summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorGuus Sliepen <guus@tinc-vpn.org>2018-10-05 14:26:44 +0200
committerGuus Sliepen <guus@tinc-vpn.org>2018-10-08 10:48:21 +0200
commitd964d84662b73e351b71905a3c743b666a42aa1d (patch)
treeb2bc095b35b3827e72de0c009ca2c7273b02bd66
parent9fac7adb587a455c14d2dccd33e5a910534a4c53 (diff)
Releasing 1.0.35.release-1.0.35
-rw-r--r--NEWS5
-rw-r--r--README13
-rw-r--r--configure.ac2
3 files changed, 17 insertions, 3 deletions
diff --git a/NEWS b/NEWS
index aefcd40b..4a342f7e 100644
--- a/NEWS
+++ b/NEWS
@@ -1,3 +1,8 @@
+Version 1.0.35 October 5 2018
+
+ * Prevent oracle attacks (CVE-2018-16737, CVE-2018-16738).
+ * Prevent a MITM from forcing a NULL cipher for UDP (CVE-2018-16758).
+
Version 1.0.34 June 12 2018
* Fix a potential segmentation fault when connecting to an IPv6 peer via a
diff --git a/README b/README
index 02c2cab5..f47cc299 100644
--- a/README
+++ b/README
@@ -1,4 +1,4 @@
-This is the README file for tinc version 1.0.34. Installation
+This is the README file for tinc version 1.0.35. Installation
instructions may be found in the INSTALL file.
tinc is Copyright (C) 1998-2018 by:
@@ -41,6 +41,15 @@ issues are being addressed in the tinc 1.1 branch.
The Sweet32 attack affects versions of tinc prior to 1.0.30.
+On September 6th, 2018, Michael Yonly contacted us and provided
+proof-of-concept code that allowed a remote attacker to create an
+authenticated, one-way connection with a node, and also that there was a
+possibility for a man-in-the-middle to force UDP packets from a node to be sent
+in plaintext. The first issue was trivial to exploit on tinc versions prior to
+1.0.30, but the changes in 1.0.30 to mitigate the Sweet32 attack made this
+weakness much harder to exploit. These issues have been fixed in tinc 1.0.35.
+The new protocol in the tinc 1.1 branch is not susceptible to these issues.
+
Cryptography is a hard thing to get right. We cannot make any
guarantees. Time, review and feedback are the only things that can
prove the security of any cryptographic product. If you wish to review
@@ -50,7 +59,7 @@ tinc or give us feedback, you are strongly encouraged to do so.
Compatibility
-------------
-Version 1.0.31 is compatible with 1.0pre8, 1.0 and later, but not with older
+Version 1.0.35 is compatible with 1.0pre8, 1.0 and later, but not with older
versions of tinc. Note that since version 1.0.30, tinc requires all nodes in
the VPN to be compiled with a version of LibreSSL or OpenSSL that supports the
AES256 and SHA256 algorithms.
diff --git a/configure.ac b/configure.ac
index 2564bf3b..6de03132 100644
--- a/configure.ac
+++ b/configure.ac
@@ -1,7 +1,7 @@
dnl Process this file with autoconf to produce a configure script.
AC_PREREQ(2.61)
-AC_INIT([tinc], [1.0.34])
+AC_INIT([tinc], [1.0.35])
AC_CONFIG_SRCDIR([src/tincd.c])
AM_INIT_AUTOMAKE([1.11 check-news std-options subdir-objects nostdinc silent-rules -Wall])
AC_CONFIG_HEADERS([config.h])