Skip to content

Releases: aws/s2n-tls

v1.7.0

31 Jan 00:02
f5e5e83

Choose a tag to compare

Release summary

Kyber removal means we're bumping the the MINOR version to v1.7.0.

What's Changed

  • (chore): Rust bindings bump 0.3.33 by @jouho in #5694
  • build(deps): update reqwest requirement from 0.12.7 to 0.13.1 in /tests/pcap in the all-cargo-updates group across 1 directory by @dependabot[bot] in #5690
  • chore: bump to nixpkgs 2025.05 by @dougch in #5489
  • chore: bump standard MSRV to 1.83 by @jmayclin in #5700
  • chore: Mark Kyber as unsupported on all LibCrypto variants by @alexw91 in #5701
  • chore: update s2n-tls-hyper crates version to 0.1.0 by @boquan-fang in #5702
  • chore: move s2n-tls-bench to Codebuild by @boquan-fang in #5693
  • test(integration): add rust test for session resumption by @kaukabrizvi in #5683
  • test (integration): add renegotiate rust test by @kaukabrizvi in #5689
  • feat(bindings): expose disable_x509_intent_verification API by @CarolYeh910 in #5703
  • chore: add static lists of supported TLS parameters by @jmayclin in #5698
  • chore: rust binding release v0.3.34 by @CarolYeh910 in #5707

Full Changelog: v1.6.4...v1.7.0

Release v1.6.4

06 Jan 18:51
3276a08

Choose a tag to compare

Weekly release for Jan 5, 2026

Release Summary:

  • Enables certificate intent validation by default. This also adds a config API s2n_config_disable_x509_intent_verification() to disable it if necessary
  • Fixed an issue where selected_key_exchange_group for a resumed TLS 1.2 connection would incorrectly report secp256r1.

What's Changed

  • build(deps): bump ytanikin/pr-conventional-commits from 1.4.2 to 1.5.1 in /.github/workflows in the all-gha-updates group by @dependabot[bot] in #5656
  • ci: add typo check to ci by @brimonk in #5491
  • Import Cloudfront PQ TLS Policies by @alexw91 in #5539
  • feat(build): Improve OpenSSL libcrypto discovery by @goatgoose in #5572
  • test: update CRL certs to comply with intent validation by @CarolYeh910 in #5651
  • (chore): Rust bindings bump 0.3.32 by @maddeleine in #5662
  • ci: update clang format version by @CarolYeh910 in #5661
  • (chore): Revert "feat(build): Improve OpenSSL libcrypto discovery (#5572)" by @maddeleine in #5664
  • feat: verify certificate issuer intent by default by @CarolYeh910 in #5657
  • chore: Fix increase in Rust unit test timings by @maddeleine in #5677
  • feat: add handshake event by @jmayclin in #5635
  • test(integration): add async cert verify and offload 'stress' test by @kaukabrizvi in #5653
  • test(integration): refactor PQ tests to utilize in-memory harness by @kaukabrizvi in #5667
  • build(deps): bump the all-gha-updates group across 1 directory with 4 updates by @dependabot[bot] in #5675
  • build(deps): bump cross-platform-actions/action from 0.31.0 to 0.32.0 in /.github/workflows in the all-gha-updates group by @dependabot[bot] in #5685
  • Fix: print diagnostics to stdout in s2n_resume_test by @ravindran-dev in #5660
  • Fix: Unpin the rust nightly toolchain version by @VIM4L-M in #5682
  • fix: incorrect group reported for TLS 1.2 session resumption by @jmayclin in #5673
  • test: confirm errors for no matching parameters by @jmayclin in #5679
  • test(integration): add rust test for prefer low latency by @kaukabrizvi in #5684
  • test(integration): add BoringSSL cohort to expand mTLS coverage by @kaukabrizvi in #5659
  • Fix unit test build errors under -Werror by @thulasiramk-2310 in #5686

New Contributors

Full Changelog: v1.6.3...v1.6.4

Release v1.6.3

10 Dec 20:57
1c98447

Choose a tag to compare

Release Summary

Weekly release for Dec 15, 2025

Release Summary:

  • The TLS handshake now succeeds when the async cert callback is configured and peers sent multiple TLS handshake messages per record.

