Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Tags: cophey/fabric-ca

Tags

v1.4.0

Toggle v1.4.0's commit message
v1.4.0 Release Notes - January 9th, 2019

----------------------------------------

What's New in Hyperledger Fabric CA v1.4
----------------------------------------

No new features in Fabric CA v1.4. v1.4 is a maintenance release only,
with bug fixes, dependency updates, test improvements.

Changes, Known Issues, and Workarounds
--------------------------------------

None.

Known Vulnerabilities
---------------------
FABC-174 Commands can be manipulated to delete identities or affiliations

This vulnerability can be resolved in one of two ways:

1) Use HTTPS (TLS) so that the authorization header is not in clear text.

2) The token generation/authentication mechanism was improved to optionally prevent
token reuse. In v1.4 a more secure token can be used by setting environment variable:

FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false

However, it cannot be set to false until all clients have
been updated to generate the more secure token and tolerate
FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false.
The Fabric CA client has been updated in v1.4 to generate the more secure token.
The Fabric SDKs will be updated by v2.0 timeframe to generate the more secure token,
at which time the default for Fabric CA server will change to:
FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false

Resolved Vulnerabilities
------------------------
None.

Other improvements and fixes
----------------------------
Updated to Go version 1.11.1
Updated baseimage version to 0.4.14

For the full list of improvements and fixes, refer to the release change log:
https://github.com/hyperledger/fabric-ca/blob/release-1.4/CHANGELOG.md#v140

v1.4.0-rc2

Toggle v1.4.0-rc2's commit message
v1.4.0-rc2 Release Notes - December 20, 2018

--------------------------------------------

What's New in Hyperledger Fabric CA v1.4
----------------------------------------

No new features in Fabric CA v1.4. v1.4 is a maintenance release only,
with bug fixes, dependency updates, test improvements.

Changes, Known Issues, and Workarounds
--------------------------------------

None.

Known Vulnerabilities
---------------------
FABC-174 Commands can be manipulated to delete identities or affiliations

This vulnerability can be resolved in one of two ways:

1) Use HTTPS (TLS) so that the authorization header is not in clear text.

2) The token generation/authentication mechanism was improved to optionally prevent
token reuse. In v1.4 a more secure token can be used by setting environment variable:

FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false

However, it cannot be set to false until all clients have
been updated to generate the more secure token and tolerate
FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false.
The Fabric CA client has been updated in v1.4 to generate the more secure token.
The Fabric SDKs will be updated by v2.0 timeframe to generate the more secure token,
at which time the default for Fabric CA server will change to:
FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false

Resolved Vulnerabilities
------------------------
None.

Other improvements and fixes
----------------------------
Updated to Go version 1.11.1
Updated baseimage version to 0.4.14

For the full list of improvements and fixes, refer to the release change log:
https://github.com/hyperledger/fabric-ca/blob/master/CHANGELOG.md#v140-rc2

v1.4.0-rc1

Toggle v1.4.0-rc1's commit message
v1.4.0-rc1 Release Notes - December 10, 2018

--------------------------------------------

What's New in Hyperledger Fabric CA v1.4
----------------------------------------

No new features in Fabric CA v1.4. v1.4 is a maintenance release only,
with bug fixes, dependency updates, test improvements.

Changes, Known Issues, and Workarounds
--------------------------------------

None.

Known Vulnerabilities
---------------------
FABC-174 Commands can be manipulated to delete identities or affiliations

This vulnerability can be resolved in one of two ways:

1) Use HTTPS (TLS) so that the authorization header is not in clear text.

2) The token generation/authentication mechanism was improved to optionally prevent
token reuse. In v1.4 a more secure token can be used by setting environment variable:

FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false

However, it cannot be set to false until all clients have
been updated to generate the more secure token and tolerate
FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false.
The Fabric CA client has been updated in v1.4 to generate the more secure token.
The Fabric SDKs will be updated by v2.0 timeframe to generate the more secure token,
at which time the default for Fabric CA server will change to:
FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false

Resolved Vulnerabilities
------------------------
None.

Other improvements and fixes
----------------------------
Updated to Go version 1.11.1
Updated baseimage version to 0.4.14

For the full list of improvements and fixes, refer to the release change log:
https://github.com/hyperledger/fabric-ca/blob/master/CHANGELOG.md#v140-rc1

v1.3.0

Toggle v1.3.0's commit message
v1.3.0 Release Notes - October 10, 2018

---------------------------------------

What's New in Hyperledger Fabric CA v1.3
----------------------------------------

The following features/epics are included in this release:

FABC-592 - Identity Mixer for anonymous transactions
Fabric-CA can now issue Identity Mixer credentials to enable anonymous and
unlinkable client identities through the use of zero-knowledge proofs.

Changes, Known Issues, and Workarounds
--------------------------------------
None.

Known Vulnerabilities
---------------------
None.

Resolved Vulnerabilities
------------------------
None.

Other improvements and fixes
----------------------------
Updated to Go version 1.10.4
Updated baseimage version to 0.4.13

For the full list of improvements and fixes, refer to the release change log:
https://github.com/hyperledger/fabric-ca/blob/master/CHANGELOG.md#v130

v1.2.1

Toggle v1.2.1's commit message
v1.2.1 September 27, 2018

-------------------

Release Notes
-------------

Update vendored version of BCCSP package.

