Skip to content

Commit f9950c8

Browse files
committed
update the version to 0.6.0-beta1
include documentation updates to the newly supported features
1 parent c2ecbf7 commit f9950c8

File tree

5 files changed

+33
-13
lines changed

5 files changed

+33
-13
lines changed

README

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,9 +8,9 @@ Functionality implemented include:
88
- all above mentioned protocols, including support for client certificates
99
(RFC 6101, RFC 2246, RFC 4346, RFC 5246)
1010
- RC4, 3DES-CBC, AES-CBC, AES-GCM and ChaCha20 ciphers (RFC 5246, RFC 6347,
11-
RFC 4492, RFC 5288, RFC 5289, RFC 7539)
12-
- MD5, SHA1, SHA256 and SHA384 HMACs as well as AEAD mode of operation in GCM
13-
or Poly1305 authenticator
11+
RFC 4492, RFC 5288, RFC 5289, RFC 7539, RFC 7905)
12+
- MD5, SHA1, SHA256 and SHA384 HMACs as well as AEAD mode of operation with
13+
GCM or Poly1305 authenticator
1414
- RSA, DHE_RSA and ECDHE_RSA key exchange
1515
- full set of signature hashes (md5, sha1, sha224, sha256, sha384 and sha512)
1616
for ServerKeyExchange and CertfificateVerify in TLS v1.2
@@ -22,10 +22,11 @@ Functionality implemented include:
2222
- NULL encryption ciphersuites
2323
- FALLBACK_SCSV (RFC 7507)
2424
- encrypt-then-MAC mode of operation for CBC ciphersuites (RFC 7366)
25-
- client certificates
2625
- TACK certificate pinning
2726
- SRP_SHA_RSA and SRP_SHA ciphersuites (RFC 5054)
2827
- Extended Master Secret calculation for TLS connections (RFC 7627)
28+
- padding extension (RFC 7685)
29+
- Keying material exporter (RFC 5705)
2930

3031

3132
tlslite-ng aims to be a drop-in replacement for tlslite while providing more

README.md

Lines changed: 25 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
```
2-
tlslite-ng version 0.6.0-alpha5 2016-06-09
2+
tlslite-ng version 0.6.0-beta1 2016-08-08
33
Hubert Kario <hkario at redhat.com>
44
https://github.com/tomato42/tlslite-ng/
55
```
@@ -49,11 +49,14 @@ Implemented features of TLS include:
4949

5050
* SSLv3, TLSv1.0, TLSv1.1 and TLSv1.2
5151
* ciphersuites with DHE, ECDHE, RSA and SRP key exchange together with
52-
AES (including GCM variant), 3DES, RC4 and (the experimental) ChaCha20
53-
symmetric ciphers.
52+
AES (including GCM variant), 3DES, RC4 and ChaCha20 (both the official
53+
standard and the IETF draft) symmetric ciphers.
5454
* Secure Renegotiation
5555
* Encrypt Then MAC extension
5656
* TLS_FALLBACK_SCSV
57+
* Extended master secret
58+
* padding extension
59+
* keying material exporter
5760
* (experimental) TACK extension
5861

5962
2 Licenses/Acknowledgements
@@ -583,6 +586,22 @@ encrypt-then-MAC mode for CBC ciphers.
583586
584587
0.6.0 - WIP
585588
589+
* make the Client Hello parser more strict, it will now abort if the
590+
extensions extend past the length of extension field
591+
* make the decoder honour the 2^14 byte protocol limit on plaintext per record
592+
* fix sending correct alerts on receiving malformed or invalid messages in
593+
handshake
594+
* proper signalling for Secure Renegotiation (renegotiation remains unsupported
595+
but server now indicates that the extension was understood and will abort
596+
if receiving a renegotiated hello)
597+
* stop server from leaking lengths of headers in HTTP responses when using
598+
standard library modules
599+
* HMAC-based Extract-and-Expand Key Derivation Function (HKDF) implementation
600+
from RFC 5869 (Tomas Foukal)
601+
* added protection against
602+
[RSA-CRT key leaks](https://people.redhat.com/~fweimer/rsa-crt-leaks.pdf)
603+
(Tomas Foukal)
604+
* Keying material exporter from RFC 5705
586605
* Session Hash a.k.a. Extended Master Secret extension from RFC 7627
587606
* make the library work on systems working in FIPS mode
588607
* support for the padding extension from RFC 7685 (Karel Srot)
@@ -594,9 +613,9 @@ encrypt-then-MAC mode for CBC ciphers.
594613
messages in TLS 1.2
595614
* mark library as compatible with Python 3.5 (it was previously, but now
596615
it is verified with Continous Integration)
597-
* small cleanups and more documentation
598-
* add support for ChaCha20 and Poly1305
599-
* add TLS_DHE_RSA_WITH_CHACHA20_POLY1305 ciphersuite
616+
* cleanups (style fixes, deduplication of code) and more documentation
617+
* add support for ChaCha20 and Poly1305 (both the IETF draft and released
618+
standard) with both ECDHE_RSA and DHE_RSA key exchange
600619
* expose padding and MAC-ing functions and blockSize property in RecordLayer
601620
602621
0.5.1 - 2015-11-05

setup.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88

99

1010
setup(name="tlslite-ng",
11-
version="0.6.0-alpha5",
11+
version="0.6.0-beta1",
1212
author="Hubert Kario",
1313
author_email="[email protected]",
1414
url="https://github.com/tomato42/tlslite-ng",

tlslite/__init__.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@
2121
Then use the L{tlslite.TLSConnection.TLSConnection} class with a socket.
2222
(Or, use one of the integration classes in L{tlslite.integration}).
2323
24-
@version: 0.6.0-alpha5
24+
@version: 0.6.0-beta1
2525
"""
2626

2727
from tlslite.api import *

tlslite/api.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
# Author: Trevor Perrin
22
# See the LICENSE file for legal information regarding use of this file.
33

4-
__version__ = "0.6.0-alpha5"
4+
__version__ = "0.6.0-beta1"
55
from .constants import AlertLevel, AlertDescription, Fault
66
from .errors import *
77
from .checker import Checker

0 commit comments

Comments
 (0)