Changed - Upgraded aws-lc-rs to 1.12.1
Misc - x86 (32-bits) wheels are now automatically published to PyPI for both Linux (i686) and Windows (win32). (#45)
Changed - Updated pyo3 from 0.23.3 to 0.23.4
Changed
- Post-Quantum key-exchange Kyber 768 Draft upgraded to standard Module-Lattice 768.
- Version negotiation no longer logged as INFO
. Every logs generated will always be DEBUG
level.
- Converted our test suite to run on Pytest instead of unittest.
- Migrated pyo3 from 0.20.3 to 0.23.3
Fixed - Clippy warnings in our Rust code. - Rust code may panic due to lack of proper result unpacking on the cryptographic calls. Now any error will
raise exception CryptoError
instead.
- Negotiating post-quantum key exchange (server side).
Added - noxfile. - miscellaneous serialize/deserialize for Certificate, and OCSPResponse. - Initial support for Python 3.13 freethreaded experimental build.
Fixed - Large HTTP headers cannot be encoded to be sent.
Changed - Upgrade aws-lc-rs to v1.10.0 - Update rustls to v0.23.14
Added
- Support for informational response 1XX in HTTP/3. The event InformationalHeadersReceived
has been added to reflect that.
Changed - Update rustls v0.23.12 to v0.23.13 along with dependents.
Added - Support for Post-Quantum KX Kyber768 (NIST Round 3) with X25519. - Backport "QUIC Version 2".
"Rework packet encoding to support different protocol versions" https://github.com/aiortc/aioquic/commit/bd3497cce9aa906c47d5b7216752f55beed3d9d3 "Add encryption for QUIC v2" https://github.com/aiortc/aioquic/commit/abf51897bb67f459921e4c26c8b3ea445aa79832 "Refactor retry / version negotiation handling" https://github.com/aiortc/aioquic/commit/70dd040893d7d8af5a2a92361c1e844ebf867abb "Add support for version_information transport parameter" https://github.com/aiortc/aioquic/commit/a59d9ad0b1df423376bf8b30ebb7642861fef54e "Check Chosen Version matches the version in use by the connection" https://github.com/aiortc/aioquic/commit/a59d9ad0b1df423376bf8b30ebb7642861fef54e
Changed
- Insert GREASE in KX, TLS Version and Ciphers.
- Backport "Only buffer up to 512 KiB of pending CRYPTO frames" https://github.com/aiortc/aioquic/commit/174a2ebbe928686ef9663acc663b3ac06c2d56f2
- Backport "Improved path challenge handling" https://github.com/aiortc/aioquic/commit/b507364ea51f3e654decd143cc99f7001b5b7923
- Backport "Limit the number of pending connection IDs marked for retirement." https://github.com/aiortc/aioquic/commit/4f73f18a23c22f48ef43cb3629b0686757f096af
- Backport "During address validation, count the entire received datagram" https://github.com/aiortc/aioquic/commit/afe5525822f71e277e534b08f198ec8724a7ad59
- Update aws-lc-rs v1.8.1 to v1.9.0
- Default supported signature algorithms to: ECDSA_SECP256R1_SHA256, RSA_PSS_RSAE_SHA256, RSA_PKCS1_SHA256, ECDSA_SECP384R1_SHA384, RSA_PSS_RSAE_SHA384, RSA_PKCS1_SHA384, RSA_PSS_RSAE_SHA512, RSA_PKCS1_SHA512, ED25519
.
Fixed - Certificate fingerprint matching. - Backport upstream urllib3/urllib3#3434: util/ssl: make code (certificate fingerprint matching) resilient to missing hash functions.
In certain environments such as in a FIPS enabled system, certain algorithms such as md5 may be unavailable.
Misc
- Backport "Use is for type comparisons" https://github.com/aiortc/aioquic/commit/5c55e0c75d414ab171a09a732c2d8aaf6f178c05
- Postpone annotations parsing with from __future__ import annotations
everywhere in order to simplify type annotations.
Changed
- Bump aws-lc-rs
from version 1.7.3 to 1.8.1
- Bump rustls
from 0.23.8 to 0.23.12
Fixed - Incomplete Cargo manifest that can lead to a build error on specific platforms #37
Added - Explicit support for Python 3.13
Added - Support for Windows ARM64 pre-built wheel in CD pipeline.
Changed - Lighter build requirements by refactoring our Rust / Cargo dependencies.
Fixed - Decryption error after receiving long (quic) header that required key derivation.
Changed - Further improved the reliability of the qpack encoder/decoder.
Fixed - Qpack encoder / decoder failure due to unfed stream data.
Changed - Buffer management has been migrated over to Rust in order to improve the overall performance.
Fixed - setting assert_hostname to False triggered an error when the peer certificate contained at least one IP in subject alt names.
Fixed
- qpack encoder/decoder blocking state in a rare condition.
