7b9717658e
OBS-URL: https://build.opensuse.org/package/show/devel:languages:haskell/ghc-tls?expand=0&rev=96
462 lines
19 KiB
Plaintext
462 lines
19 KiB
Plaintext
-------------------------------------------------------------------
|
|
Fri Apr 26 05:59:56 UTC 2024 - Peter Simons <psimons@suse.com>
|
|
|
|
- Update tls to version 2.0.5 revision 1.
|
|
Upstream has revised the Cabal build instructions on Hackage.
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Apr 22 06:16:57 UTC 2024 - Peter Simons <psimons@suse.com>
|
|
|
|
- Update tls to version 2.0.5.
|
|
## Version 2.0.5
|
|
|
|
* Fixing handshake13_0rtt_fallback
|
|
* Client checks if the group of PSK is contained in Supported_Groups.
|
|
* HRR is not allowed for 0-RTT.
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Apr 19 10:33:27 UTC 2024 - Peter Simons <psimons@suse.com>
|
|
|
|
- Update tls to version 2.0.4.
|
|
## Version 2.0.4
|
|
|
|
* More fix for 0-RTT when application data is available while receiving CF.
|
|
* New util/tls-client and util/tls-server.
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Apr 18 05:42:44 UTC 2024 - Peter Simons <psimons@suse.com>
|
|
|
|
- Update tls to version 2.0.3.
|
|
## Version 2.0.3
|
|
|
|
* Fixing a bug where `timeout` in `bye` does not work.
|
|
* util/client -> util/tls-client
|
|
* util/server -> util/tls-server
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Mar 28 04:03:13 UTC 2024 - Peter Simons <psimons@suse.com>
|
|
|
|
- Update tls to version 2.0.2.
|
|
## Version 2.0.2
|
|
|
|
* Client checks sessionMaxEarlyDataSize to decide 0-RTT
|
|
* Client checks the resumption cipher properly.
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Mar 26 05:57:23 UTC 2024 - Peter Simons <psimons@suse.com>
|
|
|
|
- Update tls to version 2.0.1 revision 2.
|
|
Upstream has revised the Cabal build instructions on Hackage.
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Mar 1 03:31:34 UTC 2024 - Peter Simons <psimons@suse.com>
|
|
|
|
- Update tls to version 2.0.1 revision 1.
|
|
Upstream has revised the Cabal build instructions on Hackage.
|
|
|
|
-------------------------------------------------------------------
|
|
Sun Feb 18 22:15:12 UTC 2024 - Peter Simons <psimons@suse.com>
|
|
|
|
- Update tls to version 2.0.1.
|
|
## Version 2.0.1
|
|
|
|
* Fix a leak of pending data to be sent.
|
|
|
|
## Version 2.0.0
|
|
|
|
* `tls` now only supports TLS 1.2 and TLS 1.3 with safe cipher suites.
|
|
* Security: BREAKING CHANGE: TLS 1.0 and TLS 1.1 are removed.
|
|
* Security: BREAKING CHANGE: all CBC cipher suite are removed.
|
|
* Security: BREAKING CHANGE: RC4 and 3DES are removed.
|
|
* Security: BREAKING CHANGE: DSS(digital signature standard) is removed.
|
|
* Security: BREAKING CHANGE: TLS 1.2 servers require
|
|
EMS(extended main secret) by default.
|
|
`supportedExtendedMasterSec` is renamed to
|
|
`supportedExtendedMainSecret`.
|
|
* BREAKING CHANGE: the package is now complied with `Strict` and `StrictData`.
|
|
* BREAKING CHANGE: Many data structures are re-defined with
|
|
`PatternSynonyms` for extensibility.
|
|
* BREAKING CHANGE: the structure of `SessionManager` is changed
|
|
to support session tickets.
|
|
* API: BREAKING CHANGE: `sendData` can send early data (0-RTT).
|
|
`clientEarlyData` is removed.
|
|
To send early data via `sendData`, set `clientUseEarlyData` to `True`.
|
|
[#466](https://github.com/haskell-tls/hs-tls/issues/466)
|
|
* API: `handshake` can receive an alert of client authentication failure
|
|
for TLS 1.3.
|
|
[#463](https://github.com/haskell-tls/hs-tls/pull/463)
|
|
* API: `bye` can receive NewSessionTicket for TLS 1.3.
|
|
* Channel binding: `getFinished` and `getPeerFinished` are deprecated.
|
|
Use `getTLSUnique` instead.
|
|
[#462](https://github.com/haskell-tls/hs-tls/pull/462)
|
|
* Channel binding: `getTLSExporter` and `getTLSServerEndPoint` are provided.
