Skip to content
This repository has been archived by the owner on Oct 20, 2024. It is now read-only.

Latest commit

 

History

History
431 lines (314 loc) · 17.2 KB

CHANGELOG.md

File metadata and controls

431 lines (314 loc) · 17.2 KB

Glewlwyd Changelog

2.7.7

  • Minor bugfixes and improvements
  • Build with flag -Wpedantic
  • Fix PKCE downgrade (Thanks Pieter Philippaerts)
  • Security: Fix open redirection issue (Thanks Pieter Philippaerts) (CVE-2024-25715)
  • Disable automatic build for legacy oauth2 plugin module, this module is now deprecated
  • Plugin OIDC: Forbid JWT requests with zipped payload

2.7.6

  • Minor bugfixes and improvements
  • Improve e-mail scheme security model by adding a mutex lock when generating codes, and adding a code prefix sent in the trigger method to mitigate stolen codes
  • Update cmake script for a cleaner build
  • Add config values user_backend_api_run_enabled, user_middleware_backend_api_run_enabled, client_backend_api_run_enabled, scheme_api_run_enabled to list authorized backend or schemes for a Glewlwyd instance
  • Add config value originating_ip_header to specify the header value containg the originating IP address, if any
  • Add config values response_body_limit and max_header to limit download sizes when relevant
  • Rework Docker files to build from source instead of downloading packages from github
  • cmake: split package build options in 3 (tar.gz, deb and rpm), and set all packages build to off by default
  • Security: Fix possible buffer overflow in webauthn attestation (CVE-2023-49208)

2.7.5

  • Build with flag -Wconversion

2.7.4

  • Minor bugfixes

2.7.3

This release contains a security fix in the library rhonabwy. If you allow encrypted tokens using RSA-OAEP algorithms, please upgrade your Glewlwyd version.

  • Enforce client public key verification on registration
  • Add config value login_api_enabled to enable/disable authentication APIs
  • Add config value plugin_api_run_enabled to list authorized plugins for a Glewlwyd instance
  • Minor bugfixes
  • cmake: remove DownloadProject feature, now dependencies must be previously installed

2.7.2

  • Improve security verification
  • Add config value response_allowed_compression to enable/disable API response compression
  • Breaking: Add config value admin_session_authentication to enable/disable admin API authentication methods, API key is disabled by default
  • Add config value profile_session_authentication to enable/disable user profile API authentication methods
  • Add config value allow_multiple_user_per_session to enable/disable multiple users per session

2.7.1

  • Allow to disable static files server
  • Allow to send an e-mail on password change or scheme registration
  • Add additional CORS related header configuration
  • Add config values cookie_same_site and max_post_size
  • Add additional-parameters to access tokens for client authorization
  • Improve resource parameter in OIDC plugin, remove resource change allowed option
  • If enc algorithms is restricted, show only allowed algorithms in discovery endpoint, and forbid to use these algorithms in client registration
  • Security: Fix deprecated glewlwyd_resource.c bug with token verification

2.7.0

The "Third dose Release"

  • Bugfixes
  • Fix delegation session
  • Add SMTP configuration template
  • Allow to send an e-mail to an account when a new connection occurs
  • Allow to fetch a geolocation API to improve the issued_for records
  • Fix oidc plugin bug: allow to add the username as claim in the access token
  • Improve OIDC DPoP implementation to Draft 07
  • Front-end: Remove polyfill build script
  • Fix Rich Authorization Requests and update its implementation to Draft 11
  • Allow Import/Export users/clients/modules/plugins in the UI
  • UI Improvements
  • Security: Fix directory traversal bug (CVE-2022-29967)

2.6.2

This is a security release, if you use the webauthn scheme, please upgrade your Glewlwyd version.

  • Security: Fix possible buffer overflow in webauthn assertion (CVE-2022-27240)

2.6.1

This is a security release, please upgrade your Glewlwyd version.

