OpenSSL v1.1.0.i Release Notes

Release Date: 2018-09-11 // over 2 years ago
    • Add a new ClientHello callback. Provides a callback interface that gives the application the ability to adjust the nascent SSL object at the earliest stage of ClientHello processing, immediately after extensions have been collected but before they have been processed. In particular, this callback can adjust the supported TLS versions in response to the contents of the ClientHello

    Benjamin Kaduk

    • Add SM2 base algorithm support.

    Jack Lloyd

    • s390x assembly pack: add (improved) hardware-support for the following cryptographic primitives: sha3, shake, aes-gcm, aes-ccm, aes-ctr, aes-ofb, aes-cfb/cfb8, aes-ecb.

    Patrick Steuer

    • Make EVP_PKEY_asn1_new() a bit stricter about its input. A NULL pem_str parameter is no longer accepted, as it leads to a corrupt table. NULL pem_str is reserved for alias entries only.

    Richard Levitte

    • Use the new ec_scalar_mul_ladder scaffold to implement a specialized ladder step for prime curves. The new implementation is based on formulae from differential addition-and-doubling in homogeneous projective coordinates from Izu-Takagi "A fast parallel elliptic curve multiplication resistant against side channel attacks" and Brier-Joye "Weierstrass Elliptic Curves and Side-Channel Attacks" Eq. (8) for y-coordinate recovery, modified to work in projective coordinates.

    Billy Bob Brumley, Nicola Tuveri

    • Change generating and checking of primes so that the error rate of not being prime depends on the intended use based on the size of the input. For larger primes this will result in more rounds of Miller-Rabin. The maximal error rate for primes with more than 1080 bits is lowered to 2-128.

    Kurt Roeckx, Annie Yousar

    • Increase the number of Miller-Rabin rounds for DSA key generating to 64.

    Kurt Roeckx

    • The 'tsget' script is renamed to 'tsget.pl', to avoid confusion when moving between systems, and to avoid confusion when a Windows build is done with mingw vs with MSVC. For POSIX installs, there's still a symlink or copy named 'tsget' to avoid that confusion as well.

    Richard Levitte

    • Revert blinding in ECDSA sign and instead make problematic addition length-invariant. Switch even to fixed-length Montgomery multiplication.

    Andy Polyakov

    • Use the new ec_scalar_mul_ladder scaffold to implement a specialized ladder step for binary curves. The new implementation is based on formulae from differential addition-and-doubling in mixed Lopez-Dahab projective coordinates, modified to independently blind the operands.

    Billy Bob Brumley, Sohaib ul Hassan, Nicola Tuveri

    • Add a scaffold to optionally enhance the Montgomery ladder implementation for ec_scalar_mul_ladder (formerly ec_mul_consttime) allowing EC_METHODs to implement their own specialized "ladder step", to take advantage of more favorable coordinate systems or more efficient differential addition-and-doubling algorithms.

    Billy Bob Brumley, Sohaib ul Hassan, Nicola Tuveri

    • Modified the random device based seed sources to keep the relevant file descriptors open rather than reopening them on each access. This allows such sources to operate in a chroot() jail without the associated device nodes being available. This behaviour can be controlled using RAND_keep_random_devices_open().

    Paul Dale

    • Numerous side-channel attack mitigations have been applied. This may have performance impacts for some algorithms for the benefit of improved security. Specific changes are noted in this change log by their respective authors.

    Matt Caswell

    • AIX shared library support overhaul. Switch to AIX "natural" way of handling shared libraries, which means collecting shared objects of different versions and bitnesses in one common archive. This allows to mitigate conflict between 1.0 and 1.1 side-by-side installations. It doesn't affect the way 3rd party applications are linked, only how multi-version installation is managed.

    Andy Polyakov

    • Make ec_group_do_inverse_ord() more robust and available to other EC cryptosystems, so that irrespective of BN_FLG_CONSTTIME, SCA mitigations are applied to the fallback BN_mod_inverse(). When using this function rather than BN_mod_inverse() directly, new EC cryptosystem implementations are then safer-by-default.

    Billy Bob Brumley

    • Add coordinate blinding for EC_POINT and implement projective coordinate blinding for generic prime curves as a countermeasure to chosen point SCA attacks.

    Sohaib ul Hassan, Nicola Tuveri, Billy Bob Brumley

    • Add blinding to ECDSA and DSA signatures to protect against side channel attacks discovered by Keegan Ryan (NCC Group).

