Skip to content

Releases: hyperledger/fabric-ca

v1.5.10

15 Apr 17:21
Compare
Choose a tag to compare

v1.5.10 Release Notes - April 15, 2024

v1.5.10 updates code dependencies.

Dependencies

Fabric CA v1.5.10 has been tested with the following dependencies:

  • Go 1.21.9
  • Ubuntu 20.04 (for Docker images)
  • Databases
    • PostgreSQL 13
    • MySQL 8.0

Changes, Known Issues, and Workarounds

None.

Known Vulnerabilities

  • FABC-174 Commands can be manipulated to delete identities or affiliations

    This vulnerability can be resolved in one of two ways:

    1. Use HTTPS (TLS) so that the authorization header is not in clear text.

    2. The token generation/authentication mechanism was improved to optionally prevent
      token reuse. As of v1.4 a more secure token can be used by setting environment variable:

    FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false

    However, it cannot be set to false until all clients have
    been updated to generate the more secure token and tolerate
    FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false.
    The Fabric CA client has been updated in v1.4 to generate the more secure token.
    The Fabric SDKs will be updated by v2.0 timeframe to generate the more secure token,
    at which time the default for Fabric CA server will change to:
    FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false

Resolved Vulnerabilities

None.

v1.5.9

19 Feb 03:38
Compare
Choose a tag to compare

v1.5.9 Release Notes - February 19, 2024

v1.5.9 updates code dependencies, and removes dependency on core fabric.

Dependencies

Fabric CA v1.5.9 has been tested with the following dependencies:

  • Go 1.21.6
  • Ubuntu 20.04 (for Docker images)
  • Databases
    • PostgreSQL 13
    • MySQL 8.0

Changes, Known Issues, and Workarounds

None.

Known Vulnerabilities

  • FABC-174 Commands can be manipulated to delete identities or affiliations

    This vulnerability can be resolved in one of two ways:

    1. Use HTTPS (TLS) so that the authorization header is not in clear text.

    2. The token generation/authentication mechanism was improved to optionally prevent
      token reuse. As of v1.4 a more secure token can be used by setting environment variable:

    FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false

    However, it cannot be set to false until all clients have
    been updated to generate the more secure token and tolerate
    FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false.
    The Fabric CA client has been updated in v1.4 to generate the more secure token.
    The Fabric SDKs will be updated by v2.0 timeframe to generate the more secure token,
    at which time the default for Fabric CA server will change to:
    FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false

Resolved Vulnerabilities

None.

v1.5.8

21 Dec 19:35
Compare
Choose a tag to compare

v1.5.8 Release Notes - December 20, 2023

Fixes

Fix s390x build

Update github.com/IBM/mathlib to fix compilation issue on s390x.
#387

Improvements

Log expiry overrides

If certificate expiry during enrollment gets overridden due to the CA's own expiry,
log a warning message about the override.
#384

Dependencies

Fabric CA v1.5.8 has been tested with the following dependencies:

  • Go 1.21.5
  • Ubuntu 20.04 (for Docker images)
  • Databases
    • PostgreSQL 13
    • MySQL 8.0

Changes, Known Issues, and Workarounds

None.

Known Vulnerabilities

  • FABC-174 Commands can be manipulated to delete identities or affiliations

    This vulnerability can be resolved in one of two ways:

    1. Use HTTPS (TLS) so that the authorization header is not in clear text.

    2. The token generation/authentication mechanism was improved to optionally prevent
      token reuse. As of v1.4 a more secure token can be used by setting environment variable:

    FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false

    However, it cannot be set to false until all clients have
    been updated to generate the more secure token and tolerate
    FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false.
    The Fabric CA client has been updated in v1.4 to generate the more secure token.
    The Fabric SDKs will be updated by v2.0 timeframe to generate the more secure token,
    at which time the default for Fabric CA server will change to:
    FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false

Resolved Vulnerabilities

None.

v1.5.7

29 Aug 18:23
Compare
Choose a tag to compare

v1.5.7 Release Notes - August 29, 2023

Improvements

SignerConfig struct now exports the RevocationHandle

SignerConfig struct now exports the RevocationHandle.
The way the revocation handle is encoded has changed to align to what the Idemix library expects.
#363

Dependencies

Fabric CA v1.5.7 has been tested with the following dependencies:

  • Go 1.20.5
  • Ubuntu 20.04 (for Docker images)

Changes, Known Issues, and Workarounds

None.

