Skip to content

Releases: slackhq/nebula

Release v1.10.3

06 Feb 19:38
v1.10.3
f573e8a

Choose a tag to compare

Security

  • Fix an issue where blocklist bypass is possible when using curve P256 since the signature can have 2 valid representations.
    Both fingerprint representations will be tested against the blocklist.
    Any newly issued P256 based certificates will have their signature clamped to the low-s form.
    Nebula will assert the low-s signature form when validating certificates in a future version. GHSA-69x3-g4r3-p962

Changed

  • Improve error reporting if nebula fails to start due to a tun device naming issue. (#1588)

Release v1.10.2

21 Jan 17:52
v1.10.2
0b02d98

Choose a tag to compare

Fixed

  • Fix panic when using use_system_route_table that was introduced in v1.10.1. (#1580)

Changed

  • Fix some typos in comments. (#1582)
  • Dependency updates. (#1581)

Release v1.10.1

16 Jan 15:44
v1.10.1
72a4000

Choose a tag to compare

See the v1.10.1 milestone for a complete list of changes.

Fixed

  • Fix a bug where an unsafe route derived from the system route table could be lost on a config reload. (#1573)
  • Fix the PEM banner for ECDSA P256 public keys. (#1552)
  • Fix a regression on Windows from 1.9.x where nebula could fall back to a less performant UDP listener if
    non-critical ioctls failed. (#1568)
  • Fix a bug in handshake processing when a peer sends an unexpected public key. (#1566)

Added

  • Add a config option to control accepting recv_error packets which defaults to always. (#1569)

Changed

Release v1.10.0

04 Dec 19:53
v1.10.0
59e24b9

Choose a tag to compare

See the v1.10.0 milestone for a complete list of changes.

NOTE: If you use unsafe_routes, please read the note in the Changed section about default_local_cidr_any. You may need to update your firewall rules in order to maintain connectivity.

Added

Changed

  • NOTE: default_local_cidr_any now defaults to false, meaning that any firewall rule
    intended to target an unsafe_routes entry must explicitly declare it via the
    local_cidr field. This is almost always the intended behavior. This flag is
    deprecated and will be removed in a future release. (#1373)
  • Improve logging when a relay is in use on an inbound packet. (#1533)
  • Avoid fatal errors if rountines is > 1 on systems that don't support more than 1 routine. (#1531)
  • Log a warning if a firewall rule contains an any that negates a more restrictive filter. (#1513)
  • Accept encrypted CA passphrase from an environment variable. (#1421)
  • Allow handshaking with any trusted remote. (#1509)
  • Log only the count of blocklisted certificate fingerprints instead of the entire list. (#1525)
  • Don't fatal when the ssh server is unable to be configured successfully. (#1520)
  • Update to build against go v1.25. (#1483)
  • Allow projects using nebula as a library with userspace networking to configure the logger and build version. (#1239)
  • Upgrade to yaml.v3. (#1148, #1371, #1438, #1478)

Fixed

  • Fix a potential bug with udp ipv4 only on darwin. (#1532)
  • Improve lost packet statistics. (#1441, #1537)
  • Honor remote_allow_list in hole punch response. (#1186)
  • Fix a panic when tun.use_system_route_table is true and a route lacks a destination. (#1437)
  • Fix an issue when tun.use_system_route_table: true could result in heavy CPU utilization when many thousands of routes
    are present. (#1326)
  • Fix tests for 32 bit machines. (#1394)
  • Fix a possible 32bit integer underflow in config handling. (#1353)
  • Fix moving a udp address from one vpn address to another in the static_host_map
    which could cause rapid re-handshaking with an incorrect remote. (#1259)
  • Improve smoke tests in environments where the docker network is not the default. (#1347)

Release v1.9.7

10 Oct 15:50
v1.9.7
7c3f533

Choose a tag to compare

Security

  • Fix an issue where Nebula could incorrectly accept and process a packet from an erroneous source IP when the sender's
    certificate is configured with unsafe_routes (cert v1/v2) or multiple IPs (cert v2). (#1494)

Changed

  • Disable sending recv_error messages when a packet is received outside the allowable counter window. (#1459)
  • Improve error messages and remove some unnecessary fatal conditions in the Windows and generic udp listener. (#1453)

Release v1.9.6

18 Jul 12:55
v1.9.6
105e0ec

Choose a tag to compare

Added

  • Support dropping inactive tunnels. This is disabled by default in this release but can be enabled with tunnels.drop_inactive. See example config for more details. (#1413)

Fixed

  • Fix Darwin freeze due to presence of some Network Extensions (#1426)
  • Ensure the same relay tunnel is always used when multiple relay tunnels are present (#1422)
  • Fix Windows freeze due to ICMP error handling (#1412)
  • Fix relay migration panic (#1403)

Release v1.9.5

06 Dec 14:59
v1.9.5
b55b901

Choose a tag to compare

Added

  • Gracefully ignore v2 certificates. (#1282)

Fixed

  • Fix relays that refuse to re-establish after one of the remote tunnel pairs breaks. (#1277)

Release v1.9.4

09 Sep 18:20
v1.9.4
ab81b62

Choose a tag to compare

Added

  • Support UDP dialing with gVisor. (#1181)

Changed

Fixed

  • Fix a bug on big endian hosts, like mips. (#1194)
  • Fix a rare panic if a local index collision happens. (#1191)
  • Fix integer wraparound in the calculation of handshake timeouts on 32-bit targets. (#1185)

Release v1.9.3

06 Jun 17:26
v1.9.3
b14bad5

Choose a tag to compare

Fixed

  • Initialize messageCounter to 2 instead of verifying later. (#1156)

Release v1.9.2

03 Jun 19:57
v1.9.2
249ae41

Choose a tag to compare

Fixed

  • Ensure messageCounter is set before handshake is complete. (#1154)