|
|
[#462](https://github.com/haskell-tls/hs-tls/pull/462)
|
|
* Refactoring: the monolithic `handshake` is divided to follow
|
|
the diagram of TLS 1.2 and 1.3 for readability.
|
|
* Refactoring: test cases are refactored for maintenability
|
|
and readablity. `hspec` is used instead of `tasty`.
|
|
* Code format: `fourmolu` is used as an official formatter.
|
|
* Catching up RFC8446bis-09.
|
|
[#467](https://github.com/haskell-tls/hs-tls/issues/467)
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Sep 5 05:49:20 UTC 2023 - Peter Simons <psimons@suse.com>
|
|
|
|
- Update tls to version 1.9.0.
|
|
## Version 1.9.0
|
|
|
|
* BREAKING CHANGE: The type of the `Error_Protocol` constructor of `TLSError` has changed.
|
|
The "warning" case has been split off into a new `Error_Protocol_Warning` constructor.
|
|
[#460](https://github.com/haskell-tls/hs-tls/pull/460)
|
|
|
|
## Version 1.8.0
|
|
|
|
* BREAKING CHANGE: Remove `Exception` instance for `TLSError`.
|
|
The library now throws `TLSException` only.
|
|
If you need to change your code, please refer to
|
|
[this example](https://github.com/snoyberg/http-client/commit/73d1a4eb451c089878ba95e96371d0b18287ffb8) first.
|
|
[#457](https://github.com/haskell-tls/hs-tls/pull/457)
|
|
|
|
## Version 1.7.1
|
|
|
|
* NOP on UserCanceled event
|
|
[#454](https://github.com/haskell-tls/hs-tls/pull/454)
|
|
|
|
## Version 1.7.0
|
|
|
|
* Major version up because "crypton" is used instead of "cryptonite"
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Mar 30 17:08:41 UTC 2023 - Peter Simons <psimons@suse.com>
|
|
|
|
- Updated spec file to conform with ghc-rpm-macros-2.5.2.
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Jun 6 02:45:15 UTC 2022 - Peter Simons <psimons@suse.com>
|
|
|
|
- Update tls to version 1.6.0.
|
|
## Version 1.6.0
|
|
|
|
- Major version up because of disabling SSL3
|
|
- Some fixes against tlsfuzzer
|
|
|
|
## Version 1.5.8
|
|
|
|
- Require mtl-2.2.1 or newer
|
|
[#448](https://github.com/haskell-tls/hs-tls/pull/448)
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Jan 20 00:35:33 UTC 2022 - Peter Simons <psimons@suse.com>
|
|
|
|
- Update tls to version 1.5.7.
|
|
## Version 1.5.7
|
|
|
|
- New APIs: getFinished and getPeerFinished
|
|
[#445](https://github.com/vincenthz/hs-tls/pull/445)
|
|
|
|
## Version 1.5.6
|
|
|
|
- Dynamically setting enctypted extensions
|
|
[#444](https://github.com/vincenthz/hs-tls/pull/444)
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Feb 8 22:08:42 UTC 2021 - psimons@suse.com
|
|
|
|
- Update tls to version 1.5.5.
|
|
## Version 1.5.5
|
|
|
|
- QUIC support
|
|
[#419](https://github.com/vincenthz/hs-tls/pull/419)
|
|
[#427](https://github.com/vincenthz/hs-tls/pull/427)
|
|
[#428](https://github.com/vincenthz/hs-tls/pull/428)
|
|
[#430](https://github.com/vincenthz/hs-tls/pull/430)
|
|
[#433](https://github.com/vincenthz/hs-tls/pull/433)
|
|
[#441](https://github.com/vincenthz/hs-tls/pull/441)
|
|
- Server ECDSA for P-256
|
|
[#436](https://github.com/vincenthz/hs-tls/pull/436)
|
|
- Sort ciphersuites based on hardware-acceleration support
|
|
[#439](https://github.com/vincenthz/hs-tls/pull/439)
|
|
- Sending no_application_protocol
|
|
[#440](https://github.com/vincenthz/hs-tls/pull/440)
|
|
- Internal improvements
|
|
[#426](https://github.com/vincenthz/hs-tls/pull/426)
|
|
[#431](https://github.com/vincenthz/hs-tls/pull/431)
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Dec 17 12:20:00 UTC 2020 - Ondřej Súkup <mimi.vx@gmail.com>
|
|
|
|
- disable %{ix86} build
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Aug 18 10:46:20 UTC 2020 - Peter Simons <psimons@suse.com>
|
|
|
|
- Replace %setup -q with the more modern %autosetup macro.
