- update to 1.11.0:
* code cleanup
* testbench: Fix commands in some openssl tests
* openssl: fix openssl exit code avoid double free of ctx
When more than one librelp instance are used in the same process,
and the relpTcpExitTLS call was called a second time, the process
could freeze due a double free (See SSL_CTX_free call).
* librelp hardening: Fix multiple minor issues causing debugging trouble
- avoid invalid dbgprint calls
- avoid double free in relpTcpDestruct (if called twice).
- add debug output into relpTcpRcv
* OpenSSL: fix depreacted API issues for OpenSSL 3.x
- OpenSSL error strings are loaded automatically now
* bugfix: compatiblity problem with openssl 1.1
* bugfix: Forward return code from relpEngineSetTLSLib to
relpEngineSetTLSLibName
* bugfix: make relpEngineSetTLSLib debug safe
* bugfix: warnings reported by coverity scan
* gnutls drvr bugfix: library called exit() under some circumstances
OBS-URL: https://build.opensuse.org/request/show/1060002
OBS-URL: https://build.opensuse.org/package/show/Base:System/librelp?expand=0&rev=77
399 lines
15 KiB
Plaintext
399 lines
15 KiB
Plaintext
-------------------------------------------------------------------
|
|
Fri Jan 20 16:42:52 UTC 2023 - Dirk Müller <dmueller@suse.com>
|
|
|
|
- update to 1.11.0:
|
|
* code cleanup
|
|
* testbench: Fix commands in some openssl tests
|
|
* openssl: fix openssl exit code avoid double free of ctx
|
|
When more than one librelp instance are used in the same process,
|
|
and the relpTcpExitTLS call was called a second time, the process
|
|
could freeze due a double free (See SSL_CTX_free call).
|
|
* librelp hardening: Fix multiple minor issues causing debugging trouble
|
|
- avoid invalid dbgprint calls
|
|
- avoid double free in relpTcpDestruct (if called twice).
|
|
- add debug output into relpTcpRcv
|
|
* OpenSSL: fix depreacted API issues for OpenSSL 3.x
|
|
- OpenSSL error strings are loaded automatically now
|
|
* bugfix: compatiblity problem with openssl 1.1
|
|
* bugfix: Forward return code from relpEngineSetTLSLib to
|
|
relpEngineSetTLSLibName
|
|
* bugfix: make relpEngineSetTLSLib debug safe
|
|
* bugfix: warnings reported by coverity scan
|
|
* gnutls drvr bugfix: library called exit() under some circumstances
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Feb 17 11:21:54 UTC 2021 - Andreas Stieger <andreas.stieger@gmx.de>
|
|
|
|
- librelp 1.10.0:
|
|
* TLS handling: custom cipherstrings (tlscommands) were not used
|
|
|
|
-------------------------------------------------------------------
|
|
Sun Nov 29 20:55:01 UTC 2020 - Andreas Stieger <andreas.stieger@gmx.de>
|
|
|
|
- librelp 1.9.0:
|
|
* openssl bugfix: preprocessor check for tlsconfigcmd code
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Oct 23 11:49:25 UTC 2020 - Andreas Stieger <andreas.stieger@gmx.de>
|
|
|
|
- librelp 1.8.0:
|
|
* gnutls "bugfix": handle receivers who break connection on
|
|
close
|
|
* gnutls bugfix: per-session memory leak
|
|
* tls bugfix: RETRY not correctly handled in TLS Mode
|
|
* openssl: Fix error output for all error cases
|
|
* bugfix: librelp.h contains duplicate function definition
|
|
* removed some more externally visible symbols not being part of
|
|
API
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Sep 7 19:27:38 UTC 2020 - Andreas Stieger <andreas.stieger@gmx.de>
|
|
|
|
- librelp 1.7.0:
|
|
* ix library exporting non-API symbols
|
|
* openssl: Fix chained certificate files for older OpenSSL
|
|
* fix FD leak when socket shutdown is one-sided
|
|
* TLS: cleaner shutdown on relpEngineDestruct
|
|
* fix memory leak on session break
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Jun 18 13:54:50 UTC 2020 - Andreas Stieger <andreas.stieger@gmx.de>
|
|
|
|
- librelp 1.6.0:
|
|
* fix namespace pollution
|
|
* replsess: fix double free of sendbuf in some cases
|
|
* improve support for libressl
|
|
* Modified GnuTLS priority according to standard crypto-policy
|
|
guideline
|
|
* tcp: Missing pUsr Copy to relpTcp Pointer fixed in
|
|
relpTcpAcceptConnReq
|
|
* report io errors for plain tcp connections
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Feb 25 19:49:40 UTC 2020 - Andreas Stieger <andreas.stieger@gmx.de>
|
|
|
|
- librelp 1.5.0:
|
|
* Fix librelp engine long shutdown issues
