Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Towards new release 0.21.0 #2061

Closed
Jakuje opened this issue Jun 15, 2020 · 38 comments
Closed

Towards new release 0.21.0 #2061

Jakuje opened this issue Jun 15, 2020 · 38 comments

Comments

@Jakuje
Copy link
Member

Jakuje commented Jun 15, 2020

There have been talks about new release for quite some time as there have been many quite important fixes in master since 0.20.0.

I would like to kick off some testing and summarizing of changelog to get a new version out of door soon. Feel free to edit the following draft, add what I missed or propose missing issues/PRs. Let me know if there is something else where I can help towards the next release.


General Improvements

PKCS #11

MacOS

pkcs11-tool

  • Make SHA256 default for OAEP encryption

opensc-explorer

OpenPGP

CardOS

ePass2003

IDPrime

eDo

MCRD

TCOS

IAS-ECC (#2070):

  • Fixed support for Idemia Cosmo cards with AWP middleware interoperability (previously broken).
  • Added support for Idemia Cosmo v8 cards.
  • PIN padding settings are now used from PKCS Fix #15 info when available.
  • Added PIN-pad support for PIN unblock.
@Jakuje Jakuje added this to To do in Release 0.21.0 Jun 15, 2020
@frankmorgner
Copy link
Member

Thanks for the initial work! Unfortunately, we are still having #1999 and #1934 which are blocking us from a new release...

@Jakuje
Copy link
Member Author

Jakuje commented Jun 22, 2020

I would like to see the first one fixed, but we did not hear from anyone able to reproduce the issue for months. I saw some crashes with Firefox myself (with 0.20.0), but I never got any usable backtrace. Since 0.20.0 there were several fixes. Since I switched to locally built opensc master, I never saw the crash regardless what I did.

For OSX installation process, I do not think I can help much with the OSX issue.

@dengert
Copy link
Member

dengert commented Jun 22, 2020

With #1999 the fear I have is someone else will build and release a modified version of OpenSC as it appears @open-eid has done, and Firefox will block all versions of OpenSC "onepin-opensc-pkcs11.dll" because the modified version fails.

Could we in addition to distributing a "onepin-opensc-pkcs11.dll" can we distribute
a "official-onepin-opensc-pkcs11.dll" which is not built by default, but only built for our "official" Windows distribution. There would be a warning in the source to not build or distribute this DLL as it name reserved for OpenSC distribution only. (It would be the same as the "onepin-opensc-pkcs11.dll" in except for the name.)

GNU LESSER GENERAL PUBLIC LICENSE Version 2.1, February 1999, says:
"Also, if the library is
modified by someone else and passed on, the recipients should know
that what they have is not the original version, so that the original
author's reputation will not be affected by problems that might be
introduced by others."

We need to protect our "original author's reputation".

@metsma
Copy link
Contributor

metsma commented Jun 23, 2020

We distributed official opensc binary and codesigned. And when we change something then we alter version numbers to identify binaries from official release.

@frankmorgner
Copy link
Member

I absolutely believe in your true intents, no need for finger pointing. Did you try to investigate the problem with your users? Unfortunately, we didn't get any revealing information in #1999 or #2032...

@metsma
Copy link
Contributor

metsma commented Jun 25, 2020

We did some testing with #2032 and will release to wider audience.
Let's see any crash reports will appear to Firefox Bugzilla.
They should be with version 0.20.1.4 dll-s.

@Wandtket
Copy link

Could you provide ARM/ARM64 builds for Windows in your release downloads? The 32bit emulation on Windows 10 ARM isn't quite up to par yet.

@frankmorgner
Copy link
Member

@wandtke if you manage to integrate this into the CI/build scripts and volunteer for testing, then we're good to go. Otherwise, I don't think I'll have the time to look at this right now.

@frankmorgner
Copy link
Member

@Jakuje, could you have a look at https://oss-fuzz.com/testcase-detail/6578720056541184 ?

@Wandtket
Copy link

@frankmorgner I was attempting to compile it myself following the instructions from the wiki using nmake, however, it kept giving me fatal errors. I would be happy to test it though.

@Jakuje
Copy link
Member Author

Jakuje commented Jul 30, 2020

@Jakuje, could you have a look at https://oss-fuzz.com/testcase-detail/6578720056541184 ?

This should be handled by #2086 -- I would like to go through the rest of them next week, if containers will work for me.

@jmastr
Copy link

jmastr commented Aug 21, 2020

Could you create a release candidate? We want to roll out an update internally and need an official build for doing that.

@aussetg
Copy link

aussetg commented Aug 22, 2020

Hope it will be in time for Fedora 33 :)

@frankmorgner
Copy link
Member

We'll release a RC in the next few days.

Unfortunately, we did not yet find a solution for (automatically) generating a suitable installer for macOS, so this will not be available for now.

@jmastr
Copy link

jmastr commented Sep 23, 2020

@frankmorgner What is the problem? Is there a ticket? Can I help?

@frankmorgner
Copy link
Member

I don't have (and want to get) a paid developer account from apple for signing packages and allowing the notification of the app. Preferably, I'd like to integrate signing credentials from someone (else) associated with the project into CI to automate this task...

@jmastr
Copy link

jmastr commented Sep 24, 2020

Screenshot 2020-09-24 at 09 58 05

Which one do you need and what is your PGP key ID?

@frankmorgner
Copy link
Member

Hi @jmastr , thanks for your help, please contact me via [email protected], thanks

@Jakuje Jakuje mentioned this issue Sep 25, 2020
5 tasks
@frankmorgner
Copy link
Member

The release candidate is available here: https://github.com/OpenSC/OpenSC/releases/tag/0.21.0-rc1

@dengert
Copy link
Member

dengert commented Oct 14, 2020

@frankmorgner, Tested several PIV devices against Master (2 commits ahead of 0.21.0-rc1) with pkcs11-tool.
all worked as expected.