Known Vulnerabilities

  • FABC-174 Commands can be manipulated to delete identities or affiliations

    This vulnerability can be resolved in one of two ways:

    1. Use HTTPS (TLS) so that the authorization header is not in clear text.

    2. The token generation/authentication mechanism was improved to optionally prevent
      token reuse. As of v1.4 a more secure token can be used by setting environment variable:

    FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false

    However, it cannot be set to false until all clients have
    been updated to generate the more secure token and tolerate
    FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false.
    The Fabric CA client has been updated in v1.4 to generate the more secure token.
    The Fabric SDKs will be updated by v2.0 timeframe to generate the more secure token,
    at which time the default for Fabric CA server will change to:
    FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false

Resolved Vulnerabilities

None.

v1.5.6

01 Apr 15:26
47a32f2
Compare
Choose a tag to compare

v1.5.6 Release Notes - March 31, 2023

v1.5.6 provides the following updates for Fabric CA:

  • Builds native arm64 CA binaries for linux and darwin
  • Builds multi-platform CA docker images for arm64 and amd64 with buildx
  • Builds CA docker images FROM ubuntu:20.04 (avoid SIGSEGV errors encountered with dynamic builds on musl/alpine libc)
  • Adds debug information for a mysterious idemix error message
  • Bumps Go version to 1.20.2

Dependencies

Fabric CA v1.5.6 has been tested with the following dependencies:

  • Go 1.20.2
  • Ubuntu 20.04 (for Docker images)

Changes, Known Issues, and Workarounds

None.

Known Vulnerabilities

  • FABC-174 Commands can be manipulated to delete identities or affiliations

    This vulnerability can be resolved in one of two ways:

    1. Use HTTPS (TLS) so that the authorization header is not in clear text.

    2. The token generation/authentication mechanism was improved to optionally prevent
      token reuse. As of v1.4 a more secure token can be used by setting environment variable:

    FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false

    However, it cannot be set to false until all clients have
    been updated to generate the more secure token and tolerate
    FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false.
    The Fabric CA client has been updated in v1.4 to generate the more secure token.
    The Fabric SDKs will be updated by v2.0 timeframe to generate the more secure token,
    at which time the default for Fabric CA server will change to:
    FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false

Resolved Vulnerabilities

None.

v1.5.6-beta3

04 Jan 17:57
Compare
Choose a tag to compare

v1.5.6-beta3 Release Notes - Jan 3, 2023

v1.5.6-beta3 is a beta release, providing updates for the following issues in the Fabric CA:

  • Builds native arm64 CA binaries for linux and darwin
  • Builds multi-platform CA docker images for arm64 and amd64 with buildx
  • Builds CA docker images FROM ubuntu:20.04 (avoid SIGSEGV errors encountered with dynamic builds on musl/alpine libc)
  • Adds debug information for a mysterious idemix error message
  • Bumps Go version to 1.18.9

Dependencies

Fabric CA v1.5.6 has been tested with the following dependencies:

  • Go 1.18.9
  • Ubuntu 20.04 (for Docker images)

Changes, Known Issues, and Workarounds

None.

Known Vulnerabilities

  • FABC-174 Commands can be manipulated to delete identities or affiliations

    This vulnerability can be resolved in one of two ways:

    1. Use HTTPS (TLS) so that the authorization header is not in clear text.

    2. The token generation/authentication mechanism was improved to optionally prevent
      token reuse. As of v1.4 a more secure token can be used by setting environment variable:

    FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false

    However, it cannot be set to false until all clients have
    been updated to generate the more secure token and tolerate
    FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false.
    The Fabric CA client has been updated in v1.4 to generate the more secure token.
    The Fabric SDKs will be updated by v2.0 timeframe to generate the more secure token,
    at which time the default for Fabric CA server will change to:
    FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false

Resolved Vulnerabilities

None.

v1.5.6-beta2

15 Dec 20:28
Compare
Choose a tag to compare

v1.5.6-beta2 Release Notes - Dec 15, 2022

v1.5.6-beta2 is a beta release, providing updates for the following issues in the Fabric CA:

  • Builds native arm64 CA binaries for linux and darwin
  • Builds multi-platform CA docker images for arm64 and amd64 with buildx
  • Adds debug information for a mysterious idemix error message

Dependencies

Fabric CA v1.5.6 has been tested with the following dependencies:

  • Go 1.18.8
  • Alpine 3.17 (for Docker images)

Changes, Known Issues, and Workarounds

None.

Known Vulnerabilities

  • FABC-174 Commands can be manipulated to delete identities or affiliations

    This vulnerability can be resolved in one of two ways:

    1. Use HTTPS (TLS) so that the authorization header is not in clear text.

    2. The token generation/authentication mechanism was improved to optionally prevent
      token reuse. As of v1.4 a more secure token can be used by setting environment variable:

    FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false

    However, it cannot be set to false until all clients have
    been updated to generate the more secure token and tolerate
    FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false.
    The Fabric CA client has been updated in v1.4 to generate the more secure token.
    The Fabric SDKs will be updated by v2.0 timeframe to generate the more secure token,
    at which time the default for Fabric CA server will change to:
    FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false

Resolved Vulnerabilities

None.

v1.5.6-beta

09 Dec 19:10
Compare
Choose a tag to compare

v1.5.6-beta Release Notes - Dec 9, 2022

v1.5.6-beta is a beta release, providing updates for the following issues in the Fabric CA:

  • Builds native arm64 CA binaries for linux and darwin
  • Builds multi-platform CA docker images for arm64 and amd64 with buildx

Dependencies

Fabric CA v1.5.6 has been tested with the following dependencies:

  • Go 1.18.8
  • Alpine 3.17 (for Docker images)

Changes, Known Issues, and Workarounds

None.

