Skip to content

Commit

Permalink
Release ktls-utils 0.8
Browse files Browse the repository at this point in the history
Signed-off-by: Chuck Lever <chuck.lever@oracle.com>
  • Loading branch information
chucklever committed Apr 5, 2023
1 parent cbf588f commit a006152
Show file tree
Hide file tree
Showing 5 changed files with 14 additions and 20 deletions.
6 changes: 6 additions & 0 deletions ChangeLog
Original file line number Diff line number Diff line change
@@ -1,5 +1,11 @@
Change Log - In newest-release-first order

ktls-utils 0.8 - 2023-04-05
* Replace the listen-based upcall mechanism with netlink
* Implement server-side handshake support
* Implement x.509 certificate verification
* Implement keyring-based exchange of authentication material

ktls-utils 0.7 - 2022-11-10
* Remove the -n command line option
* Support client-side peer authentication
Expand Down
10 changes: 5 additions & 5 deletions NEWS
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
ktls-utils 0.7 - 2022-11-10
* Remove the -n command line option
* Support client-side peer authentication
* Support upcall API changes in v6.0 prototype kernel
* Add /etc/tlshd.conf with support for default cert and private key
ktls-utils 0.8 - 2023-04-05
* Replace the listen-based upcall mechanism with netlink
* Implement server-side handshake support
* Implement x.509 certificate verification
* Implement keyring-based exchange of authentication material
8 changes: 1 addition & 7 deletions README
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
# Release Notes for ktls-utils 0.8-pre
# Release Notes for ktls-utils 0.8

Note well: This is experimental prototype software. It's purpose is
purely as a demonstration and proof-of-concept. USE AT YOUR OWN RISK.
Expand Down Expand Up @@ -49,14 +49,8 @@ Work that remains:
* support for RPC-with-TLS certificate extended key usage
* support for root device / filesystem with TLS
* support for sharing TLS sessions across sockets
* support for multiple PSK identities
* support for multiple trust chains for server verification

### Server-side work

A server-side handshake mechanism is also needed but is not
yet part of this prototype.

## Security

Please consult the [security guide](./SECURITY.md) for our responsible security vulnerability disclosure process
Expand Down
8 changes: 1 addition & 7 deletions README.md
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
# Release Notes for ktls-utils 0.8-pre
# Release Notes for ktls-utils 0.8

Note well: This is experimental prototype software. It's purpose is
purely as a demonstration and proof-of-concept. USE AT YOUR OWN RISK.
Expand Down Expand Up @@ -49,14 +49,8 @@ Work that remains:
* support for RPC-with-TLS certificate extended key usage
* support for root device / filesystem with TLS
* support for sharing TLS sessions across sockets
* support for multiple PSK identities
* support for multiple trust chains for server verification

### Server-side work

A server-side handshake mechanism is also needed but is not
yet part of this prototype.

## Security

Please consult the [security guide](./SECURITY.md) for our responsible security vulnerability disclosure process
Expand Down
2 changes: 1 addition & 1 deletion configure.ac
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ dnl 02110-1301, USA.
dnl

AC_PREREQ([2.69])
AC_INIT([ktls-utils],[0.8-pre],[linux-nfs@vger.kernel.org])
AC_INIT([ktls-utils],[0.8],[linux-nfs@vger.kernel.org])
AM_INIT_AUTOMAKE
AM_SILENT_RULES([yes])
AC_CONFIG_SRCDIR([config.h.in])
Expand Down

0 comments on commit a006152

Please sign in to comment.