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Mar 8 20:13:47 UTC 2019 - Andreas Stieger <andreas.stieger@gmx.de>
|
|
|
|
- librelp 1.4.0:
|
|
* Both openssl and GnuTLS are now enabled
|
|
* support concurent use of both GnuTLS and openssl TLS drivers
|
|
* bugfix: in openssl mode, cert name validation did not work properly
|
|
* bugfix: invalid handling of connection fail could lead to abort
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Dec 31 13:52:11 UTC 2018 - astieger@suse.com
|
|
|
|
- librelp 1.3.0:
|
|
* improved error reporting
|
|
* bugfix openssl: anon mode did not work with openssl 1.1.0+
|
|
* bugfix: do not send multiple open commands
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Oct 2 20:30:21 UTC 2018 - astieger@suse.com
|
|
|
|
- librelp 1.2.18:
|
|
* added non-standard "certvalid" auth mode to TLS authentication
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Sep 3 14:42:28 UTC 2018 - astieger@suse.com
|
|
|
|
- librelp 1.2.17:
|
|
* add support for openssl, GnuTLS remains the default
|
|
* improve error message on connection failure
|
|
* fix 100% CPU utilization due to busy loop
|
|
* fix do not expose symbols that are not part of public API
|
|
* fix potential segfault when listener could not be bound
|
|
|
|
-------------------------------------------------------------------
|
|
Tue May 15 13:37:15 UTC 2018 - astieger@suse.com
|
|
|
|
- librelp 1.2.16:
|
|
* add new API: relpSrvSetOversizeMode()
|
|
* add new API: relpSrvSetLstnAddr()
|
|
* support additional hashes for fingerprint mode
|
|
* fix various memory leaks
|
|
|
|
-------------------------------------------------------------------
|
|
Sat Mar 24 08:48:48 UTC 2018 - astieger@suse.com
|
|
|
|
- librelp 1.2.15:
|
|
* CVE-2018-1000140: A remote attackher could have used specially
|
|
crafted x509 certificates when connecting to rsyslog to trigger
|
|
a stack buffer overflow and run arbitrary code (bsc#1086730)
|
|
* bugfix: invalid handling of snprintf() return code
|
|
* bugfix: invalid assert predicate
|
|
* some code cleanup
|
|
* bugfix: error message on open error was truncated
|
|
|
|
-------------------------------------------------------------------
|
|
Mon May 29 15:46:36 UTC 2017 - astieger@suse.com
|
|
|
|
- librelp 1.2.14:
|
|
* API extension: add relpSrvSetMaxDataSize()
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Feb 23 13:28:52 UTC 2017 - astieger@suse.com
|
|
|
|
- librelp 1.2.13:
|
|
* bugfix: duplicated lines after server reconnect
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Jan 30 17:31:03 CET 2017 - ndas@suse.com
|
|
|
|
- This updated library is needed for latest rsyslog(fate#320546)
|
|
|
|
-------------------------------------------------------------------
|
|
Sun Jul 10 18:43:57 UTC 2016 - astieger@suse.com
|
|
|
|
- librelp 1.2.12:
|
|
* API enhancement: permit to set connection timeout
|
|
* cleanup: replace deprecated GnuTLS data types by current ones
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Jun 28 15:29:05 UTC 2016 - astieger@suse.com
|
|
|
|
- librelp 1.2.11:
|
|
* do not accept more than one "open" verb on a connection
|
|
* fix potential segfault when high-numbered fd is used in sender
|
|
* make librelp not run in thight loop when out of sockets
|
|
* flush the current recv frame if it exists if the client session
|
|
is restarting
|
|
* API enhancement: add configurable connection timeout
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Apr 4 11:55:31 UTC 2016 - astieger@suse.com
|
|
|
|
- librelp 1.2.10:
|
|
* fix a problem with sending large buffers
|
|
* improve sender/receiver code
|
|
* enable compatibility with older versions of GnuTLS
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Feb 8 21:00:15 UTC 2016 - mpluskal@suse.com
|
|
|
|
- Make building more verbose
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Jan 28 14:00:17 UTC 2016 - mrueckert@suse.de
|
|
|
|
- fix build on sle11. the sles_version conditional is just broken
|
|
|
|
-------------------------------------------------------------------
|
|
Sat Jan 2 15:17:45 UTC 2016 - astieger@suse.com
|
|
|
|
- librelp 1.2.9:
|
|
* Ignoring return status when handling syslog frames now.
|
|
Otherwise valid messages in the frame buffer will get lost when
|
|
the remote connection is closed during meantime.
