On Mon, 2014-10-27 at 14:59 +0100, Kai Engert wrote:
> The NSS Development Team announces the release of NSS 3.16.2.3
> 
> Network Security Services (NSS) 3.16.2.3 is a patch release
> for NSS 3.16, to fix a regression.

Sorry, this paragraph should have said:

Network Security Services (NSS) 3.16.2.3 is a patch release
for NSS 3.16. It fixes a bug and contains a backport of the
TLS_FALLBACK_SCSV feature, which was originally made available in NSS
3.17.1.


> New functionality:
> * TLS_FALLBACK_SCSV is a signaling cipher suite value that indicates a
>   handshake is the result of TLS version fallback.
> 
> New Macros:
> * SSL_ENABLE_FALLBACK_SCSV - an SSL socket option that enables
>   TLS_FALLBACK_SCSV. Off by default.
> * SSL_ERROR_INAPPROPRIATE_FALLBACK_ALERT - a new SSL error code.
> * TLS_FALLBACK_SCSV - a a signaling cipher suite value that indicates a
>   handshake is the result of TLS version fallback.
> 
> The following bug has been resolved in NSS 3.16.2.3:
> * Bug 1057161 - NSS hangs with 100% CPU on invalid EC key
> * Bug 1036735 - Add support for draft-ietf-tls-downgrade-scsv
> 
> The full release notes are available at
> https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.16.2.3_release_notes
> 
> The HG tag is NSS_3_16_2_3_RTM. NSS 3.16.2.3 requires NSPR 4.10.6 or
> newer.
> 
> NSS 3.16.2.3 source distributions are also available on ftp.mozilla.org
> for secure HTTPS download:
> https://ftp.mozilla.org/pub/mozilla.org/security/nss/releases/NSS_3_16_2_3_RTM/src/


-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to