libidn-1.43 released [stable]
2025-03-30
Thread
Simon Josefsson via Announcements and Requests for Help from the GNU project and the Free Software Foundation
This is to announce libidn-1.43, a stable release. GNU Libidn is a fully documented implementation of the Stringprep, Punycode and IDNA2003 specifications. Libidn's purpose is to encode and decode internationalized domain name strings. There are native C, C# and Java libraries. Be aware that IDNA2003 and libidn are primarily for historic or compatibility use, and libidn2 is the successor with IDNA2008 and Unicode TR46 implementation and also provides a compatibility layer for GNU libidn. There have been 67 commits by 1 people in the 62 weeks since 1.42. See the NEWS below for a brief summary. Thanks to everyone who has contributed! The following people contributed changes to this release: Simon Josefsson (67) Happy hacking, Simon == Here is the GNU libidn home page: https://www.gnu.org/software/libidn/ Manual: https://www.gnu.org/software/libidn/manual/ https://www.gnu.org/software/libidn/manual/libidn.html - HTML format https://www.gnu.org/software/libidn/manual/libidn.pdf - PDF format API Reference manual: https://www.gnu.org/software/libidn/reference/intro.html - GTK-DOC HTML Doxygen documentation: https://www.gnu.org/software/libidn/doxygen/index.html - HTML format https://www.gnu.org/software/libidn/doxygen/libidn.pdf - PDF format JavaDoc output for the Java API: https://www.gnu.org/software/libidn/javadoc/ Here are the compressed sources and a GPG detached signature: https://ftp.gnu.org/gnu/libidn/libidn-1.43.tar.gz https://ftp.gnu.org/gnu/libidn/libidn-1.43.tar.gz.sig Here is minimal source-only "git archive" sources: https://ftp.gnu.org/gnu/libidn/libidn-v1.43-src.tar.gz https://ftp.gnu.org/gnu/libidn/libidn-v1.43-src.tar.gz.sig Here are Sigsum Proofs: https://ftp.gnu.org/gnu/libidn/libidn-1.43.tar.gz.proof https://ftp.gnu.org/gnu/libidn/libidn-v1.43-src.tar.gz.proof Use a mirror for higher download bandwidth: https://www.gnu.org/order/ftp.html Here are the SHA1 and SHA256 checksums: 80e9f28762544bf7da490ab4b1a92e725da6ce61 libidn-1.43.tar.gz vcZiwS0EGyU50OY486bnQRMM2zOmRO80lpY6RDSC0WQ= libidn-1.43.tar.gz 8a577ee259ee9e7d88782ff75f10cc5a225442b3 libidn-v1.43-src.tar.gz j487LWvTwE6pZyAxs17sY0IMZeDFmqjbhyRHXR3IZdI= libidn-v1.43-src.tar.gz Verify the base64 SHA256 checksum with cksum -a sha256 --check from coreutils-9.2 or OpenBSD's cksum since 2007. Use a .sig file to verify that the corresponding file (without the .sig suffix) is intact. First, be sure to download both the .sig file and the corresponding tarball. Then, run a command like this: gpg --verify libidn-1.43.tar.gz.sig The signature should match the fingerprint of the following key: pub ed25519 2019-03-20 [SC] B1D2 BD13 75BE CB78 4CF4 F8C4 D73C F638 C53C 06BE uid Simon Josefsson If that command fails because you don't have the required public key, or that public key has expired, try the following commands to retrieve or refresh it, and then rerun the 'gpg --verify' command. gpg --locate-external-key si...