summaryrefslogtreecommitdiff
path: root/doc/rst/legacy/nss_releases/nss_3.23_release_notes/index.rst
blob: 78cd188db3d06df1ce59ddaa82a08f578626a284 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
.. _mozilla_projects_nss_nss_3_23_release_notes:

NSS 3.23 release notes
======================

`Introduction <#introduction>`__
--------------------------------

.. container::

   The NSS team has released Network Security Services (NSS) 3.23, which is a minor release.

.. _distribution_information:

`Distribution Information <#distribution_information>`__
--------------------------------------------------------

.. container::

   The HG tag is NSS_3_23_RTM. NSS 3.23 requires NSPR 4.12 or newer.

   NSS 3.23 source distributions are available on ftp.mozilla.org for secure HTTPS download:

   -  Source tarballs:
      https://ftp.mozilla.org/pub/mozilla.org/security/nss/releases/NSS_3_23_RTM/src/

.. _new_in_nss_3.23:

`New in NSS 3.23 <#new_in_nss_3.23>`__
--------------------------------------

.. _new_functionality:

`New Functionality <#new_functionality>`__
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

.. container::

   -  ChaCha20/Poly1305 cipher and TLS cipher suites now supported (`bug
      917571 <https://bugzilla.mozilla.org/show_bug.cgi?id=917571>`__, `bug
      1227905 <https://bugzilla.mozilla.org/show_bug.cgi?id=1227905>`__)

   -

      .. container::

         Experimental-only support TLS 1.3 1-RTT mode (draft-11). This code is not ready for
         production use.

   .. rubric:: New Functions
      :name: new_functions

   -  *in ssl.h*

      -  **SSL_SetDowngradeCheckVersion** - Set maximum version for new ServerRandom anti-downgrade
         mechanism. Clients that perform a version downgrade (which is a dangerous practice) call
         this with the highest version number that they possibly support.  This gives them access to
         the `version downgrade protection from TLS
         1.3 <https://tlswg.github.io/tls13-spec/#client-hello>`__.

.. _notable_changes_in_nss_3.23:

`Notable Changes in NSS 3.23 <#notable_changes_in_nss_3.23>`__
--------------------------------------------------------------

.. container::

   -  The copy of SQLite shipped with NSS has been updated to version 3.10.2 (`bug
      1234698 <https://bugzilla.mozilla.org/show_bug.cgi?id=1234698>`__)
   -  The list of TLS extensions sent in the TLS handshake has been reordered to increase
      compatibility of the Extended Master Secret with servers (`bug
      1243641 <https://bugzilla.mozilla.org/show_bug.cgi?id=1243641>`__)
   -  The build time environment variable NSS_ENABLE_ZLIB has been renamed to NSS_SSL_ENABLE_ZLIB
      (`Bug 1243872 <https://bugzilla.mozilla.org/show_bug.cgi?id=1243872>`__).
   -  The build time environment variable NSS_DISABLE_CHACHAPOLY was added, which can be used to
      prevent compilation of the ChaCha20/Poly1305 code.
   -  The following CA certificates were **Removed**

      -  CN = Staat der Nederlanden Root CA

         -  SHA-256 Fingerprint:
            D4:1D:82:9E:8C:16:59:82:2A:F9:3F:CE:62:BF:FC:DE:26:4F:C8:4E:8B:95:0C:5F:F2:75:D0:52:35:46:95:A3

      -  CN = NetLock Minositett Kozjegyzoi (Class QA) Tanusitvanykiado

         -  SHA-256 Fingerprint:
            E6:06:DD:EE:E2:EE:7F:5C:DE:F5:D9:05:8F:F8:B7:D0:A9:F0:42:87:7F:6A:17:1E:D8:FF:69:60:E4:CC:5E:A5

      -  CN = NetLock Kozjegyzoi (Class A) Tanusitvanykiado

         -  SHA-256 Fingerprint:
            7F:12:CD:5F:7E:5E:29:0E:C7:D8:51:79:D5:B7:2C:20:A5:BE:75:08:FF:DB:5B:F8:1A:B9:68:4A:7F:C9:F6:67

      -  CN = NetLock Uzleti (Class B) Tanusitvanykiado

         -  SHA-256 Fingerprint:
            39:DF:7B:68:2B:7B:93:8F:84:71:54:81:CC:DE:8D:60:D8:F2:2E:C5:98:87:7D:0A:AA:C1:2B:59:18:2B:03:12

