1
1
This NEWS file records noteworthy changes, very tersely.
2
2
See the manual for detailed information.
4
Version 1.8.13 (2020-11-30)
6
** Fix unreliable test in password-agent(8mandos).
8
Version 1.8.12 (2020-07-04)
10
** Fix compatibility with the GNU C Library version 2.31.
11
** In initramfs-tools boots, only use setsid(1) when available.
13
Version 1.8.11 (2020-04-08)
15
** Fix file descriptor leak when adding or removing local routes to
16
unreachable hosts on the local network.
18
Version 1.8.10 (2020-03-21)
20
** Fix bug when setting a client's D-Bus "Secret" property
21
** Start client checkers after a random delay
22
** When using systemd, allow easier modification of server options
23
** Better log messages in mandos-monitor
25
** When using dracut & systemd, allow easier modification of options
27
Version 1.8.9 (2019-09-03)
28
* No user-visible changes
30
Version 1.8.8 (2019-08-18)
31
* No user-visible changes
33
Version 1.8.7 (2019-08-05)
35
** Always compile with LFS (Large File Support) enabled.
37
** Improve intro(8mandos) manual page to cover dracut(8) support.
39
Version 1.8.6 (2019-08-03)
41
** dracut support: In password-agent, properly ignore deleted and
42
renamed question files, and also fix memory alignment issue.
44
Version 1.8.5 (2019-07-30)
46
** Support dracut(8) as well as initramfs-tools(7).
47
** Minor bug fix: Allow the mandos-keygen --passfile option to use
48
passfiles with names starting with "-".
49
** Document known limitation of mandos-keygen --password; it strips
50
white space from start and end of the password.
52
** Bug fix: The server used to fail to restart if the "port" setting
53
was used. This has been fixed.
54
** Minor bug fix: Reap zombies left over from checker runs. (Debian
57
Version 1.8.4 (2019-04-09)
59
** Fix minor memory leak in plugin-runner.
61
** mandos-ctl now has a --debug option to show D-Bus calls.
63
Version 1.8.3 (2019-02-11)
64
* No user-visible changes.
66
Version 1.8.2 (2019-02-10)
68
** In mandos-keygen, ignore failures to remove files in some cases.
70
Version 1.8.1 (2019-02-10)
72
** Only generate TLS keys using GnuTLS' certtool, of sufficient
73
version. Key generation of TLS keys will not happen until a
74
version of GnuTLS is installed with support for raw public keys.
75
** Remove any bad keys created by 1.8.0 and openssl.
77
** On installation, edit clients.conf and remove the same bad key ID
78
which was erroneously reported by all 1.8.0 clients. Also do not
79
trust this key ID in the server.
81
Version 1.8.0 (2019-02-10)
83
** Use new TLS keys for server communication and identification.
84
With GnuTLS 3.6 or later, OpenPGP keys are no longer supported.
85
The client can now use the new "raw public keys" (RFC 7250) API
86
instead, using GnuTLS 3.6.6. Please note: This *requires* new key
87
IDs to be added to server's client.conf file.
88
** New --tls-privkey and --tls-pubkey options to load TLS key files.
89
If GnuTLS is too old, these options do nothing.
91
** Supports either old or new GnuTLS.
92
The server now supports using GnuTLS 3.6.6 and clients connecting
93
with "raw public keys" as identification. The server will read
94
both fingerprints and key IDs from clients.conf file, and will use
95
either one or the other, depending on what is supported by GnuTLS
96
on the system. Please note: both are *not* supported at once; if
97
one type is supported by GnuTLS, all values of the other type from
98
clients.conf are ignored.
100
4
Version 1.7.20 (2018-08-19)
102
6
** Fix: Adapt to the Debian cryptsetup package 2.0.3 or later.