NSS 3.15.1 release notes¶
Network Security Services (NSS) 3.15.1 is a patch release for NSS 3.15. The bug fixes in NSS 3.15.1 are described in the “Bugs Fixed” section below.
NSS 3.15.1 source distributions are also available on ftp.mozilla.org for secure HTTPS download:
New in NSS 3.15.1¶
TLS 1.2: TLS 1.2 (RFC 5246) is supported. HMAC-SHA256 cipher suites (RFC 5246 and RFC 5289) are supported, allowing TLS to be used without MD5 and SHA-1. Note the following limitations.
The hash function used in the signature for TLS 1.2 client authentication must be the hash function of the TLS 1.2 PRF, which is always SHA-256 in NSS 3.15.1.
AES GCM cipher suites are not yet supported.
SSL_LIBRARY_VERSION_TLS_1_2 - The protocol version of TLS 1.2 on the wire, value 0x0303.
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_NULL_SHA256 - New TLS 1.2 only HMAC-SHA256 cipher suites.
SSL_ERROR_UNSUPPORTED_HASH_ALGORITHM, SSL_ERROR_DIGEST_FAILURE, SSL_ERROR_INCORRECT_SIGNATURE_ALGORITHM - New error codes for TLS 1.2.
ssl_hmac_sha256 - A new value in the SSLMACAlgorithm enum type.
ssl_signature_algorithms_xtn - A new value in the SSLExtensionType enum type.
New PKCS #11 Mechanisms
Notable Changes in NSS 3.15.1¶
Bug 856060 - Enforce name constraints on the common name in libpkix when no subjectAltName is present.
Bug 875156 - Add const to the function arguments of SEC_CertNicknameConflict.
Bug 877798 - Fix ssltap to print the certificate_status handshake message correctly.
Bug 882829 - On Windows, NSS initialization fails if NSS cannot call the RtlGenRandom function.
Bug 875601 - SECMOD_CloseUserDB/SECMOD_OpenUserDB fails to reset the token delay, leading to spurious failures.
Bug 884072 - Fix a typo in the header include guard macro of secmod.h.
Bug 876352 - certutil now warns if importing a PEM file that contains a private key.
Bug 565296 - Fix the bug that shlibsign exited with status 0 even though it failed.
The NSS_SURVIVE_DOUBLE_BYPASS_FAILURE build option is removed.
NSS 3.15.1 shared libraries are backward compatible with all older NSS 3.x shared libraries. A program linked with older NSS 3.x shared libraries will work with NSS 3.15.1 shared libraries without recompiling or relinking. Furthermore, applications that restrict their use of NSS APIs to the functions listed in NSS Public Functions will remain compatible with future versions of the NSS shared libraries.
Bugs discovered should be reported by filing a bug report with bugzilla.mozilla.org (product NSS).