[ANNOUNCE] NSS 3.22.2 Release

2016-03-08 Thread Kai Engert
The NSS Development Team announces the release of NSS 3.22.2,
which is a security patch release for NSS 3.22.

No new functionality is introduced in this release.

The following security-relevant bug has been resolved in NSS 3.22.2. 
Users are encouraged to upgrade immediately.

* Bug 1245528 (CVE-2016-1950):
  Fixed a heap-based buffer overflow related to the parsing of certain ASN.1
  structures. An attacker could create a specially-crafted certificate which,
  when parsed by NSS, would cause a crash or execution of arbitrary code with
  the permissions of the user.

Notable Changes:
* Bug 1247990 - The root CA changes from NSS 3.23 have been backported.

The full release notes are available at
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.22.2_release_notes

The HG tag is NSS_3_22_2_RTM. NSS 3.22.2 requires NSPR 4.12 or newer.

NSS 3.22.2 source distributions are available on ftp.mozilla.org for secure
HTTPS download:
https://ftp.mozilla.org/pub/mozilla.org/security/nss/releases/NSS_3_22_2_RTM/src/

The NSS development team would like to thank security researcher Francis Gabriel
for responsibly disclosing the issue in Bug 1245528.

-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

[ANNOUNCE] NSS 3.21.1 Release

2016-03-08 Thread Kai Engert
The NSS Development Team announces the release of NSS 3.21.1,
which is a security patch release for NSS 3.21.

No new functionality is introduced in this release.

The following security-relevant bug has been resolved in NSS 3.21.1. 
Users are encouraged to upgrade immediately.

* Bug 1245528 (CVE-2016-1950):
  Fixed a heap-based buffer overflow related to the parsing of certain ASN.1
  structures. An attacker could create a specially-crafted certificate which,
  when parsed by NSS, would cause a crash or execution of arbitrary code with
  the permissions of the user.

The full release notes are available at
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21.1_release_notes

The HG tag is NSS_3_21_1_RTM. NSS 3.21.1 requires NSPR 4.10.10 or newer.

NSS 3.21.1 source distributions are available on ftp.mozilla.org for secure
HTTPS download:
https://ftp.mozilla.org/pub/mozilla.org/security/nss/releases/NSS_3_21_1_RTM/src/

The NSS development team would like to thank security researcher Francis Gabriel
for responsibly disclosing the issue in Bug 1245528.

-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

[ANNOUNCE] NSS 3.23 Release

2016-03-08 Thread Kai Engert
The NSS team has released Network Security Services (NSS) 3.23, which is a minor
release.

The following security-relevant bug has been resolved in NSS 3.23. 
Users are encouraged to upgrade immediately.

* Bug 1245528 (CVE-2016-1950):
  Fixed a heap-based buffer overflow related to the parsing of certain ASN.1
  structures. An attacker could create a specially-crafted certificate which,
  when parsed by NSS, would cause a crash or execution of arbitrary code with
  the permissions of the user.

New functionality:
* ChaCha20/Poly1305 cipher and TLS cipher suites now supported
  (bug 917571, bug 1227905)
* Experimental-only support TLS 1.3 1-RTT mode (draft-11).
  This code is not ready for production use.

New Functions:
* SSL_SetDowngradeCheckVersion - Set maximum version for new ServerRandom
  anti-downgrade mechanism

Notable Changes:
* The copy of SQLite shipped with NSS has been updated to version 3.10.2
  (bug 1234698)
* The list of TLS extensions sent in the TLS handshake has been reordered 
  to improve compatibility of the Extended Master Secret feature
  with servers (bug 1243641)
* The build time environment variable NSS_ENABLE_ZLIB has been renamed 
  to NSS_SSL_ENABLE_ZLIB (Bug 1243872).
* The build time environment variable NSS_DISABLE_CHACHAPOLY was added, 
  which can be used to prevent compilation of the ChaCha20/Poly1305 code.
* The following CA certificates were Removed
- Staat der Nederlanden Root CA
- NetLock Minositett Kozjegyzoi (Class QA) Tanusitvanykiado 
- NetLock Kozjegyzoi (Class A) Tanusitvanykiado 
- NetLock Uzleti (Class B) Tanusitvanykiado 
- NetLock Expressz (Class C) Tanusitvanykiado 
- VeriSign Class 1 Public PCA – G2 
- VeriSign Class 3 Public PCA 
- VeriSign Class 3 Public PCA – G2 
- CA Disig
* The following CA certificates were Added 
- SZAFIR ROOT CA2
- Certum Trusted Network CA 2
* The following CA certificate had the Email trust bit turned on
- Actalis Authentication Root CA 

The full release notes, including the SHA256 fingerprints of the changed
CA certificates, are available at
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.23_release_notes

The HG tag is NSS_3_23_RTM. NSS 3.23 requires NSPR 4.12 or newer.

