Path to this page:
./
security/gnutls,
Transport Layer Security library
Branch: CURRENT,
Version: 3.8.8nb4,
Package name: gnutls-3.8.8nb4,
Maintainer: pkgsrc-usersGnuTLS is a portable ANSI C based library which implements the TLS 1.0 and SSL
3.0 protocols. The library does not include any patented algorithms and is
available under the GNU Lesser GPL license.
Important features of the GnuTLS library include:
- Thread safety
- Support for both TLS 1.0 and SSL 3.0 protocols
- Support for both X.509 and OpenPGP certificates
- Support for basic parsing and verification of certificates
- Support for SRP for TLS authentication
- Support for TLS Extension mechanism
- Support for TLS Compression Methods
Additionally GnuTLS provides an emulation API for the widely used OpenSSL
library, to ease integration with existing applications.
Required to run:[
archivers/lzo] [
security/libtasn1] [
devel/gmp] [
devel/libcfg+] [
security/mozilla-rootcerts] [
security/nettle] [
security/p11-kit] [
textproc/libunistring]
Required to build:[
pkgtools/cwrappers]
Package options: pkcs11
Master sites:
Filesize: 6539.512 KB
Version history: (Expand)
- (2025-01-07) Updated to version: gnutls-3.8.8nb4
- (2024-11-15) Updated to version: gnutls-3.8.8nb2
- (2024-11-11) Updated to version: gnutls-3.8.8nb1
- (2024-11-06) Updated to version: gnutls-3.8.8
- (2024-11-01) Updated to version: gnutls-3.8.7.1nb2
- (2024-11-01) Updated to version: gnutls-3.8.7.1nb1
CVS history: (Expand)
2025-01-07 21:12:53 by Taylor R Campbell | Files touched by this commit (1) |
Log message:
Revert "security/gnutls: Use system TLS trust anchors."
This requires review of how SmartOS and macOS, at least, are supposed
to handle TLS trust anchors for pkgsrc, which I didn't do -- it's
practically guaranteed that referring to
share/mozilla-rootcerts/cacert.pem is wrong on those platforms like
it is on NetBSD, but I don't know offhand what the right alternative
is and this can hold off until we determine that.
|
2025-01-07 20:19:34 by Taylor R Campbell | Files touched by this commit (1) |
Log message:
security/gnutls: Use system TLS trust anchors.
Until 2018, gnutls would search at _build-time_ for one of various
files /etc/ssl/ca-bundle.pem, /etc/ssl/certs/ca-certificates.crt,
/etc/pki/tls/cert.pem, &c., for trust anchors, and bake that path
into the build product -- or, if none of those existed at build-time,
it would bake _nothing_ into the build product and require programs
doing TLS to specify trust anchors explicitly; the gnutls function
gnutls_x509_trust_list_add_system_trust would fail with
GNUTLS_E_UNIMPLEMENTED_FEATURE.
In 2018, gnutls was changed to depend on mozilla-rootcerts and use
${PREFIX}/share/mozilla-rootcerts/cacert.pem. This was expedient for
NetBSD which (a) had no trust anchors shipped out of the box until
10.0 but (b) would usually be configured with mozilla-rootcerts
anyway, but wrong, because:
1. The system may manage TLS trust anchors differently, e.g. on
Fedora they're somewhere in /etc/pki/tls, or even if you install
trust anchors from pkgsrc you might use security/ca-certificates
instead of security/mozilla-rootcerts.
2. Even if the system uses Mozilla's trust anchors, there is no way
for an operator to safely selectively override individual CA
certificates, like nixing Digi-Notar after their compromise --
${PREFIX}/share/mozilla-rootcerts/cacert.pem is a static file that
is not allowed to change, not an editable configuration file.
With this change, on platforms where mk/ssl.mk defines SSLCERTBUNDLE,
gnutls will look there; on platforms without it, gnutls will revert
to its original default of checking various paths at build-time. For
systems where the binary packages are built without trust anchors at
build-time, but where there is a fixed path known at build-time where
the trust anchors will be at run-time, mk/ssl.mk should be adapted to
set SSLCERTBUNDLE.
PR pkg/58143: security/gnutls uses wrong trust anchors
|
2024-11-14 23:22:33 by Thomas Klausner | Files touched by this commit (2429) |
Log message:
*: recursive bump for icu 76 shlib major version bump
|
2024-11-11 13:17:56 by Nia Alarie | Files touched by this commit (1) |
Log message:
gnutls: gnu99 isn't valid for USE_CC_FEATURES
|
2024-11-11 03:06:05 by David H. Gutteridge | Files touched by this commit (1) | |
Log message:
gnutls: update test results comment
|
2024-11-11 03:03:54 by David H. Gutteridge | Files touched by this commit (3) |
Log message:
gnutls: fix builds with older GCCs, e.g., 7.5 on NetBSD 9.x
|
2024-11-09 15:51:21 by Thomas Klausner | Files touched by this commit (1) |
Log message:
gnutls: require gnu99 for non-constant initializer element
|
2024-11-06 15:51:41 by Adam Ciarcinski | Files touched by this commit (2) | |
Log message:
gnutls: updated to 3.8.8
Version 3.8.8 (released 2024-11-05)
** libgnutls: Experimental support for X25519MLKEM768 and SecP256r1MLKEM768 key \
exchange in TLS 1.3
The support for post-quantum key exchanges has been extended to
cover the final standard of ML-KEM, following
draft-kwiatkowski-tls-ecdhe-mlkem. The minimum supported version of
liboqs is bumped to 0.11.0.
** libgnutls: All records included in an OCSP response are now checked in TLS
Previously, when multiple records are provided in a single OCSP
response, only the first record was considered; now all those
records are examined until the server certificate matches.
** libgnutls: Handling of malformed compress_certificate extension is now more \
standard compliant
The server behavior of receiving a malformed compress_certificate
extension now more strictly follows RFC 8879; return
illegal_parameter alert instead of bad_certificate, as well as
overlong extension data is properly rejected.
** build: More flexible library linking options for compression libraries, TPM, \
and liboqs support
The configure options, --with-zstd, --with-brotli, --with-zlib,
--with-tpm2, and --with-liboqs now take 4 states:
yes/link/dlopen/no, to specify how the libraries are linked or
loaded.
** API and ABI modifications:
No changes since last version.
|