1
1
This NEWS file records noteworthy changes, very tersely.
2
2
See the manual for detailed information.
4
Version 1.8.15 (2023-02-08)
6
** Bug fix: Start client checkers after a random delay
8
Version 1.8.15 (2022-04-25)
10
** Bug fix: When running "mandos-keygen --password" to read a password
11
interactively (to save in a section in the clients.conf file),
12
backslashes in the password are no longer interpreted as backslash
14
** GnuTLS debug output no longer has a "b'" prefix.
16
Version 1.8.14 (2021-02-03)
18
** Create /dev/fd symlink (if necessary) in plugin-runner(8mandos) and
19
mandos-client(8mandos) (Workaround for Debian bug #981302)
21
Version 1.8.13 (2020-11-30)
23
** Fix unreliable test in password-agent(8mandos).
25
Version 1.8.12 (2020-07-04)
27
** Fix compatibility with the GNU C Library version 2.31.
28
** In initramfs-tools boots, only use setsid(1) when available.
30
Version 1.8.11 (2020-04-08)
32
** Fix file descriptor leak when adding or removing local routes to
33
unreachable hosts on the local network.
35
Version 1.8.10 (2020-03-21)
37
** Fix bug when setting a client's D-Bus "Secret" property
38
** Start client checkers after a random delay
39
** When using systemd, allow easier modification of server options
40
** Better log messages in mandos-monitor
42
** When using dracut & systemd, allow easier modification of options
44
Version 1.8.9 (2019-09-03)
45
* No user-visible changes
47
Version 1.8.8 (2019-08-18)
48
* No user-visible changes
50
Version 1.8.7 (2019-08-05)
52
** Always compile with LFS (Large File Support) enabled.
54
** Improve intro(8mandos) manual page to cover dracut(8) support.
56
Version 1.8.6 (2019-08-03)
58
** dracut support: In password-agent, properly ignore deleted and
59
renamed question files, and also fix memory alignment issue.
61
Version 1.8.5 (2019-07-30)
63
** Support dracut(8) as well as initramfs-tools(7).
64
** Minor bug fix: Allow the mandos-keygen --passfile option to use
65
passfiles with names starting with "-".
66
** Document known limitation of mandos-keygen --password; it strips
67
white space from start and end of the password.
69
** Bug fix: The server used to fail to restart if the "port" setting
70
was used. This has been fixed.
71
** Minor bug fix: Reap zombies left over from checker runs. (Debian
74
Version 1.8.4 (2019-04-09)
76
** Fix minor memory leak in plugin-runner.
78
** mandos-ctl now has a --debug option to show D-Bus calls.
80
Version 1.8.3 (2019-02-11)
81
* No user-visible changes.
83
Version 1.8.2 (2019-02-10)
85
** In mandos-keygen, ignore failures to remove files in some cases.
87
Version 1.8.1 (2019-02-10)
89
** Only generate TLS keys using GnuTLS' certtool, of sufficient
90
version. Key generation of TLS keys will not happen until a
91
version of GnuTLS is installed with support for raw public keys.
92
** Remove any bad keys created by 1.8.0 and openssl.
94
** On installation, edit clients.conf and remove the same bad key ID
95
which was erroneously reported by all 1.8.0 clients. Also do not
96
trust this key ID in the server.
98
Version 1.8.0 (2019-02-10)
100
** Use new TLS keys for server communication and identification.
101
With GnuTLS 3.6 or later, OpenPGP keys are no longer supported.
102
The client can now use the new "raw public keys" (RFC 7250) API
103
instead, using GnuTLS 3.6.6. Please note: This *requires* new key
104
IDs to be added to server's client.conf file.
105
** New --tls-privkey and --tls-pubkey options to load TLS key files.
106
If GnuTLS is too old, these options do nothing.
108
** Supports either old or new GnuTLS.
109
The server now supports using GnuTLS 3.6.6 and clients connecting
110
with "raw public keys" as identification. The server will read
111
both fingerprints and key IDs from clients.conf file, and will use
112
either one or the other, depending on what is supported by GnuTLS
113
on the system. Please note: both are *not* supported at once; if
114
one type is supported by GnuTLS, all values of the other type from
115
clients.conf are ignored.
117
4
Version 1.7.20 (2018-08-19)
119
6
** Fix: Adapt to the Debian cryptsetup package 2.0.3 or later.