  • Fix bug in OTP registration
  • Fix several UI bugs
  • Improve user registration UI and OTP scheme registration
  • Add callback function plugin_user_revoke in plugins
  • Add config file option add_x_frame_option_header_deny to allow removing header X-Frame-Options: deny
  • Security: Fix escalation bug (CVE-2021-45379)

2.6.0

The "Green Zone Release"

2.5.4

  • Security: Fix possible buffer overflow in webauthn registration (CVE-2021-40818)
  • Update dependencies versions

2.5.3

  • Fix UI bugs
  • UI: Improve session expiration error
  • Update SQLite3 password management by increasing PBKDF2 iterations and allowing to set iterations value
  • IO: Add German translation, thanks to Andy2903
  • OIDC: Support more signature and encryption algorithms
  • Fix CORS bug
  • Implement OAuth 2.0 JWT Secured Authorization Request (JAR) Draft 32
  • Allow default properties on client registration
  • Allow access tokens use in clent registration to be used only once
  • Improve client and client grant management in the profile page

2.5.2

  • Fix annoying bug in scheme validation during login
  • Fix scheme verification bug
  • Fix docker image builder

2.5.1

  • Add identify action to authenticate via schemes oauth2 or certificate without giving the username
  • Fix change password issue in the admin interface
  • Add oidc config restrict-scope-client-property to restrict a client to certain scopes if needed
  • Allow to reconnect on session closed

2.5.0

The "Recontainment Release"

2.4.0

The "Second Wave Release"

  • Allow user to update its e-mail
  • Allow user to reset its credentials
  • Handle callback url for registration and reset credentials
  • Update certificate scheme management: remove online certiticate generation and add certificate validation via DN
  • Implement revoke tokens on code replay for oauth2 and oidc plugins
  • Show client_id and redirect_uri on grant scope
  • Remove parameters object on *_load() functions result
  • Scheme WebAuthn: disable fmt none by default
  • Allow to add granted scope list in id_token and /userinfo
  • Fix last login refresh without authentication bug
  • Add endpoint /mod/reload/ to reload modules lists
  • Add Event log messages
  • Add parameter Scheme Required to a scope scheme group
  • Add API key to use administration APIs via scripts without a cookie session

2.3.3

  • Limit scheme available output This is a security release, please upgrade your Glewlwyd version. To mitigate server configuration leaks, I recommend the following actions:

2.3.2

  • Allow to specify a public JWKS for OIDC plugin
  • Fix official docker image builder
  • Fix load module files on filesystems that don't fully support readdir(), closes #150
  • Fix Small UI bugs
  • Add manpage
  • Add documentation on reverse proxy with examples for Apache and Nginx

2.3.1

  • Upgrade Bootstrap to 4.5
  • Replace Font-Awesome 5 with Fork-Awesome
  • Fix Mock scheme in profile page

2.3.0

The "Saint-Jean-Baptiste Release"

2.2.0

The "Containment Release"

2.1.1

  • Add claims exp and nbf in access tokens (see #99)
  • Fix libjwt version required to help Debian Buster users

2.1.0

  • Add custom css files so users can safely adapt css to their own identity
  • Add packed format support in webauthn scheme
  • improve webauthn scheme
  • Fix i18n errors and typos
  • Add Dutch translation in UI
  • Add HTTP Basic Authentication Scheme
  • Add defaultScheme option in UI config for passwordless authentication
  • Add bind_address option in the config file
  • Add possibility for users to remove their own account
  • Add plugin Register to allow users to create new accounts
  • Add HTTP Basic Auth scheme
  • Multiple bugfixes and UI improvements
  • Many thanks to all helpers who send feedback and bugfixes! Keep running :-)

2.0.0

  • Fix UI bugs
  • Fix Microsoft Edge bug
  • Add possibility to build UI with Internet Explorer support
  • Fix GCC9 warnings
  • Add autocomplete="off" and autofocus properties in some input
  • Clean UI code a lot by adding most libraries in package.json instead of static files in webapp-src/js
  • Use vanilla qrcode-generator instead of jquery.qrcode because the last one embedded the first one, so it was overkill

