ViewVC Help
View File | Revision Log | Show Annotations | Download File
/cvs/gvpe/NEWS
(Generate patch)

Comparing gvpe/NEWS (file contents):
Revision 1.113 by root, Sat Jul 13 04:24:44 2013 UTC vs.
Revision 1.114 by root, Tue Jul 16 16:44:36 2013 UTC

2 2
3TODO: bridge mode, finally? 3TODO: bridge mode, finally?
4TODO: gcm mode? 4TODO: gcm mode?
5TODO: replace ripemd160 as the only authentication hash. 5TODO: replace ripemd160 as the only authentication hash.
6TODO: increase rsa size. 6TODO: increase rsa size.
7TODO: replace transport bits by transport endpoint structs?
8TODO: ecdh to avoid session replay attacks
9TODO: http://incog-izick.blogspot.de/2011/08/using-openssl-aes-gcm.html
10TODO: http://stackoverflow.com/questions/12153009/openssl-c-example-of-aes-gcm-using-evp-interfaces
7 11
12proposed: 3 types, req, resreq, res
13
14req (hmac1) rsa(seqno1 hmac1 aes1 seqno2 hmac2 aes2 auth) ecdh1
15res (hmac1) hash(rsa-contents) ecdh2
16
17req hmac0(*) rsa(seqno hmac0 hmac aes auth) hkdf-salt ecdh1
18res hmac0(rsa-contents ecdh2)
19 hmac_key = hkdf(hkdf-salt, hmac | ecdh)
20 aes_key = hkdf(hkdf-salt, aes | ecdh)
21
22 - INCOMPATIBLE CHANGE: core protocol version 1.0.
23 - while individual packets couldn't be replayed, a whole session
24 could be replayed - this has been fixed by an extra key exchange.
25 - in addition to rsa key exchange and authentication, the handshake now
26 adds a diffie-hellman key exchange (using curve25119) for perfect
27 forward secrecy. mac and cipher keys are derived using HKDF.
28 - rsa key sizes are now configurable and larger (default is 3072).
29 correspondingly, the minimum mtu is no longer 296 but 576.
30 - fixed a potential (unverified) buffer overrun on rsa decryption.
31 - RAND_bytes was used when generating session keys, potentially
32 leading to temporary freezes when entropy was low.
33 - gvpectrl no longer generates all missing public keys, but
34 only missing private keys. private keys are also put
35 into the configured location.
36 - the pid-file now accepts %s as nodename as elsewhere.
37
382.25 Sat Jul 13 06:42:33 CEST 2013
8 - INCOMPATIBLE CHANGE: no longer enable udp protocol if no other 39 - INCOMPATIBLE CHANGE: no longer enable udp protocol if no other
9 protocols are enabled - this is necessary when you have nodes with 40 protocols are enabled - this is necessary when you have nodes with
10 completely unknown protocols, to force mediated connection requests. 41 completely unknown protocols, to force mediated connection requests.
11 - INCOMPATIBLE CHANGE: dns transport protocol bumped to version 2. 42 - INCOMPATIBLE CHANGE: dns transport protocol bumped to version 2.
12 - core protocol version 0.1, compatible with older releases. 43 - core protocol version 0.1, compatible with older releases.

Diff Legend

Removed lines
+ Added lines
< Changed lines
> Changed lines