summaryrefslogtreecommitdiff
path: root/doc/rst/legacy/nss_releases/nss_3.24_release_notes/index.rst
diff options
context:
space:
mode:
Diffstat (limited to 'doc/rst/legacy/nss_releases/nss_3.24_release_notes/index.rst')
-rw-r--r--doc/rst/legacy/nss_releases/nss_3.24_release_notes/index.rst201
1 files changed, 201 insertions, 0 deletions
diff --git a/doc/rst/legacy/nss_releases/nss_3.24_release_notes/index.rst b/doc/rst/legacy/nss_releases/nss_3.24_release_notes/index.rst
new file mode 100644
index 000000000..146baf87a
--- /dev/null
+++ b/doc/rst/legacy/nss_releases/nss_3.24_release_notes/index.rst
@@ -0,0 +1,201 @@
+.. _mozilla_projects_nss_nss_3_24_release_notes:
+
+NSS 3.24 release notes
+======================
+
+`Introduction <#introduction>`__
+--------------------------------
+
+.. container::
+
+ The Network Security Services (NSS) team has released NSS 3.24, which is a minor release.
+
+.. _distribution_information:
+
+`Distribution information <#distribution_information>`__
+--------------------------------------------------------
+
+.. container::
+
+ The hg tag is NSS_3_24_RTM. NSS 3.24 requires Netscape Portable Runtime(NSPR) 4.12 or newer.
+
+ NSS 3.24 source distributions are available on ftp.mozilla.org for secure HTTPS download:
+
+ - Source tarballs:
+ https://ftp.mozilla.org/pub/mozilla.org/security/nss/releases/NSS_3_24_RTM/src/
+
+.. _new_in_nss_3.24:
+
+`New in NSS 3.24 <#new_in_nss_3.24>`__
+--------------------------------------
+
+.. container::
+
+ NSS 3.24 includes two NSS softoken updates, a new function to configure SSL/TLS server sockets,
+ and two functions to improve the use of temporary arenas.
+
+.. _new_functionality:
+
+`New functionality <#new_functionality>`__
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+.. container::
+
+ - NSS softoken has been updated with the latest National Institute of Standards and Technology
+ (NIST) guidance (as of 2015):
+
+ - Software integrity checks and POST functions are executed on shared library load. These
+ checks have been disabled by default, as they can cause a performance regression. To enable
+ these checks, you must define symbol NSS_FORCE_FIPS when building NSS.
+ - Counter mode and Galois/Counter Mode (GCM) have checks to prevent counter overflow.
+ - Additional CSPs are zeroed in the code.
+ - NSS softoken uses new guidance for how many Rabin-Miller tests are needed to verify a prime
+ based on prime size.
+
+ - NSS softoken has also been updated to allow NSS to run in FIPS Level 1 (no password). This
+ mode is triggered by setting the database password to the empty string. In FIPS mode, you may
+ move from Level 1 to Level 2 (by setting an appropriate password), but not the reverse.
+ - A SSL_ConfigServerCert function has been added for configuring SSL/TLS server sockets with a
+ certificate and private key. Use this new function in place of SSL_ConfigSecureServer,
+ SSL_ConfigSecureServerWithCertChain, SSL_SetStapledOCSPResponses, and
+ SSL_SetSignedCertTimestamps. SSL_ConfigServerCert automatically determines the certificate
+ type from the certificate and private key. The caller is no longer required to use SSLKEAType
+ explicitly to select a "slot" into which the certificate is configured (which incorrectly
+ identifies a key agreement type rather than a certificate). Separate functions for configuring
+ Online Certificate Status Protocol (OCSP) responses or Signed Certificate Timestamps are not
+ needed, since these can be added to the optional SSLExtraServerCertData struct provided to
+ SSL_ConfigServerCert.  Also, partial support for RSA Probabilistic Signature Scheme (RSA-PSS)
+ certificates has been added. Although these certificates can be configured, they will not be
+ used by NSS in this version.
+ - For functions that use temporary arenas, allocating a PORTCheapArena on the stack is more
+ performant than allocating a PLArenaPool on the heap. Rather than declaring a PLArenaPool
+ pointer and calling PORT_NewArena/PORT_FreeArena to allocate or free an instance on the heap,
+ declare a PORTCheapArenaPool on the stack and use PORT_InitCheapArena/PORT_DestroyCheapArena
+ to initialize and destroy it. Items allocated from the arena are still created on the heap,
+ only the arena itself is stack-allocated. Note: This approach is only useful when the arena
+ use is tightly bounded, for example, if it is only used in a single function.
+
+.. _new_elements:
+
+`New elements <#new_elements>`__
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+.. container::
+
+ This section lists and briefly describes the new functions, types, and macros in NSS 3.24.