Known Vulnerabilities
---------------------
none

Resolved Vulnerabilities
------------------------
none

Known Issues & Workarounds
--------------------------
none

Change Log
----------
https://github.com/hyperledger/fabric-ca/blob/release-1.2/CHANGELOG.md#v121

v1.3.0-rc1

Toggle v1.3.0-rc1's commit message
v1.3.0-rc1 Release Notes - September 24, 2018

---------------------------------------------

What's New in Hyperledger Fabric CA v1.3
----------------------------------------

The following features/epics are included in this release:

FABC-592 - Identity Mixer for anonymous transactions
Fabric-CA can now issue Identity Mixer credentials to enable anonymous and
unlinkable client identities through the use of zero-knowledge proofs.

Changes, Known Issues, and Workarounds
--------------------------------------
None.

Known Vulnerabilities
---------------------
None.

Resolved Vulnerabilities
------------------------
None.

Other improvements and fixes
----------------------------
Updated to Go version 1.10.4
Updated baseimage version to 0.4.12

For the full list of improvements and fixes, refer to the release change log:
https://github.com/hyperledger/fabric-ca/blob/master/CHANGELOG.md#v130-rc1

v1.2.0

Toggle v1.2.0's commit message
v1.2.0 July 3, 2018

-------------------

Release Notes
-------------

Added support for listing certificates based on various filter criteria.

Bug fixes, documentation and test coverage improvements, UX improvements
based on user feedback and changes to address a variety of static scan
findings (unused code, static security scanning, spelling, linting and more).

Updated to Go version 1.10
Updated baseimage version to 0.4.10

Known Vulnerabilities
---------------------

[FAB-9938] many commands can be manipulated to delete identities or affiliations
This vulnerability has a low severity because to exploit it, one would need to
access the authorization header of the requests. Using HTTPS (TLS) eliminates this
potential. We will be re-evaluating the authorization approach for the v1.3
release.

Resolved Vulnerabilities
------------------------
https://jira.hyperledger.org/browse/FAB-7534

Known Issues & Workarounds
--------------------------
none

Change Log
----------
https://github.com/hyperledger/fabric-ca/blob/master/CHANGELOG.md#v120

v1.2.0-rc1

Toggle v1.2.0-rc1's commit message
v1.2.0-rc1 June 22, 2018

------------------------

Release Notes
-------------

Added support for listing certificates based on various filter criteria.

Bug fixes, documentation and test coverage improvements, UX improvements
based on user feedback and changes to address a variety of static scan
findings (unused code, static security scanning, spelling, linting and more).

Updated to Go version 1.10
Updated baseimage version to 0.4.8

Known Vulnerabilities
---------------------

[FAB-9938] many commands can be manipulated to delete identities or affiliations
This vulnerability has a low severity because to exploit it, one would need to
access the authorization header of the requests. Using HTTPS (TLS) eliminates this
potential. We will be re-evaluating the authorization approach for the v1.3
release.

Resolved Vulnerabilities
------------------------
https://jira.hyperledger.org/browse/FAB-7534

Known Issues & Workarounds
--------------------------
none

Change Log
----------
https://github.com/hyperledger/fabric-ca/blob/master/CHANGELOG.md#v120-rc1

v1.1.0

Toggle v1.1.0's commit message
v1.1.0 March 15, 2018

---------------------

Release Notes
-------------

Added support for CRLs and attribute based access control.

Added support for dynamic configurtion of the fabric-ca-server without requiring restart.

Added capability to dynamically modify affiliations.

Bug fixes, documentation and test coverage improvements, UX improvements
based on user feedback and changes to address a variety of static scan
findings (unused code, static security scanning, spelling, linting and more).

Updated to Go version 1.9.2
Updated baseimage version to 0.4.6

Known Vulnerabilities
---------------------
none

Resolved Vulnerabilities
------------------------
https://jira.hyperledger.org/browse/FAB-5794
https://jira.hyperledger.org/browse/FAB-6871
https://jira.hyperledger.org/browse/FAB-7348
https://jira.hyperledger.org/browse/FAB-7465
https://jira.hyperledger.org/browse/FAB-7646

Known Issues & Workarounds
--------------------------
none

Change Log
----------
https://github.com/hyperledger/fabric-ca/blob/master/CHANGELOG.md#v110

v1.1.0-rc1

Toggle v1.1.0-rc1's commit message
v1.1.0-rc1 March 1, 2018

-----------------------------

Release Notes
-------------

Added capability to dynamically modify affiliations.

Bug fixes, documentation and test coverage improvements, UX improvements
based on user feedback and changes to address a variety of static scan
findings (unused code, static security scanning, spelling, linting and more).

Updated to Go version 1.9.2
Updated baseimage version to 0.4.6

Known Vulnerabilities
---------------------
none

Resolved Vulnerabilities
------------------------
none

Known Issues & Workarounds
--------------------------
none

Change Log
----------
https://github.com/hyperledger/fabric-ca/blob/master/CHANGELOG.md#v110-rc1