[mod_gnutls-devel] New release: mod_gnutls 0.11.0

Fiona Klute fiona.klute at gmx.de
Sat Jun 27 21:35:20 CEST 2020


Hi everyone,

I have just uploaded a new source archive and matching signature to
https://mod.gnutls.org/downloads/ as well as the signed
mod_gnutls/0.11.0 tag to the git repositories [1, 2].

Development of this release (specifically session caching for proxy
connections) led me to discover CVE-2020-13777 in GnuTLS [3]. Because of
limitations of the GnuTLS key rotation scheme I discovered while looking
into that I've disabled session tickets by default, until a rotation
that cleanly deletes old primary keys can be implemented (either in
mod_gnutls or GnuTLS).

This release brings a mix of new features, bug fixes, and better tests:

- Change default for GnuTLSOCSPCheckNonce to "off", and send OCSP nonces
only if it has been enabled. The reason for this change is that in
practice most public CAs do not support OCSP nonces, which is permitted
by both RFC 6960 and the CA/Browser Forum baseline requirements (as of
version 1.6.9). In this situation enforcing correct nonces by default
makes the automatic OCSP stapling support mostly useless.

- Add a test for correct nonce handling with "GnuTLSOCSPCheckNonce on",
thanks to Krista Karppinen for that and a rewrite of the OCSP responder
script in Python!

- Support session resumption using session tickets for proxy connections
(TLS 1.3 connections only). Requires a suitable GnuTLSCache configuration.

- Disable session tickets by default. The GnuTLS built-in key rotation
for session tickets never actually changes the primary key, just derives
keys from it, so it does not provide forward secrecy in case an attacker
learns the primary key (by gaining access to server RAM). A reload of
the server is enough to generate a new key, so consider enabling session
tickets and reloading the server every few hours, at least until a
forward-secret rotation can be implemented.

- Fix a bug that mostly prevented searching ServerAliases when
selecting the virtual host from SNI.

- Add ./configure option to disable building PDF documentation

- Deprecate SRP and disable it by default.

- Add support for building coverage reports using clang's source-based
code coverage.

- Make ./configure check if both [::1] and 127.0.0.1 are available,
disable either if not. This makes the build work out-of-the-box in
Docker containers, which by default use IPv4 only.

Regards,
Fiona

[1] https://mod.gnutls.org/git/mod_gnutls
[2] https://github.com/airtower-luna/mod_gnutls.git
[3]
https://airtower.wordpress.com/2020/06/11/so-about-that-gnutls-session-ticket-bug-cve-2020-13777/

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.gnupg.org/pipermail/mod_gnutls-devel/attachments/20200627/3ac8706d/attachment-0001.sig>


More information about the mod_gnutls-devel mailing list