[new release] tls-mirage and tls (0.13.0)#18500
Conversation
CHANGES: * Remove static RSA and CBC ciphersuites from default configuration. The default configuration now includes FFDHE and ECDHE key exchanges with RSA or ECDSA/EdDSA certificates, and AEAD ciphers (AES-GCM, AES-CCM, ChaCha20-Poly1305) (mirleft/ocaml-tls#429 by @hannesm) * Remove SHA1 from signature_algorithms in the default configuration (mirleft/ocaml-tls#429 by @hannesm) * Support ECDSA and EdDSA certificates and private keys via x509 0.12.0 and mirage-crypto-ec (mirleft/ocaml-tls#428 by @hannesm) Breaking changes: - the second part of type Tls.Config.certchain is now a X509.Private_key.t (previously Mirage_crypto_pk.Rsa.priv) - the type aliases X509_lwt.priv and X509_lwt.authenticator have been removed * Use mirage-crypto-ec instead of fiat-p256 and hacl_x25519 for elliptic curve support - this adds P384 and P521 ECDH support (mirleft/ocaml-tls#428 by @hannesm) * Remove custom Monad implementation, use Result and Rresult instead (mirleft/ocaml-tls#429 by @hannesm) * Remove Utils.Cs submodule, use Cstruct API instead (mirleft/ocaml-tls#429 by @hannesm) * Breaking: Tls.Engine.ret type is now a result instead of a custom variant type (mirleft/ocaml-tls#429 by @hannesm) * Breaking: Tls_lwt.Unix.epoch results in (Tls.Core.epoch_data, unit) result - it was a custom error type previously (mirleft/ocaml-tls#429 by @hannesm)
|
I can't seem to find a revdep build run on opam-ci, is this intentional? since the release entails some breaking changes, it'd be great to see which packages fail to build. |
|
It is a few days that they seem surprisingly empty. Ping @kit-ty-kate |
|
Commit: 5ac44de A pull request by opam-seasoned @hannesm. ☀️ All lint checks passed 5ac44de
☀️ Installability check (+2)
|
|
@hannesm they are running properly now |
|
I added a commit that restricts the reverse dependencies:
|
|
the conduit-tls 3.0.0 revdep failures are addressed by #18502 (marking conduit*3 as unavailable). all other failures are out of scope (dns 4.x before 4.6.1 does not work on 32 bit, ...). from my point of view, this is ready to be merged. |
|
The CI results look good: some jobs are cancelled (but report "Job succeeded" as last line). The major failure is reverse dependencies of conduit-tls 3.0.0 -- which I attempted to address in #18502 that was closed. In any case, this is a release of tls and tls-mirage, and revdep failures of "conduit-tls" can be addressed in another PR (it is broken in opam-repository#master already anyways). |
|
Yes, some jobs end like this: It's a bit confusing, but the
That the cancellation didn't get through in time probably indicates some other problem (e.g. the network was down for a few minutes). An actually successful job looks like this (with two "Job succeeded" messages): |
|
This kind of success with "Cancelled' label is not uncommon. I have seen it a number of times in the past, mostly on runs with large amounts of revdeps (I think Tezos and alcotests are/were common cases) |
|
Thanks for explanation. What do I need to do to get this PR merged? |
|
I went through the build logs of the last two builds. The only one that needs still to be notified is colombe, which I will report directly on the repo. For the rest it lookgs good |
|
Thanks for the extra fixes and bounds |
|
thanks a lot! :) |
Transport Layer Security purely in OCaml, MirageOS layer
CHANGES:
default configuration now includes FFDHE and ECDHE key exchanges with RSA or
ECDSA/EdDSA certificates, and AEAD ciphers
(AES-GCM, AES-CCM, ChaCha20-Poly1305) (minor code cleanups mirleft/ocaml-tls#429 by @hannesm)
(minor code cleanups mirleft/ocaml-tls#429 by @hannesm)
mirage-crypto-ec (Use mirage-crypto-ec for elliptic curves, support ECDSA certificates mirleft/ocaml-tls#428 by @hannesm)
Breaking changes:
(previously Mirage_crypto_pk.Rsa.priv)
support - this adds P384 and P521 ECDH support (Use mirage-crypto-ec for elliptic curves, support ECDSA certificates mirleft/ocaml-tls#428 by @hannesm)
(minor code cleanups mirleft/ocaml-tls#429 by @hannesm)
(minor code cleanups mirleft/ocaml-tls#429 by @hannesm)
it was a custom error type previously (minor code cleanups mirleft/ocaml-tls#429 by @hannesm)