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Jun 16 11:14:43 UTC 2020 - Peter Simons <psimons@suse.com>
|
|
|
|
- Re-generate file with latest version of spec-cleaner.
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Feb 27 14:16:56 UTC 2020 - psimons@suse.com
|
|
|
|
- Update tls to version 1.5.4.
|
|
## Version 1.5.4
|
|
|
|
- Restore interoperability with early Java 6
|
|
[#422](https://github.com/vincenthz/hs-tls/pull/422)
|
|
- Test cleanups for timeout and async usage
|
|
[#416](https://github.com/vincenthz/hs-tls/pull/416)
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Jan 9 03:03:11 UTC 2020 - psimons@suse.com
|
|
|
|
- Update tls to version 1.5.3.
|
|
## Version 1.5.3
|
|
|
|
- Additional verification regarding EC signatures
|
|
[#412](https://github.com/vincenthz/hs-tls/pull/412)
|
|
- Fixing ALPN
|
|
[#411](https://github.com/vincenthz/hs-tls/pull/411)
|
|
- Check SSLv3 padding length
|
|
[#410](https://github.com/vincenthz/hs-tls/pull/410)
|
|
- Exposing getClientCertificateChain
|
|
[#407](https://github.com/vincenthz/hs-tls/pull/407)
|
|
- Extended Master Secret
|
|
[#406](https://github.com/vincenthz/hs-tls/pull/406)
|
|
- Brushing up the documentation
|
|
[#404](https://github.com/vincenthz/hs-tls/pull/404)
|
|
[#408](https://github.com/vincenthz/hs-tls/pull/408)
|
|
- Improving tests
|
|
[#403](https://github.com/vincenthz/hs-tls/pull/403)
|
|
- Avoid calling onServerNameIndication twice with HRR
|
|
[#402](https://github.com/vincenthz/hs-tls/pull/402)
|
|
- Enable X448 and FFDHE groups
|
|
[#401](https://github.com/vincenthz/hs-tls/pull/401)
|
|
- Refactoring
|
|
[#400](https://github.com/vincenthz/hs-tls/pull/400)
|
|
[#399](https://github.com/vincenthz/hs-tls/pull/399)
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Nov 8 16:15:03 UTC 2019 - Peter Simons <psimons@suse.com>
|
|
|
|
- Drop obsolete group attributes.
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Oct 15 02:03:13 UTC 2019 - psimons@suse.com
|
|
|
|
- Update tls to version 1.5.2.
|
|
Upstream has edited the change log file since the last release in
|
|
a non-trivial way, i.e. they did more than just add a new entry
|
|
at the top. You can review the file at:
|
|
http://hackage.haskell.org/package/tls-1.5.2/src/CHANGELOG.md
|
|
|
|
-------------------------------------------------------------------
|
|
Sun Jul 28 02:01:08 UTC 2019 - psimons@suse.com
|
|
|
|
- Update tls to version 1.5.1.
|
|
## Version 1.5.1
|
|
|
|
- Post-handshake authentication [#363](https://github.com/vincenthz/hs-tls/pull/363)
|
|
- Fixing memory leak [#366](https://github.com/vincenthz/hs-tls/pull/366)
|
|
- Improve version negotiation [#368](https://github.com/vincenthz/hs-tls/pull/368)
|
|
- Don't send 0-RTT data when ticket is expired [#370](https://github.com/vincenthz/hs-tls/pull/370)
|
|
- Handshake packet fragmentation [#371](https://github.com/vincenthz/hs-tls/pull/371)
|
|
|
|
-------------------------------------------------------------------
|
|
Sun Jun 2 02:01:34 UTC 2019 - psimons@suse.com
|
|
|
|
- Update tls to version 1.5.0.
|
|
Upstream has edited the change log file since the last release in
|
|
a non-trivial way, i.e. they did more than just add a new entry
|
|
at the top. You can review the file at:
|
|
http://hackage.haskell.org/package/tls-1.5.0/src/CHANGELOG.md
|
|
|
|
-------------------------------------------------------------------
|
|
Sat Oct 20 11:32:09 UTC 2018 - Peter Simons <psimons@suse.com>
|
|
|
|
- Use https URL to refer to bugs.opensuse.org.