      -  CN = NetLock Expressz (Class C) Tanusitvanykiado

         -  SHA-256 Fingerprint:
            0B:5E:ED:4E:84:64:03:CF:55:E0:65:84:84:40:ED:2A:82:75:8B:F5:B9:AA:1F:25:3D:46:13:CF:A0:80:FF:3F

      -  Friendly Name: VeriSign Class 1 Public PCA – G2

         -  SHA-256 Fingerprint:
            34:1D:E9:8B:13:92:AB:F7:F4:AB:90:A9:60:CF:25:D4:BD:6E:C6:5B:9A:51:CE:6E:D0:67:D0:0E:C7:CE:9B:7F

      -  Friendly Name: VeriSign Class 3 Public PCA

         -  SHA-256 Fingerprint:
            A4:B6:B3:99:6F:C2:F3:06:B3:FD:86:81:BD:63:41:3D:8C:50:09:CC:4F:A3:29:C2:CC:F0:E2:FA:1B:14:03:05

      -  Friendly Name: VeriSign Class 3 Public PCA – G2

         -  SHA-256 Fingerprint:
            83:CE:3C:12:29:68:8A:59:3D:48:5F:81:97:3C:0F:91:95:43:1E:DA:37:CC:5E:36:43:0E:79:C7:A8:88:63:8B

      -  CN = CA Disig

         -  SHA-256 Fingerprint:
            92:BF:51:19:AB:EC:CA:D0:B1:33:2D:C4:E1:D0:5F:BA:75:B5:67:90:44:EE:0C:A2:6E:93:1F:74:4F:2F:33:CF

   -  The following CA certificates were **Added**

      -  CN = SZAFIR ROOT CA2

         -  SHA-256 Fingerprint:
            A1:33:9D:33:28:1A:0B:56:E5:57:D3:D3:2B:1C:E7:F9:36:7E:B0:94:BD:5F:A7:2A:7E:50:04:C8:DE:D7:CA:FE

      -  CN = Certum Trusted Network CA 2

         -  SHA-256 Fingerprint:
            B6:76:F2:ED:DA:E8:77:5C:D3:6C:B0:F6:3C:D1:D4:60:39:61:F4:9E:62:65:BA:01:3A:2F:03:07:B6:D0:B8:04

   -  The following CA certificate had the Email **trust bit turned on**

      -  CN = Actalis Authentication Root CA

         -  SHA-256 Fingerprint:
            55:92:60:84:EC:96:3A:64:B9:6E:2A:BE:01:CE:0B:A8:6A:64:FB:FE:BC:C7:AA:B5:AF:C1:55:B3:7F:D7:60:66

.. _security_fixes_in_nss_3.23:

`Security Fixes in NSS 3.23 <#security_fixes_in_nss_3.23>`__
------------------------------------------------------------

.. container::

   -  `Bug 1245528 <https://bugzilla.mozilla.org/show_bug.cgi?id=1245528>`__ /
      `CVE-2016-1950 <http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950>`__ - Fixed a
      heap-based buffer overflow related to the parsing of certain ASN.1 structures. An attacker
      could create a specially-crafted certificate which, when parsed by NSS, would cause a crash or
      execution of arbitrary code with the permissions of the user.

.. _bugs_fixed_in_nss_3.23:

`Bugs fixed in NSS 3.23 <#bugs_fixed_in_nss_3.23>`__
----------------------------------------------------

.. container::

   This Bugzilla query returns all the bugs fixed in NSS 3.23:

   https://bugzilla.mozilla.org/buglist.cgi?resolution=FIXED&classification=Components&query_format=advanced&product=NSS&target_milestone=3.23

`Acknowledgements <#acknowledgements>`__
----------------------------------------

.. container::

   The NSS development team would like to thank security researcher Francis Gabriel for responsibly
   disclosing the issue in `Bug 1245528 <https://bugzilla.mozilla.org/show_bug.cgi?id=1245528>`__.

`Compatibility <#compatibility>`__
----------------------------------

.. container::

   NSS 3.23 shared libraries are backward compatible with all older NSS 3.x shared libraries. A
   program linked with older NSS 3.x shared libraries will work with NSS 3.23 shared libraries
   without recompiling or relinking. Furthermore, applications that restrict their use of NSS APIs
   to the functions listed in NSS Public Functions will remain compatible with future versions of
   the NSS shared libraries.

`Feedback <#feedback>`__
------------------------

.. container::

   Bugs discovered should be reported by filing a bug report with
   `bugzilla.mozilla.org <https://bugzilla.mozilla.org/enter_bug.cgi?product=NSS>`__ (product NSS).