The Squid HTTP Proxy team is very pleased to announce the availability
of the Squid-3.5.6 release!


This release is a security and bug fix release resolving several issues
found in the prior Squid releases.


The major changes to be aware of:


* SQUID-2015:2 Improper Protection of Alternate Path

  http://www.squid-cache.org/Advisories/SQUID-2015_2.txt

Squid when passing a CONNECT request to a cache_peer blindly passes the
response back to the client. This can result in further requests on the
connection bypassing all access controls or routing configuration in the
gateway proxy that would otherwise have been applied.

The default settings of Squid protect most sites against this. However
certain known network topologies require the configuration which is
vulnerable.


* Regression Bug 4193: Memory leak on FTP listings

Recent releases have been leaking a small amount of memory on every
successful FTP directory listing. That has now been resolved.


* Bug 3329: The server side pinned connection is not closed properly

Squid internal state for remotely closed server connections was not
updated correctly. Which may result in pinned client connections hanging
until a timout, then abort being applied unexpectedly to an unrelated
connection.


* Bug 3875: bad mimeLoadIconFile error handling

This bug represented a small collection of errors possible when loading
icon files during startup. They may have resulted in various secondary
errors later as the icons were used. Squid will now log such failures on
startup and respond to requests with 204 (No Content) when the icon is
requested.


* Bug 4183: segfault when freeing https_port clientca on reconfigure or
exit.

This bug would appear on reconfigure when squid.conf contained the
http(s)_port clientca= parameter.


* Bug 3483: assertion failed store.cc:1866: 'isEmpty()'

This bug appeared randomly after Squid crashed, was shutdown with short
timeouts, or encountered various cache access issues (including bug 3875
above). While some of these causes still exist, this release treats the
resulting error properly as a SWAPFAIL and continues operation instead
of aborting with assertion.


* TLS: Disable client-initiated renegotiation

Current OpenSSL libraries protect against renegotiation already. Squid
does not renegotiate which avoids the specific CVE-2009-3555 issue. Use
of only the latest TLS protocol (as per Best Current Practice) also
protects against these effects.

However, Client-initiated TLS/SSL renegotiation could still result in
Denial of Service vulnerability for some libraries and configurations.
This further hardens against the SSL protocol flaw by rejecting client
attempts to renegotiate security protocol after initial TLS/SSL client
handshake has completed.

This change only has effect when Squid is built against libraries which
allow vulnerable forms of renegotiation. Or when Squid is configured to
allow SSLv3 downgrade renegotiation. Note that SSLv3 downgrade from TLS
is still permitted, but only before initial client handshake has completed.


* Fix CONNECT failover to IPv4 after trying broken IPv6 servers

This bug affects Squid attempting to open a TCP connection to a server
over broken IP connectivity. When the initial attempt times out Squid
would respond to the client with an error instead of attempting further IPs.

Note that only broken IP connectivity is required to trigger this bug.
That break may exist connecting to an IPv4 server or cache_peer. It is
currently more common in IPv6 connections due to explicit sysadmin
breakage "disabling" IPv6.


* Use relative-URL in errorpage.css for SN.png

The errorpage.css default file has previously been required due to
technical problems to use an absolute-URL to reference the default error
message Squid icon. With the current generation of browsers CSS3
behaviour and bug 4132 fixed in the prevous 3.5 release this requirement
is lifted.

As of the current release Squid default error page icon uses a
relative-URL relating to the stored icon file published and installed
with the Squid generating the error page (or any intervening Squid proxy
closer to the client). Resolving privacy information leak worries that
have been presented by some sysadmin.



 All users of Squid are urged to upgrade to this release as soon as
possible.


 See the ChangeLog for the full list of changes in this and earlier
 releases.

Please refer to the release notes at
http://www.squid-cache.org/Versions/v3/3.5/RELEASENOTES.html
when you are ready to make the switch to Squid-3.5

Upgrade tip:
  "squid -k parse" is starting to display even more
   useful hints about squid.conf changes.

This new release can be downloaded from our HTTP or FTP servers

 http://www.squid-cache.org/Versions/v3/3.5/
 ftp://ftp.squid-cache.org/pub/squid/
 ftp://ftp.squid-cache.org/pub/archive/3.5/

or the mirrors. For a list of mirror sites see

 http://www.squid-cache.org/Download/http-mirrors.html
 http://www.squid-cache.org/Download/mirrors.html

If you encounter any issues with this release please file a bug report.
http://bugs.squid-cache.org/


Amos Jeffries
_______________________________________________
squid-announce mailing list
squid-announce@lists.squid-cache.org
http://lists.squid-cache.org/listinfo/squid-announce

Reply via email to