11```
2- tlslite-ng version 0.6.0-alpha5 2016-06-09
2+ tlslite-ng version 0.6.0-beta1 2016-08-08
33Hubert Kario <hkario at redhat.com>
44https://github.com/tomato42/tlslite-ng/
55```
@@ -49,11 +49,14 @@ Implemented features of TLS include:
4949
5050* SSLv3, TLSv1.0, TLSv1.1 and TLSv1.2
5151* ciphersuites with DHE, ECDHE, RSA and SRP key exchange together with
52- AES (including GCM variant), 3DES, RC4 and ( the experimental) ChaCha20
53- symmetric ciphers.
52+ AES (including GCM variant), 3DES, RC4 and ChaCha20 (both the official
53+ standard and the IETF draft) symmetric ciphers.
5454* Secure Renegotiation
5555* Encrypt Then MAC extension
5656* TLS_FALLBACK_SCSV
57+ * Extended master secret
58+ * padding extension
59+ * keying material exporter
5760* (experimental) TACK extension
5861
59622 Licenses/Acknowledgements
@@ -583,6 +586,22 @@ encrypt-then-MAC mode for CBC ciphers.
583586
5845870.6.0 - WIP
585588
589+ * make the Client Hello parser more strict, it will now abort if the
590+ extensions extend past the length of extension field
591+ * make the decoder honour the 2^14 byte protocol limit on plaintext per record
592+ * fix sending correct alerts on receiving malformed or invalid messages in
593+ handshake
594+ * proper signalling for Secure Renegotiation (renegotiation remains unsupported
595+ but server now indicates that the extension was understood and will abort
596+ if receiving a renegotiated hello)
597+ * stop server from leaking lengths of headers in HTTP responses when using
598+ standard library modules
599+ * HMAC-based Extract-and-Expand Key Derivation Function (HKDF) implementation
600+ from RFC 5869 (Tomas Foukal)
601+ * added protection against
602+ [RSA-CRT key leaks](https://people.redhat.com/~fweimer/rsa-crt-leaks.pdf)
603+ (Tomas Foukal)
604+ * Keying material exporter from RFC 5705
586605* Session Hash a.k.a. Extended Master Secret extension from RFC 7627
587606* make the library work on systems working in FIPS mode
588607* support for the padding extension from RFC 7685 (Karel Srot)
@@ -594,9 +613,9 @@ encrypt-then-MAC mode for CBC ciphers.
594613 messages in TLS 1.2
595614* mark library as compatible with Python 3.5 (it was previously, but now
596615 it is verified with Continous Integration)
597- * small cleanups and more documentation
598- * add support for ChaCha20 and Poly1305
599- * add TLS_DHE_RSA_WITH_CHACHA20_POLY1305 ciphersuite
616+ * cleanups (style fixes, deduplication of code) and more documentation
617+ * add support for ChaCha20 and Poly1305 (both the IETF draft and released
618+ standard) with both ECDHE_RSA and DHE_RSA key exchange
600619* expose padding and MAC-ing functions and blockSize property in RecordLayer
601620
6026210.5.1 - 2015-11-05
0 commit comments