||||||
* Add AES-OFB mode.
|
* TSIP v1.09 for target board GR-ROSE support added
|
||||||
* Add AES-CFB mode.
|
* Added support for the "X72N Envision Kit" evaluation board
|
||||||
* Add Curve448, X448, and Ed448.
|
* Support for ECC nonblocking using the configure options
|
||||||
* Add Renesas Synergy S7G2 build and hardware acceleration.
|
"--enable-ecc=nonblock --enable-sp=yes,nonblock CFLAGS=-DWOLFSSL_PUBLIC_MP"
|
||||||
|
* Added wc_curve25519_make_pub function to generate a public key given the
|
||||||
|
private one
|
||||||
|
|
||||||
## Fixes
|
## Fixes
|
||||||
|
|
||||||
* Fix for RSA public encrypt / private sign with RSA key sizes over 2048-bit.
|
* PIC32MZ hardware cache and large hashes fix
|
||||||
* Correct misspellings.
|
* AES-GCM use with EVP layer in compatibility layer code
|
||||||
* Secure renegotiation fix.
|
* Fix for RSA_LOW_MEM with ARM build of SP code
|
||||||
* Fix memory leak when using ATECC and non-SECP256R1 curves for sign, verify,
|
* Sanity check on tag length with AES-CCM to conform with RFC 3610
|
||||||
or shared secret.
|
* Fixes for 32 and 64 bit software implementations of SP code when
|
||||||
* Fix for K64 MMCAU with `WOLFSSL_SMALL_STACK_CACHE`.
|
WOLFSSL_SP_CACHE_RESISTANT is defined
|
||||||
* Fix the RSA verify only build.
|
* GCC warning fixes for GCC 9 and later
|
||||||
* Fix in SP C implementation for small stack.
|
* Sanity check on HKDF expand length to conform with RFC 5869
|
||||||
* Fix using the auth key id extension is set, hash might not be present.
|
* Fixes for STM32 CubeMX HAL with AES-GCM
|
||||||
* Fix when flattening certificate structure to include the subject alt names.
|
* Fixed point cache look up table (LUT) implementation fixes
|
||||||
* Fixes for building with ECC sign/verify only.
|
* Fix for ARM 32bit SP code when calling div word
|
||||||
* Fix for ECC and no cache resistance.
|
* Fix for potential out of bounds read when parsing CRLs
|
||||||
* Fix memory leak in DSA.
|
* Fix for potential out of bounds read with RSA unpadding
|
||||||
* Fix build on minGW.
|
* AES-CCM optimized counter fix
|
||||||
* Fix `PemToDer()` call in `ProcessBuffer()` to set more than ECC.
|
* Updates to Xcode projects for new files and features
|
||||||
* Fix for using RSA without SHA-512.
|
* Fix for adding CRL’s to a WOLFSSL_X509_STORE structure
|
||||||
* Add some close tags to the echoserver HTTP example output.
|
* FIPSv2 build with opensslall build fixes
|
||||||
* Miscellaneous fixes and updates for static analysis reports.
|
* Fixes for CryptoCell use with ECC and signature wrappers
|
||||||
* Fixes for time structure support.
|
* Fix for mod calculation with SP code dealing with 3072 bit keys
|
||||||
* Fixes for VxWorks support.
|
* Fix for handling certificates with multiple OU’s in name
|
||||||
* Fixes for Async crypto support.
|
* Fix for SP math implementation of sp_add_d and add a sanity check on
|
||||||
* Fix cache resist compile to work with SP C code.
|
rshb range
|
||||||
* Fixes for Curve25519 x64 asm.
|
* Fix for sanity check on padding with DES3 conversion of PEM to DER
|
||||||
* Fix for SP x64 div.
|
* Sanity check for potential out of bounds read with fp_read_radix_16
|
||||||
* Fix for DTLS edge case where CCS and Finished come out of order and the
|
|
||||||
retransmit pool gets flushed.
|
|
||||||
* Fix for infinite loop in SHA-1 with small inputs. Thanks to Peter W.
|
|
||||||
* Fix for FIPS Hmac where `wc_HmacInit()` isn't used. `wc_HmacSetKey()` needs
|
|
||||||
to initialize the Hmac structure. Type is set to NONE, and checked against
|
|
||||||
NONE, not 0.
|
|
||||||
* Fixes for SP RSA private operations.
|
|
||||||
* Fixes for Xilinx SDK and Zynq UltraScale+ MPSoC
|
|
||||||
* Fix leak when building with HAVE_AESGCM and NO_AES_DECRYPT. Thanks G.G.
|
|
||||||
* Fixes for building ECC without ASN.
|
|
||||||
* Fix for async TLSv1.3 issues.
|
|
||||||
* Fix `wc_KeyPemToDer()` with PKCS1 and empty key.
|
|
||||||
* Omit `-fomit-frame-pointer` from CFLAGS in configure.ac.
|
|
||||||
|
|
||||||
## Improvements/Optimizations
|
## Improvements/Optimizations
|
||||||
|
|
||||||
* Qt 5.12 and 5.13 support.
|
* TLS 1.3 certificate verify update to handle 8192 bit RSA keys
|
||||||
* Added more digest types to Cryptocell RSA sign/verify.
|
* wpa_supplicant support with reduced code size option
|
||||||
* Some memory usage improvements.
|
* TLS 1.3 alerts encrypted when possible
|
||||||
* Speed improvements for mp_rand.
|
* Many minor coverity fixes added
|
||||||
* Improvements to CRL and OCSP support.
|
* Error checking when parsing PKCS12 DER
|
||||||
* Refactor Poly1305 AEAD/MAC to reduce duplicate code.
|
* IAR warning in test.c resolved
|
||||||
* Add blinding to RSA key gen.
|
* ATECC608A improvements for use with Harmony 3 and PIC32 MZ
|
||||||
* Improvements to blinding.
|
* Support for AES-GCM and wc_SignatureVerifyHash with static memory and no
|
||||||
* Improvement and expansion of OpenSSL Compatibility Layer.
|
malloc’s
|
||||||
* Improvements to ChaCha20.
|
* Enable SNI by default with JNI/JSSE builds
|
||||||
* Improvements to X.509 processing.
|
* NetBSD GCC compiler warnings resolved
|
||||||
* Improvements to ECC support.
|
* Additional test cases and code coverage added including curve25519 and
|
||||||
* Improvement in detecting 64-bit support.
|
curve448 tests
|
||||||
* Refactor to combine duplicate ECC parameter parsing code.
|
* Option for user defined mutexes with WOLFSSL_USER_MUTEX
|
||||||
* Improve keyFormat to be set by algId and let later key parsing produce fail.
|
* Sniffer API’s for loading buffer directly
|
||||||
* Add test cases for 3072-bit and 4096-bit RSA keys.
|
* Fixes and improvements from going through the DO-178 process were added
|
||||||
* Improve signature wrapper and DH test cases.
|
* Doxygen updates and fixes for auto documentation generation
|
||||||
* Improvements to the configure.ac script.
|
|
||||||
* Added constant time RSA q modinv p.
|
|
||||||
* Improve performance of SP Intel 64-bit asm.
|
|
||||||
* Added a few more functions to the ABI list.
|
|
||||||
* Improve TLS bidirectional shutdown behavior.
|
|
||||||
* OpenSSH 8.1 support.
|
|
||||||
* Improve performance of RSA/DH operations on x64.
|
|
||||||
* Add support for PKCS7/CMS Enveloped data with fragmented encrypted content.
|
|
||||||
* Example linker description for FIPS builds to enforce object ordering.
|
|
||||||
* C# wrapper improvements. Added TLS client example and TLSv1.3 methods.
|
|
||||||
* Allow setting MTU in DTLS.
|
|
||||||
* Improve PKCS12 create for outputting encrypted bundles.
|
|
||||||
* Constant time EC map to affine for private operations.
|
|
||||||
* Improve performance of RSA public key ops with TFM.
|
|
||||||
* Smaller table version of AES encrypt/decrypt.
|
|
||||||
* Support IAR with position independent code (ROPI).
|
|
||||||
* Improve speed of AArch64 assembly.
|
|
||||||
* Support AES-CTR on esp32.
|
|
||||||
* Add a no malloc option for small SP math.
|
|
||||||
|
|
||||||
## This release of wolfSSL includes fixes for 2 security vulnerabilities.
|
## This release of wolfSSL includes fixes for 5 security vulnerabilities.
|
||||||
|
|
||||||
* For fast math, use a constant time modular inverse when mapping to affine
|
wolfSSL version 4.5.0 contains 5 vulnerability fixes: 2 fixes for TLS 1.3,
|
||||||
when operation involves a private key - keygen, calc shared secret, sign.
|
2 side channel attack mitigations, and 1 fix for a potential private key
|
||||||
Thank you to Alejandro Cabrera Aldaya, Cesar Pereida García and
|
leak in a specific use case.
|
||||||
Billy Bob Brumley from the Network and Information Security Group (NISEC)
|
|
||||||
at Tampere University for the report.
