1
1
This NEWS file records noteworthy changes, very tersely.
2
2
See the manual for detailed information.
4
Version 1.8.5 (2019-07-30)
6
** Support dracut(8) as well as initramfs-tools(7).
7
** Minor bug fix: Allow the mandos-keygen --passfile option to use
8
passfiles with names starting with "-".
9
** Document known limitation of mandos-keygen --password; it strips
10
white space from start and end of the password.
12
** Bug fix: The server used to fail to restart if the "port" setting
13
was used. This has been fixed.
14
** Minor bug fix: Reap zombies left over from checker runs. (Debian
17
Version 1.8.4 (2019-04-09)
19
** Fix minor memory leak in plugin-runner.
21
** mandos-ctl now has a --debug option to show D-Bus calls.
23
Version 1.8.3 (2019-02-11)
24
* No user-visible changes.
26
Version 1.8.2 (2019-02-10)
28
** In mandos-keygen, ignore failures to remove files in some cases.
30
Version 1.8.1 (2019-02-10)
32
** Only generate TLS keys using GnuTLS' certtool, of sufficient
33
version. Key generation of TLS keys will not happen until a
34
version of GnuTLS is installed with support for raw public keys.
35
** Remove any bad keys created by 1.8.0 and openssl.
37
** On installation, edit clients.conf and remove the same bad key ID
38
which was erroneously reported by all 1.8.0 clients. Also do not
39
trust this key ID in the server.
41
Version 1.8.0 (2019-02-10)
43
** Use new TLS keys for server communication and identification.
44
With GnuTLS 3.6 or later, OpenPGP keys are no longer supported.
45
The client can now use the new "raw public keys" (RFC 7250) API
46
instead, using GnuTLS 3.6.6. Please note: This *requires* new key
47
IDs to be added to server's client.conf file.
48
** New --tls-privkey and --tls-pubkey options to load TLS key files.
49
If GnuTLS is too old, these options do nothing.
51
** Supports either old or new GnuTLS.
52
The server now supports using GnuTLS 3.6.6 and clients connecting
53
with "raw public keys" as identification. The server will read
54
both fingerprints and key IDs from clients.conf file, and will use
55
either one or the other, depending on what is supported by GnuTLS
56
on the system. Please note: both are *not* supported at once; if
57
one type is supported by GnuTLS, all values of the other type from
58
clients.conf are ignored.
60
Version 1.7.20 (2018-08-19)
62
** Fix: Adapt to the Debian cryptsetup package 2.0.3 or later.
63
Important: in that version or later, the plugins "askpass-fifo",
64
"password-prompt", and "plymouth" will no longer be run, since they
65
would conflict with what cryptsetup is doing. Other plugins, such
66
as mandos-client and any user-supplied plugins, will still run.
67
** Better error message if failing to decrypt secret data
68
** Check for (and report) any key import failure from GPGME
69
** Better error message if self-signature verification fails
70
** Set system clock if not set; required by GnuPG for key import
71
** When debugging plugin-runner, it will now show starting plugins
73
Version 1.7.19 (2018-02-22)
75
** Do not print "unlink(...): No such file or directory".
76
** Bug fixes: Fix file descriptor leaks.
77
** Bug fix: Don't use leak sanitizer with leaking libraries.
79
Version 1.7.18 (2018-02-12)
81
** Bug fix: Revert faulty fix for a nonexistent bug in the
84
Version 1.7.17 (2018-02-10)
86
** Bug fix: Fix a memory leak in the plugin-runner
87
** Bug fix: Fix memory leaks in the plymouth plugin
89
Version 1.7.16 (2017-08-20)
91
** Bug fix: ignore "resumedev" entries in initramfs' cryptroot file
92
** Bug fix in plymouth plugin: fix memory leak, avoid warning output
94
Version 1.7.15 (2017-02-23)
96
** Bug fix: Respect the mandos.conf "zeroconf" and "restore" options
98
** Bug fix in mandos-keygen: Handle backslashes in passphrases
100
Version 1.7.14 (2017-01-25)
102
** Use "Requisite" instead of "RequisiteOverridable" in systemd
105
Version 1.7.13 (2016-10-08)
107
** Minor bug fix: Don't ask for passphrase or fail when generating
108
keys using GnuPG 2.1 in a chrooted environment.