What's Changed

  • tests(integration): cases for TLS 1.3 group selection by @jmayclin in #5652
  • fix: refactor negotiate loop to fix issue with async callback by @maddeleine in #5641

Full Changelog: v1.6.2...v1.6.3

Release v1.6.2

04 Dec 23:37
f6ca8f0

Choose a tag to compare

Release Summary

  • Add a new public API, s2n_client_hello_get_random(), and move client_random storage from the connection to the s2n_client_hello struct so applications can retrieve the client random from a parsed ClientHello.
  • Allow multiple application contexts to be set on a s2n-tls connection.
  • Warning level TLS alerts may now be non-fatal prior to version negotiation
  • Added support for Security Policies to have "strongly preferred" SupportedGroups.

What's Changed

  • feat: add client hello random getter by @kaukabrizvi in #5620
  • chore: Rust bindings release 0.3.30 by @dougch in #5633
  • chore: s2n-tls-hyper version bump by @jouho in #5636
  • build(deps): bump the all-gha-updates group across 1 directory with 2 updates by @dependabot[bot] in #5640
  • feat: add rfc9151 compat policies by @jouho in #5615
  • feat: improve performance of getting validated cert chain from libcrypto by @CarolYeh910 in #5622
  • feat: additional rfc9151 compat policy without sha1 hmac by @jouho in #5645
  • test: add test certs for cert intent validation by @CarolYeh910 in #5630
  • test(integv2): remove dynamic record sizing test and related cleanup by @kaukabrizvi in #5644
  • feat: add additional application context into Connection by @boquan-fang in #5637
  • chore(bindings-release): s2n-tls v0.3.31 release by @boquan-fang in #5649
  • fix: allow for warning level TLS alerts prior to version negotiation by @WesleyRosenblum in #5646
  • test(integration): add mTLS integration tests by @kaukabrizvi in #5638
  • feat: Ability to set "strongly preferred" groups by @alexw91 in #5634
  • refactor(tls-harness): use single test pair IO to allow for decryption by @jmayclin in #5648

Full Changelog: v1.6.1...v1.6.2

Release v1.6.1

20 Nov 22:35
bcb3f28

Choose a tag to compare

Weekly release for Nov 17, 2025

Release Summary:

  • Adds pure ML-KEM-1024 support: s2n_pure_mlkem_1024 KEM group is now negotiable.

What's Changed

Full Changelog: v1.6.0...v1.6.1

Release: v1.6.0

30 Oct 18:51
6aefe74

Choose a tag to compare

Weekly release for October 30 2025

Release Summary:

  • Multiple changes to the s2n-tls default policy:
    1. Added TLS13 support
    2. Added Post-Quantum key exchange
    3. Removed CBC ciphersuites
  • Changes to the RFC9151 policy: Removes RSA key exchange and DHE cipher suites. Use the numbered version of this policy instead (20250429) to maintain the current preferences.
  • Adds support for PQ only policies, which should not include classical ECC curves. This feature only works on libcryptos that support TLS 1.3 and PQ kem groups.
  • Fixed a validation issue in s2n_connection_deserialize() where malformed protocol version bytes could result in invalid connection state and inconsistent TLS behavior.
  • Add a synchronous rust binding API for s2n_cert_validation_callback
  • Upgrades MSRV for extended crates (s2n-tls-sys, s2n-tls, s2n-tls-tokio) from 1.63 to 1.72