Are you going to add a Test Results for 0.21.0-rc-1 to https://github.com/OpenSC/OpenSC/wiki/Smart-Card-Release-Testing ?

If you do can you add PIV full_moon for PKCS11 and

| PIV-II | NIST PIV Demo cards, |
| | IDEMIA Id-One PIV 2.4.1 (No SM, i.e. backward compatibility) |
| | YubiKey 4, Yubikey 5 NFC (USB and NFC) |

PivApplet (JCardSim) is tested via travis-c so it could be added too.

@frankmorgner

This comment has been minimized.

@misterzed88
Copy link

I did a quick test of IAS-ECC with Cosmo v8 cards on Linux, and it seems to be working fine.

But I miss the following from the change list.

IAS-ECC:

  • Fixed support for Idemia Cosmo cards with AWP middleware interoperability (previously broken).
  • Added support for Idemia Cosmo v8 cards.
  • PIN padding settings are now used from PKCS Fix #15 info when available.
  • Added PIN-pad support for PIN unblock.

@Jakuje
Copy link
Member Author

Jakuje commented Oct 19, 2020

I did a quick test of IAS-ECC with Cosmo v8 cards on Linux, and it seems to be working fine.

But I miss the following from the change list.

Thanks. Added to the description. If you would happen to have at least pull request IDs so we can link them from the release notes, it would be great.

@misterzed88
Copy link

Thanks. Added to the description. If you would happen to have at least pull request IDs so we can link them from the release notes, it would be great.

The main pull request for the listed changes was #2070. If you want to link to it, I assume its should be linked directly from the IAS-ECC header (above the list bullets).

The IAS-ECC changes also required supporting changes in other code, in the following pull requests. I'm not sure where- or if these need to be mentioned:
#2072, #2075, #2076, #2080

@Jakuje
Copy link
Member Author

Jakuje commented Oct 23, 2020

Tested my bunch of cards on Linux:

  • CAC Alt token (HID)
  • IDPrime with os version 1: Error in C_GenerateRandom from pkcs11-tool --test, otherwise good
  • coolkey applet on 534e SafeNet Java card
  • PIV test card 16
  • CAC card with PIV endpoint
  • CAC card using cac1 driver
  • CardOS 5.3

I ran just the tests using pkcs11-tool and p11test, nothing more fancy. I will update the wiki soon. From my side, we are fine.

@jmastr
Copy link

jmastr commented Oct 23, 2020

What about the MacOS package? @frankmorgner Anything else you need from me there?

@frankmorgner
Copy link
Member

@henning-schild
Copy link

The current "master" branch contains several useful fixes, some distros already start backporting.

Nobody cares which number you give it "release early, release often". The more we pile up the more issues we cause downstream and do not get reports about it ... One can not fix all known issues with the next release ...

@Silvanoc
Copy link

Next Debian Stable release is approaching and it would be nice to have 0.21.0 ready on time to get it integrated. What is blocking the release?

@frankmorgner
Copy link
Member

Counter question: Has someone tested RC2?

@Silvanoc
Copy link

Silvanoc commented Nov 19, 2020

I understand that what is blocking the release is feedback, right? I didn't know, therefore I hadn't test it until now.

Now I have tested it. I can confirm that the test pkcs11-tool --login --test runs successfully.

Set-up:

  • Debian Testing
  • OpenSC 0.21.0-rc2 (compiled from GIT tag: 0.21.0-rc2)
  • CardOS 5.3

Should I run some other tests?

@popovec
Copy link
Member

popovec commented Nov 19, 2020

Hi, I just tested:

  • Debian stable
  • OpenSC 0.21.0-rc2 (compiled from GIT tag: 0.21.0-rc2)
  • MyEID 4.0.1

pkcs11-tool --login --test runs successfully

ECDSA (NIST256 curve)

  • pkcs15-crypt OK
  • pkcs11-tool OK

OsEID card - lot of tests with pkcs11-tool, pkcs15-init, pkcs15-tool, pkcs15-crypt.. tested:

  • card init/erase OK
  • RSA: key generate, key upload, sign/decrypt OK
  • pkcs11-tool --login --test OK
  • ECC: key generate, key upload, ECDSA, ECDH OK

@jmue
Copy link

jmue commented Nov 19, 2020

I tested:

  • Windows 10 1909
  • OpenSC-0.21.0-rc2_win64.msi
  • CardOS 5.3

pkcs11-tool --login --test runs successfully as well

@jmue
Copy link

jmue commented Nov 20, 2020

I also tested:

  • Ubuntu 20.04 LTS & Debian 11 (Testing)
  • OpenSC 0.21.0-rc2 (builded .deb from GIT tag: 0.21.0-rc2)
  • CardOS 5.3

pkcs11-tool --login --test runs successfully as well
login on corporate site (chrome) succeeded

@Silvanoc
Copy link

Thanks @frankmorgner for the release! 🎉

@Silvanoc
Copy link

Now let's trigger the integration on the different distros! I've taken care of Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=975651

Release 0.21.0 automation moved this from To do to Done Nov 26, 2020
@henning-schild
Copy link

Gentoo already has a security issue for that, maybe no need to create a bump request ...

https://bugs.gentoo.org/746821

@Silvanoc
Copy link

Silvanoc commented Dec 7, 2020

Debian packaging for unstable (sid) already available!

Now it means it got into the Debian promotion process, getting into "testing" (Bullseye) the upcoming days if certain requirements are fulfilled and with high probability getting into the candidate list for the upcoming "stable" release (Bullseye will get promoted from testing into stable).

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
No open projects
Development

No branches or pull requests