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Jul 18 14:26:45 UTC 2018 - psimons@suse.com
|
|
|
|
- Cosmetic: replace tabs with blanks, strip trailing white space,
|
|
and update copyright headers with spec-cleaner.
|
|
|
|
-------------------------------------------------------------------
|
|
Mon May 14 17:02:11 UTC 2018 - psimons@suse.com
|
|
|
|
- Update tls to version 1.4.1.
|
|
- Enable X25519 in default parameters [#265](https://github.com/vincenthz/hs-tls/pull/265)
|
|
- Checking EOF in bye [#262] (https://github.com/vincenthz/hs-tls/pull/262)
|
|
- Improving validation in DH key exchange [#256](https://github.com/vincenthz/hs-tls/pull/256)
|
|
- Handle TCP reset during handshake [#251](https://github.com/vincenthz/hs-tls/pull/251)
|
|
- Accepting hlint suggestions.
|
|
- Wrap renegotiation failures with HandshakeFailed [#237](https://github.com/vincenthz/hs-tls/pull/237)
|
|
- Improve selection of server certificate and use "signature_algorithms" extension [#236](https://github.com/vincenthz/hs-tls/pull/236)
|
|
- Change Bytes to ByteString and deprecate the Bytes type alias [#230](https://github.com/vincenthz/hs-tls/pull/230)
|
|
- Session compression and SNI [#223](https://github.com/vincenthz/hs-tls/pull/223)
|
|
- Deprecating ciphersuite_medium. Putting WARNING to ciphersuite_all since this includes RC4 [#153](https://github.com/vincenthz/hs-tls/pull/153) [#222](https://github.com/vincenthz/hs-tls/pull/222)
|
|
- Removing NPN [#214](https://github.com/vincenthz/hs-tls/pull/214)
|
|
- Supporting RSAPSS defined in TLS 1.3 [#207](https://github.com/vincenthz/hs-tls/pull/207)
|
|
- Supporting X25519 and X448 in the IES style. [#205](https://github.com/vincenthz/hs-tls/pull/205)
|
|
- Strip leading zeros in DHE premaster secret [#201](https://github.com/vincenthz/hs-tls/pull/201)
|
|
- RSASSA-PSS signatures can be enabled with `supportedHashSignatures`. This
|
|
uses assignments from TLS 1.3, for example `(HashIntrinsic, SignatureRSApssSHA256)`.
|
|
- Diffie-Hellman with elliptic curves X25519 and X448: This can be enabled with
|
|
`supportedGroups`, which also gives control over curve preference.
|
|
- ECDH with curve P-256 now uses optimized C implementation from package `cryptonite`.
|
|
|
|
API CHANGES:
|
|
|
|
- Cipher list `ciphersuite_medium` is now deprecated, users are advised to use
|
|
`ciphersuite_default` or `ciphersuite_strong`. List `ciphersuite_all` is kept
|
|
for compatibility with old servers but this is discouraged and generates a
|
|
warning (this includes RC4 ciphers, see [#153](https://github.com/vincenthz/hs-tls/pull/153)
|
|
for reference).
|
|
- Support for NPN (Next Protocol Negotiation) has been removed. The replacement
|
|
is ALPN (Application-Layer Protocol Negotiation).
|
|
- Data type `SessionData` now contains fields for compression algorithm and
|
|
client SNI. A `SessionManager` implementation that serializes/deserializes
|
|
`SessionData` values must deal with the new fields.
|
|
- Module `Network.TLS` exports a type alias named `Bytes` which is now deprecated.
|
|
The replacement is to use strict `ByteString` directly.
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Aug 3 15:38:38 UTC 2017 - psimons@suse.com
|
|
|
|
- Updated with latest spec-cleaner version 0.9.8-8-geadfbbf.
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Jun 30 03:01:57 UTC 2017 - psimons@suse.com
|
|
|
|
- Update to version 1.3.11.
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Apr 26 15:04:39 UTC 2017 - psimons@suse.com
|
|
|
|
- Update to version 1.3.10 revision 2 with cabal2obs.
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Mar 27 12:38:43 UTC 2017 - psimons@suse.com
|
|
|
|
- Update to version 1.3.10 revision 1 with cabal2obs.
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Jan 18 09:00:21 UTC 2017 - psimons@suse.com
|
|
|
|
- Update to version 1.3.9 with cabal2obs.
|
|
|
|
-------------------------------------------------------------------
|
|
Sun Jul 10 16:56:12 UTC 2016 - psimons@suse.com
|
|
|
|
- Update to version 1.3.8 revision 0 with cabal2obs.
|
|
|
|
-------------------------------------------------------------------
|
|
Fri May 13 12:53:41 UTC 2016 - mimi.vx@gmail.com
|
|
|
|
- update to 1.3.8
|
|
|
|
-------------------------------------------------------------------
|
|
Wed May 11 15:35:33 UTC 2016 - mimi.vx@gmail.com
|
|
|
|
- update to 1.3.7
|
|
* Disable SHA384 based cipher, as they don't work properly yet.
