NSS 3.41 release notes¶
Introduction¶
The NSS team has released Network Security Services (NSS) 3.41 on 7 December 2018, which is a minor release.
Distribution Information¶
The HG tag is NSS_3_41_RTM. NSS 3.41 requires NSPR 4.20 or newer.
NSS 3.41 source distributions are available on ftp.mozilla.org for secure HTTPS download:
New in NSS 3.41¶
New Functionality¶
Bug 1252891 - Implemented EKU handling for IPsec IKE.
Bug 1423043 - Enable half-closed states for TLS.
Bug 1493215 - Enabled the following ciphersuites by default:
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
TLS_RSA_WITH_AES_256_GCM_SHA384
New Functions
none
Notable Changes in NSS 3.41¶
The following CA certificates were Added:
CN = Certigna Root CA
SHA-256 Fingerprint: D48D3D23EEDB50A459E55197601C27774B9D7B18C94D5A059511A10250B93168
CN = GTS Root R1
SHA-256 Fingerprint: 2A575471E31340BC21581CBD2CF13E158463203ECE94BCF9D3CC196BF09A5472
CN = GTS Root R2
SHA-256 Fingerprint: C45D7BB08E6D67E62E4235110B564E5F78FD92EF058C840AEA4E6455D7585C60
CN = GTS Root R3
SHA-256 Fingerprint: 15D5B8774619EA7D54CE1CA6D0B0C403E037A917F131E8A04E1E6B7A71BABCE5
CN = GTS Root R4
SHA-256 Fingerprint: 71CCA5391F9E794B04802530B363E121DA8A3043BB26662FEA4DCA7FC951A4BD
CN = UCA Global G2 Root
SHA-256 Fingerprint: 9BEA11C976FE014764C1BE56A6F914B5A560317ABD9988393382E5161AA0493C
CN = UCA Extended Validation Root
SHA-256 Fingerprint: D43AF9B35473755C9684FC06D7D8CB70EE5C28E773FB294EB41EE71722924D24
The following CA certificates were Removed:
CN = AC Raíz Certicámara S.A.
SHA-256 Fingerprint: A6C51E0DA5CA0A9309D2E4C0E40C2AF9107AAE8203857FE198E3E769E343085C
CN = Certplus Root CA G1
SHA-256 Fingerprint: 152A402BFCDF2CD548054D2275B39C7FCA3EC0978078B0F0EA76E561A6C7433E
CN = Certplus Root CA G2
SHA-256 Fingerprint: 6CC05041E6445E74696C4CFBC9F80F543B7EABBB44B4CE6F787C6A9971C42F17
CN = OpenTrust Root CA G1
SHA-256 Fingerprint: 56C77128D98C18D91B4CFDFFBC25EE9103D4758EA2ABAD826A90F3457D460EB4
CN = OpenTrust Root CA G2
SHA-256 Fingerprint: 27995829FE6A7515C1BFE848F9C4761DB16C225929257BF40D0894F29EA8BAF2
CN = OpenTrust Root CA G3
SHA-256 Fingerprint: B7C36231706E81078C367CB896198F1E3208DD926949DD8F5709A410F75B6292
Bugs fixed in NSS 3.41¶
Bug 1412829, Reject empty supported_signature_algorithms in Certificate Request in TLS 1.2
Bug 1485864 - Cache side-channel variant of the Bleichenbacher attack (CVE-2018-12404)
Bug 1481271 - Resend the same ticket in ClientHello after HelloRetryRequest
Bug 1493769 - Set session_id for external resumption tokens
Bug 1507179 - Reject CCS after handshake is complete in TLS 1.3
This Bugzilla query returns all the bugs fixed in NSS 3.41:
Compatibility¶
NSS 3.41 shared libraries are backward compatible with all older NSS 3.x shared libraries. A program linked with older NSS 3.x shared libraries will work with NSS 3.41 shared libraries without recompiling or relinking. Furthermore, applications that restrict their use of NSS APIs to the functions listed in NSS Public Functions will remain compatible with future versions of the NSS shared libraries.
Feedback¶
Bugs discovered should be reported by filing a bug report with bugzilla.mozilla.org (product NSS).