Releases: hyperledger/fabric-ca
v1.5.13
v1.5.13 Release Notes - September 20, 2024
v1.5.13 updates code dependencies.
Dependencies
Fabric CA v1.5.13 has been tested with the following dependencies:
- Go 1.23.1
- Ubuntu 20.04 (for Docker images)
- Databases
- PostgreSQL 13
- MySQL 8.0
Changes, Known Issues, and Workarounds
None.
Known Vulnerabilities
-
FABC-174 Commands can be manipulated to delete identities or affiliations
This vulnerability can be resolved in one of two ways:
-
Use HTTPS (TLS) so that the authorization header is not in clear text.
-
The token generation/authentication mechanism was improved to optionally prevent
token reuse. As of v1.4 a more secure token can be used by setting environment variable:
FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false
However, it cannot be set to false until all clients have
been updated to generate the more secure token and tolerate
FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false.
The Fabric CA client has been updated in v1.4 to generate the more secure token.
The Fabric SDKs will be updated by v2.0 timeframe to generate the more secure token,
at which time the default for Fabric CA server will change to:
FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false -
Resolved Vulnerabilities
None.
v1.5.12
v1.5.12 Release Notes - June 18, 2024
v1.5.12 updates code dependencies.
Dependencies
Fabric CA v1.5.12 has been tested with the following dependencies:
- Go 1.22.4
- Ubuntu 20.04 (for Docker images)
- Databases
- PostgreSQL 13
- MySQL 8.0
Changes, Known Issues, and Workarounds
None.
Known Vulnerabilities
-
FABC-174 Commands can be manipulated to delete identities or affiliations
This vulnerability can be resolved in one of two ways:
-
Use HTTPS (TLS) so that the authorization header is not in clear text.
-
The token generation/authentication mechanism was improved to optionally prevent
token reuse. As of v1.4 a more secure token can be used by setting environment variable:
FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false
However, it cannot be set to false until all clients have
been updated to generate the more secure token and tolerate
FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false.
The Fabric CA client has been updated in v1.4 to generate the more secure token.
The Fabric SDKs will be updated by v2.0 timeframe to generate the more secure token,
at which time the default for Fabric CA server will change to:
FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false -
Resolved Vulnerabilities
None.
v1.5.11
v1.5.11 Release Notes - May 21, 2024
v1.5.11 updates code dependencies.
Dependencies
Fabric CA v1.5.11 has been tested with the following dependencies:
- Go 1.22.3
- Ubuntu 20.04 (for Docker images)
- Databases
- PostgreSQL 13
- MySQL 8.0
Changes, Known Issues, and Workarounds
None.
Known Vulnerabilities
-
FABC-174 Commands can be manipulated to delete identities or affiliations
This vulnerability can be resolved in one of two ways:
-
Use HTTPS (TLS) so that the authorization header is not in clear text.
-
The token generation/authentication mechanism was improved to optionally prevent
token reuse. As of v1.4 a more secure token can be used by setting environment variable:
FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false
However, it cannot be set to false until all clients have
been updated to generate the more secure token and tolerate
FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false.
The Fabric CA client has been updated in v1.4 to generate the more secure token.
The Fabric SDKs will be updated by v2.0 timeframe to generate the more secure token,
at which time the default for Fabric CA server will change to:
FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false -
Resolved Vulnerabilities
None.
v1.5.10
v1.5.10 Release Notes - April 15, 2024
v1.5.10 updates code dependencies.
Dependencies
Fabric CA v1.5.10 has been tested with the following dependencies:
- Go 1.21.9
- Ubuntu 20.04 (for Docker images)
- Databases
- PostgreSQL 13
- MySQL 8.0
Changes, Known Issues, and Workarounds
None.
Known Vulnerabilities
-
FABC-174 Commands can be manipulated to delete identities or affiliations
This vulnerability can be resolved in one of two ways:
-
Use HTTPS (TLS) so that the authorization header is not in clear text.
-
The token generation/authentication mechanism was improved to optionally prevent
token reuse. As of v1.4 a more secure token can be used by setting environment variable:
FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false
However, it cannot be set to false until all clients have
been updated to generate the more secure token and tolerate
FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false.
The Fabric CA client has been updated in v1.4 to generate the more secure token.
The Fabric SDKs will be updated by v2.0 timeframe to generate the more secure token,
at which time the default for Fabric CA server will change to:
FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false -
Resolved Vulnerabilities
None.
v1.5.9
v1.5.9 Release Notes - February 19, 2024
v1.5.9 updates code dependencies, and removes dependency on core fabric.
Dependencies
Fabric CA v1.5.9 has been tested with the following dependencies:
- Go 1.21.6
- Ubuntu 20.04 (for Docker images)
- Databases
- PostgreSQL 13
- MySQL 8.0
Changes, Known Issues, and Workarounds
None.
Known Vulnerabilities
-
FABC-174 Commands can be manipulated to delete identities or affiliations
This vulnerability can be resolved in one of two ways:
-
Use HTTPS (TLS) so that the authorization header is not in clear text.
-
The token generation/authentication mechanism was improved to optionally prevent
token reuse. As of v1.4 a more secure token can be used by setting environment variable:
FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false
However, it cannot be set to false until all clients have
been updated to generate the more secure token and tolerate
FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false.
The Fabric CA client has been updated in v1.4 to generate the more secure token.
The Fabric SDKs will be updated by v2.0 timeframe to generate the more secure token,
at which time the default for Fabric CA server will change to:
FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false -
Resolved Vulnerabilities
None.
v1.5.8
v1.5.8 Release Notes - December 20, 2023
Fixes
Fix s390x build
Update github.com/IBM/mathlib to fix compilation issue on s390x.
#387
Improvements
Log expiry overrides
If certificate expiry during enrollment gets overridden due to the CA's own expiry,
log a warning message about the override.
#384
Dependencies
Fabric CA v1.5.8 has been tested with the following dependencies:
- Go 1.21.5
- Ubuntu 20.04 (for Docker images)
- Databases
- PostgreSQL 13
- MySQL 8.0
Changes, Known Issues, and Workarounds
None.
Known Vulnerabilities
-
FABC-174 Commands can be manipulated to delete identities or affiliations
This vulnerability can be resolved in one of two ways:
-
Use HTTPS (TLS) so that the authorization header is not in clear text.
-
The token generation/authentication mechanism was improved to optionally prevent
token reuse. As of v1.4 a more secure token can be used by setting environment variable:
FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false
However, it cannot be set to false until all clients have
been updated to generate the more secure token and tolerate
FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false.
The Fabric CA client has been updated in v1.4 to generate the more secure token.
The Fabric SDKs will be updated by v2.0 timeframe to generate the more secure token,
at which time the default for Fabric CA server will change to:
FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false -
Resolved Vulnerabilities
None.
v1.5.7
v1.5.7 Release Notes - August 29, 2023
Improvements
SignerConfig struct now exports the RevocationHandle
SignerConfig struct now exports the RevocationHandle.
The way the revocation handle is encoded has changed to align to what the Idemix library expects.
#363
Dependencies
Fabric CA v1.5.7 has been tested with the following dependencies:
- Go 1.20.5
- Ubuntu 20.04 (for Docker images)
Changes, Known Issues, and Workarounds
None.
Known Vulnerabilities
-
FABC-174 Commands can be manipulated to delete identities or affiliations
This vulnerability can be resolved in one of two ways:
-
Use HTTPS (TLS) so that the authorization header is not in clear text.
-
The token generation/authentication mechanism was improved to optionally prevent
token reuse. As of v1.4 a more secure token can be used by setting environment variable:
FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false
However, it cannot be set to false until all clients have
been updated to generate the more secure token and tolerate
FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false.
The Fabric CA client has been updated in v1.4 to generate the more secure token.
The Fabric SDKs will be updated by v2.0 timeframe to generate the more secure token,
at which time the default for Fabric CA server will change to:
FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false -
Resolved Vulnerabilities
None.
v1.5.6
v1.5.6 Release Notes - March 31, 2023
v1.5.6 provides the following updates for Fabric CA:
- Builds native arm64 CA binaries for linux and darwin
- Builds multi-platform CA docker images for arm64 and amd64 with
buildx
- Builds CA docker images FROM ubuntu:20.04 (avoid SIGSEGV errors encountered with dynamic builds on musl/alpine libc)
- Adds debug information for a mysterious idemix error message
- Bumps Go version to 1.20.2
Dependencies
Fabric CA v1.5.6 has been tested with the following dependencies:
- Go 1.20.2
- Ubuntu 20.04 (for Docker images)
Changes, Known Issues, and Workarounds
None.
Known Vulnerabilities
-
FABC-174 Commands can be manipulated to delete identities or affiliations
This vulnerability can be resolved in one of two ways:
-
Use HTTPS (TLS) so that the authorization header is not in clear text.
-
The token generation/authentication mechanism was improved to optionally prevent
token reuse. As of v1.4 a more secure token can be used by setting environment variable:
FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false
However, it cannot be set to false until all clients have
been updated to generate the more secure token and tolerate
FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false.
The Fabric CA client has been updated in v1.4 to generate the more secure token.
The Fabric SDKs will be updated by v2.0 timeframe to generate the more secure token,
at which time the default for Fabric CA server will change to:
FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false -
Resolved Vulnerabilities
None.
v1.5.6-beta3
v1.5.6-beta3 Release Notes - Jan 3, 2023
v1.5.6-beta3 is a beta release, providing updates for the following issues in the Fabric CA:
- Builds native arm64 CA binaries for linux and darwin
- Builds multi-platform CA docker images for arm64 and amd64 with
buildx
- Builds CA docker images FROM ubuntu:20.04 (avoid SIGSEGV errors encountered with dynamic builds on musl/alpine libc)
- Adds debug information for a mysterious idemix error message
- Bumps Go version to 1.18.9
Dependencies
Fabric CA v1.5.6 has been tested with the following dependencies:
- Go 1.18.9
- Ubuntu 20.04 (for Docker images)
Changes, Known Issues, and Workarounds
None.
Known Vulnerabilities
-
FABC-174 Commands can be manipulated to delete identities or affiliations
This vulnerability can be resolved in one of two ways:
-
Use HTTPS (TLS) so that the authorization header is not in clear text.
-
The token generation/authentication mechanism was improved to optionally prevent
token reuse. As of v1.4 a more secure token can be used by setting environment variable:
FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false
However, it cannot be set to false until all clients have
been updated to generate the more secure token and tolerate
FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false.
The Fabric CA client has been updated in v1.4 to generate the more secure token.
The Fabric SDKs will be updated by v2.0 timeframe to generate the more secure token,
at which time the default for Fabric CA server will change to:
FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false -
Resolved Vulnerabilities
None.
v1.5.6-beta2
v1.5.6-beta2 Release Notes - Dec 15, 2022
v1.5.6-beta2 is a beta release, providing updates for the following issues in the Fabric CA:
- Builds native arm64 CA binaries for linux and darwin
- Builds multi-platform CA docker images for arm64 and amd64 with
buildx
- Adds debug information for a mysterious idemix error message
Dependencies
Fabric CA v1.5.6 has been tested with the following dependencies:
- Go 1.18.8
- Alpine 3.17 (for Docker images)
Changes, Known Issues, and Workarounds
None.
Known Vulnerabilities
-
FABC-174 Commands can be manipulated to delete identities or affiliations
This vulnerability can be resolved in one of two ways:
-
Use HTTPS (TLS) so that the authorization header is not in clear text.
-
The token generation/authentication mechanism was improved to optionally prevent
token reuse. As of v1.4 a more secure token can be used by setting environment variable:
FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false
However, it cannot be set to false until all clients have
been updated to generate the more secure token and tolerate
FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false.
The Fabric CA client has been updated in v1.4 to generate the more secure token.
The Fabric SDKs will be updated by v2.0 timeframe to generate the more secure token,
at which time the default for Fabric CA server will change to:
FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false -
Resolved Vulnerabilities
None.