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Sep 8 19:51:14 UTC 2015 - astieger@suse.com
|
|
|
|
- librelp 1.2.8:
|
|
* fix segfault if KEEPALIVE is used
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Apr 29 17:07:46 UTC 2014 - andreas.stieger@gmx.de
|
|
|
|
- update to 1.2.7
|
|
- bugfix: librelp was incompatible with C++ without a real reason
|
|
- bugfix: potential misadressing in wildcard match
|
|
- bugfix: always last wildcard match was reported, not first
|
|
- contains changes from 1.2.6
|
|
- report error when preparing for non-anon TLS and this is
|
|
unsupported
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Mar 20 16:18:03 UTC 2014 - andreas.stieger@gmx.de
|
|
|
|
- update to 1.2.5:
|
|
- permit to use anonymous TLS on platforms where GnuTLS lacks
|
|
certificate verification function
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Mar 17 12:15:50 UTC 2014 - andreas.stieger@gmx.de
|
|
|
|
- update to 1.2.4:
|
|
- correct API/ABI change in 1.2.3
|
|
- revert back to previous state (return void)
|
|
* relpSrvEnableTLS();
|
|
* relpSrvEnableTLSZip();
|
|
These functions are now deprecated.
|
|
- introduce new functions that return a state
|
|
* relpSrvEnableTLS2();
|
|
* relpSrvEnableTLSZip2();
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Mar 14 14:50:27 UTC 2014 - andreas.stieger@gmx.de
|
|
|
|
- update to 1.2.3:
|
|
- add ability to build librelp without TLS
|
|
- API change: two functions that used to return void now return
|
|
state:
|
|
* relpSrvEnableTLS();
|
|
* relpSrvEnableTLSZip();
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Jan 14 20:53:10 UTC 2014 - andreas.stieger@gmx.de
|
|
|
|
- update to 1.2.2:
|
|
- add capability to enable tcp KEEPALIVE
|
|
- introduced new API relpSrvSetKeepAlive() to support KEEPALIVE
|
|
- errors binding listener port are now reported via error message
|
|
callback
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Jul 16 10:52:06 UTC 2013 - andreas.stieger@gmx.de
|
|
|
|
- update to 1.2.0:
|
|
- support for epoll() added
|
|
- API extension: relpEngineSetOnGenericErr
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Jul 11 21:41:09 UTC 2013 - andreas.stieger@gmx.de
|
|
|
|
- update to 1.1.5:
|
|
This is a bug-fixing release that takes care of a memory leak on
|
|
connection close as well as potential misadressing on session
|
|
close.
|
|
- bugfix: memory leak on connection close
|
|
- bugfix: potential misadressing on session close
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Jul 11 21:35:53 UTC 2013 - andreas.stieger@gmx.de
|
|
|
|
- update to 1.1.4:
|
|
This version of the library provides certificate wildcard name
|
|
checks. It also supports enhanced performance options (burst
|
|
support, requires support from the caller). It also contains
|
|
some bug fixes, especially for BSD.
|
|
- fix build problems on BSD
|
|
- add ability to specify a non-standard RELP Window size
|
|
- add burst support to the client API
|
|
- wildcards are now supported in TLS name peer authentication
|
|
- new APIs: relpCltHintBurstBegin, relpCltHintBurstEnd,
|
|
relpCltSetWindowSize
|
|
|
|
-------------------------------------------------------------------
|
|
Sun Jun 30 10:44:04 UTC 2013 - andreas.stieger@gmx.de
|
|
|
|
- update to 1.1.3:
|
|
- increased performance of RELP connection
|
|
- bugfix: potential segfault if no GnuTLS priority string was set
|
|
- includes changes from 1.1.2:
|
|
- add capability to specify the GnuTLS priority string
|
|
This gives callers complete control over crypto parameters, like
|
|
ciphers to use.
