[ 
https://issues.apache.org/jira/browse/NIFI-1324?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15095291#comment-15095291
 ] 

Andy LoPresto commented on NIFI-1324:
-------------------------------------

BC 1.54 became available during this development. It resolves a security issue 
(that we are not currently susceptible to) and does not change the API. I 
upgraded to BC 1.54 in PR 170. 

{quote}
Release 1.54 is now available for download.

This is primarily a security release concerning (D)TLS 1.2. Motivated by 
CVE-2015-7575, we have added validation that the signature algorithm received 
in DigitallySigned structures is actually one of those offered (in 
signature_algorithms extension or CertificateRequest). With our default TLS 
configuration, we do not believe there is an exploitable vulnerability in any 
earlier releases. Users that are customizing the signature_algorithms 
extension, or running a server supporting client authentication, are advised to 
double-check that they are not offering any signature algorithms involving MD5.

In terms of new features, the CMS API now supports the PKCS#7 ANY type for 
encapsulated content, RFC 3370, Camellia, and SEED are now supported for key 
agreement in CMS, and CTR/SIC modes now provide an explicit internal counter if 
initialised with a short IV. TLS/DTLS now includes a non-blocking API. The 
Blake2b digests are now actually supported in the provider (sorry, it got 
missed in 1.53...) and ClassCastException issues with Cipher.getOutputSize() 
for IES ciphers have been fixed. Finally, in accordance with advice from the 
algorithm's authors, Serpent has been modified to conform to the NESSIE vector 
suite, the previous version of Serpent, which conforms to the NIST submission 
format, is now called Tnepres.

Further details on other additions and bug fixes can be found in the release 
notes file accompanying the release.
{quote}

> Upgrade to correct version of BouncyCastle
> ------------------------------------------
>
>                 Key: NIFI-1324
>                 URL: https://issues.apache.org/jira/browse/NIFI-1324
>             Project: Apache NiFi
>          Issue Type: Task
>          Components: Core Framework
>    Affects Versions: 0.4.1
>            Reporter: Andy LoPresto
>            Assignee: Andy LoPresto
>              Labels: dependencies, security
>             Fix For: 0.5.0
>
>
> The existing Maven dependencies are for 
> {{org.bouncycastle:bcprov-jdk16:1.46}} and 
> {{org.bouncycastle:bcpg-jdk16:1.46}}. While {{jdk16}} looks "newer" than 
> {{jdk15on}}, this was actually a legacy mistake on the part of BouncyCastle 
> versioning. The correct and current version of BouncyCastle is {{jdk15on}}, 
> as evidenced by the age of the releases:
> * jdk15on: 03/2012 - 10/2015 "The Bouncy Castle Crypto package is a Java 
> implementation of cryptographic algorithms. This jar contains JCE provider 
> and lightweight API for the Bouncy Castle Cryptography APIs for JDK 1.5 to 
> JDK 1.8." (http://mvnrepository.com/artifact/org.bouncycastle/bcprov-jdk15on)
> * jdk16: 11/2007 - 02/2011 "The Bouncy Castle Crypto package is a Java 
> implementation of cryptographic algorithms. This jar contains JCE provider 
> and lightweight API for the Bouncy Castle Cryptography APIs for JDK 1.6." 
> (http://mvnrepository.com/artifact/org.bouncycastle/bcprov-jdk16)



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to