110
Version 1.7.12 (2016-10-05)
112
** Bug fix: Don't crash after exit() when using DH parameters file
114
Version 1.7.11 (2016-10-01)
116
** Security fix: Don't compile with AddressSanitizer
118
** Bug fix: Find GnuTLS library when gnutls28-dev is not installed
119
** Bug fix: Include "Expires" and "Last Checker Status" in mandos-ctl
121
** New option for mandos-ctl: --dump-json
123
Version 1.7.10 (2016-06-23)
125
** Security fix: restrict permissions of /etc/mandos/plugin-helpers
127
** Bug fix: Make the --interface flag work with Python 2.7 when "cc"
130
Version 1.7.9 (2016-06-22)
132
** Do not include intro(8mandos) man page
134
Version 1.7.8 (2016-06-21)
136
** Include intro(8mandos) man page
137
** mandos-keygen: Use ECDSA SSH keys by default
138
** Bug fix: Work with GnuPG 2 when booting (Debian bug #819982)
139
by copying /usr/bin/gpg-agent into initramfs
141
** Bug fix: Work with GnuPG 2 (don't use --no-use-agent option)
142
** Bug fix: Make the --interface option work when using Python 2.7
143
by trying harder to find SO_BINDTODEVICE
145
Version 1.7.7 (2016-03-19)
147
** Fix bug in Plymouth client, broken since 1.7.2
149
Version 1.7.6 (2016-03-13)
151
** Fix bug where stopping server would time out
152
** Make server runnable with Python 3
154
Version 1.7.5 (2016-03-08)
156
** Fix security restrictions in systemd service file.
157
** Work around bug where stopping server would time out
159
Version 1.7.4 (2016-03-05)
161
** Bug fix: Tolerate errors from configure_networking (Debian Bug
163
** Compilation: Only use sanitizing options which work with the
164
compiler used when building. This should fix compilation with GCC
165
4.9 on mips, mipsel, and s390x.
167
** Add extra security restrictions in systemd service file.
169
Version 1.7.3 (2016-02-29)
171
** Bug fix: Remove new type of keyring directory user by GnuPG 2.1.
172
** Bug fix: Remove "nonnull" attribute from a function argument, which
173
would otherwise generate a spurious runtime warning.
175
Version 1.7.2 (2016-02-28)
177
** Stop using python-gnutls library; it was not updated to GnuTLS 3.3.
178
** Bug fix: Only send D-Bus signal ClientRemoved if using D-Bus.
179
** Use GnuPG 2 if available.
181
** Compile with various sanitizing flags.
183
Version 1.7.1 (2015-10-24)
185
** Bug fix: Can now really find Mandos server even if the server has
186
an IPv6 address on a network other than the one which the Mandos
189
Version 1.7.0 (2015-08-10)
191
** Bug fix: Handle local Zeroconf service name collisions better.
192
** Bug fix: Finally fix "ERROR: Child process vanished" bug.
193
** Bug fix: Fix systemd service file to start server correctly.
194
** Bug fix: Be compatible with old 2048-bit DSA keys.
195
** The D-Bus API now provides the standard D-Bus ObjectManager
196
interface, and deprecates older functionality. See the DBUS-API
197
file for the currently recommended API. Note: the original API
198
still works, but is deprecated.
200
** Can now find Mandos server even if the server has an IPv6 address
201
on a network without IPv6 Router Advertisment (like if the Mandos
202
client itself is the router, or there is an IPv6 router advertising
203
a network other than the one which the Mandos server is on.)
204
** Use a better value than 1024 for the default number of DH bits.
205
This better value is either provided by a DH parameters file (see
206
below) or an appropriate number of DH bits is determined based on
208
** Bug fix: mandos-keygen now generates correct output for the
209
"Checker" variable even if the SSH server on the Mandos client has
210
multiple SSH key types.
211
** Can now use pre-generated Diffie-Hellman parameters from a file.
213
Version 1.6.9 (2014-10-05)
215
** Changed to emit standard D-Bus signal when D-Bus properties change.
216
(The old signal is still emitted too, but marked as deprecated.)
218
Version 1.6.8 (2014-08-06)
220
** Bug fix: mandos-keygen now generates working SSH checker commands.
222
** Bug fix: "mandos-monitor" now really redraws screen on Ctrl-L.
223
** Now requires Python 2.7.
225
Version 1.6.7 (2014-07-17)
227
** Bug fix: Now compatible with GPGME 1.5.0.
228
** Bug fix: Fixed minor memory leaks.
230
** "mandos-monitor" now has verbose logging, toggleable with "v".
232
Version 1.6.6 (2014-07-13)
234
** If client host has an SSH server, "mandos-keygen --password" now
235
outputs "checker" option which uses "ssh-keyscan"; this is more
236
secure than the default "fping" checker.
237
** Bug fix: allow "." in network hook names, to match documentation.
238
** Better error messages.
240
** New --no-zeroconf option.
241
** Bug fix: Fix --servicename option, broken since 1.6.4.
242
** Bug fix: Fix --socket option work for --socket=0.
244
Version 1.6.5 (2014-05-11)
246
** Work around bug in GnuPG <http://bugs.g10code.com/gnupg/issue1622>
247
** Give better error messages when run without sufficient privileges
248
** Only warn if workaround for Debian bug #633582 was necessary and
249
failed, not if it failed and was unnecessary.
251
Version 1.6.4 (2014-02-16)
253
** Very minor fix to self-test code.
255
Version 1.6.3 (2014-01-21)
257
** Add systemd support.
258
** For PID file, fall back to /var/run if /run does not exist.
260
** Moved files from /usr/lib/mandos to whatever the architecture
261
specifies, like /usr/lib/x86_64-linux-gnu/mandos or
264
Version 1.6.2 (2013-10-24)
266
** PID file moved from /var/run to /run.
267
** Bug fix: Handle long secrets when saving client state.
268
** Bug fix: Use more magic in the GnuTLS priority string to handle
269
both old DSA/ELG 2048-bit keys and new RSA/RSA 4096-bit keys.