@josefsson.org gpg --recv-keys 51722B08FE4745A2 wget -q -O- 'https://savannah.gnu.org/project/release-gpgkeys.php?group=libidn&download=1' | gpg --import - As a last resort to find the key, you can try the official GNU keyring: wget -q https://ftp.gnu.org/gnu/gnu-keyring.gpg gpg --keyring gnu-keyring.gpg --verify libidn-1.43.tar.gz.sig Use the .proof files to verify the Sigsum proof. These files are like signatures but with extra transparency: you can cryptographically verify that every signature is logged in a public append-only log, so you can say with confidence what signatures exists. This makes hidden releases no longer deniable for the same public key. Releases are Sigsum-signed with the following public key: cat < jas-sigsum-key.pub ssh-ed25519 C3NzaC1lZDI1NTE5ILzCFcHHrKzVSPDDarZPYqn89H5TPaxwcORgRg+4DagE EOF Run a command like this to verify downloaded artifacts: wget -q -Otrust.txt https://gnu.org/s/libidn/sigsum-policy-20250309.txt sigsum-verify -k jas-sigsum-key.pub -p trust.txt \ libidn-1.43.tar.gz.proof < libidn-1.43.tar.gz You may learn more about Sigsum concepts and find instructions how to download the tools here: https://www.sigsum.org/getting-started/ This release is based on the libidn git repository, available as git clone https://git.savannah.gnu.org/git/libidn.git with commit e0e97997e1424cf2070c1cee01c66bee65d17b60 tagged as v1.43. For a summary of changes and contributors, see: https://git.sv.gnu.org/gitweb/?p=libidn.git;a=shortlog;h=v1.43 or run this command from a git-cloned libidn directory: git shortlog v1.42..v1.43 This release was bootstrapped with the following tools: Git 2.48.1 Gnulib 2025-02-01 c89cd2fbd3b9f3d7c5a146247256599714c91ec7 Autoconf 2.71 Automake 1.16.5 Libtoolize 2.4.7 Make 4.3 Makeinfo 7.1.1 Help2man 1.49.2 Gperf 3.1 Gengetopt 2.23 Gtkdocize 1.34.0 Tar 1.34
gsasl-2.2.2 released [stable]
2025-03-30
Thread
Simon Josefsson via Announcements and Requests for Help from the GNU project and the Free Software Foundation
This is to announce gsasl-2.2.2, a stable release. GNU SASL is a modern C library that implement the network security protocol Simple Authentication and Security Layer (SASL). The framework itself and a couple of common SASL mechanisms are implemented. GNU SASL can be used by network applications for IMAP, SMTP, XMPP and other protocols to provide authentication services. Supported mechanisms include CRAM-MD5, EXTERNAL, GSSAPI, ANONYMOUS, PLAIN, SECURID, DIGEST-MD5, SCRAM-SHA-1(-PLUS), SCRAM-SHA-256(-PLUS), GS2-KRB5, SAML20, OPENID20, LOGIN, and NTLM. There have been 61 commits by 2 people in the 65 weeks since 2.2.1. See the NEWS below for a brief summary. Thanks to everyone who has contributed! The following people contributed changes to this release: Daniel Macks (1) Simon Josefsson (60) Happy Hacking, Simon == The project's web page is available at: https://www.gnu.org/software/gsasl/ Manual: https://www.gnu.org/software/gsasl/manual/ https://www.gnu.org/software/gsasl/manual/gsasl.html - HTML format https://www.gnu.org/software/gsasl/manual/gsasl.pdf - PDF format API Reference manual: https://www.gnu.org/software/gsasl/reference/ - GTK-DOC HTML Doxygen documentation: https://www.gnu.org/software/gsasl/doxygen/ - HTML format https://www.gnu.org/software/gsasl/doxygen/gsasl.pdf - PDF format For development snapshot QA analysis see: https://gsasl.gitlab.io/gsasl/coverage/ https://gsasl.gitlab.io/gsasl/cyclo/ https://gsasl.gitlab.io/gsasl/clang-analyzer/ If you need