Update module github.com/refraction-networking/utls to v1.7.0 [SECURITY] #16
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
v1.3.2→v1.7.0GitHub Vulnerability Alerts
GHSA-pmc3-p9hx-jq96
Description
Before version 1.7.0, utls did not implement the TLS 1.3 downgrade protection mechanism specified in RFC 8446 Section 4.1.3 when using a utls ClientHello spec. This allowed an active network adversary to downgrade TLS 1.3 connections initiated by a utls client to a lower TLS version (e.g., TLS 1.2) by modifying the ClientHello message to exclude the SupportedVersions extension, causing the server to respond with a TLS 1.2 ServerHello (along with a downgrade canary in the ServerHello random field). Because utls did not check the downgrade canary in the ServerHello random field, clients would accept the downgraded connection without detecting the attack. This attack could also be used by an active network attacker to fingerprint utls connections.
Fix Commit or Pull Request
refraction-networking/utls#337, specifically refraction-networking/utls@f889276
References
Release Notes
refraction-networking/utls (github.com/refraction-networking/utls)
v1.7.0Compare Source
What's Changed
New Contributors
Full Changelog: refraction-networking/utls@v1.6.7...v1.7.0
v1.6.7: Allow inspecting Client Hello before locking Session/PSKCompare Source
What's Changed
Full Changelog: refraction-networking/utls@v1.6.6...v1.6.7
v1.6.6: Hotfix: QUIC must not send non-empty session ID by RFCCompare Source
What's Changed
Full Changelog: refraction-networking/utls@v1.6.5...v1.6.6
v1.6.5: Popular Firefox 120 parrot and deps updateCompare Source
What's Changed
New Contributors
Full Changelog: refraction-networking/utls@v1.6.4...v1.6.5
v1.6.4: bugfix: UConn incorrectly inherits Conn methodsCompare Source
What's Changed
(*UConn).Read()and Secure Renegotiation by @gaukas in #292Full Changelog: refraction-networking/utls@v1.6.3...v1.6.4
v1.6.3: Cryptographically Secured ShuffleCompare Source
Don't panic! This does not cause any significant security concern, since modern platforms are doing fine with limited randomness from
math/rand. This patch is for some much restrictive platforms such as WebAssembly -- on whichmath/randmay generate deterministic output (e.g., same random number series from each cold start).What's Changed
Full Changelog: refraction-networking/utls@v1.6.2...v1.6.3
v1.6.2: Dependency and Upstream UpdateCompare Source
What's Changed
Full Changelog: refraction-networking/utls@v1.6.1...v1.6.2
v1.6.1: Hotfix: kyberslash2Compare Source
Security Warning
This is a security update fixing kyberslash2, a timing side-channel attack against CIRCL library used by uTLS.
What's Changed
Full Changelog: refraction-networking/utls@v1.6.0...v1.6.1
v1.6.0: One step closer to ECHCompare Source
What's New
What's Changed
OmitEmptyPskfield inPreSharedKeyExtension(closes #255) by @sleeyax in #256New Contributors
Full Changelog: refraction-networking/utls@v1.5.4...v1.6.0
v1.5.4: Maintenance: bugfix and undo breaking APICompare Source
What's Changed
New Contributors
Full Changelog: refraction-networking/utls@v1.5.3...v1.5.4
v1.5.3: Hotfix: secondary key shareCompare Source
What's Changed
keySharesParamsby @gaukas in #238Full Changelog: refraction-networking/utls@v1.5.2...v1.5.3
v1.5.2: bugfixCompare Source
What's Changed
fc79497New Contributors
Full Changelog: refraction-networking/utls@v1.5.0...v1.5.2
v1.5.1Compare Source
v1.5.0: Post-Quantum and Session ResumptionCompare Source
What's Changed
A big shout out to @3andne for spending time on major refactoring/revision in the Session Resumption for both TLS 1.2 (SessionTicket-based) and TLS 1.3 (PreSharedKey-based)!
New API
Full Changelog: refraction-networking/utls@v1.4.3...v1.5.0
v1.4.3: Buggy versions retractedCompare Source
Retract v1.4.0, v1.4.1 for a breaking change made by
crypto/tlsin client handshake. This tag contains no code change from v1.4.2 since v1.4.2 patches the exact bug in the retracted versions.What's Changed
New Contributors
Full Changelog: refraction-networking/utls@v1.4.2...v1.4.3
v1.4.2: Hotfix: ClientSessionCacheCompare Source
Provide a dirty fix for a bug(?) triggered when
Config.ClientSessionCacheisnilandsession_ticketis received from a server.v1.4.1: Go above and beyondCompare Source
Security Fix
What's New
1.191.20What's Changed
New Contributors
Full Changelog: refraction-networking/utls@v1.3.3...v1.4.1
v1.4.0Compare Source
v1.3.3: Compatibility and OptimizationCompare Source
What's Changed
Full Changelog: refraction-networking/utls@v1.3.2...v1.3.3
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.