Skip to content

Commit

Permalink
Release 1.1.6
Browse files Browse the repository at this point in the history
  • Loading branch information
kristianf committed Aug 7, 2016
1 parent 0558bdb commit b1725fd
Show file tree
Hide file tree
Showing 6 changed files with 21 additions and 38 deletions.
40 changes: 10 additions & 30 deletions ANNOUNCEMENT
Original file line number Diff line number Diff line change
@@ -1,40 +1,19 @@
We are pleased to announce the availability of a new stable SKS
release: Version 1.1.5.
release: Version 1.1.6.

SKS is an OpenPGP keyserver whose goal is to provide easy to deploy,
decentralized, and highly reliable synchronization. That means that a
key submitted to one SKS server will quickly be distributed to all key
servers, and even wildly out-of-date servers, or servers that experience
spotty connectivity, can fully synchronize with rest of the system.

What's New in 1.1.5
What's New in 1.1.6
====================
- Fixes for machine-readable indices. Key expiration times are now read
from self-signatures on the key's UIDs. In addition, instead of 8-digit
key IDs, index entries now return the most specific key ID possible:
16-digit key ID for V3 keys, and the full fingerprint for V4 keys.
- Add metadata information (number of keys, number of files,
checksums, etc) to key dump. This allows for information on the
key dump ahead of download/import, and direct verification of checksums
using md5sum -c <metadata-file>.
- Replaced occurrances of the deprecated operator 'or' with '||' (BB issue #2)
- Upgraded to cryptlib-1.7 and own changes are now packaged as separate
patches that is installed during 'make'. Added the SHA-3 algorithm, Keccak
- Option max_matches was setting max_internal_matches. Fixed (BB issue #4)
- op=hget now supports option=mr for completeness (BB issue #17)
- Add CORS header to web server responses. Allows JavaScript code to
interact with keyservers, for example the OpenPGP.js project.
- Change the default hkp_address and recon_address to making the
default configuration support IPv6. (Requires OCaml 3.11.0 or newer)
- Only use '-warn-error A' if the source is marked as development as per
the version suffix (+) (part of BB Issue #2)
- Reduce logging verbosity for debug level lower than 6 for (i) bad requests,
and (ii) no results found (removal of HTTP headers in log) (BB Issue #13)
- Add additional OIDs for ECC RFC6637 style implementations
(brainpool and secp256k1) (BB Issue #25) and fix issue for 32 bit arches.
- Fix a non-persistent cross-site scripting possibility resulting from
improper input sanitation before writing to client. (BB Issue #26 | CVE-2014-3207)

- Add support for Elliptic Curve keys based on Curve25519 (both Ed25519/EdDSA
and encryption keys based on these curves)
- Fix format of md5sum file by adding a 2nd space to be format compliant
- Improvements to sks build stack space requirements
- Misc updates and fixes to web interface and typical config file

Note when upgrading from earlier versions of SKS
====================
Expand All @@ -52,7 +31,7 @@ https://bitbucket.org/skskeyserver/sks-keyserver
Prerequisites
====================
There are a few prerequisites to building this code. You need:
* ocaml-3.11.0 or later (ocaml-3.12.x is recommended). Get it from
* ocaml-4.0 or later. Get it from
<http://www.ocaml.org>
* Berkeley DB version 4.6.* or later, whereby 4.8 or later is recommended.
You can find the appropriate versions at
Expand All @@ -71,7 +50,8 @@ and has a fingerprint of

C90E F143 0B3A C0DF D00E 6EA5 4125 9773 973A 612A.

Using GnuPG, verification can be accomplished by, first, retrieving the signing key using
Using GnuPG, verification can be accomplished by, first, retrieving the signing
key using

gpg --keyserver pool.sks-keyservers.net --recv-key 0x41259773973A612A

Expand Down
9 changes: 6 additions & 3 deletions CHANGELOG
Original file line number Diff line number Diff line change
@@ -1,6 +1,9 @@
Development:
- Add support for EdDSA key using Ed25519 signature scheme
(http://www.ietf.org/id/draft-koch-eddsa-for-openpgp-00.txt)
1.1.6:
- Add support for Elliptic Curve keys based on Curve25519 (both Ed25519/EdDSA
and encryption keys based on these curves)
- Fix format of md5sum file by adding a 2nd space to be format compliant
- Improvements to sks build stack space requirements
- Misc updates and fixes to web interface and typical config file

1.1.5
- Fixes for machine-readable indices. Key expiration times are now read
Expand Down
1 change: 0 additions & 1 deletion FILES
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,6 @@ bdb/*.mli
bdb/Makefile
bdb/*.c
bdb/*.h
.depend
*.ml
*.mli
*.c
Expand Down
5 changes: 3 additions & 2 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ Prerequisites

There are a few prerequisites to building this code. You need:

* OCaml-3.11.0 or later. Get it from <http://ocaml.org>
* OCaml-4.0 or later. Get it from <http://ocaml.org>
* Berkeley DB version 4.6.* or later. You can find the
appropriate versions at
<http://www.oracle.com/technetwork/database/berkeleydb/downloads/index.html>
Expand All @@ -28,7 +28,8 @@ and has a fingerprint of

C90E F143 0B3A C0DF D00E 6EA5 4125 9773 973A 612A.

Using GnuPG, verification can be accomplished by, first, retrieving the signing key using
Using GnuPG, verification can be accomplished by, first, retrieving the signing
key using

gpg --keyserver pool.sks-keyservers.net --recv-key 0x41259773973A612A

Expand Down
2 changes: 1 addition & 1 deletion VERSION
Original file line number Diff line number Diff line change
@@ -1 +1 @@
1.1.5
1.1.6
2 changes: 1 addition & 1 deletion common.ml
Original file line number Diff line number Diff line change
Expand Up @@ -47,7 +47,7 @@ let version_tuple = (__VERSION__)
(* for Release versions, COMMONCAMLFLAGS in Makefile should include *)
(* '-warn-error a'. Development work should use '-warn-error A' for stricter *)
(* language checking. This affects the Ocaml compiler beginning with v4.01.0 *)
let version_suffix = "+" (* + for development branch *)
let version_suffix = "" (* + for development branch *)
let compatible_version_tuple = (0,1,5)
let version =
let (maj_version,min_version,release) = version_tuple in
Expand Down

0 comments on commit b1725fd

Please sign in to comment.