On Mon, 2014-10-27 at 14:59 +0100, Kai Engert wrote: > The NSS Development Team announces the release of NSS 3.16.2.3 > > Network Security Services (NSS) 3.16.2.3 is a patch release > for NSS 3.16, to fix a regression.
Sorry, this paragraph should have said: Network Security Services (NSS) 3.16.2.3 is a patch release for NSS 3.16. It fixes a bug and contains a backport of the TLS_FALLBACK_SCSV feature, which was originally made available in NSS 3.17.1. > New functionality: > * TLS_FALLBACK_SCSV is a signaling cipher suite value that indicates a > handshake is the result of TLS version fallback. > > New Macros: > * SSL_ENABLE_FALLBACK_SCSV - an SSL socket option that enables > TLS_FALLBACK_SCSV. Off by default. > * SSL_ERROR_INAPPROPRIATE_FALLBACK_ALERT - a new SSL error code. > * TLS_FALLBACK_SCSV - a a signaling cipher suite value that indicates a > handshake is the result of TLS version fallback. > > The following bug has been resolved in NSS 3.16.2.3: > * Bug 1057161 - NSS hangs with 100% CPU on invalid EC key > * Bug 1036735 - Add support for draft-ietf-tls-downgrade-scsv > > The full release notes are available at > https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.16.2.3_release_notes > > The HG tag is NSS_3_16_2_3_RTM. NSS 3.16.2.3 requires NSPR 4.10.6 or > newer. > > NSS 3.16.2.3 source distributions are also available on ftp.mozilla.org > for secure HTTPS download: > https://ftp.mozilla.org/pub/mozilla.org/security/nss/releases/NSS_3_16_2_3_RTM/src/ -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto