Skip to content

Latest commit

 

History

History
545 lines (430 loc) · 28.5 KB

CHANGELOG.md

File metadata and controls

545 lines (430 loc) · 28.5 KB

Changelog

All notable changes to this project will be documented in this file.

The format is based on Keep a Changelog, and this project adheres to Semantic Versioning.

Unreleased

0.15.2 - 2024-03-19

Security

  • Update go toolchain to 1.22.1
  • Update github.com/jackc/pgx/v5 dependency from 5.4.3 to 5.5.4

Internal

  • Fix sqlserver tests in GitHub Actions workflow

0.15.1 - 2023-12-18

Fixed

  • RemoveScheme function in irmaclient already stripping storage before checking whether the scheme is in assets

Security

  • Update go toolchain to 1.21.5

0.15.0 - 2023-12-11

Added

  • Support for Redis in Sentinel mode
  • Redis support for irma keyshare server and irma keyshare myirmaserver
  • /health endpoint for irma server, irma keyshare server and irma keyshare myirmaserver
  • RemoveRequestorScheme function in irmaclient to remove a requestor scheme from the irma_configuration directory

Changed

  • Using optimistic locking in the irma server instead of pessimistic locking
  • storage-fallback-key-file option of irma keyshare server being replaced by storage-fallback-keys-dir option

Fixed

  • HTTP cookies not stored in irmaclient when received from a Set-Cookie header
  • Invalid hostname specified in MX record bypasses e-mail address revalidation
  • Background revocation tasks not stopped when closing an irmaclient
  • RemoveScheme function in irmaclient not deleting issuer schemes without a keyshare server (#260)

Internal

  • Fixed issue with expired irma-demo.MijnOverheid key in testdata
  • Always use testdata of current branch for integration-test jobs in GitHub Actions workflow

0.14.2 - 2023-10-25

Fixed

  • IRMA session gets stuck in communicating status when user is requested to confirm PIN in irmaclient

0.14.1 - 2023-10-18

Fixed

  • Improve stability of database drivers by bumping their versions

Security

  • Use Go toolchain version 1.21.3 for building irma CLI tool

Internal

  • Fixed failing tests due to expired test.test2 idemix key

0.14.0 - 2023-10-02

Note for users of the irmaclient package (e.g. maintainers of the Yivi app): the KeyshareVerifyPin function requires the renewal endpoint for the keyshare attribute to be present. Therefore, this version should first be deployed on keyshare servers before the client side can be upgraded.

Added

  • Option skipExpiryCheck in disclosure requests to allow disclosure of expired credentials (e.g. "skipExpiryCheck": ["irma-demo.sidn-pbdf.email"])
  • Option host in session request to overrule host name in IRMA QR if permission has been granted (see below)
    {
      "@context": "https://irma.app/ld/request/disclosure/v2",
      "host": "irma.example.com",
      "disclose": ...
    }
    
    This leads to the following session package:
    {
      "token":"KzxuWKwL5KGLKr4uerws",
      "sessionPtr": {"u":"https://irma.example.com/irma/session/ysDohpoySavbHAUDjmpz","irmaqr":"disclosing"},
      "frontendRequest": {
        "authorization":"qGrMmL8UZwZ88Sq8gobV",
        "minProtocolVersion": "1.0",
        "maxProtocolVersion": "1.1"
      }
    }
    
  • Permission option host_perms in the requestor configuration to specify which values a requestor may use for the host option in session requests
    {
      "requestors": {
          "myapp": {
              "disclose_perms": [ "irma-demo.MijnOverheid.ageLower.over18" ],
              "sign_perms": [ "irma-demo.MijnOverheid.ageLower.*" ],
              "issue_perms": [ "irma-demo.MijnOverheid.ageLower" ],
              "host_perms": ["*.example.com"]
              "auth_method": "token",
              "key": "eGE2PSomOT84amVVdTU"
          }
      }
    }
    
  • Renewal endpoint for keyshare attribute in the keyshare server (/users/renewKeyshareAttribute)
  • Keyshare server /api/v2/prove/... endpoints for the new keyshare protocol

Changed

  • KeyshareVerifyPin function in irmaclient ensures the keyshare attribute is valid
  • Sending the account expiry email is done when user has only valid e-mail addresses
  • Strip unnecessary details from database errors

Fixed

  • User account expiry continues when one or more e-mail addresses are marked for revalidation

0.13.3 - 2023-09-06

Fixed

  • Auto-update mechanism of IRMA configuration not working in ghcr.io/privacybydesign/irma Docker container
  • Panics occur when the timestamp file does not exist in a scheme directory

0.13.2 - 2023-08-22

Changed

  • Remove mail header 'Content-Transfer-Encoding: binary' The header gets converted to 'Content-Transfer-Encoding: quoted-printable' causing 'arc=fail (body hash mismatch)' with gmail

0.13.1 - 2023-08-16

Fixed

  • Invalid amount of arguments in query scan when e-mail revalidation is disabled

0.13.0 - 2023-08-10

Added

  • E-mail address revalidation, addressing issues where user's e-mail addresses can be (temporary) invalid
  • Publish the Docker image of the irma CLI tool on ghcr.io/privacybydesign/irma
  • Support for revocation db type sqlserver (Microsoft SQL Server)

Changed

  • Use separate application user in Dockerfile for entrypoint
  • Rename RevocationStorage's UpdateLatest function to LatestUpdates. This name better fits its behaviour. The functionality stays the same.
  • Validate revocation witness before revocation update is applied
  • RevocationStorage's EnableRevocation function does not return an error anymore if it has been enabled already
  • Use a Docker image created from scratch as base for the Dockerfile
  • Custom WrapErrorPrefix function that respects the error's type
  • Log info message of irma.SessionError errors

As part of e-mail address revalidation:

  • VerifyMXRecord incorporates a check to see if there is an active network connection
  • MyIrma server: /user returns an additional field revalidate_in_progress in the JSON response body, indicating whether the e-mail address is being revalidated or not
  • MyIrma server: /user/delete and /email/remove return a 500 status code and REVALIDATE_EMAIL error type if one or more e-mail addresses of the user are invalid

Note: Enabling e-mail address revalidation requires a change in the database schema. In order to do this please add the revalidate_on column of type bigint to the irma.emails table. See the schema file. Otherwise e-mail address revalidation is disabled and there will not be a breaking change.

Fixed

  • Race conditions in database logic of revocation storage
  • irma scheme verify not detecting missing files in index
  • Scheme verification/signing does not reject credentials with invalid revocation settings
  • Write transactions within memory implementation of revocation storage may lead to unintended changes

Removed

  • Superfluous openssl package in Dockerfile

Security

  • Let IRMA servers by default reject IRMA/Yivi apps that don't support pairing codes (IRMA protocol version <= 2.7)

Note: This is an important security update for issuers to make sure that pairing codes cannot be circumvented. IRMA apps that don't support pairing codes should not be in circulation anymore, so this change won't affect users. Yivi apps have always supported pairing codes.

Internal

  • Linter switch from golint to staticcheck
  • Use Postgres 15 for unit and component tests

0.12.6 - 2023-05-31

Fixed

  • Legacy endpoints of keyshare server return 403 status codes when database is down

0.12.5 - 2023-05-25

Changed

  • Print warning in logs if log verbosity is set to trace

Fixed

  • LogoPath is incorrect after a requestor scheme update
  • Parallel sessions may fail when one of the sessions requires pairing

0.12.4 - 2023-05-16

Fixed

  • Revocation related log messages occur twice or have wrong severity in irmaclient

0.12.3 - 2023-05-12

Changed

  • Move checks for missing schemes from scheme parsing to storage parsing
  • Ignore directories in irma_configuration directory that don't contain a scheme

Fixed

  • Stability issues in transport logic
  • Server and client timeouts are out-of-sync
  • Keyshare server returns 403 status codes when database is down
  • Handling invalid email or login tokens gives different status codes in different contexts
  • CopyDirectory function may fail when relative paths are used

Security

  • Improve randomness of session tokens and pairing codes

Internal

  • Change contact e-mail address in README to Yivi
  • Phase out deprecated io/ioutil library

0.12.2 - 2023-03-22

Fixed

  • Keyshare token cached by irmaclient becomes invalid when PIN is changed

0.12.1 - 2023-02-28

Fixed

  • Disable CGO bindings for release artifacts to natively support Alpine

0.12.0 - 2023-02-28

Added

  • Separate timeout constraints for the amount of time a client has to complete a session (MaxSessionLifetime) and a requestor has to retrieve the session result from the server (SessionResultLifetime)
  • In keyshareserver, EmailTokenValidity allows configuring how long an e-mail address validation token is valid

Changed

  • The maximum time a client has to complete a session is increased in MaxSessionLifetime to 15 minutes by default
  • myirmaserver returns a more appropriate 403 Invalid token error response during e-mail address verification at /verify when the provided token is expired and therefore not found in the database.

Security

  • Update dependency golang.org/x/net to v0.7.0, addressing CVE-2022-27664
  • Update dependency golang.org/x/text/language to v0.7.0, addressing CVE-2022-32149

0.11.2 - 2023-02-13

Fixed

  • ParseFolder cannot handle legacy oldscheme and tempscheme directories

0.11.1 - 2023-01-19

Added

  • Missing support for keyshare server endpoint versioning

Removed

  • Superfluous endpoint versioning in HTTP response headers of keyshare server

Fixed

  • Race condition in revocation gocron instance due to jobs that start too soon
  • Deal with leftover temp dirs in scheme folder if updating is aborted
  • Scheme index updates within UpdateSchemes should be written to disk atomically
  • InstallScheme does not undo its changes when an error occurs
  • Test: race condition in StartBadHttpServer handler

0.11.0 - 2022-11-10

Added

  • Storage encryption functionality in irmaclient
  • Challenge response user authentication using ECDSA key pair between irma keyshare server and irmaclient
  • Support for multiple keyshare servers in irmaclient to improve testability
  • Extra configuration options for postgres database connections in irma keyshare server and irma keyshare myirmaserver
  • Rate limiting on sending emails to the same email address in a short time period by irma keyshare server and irma keyshare myirmaserver
  • Middleware to catch panics in HTTP handlers and return a 500 error instead
  • Performance test scripts for irma keyshare server
  • MyIRMA webclient service in docker-compose.yml to improve development setup
  • CI status check for i386 architecture
  • CodeQL static code analysis
  • Contact details for support, discussion and responsible disclosure
  • VSCode launch configuration

Changed

  • BREAKING: irmaclient requires minimum irma keyshare server version 0.11.0 (due to challenge response user authentication). irma keyshare server does support older irmaclient versions.
  • Updated dependencies
  • Phased out unmaintained jasonlvhit/gocron library and migrated to go-co-op/gocron
  • Made gocron usage more consistent
  • Phased out legacy irmaclient log entry formats
  • Consistently specify charset in HTTP responses when the content type is application/json
  • Applied the code convention changes of golang 1.19
  • Always use the latest version of golang in GitHub status checks
  • Improved input validation of email addresses
  • Improved testability of revoked credentials
  • Use new URL of timestamp server (atumd) in unit tests

Fixed

  • Broken retrieval of user from postgres database by irma keyshare server
  • Also remove legacy file storage when calling RemoveStorage in irmaclient
  • irma keyshare myirmaserver requests login and email attribute options as conjunction instead of as disjunction
  • Chained sessions did not work due to bug in irma keyshare server
  • Attributes from multiple issuer schemes could not be mixed in chained sessions
  • Panics occurred during error handling in irmaclient
  • Avoid gocron panics in revocation code during irmaclient startup
  • Do not abort irma keyshare tasks run while looping over expired accounts and finding an invalid email address (quick fix)
  • Use subject value instead of file path value as email subject in account removed email of irma keyshare myirmaserver
  • Requestor JWT authentication did not work at revocation endpoint of irma server
  • Concurrency issues in irmaclient.Client.credential() and irma.Configuration.parseKeysFolder()

Security

  • Prevent that a user can detect whether a certain email address is registered at irma keyshare server and irma keyshare myirmaserver (vulnerable versions have never been live in production)

0.10.0 - 2022-03-09

Added

Fixed

  • Mutex deadlock that could freeze the server when using chained sessions
  • Bug that would prevent warnings on 4xx and 5xx responses from showing when not in verbose/debug mode

0.9.0 - 2021-12-17

Added

  • Support for stateless IRMA server using Redis
  • Added Dockerfile and docker-compose files for running irma, the unit tests, and/or the services required by the unit tests

Changes

  • Improve error messages of IRMA server in case of invalid session requests

Fixed

  • Fix panic when an issuance request contains a credential ID consisting of less than three parts
  • Ensure session handler callback function, when specified, is also called when session expires
  • Several small bugs in MyIRMA backend server

0.8.0 - 2021-07-27

This release contains several large new features. In particular, the shoulder surf prevention feature brings a number of breaking changes in the API, mainly within the irmaserver package.

Added

  • Support for chained IRMA sessions
  • A Go rewrite of the keyshare server (see the new irma keyshare commands), succeeding the now deprecated irma_keyshare_server
  • Added a function SessionStatus in the irmaserver package returning a channel with status updates of an IRMA session
  • Added --api-prefix parameter to the IRMA server for prefixing its API endpoints with a string
  • Added --max-session-lifetime parameter to the IRMA server for setting the session expiry (default 5 minutes)
  • Shoulder surfing prevention: support for device pairing to prevent shoulder surfing (i.e. make it impossible for someone in close physical proximity to a user to scan the QR code that was meant for the user)
    • Introduced new endpoints used by the frontend to manage device pairing
    • The API of the irmaserver package has two new functions SetFrontendOptions and PairingCompleted
    • A new server status "PAIRING" is introduced

Changes

  • During scheme parsing, folders found in the scheme folder not present in the assets (when configured) are removed
  • Shoulder surfing prevention:
    • The server.SessionPackage struct now contains a new struct FrontendRequest of type *irma.FrontendSessionRequest, containing the following:
      • A boolean PairingRecommended (named pairingHint when being marshalled to JSON) that is set to true when pairing is recommended for that session, as indication to the frontend
      • An Authorization token used by the frontend to set pairing options
      • Fields called MinProtocolVersion and MaxProtocolVersion indicating the frontend protocol version range supported by the IRMA server.
    • The return values of the StartSession function from the API of the irmaserver package have changed as follows:
      • The type of the second return parameter, the requestor token, has changed from string to irma.RequestorToken
      • A new return parameter (type *irma.FrontendSessionRequest) has been added containing the frontend pairing settings (corresponding to the FrontendRequest field in the server.SessionPackage mentioned above)
    • The token parameter, as used by most functions in the API of the irmaserver package, now has the type irma.RequestorToken
    • The server.Status type has been moved to irma.ServerStatus; the related constants are also moved, e.g. from server.StatusInitialized to irma.ServerStatusInitialized

Fixed

  • Bug causing IRMA server startup to fail when revocation is enabled
  • Bug causing sessions to fail when revocation is enabled and the issuer has multiple revocation-enabled keys
  • Incorrectly cased SQL column name used in revocation data lookup
  • Bug causing issuance time in revocation records being floored to credential validity epoch boundaries
  • Fixed bug when loading private key of issuer if another issuer with a similar name exists

0.7.0 - 2021-03-17

Fixed

  • Bug causing scheme updating to fail if OS temp dir is on other file system than the schemes
  • Prevent session result JWTs from being expired immediately if no expiry is specified is set in the session request; instead in that case they expire after two minutes
  • When POSTing session result to the callbackUrl specified in session request, set Content-Type to application/json for JSON messages
  • Fixed panic during scheme downloading on Windows
  • Correctly decode randomblind attributes when verifying disclosures/signatures

Added

  • Add request URL to log entry when IRMA server encounters an error (404 or otherwise) during HTTP request handling
  • Add flag --allow-unsigned-callbacks to IRMA server to allow callbackUrl in session requests when no JWT private key is installed
  • Add flag --augment-client-return-url to IRMA server to enable augmenting client return URL with server session token as query parameter (needs to be additionally enabled in session requests)
  • Add new irma issuer keyprove and irma issuer keyverify commands to generate and verify zero-knowledge proofs of correct generation of issuer private/public keypairs

Changed

  • Clarify warning and suppress stacktrace in IRMA server log entry in case /statusevents is hit while SSE is disabled
  • Force Unix (LF) line endings in schemes during scheme signing for consistency
  • Moved revocation commands from irma issuer revocation to just irma issuer

0.6.1 - 2020-12-15

Changed

Fixed

  • Bug that could cause schemes on disk to enter an inconsistent state, causing IRMA server to refuse to startup
  • Nil deref during IRMA server startup in case local IP address failed to be determined
  • Bug causing requestor scheme updating to fail

0.6.0 - 2020-10-20

Added

  • Support for "randomblind" attributes (if enabled in the scheme), for e.g. election use cases: attributes containing large random numbers issued in such a way that 1) the issuer does not learn their value while still providing a valid signature over the credential containing the attributes, and 2) the attribute value will be unequal to all previously issued randomblind attributes with overwhelming probability. Once issued, these attributes can be disclosed normally (i.e., only the issuance protocol is different for these attributes).
  • Initial support (currently limited to issuing sessions) in irmaclient for "pretty verifier names": human-readable and translatable requestor names to show in the IRMA app during a session to identify the requestor, instead of just a hostname, defined in a new scheme type called "requestor schemes" (e.g. https://github.com/privacybydesign/pbdf-requestors)

Changed

  • Renamed and refactored several (mostly internal) functions dealing with installing, parsing and updating schemes, to support both scheme types (normal schemes as well as requestor schemes)
  • irmaclient now includes suggestions for non-singletons in the disclosure candidates during sessions, like it does for singletons not in the user's wallet

Fixed

  • Bug that would cause the IRMA server to log required values of attributes to be disclosed, when logging the session request
  • Bug in irmaclient leading to the wrong error message in case of bad internet connection

0.5.1 - 2020-09-17

Changed

  • Switched to forks of cobra, viper, and pflag so that depending packages don't require replace directives in their go.mod

0.5.0 - 2020-09-03

Fixed

  • Bug in scheme update mechanism leading to UNKNOWN_PUBLIC_KEY errors when new public keys have been added to the scheme
  • Several bugfixes in irmaclient

0.5.0-rc.5 - 2020-08-11

Added

  • Support disabling scheme auto-updating in irma session
  • Support revocation in irma session and irma request

Fixed

  • Fixed bug in server configuration defaults when enabling production mode through config file
  • Fixed bug that would kill server-sent events (SSE) connections after several seconds
  • Fixed invalidation of local copy of index if local scheme is newer than the remote one
  • Ignore absence of FAQ fields and category in credentialtypes during irma scheme verify

Security

  • Abort issuance or disclosure in server and client in case of expired public keys

0.5.0-rc.4 - 2020-06-18

Added

  • Support for parallel sessions (e.g. issuance of missing credentials during a disclosure session) to irmaclient

Fixed

  • Several minor bugs in irmaclient

Security

  • The IRMA server now keeps issuer private keys in memory as short as possible

0.5.0-rc.3 - 2020-05-14

Added

  • Various additions to irmaclient for the new IRMA app, among others:
    • Several new fields in irma.CredentialType for specifying e.g. help messages and card colors
    • Added developer mode enabling non-HTTPS connections to IRMA servers for local testing (see below)

Fixed

  • Problems with --privkeys option to IRMA server

Security

  • irma command, IRMA server and irmaclient will now enforce HTTPS for outgoing connections whenever possible
  • Update supported TLS ciphers and curves for IRMA server
  • Fixed potential bug allowing MitM attacker to arbitrarily change installed schemes
  • Fixed potential DoS attack in IRMA server endpoints (sending it large amounts of data or keeping connections open indefinitely)

0.5.0-rc.2 - 2020-04-21

Added

  • Revocation of previously issued credentials (see documentation)
  • Support HTTP/2 in IRMA server and app
  • Option --skip-permission-keys-check to IRMA server disabling checking that all required private keys are present in the server configuration

Changed

  • Use go modules instead of dep for tracking and locking dependencies

Fixed

  • irmaserver HTTP handler returns 404 an 405 as JSON error messages as expected
  • Consistently use a docopt/git/aptitude like format for usage sections in help of irma subcommands
  • Incorrect default value of --url flag to irma session subcommand
  • IRMA server no longer allows nonsensical wildcard usage in requestor permissions

Security

  • irma issuer keygen now has default keylength 2048
  • Added various sanity checks to files and file paths
  • Fixed potential scheme downgrade attack when installing/updating schemes in MitM scenarios

0.5.0-rc.1 - 2020-03-03

Added

  • Include clientReturnURL in session request

Changed

  • All (translated) names of issuers and credential types of demo schemes (i.e. irma-demo) must now start with Demo
  • irmaclient now uses bbolt for storage
  • When the irmaclient receives a credential identical to another older one, the older one is overwritten
  • Scheme signing and verification now supports symlinks

Fixed

  • Unclear error message when the request's Content-Type HTTP header is not properly set
  • Unclear error message when non-optional attributes are missing in issuance request
  • Scheme verification now ignores deprecated issuers and keys and ignores missing IssueURL tags in credential types
  • irma server no longer crashes at startup if no network interfaces are available
  • Various bugs in irma server configuration

0.4.1 - 2019-10-15

Changed

  • Renamed irma session flag --authmethod to --auth-method for consistency with server Configuration struct

Fixed

  • Fix bug that would prevent downloading of demo private keys of demo schemes on server startup and scheme updating
  • irma server now respects the disable_schemes_update option like the irmaserver library (#63)
  • Other small fixes

0.4.0 - 2019-10-09

Added

  • New irma server feature: static (e.g. printable) QRs that start preconfigured sessions, see documentation
  • irma server now returns attribute issuance time to the requestor after the session has finished

Fixed

  • Hopefully fix “unknown or expired session” errors that would sometimes occur in the IRMA app in bad network conditions
  • Combined issuance-disclosure requests with two schemes one of which has a keyshare server now work as expected
  • Various other bugfixes