271
** mandos-keygen: Bug fix: now generate RSA keys which GnuTLS can use.
272
Bug fix: Output passphrase prompts even when
273
redirecting standard output.
275
Version 1.6.1 (2013-10-13)
277
** All client options for time intervals now also take an RFC 3339
278
duration. The same for all options to mandos-ctl.
279
** Bug fix: Handle fast checkers (like ":") correctly.
280
** Bug fix: Don't print output from checkers when running in
282
** Bug fix: Do not fail when client is removed from clients.conf but
283
saved settings remain.
284
** Bug fix: mandos-monitor now displays standout (reverse video) again
285
using new version of Urwid.
286
** Bug fix: Make boolean options work from the config file again.
287
** Bug fix: Make --no-ipv6 work again.
288
** New default priority string to be slightly more compatible with
289
older versions of GnuTLS.
291
** Bug fix: Fix bashism in mandos-keygen.
292
** Default key and subkey types are now RSA and RSA, respectively.
293
Also, new default key size is 4096 bits.
295
Version 1.6.0 (2012-06-18)
297
** Takes new --foreground option
298
** Init script supports new "status" action.
300
** Now uses all interfaces by default; the --interface option can
301
still be used to restrict it, and the argument to --interface (as
302
well as the $DEVICE environment variable for the network hooks) is
303
now a comma-separated list of interfaces to use.
305
Version 1.5.5 (2012-06-01)
307
** Server takes new --socket option
309
Version 1.5.4 (2012-05-20)
311
** Bug fix: Regression fix: Make non-zero approval timeout values work.
312
** Bug fix: Regression fix: Allow changing the Timeout D-Bus property.
313
** Fall back to not bind to an interface if an invalid interface name
315
** Removed support for undocumented feature of using plain "%%s" in
316
"checker" client option.
317
** Old D-Bus interface are now marked as deprecated.
318
** mandos-monitor: Bug fix: show approval timers correctly.
319
** mandos-ctl: Show "Extended Timeout" correctly, not as milliseconds.
321
Version 1.5.3 (2012-01-15)
323
** Add D-Bus property se.recompile.Client.LastCheckerStatus and use it
326
** Fix bugs in the example "bridge" network hook.
328
Version 1.5.2 (2012-01-08)
330
** Removed D-Bus signal se.recompile.Mandos.NewRequest() added in
331
1.5.0. It was buggy and was of questionable utility.
333
Version 1.5.1 (2012-01-01)
335
** Include intro(8mandos) manual page, missing since migration from
336
README file in version 1.4.0.
338
Version 1.5.0 (2012-01-01)
340
** Network hooks. The Mandos client can now run custom scripts to take
341
up a network interface before the client is run. Three example
342
scripts are provided: "wireless", "openvpn", and "bridge".
343
To facilitate this, the client now prefers network interfaces which
344
are up (if any) over all other interfaces.
346
** Persistent state. Client state is now saved between server
348
** clients.conf file can now contain "enabled" setting for clients.
349
** Bug fix: Fix rare crash bug.
350
** Bug fix: Send corrent D-Bus type in PropertyChanged for
351
"ApprovalDelay", "ApprovalDuration", "Timeout", and
353
** mandos-ctl: Bare numbers as arguments are taken to be milliseconds.
354
** Bug fix: mandos-ctl --secret option now works.
355
** New D-Bus signal: se.recompile.Mandos.NewRequest(s).
357
Version 1.4.1 (2011-10-15)
359
** Make D-Bus properties settable again, and handle checkers
360
for disabled clients correctly.
361
* Miscellaneous fixes to "pedantic" Lintian warnings
363
Version 1.4.0 (2011-10-09)
364
* README file migrated to manual page intro(8mandos).
366
** Fixed warning about "rmdir: Directory not empty".
368
** Default values changed: timeout 5 minutes, interval 2 minutes.
369
** Clients gets an expiration extension when receiving a password,
370
controlled by new "extended_timeout" setting.
371
** New domain name: "fukt.bsnet.se" changes to "recompile.se". This
372
also affects the D-Bus bus and interface names (old names still
373
work). Users should start using the new names immediately.
374
** New D-Bus Client object properties "Expires" and "ExtendedTimeout";
375
see DBUS-API for details.
377
Version 1.3.1 (2011-07-27)
379
** Client now retries all Mandos servers periodically.
380
** Work around Debian bug #633582 - fixes "Permission denied" problem.
382
Version 1.3.0 (2011-03-08)
384
** Updated for Python 2.6.
386
** Bug fix: Make the password-prompt plugin not conflict with
388
** Bug fix: Bug fix: update initramfs also when purging package.
390
Version 1.2.3 (2010-10-11)
392
** Bug fix: Expose D-Bus API also in non-debug mode.
4
394
Version 1.2.2 (2010-10-07)
6
396
** splashy: Minor fix to compile with non-Linux kernels.