NSS 3.23 source distributions are available on ftp.mozilla.org for secure HTTPS
download:
https://ftp.mozilla.org/pub/mozilla.org/security/nss/releases/NSS_3_23_RTM/src/

The NSS development team would like to thank security researcher Francis Gabriel
for responsibly disclosing the issue in Bug 1245528.

A complete list of all bugs resolved in this release can be obtained at
https://bugzilla.mozilla.org/buglist.cgi?resolution=FIXED=Components_format=advanced=NSS_milestone=3.23

-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

[ANNOUNCE] NSS 3.19.2.3 Release

2016-03-08 Thread Kai Engert
The NSS Development Team announces the release of NSS 3.19.2.3,
which is a security patch release for NSS 3.19.2.

(Current users of NSS 3.19.3, NSS 3.19.4 or NSS 3.20.x are advised to update to
NSS 3.21.1, NSS 3.22.2, or a later release.)

No new functionality is introduced in this release.

The following security-relevant bug has been resolved in NSS 3.19.2.3. 
Users are encouraged to upgrade immediately.

* Bug 1245528 (CVE-2016-1950):
  Fixed a heap-based buffer overflow related to the parsing of certain ASN.1
  structures. An attacker could create a specially-crafted certificate which,
  when parsed by NSS, would cause a crash or execution of arbitrary code with
  the permissions of the user.

The full release notes are available at
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.2.3_release_notes

The HG tag is NSS_3_19_2_3_RTM. NSS 3.19.2.3 requires NSPR 4.10.10 or newer.

NSS 3.19.2.3 source distributions are available on ftp.mozilla.org for secure
HTTPS download:
https://ftp.mozilla.org/pub/mozilla.org/security/nss/releases/NSS_3_19_2_3_RTM/src/

The NSS development team would like to thank security researcher Francis Gabriel
for responsibly disclosing the issue in Bug 1245528.

-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Re: Optimizing NSSTrustDomain_TraverseCertificates() of nss package

2016-03-08 Thread David Woodhouse
On Tue, 2016-03-08 at 18:22 +0530, varun naganathan wrote:
> I'm currently working to migrate the storage of certs to a hash table
> rather than a linked list which provides lookups at O(1) rather than
> the present lookup of O(n).
>
> The details of this behavior can be found in
> https://bugzilla.mozilla.org/show_bug.cgi?id=1253211
> Any alternate suggestions to improve and optimize the behavior are
> welcomed.

So fixing it the nssPKIObjectCollection to use hash tables — one hashed
on the object uid and one on the instance (token/handle) — will be a
very good start. From discussion on IRC it looks like you're making
good progress on that.

But we still end up with the rather bizarre situation that things lie
PK11_FindCertsFromEmailAddress() are
invoking NSSTrustDomain_TraverseCertificates() with their own callback
(e.g. FindCertsEmailCallback()) but we still end up building up
this huge nssPKIObjectCollection of *all* the certs that exist
anywhere, before we start to filter it down to only the ones we're
actually interested in.

So your hash tables fixes are great, and they'll fix PK11_ListCerts()
to run in a sane amount of time. But I still find myself wondering why
the PK11_FindCertsFrom*() functions even *noticed* this issue. We
should apply the filter *before* building up the results in a
collection, surely?

-- 
David WoodhouseOpen Source Technology Centre
david.woodho...@intel.com  Intel Corporation



smime.p7s
Description: S/MIME cryptographic signature
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Optimizing NSSTrustDomain_TraverseCertificates() of nss package

2016-03-08 Thread varun naganathan
Hi all,
I've currently been working on optimizing the nss package functions
like NSSTrustDomain_TraverseCertificates()
which can be seen at
https://dxr.mozilla.org/mozilla-central/source/security/nss/lib/pki/trustdomain.c?from=NSSTrustDomain_TraverseCertificates#988
and nssPKIObjectCollection_AddInstances() as can be seen at
https://dxr.mozilla.org/mozilla-central/source/security/nss/lib/pki/pkibase.c?case=true=nssPKIObjectCollection_AddInstances#827
.
Currently the nss package uses a circular linked list to store certs.
Hence the following functions give a very bad performance of O(n*n) for
adding instances of certs into the list.
Each addition first consists of an addition to the linked list O(n)
followed by a check for duplicates which is performed by the function
add_object_instance.
I'm currently working to migrate the storage of certs to a hash table
rather than a linked list which provides lookups at O(1) rather than the
present lookup of O(n).
The details of this behavior can be found in
https://bugzilla.mozilla.org/show_bug.cgi?id=1253211
Any alternate suggestions to improve and optimize the behavior are welcomed.
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto