You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: Changelog.md
+20-16Lines changed: 20 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,9 @@
1
1
# Change Log
2
2
3
+
## 1.11.x (upcoming)
4
+
5
+
- MONITORING_AUTH_RAW, is no longer used to configure monitoring authentication. Instead password entries must be entered directly in `/opt/Internet.nl/volumes/webserver/htpasswd/monitoring.htpasswd`. See: [Docker-Metrics](https://github.com/internetstandards/Internet.nl/blob/main/documentation/Docker-metrics.md#monitoring-user/allowlist-management). If you had configured monitoring auth previously you need to move this into the new file.
6
+
3
7
## 1.11.0 (in progress)
4
8
5
9
_Compared to the latest 1.10 release._
@@ -11,7 +15,7 @@ All tests were updated to match the
11
15
[2025-05 version of the NCSC TLS guidelines](https://www.ncsc.nl/documenten/publicaties/2025/juni/01/ict-beveiligingsrichtlijnen-voor-transport-layer-security-2025-05).
12
16
Most significant changes:
13
17
14
-
- The list of good/sufficient/phase out/insufficient TLS versions, TLS authentication, curves, hashes,
18
+
- The list of good/sufficient/phase out/insufficient TLS versions, TLS authentication, curves, hashes,
15
19
key exchange algorithms, FFDHE groups, RSA key lengths, and bulk encryption algorithms were updated
16
20
to match the new guidelines.
17
21
- A test for Extended Master Secret (RFC7627) was added.
@@ -26,17 +30,17 @@ Most significant changes:
26
30
[are now detected as such](https://github.com/internetstandards/Internet.nl/issues/1641).
27
31
Several issues with OCSP stapling reliability were also resolved.
28
32
- Issues were fixed where the cipher order failed to detect some bad scenarios,
29
-
including some where servers preferred RSA over ECDHE, or CBC over POLY1305.
33
+
including some where servers preferred RSA over ECDHE, or CBC over POLY1305.
30
34
- CCM_8 ciphers are now detected when enabled on a server.
31
35
- OLD ciphers are no longer detected.
32
-
- The cipher order test no longer separates between "the server cipher order preference is wrong"
36
+
- The cipher order test no longer separates between "the server cipher order preference is wrong"
33
37
and "the server has no preference".
34
-
38
+
35
39
36
40
### Significant internal changes
37
41
38
42
- ...
39
-
-
43
+
-
40
44
### Possibly required changes to deployments
41
45
42
46
...
@@ -105,7 +109,7 @@ The API version is updated to 2.6.0 due to the new CAA fields.
105
109
- Fixed handling for [CAA with non-ascii characters](https://github.com/internetstandards/Internet.nl/pull/1788).
106
110
- Fixed possible exception in [mail test prechecks](https://github.com/internetstandards/Internet.nl/pull/1787).
107
111
- Fixed an [issue with rate limiting](https://github.com/internetstandards/Internet.nl/pull/1792).
108
-
- Update [Django to 4.2.22](https://github.com/internetstandards/Internet.nl/pull/1795) to fix
112
+
- Update [Django to 4.2.22](https://github.com/internetstandards/Internet.nl/pull/1795) to fix
0 commit comments