Fedora 20 Update: certmonger-0.75.6-1.fc20

updates at fedoraproject.org updates at fedoraproject.org
Tue Jul 8 01:04:44 UTC 2014


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2014-7529
2014-06-19 22:09:49
--------------------------------------------------------------------------------

Name        : certmonger
Product     : Fedora 20
Version     : 0.75.6
Release     : 1.fc20
URL         : http://certmonger.fedorahosted.org
Summary     : Certificate status monitor and PKI enrollment client
Description :
Certmonger is a service which is primarily concerned with getting your
system enrolled with a certificate authority (CA) and keeping it enrolled.

--------------------------------------------------------------------------------
Update Information:

This update adds several new features to certmonger:
* Generation of DSA and EC key pairs and self-signed certificates.
* A "local" signer.
* Better reporting of local filesystem permissions errors.
* Retrieval of root certificates from certain CA types (implemented only for IPA and "local").
* Storage of retrieved CA certificates in specified locations.
* Signing requests can now include IP address subject alternative names.

--------------------------------------------------------------------------------
ChangeLog:

* Thu Jun 26 2014 Nalin Dahyabhai <nalin at redhat.com> 0.75.6-1
- avoid potential use-after-free and read overrun after a CA is added
  dynamically (thanks to Jan Cholasta)
* Fri Jun 20 2014 Nalin Dahyabhai <nalin at redhat.com> 0.75.5-1
- documentation updates
* Fri Jun 20 2014 Nalin Dahyabhai <nalin at redhat.com> 0.75.4-2
- add a %trigger to remove knowledge of the "dogtag-ipa-renew-agent" CA
  when we detect certmonger versions prior to 0.58 being installed, to
  avoid cases where some older versions choke on CAs with nicknames that
  contain characters that can't legally be part of a D-Bus name (#948993)
* Thu Jun 19 2014 Nalin Dahyabhai <nalin at redhat.com> 0.75.4-1
- fix creation and packaging of the "local" CA's data directory
* Wed Jun 18 2014 Nalin Dahyabhai <nalin at redhat.com> 0.75.3-1
- read and cache whether or not we saw a noOCSPcheck extension in certificates
- documentation updates
* Mon Jun 16 2014 Nalin Dahyabhai <nalin at redhat.com> 0.75.2-1
- when generating keys using OpenSSL, if key generation fails, try
  again with the default key size, in case we're in FIPS mode
- documentation updates
* Sat Jun 14 2014 Nalin Dahyabhai <nalin at redhat.com> 0.75.1-1
- log the state in 'getcert status' verbose mode
* Fri Jun 13 2014 Nalin Dahyabhai <nalin at redhat.com> 0.75-1
- add a -w (wait) flag to the getcert's request/resubmit/start-tracking
  commands, and add a non-waiting status command
* Wed Jun 11 2014 Nalin Dahyabhai <nalin at redhat.com> 0.74.96-1
- make the trust settings we apply to CA-supplied certificates while
  saving them to NSS databases run-time configurable
- fix compiling against EL5-era OpenSSL
- when saving CA certificates we pull from an IPA server, nickname
  it using the realm name with " IPA CA" appended rather than just
  naming it "IPA CA"
- fix the local signer so that when it issues itself a new certificate,
  it uses the same subject name
- add a -w flag to getcert's request, resubmit, and start-tracking
  commands, telling it to wait until either the certificate is issued,
  we get to a state where we know that we won't be able to get one, or
  we are waiting for a CA
* Mon Jun  9 2014 Nalin Dahyabhai <nalin at redhat.com> 0.74.95-1
- add the "local" signer, a local toy CA that signs anything you'll
  ask it to sign
* Sat Jun  7 2014 Fedora Release Engineering <rel-eng at lists.fedoraproject.org> - 0.74-2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild
* Fri Jun  6 2014 Nalin Dahyabhai <nalin at redhat.com> 0.74.94-1
- fix self-test errors that we trigger with new OpenSSL
- fix a build error that would sometimes happen when we're told to
  build PIE binaries
- quiet a compile warning
* Thu Jun  5 2014 Nalin Dahyabhai <nalin at redhat.com> 0.74.93-1
- add some self-tests
- simplify the internal submit-to-CA logic
- fixes for more problems found through static analysis
* Tue Jun  3 2014 Nalin Dahyabhai <nalin at redhat.com> 0.74.92-1
- retrieve CA information from CAs, if the helpers can do so, and
  add a command to explicitly refresh that data: "getcert refresh-ca"
- offer to save CA certificates to files and databases, when specified with
  new -a and -F flags to getcert request/resubmit/start-tracking (#1098208,
  trac #31)
- add IP address subject alternate names when getcert request/resubmit
  is passed the -A option (trac #35)
- read and cache the freshestCRL extension in certificates
- properly interpret KDC-unreachable errors encountered in the IPA
  submission error as a server-unreachable error that we will retry,
  rather than a misconfiguration error which we won't
- don't let tests get tripped up by new formatting used in dos2unix status
  messages (#1099080)
- updated translations
- be explicit that we are going to use bashisms in test scripts by calling