Known Vulnerabilities

  • FABC-174 Commands can be manipulated to delete identities or affiliations

    This vulnerability can be resolved in one of two ways:

    1. Use HTTPS (TLS) so that the authorization header is not in clear text.

    2. The token generation/authentication mechanism was improved to optionally prevent
      token reuse. As of v1.4 a more secure token can be used by setting environment variable:

    FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false

    However, it cannot be set to false until all clients have
    been updated to generate the more secure token and tolerate
    FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false.
    The Fabric CA client has been updated in v1.4 to generate the more secure token.
    The Fabric SDKs will be updated by v2.0 timeframe to generate the more secure token,
    at which time the default for Fabric CA server will change to:
    FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false

Resolved Vulnerabilities

None.

v1.5.5

08 Jul 09:53
9d2a312
Compare
Choose a tag to compare

v1.5.5 Release Notes - July 8, 2022

v1.5.5 is a maintenance release, providing updates for the following issues in the Fabric CA:

  • Closes Issue #305 : Issue with re-enrolling certificates

Dependencies

Fabric CA v1.5.5 has been tested with the following dependencies:

  • Go 1.18.2
  • Alpine 3.16 (for Docker images)

Changes, Known Issues, and Workarounds

None.

Known Vulnerabilities

  • FABC-174 Commands can be manipulated to delete identities or affiliations

    This vulnerability can be resolved in one of two ways:

    1. Use HTTPS (TLS) so that the authorization header is not in clear text.

    2. The token generation/authentication mechanism was improved to optionally prevent
      token reuse. As of v1.4 a more secure token can be used by setting environment variable:

    FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false

    However, it cannot be set to false until all clients have
    been updated to generate the more secure token and tolerate
    FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false.
    The Fabric CA client has been updated in v1.4 to generate the more secure token.
    The Fabric SDKs will be updated by v2.0 timeframe to generate the more secure token,
    at which time the default for Fabric CA server will change to:
    FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false

Resolved Vulnerabilities

None.

Changes:

  • 9d2a312 Release commit for v1.5.5
  • 1f16304 Revert "Idemix MSP Folder Structure incompatible with what Fabric expects #303"
  • 98dfc86 Revert "fixup! Idemix MSP Folder Structure incompatible with what Fabric expects #303"
  • f2fed4d Revert "create idemix user folder under root folder"
  • 65315b2 Revert "fixup! create idemix user folder under root folder"
  • fac0ce6 Revert "fixup! create idemix user folder under root folder"
  • 77c54da fixup! create idemix user folder under root folder
  • dfd29fe fixup! create idemix user folder under root folder
  • 0fcf897 create idemix user folder under root folder
  • 29e083e fixup! Idemix MSP Folder Structure incompatible with what Fabric expects #303
See More
  • acea746 Idemix MSP Folder Structure incompatible with what Fabric expects #303
  • 3be7a15 Correct handling of CA VerifyOptions (#306)

This list of changes was auto generated.

v1.5.4

17 Jun 16:48
Compare
Choose a tag to compare

v1.5.4 Release Notes - June 17, 2022

Release v1.5.4 updates Fabric CA to use https://github.com/IBM/idemix for the Identity Mixer implementation,
making it possible to issue credentials using various Identity Mixer curves.
The Identity Mixer curve can be configured in the Fabric CA server and client configuration yaml file:

# Specifies the Elliptic Curve used by Identity Mixer.
# It can be any of: {"amcl.Fp256bn", "gurvy.Bn254", "amcl.Fp256Miraclbn"}.
# If unspecified, it defaults to 'amcl.Fp256bn'.
curve: amcl.Fp256bn

Dependencies

Fabric CA v1.5.4 has been tested with the following dependencies:

  • Go 1.18.2
  • Alpine 3.16 (for Docker images)

Changes, Known Issues, and Workarounds

None.

Known Vulnerabilities

  • FABC-174 Commands can be manipulated to delete identities or affiliations

    This vulnerability can be resolved in one of two ways:

    1. Use HTTPS (TLS) so that the authorization header is not in clear text.

    2. The token generation/authentication mechanism was improved to optionally prevent
      token reuse. As of v1.4 a more secure token can be used by setting environment variable:

    FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false

    However, it cannot be set to false until all clients have
    been updated to generate the more secure token and tolerate
    FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false.
    The Fabric CA client has been updated in v1.4 to generate the more secure token.
    The Fabric SDKs will be updated by v2.0 timeframe to generate the more secure token,
    at which time the default for Fabric CA server will change to:
    FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false

Resolved Vulnerabilities

None.

Changes:

See More

This list of changes was auto generated.