Skip to content

Latest commit

 

History

History
312 lines (214 loc) · 12.8 KB

CHANGELOG.md

File metadata and controls

312 lines (214 loc) · 12.8 KB

Changelog

Unreleased

Features

  • fido-authenticator: Implement the largeBlobKey extension and the largeBlobs command (fido-authenticator#38)
  • piv: Fix crash when changing PUK (piv-authenticator#38)
  • OpenPGP: add support for additional curves when using the se050 backend: (#524)
    • NIST P-384
    • NIST P-521
    • brainpoolp256r1
    • brainpoolp384r1
    • brainpoolp512r1
  • admin-app: Add command to list all supported config fields (admin-app#28)
  • admin-app: Add opcard.disabled configuration option to disable OpenPGP (#539)
  • piv: Use SE050 and encrypt data on external flash (#534)
  • Improve external flash mounting to decrease startup time (#440)

v1.7.2 (2024-06-11)

Bugfixes

  • fido-authenticator: Fix incompatibility when enumerating resident keys with libfido2/ssh-agent (#496)
  • Ensure that an application reset erases all relevant objects on the secure element (trussed-se050-backend#30)

v1.7.1 (2024-05-03)

Bugfixes

v1.7.0 (2024-04-24)

This release adds SE050 support to opcard, updates fido-authenticator to support CTAP 2.1 and introduces app and device factory reset.

Features

  • Report errors when loading the configuration during initialization and disable opcard if an error occured (#394)
  • Fix LED during user presence check for NK3AM (#93)
  • fido-authenticator: Implement CTAP 2.1
  • OpenPGP: fix locking out after an aborted factory-reset operation (#443)
  • Add an SE050 driver and its tests (#335)
  • Use SE050 entropy to bootstrap the random number generator (#335)
  • Enable SE050 support in OpenPGP by default (#471)
  • Support app and device factory reset (#383, #479)

Notes

  • When upgrading from the test firmware release v1.6.0-test.20231218, OpenPGP keys will not be retained after the update if the opcard.use_se050_backend config option has been set to true.

v1.6.0 (2023-11-23)

Features

  • usbip: Add user presence check (#314, #321)
  • admin-app: Add config mechanism (#344)

Changed

Fixed

  • fido-authenticator: Reduce the maximum credential ID length for improved compatibility (fido-authenticator#37)
  • fido-authenticator: Multiple changes to improve compliance with the specification (overview: fido-authenticator#6)
  • Upgrade opcard to v1.2.0, fixing memory issues when using multiple RSA keys, potential data corruption, correct handling of non canonical curve25519 public keys and properly rejecting NFC requests (#376)
  • Correct maximum binary size for LPC55 and only enable PRINCE for the subregions used for the filesystem (#355)
  • lpc55: Move USB initialization to the end of the boot process to make sure that the device can respond to all requests, fixing a potential delay when connecting the device under Linux (#302)

v1.5.0 (2023-05-31)

Features

  • Upgrade the secrets function to version 0.11.0, adding support for static passwords, and KeepassXC integration (#278)

Changed

  • Upgrade the OpenPGP function to version 1.1.0, fixing minor specification compliance issues and an unlikely data corruption scenario

Fixed

  • Upgrade ctaphid-dispatch, fixing panics after cancelled operations

v1.4.0 (2023-05-05)

This release adds OpenPGP card support and updates the OTP functionality.

Features

  • usbip: Add --efs option to store the external filesystem in a file.
  • Add variant to the status reported by admin-app (#206)
  • fido-authenticator: Limit number of resident credentials to ten (#207)
  • Add opcard to the stable firmware (#100)

Changed

  • Update applications:
    • opcard v1.0.0
    • piv-authenticator v0.2.0
    • secrets-app v0.10.0

v1.3.1 (2023-04-05)

This release adds OTP functionality and contains some bugfixes.

