Skip to content

Commit

Permalink
Update for 1.11.10 release
Browse files Browse the repository at this point in the history
  • Loading branch information
randombit committed Dec 10, 2014
1 parent e4d923c commit 746844b
Show file tree
Hide file tree
Showing 2 changed files with 18 additions and 16 deletions.
28 changes: 15 additions & 13 deletions doc/relnotes/1_11_10.rst
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
Version 1.11.10, Not Yet Released
Version 1.11.10, 2014-12-10
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

* An implementation of McEliece code-based public key encryption based
Expand All @@ -15,30 +15,32 @@ Version 1.11.10, Not Yet Released

* Add support for TLS fallback signaling (draft-ietf-tls-downgrade-scsv-00).
Clients will send a fallback SCSV if the version passed to the Client
constructor is less than the latest version supported by local policy,
so applications implementing fallback are protected. Servers always check
the SCSV.
constructor is less than the latest version supported by local policy, so
applications implementing fallback are protected. Servers always check the
SCSV.

* In previous versions a TLS::Server could service either TLS or DTLS
connections depending on policy settings and what type of client hello it
received. This has changed and now a Server object is initialized for either
TLS or DTLS operation. The default policy previously prohibited DTLS,
precisely to prevent a TCP server from being surprised by a DTLS connection.
This has changed and the default policy now allows TLS v1.0 or higher or DTLS
v1.2.
received. This has changed and now a Server object is initialized for
either TLS or DTLS operation. The default policy previously prohibited
DTLS, precisely to prevent a TCP server from being surprised by a DTLS
connection. The default policy now allows TLS v1.0 or higher or DTLS v1.2.

* Fixed a bug in CCM mode which caused it to produce incorrect tags when used
with a value of L other than 2. This affected CCM TLS ciphersuites, which use
L=3. Thanks to Manuel Pégourié-Gonnard for the anaylsis and
patch. Bugzilla 270.
with a value of L other than 2. This affected CCM TLS ciphersuites, which
use L=3. Thanks to Manuel Pégourié-Gonnard for the anaylsis and patch.
Bugzilla 270.

* DTLS now supports timeouts and handshake retransmits.
* DTLS now supports timeouts and handshake retransmits. Timeout checking
is triggered by the application calling the new TLS::Channel::timeout_check.

* Add a TLS policy hook to disable putting the value of the local clock in hello
random fields.

* All compression operations previously available as Filters are now
performed via the Transformation API, which minimizes memory copies.
Compression operations are still available through the Filter API
using new general compression/decompression filters in comp_filter.h

* The zlib module now also supports gzip compression and decompression.

Expand Down
6 changes: 3 additions & 3 deletions doc/website/download.rst
Original file line number Diff line number Diff line change
Expand Up @@ -14,9 +14,9 @@ Unsure which release you want? Check the :ref:`FAQ <devel_vs_stable>`.
Current Development Series (1.11)
----------------------------------------

The latest development release is :doc:`relnotes/1_11_9`:
:tgz:`1.11.9` (:tgz_sig:`sig <1.11.9>`),
:tbz:`1.11.9` (:tbz_sig:`sig <1.11.9>`)
The latest development release is :doc:`relnotes/1_11_10`:
:tgz:`1.11.10` (:tgz_sig:`sig <1.11.10>`),
:tbz:`1.11.10` (:tbz_sig:`sig <1.11.10>`)

To access the latest unreleased sources, see :doc:`vcs`. A script also
creates regular snapshots of trunk, which are available `here
Expand Down

0 comments on commit 746844b

Please sign in to comment.