summaryrefslogtreecommitdiffstats
path: root/CHANGES.md
diff options
context:
space:
mode:
authorMatt Caswell <matt@openssl.org>2021-03-08 17:23:14 +0100
committerMatt Caswell <matt@openssl.org>2021-03-10 17:02:35 +0100
commit0966aee5ed1e543a3f598713d28194c5c1fd40da (patch)
tree2bd0ab8bcea3fb4dd56a20d0355a680330bf33a0 /CHANGES.md
parentAdd a CHANGES for OSSL_STORE_INFO_get_type() (diff)
downloadopenssl-0966aee5ed1e543a3f598713d28194c5c1fd40da.tar.xz
openssl-0966aee5ed1e543a3f598713d28194c5c1fd40da.zip
Expand the CHANGES entry for SHA1 and libssl
As well as SSL 3, TLS 1.0, TLS 1.1 and DTLS 1.0 not working at security level 1 we also document that TLS 1.2 connection will fail if the ClientHello does not have a signature algorithms extension. Fixes #14447 Reviewed-by: Tim Hudson <tjh@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14465)
Diffstat (limited to '')
-rw-r--r--CHANGES.md7
1 files changed, 6 insertions, 1 deletions
diff --git a/CHANGES.md b/CHANGES.md
index 695e43dfef..106f0b08d8 100644
--- a/CHANGES.md
+++ b/CHANGES.md
@@ -568,7 +568,12 @@ OpenSSL 3.0
reduced. This results in SSL 3, TLS 1.0, TLS 1.1 and DTLS 1.0 no longer
working at the default security level of 1 and instead requires security
level 0. The security level can be changed either using the cipher string
- with `@SECLEVEL`, or calling `SSL_CTX_set_security_level()`.
+ with `@SECLEVEL`, or calling `SSL_CTX_set_security_level()`. This also means
+ that where the signature algorithms extension is missing from a ClientHello
+ then the handshake will fail in TLS 1.2 at security level 1. This is because,
+ although this extension is optional, failing to provide one means that
+ OpenSSL will fallback to a default set of signature algorithms. This default
+ set requires the availability of SHA1.
*Kurt Roeckx*