|
|
|
|
-------------------------------------------------------------------
|
|
Sun May 8 11:22:31 UTC 2016 - mimi.vx@gmail.com
|
|
|
|
- update to 1.3.6
|
|
* Add new ciphers
|
|
* Improve some debugging and outputs
|
|
|
|
-------------------------------------------------------------------
|
|
Sun Apr 10 19:02:03 UTC 2016 - mimi.vx@gmail.com
|
|
|
|
- update to 1.3.5
|
|
* Fix a bug with ECDHE based cipher where serialization
|
|
* Improve tests
|
|
* Debugging: Add a way to print random seed and a way to side-load
|
|
a seed for replayability
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Dec 15 20:50:00 UTC 2015 - mimi.vx@gmail.com
|
|
|
|
- update to 1.3.4
|
|
* Add support for Hans (Haskell Network Stack)
|
|
* Add support for ECDSA signature
|
|
* Add support for ECDSA-ECDHE Cipher
|
|
* Improve parsing of ECC related structure
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Aug 31 08:14:19 UTC 2015 - mimi.vx@gmail.com
|
|
|
|
- update to 1.3.2
|
|
* Add cipher suites for forward secrecy on more clients (Aaron Friel)
|
|
* Maintain more handshake information to be queried by protocol (Adam Wick)
|
|
* handle SCSV on client and server side (Kazu Yamamoto)
|
|
* Cleanup renegotiation logic (Kazu Yamamoto)
|
|
* Various testing improvements with the openssl test parts
|
|
* Cleanup AEAD handling for future support of other ciphers
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Aug 6 20:43:26 UTC 2015 - mimi.vx@gmail.com
|
|
|
|
- update to 1.3.1
|
|
* Repair DHE RSA handling on the cipher by creating signature properly
|
|
* modernize the crypto stack by using cryptonite.
|
|
|
|
-------------------------------------------------------------------
|
|
Sun Jun 21 16:56:51 UTC 2015 - mimi.vx@gmail.com
|
|
|
|
- update to 1.2.18
|
|
* add more tests (network, local)
|
|
* cleanup cipher / bulk code, certificate verify / creation, and digitall signed handling
|
|
* fix handling of DHE ciphers with MS SSL stack that serialize leading zero.
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Apr 23 18:32:31 UTC 2015 - mimi.vx@gmail.com
|
|
|
|
- update to 1.2.17
|
|
* Fix an issue with stream cipher not correctly calculating the internal state,
|
|
resulting systematically in bad record mac failure during handshake
|
|
* support chain certificate in credentials
|
|
* adding ALPN extension
|
|
* adding support for AEAD, and particularly AES128-GCM
|
|
* Adding support for ECDH
|
|
* Do not support SSL3 by default for security reason.
|
|
* add EnumSafe8 and 16 for specific sized Enum instance that are safer
|
|
* export signatureAndHash parser/encoder
|
|
* add a "known" list of extensions
|
|
* add SignatureAlgorithms extension
|
|
* add Heartbeat extension
|
|
* add support for EC curves and point format extensions
|
|
* add preliminary SessionTicket extension
|
|
* Propagate asynchronous exception
|
|
* Export TLSParams and HasBackend type names
|
|
* Added FlexibleContexts flag required by ghc-7.9
|
|
* debug: add support for specifying the timeout length in milliseconds.
|
|
* debug: add support for 3DES in simple client
|
|
* add support for 3DES-EDE-CBC-SHA1 (cipher 0xa)
|
|
* repair retrieve certificate validation, and improve fingerprints
|
|
* remove groom from dependency
|
|
* make RecordM an instance of Applicative
|
|
* Fixes the Error_EOF partial pattern match error in exception handling
|
|
* Fixed socket backend endless loop when the server does not close connection
|
|
properly at the TLS level with the close notify alert.
|
|
* Catch Error_EOF in recvData and return empty data.
|
|
* Fixed Server key exchange data being parsed without the correct
|
|
context, leading to not knowing how to parse the structure.
|
|
The bug happens on efficient server that happens to send the ServerKeyXchg
|
|
message together with the ServerHello in the same handshake packet.
|
|
This trigger parsing of all the messages without having set the pending cipher.
|
|
Delay parsing, when this happen, until we know what to do with it.
|
|
* Fixed unrecognized name non-fatal alert after client hello.
|
|
* Add SSL3 to the supported list of version by default.
|
|
* Fixed handshake records not being able to span multiples records.
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Oct 7 07:12:32 UTC 2013 - sbahling@suse.com
|
|
|
|
- Initial package - version 1.1.5
|