summaryrefslogtreecommitdiffstats
path: root/debian/libgnutls30.NEWS
blob: c30ea2c668a71c0418ed8b22afcc1daa7598081a (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
gnutls28 (3.0.0-1) experimental; urgency=low

  GnuTLS is now using nettle instead of libgcrypt as crypto backend.

  Related to this change (nettle uses LGPLv3+ licensed GMP) the licensing has
  change. GnuTLS is LGPLv3+ now, GnuTLS-EXTRA GPLv3+. GnuTLS can therefore not
  be used by projects using GPLv2 without the "or later" clause.

 -- Andreas Metzler <ametzler@downhill.g.la>  Sun, 14 Aug 2011 14:27:12 +0200

gnutls26 (2.6.6-1) unstable; urgency=high

  libgnutls: Check expiration/activation time on untrusted certificates.
  Before the library did not check activation/expiration times on
  certificates, and was documented as not doing so. We have realized that
  many applications that use libgnutls, including gnutls-cli, fail to
  perform proper checks.  Implementing similar logic in all applications
  leads to code duplication.  Hence, we decided to check whether the
  current time (as reported by the time function) is within the
  activation/expiration period of certificates when verifying untrusted
  certificates.

  This changes the semantics of gnutls_x509_crt_list_verify, which in
  turn is used by gnutls_certificate_verify_peers and
  gnutls_certificate_verify_peers2.  We add two new
  gnutls_certificate_status_t codes for reporting the new error
  condition, GNUTLS_CERT_NOT_ACTIVATED and GNUTLS_CERT_EXPIRED.  We also
  add a new gnutls_certificate_verify_flags flag,
  GNUTLS_VERIFY_DISABLE_TIME_CHECKS, that can be used to disable the new
  behaviour.
  GNUTLS-SA-2009-3 CVE-2009-1417
  http://www.gnu.org/software/gnutls/security.html

 -- Andreas Metzler <ametzler@debian.org>  Thu, 30 Apr 2009 19:00:21 +0200

gnutls26 (2.4.2-5) unstable; urgency=medium

  * The gnutls certificate verification code has been changed to stop
    trusting some weak algoritms. Verifying untrusted X.509 certificates
    signed with RSA-MD2 or RSA-MD5 will now fail with a
    GNUTLS_CERT_INSECURE_ALGORITHM verification output.

    See <http://www.win.tue.nl/hashclash/rogue-ca/>,
    <http://bugs.debian.org/514578> and
    <http://www.gnu.org/software/gnutls/manual/gnutls.html#Digital-signatures>

    "certtool -i < signature.pem" will inform about the algoritm used for
    signing (Search for "Signature Algorithm" in its output.). The proper
    fix is to re-issue the certificates with a more secure algoritm. As a
    hotfix the respective certicate itself can be added to the list of
    trusted certificates. Obviously this should only be done after
    verifying the certificate by different means than relying on the weak
    signature.

 -- Andreas Metzler <ametzler@debian.org>  Sat, 07 Feb 2009 12:58:51 +0100