-
Notifications
You must be signed in to change notification settings - Fork 759
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Towards new release 0.20.0 #1782
Comments
I re-read all the commits since the last release and I would suggest to mention also the following highlights that look like missed from the original list: For For
For For
Remove incomplete acos5 driver (#1622). minidriver:
coolkey: Improved card matching to avoid mismatches with similar muscle driver (#1500). New separate CAC1 driver using the old CAC specification (#1502). Additionally, I would like to ask for the status fo #1772, which adds support for IDPrime cards and in-card RSA-OAEP as an counterpart to RSA-PSS already in. |
EstEID section should mention something like this: "Added support for Estonian ID cards (supplied by IDEMIA) that have been issued since January 2019." It's a big win, because we only had closed source blob that had some issues... |
Thanks for the comments, @Jakuje @plaes ! I've edited and extended the NEWS as requested. I'd like to avoid mentioning #1500 and #1762 because I think they are technical improvements, invisible to the user. I'd like to postpone #1772 for the next release, because that are quite a lot of changes that did not yet get the attention they deserve. |
Thank you for clarification. |
You can find the updated release candidate here |
Since macOS Catalina, TokenDs are disabled by default, that's why I had to update the installer to also distribute OpenSCToken... (installed by default on 10.15, available as alternative to OpenSC.tokend on 10.12-10.14, disabled on 10.11 and before). The installation of PKCS#11 module and tools are unaffected. You can find the updated release candidate here. |
Seems like the oss-fuzz got silent for now. I would be for drawing a line here, do a rc, ask for testing and do the release. Is there anything else that we should get in? |
Updated CVEs and newly added fixes. Let's wait for the next report from OSS-Fuzz, which should finally allow a new release. |
Can we get #1826 also in. It will improve parallel usage of cards |
For #1877, I'm waiting for feedback from @the-kernel. If positive, the PR is good to be merged. I didn't see how #1826 is a bugfix for an error with parallel use, so I originally planned to postpone it... |
We discovered after testing, that things got better. I can change the label? |
@metsma Sorry I have been away and haven't had a chance to test, I'll get right on it, and let you know shortly. Thanks! |
I've merged the PRs as requested. However, the coolkey issues in OSS-Fuzz keep popping up over and over again... Would it be OK to remove Coolkey from the default list of activate drivers to finally make a release, @Jakuje? |
Even though they look like popping all over again, the latest one is a different issue than the previous ones (see the top commit in #1830). Some of the other issues look like running on some old revision. It looks like I am not getting email notification to all of the for some reason. I would like to avoid dropping coolkey from default. Even though the customer base is not big, there were already several users reporting issues directly here so they are using it. So we can either wait few more days and address as much as possible (I believe the worst issues are already handled) or release it as it is now (and possibly count with some security/bugfix release in month or two). Also in the previous comments I was asking about #1867 whether we can have it in release too as it is long-standing issue. |
Can we #1881 into the 0.20.0 release? I can squash and clean up some debugging if needed |
The situation around #1881 is not very clear, see the PR for comments |
I've created a new release candidate... |
RC4 tar.gz is missing test-pkcs11-tool-allowed-mechanisms.sh file |
@frankmorgner Could I kindly ask that we improve the versioning here? This is making things unnecessarily difficult for downstream consumption. The repository has recently been tagged with "0.20.0-rc1", "0.20.0-rc2", "OpenSC-0.20.0-rc3", and now "0.20.0-rc34". Could we please delete then re-create the latter two tags in the repository to follow the regular pattern? Distribution packaging scripts often depend on this. It also appears that the filenames for the Windows installers have contained the wrong rc version for the last three builds. Edit: It seems this was opened as #1886, but was closed without being fixed. |
There are no critical issues left and the new functionality has been integrated. I think it's time to prepare and publish the next major release, @OpenSC/core, @OpenSC/maintainers.
This release renames the configuration option
md_read_only
toread_only
. Inopenpgp-tool
the options-L
/--key-length
have been replaced with-t
/--key-type. Please review your
opensc.conf` and your shell scripts. Release candidate is available on Github.The general functionality has been verified to some extent in the CI environment, where we're using simulations of PIV, OpenPGP, GIDS, IsoApplet, MyEID and CAC for testing. Refer to the wiki page on how to systematically test your card. OpenSC is now part of the OSS-Fuzz family, which has already led to the fix of some security issues (see below).
Here is the complete list of changes, that would also appear in the release notes and NEWS file (please let me know if I'm missing something):
General Improvements
md_read_only
toread_only
and use it for PKCS#11 and Minidriver (Implement write protection in PKCS#11 #1467)make check
( CI: integrate clang-tidy #1673)PKCS#11
Minidriver
OpenSC tools
Harmonize the use of option
-r
/--reader
(tools: harmonize card initialization #1548)goid-tool
: GoID personalization with fingerprintopenpgp-tool
-L
/--key-length
with-t
/--key-type
(openpgp-tool extensions #1508)-C
/--card-info
and-K
/--key-info
(openpgp-tool extensions #1508)opensc-explorer
pin_info
(opensc-explorer addons & fixes #1487)random
to allow writing to a file (opensc-explorer addons & fixes #1487)opensc-minidriver-test.exe
: Tests for Microsoft CryptoAPI (Minidriver: Add support for PSS #1510)opensc-notify
: Autostart on Windowspkcs11-register
:opensc-tool
: Show ATR also for cards not recognized by OpenSC (opensc-tool: do not use card driver to read ATR #1625)pkcs11-spy
:pkcs11-tool
--verify
(Support RSA-PSS signature mechanisms using RSA-RAW #1435)secrkey
for--type
option (Add object type "secrkey" to help of --type switch in pkcs11-tool #1575)CKA_ALLOWED_MECHANISMS
when creating new objects and listing keys (Add support for CKA_ALLOWED_MECHANISMS in pkcs11-tool + some more tests #1628)pkcs15-crypt
: * Handle keys with user consent (pkcs15-crypt - Handle keys with user_consent - Fixes #1292 #1529)CAC1
New separate CAC1 driver using the old CAC specification (#1502).
CardOS
Coolkey
EstEID
GIDS
MICARDO
MyEID
Gemalto GemSafe
OpenPGP
Rutoken
SC-HSM
Starcos
TCOS
Infocamere, Postecert, Cnipa
ACS ACOS5
The text was updated successfully, but these errors were encountered: