[Top][All Lists]

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

ANNOUNCE: Nettle-3.3

From: Niels Möller
Subject: ANNOUNCE: Nettle-3.3
Date: Sat, 01 Oct 2016 21:51:05 +0200
User-agent: Gnus/5.13 (Gnus v5.13) Emacs/24.5 (berkeley-unix)

I'm happy to announce a new release of GNU Nettle, a low-level
cryptographics library. This is mainly a bug fix release.

The Nettle home page can be found at, and the manual at

NEWS for the Nettle 3.3 release

        This release fixes a couple of bugs, and improves resistance
        to side-channel attacks on RSA and DSA private key operations.

        Changes in behavoir:

        * Invalid private RSA keys, with an even modulo, are now
          rejected by rsa_private_key_prepare. (Earlier versions
          allowed such keys, even if results of using them were

          Nettle applications are required to call
          rsa_private_key_prepare and check the return value, before
          using any other RSA private key functions; failing to do so
          may result in crashes for invalid private keys. As a
          workaround for versions of Gnutls which don't use
          rsa_private_key_prepare, additional checks for even moduli
          are added to the rsa_*_tr functions which are used by all
          recent versions of Gnutls.

        * Ignore bit 255 of the x coordinate of the input point to
          curve25519_mul, as required by RFC 7748. To differentiate at
          compile time, curve25519.h defines the constant


        * RSA and DSA now use side-channel silent modular
          exponentiation, to defend against attacks on the private key
          from evil processes sharing the same processor cache. This
          attack scenario is of particular relevance when running an
          HTTPS server on a virtual machine, where you don't know who
          you share the cache hardware with.

          (Private key operations on elliptic curves were already
          side-channel silent).

        Bug fixes:

        * Fix sexp-conv crashes on invalid input. Reported by Hanno

        * Fix out-of-bounds read in des_weak_p. Fixed by Nikos

        * Fix a couple of formally undefined shift operations,
          reported by Nikos Mavrogiannopoulos.

        * Fix compilation with c89. Reported by Henrik Grubbström.

        New features:

        * New function memeql_sec, for side-channel silent comparison
          of two memory areas.


        * Building the public key support of nettle now requires GMP
          version 5.0 or later (unless --enable-mini-gmp is used).

        * Filenames of windows DLL libraries now include major number
          only. So the dll names change at the same time as the
          corresponding soname on ELF platforms. Fixed by Nikos

        * Eliminate most pointer-signedness warnings. In the process,
          the strings representing expression type for sexp_interator
          functions were changed from const uint8_t * to const char *.
          These functions are undocumented, and it doesn't change the
          ABI on any platform I'm aware of.

        The shared library names are and, with sonames still and It is intended to be fully binary compatible
        with nettle-3.1.

Happy hacking,
/Niels Möller

Niels Möller. PGP-encrypted email is preferred. Keyid 368C6677.
Internet email is subject to wholesale government surveillance.

Attachment: signature.asc
Description: PGP signature

reply via email to

[Prev in Thread] Current Thread [Next in Thread]