1
1
This NEWS file records noteworthy changes, very tersely.
2
2
See the manual for detailed information.
4
Version 1.8.7 (2019-08-05)
6
** Always compile with LFS (Large File Support) enabled.
8
** Improve intro(8mandos) manual page to cover dracut(8) support.
10
Version 1.8.6 (2019-08-03)
12
** dracut support: In password-agent, properly ignore deleted and
13
renamed question files, and also fix memory alignment issue.
15
Version 1.8.5 (2019-07-30)
17
** Support dracut(8) as well as initramfs-tools(7).
18
** Minor bug fix: Allow the mandos-keygen --passfile option to use
19
passfiles with names starting with "-".
20
** Document known limitation of mandos-keygen --password; it strips
21
white space from start and end of the password.
23
** Bug fix: The server used to fail to restart if the "port" setting
24
was used. This has been fixed.
25
** Minor bug fix: Reap zombies left over from checker runs. (Debian
28
Version 1.8.4 (2019-04-09)
30
** Fix minor memory leak in plugin-runner.
32
** mandos-ctl now has a --debug option to show D-Bus calls.
34
Version 1.8.3 (2019-02-11)
35
* No user-visible changes.
37
Version 1.8.2 (2019-02-10)
39
** In mandos-keygen, ignore failures to remove files in some cases.
41
Version 1.8.1 (2019-02-10)
43
** Only generate TLS keys using GnuTLS' certtool, of sufficient
44
version. Key generation of TLS keys will not happen until a
45
version of GnuTLS is installed with support for raw public keys.
46
** Remove any bad keys created by 1.8.0 and openssl.
48
** On installation, edit clients.conf and remove the same bad key ID
49
which was erroneously reported by all 1.8.0 clients. Also do not
50
trust this key ID in the server.
52
Version 1.8.0 (2019-02-10)
54
** Use new TLS keys for server communication and identification.
55
With GnuTLS 3.6 or later, OpenPGP keys are no longer supported.
56
The client can now use the new "raw public keys" (RFC 7250) API
57
instead, using GnuTLS 3.6.6. Please note: This *requires* new key
58
IDs to be added to server's client.conf file.
59
** New --tls-privkey and --tls-pubkey options to load TLS key files.
60
If GnuTLS is too old, these options do nothing.
62
** Supports either old or new GnuTLS.
63
The server now supports using GnuTLS 3.6.6 and clients connecting
64
with "raw public keys" as identification. The server will read
65
both fingerprints and key IDs from clients.conf file, and will use
66
either one or the other, depending on what is supported by GnuTLS
67
on the system. Please note: both are *not* supported at once; if
68
one type is supported by GnuTLS, all values of the other type from
69
clients.conf are ignored.
71
Version 1.7.20 (2018-08-19)
73
** Fix: Adapt to the Debian cryptsetup package 2.0.3 or later.
74
Important: in that version or later, the plugins "askpass-fifo",
75
"password-prompt", and "plymouth" will no longer be run, since they
76
would conflict with what cryptsetup is doing. Other plugins, such
77
as mandos-client and any user-supplied plugins, will still run.
78
** Better error message if failing to decrypt secret data
79
** Check for (and report) any key import failure from GPGME
80
** Better error message if self-signature verification fails
81
** Set system clock if not set; required by GnuPG for key import
82
** When debugging plugin-runner, it will now show starting plugins
84
Version 1.7.19 (2018-02-22)
86
** Do not print "unlink(...): No such file or directory".
87
** Bug fixes: Fix file descriptor leaks.
88
** Bug fix: Don't use leak sanitizer with leaking libraries.
90
Version 1.7.18 (2018-02-12)
92
** Bug fix: Revert faulty fix for a nonexistent bug in the
95
Version 1.7.17 (2018-02-10)
97
** Bug fix: Fix a memory leak in the plugin-runner
98
** Bug fix: Fix memory leaks in the plymouth plugin
100
Version 1.7.16 (2017-08-20)
102
** Bug fix: ignore "resumedev" entries in initramfs' cryptroot file
103
** Bug fix in plymouth plugin: fix memory leak, avoid warning output
105
Version 1.7.15 (2017-02-23)
107
** Bug fix: Respect the mandos.conf "zeroconf" and "restore" options
109
** Bug fix in mandos-keygen: Handle backslashes in passphrases
111
Version 1.7.14 (2017-01-25)
113
** Use "Requisite" instead of "RequisiteOverridable" in systemd
116
Version 1.7.13 (2016-10-08)
118
** Minor bug fix: Don't ask for passphrase or fail when generating
119
keys using GnuPG 2.1 in a chrooted environment.
121
Version 1.7.12 (2016-10-05)
123
** Bug fix: Don't crash after exit() when using DH parameters file
125
Version 1.7.11 (2016-10-01)
127
** Security fix: Don't compile with AddressSanitizer
129
** Bug fix: Find GnuTLS library when gnutls28-dev is not installed
130
** Bug fix: Include "Expires" and "Last Checker Status" in mandos-ctl
132
** New option for mandos-ctl: --dump-json
134
Version 1.7.10 (2016-06-23)
136
** Security fix: restrict permissions of /etc/mandos/plugin-helpers
138
** Bug fix: Make the --interface flag work with Python 2.7 when "cc"
141
Version 1.7.9 (2016-06-22)
143
** Do not include intro(8mandos) man page
145
Version 1.7.8 (2016-06-21)
147
** Include intro(8mandos) man page
148
** mandos-keygen: Use ECDSA SSH keys by default
149
** Bug fix: Work with GnuPG 2 when booting (Debian bug #819982)
150
by copying /usr/bin/gpg-agent into initramfs
152
** Bug fix: Work with GnuPG 2 (don't use --no-use-agent option)
153
** Bug fix: Make the --interface option work when using Python 2.7
154
by trying harder to find SO_BINDTODEVICE
156
Version 1.7.7 (2016-03-19)
158
** Fix bug in Plymouth client, broken since 1.7.2
160
Version 1.7.6 (2016-03-13)
162
** Fix bug where stopping server would time out
163
** Make server runnable with Python 3
165
Version 1.7.5 (2016-03-08)