|
|
||||||
|
|
||||||
* Change constant time and cache resistant ECC mulmod. Ensure points being
|
* In earlier versions of wolfSSL there exists a potential man in the middle
|
||||||
operated on change to make constant time. Thank you to Pietro Borrello at
|
attack on TLS 1.3 clients. Malicious attackers with a privileged network
|
||||||
Sapienza University of Rome.
|
position can impersonate TLS 1.3 servers and bypass authentication. Users
|
||||||
|
that have applications with client side code and have TLS 1.3 turned on,
|
||||||
|
should update to the latest version of wolfSSL. Users that do not have
|
||||||
|
TLS 1.3 turned on, or that are server side only, are NOT affected by this
|
||||||
|
report. Thanks to Gerald Doussot from NCC group for the report.
|
||||||
|
* Denial of service attack on TLS 1.3 servers from repetitively sending
|
||||||
|
ChangeCipherSpecs messages. This denial of service results from the
|
||||||
|
relatively low effort of sending a ChangeCipherSpecs message versus the
|
||||||
|
effort of the server to process that message. Users with TLS 1.3 servers are
|
||||||
|
recommended to update to the most recent version of wolfSSL which limits the
|
||||||
|
number of TLS 1.3 ChangeCipherSpecs that can be received in order to avoid
|
||||||
|
this DoS attack. CVE-2020-12457 was reserved for the report. Thanks to
|
||||||
|
Lenny Wang of Tencent Security Xuanwu LAB.
|
||||||
|
* Potential cache timing attacks on public key operations in builds that are
|
||||||
|
not using SP (single precision). Users that have a system where malicious
|
||||||
|
agents could execute code on the system, are not using the SP build with
|
||||||
|
wolfSSL, and are doing private key operations on the system (such as signing
|
||||||
|
with a private key) are recommended to regenerate private keys and update to
|
||||||
|
the most recent version of wolfSSL. CVE-2020-15309 is reserved for this
|
||||||
|
issue. Thanks to Ida Bruhns from Universität zu Lübeck for the report.
|
||||||
|
* When using SGX with EC scalar multiplication the possibility of side-channel
|
||||||
|
attacks are present. To mitigate the risk of side channel attacks wolfSSL’s
|
||||||
|
single precision EC operations should be used instead. Release 4.5.0 turns
|
||||||
|
this on be default now with SGX builds and in previous versions of wolfSSL
|
||||||
|
this can be turned on by using the WOLFSSL_SP macros. Thank you to
|
||||||
|
Alejandro Cabrera Aldaya, Cesar Pereida García and Billy Bob Brumley from
|
||||||
|
the Network and Information Security Group (NISEC) at Tampere University for
|
||||||
|
the report.
|
||||||
|
* Leak of private key in the case that PEM format private keys are bundled in
|
||||||
|
with PEM certificates into a single file. This is due to the
|
||||||
|
misclassification of certificate type versus private key type when parsing
|
||||||
|
through the PEM file. To be affected, wolfSSL would need to have been built
|
||||||
|
with OPENSSL_EXTRA (--enable-opensslextra). Some build variants such as
|
||||||
|
--enable-all and --enable-opensslall also turn on this code path, checking
|
||||||
|
wolfssl/options.h for OPENSSL_EXTRA will show if the macro was used with the
|
||||||
|
build. If having built with the opensslextra enable option and having placed
|
||||||
|
PEM certificates with PEM private keys in the same file when loading up the
|
||||||
|
certificate file, then we recommend updating wolfSSL for this use case and
|
||||||
|
also recommend regenerating any private keys in the file.