What's Changed

  • docs: Small doc changes for KTLS by @maddeleine in #5521
  • ci: install missing rust component for gitthub action workflows by @jouho in #5528
  • refactor(aws-kms-tls-auth): add hmac based psk derivation by @jmayclin in #5519
  • chore: bindings release 0.3.27 by @jouho in #5526
  • fix(usage-guide): Update book.toml for mdbook 0.5 release by @goatgoose in #5535
  • bindings(rust): bump extended crates MSRV to 1.72.0 by @jouho in #5534
  • feat(bindings): expose cert validation callback by @CarolYeh910 in #5357
  • chore: bindings release 0.3.28 by @goatgoose in #5540
  • chore: add new team member by @kaukabrizvi in #5542
  • fix: validate protocol version during connection deserialization by @jouho in #5523
  • chore(bindings): revert dependency pins by @jmayclin in #5544
  • refactor(aws-kms-tls-auth): psk provider using HMAC psks by @jmayclin in #5530
  • chore: update bindgen version to v0.69.0 by @boquan-fang in #5396
  • refactor 1/2: Fix security policy version in tests to numbered string by @maddeleine in #5549
  • refactor: add psk receiver by @jmayclin in #5552
  • build(deps): update rtshark requirement from 3.1.0 to 4.0.0 in /tests/pcap in the all-cargo-updates group across 1 directory by @dependabot[bot] in #5555
  • fix(aws-kms-tls-auth): supress logging & version bump by @jmayclin in #5554
  • refactor 2/2: Fix security policy version in tests to numbered string by @maddeleine in #5553
  • fix(test): Reduce s2n_security_policies_test duration by @goatgoose in #5558
  • docs: update nix integration test instructions for uvinteg function by @kaukabrizvi in #5550
  • build(deps): bump the all-gha-updates group across 1 directory with 4 updates by @dependabot[bot] in #5548
  • build(deps): update zeroize requirement from =1.7.0 to =1.8.2 in /bindings/rust/extended by @dependabot[bot] in #5537
  • build(deps): update regex requirement from =1.9.6 to =1.12.1 in /bindings/rust/extended by @dependabot[bot] in #5556
  • feat: Improve supported cipher suites in RFC9151 policy by @goatgoose in #5559
  • ci: pin to older kissat version to unblock CBMC by @lrstewart in #5581
  • fix: update test broken by Openssl dhe generation change by @lrstewart in #5580
  • feat: output utility for security policy by @jouho in #5502
  • feat: add PQ only policy support by @CarolYeh910 in #5545
  • fix: update test_pq_only policy snapshot by @CarolYeh910 in #5583
  • refactor: Adds tls13 ciphersuites to default/default_fips policy by @maddeleine in #5560
  • build(deps): bump the all-gha-updates group in /.github/workflows with 2 updates by @dependabot[bot] in #5585
  • ci: scope down GitHub Token permissions by @AdnaneKhan in #5570

New Contributors

Full Changelog: v1.5.27...v1.6.0

Release: v1.5.27

25 Sep 17:12
30f40f2

Choose a tag to compare

Weekly release for September 25 2025

Release Summary:

  • Our kTLS feature can now perform key updates, meaning that kTLS is now safe to turn on in TLS1.3 when using the newest version of the linux kernel (6.14+).

What's Changed

Full Changelog: v1.5.26...v1.5.27

v1.5.26

15 Sep 16:27
792d366

Choose a tag to compare

Release Summary

  • Adds async public key support: s2n_pkey_verify() can be performed asynchronously through the async offloading callback.
  • Add new s2n_connection_get_signature_scheme method to retrieve the IANA description of the server signature scheme

What's Changed

New Contributors

Full Changelog: v1.5.25...v1.5.26

Release: v1.5.25

25 Aug 21:55
a786223

Choose a tag to compare

Weekly release for August 25 2025

Release Summary

  • Add a copy of the rfc9151 policy (20250429) which pins all of the policy parts to the current version.
  • Adds new TLSv1.3-enabled security policies for CloudFront's outbound ("upstream") connections to origin servers. We also add similar policies with PQ enabled.

What's Changed

New Contributors

Full Changelog: v1.5.24...v1.5.25

Release: v1.5.24

04 Aug 23:56
418313c

Choose a tag to compare

Weekly release for August 04 2025

Release Summary

  • Adds new PQ security policies with ML-KEM for the CRT.

What's Changed

Full Changelog: v1.5.23...v1.5.24