|
|
- add certificate-based authentication
|
|
- add capability to specify number of Diffie-Hellman bits to use
|
|
- API extension: relpSrvSetDHBits, relpSrvSetGnuTLSPriString,
|
|
relpSrvSetGnuTLSPriString, relpCltSetGnuTLSPriString
|
|
relpEngineSetOnAuthErr, relpCltSetUsrPtr,
|
|
relpSrvSetAuthMode, relpCltSetAuthMode
|
|
- includes changes from 1.1.1:
|
|
- added compression support for TLS
|
|
- API extension: relpCltEnableTLSZip, relpSrvEnableTLSZip
|
|
- includes changes from 1.1.0
|
|
- add TLS support
|
|
- new api for creating listners:
|
|
... which permits us to set various properties before the listener
|
|
is actually started. New callers should use it. Sequence is:
|
|
* relpEngineListnerConstruct()
|
|
* ... set properties ... (via relpSrv...() family)
|
|
* relgEngineListnerConstructFinalize()
|
|
This new style permits us to add/set additional listner options
|
|
without the need to introduce ever-new listner create functions.
|
|
Actually, their number would grow exponentionally, so this were
|
|
a dead end.
|
|
The old-style APIs relpEngineAddListner() and
|
|
relpEngineAddListner2() are still fully supported (and supposed
|
|
to be for a long time), but flagged as deprecated.
|
|
- includes changes from 1.0.7:
|
|
- ABI change: removed relpCltConnect2() API which was against
|
|
librelp API philosophy
|
|
This was only introduced in 1.0.6 and been in the code for a very
|
|
short time. So we decided that the best thing to do is actually
|
|
remove it (there is NO known released user, this changes was for
|
|
yet unreleased rsyslog 7.5.0).
|
|
- includes changes from 1.0.6:
|
|
- enhanced API to permit binding a client to a specific IP address
|
|
- includes changes from 1.0.5:
|
|
- bugfix: compile problem on Solaris
|
|
- includes changes from 1.0.4:
|
|
- bugfix: busy loop on syslog sending as a client when server did not
|
|
accept data; this was broken out only when the remote peer
|
|
indicated that the connection as whole was broken. Now we properly
|
|
timeout.
|
|
- make -devel package require gnutls-devel to be useful
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Apr 23 20:06:57 UTC 2013 - andreas.stieger@gmx.de
|
|
|
|
- update to 1.0.3:
|
|
- added relpCltSetTimeout() interface function
|
|
- improved timeout handling
|
|
- provide support for user-settable shutdown indicator
|
|
- includes changes from 1.0.2:
|
|
- added capability to support only IPv4/v6 instead of both
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Sep 24 20:20:59 UTC 2012 - andreas.stieger@gmx.de
|
|
|
|
- update to upstream 1.0.1:
|
|
- added capability to stop server without canceling its thread
|
|
- bugfix: interrupt of select() was not properly handled
|
|
- add pkgconfig support
|
|
|
|
-------------------------------------------------------------------
|
|
Mon May 14 14:01:23 UTC 2012 - cfarrell@suse.com
|
|
|
|
- license update: GPL-3.0+
|
|
No indication of GPL-3.0 ^only^ files in package. Fedora also using
|
|
GPL-3.0+
|
|
|
|
-------------------------------------------------------------------
|
|
Fri May 11 15:43:56 UTC 2012 - jengelh@inai.de
|
|
|
|
- Remove redundant sections and tags from specfile
|
|
- Enable parallel build
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Feb 13 10:49:11 UTC 2012 - coolo@suse.com
|
|
|
|
- patch license to follow spdx.org standard
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Apr 14 09:42:37 UTC 2010 - mrueckert@suse.de
|
|
|
|
- update to version 1.0.0
|
|
This version of librelp matured in practice and it is now time
|
|
for a 1.0 release. Besides that, it includes a small number of
|
|
changes:
|
|
- bugfix: user callback never received remote IP address
|
|
- bugfix: offers builder did use a fixed size string without
|
|
bounds checking. I don't think this was a real issue as it was
|
|
not exposed to the outside world, but now the buffer
|
|
dynamically grows (which is the right thing to do). Thank to
|
|
mterry for alerting me.
|
|
- additional changes from version 0.1.3
|
|
- the callback on message reception did not contain a way to pass
|
|
on a caller cookie (e.g. for an instance pointer). An
|
|
additional interface has been added to support that.
|
|
- cleaned up FDL license specifics
|
|
- added libtool versioning
|
|
- made librelp compile out of the box on FreeBSD - thanks to
|
|
Michael Biebl for the patch
|
|
- additional changes from version 0.1.2
|
|
- forward compatibility changes in support of our plans to use
|
|
the rsyslog runtime in the future
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Apr 9 17:55:18 CEST 2008 - mrueckert@suse.de
|
|
|
|
- initial package
|
|
|