- missing (a default) NullHandler for quic
and http3
loggers causing a StreamHandler to write into stderr.
- setting assert_hostname to False did not disable hostname verification / match with given certificate.
Changed - Updated rustls to v0.23.5
Fixed - PyO3 unsendable classes constraint has been relaxed. qh3 is not thread-safe and you should take appropriate measures in a concurrent environment.
Added
- Exposed CipherSuite
and SessionTicket
classes in the top-level import.
Misc
- Exposed a x509 helper to make for cryptography
dependency removal, solely for Niquests usage.
Removed
- Breaking: Dependency on cryptography
along with the indirect dependencies on cffi and pycparser.
- Breaking: H0Connection
class that was previously deprecated. Use either urllib3-future or niquests instead.
- Breaking: Draft support for QUIC and H3 protocols.
- Breaking: RSA_PKCS1_SHA1
signature algorithm due to its inherent risk dealing with the unsafe SHA1.
- Breaking: ED448/X448 signature and private key are no longer supported due to its absence in aws-lc-rs.
- Breaking: You may no longer pass certificates (along with private keys) as object that comes from cryptography
. You have to encode them into PEM format.
Changed - ls-qpack binding integration upgraded to v2.5.4 and migrated to Rust. - cryptographic bindings are rewritten in Rust using the PyO3 SDK, the underlying crypto library is aws-lc-rs 1.6.4 - certificate chain control with dns name matching is delegated to rustls instead of previously half-vendored (py)OpenSSL (X509Store).
Added
- Exposed a public API for qh3
(top-level import).
- SECP384R1 key exchange algorithm as a supported group by default to make for the X448 removal.
- SECP521R1 key exchange algorithm is also supported but not enabled by default per standards (NSA Suite B) recommendations.
Misc
- Noticeable performance improvement and memory safety thanks to the Rust migration. We tried to leverage pure Rust binding whenever we could do it safely.
- Example scripts are adapted for this major version.
- Using maturin
as the build backend.
- Published new compatible architectures for pre-built wheels.
- Initial MSRV 1.75+
If you rely on one aspect of enumerated breaking changes, please pin qh3 to
exclude this major (eg. >=0.15,<1
) and inform us on how this release affected your program(s).
We will listen.
The semantic versioning will be respected excepted for the hazardous materials.
Fixed - Improved stream write scheduling. (upstream patch aiortc#475)
Misc - CI now prepare a complete sdist with required vendors - aarch64 linux is now served
Changed
- Highly simplified _crypto
module based on upstream work aiortc#457
- Bump upper bound cryptography
version to 42.x
Fixed
- Mitigate deprecation originating from cryptography
about datetime naïve timezone.
Changed
- Converted our Buffer
implementation to native Python instead of C as performance are plain better thanks to CPython internal optimisations
Fixed - Addressed performance concerns when attributing new stream ids - The retry token was based on a weak key
Added
- StopSendingReceived
event
- Property open_outbound_streams
in QuicConnection
- Property max_concurrent_bidi_streams
in QuicConnection
- Property max_concurrent_uni_streams
in QuicConnection
- Method get_cipher
in QuicConnection
- Method get_peercert
in QuicConnection
- Method get_issuercerts
in QuicConnection
Added
- Support for in-memory certificates (client/intermediary) via Configuration.load_cert_chain(..)
Removed
- (internal) Unused code in private _vendor.OpenSSL
Changed - All INFO logs entries are downgraded to DEBUG
Removed - Certifi will no longer be used if present in the environment. Use jawah/wassima as a super replacement.
Deprecated
- H0Connection
will be removed in the 1.0 milestone. Use HTTP Client Niquests instead.
Fixed
- QuicConnection ignored verify_hostname
context option (PR #16 by @doronz88)
Added - Support for QUIC mTLS on the client side (PR #13 by @doronz88)
Added - Toggle for hostname verification in Configuration
Changed - Hostname verification can be done independently of certificate verification
Added - Support for certificate fingerprint matching
Fixed - datetime.utcnow deprecation
Changed - commonName is no longer checked by default
Added - Support for "IP Address" as subject alt name in certificate verifications
Removed - Dependency on OpenSSL development headers
Changed
- Crypto module relies on cryptography
OpenSSL binding instead of our own copy
Added - Explicit support for PyPy
Removed
- Dependency on pyOpenSSL
- Dependency on certifi
- Dependency on pylsqpack
Changed
- Vendored pyOpenSSL.crypto for the certificate verification chain (X590Store)
- Vendored pylsqpack, use v1.0.3 from upstream and make module abi3 compatible
- The module _crypto and _buffer are abi3 compatible
- The whole package is abi3 ready
- certifi ca bundle is loaded only if present in the current environment (behavior will be removed in v1.0.0)
Fixed
- Mitigate ssl.match_hostname deprecation by porting urllib3 match_hostname
- Mimic ssl load_default_cert into the certification chain verification