|
||||||
|
|
||||||
For additional vulnerability information visit the vulnerability page at
|
For additional vulnerability information visit the vulnerability page at
|
||||||
https://www.wolfssl.com/docs/security-vulnerabilities/
|
https://www.wolfssl.com/docs/security-vulnerabilities/
|
||||||
|
@@ -34,6 +34,10 @@ openssl x509 -req -in ./certs/server-ecc-req.pem -CA ./certs/ca-ecc-cert.pem -CA
|
|||||||
openssl ca -config ./certs/ecc/wolfssl.cnf -extensions server_cert -days 3650 -notext -md sha256 -in ./certs/server-ecc-req.pem -out ./certs/server-ecc.pem
|
openssl ca -config ./certs/ecc/wolfssl.cnf -extensions server_cert -days 3650 -notext -md sha256 -in ./certs/server-ecc-req.pem -out ./certs/server-ecc.pem
|
||||||
openssl x509 -in ./certs/server-ecc.pem -outform der -out ./certs/server-ecc.der
|
openssl x509 -in ./certs/server-ecc.pem -outform der -out ./certs/server-ecc.der
|
||||||
|
|
||||||
|
# Generate ECC 256-bit self-signed server cert
|
||||||
|
openssl x509 -req -in ./certs/server-ecc-req.pem -days 3650 -extfile ./certs/ecc/wolfssl.cnf -extensions server_cert -signkey ./certs/ecc-key.pem -text -out ./certs/server-ecc-self.pem
|
||||||
|
openssl x509 -inform pem -in ./certs/server-ecc-self.pem -outform der -out ./certs/server-ecc-self.der
|
||||||
|
|
||||||
rm ./certs/server-ecc-req.pem
|
rm ./certs/server-ecc-req.pem
|
||||||
|
|
||||||
|
|
||||||
|
@@ -14,6 +14,7 @@
|
|||||||
# ca-ecc384-cert.der
|
# ca-ecc384-cert.der
|
||||||
# server-cert.pem
|
# server-cert.pem
|
||||||
# server-cert.der
|
# server-cert.der
|
||||||
|
# server-cert-chain.der
|
||||||
# server-ecc-rsa.pem
|
# server-ecc-rsa.pem
|
||||||
# server-ecc.pem
|
# server-ecc.pem
|
||||||
# 1024/client-cert.der
|
# 1024/client-cert.der
|
||||||
@@ -497,6 +498,8 @@ run_renewcerts(){
|
|||||||
check_result $? "Der Cert 11"
|
check_result $? "Der Cert 11"
|
||||||
openssl x509 -inform PEM -in server-ecc-comp.pem -outform DER -out server-ecc-comp.der
|
openssl x509 -inform PEM -in server-ecc-comp.pem -outform DER -out server-ecc-comp.der
|
||||||
check_result $? "Der Cert 12"
|
check_result $? "Der Cert 12"
|
||||||
|
cat certs/server-cert.der certs/ca-cert.der >certs/server-cert-chain.der
|
||||||
|
check_result $? "Der Cert 13"
|
||||||
echo "End of section"
|
echo "End of section"
|
||||||
echo "---------------------------------------------------------------------"
|
echo "---------------------------------------------------------------------"
|
||||||
|
|
||||||
|
Binary file not shown.
Binary file not shown.
@@ -7,7 +7,7 @@
|
|||||||
#
|
#
|
||||||
AC_COPYRIGHT([Copyright (C) 2006-2020 wolfSSL Inc.])
|
AC_COPYRIGHT([Copyright (C) 2006-2020 wolfSSL Inc.])
|
||||||
AC_PREREQ([2.63])
|
AC_PREREQ([2.63])
|
||||||
AC_INIT([wolfssl],[4.4.1],[https://github.com/wolfssl/wolfssl/issues],[wolfssl],[https://www.wolfssl.com])
|
AC_INIT([wolfssl],[4.5.0],[https://github.com/wolfssl/wolfssl/issues],[wolfssl],[https://www.wolfssl.com])
|
||||||
AC_CONFIG_AUX_DIR([build-aux])
|
AC_CONFIG_AUX_DIR([build-aux])
|
||||||
|
|
||||||
# The following sets CFLAGS to empty if unset on command line. We do not
|
# The following sets CFLAGS to empty if unset on command line. We do not
|
||||||
@@ -34,7 +34,7 @@ LT_PREREQ([2.2])
|
|||||||
LT_INIT([disable-static win32-dll])
|
LT_INIT([disable-static win32-dll])
|
||||||
|
|
||||||
#shared library versioning
|
#shared library versioning
|
||||||
WOLFSSL_LIBRARY_VERSION=25:0:1
|
WOLFSSL_LIBRARY_VERSION=26:0:2
|
||||||
# | | |
|
# | | |
|
||||||
# +------+ | +---+
|
# +------+ | +---+
|
||||||
# | | |
|
# | | |
|
||||||
|
BIN
wolfssl.rc
BIN
wolfssl.rc
Binary file not shown.
@@ -28,8 +28,8 @@
|
|||||||
extern "C" {
|
extern "C" {
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#define LIBWOLFSSL_VERSION_STRING "4.4.1"
|
#define LIBWOLFSSL_VERSION_STRING "4.5.0"
|
||||||
#define LIBWOLFSSL_VERSION_HEX 0x04004001
|
#define LIBWOLFSSL_VERSION_HEX 0x04005000
|
||||||
|
|
||||||
#ifdef __cplusplus
|
#ifdef __cplusplus
|
||||||
}
|
}
|
||||||
|
Reference in New Issue
Block a user