summaryrefslogtreecommitdiffstats
path: root/security/nss/doc/rst/legacy/nss_releases/nss_3.18_release_notes/index.rst
blob: 8be06abbbec40a20b7cf355d1370d2259da56b2c (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
.. _mozilla_projects_nss_nss_3_18_release_notes:

NSS 3.18 release notes
======================

`Introduction <#introduction>`__
--------------------------------

.. container::

   The NSS team has released Network Security Services (NSS) 3.18, which is a minor release.

.. _distribution_information:

`Distribution Information <#distribution_information>`__
--------------------------------------------------------

.. container::

   The HG tag is NSS_3_18_RTM. NSS 3.18 requires NSPR 4.10.8 or newer.

   NSS 3.18 source distributions are available on ftp.mozilla.org for secure HTTPS download:

   -  Source tarballs:
      https://ftp.mozilla.org/pub/mozilla.org/security/nss/releases/NSS_3_18_RTM/src/

.. _new_in_nss_3.18:

`New in NSS 3.18 <#new_in_nss_3.18>`__
--------------------------------------

.. _new_functionality:

`New Functionality <#new_functionality>`__
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

.. container::

   -  When importing certificates and keys from a PKCS#12 source, it's now possible to override the
      nicknames, prior to importing them into the NSS database, using new API
      SEC_PKCS12DecoderRenameCertNicknames.
   -  The tstclnt test utility program has new command-line options -C, -D, -b and -R.
      Use -C one, two or three times to print information about the certificates received from a
      server, and information about the locally found and trusted issuer certificates, to diagnose
      server side configuration issues. It is possible to run tstclnt without providing a database
      (-D). A PKCS#11 library that contains root CA certificates can be loaded by tstclnt, which may
      either be the nssckbi library provided by NSS (-b) or another compatible library (-R).

   .. rubric:: New Functions
      :name: new_functions

   -  *in certdb.h*

      -  **SEC_CheckCrlTimes** - Check the validity of a CRL at the given time.
      -  **SEC_GetCrlTimes** - Extract the validity times from a CRL.

   -  *in p12.h*

      -  **SEC_PKCS12DecoderRenameCertNicknames** - call an application provided callback for each
         certificate found in a SEC_PKCS12DecoderContext.

   -  *in pk11pub.h*

      -  **\__PK11_SetCertificateNickname** - this is an internal symbol for NSS use only, as with
         all exported NSS symbols that have a leading underscore '_'. Applications that use or
         depend on these symbols can and will break in future NSS releases.

   .. rubric:: New Types
      :name: new_types

   -  *in p12.h*

      -  **SEC_PKCS12NicknameRenameCallback** - a function pointer definition. An application that
         uses SEC_PKCS12DecoderRenameCertNicknames must implement a callback function that
         implements this function interface.

.. _notable_changes_in_nss_3.18:

`Notable Changes in NSS 3.18 <#notable_changes_in_nss_3.18>`__
--------------------------------------------------------------

.. container::

   -  The highest TLS protocol version enabled by default has been increased from TLS 1.0 to TLS
      1.2. Similarly, the highest DTLS protocol version enabled by default has been increased from
      DTLS 1.0 to DTLS 1.2.
   -  The default key size used by certutil when creating an RSA key pair has been increased from
      1024 bits to 2048 bits.
   -  On Mac OS X, by default the softokn shared library will link with the sqlite library installed
      by the operating system, if it is version 3.5 or newer.
   -  The following CA certificates had the Websites and Code Signing **trust bits turned off**

      -  OU = Equifax Secure Certificate Authority

         -  SHA1 Fingerprint: D2:32:09:AD:23:D3:14:23:21:74:E4:0D:7F:9D:62:13:97:86:63:3A

      -  CN = Equifax Secure Global eBusiness CA-1

         -  SHA1 Fingerprint: 7E:78:4A:10:1C:82:65:CC:2D:E1:F1:6D:47:B4:40:CA:D9:0A:19:45

      -  CN = TC TrustCenter Class 3 CA II

         -  SHA1 Fingerprint: 80:25:EF:F4:6E:70:C8:D4:72:24:65:84:FE:40:3B:8A:8D:6A:DB:F5

   -  The following CA certificates were **Added**

      -  CN = Staat der Nederlanden Root CA - G3

         -  SHA1 Fingerprint: D8:EB:6B:41:51:92:59:E0:F3:E7:85:00:C0:3D:B6:88:97:C9:EE:FC

      -  CN = Staat der Nederlanden EV Root CA

         -  SHA1 Fingerprint: 76:E2:7E:C1:4F:DB:82:C1:C0:A6:75:B5:05:BE:3D:29:B4:ED:DB:BB

      -  CN = IdenTrust Commercial Root CA 1

         -  SHA1 Fingerprint: DF:71:7E:AA:4A:D9:4E:C9:55:84:99:60:2D:48:DE:5F:BC:F0:3A:25

      -  CN = IdenTrust Public Sector Root CA 1

         -  SHA1 Fingerprint: BA:29:41:60:77:98:3F:F4:F3:EF:F2:31:05:3B:2E:EA:6D:4D:45:FD

      -  CN = S-TRUST Universal Root CA

         -  SHA1 Fingerprint: 1B:3D:11:14:EA:7A:0F:95:58:54:41:95:BF:6B:25:82:AB:40:CE:9A

      -  CN = Entrust Root Certification Authority - G2

         -  SHA1 Fingerprint: 8C:F4:27:FD:79:0C:3A:D1:66:06:8D:E8:1E:57:EF:BB:93:22:72:D4

      -  CN = Entrust Root Certification Authority - EC1

         -  SHA1 Fingerprint: 20:D8:06:40:DF:9B:25:F5:12:25:3A:11:EA:F7:59:8A:EB:14:B5:47

      -  CN = CFCA EV ROOT

         -  SHA1 Fingerprint: E2:B8:29:4B:55:84:AB:6B:58:C2:90:46:6C:AC:3F:B8:39:8F:84:83

   -  The version number of the updated root CA list has been set to 2.3

.. _bugs_fixed_in_nss_3.18:

`Bugs fixed in NSS 3.18 <#bugs_fixed_in_nss_3.18>`__
----------------------------------------------------

.. container::

   This Bugzilla query returns all the bugs fixed in NSS 3.18:

   https://bugzilla.mozilla.org/buglist.cgi?resolution=FIXED&classification=Components&query_format=advanced&product=NSS&target_milestone=3.18

`Compatibility <#compatibility>`__
----------------------------------

.. container::

   NSS 3.18 shared libraries are backward compatible with all older NSS 3.x shared libraries. A
   program linked with older NSS 3.x shared libraries will work with NSS 3.18 shared libraries
   without recompiling or relinking. Furthermore, applications that restrict their use of NSS APIs
   to the functions listed in NSS Public Functions will remain compatible with future versions of
   the NSS shared libraries.

`Feedback <#feedback>`__
------------------------

.. container::

   Bugs discovered should be reported by filing a bug report with
   `bugzilla.mozilla.org <https://bugzilla.mozilla.org/enter_bug.cgi?product=NSS>`__ (product NSS).