    Matt Caswell

    • Enforce checking in the pkeyutl command line app to ensure that the input length does not exceed the maximum supported digest length when performing a sign, verify or verifyrecover operation.

    Matt Caswell

    • SSL_MODE_AUTO_RETRY is enabled by default. Applications that use blocking I/O in combination with something like select() or poll() will hang. This can be turned off again using SSL_CTX_clear_mode(). Many applications do not properly handle non-application data records, and TLS 1.3 sends more of such records. Setting SSL_MODE_AUTO_RETRY works around the problems in those applications, but can also break some. It's recommended to read the manpages about SSL_read(), SSL_write(), SSL_get_error(), SSL_shutdown(), SSL_CTX_set_mode() and SSL_CTX_set_read_ahead() again.

    Kurt Roeckx

    • When unlocking a pass phrase protected PEM file or PKCS#8 container, we now allow empty (zero character) pass phrases.

    Richard Levitte

    • Apply blinding to binary field modular inversion and remove patent pending (OPENSSL_SUN_GF2M_DIV) BN_GF2m_mod_div implementation.

    Billy Bob Brumley

    • Deprecate ec2_mult.c and unify scalar multiplication code paths for binary and prime elliptic curves.

    Billy Bob Brumley

    • Remove ECDSA nonce padding: EC_POINT_mul is now responsible for constant time fixed point multiplication.

    Billy Bob Brumley

    • Revise elliptic curve scalar multiplication with timing attack defenses: ec_wNAF_mul redirects to a constant time implementation when computing fixed point and variable point multiplication (which in OpenSSL are mostly used with secret scalars in keygen, sign, ECDH derive operations). Billy Bob Brumley, Nicola Tuveri, Cesar Pereida García, Sohaib ul Hassan

    • Updated CONTRIBUTING

    Rich Salz

    • Updated DRBG / RAND to request nonce and additional low entropy randomness from the system.

    Matthias St. Pierre

    • Updated 'openssl rehash' to use OpenSSL consistent default.

    Richard Levitte

    • Moved the load of the ssl_conf module to libcrypto, which helps loading engines that libssl uses before libssl is initialised.

    Matt Caswell

    • Added EVP_PKEY_sign() and EVP_PKEY_verify() for EdDSA

    Matt Caswell

    • Fixed X509_NAME_ENTRY_set to get multi-valued RDNs right in all cases.

    Ingo Schwarze, Rich Salz

    • Added output of accepting IP address and port for 'openssl s_server'

    Richard Levitte

    • Added a new API for TLSv1.3 ciphersuites: SSL_CTX_set_ciphersuites() SSL_set_ciphersuites()

    Matt Caswell

    • Memory allocation failures consistently add an error to the error stack.

    Rich Salz

    • Don't use OPENSSL_ENGINES and OPENSSL_CONF environment values in libcrypto when run as setuid/setgid.

    Bernd Edlinger

    • Load any config file by default when libssl is used.

    Matt Caswell

    • Added new public header file and documentation for the RAND_DRBG API. See manual page RAND_DRBG(7) for an overview.

    Matthias St. Pierre

    • QNX support removed (cannot find contributors to get their approval for the license change).

    Rich Salz

    • TLSv1.3 replay protection for early data has been implemented. See the SSL_read_early_data() man page for further details.

    Matt Caswell

    • Separated TLSv1.3 ciphersuite configuration out from TLSv1.2 ciphersuite configuration. TLSv1.3 ciphersuites are not compatible with TLSv1.2 and below. Similarly TLSv1.2 ciphersuites are not compatible with TLSv1.3. In order to avoid issues where legacy TLSv1.2 ciphersuite configuration would otherwise inadvertently disable all TLSv1.3 ciphersuites the configuration has been separated out. See the ciphers man page or the SSL_CTX_set_ciphersuites() man page for more information.

    Matt Caswell

    • On POSIX (BSD, Linux, ...) systems the ocsp(1) command running in responder mode now supports the new "-multi" option, which spawns the specified number of child processes to handle OCSP requests. The "-timeout" option now also limits the OCSP responder's patience to wait to receive the full client request on a newly accepted connection. Child processes are respawned as needed, and the CA index file is automatically reloaded when changed. This makes it possible to run the "ocsp" responder as a long-running service, making the OpenSSL CA somewhat more feature-complete. In this mode, most diagnostic messages logged after entering the event loop are logged via syslog(3) rather than written to stderr.