167
** Fix security restrictions in systemd service file.
168
** Work around bug where stopping server would time out
170
Version 1.7.4 (2016-03-05)
172
** Bug fix: Tolerate errors from configure_networking (Debian Bug
174
** Compilation: Only use sanitizing options which work with the
175
compiler used when building. This should fix compilation with GCC
176
4.9 on mips, mipsel, and s390x.
178
** Add extra security restrictions in systemd service file.
180
Version 1.7.3 (2016-02-29)
182
** Bug fix: Remove new type of keyring directory user by GnuPG 2.1.
183
** Bug fix: Remove "nonnull" attribute from a function argument, which
184
would otherwise generate a spurious runtime warning.
186
Version 1.7.2 (2016-02-28)
188
** Stop using python-gnutls library; it was not updated to GnuTLS 3.3.
189
** Bug fix: Only send D-Bus signal ClientRemoved if using D-Bus.
190
** Use GnuPG 2 if available.
192
** Compile with various sanitizing flags.
194
Version 1.7.1 (2015-10-24)
196
** Bug fix: Can now really find Mandos server even if the server has
197
an IPv6 address on a network other than the one which the Mandos
200
Version 1.7.0 (2015-08-10)
202
** Bug fix: Handle local Zeroconf service name collisions better.
203
** Bug fix: Finally fix "ERROR: Child process vanished" bug.
204
** Bug fix: Fix systemd service file to start server correctly.
205
** Bug fix: Be compatible with old 2048-bit DSA keys.
206
** The D-Bus API now provides the standard D-Bus ObjectManager
207
interface, and deprecates older functionality. See the DBUS-API
208
file for the currently recommended API. Note: the original API
209
still works, but is deprecated.
211
** Can now find Mandos server even if the server has an IPv6 address
212
on a network without IPv6 Router Advertisment (like if the Mandos
213
client itself is the router, or there is an IPv6 router advertising
214
a network other than the one which the Mandos server is on.)
215
** Use a better value than 1024 for the default number of DH bits.
216
This better value is either provided by a DH parameters file (see
217
below) or an appropriate number of DH bits is determined based on
219
** Bug fix: mandos-keygen now generates correct output for the
220
"Checker" variable even if the SSH server on the Mandos client has
221
multiple SSH key types.
222
** Can now use pre-generated Diffie-Hellman parameters from a file.
224
Version 1.6.9 (2014-10-05)
226
** Changed to emit standard D-Bus signal when D-Bus properties change.
227
(The old signal is still emitted too, but marked as deprecated.)
229
Version 1.6.8 (2014-08-06)
231
** Bug fix: mandos-keygen now generates working SSH checker commands.
233
** Bug fix: "mandos-monitor" now really redraws screen on Ctrl-L.
234
** Now requires Python 2.7.
236
Version 1.6.7 (2014-07-17)
238
** Bug fix: Now compatible with GPGME 1.5.0.
239
** Bug fix: Fixed minor memory leaks.
241
** "mandos-monitor" now has verbose logging, toggleable with "v".
243
Version 1.6.6 (2014-07-13)
245
** If client host has an SSH server, "mandos-keygen --password" now
246
outputs "checker" option which uses "ssh-keyscan"; this is more
247
secure than the default "fping" checker.
248
** Bug fix: allow "." in network hook names, to match documentation.
249
** Better error messages.
251
** New --no-zeroconf option.
252
** Bug fix: Fix --servicename option, broken since 1.6.4.
253
** Bug fix: Fix --socket option work for --socket=0.
255
Version 1.6.5 (2014-05-11)
257
** Work around bug in GnuPG <http://bugs.g10code.com/gnupg/issue1622>
258
** Give better error messages when run without sufficient privileges
259
** Only warn if workaround for Debian bug #633582 was necessary and
260
failed, not if it failed and was unnecessary.
262
Version 1.6.4 (2014-02-16)
264
** Very minor fix to self-test code.
266
Version 1.6.3 (2014-01-21)
268
** Add systemd support.
269
** For PID file, fall back to /var/run if /run does not exist.
271
** Moved files from /usr/lib/mandos to whatever the architecture
272
specifies, like /usr/lib/x86_64-linux-gnu/mandos or
275
Version 1.6.2 (2013-10-24)
277
** PID file moved from /var/run to /run.
278
** Bug fix: Handle long secrets when saving client state.
279
** Bug fix: Use more magic in the GnuTLS priority string to handle
280
both old DSA/ELG 2048-bit keys and new RSA/RSA 4096-bit keys.
282
** mandos-keygen: Bug fix: now generate RSA keys which GnuTLS can use.
283
Bug fix: Output passphrase prompts even when
284
redirecting standard output.
4
286
Version 1.6.1 (2013-10-13)
6
288
** All client options for time intervals now also take an RFC 3339