NSS 3.83 release notes¶
Network Security Services (NSS) 3.83 was released on 15 September 2022.
The HG tag is NSS_3_83_RTM. NSS 3.83 requires NSPR 4.34.1 or newer.
NSS 3.83 source distributions are available on ftp.mozilla.org for secure HTTPS download:
Other releases are available Releases.
Changes in NSS 3.83¶
Bug 1788875 - Remove set-but-unused variables from SEC_PKCS12DecoderValidateBags
Bug 1563221 - remove older oses that are unused part3/ BeOS
Bug 1563221 - remove older unix support in NSS part 3 Irix
Bug 1563221 - remove support for older unix in NSS part 2 DGUX
Bug 1563221 - remove support for older unix in NSS part 1 OSF
Bug 1778413 - Set nssckbi version number to 2.58
Bug 1785297 - Add two SECOM root certificates to NSS
Bug 1787075 - Add two DigitalSign root certificates to NSS
Bug 1778412 - Remove Camerfirma Global Chambersign Root from NSS
Bug 1771100 - Added bug reference and description to disabled UnsolicitedServerNameAck bogo ECH test
Bug 1779361 - Removed skipping of ECH on equality of private and public SNI server name
Bug 1779357 - Added comment and bug reference to ECHRandomHRRExtension bogo test
Bug 1779370 - Added Bogo shim client HRR test support. Fixed overwriting of CHInner.random on HRR
Bug 1779234 - Added check for server only sending ECH extension with retry configs in EncryptedExtensions and if not accepting ECH. Changed config setting behavior to skip configs with unsupported mandatory extensions instead of failing
Bug 1771100 - Added ECH client support to BoGo shim. Changed CHInner creation to skip TLS 1.2 only extensions to comply with BoGo
Bug 1771100 - Added ECH server support to BoGo shim. Fixed NSS ECH server accept_confirmation bugs
Bug 1771100 - Update BoGo tests to recent BoringSSL version
Bug 1785846 - Bump minimum NSPR version to 4.34.1
NSS 3.83 shared libraries are backwards-compatible with all older NSS 3.x shared libraries. A program linked with older NSS 3.x shared libraries will work with this new version of the shared libraries without recompiling or relinking. Furthermore, applications that restrict their use of NSS APIs to the functions listed in NSS Public Functions will remain compatible with future versions of the NSS shared libraries.
Bugs discovered should be reported by filing a bug report on bugzilla.mozilla.org (product NSS).