help to use GNU SASL, or want to help others, you are invited to join our help-gsasl mailing list, see: https://lists.gnu.org/mailman/listinfo/help-gsasl Here are the compressed sources and a GPG detached signature: https://ftp.gnu.org/gnu/gsasl/gsasl-2.2.2.tar.gz https://ftp.gnu.org/gnu/gsasl/gsasl-2.2.2.tar.gz.sig Here is minimal source-only "git archive" sources: https://ftp.gnu.org/gnu/gsasl/gsasl-v2.2.2-src.tar.gz https://ftp.gnu.org/gnu/gsasl/gsasl-v2.2.2-src.tar.gz.sig Here are Sigsum Proofs: https://ftp.gnu.org/gnu/gsasl/gsasl-2.2.2.tar.gz.proof https://ftp.gnu.org/gnu/gsasl/gsasl-v2.2.2-src.tar.gz.proof Use a mirror for higher download bandwidth: https://www.gnu.org/order/ftp.html Here are the SHA1 and SHA256 checksums: 8a845b7ec78e5f27bf69438074ad23867c00d4fe gsasl-2.2.2.tar.gz QejkQmSOzK9kWdmtk9SxhTC5bI6vUOPzQlMu8nXv87o= gsasl-2.2.2.tar.gz 99dc5d5d991e3ab7e2a17fdf70167717a8ae9ee2 gsasl-v2.2.2-src.tar.gz lg8/tscZUEpLMvEGUTpHbuII1IRXEZQsIqZsSFIjbB4= gsasl-v2.2.2-src.tar.gz Verify the base64 SHA256 checksum with cksum -a sha256 --check from coreutils-9.2 or OpenBSD's cksum since 2007. Use a .sig file to verify that the corresponding file (without the .sig suffix) is intact. First, be sure to download both the .sig file and the corresponding tarball. Then, run a command like this: gpg --verify gsasl-2.2.2.tar.gz.sig The signature should match the fingerprint of the following key: pub ed25519 2019-03-20 [SC] B1D2 BD13 75BE CB78 4CF4 F8C4 D73C F638 C53C 06BE uid Simon Josefsson If that command fails because you don't have the required public key, or that public key has expired, try the following commands to retrieve or refresh it, and then rerun the 'gpg --verify' command. gpg --locate-external-key si...@josefsson.org gpg --recv-keys 51722B08FE4745A2 wget -q -O- 'https://savannah.gnu.org/project/release-gpgkeys.php?group=gsasl&download=1' | gpg --import - As a last resort to find the key, you can try the official GNU keyring: wget -q https://ftp.gnu.org/gnu/gnu-keyring.gpg gpg --keyring gnu-keyring.gpg --verify gsasl-2.2.2.tar.gz.sig Use the .proof files to verify the Sigsum proof. These files are like signatures but with extra transparency: you can cryptographically verify that every signature is logged in a public append-only log, so you can say with confidence what signatures exists. This makes hidden releases no longer deniable for the same public key. Releases are Sigsum-signed with the following public key: cat < jas-sigsum-key.pub ssh-ed25519 C3NzaC1lZDI1NTE5ILzCFcHHrKzVSPDDarZPYqn89H5TPaxwcORgRg+4DagE EOF Run a command like this to verify downloaded artifacts: wget -q -Otrust.txt https://gnu.org/s/gsasl/sigsum-policy-20250309.txt sigsum-verify -k jas-sigsum-key.pub -p trust.txt \ gsasl-2.2.2.tar.gz.proof < gsasl-2.2.2.tar.gz You may learn more about Sigsum concepts and find instructions how to download the tools here: https://www.sigsum.org/getting-started/ This release is based on the gsasl git repository, available as git clone https://git.savannah.gnu.org/git/gsasl.git with commit 50df5266e709c6e2cc4d3e7d95e6f7444578b7e6 tagged as v2.2.2. For a summary of changes and contributors, see: https://git.sv.gnu.org/gitweb/?p=gsasl.git;a=shortlog;h=v2.2.2 or run this command from a git-cloned gsasl directory: git