+
+ .. rubric:: New functions
+ :name: new_functions
+
+ - *In ssl.h*
+
+ - SSL_ConfigServerCert - Configures an SSL/TLS socket with a certificate, private key, and
+ other information.
+
+ - *In secport.h*
+
+ - PORT_InitCheapArena - Initializes an arena that was created on the stack. (See
+ PORTCheapArenaPool.)
+ - PORT_DestroyCheapArena - Destroys an arena that was created on the stack. (See
+ PORTCheapArenaPool.)
+
+ .. rubric:: New types
+ :name: new_types
+
+ - *In sslt.h*
+
+ - SSLExtraServerCertData - Optionally passed as an argument to SSL_ConfigServerCert. This
+ struct contains supplementary information about a certificate, such as the intended type of
+ the certificate, stapled OCSP responses, or Signed Certificate Timestamps (used for
+ `certificate transparency <https://datatracker.ietf.org/doc/html/rfc6962>`__).
+
+ - *In secport.h*
+
+ - PORTCheapArenaPool - A stack-allocated arena pool, to be used for temporary arena
+ allocations.
+
+ .. rubric:: New macros
+ :name: new_macros
+
+ - *In pkcs11t.h*
+
+ - CKM_TLS12_MAC
+
+ - *In secoidt.h*
+
+ - SEC_OID_TLS_ECDHE_PSK - This OID governs the use of the
+ TLS_ECDHE_PSK_WITH_AES_128_GCM_SHA256 cipher suite, which is used only for session
+ resumption in TLS 1.3.
+
+.. _notable_changes_in_nss_3.24:
+
+`Notable changes in NSS 3.24 <#notable_changes_in_nss_3.24>`__
+--------------------------------------------------------------
+
+.. container::
+
+ Additions, deprecations, and other changes in NSS 3.24 are listed below.
+
+ - Deprecate the following functions. (Applications should instead use the new
+ SSL_ConfigServerCert function.)
+
+ - SSL_SetStapledOCSPResponses
+ - SSL_SetSignedCertTimestamps
+ - SSL_ConfigSecureServer
+ - SSL_ConfigSecureServerWithCertChain
+
+ - Deprecate the NSS_FindCertKEAType function, as it reports a misleading value for certificates
+ that might be used for signing rather than key exchange.
+ - Update SSLAuthType to define a larger number of authentication key types.
+ - Deprecate the member attribute **authAlgorithm** of type SSLCipherSuiteInfo. Instead,
+ applications should use the newly added attribute **authType**.
+ - Rename ssl_auth_rsa to ssl_auth_rsa_decrypt.
+ - Add a shared library (libfreeblpriv3) on Linux platforms that define FREEBL_LOWHASH.
+ - Remove most code related to SSL v2, including the ability to actively send a SSLv2-compatible
+ client hello. However, the server-side implementation of the SSL/TLS protocol still supports
+ processing of received v2-compatible client hello messages.
+ - Disable (by default) NSS support in optimized builds for logging SSL/TLS key material to a
+ logfile if the SSLKEYLOGFILE environment variable is set. To enable the functionality in
+ optimized builds, you must define the symbol NSS_ALLOW_SSLKEYLOGFILE when building NSS.
+ - Update NSS to protect it against the Cachebleed attack.
+ - Disable support for DTLS compression.
+ - Improve support for TLS 1.3. This includes support for DTLS 1.3. Note that TLS 1.3 support is
+ experimental and not suitable for production use.
+
+.. _bugs_fixed_in_nss_3.24:
+
+`Bugs fixed in NSS 3.24 <#bugs_fixed_in_nss_3.24>`__
+----------------------------------------------------
+
+.. container::
+
+ This Bugzilla query returns all the bugs fixed in NSS 3.24:
+
+ https://bugzilla.mozilla.org/buglist.cgi?resolution=FIXED&classification=Components&query_format=advanced&product=NSS&target_milestone=3.24
+
+`Acknowledgements <#acknowledgements>`__
+----------------------------------------
+
+.. container::
+
+ The NSS development team would like to thank Yuval Yarom for responsibly disclosing the
+ Cachebleed attack by providing advance copies of their research.
+
+`Compatibility <#compatibility>`__
+----------------------------------
+
+.. container::
+
+ NSS 3.24 shared libraries are backward-compatible with all older NSS 3.x shared libraries. A
+ program linked with older NSS 3.x shared libraries will work with NSS 3.24 shared libraries
+ without recompiling or relinking. Furthermore, applications that restrict their use of NSS APIs
+ to the functions listed in NSS Public Functions will remain compatible with future versions of
+ the NSS shared libraries.
+
+`Feedback <#feedback>`__
+------------------------
+
+.. container::
+
+ Bugs discovered should be reported by filing a bug report with
+ `bugzilla.mozilla.org <https://bugzilla.mozilla.org/enter_bug.cgi?product=NSS>`__ (product NSS). \ No newline at end of file