    Viktor Dukhovni

    • Added support for X448 and Ed448. Heavily based on original work by Mike Hamburg.

    Matt Caswell

    • Extend OSSL_STORE with capabilities to search and to narrow the set of objects loaded. This adds the functions OSSL_STORE_expect() and OSSL_STORE_find() as well as needed tools to construct searches and get the search data out of them.

    Richard Levitte

    • Support for TLSv1.3 added. Note that users upgrading from an earlier version of OpenSSL should review their configuration settings to ensure that they are still appropriate for TLSv1.3. For further information see: https://wiki.openssl.org/index.php/TLS1.3

    Matt Caswell

    • Grand redesign of the OpenSSL random generator

    The default RAND method now utilizes an AES-CTR DRBG according to NIST standard SP 800-90Ar1. The new random generator is essentially a port of the default random generator from the OpenSSL FIPS 2.0 object module. It is a hybrid deterministic random bit generator using an AES-CTR bit stream and which seeds and reseeds itself automatically using trusted system entropy sources.

    Some of its new features are: - Support for multiple DRBG instances with seed chaining. - The default RAND method makes use of a DRBG. - There is a public and private DRBG instance. - The DRBG instances are fork-safe. - Keep all global DRBG instances on the secure heap if it is enabled. - The public and private DRBG instance are per thread for lock free operation

    Paul Dale, Benjamin Kaduk, Kurt Roeckx, Rich Salz, Matthias St. Pierre

    • Changed Configure so it only says what it does and doesn't dump so much data. Instead, ./configdata.pm should be used as a script to display all sorts of configuration data.

    Richard Levitte

    • Added processing of "make variables" to Configure.

    Richard Levitte

    • Added SHA512/224 and SHA512/256 algorithm support.

    Paul Dale

    • The last traces of Netware support, first removed in 1.1.0, have now been removed.

    Rich Salz

    • Get rid of Makefile.shared, and in the process, make the processing of certain files (rc.obj, or the .def/.map/.opt files produced from the ordinal files) more visible and hopefully easier to trace and debug (or make silent).

    Richard Levitte

    • Make it possible to have environment variable assignments as arguments to config / Configure.

    Richard Levitte

    • Add multi-prime RSA (RFC 8017) support.

    Paul Yang

    • Add SM3 implemented according to GB/T 32905-2016

    • Add 'Maximum Fragment Length' TLS extension negotiation and support as documented in RFC6066. Based on a patch from Tomasz Moń

    Filipe Raimundo da Silva

    Rich Salz

    • Add ARIA AEAD TLS support.

    Jon Spillett

    • Some macro definitions to support VS6 have been removed. Visual Studio 6 has not worked since 1.1.0

    Rich Salz

    • Add ERR_clear_last_mark(), to allow callers to clear the last mark without clearing the errors.

    Richard Levitte

    • Add "atfork" functions. If building on a system that without pthreads, see doc/man3/OPENSSL_fork_prepare.pod for application requirements. The RAND facility now uses/requires this.

    Rich Salz

    • Add SHA3.

    Andy Polyakov

    • The UI API becomes a permanent and integral part of libcrypto, i.e. not possible to disable entirely. However, it's still possible to disable the console reading UI method, UI_OpenSSL() (use UI_null() as a fallback).

    To disable, configure with 'no-ui-console'. 'no-ui' is still possible to use as an alias. Check at compile time with the macro OPENSSL_NO_UI_CONSOLE. The macro OPENSSL_NO_UI is still possible to check and is an alias for OPENSSL_NO_UI_CONSOLE.

    Richard Levitte

    • Add a STORE module, which implements a uniform and URI based reader of stores that can contain keys, certificates, CRLs and numerous other objects. The main API is loosely based on a few stdio functions, and includes OSSL_STORE_open, OSSL_STORE_load, OSSL_STORE_eof, OSSL_STORE_error and OSSL_STORE_close. The implementation uses backends called "loaders" to implement arbitrary URI schemes. There is one built in "loader" for the 'file' scheme.

    Richard Levitte

    • Add devcrypto engine. This has been implemented against cryptodev-linux, then adjusted to work on FreeBSD 8.4 as well. Enable by configuring with 'enable-devcryptoeng'. This is done by default on BSD implementations, as cryptodev.h is assumed to exist on all of them.