  the shell interpreter as 'bash' rather than 'sh' (trac #27)
* Thu Apr  3 2014 Nalin Dahyabhai <nalin at redhat.com> 0.74-1
- also save state when we exit due to SIGHUP
- don't get tripped up when enrollment helpers hand us certificates which
  include CRLF line terminators (ticket #25)
- be tolerant of certificate issuer names, subject names, DNS, email, and
  Kerberos principal namem subjectAltNames, and crl distribution point URLs
  that contain newlines
- read and cache the certificate template extension in certificates
- enforce different minimum key sizes depending on the type of key we're
  trying to generate
- store DER versions of subject, issuer and template subject, if we have
  them (Jan Cholasta, ticket #26)
- when generating signing requests with subject names that don't quite parse
  as subject names, encode what we're given as PrintableString rather than
  as a UTF8String
- always chdir() to a known location at startup, even if we're not becoming
  a daemon
- fix a couple of memory leaks (static analysis)
- add missing buildrequires: on which
* Thu Feb 20 2014 Nalin Dahyabhai <nalin at redhat.com> 0.73-1
- updates to 0.73
  - getcert no longer claims to be stuck when a CA is unreachable,
    because the daemon isn't actually stuck
* Mon Feb 17 2014 Nalin Dahyabhai <nalin at redhat.com>
- updates to 0.73
  - also pass the key type to enrollment helpers in the environment as
    a the value of "CERTMONGER_KEY_TYPE"
* Mon Feb 10 2014 Nalin Dahyabhai <nalin at redhat.com>
- move the tmpfiles.d file from /etc/tmpfiles.d to %{_tmpfilesdir},
  where it belongs
* Mon Feb 10 2014 Nalin Dahyabhai <nalin at redhat.com>
- updates for 0.73
  - set the flag to encode EC public key parameters using named curves
    instead of the default of all-the-details when using OpenSSL
  - don't break when NSS supports secp521r1 but OpenSSL doesn't
  - also pass the CA nickname to enrollment helpers in the environment as
    a text value in "CERTMONGER_CA_NICKNAME", so they can use that value
    when reading configuration settings
  - also pass the SPKAC value to enrollment helpers in the environment as
    a base64 value in "CERTMONGER_SPKAC"
  - also pass the request's SubjectPublicKeyInfo value to enrollment helpers
    in the environment as a base64 value in "CERTMONGER_SPKI"
  - when generating signing requests using NSS, be more accommodating of
    requested subject names that don't parse properly
* Mon Feb  3 2014 Nalin Dahyabhai <nalin at redhat.com> 0.72-1
- update to 0.72
  - support generating DSA parameters and keys on sufficiently-new OpenSSL
    and NSS
  - support generating EC keys when OpenSSL and NSS support it, using key
    size to select the curve to use from among secp256r1, secp384r1,
    secp521r1 (which are the ones that are usually available, though
    secp521r1 isn't always, even if the other two are)
  - stop trying to cache public key parameters at all and instead cache public
    key info properly
  - encode the friendlyName attribute in signing requests as a BMPString,
    not as a PrintableString
  - catch more filesystem permissions problems earlier (more of #996581)
* Mon Jan 27 2014 Nalin Dahyabhai <nalin at redhat.com> 0.71-1
- check for cases where we fail to allocate memory while reading a request
  or CA entry from disk (John Haxby)
- only handle one watch at a time, which should avoid abort() during
  attempts to reconnect to the message bus after losing our connection
  to it (#1055521)
* Fri Jan 24 2014 Daniel Mach <dmach at redhat.com> - 0.70-2
- Mass rebuild 2014-01-24
* Thu Jan  2 2014 Nalin Dahyabhai <nalin at redhat.com> 0.70-1
- add a --with-homedir option to configure, and use it, since subprocesses
  which we run and which use NSS may attempt to write to $HOME/.pki, and
  0.69's strategy of setting that to "/" was rightly hitting SELinux policy
  denials (#1047798)
* Fri Dec 27 2013 Daniel Mach <dmach at redhat.com> - 0.69-2
- Mass rebuild 2013-12-27
* Mon Dec  9 2013 Nalin Dahyabhai <nalin at redhat.com> 0.69-1
- tweak how we decide whether we're on the master or a minion when we're
  told to use certmaster as a CA
- clean up one of the tests so that it doesn't have to work around internal
  logging producing duplicate messages
- when logging errors while setting up to contact xmlrpc servers, explicitly
  note that the error is client-side
- don't abort() due to incorrect locking when an attempt to save an issued
  certificate to the designated location fails (part of #1032760/#1033333,
  ticket #22)
- when reading an issued certificate from an enrollment helper, ignore
  noise before or after the certificate itself (more of #1032760/1033333,
  ticket #22)
- run subprocesses in a cleaned-up environment (more of #1032760/1033333,
  ticket #22)
- clear the ca-error that we saved when we had an error talking to the CA if we
  subsequently succeed in talking to the CA
- various other static-analysis fixes
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use
su -c 'yum update certmonger' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------


More information about the package-announce mailing list