2.0.0-rc2

  • Allow to emit certificates for certificate scheme
  • Bug fixes and improvements on certificate scheme
  • Fix UI bugs
  • Fix small backend bugs
  • Add docker image
  • Add Fail2ban script and config

2.0.0-rc1

  • Improve documentation
  • Improve OpenID Connect core plugin
  • Add OpenID Connect discovery
  • Add OpenID Connect core requests
  • Add OpenID Connect address claims
  • Add option max_age for session passwords
  • Change OpenID Connect access token payload format to match id_token format
  • Fix PostgreSQL database
  • TOTP: forbid to use the same code twice
  • Allow to use environment variables instead of or in addition to configuration file
  • Add scheme TLS certificate
  • Allow to use profile picture for users

2.0.0-b3

  • Add OpenID Connect core plugin
  • Fix lots of bugs and memory leaks
  • Add more tests
  • Change return type of all modules function *_init() to json_t * so the front-end will know about the error
  • Improve documentation
  • Can use environment variables as config parameters

2.0.0-b2

  • Fix sample config with correct variable names, fix #57
  • Fix webauthn bugs
  • Improve documentation
  • Fix build on supported platforms
  • Fix #59 and add action reset to modules
  • Make build and tests reproductive using Huddersfield

2.0.0-b1

  • Massive rework for the better good
  • Introduction of modules to handle different backend users, clients and authentication scheme
  • Backends:
    • Database (user and client)
    • LDAP (user and client)
    • HTTP (user only)
  • Schemes:
    • password
    • HOTP/TOTP
    • Code sent by e-mail
    • webauthn
  • Introduction of plugins to handle authentication workflows
    • Legacy OAuth2 workflow
  • User Interface revamped

1.4.9

  • Small bugfixes
  • Clean some memory leaks

1.4.8

  • Add Travis CI script
  • Fix http_auth backend

1.4.7

  • Adapt Glewlwyd build to the new version of the underlying libraries: Orcania, Yder, Hoel, Ulfius (thanks ythogtha!)
  • Improve doc about front-end pages, as mentioned in #46, and fix libjwt install doc

1.4.6

  • Fix client confidential bug in code authorization flow, thanks to Bisco

1.4.5

  • Add last glewlwyd_resource

1.4.4

  • Add current token scope list in the API /api/profile when authenticated with the OAuth2 token
  • Fix issue in client_check that made it not check properly if a client is authorized or not

1.4.3

  • LDAP search error more verbose
  • Fix LDAP search pagination

1.4.2

  • Add option auth_code_match_ip_address to prevent glewlwyd to check the match of the IP address that requested a code and the IP address that requested the refresh token
  • Fix bug with confidential clients that were not able to get refresh tokens
  • Fix bug that made Glewlwyd crash when try to add users and ldap auth was disabled

1.4.1

  • Update libraries dependency versions

1.4.0

  • Add LDAP config properties search_scope, scope_property_user_match and scope_property_client_match
  • Add Debian hardening patch on Makefile
  • Add journald log mode

1.3.3

  • Fix client_credentials bug
  • Move documentation to /docs

1.3.2

  • Add CMake install script

1.3.1

  • Make glewlwyd admin application URL more changeable
  • fix minor bugs and memory leaks

1.3.0

  • Add http_auth backend #29

1.2.4

  • Fix bug when scope doesn't exist and is requested

1.2.3

  • fix a bug on the case letters for the username in the tokens

1.2.2

  • Security improvement

1.2.1

  • Improve install procedure for database init

1.2.0

  • Add ECDSA signatures and now supports different signature size with the config parameter key_size. If none is specified in the config file, default key_size value is 512

1.1.2

  • Fix bug in update last_seen value for a refresh token

1.1.1

  • Update API prefix to new default value

1.1.0

  • Limit Ulfius functionalities with the one needed

1.0.1

  • Improve documentation on Ulfius usage

1.0.0

  • First stable release