    Richard Levitte

    • Module names can prefixed with OSSL_ or OPENSSL_. This affects util/mkerr.pl, which is adapted to allow those prefixes, leading to error code calls like this:

         OSSL_FOOerr(OSSL_FOO_F_SOMETHING, OSSL_FOO_R_WHATEVER);
      

    With this change, we claim the namespaces OSSL and OPENSSL in a manner that can be encoded in C. For the foreseeable future, this will only affect new modules.

    Richard Levitte and Tim Hudson

    • Removed BSD cryptodev engine.

    Rich Salz

    • Add a build target 'build_all_generated', to build all generated files and only that. This can be used to prepare everything that requires things like perl for a system that lacks perl and then move everything to that system and do the rest of the build there.

    Richard Levitte

    • In the UI interface, make it possible to duplicate the user data. This can be used by engines that need to retain the data for a longer time than just the call where this user data is passed.

    Richard Levitte

    • Ignore the '-named_curve auto' value for compatibility of applications with OpenSSL 1.0.2.

    Tomas Mraz [email protected]

    • Fragmented SSL/TLS alerts are no longer accepted. An alert message is 2 bytes long. In theory it is permissible in SSLv3 - TLSv1.2 to fragment such alerts across multiple records (some of which could be empty). In practice it make no sense to send an empty alert record, or to fragment one. TLSv1.3 prohibits this altogether and other libraries (BoringSSL, NSS) do not support this at all. Supporting it adds significant complexity to the record layer, and its removal is unlikely to cause interoperability issues.

    Matt Caswell

    • Add the ASN.1 types INT32, UINT32, INT64, UINT64 and variants prefixed with Z. These are meant to replace LONG and ZLONG and to be size safe. The use of LONG and ZLONG is discouraged and scheduled for deprecation in OpenSSL 1.2.0.

    Richard Levitte

    • Add the 'z' and 'j' modifiers to BIO_printf() et al formatting string, 'z' is to be used for [s]size_t, and 'j' - with [u]int64_t.

    Richard Levitte, Andy Polyakov

    • Add EC_KEY_get0_engine(), which does for EC_KEY what RSA_get0_engine() does for RSA, etc.

    Richard Levitte

    • Have 'config' recognise 64-bit mingw and choose 'mingw64' as the target platform rather than 'mingw'.

    Richard Levitte

    • The functions X509_STORE_add_cert and X509_STORE_add_crl return success if they are asked to add an object which already exists in the store. This change cascades to other functions which load certificates and CRLs.

    Paul Dale

    • x86_64 assembly pack: annotate code with DWARF CFI directives to facilitate stack unwinding even from assembly subroutines.

    Andy Polyakov

    • Remove VAX C specific definitions of OPENSSL_EXPORT, OPENSSL_EXTERN. Also remove OPENSSL_GLOBAL entirely, as it became a no-op.

    Richard Levitte

    • Remove the VMS-specific reimplementation of gmtime from crypto/o_times.c. VMS C's RTL has a fully up to date gmtime() and gmtime_r() since V7.1, which is the minimum version we support.

    Richard Levitte

    • Certificate time validation (X509_cmp_time) enforces stricter compliance with RFC 5280. Fractional seconds and timezone offsets are no longer allowed.

    Emilia Käsper

    • Add support for ARIA

    Paul Dale

    • s_client will now send the Server Name Indication (SNI) extension by default unless the new "-noservername" option is used. The server name is based on the host provided to the "-connect" option unless overridden by using "-servername".

    Matt Caswell

    • Add support for SipHash

    Todd Short

    • OpenSSL now fails if it receives an unrecognised record type in TLS1.0 or TLS1.1. Previously this only happened in SSLv3 and TLS1.2. This is to prevent issues where no progress is being made and the peer continually sends unrecognised record types, using up resources processing them.

    Matt Caswell

    Richard Levitte

    • Heartbeat support has been removed; the ABI is changed for now.

    Richard Levitte, Rich Salz

    • Support for SSL_OP_NO_ENCRYPT_THEN_MAC in SSL_CONF_cmd.

    Emilia Käsper

    • The RSA "null" method, which was partially supported to avoid patent issues, has been replaced to always returns NULL.

    Rich Salz

    OpenSSL 1.1.0