diff options
author | Jack Lloyd <[email protected]> | 2016-06-03 09:39:09 -0400 |
---|---|---|
committer | Jack Lloyd <[email protected]> | 2016-06-03 09:39:09 -0400 |
commit | 9eda1f09887b8b1ba5d60e1e432ebf7d828726db (patch) | |
tree | a3ae3743337474e03f7f91145709a38a6a7f1213 /doc | |
parent | fdfeeca157b36a4d4d4ab47dadba2bb785e17747 (diff) |
Update release notes
[ci skip]
Diffstat (limited to 'doc')
-rw-r--r-- | doc/news.rst | 49 | ||||
-rw-r--r-- | doc/todo.rst | 1 |
2 files changed, 41 insertions, 9 deletions
diff --git a/doc/news.rst b/doc/news.rst index 0087782d3..38c6c797b 100644 --- a/doc/news.rst +++ b/doc/news.rst @@ -10,15 +10,35 @@ Version 1.11.30, Not Yet Released connections in order to randomize the IV. * A bug in GCM caused incorrect results if the 32-bit counter field - overflowed. With a 96-bit nonce, this could only occur if 2**32 - 128-bit blocks were encrypted. This actually exceeds the maximum - allowable length of a GCM plaintext. - - However if a GCM nonce of any other size is used, the bug triggers - randomly, with increasing probability on longer messages. For - instance when encrypting 256 MiB of data under a random 128 bit - nonce, an incorrect result would be produced about 1/256 of the - time. With 1 MiB texts, the probability of error reduced to 1/65536. + overflowed. This bug has no implications on the security but affects + interoperability. + + With a 96-bit nonce, this could only occur if at least 2**32 128-bit + blocks (64 GiB) were encrypted. This actually exceeds the maximum + allowable length of a GCM plaintext; when messages longer than + 2**32 - 2 blocks are encrypted, GCM loses its security properties. + + In addition to 96-bit nonces, GCM also supports nonces of arbitrary + length using a different method which hashes the provided nonce + under the authentication key. When using such a nonce, the last 4 + bytes of the resulting CTR input might be near the overflow + boundary, with the probability of incorrect overflow increasing with + longer messages. when encrypting 256 MiB of data under a random 128 + bit nonce, an incorrect result would be produced about 1/256 of the + time. With 1 MiB texts, the probability of error is reduced to 1/65536. + + Since TLS uses GCM with 96 bit nonces and limits the length of any + record to far less than 64 GiB, TLS GCM ciphersuites are not + affected by this bug. + + Reported by Juraj Somorovsky, described also in "Nonce-Disrespecting + Adversaries: Practical Forgery Attacks on GCM in TLS" + (https://eprint.iacr.org/2016/475.pdf) + +* Previously when generating a new self-signed certificate or PKCS #10 + request, the subject DN was required to contain both common name + (CN) and country (C) fields. These restrictions have been removed. + GH #496 * The Transform and Keyed_Transform interfaces has been removed. The two concrete implementations of these interfaces were Cipher_Mode @@ -67,6 +87,17 @@ Version 1.11.30, Not Yet Released * Fix bcrypt function under Python 3 (GH #461) +* The ``unix_procs`` entropy source is deprecated and will be removed + in a future release. This entropy source attempts to get entropy by + running Unix programs like ``arp``, ``netstat``, and ``dmesg`` which + produce information which may be difficult for a remote attacker to + guess. This exists primarily as a last-ditch for Unix systems + without ``/dev/random``. But at this point such systems effectively + no longer exist, and the use of ``fork`` and ``exec`` by the library + complicates effective application sandboxing. + +* Changes to avoid implicit cast warnings in Visual C++ (GH #484) + Version 1.10.13, 2016-04-23 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ diff --git a/doc/todo.rst b/doc/todo.rst index 930c23fbd..a66c97f4f 100644 --- a/doc/todo.rst +++ b/doc/todo.rst @@ -101,6 +101,7 @@ Public Key Crypto, Math * XMSS (draft-irtf-cfrg-xmss-hash-based-signatures) * SPHINCS-256 +* NEWHOPE RLWE scheme + BoringSSL compatible TLS cipher suites * EdDSA (GH #283) * Ed448-Goldilocks * FHMQV |