You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
<li>Issues with a dangling weak reference causing intermittent NullPointerExceptions in the OcspCache have been fixed.</li>
@@ -31,29 +31,51 @@ <h3>2.1.2 Defects Fixed</h3>
31
31
<li>Make PEM parsing more forgiving of whitespace to align with RFC 7468 - Textual Encodings of PKIX, PKCS, and CMS Structures.</li>
32
32
<li>Fix CCM length checks with large nonce sizes (n=12, n=13).</li>
33
33
<li>EAC: Fixed the CertificateBody ASN.1 type to support an optional Certification Authority Reference in a Certificate Request.</li>
34
-
<li>ASN.1: ObjectIdentifier (also Relative OID) parsing has been reworked to avoid denial-of-service attacks against the parser.
35
-
The contents octets for both types are now also limited to 4096 bytes.</li>
34
+
<li>ASN.1: ObjectIdentifier (also Relative OID) parsing has been optimized and the contents octets for both types are now limited to 4096 bytes.</li>
36
35
<li>BCJSSE: Fixed a missing null check on the result of PrivateKey.getEncoded(), which could cause issues for HSM RSA keys.</li>
37
-
<li>BCJSSE: When endpoint identification is enabled and an SSL socket is not created with an explicit hostname (as happens
38
-
with HttpsURLConnection), hostname verification could be performed against a DNS-resolved IP address. This has been fixed.</li>
36
+
<li>BCJSSE: When endpoint identification is enabled and an SSL socket is not created with an explicit hostname (as happens with HttpsURLConnection), hostname verification could be performed against a DNS-resolved IP address. This has been fixed.</li>
37
+
<li>The missing module import of java.logging to the provider module has been added.</li>
38
+
<li>GOST ASN.1 public key alg parameters are now compliant with <ahref="https://datatracker.ietf.org/doc/rfc9215/">RFC 9215</a>.</li>
39
+
<li>An off-by-one error in the encoding for EccP256CurvePoint for ITS has been fixed.</li>
39
40
</ul>
40
41
<h3>2.1.3 Additional Features and Functionality</h3>
41
42
<ul>
42
-
<li>An implementation of MLS (RFC 9420 - The Messaging Layer Security Protocol) has been added as a new module.</li>
43
+
<li>An implementation of MLS (<ahref="https://datatracker.ietf.org/doc/rfc9420/">RFC 9420 - The Messaging Layer Security Protocol</a>) has been added as a new module.</li>
43
44
<li>NTRU now supports NTRU-HPS4096-1229 and NTRU-HRSS-1373.</li>
44
-
<li>Improvements to PGP support, including Curve25519, Curve448 key types.</li>
45
-
<li>Add initial support for ML-KEM in TLS.</li>
46
-
<li>Add XWing hybrid KEM construction (X25519 + ML-KEM-768).</li>
47
-
<li>Introduce initial KEMSpi support (NTRU, SNTRU Prime) for JDK 21+.</li>
48
-
<li>Introduce initial composite signature support for X509 Certificates.</li>
45
+
<li>Improvements to PGP support, including Camellia key wrapping and Curve25519, Curve448 key types (including XDH with HKDF).</li>
46
+
<li>Added initial support for ML-KEM in TLS.</li>
47
+
<li>Added XWing hybrid KEM construction (X25519 + ML-KEM-768).</li>
48
+
<li>Introduced initial KEMSpi support (NTRU, SNTRU Prime) for JDK 21+.</li>
49
+
<li>Introduced initial composite signature support for X509 Certificates.</li>
50
+
<li>PKCS#12 now supports PKCS12-AES256-AES128, PKCS12-AES256-AES128-GCM, PKCS12-DEF-AES256-AES128, and PKCS12-DEF-AES256-AES128-GCM.</li>
51
+
<li>The default type for the KeyStore.getInstance("PKCS12", "BC") can now be set using the org.bouncycastle.pkcs12.default system/security property.</li>
52
+
<li>The PGP SExpParser will now handle Ed25519 and Ed448 keys.</li>
53
+
<li>Dilithium and Kyber key encoding updated to latest Draft RFCs (<ahref="https://datatracker.ietf.org/doc/draft-ietf-lamps-dilithium-certificates/">draft-ietf-lamps-dilithium-certificates</a> and <ahref="https://datatracker.ietf.org/doc/draft-ietf-lamps-kyber-certificates/">draft-ietf-lamps-kyber-certificates</a>)</li>
54
+
<li>Support has been added for encryption key derivation using HKDF in CMS - see <ahref="https://datatracker.ietf.org/doc/draft-housley-lamps-cms-cek-hkdf-sha256/">draft-housley-lamps-cms-cek-hkdf-sha256</a>.</li>
55
+
<li>X500Name now recognises jurisdiction{C,ST,L} DNs.</li>
56
+
<li>CertPathValidationContext and CertificatePoliciesValidation now include implementations of Memoable.</li>
57
+
<li>The Composite post-quantum signatures implementation has been updated to the latest draft <ahref="https://datatracker.ietf.org/doc/html/draft-ounsworth-pq-composite-sigs/">draft-ounsworth-pq-composite-sigs</a>.</li>
49
58
</ul>
50
59
<h3>2.1.4 Notes.</h3>
51
60
<ul>
52
61
<li>Both versions of NTRUPrime have been updated to produce 256 bit secrets in line with Kyber. This should also bring them into line with other implementations such as those used in OpenSSH now.</li>
53
62
<li>BCJSSE: The boolean system property 'org.bouncycastle.jsse.fips.allowRSAKeyExchange" now defaults to false. All RSA
54
63
key exchange cipher suites will therefore be disabled when the BCJSSE provider is used in FIPS mode, unless this system
55
64
property is explicitly set to true.</li>
56
-
<li>Improve OSGi compatibility.</li>
65
+
<li>OSGi compatibility should now be much improved.</li>
66
+
<li>SignedMailValidator now includes a more general rollback method for locating the signature's trust anchor for use when the first approach fails.</li>
67
+
<li>The PKCS12 store using GCM does not include the PKCS#12 MAC so no longer includes use of the PKCS#12 PBE scheme and only uses PBKDF2.</li>
68
+
<li>In keeping with the current set of experimental OIDs for PQC algorithms, OIDs may have changed to reflect updated versions of the algorithms.</li>
69
+
</ul>
70
+
<h3>2.1.5 Security Advisories.</h3>
71
+
<p>
72
+
Release 1.78 deals with the following CVEs:
73
+
</p>
74
+
<ul>
75
+
<li>CVE-2024-29857 - Importing an EC certificate with specially crafted F2m parameters can cause high CPU usage during parameter evaluation.</li>
76
+
<li>CVE-2024-30171 - Possible timing based leakage in RSA based handshakes due to exception processing eliminated.</li>
77
+
<li>CVE-2024-30172 - Crafted signature and public key can be used to trigger an infinite loop in the Ed25519 verification code.</li>
78
+
<li>CVE-2024-301XX - When endpoint identification is enabled in the BCJSSE and an SSL socket is not created with an explicit hostname (as happens with HttpsURLConnection), hostname verification could be performed against a DNS-resolved IP address. This has been fixed.</li>
0 commit comments