Warning: On Nitrokey 3 Mini devices, this release causes a migration of the internal filesystem. See the Release Notes on GitHub for more information.

Features

  • Add secrets app (#186), implementing OTP functionality
  • Return full version in status command (#172)
  • Return storage information in status command (#183)
  • Reduce risk of data loss by adding journaling to the internal flash (#160)

Changed

  • LPC55: use the embedded runner (#97)

Bugfixes

  • Use upstream usbd-ccid, including fixed panics and compatibility issues (#164)
  • Improve compatibility of FIDO (#180)
  • Fix a panic with ctaphid (#184)

v1.3.0 (2023-03-27)

This release was skipped to fix a naming inconsistency.

v1.2.2 (2022-10-05)

This release contains additional internal tests. v1.2.1 was skipped due to an incorrectly determined bugfix.

Bugfixes

  • change fido-authenticator version from 0.1 to 0.1.1 (not needed, to be reverted) (#87)

Features

  • add proper Reboot::is_locked for nRF52 (#89)
  • add i2c/se050 test to LPC55 (panicks in provisioner mode) (#90)

v1.2.0 (2022-08-30)

This release contains various bugfixes and stability improvements.

Bugfixes

  • fido-authenticator: Return an error instead of panicking if the credential ID is too long (#49)
  • Implement CCID abort handling, fixing an issue where GnuPG would stall for up to a minute on the first operation if a Nitrokey 3 is connected and recognized as a CCID device (#22)
  • fido-authenticator: Fix handling of U2F commands over NFC (fido-authenticator#18)
  • interchange: Fix unsound usage of UnsafeCell (interchange#4)
  • Improve APDU handling (iso7816#4, iso7816#5, apdu-dispatch#5)
  • Update all dependencies

v1.1.0 (2022-08-02)

This release adds support for the NRF52 MCU, changes the LED color to red on panics and allows the user to skip the additional user presence check for the first FIDO2 operation within two seconds after boot.

Features

  • embedded runner to allow building for different SoCs from within a common code-base
  • This pre-release only includes binaries for the nRF52
  • All features from the v1.0.4 release are included
  • Change the LED color to red on panics (#52)
  • Skip the additional user presence check for the first Get Assertion or Authenticate request within two seconds after boot (#61)

v1.0.4 (2022-07-14)

This release improves compatibility with Windows 10 and with OpenSSH and changes the LED patterns.

Features

  • Change the LED patterns so that the LED is off by default, blinks white during a user confirmation request and blinks blue when winking (#34)
  • Add a single white LED blink for 0.5 seconds after startup (#34)
  • Support retrieval of OpenSSH resident keys (#48)

Bugfixes

  • Improve stability of FIDO2 operations on Windows 10 (#54)

v1.0.3 (2022-04-11)

This release fixes a FIDO authentication issue with Google.

Bugfixes

  • Correct the FIDO2 attestation certificate (fixes authentication issue with Google, #36)

v1.0.2 (2022-01-26)

This release improves compatibility with Windows systems.

Bugfixes

  • usbd-ctaphid: fix ctaphid keepalive messages - fixes "busy" issue under Windows (#21)

v1.0.1 (2022-01-15)

This release fixes some issues with the FIDO authenticator and the admin application.

Features

  • Change LED color and device name if provisioner app is enabled.

Bugfixes

  • fido-authenticator: use smaller CredentialID - fixes issues with some services FIDO usage (fido-authenticator#8)
  • trussed: update P256 library - fixes signing failure in some cases (#31)
  • admin-app: Fix CTAPHID command dispatch (#8).
  • admin-app: Fix CTAPHID wink command (#9).
  • fido-authenticator: Handle pin protocol field in hmac-secret extension data to fix the authenticatorGetAssertion command for newer clients (#14, fido-authenticator#1).
  • fido-authenticator: Signal credential protetection (fido-authenticator#5).

v1.0.0 (2021-10-16)

First stable firmware release with FIDO authenticator.