Skip to content

Releases: Nitrokey/nitrokey-3-firmware

v1.7.0-rc.1

06 Mar 12:32
v1.7.0-rc.1
107971a
Compare
Choose a tag to compare
v1.7.0-rc.1 Pre-release
Pre-release

Changelog

Features

  • Report errors when loading the configuration during initialization and disable opcard if an error occured (#394)
  • Fix LED during user presence check for NK3AM (#93)
  • fido-authenticator: Implement CTAP 2.1
  • OpenPGP: fix locking out after an aborted factory-reset operation (#443)

v1.6.0-test.20231218

18 Dec 13:27
v1.6.0-test.20231218
90362e0
Compare
Choose a tag to compare
v1.6.0-test.20231218 Pre-release
Pre-release

This update requires pynitrokey v0.4.35 or newer. You can install it with:

$ nitropy nk3 update --version v1.6.0-test.20231218

Changes

(since v1.6.0-test.20231206)

Opcard (OpenPGP): Add experimental configuration option to enable the SE050 secure element backend. This can be done, with pynitrokey v0.4.44: nitropy nk3 set-config opcard.use_se050_backend true.

This will cause a factory-reset of opcard data. On older versions of nitropy, the command may work but will require a power cycle of the device before opcard is functional.

This new backend will increase the security of PIN protected operations. It will also improve the performance of cryptographic operation, especially RSA. This means that when the secure element backend is enabled, RSA 4096 bit keys can now be generated on-device.

Fixed

  • Piv: Fixed generation of RSA keys.

Functions

Stable

Unstable

v1.6.0-test.20231206

06 Dec 14:13
v1.6.0-test.20231206
6c45a90
Compare
Choose a tag to compare
v1.6.0-test.20231206 Pre-release
Pre-release

This update requires pynitrokey v0.4.35 or newer. You can install it with:

$ nitropy nk3 update --version v1.6.0-test.20231206

Changes

(since v1.6.0)

Changed

  • FIDO: add support for large-blobs (#385)

Fixed

  • Reduced binary size (#397)

Functions

Stable

Unstable

v1.6.0

24 Nov 17:08
v1.6.0
991c112
Compare
Choose a tag to compare

Changes

Features

  • usbip: Add user presence check (#314, #321)
  • admin-app: Add config mechanism (#344)

Changed

Fixed

  • fido-authenticator: Reduce the maximum credential ID length for improved compatibility (fido-authenticator#37)
  • fido-authenticator: Multiple changes to improve compliance with the specification (overview: fido-authenticator#6)
  • Upgrade opcard to v1.2.0, fixing memory issues when using multiple RSA keys, potential data corruption, correct handling of non canonical curve25519 public keys and properly rejecting NFC requests (#376)
  • Correct maximum binary size for LPC55 and only enable PRINCE for the subregions used for the filesystem (#355)
  • lpc55: Move USB initialization to the end of the boot process to make sure that the device can respond to all requests, fixing a potential delay when connecting the device under Linux (#302)

Functions

v1.6.0-rc.1

10 Nov 12:52
v1.6.0-rc.1
23a03a7
Compare
Choose a tag to compare
v1.6.0-rc.1 Pre-release
Pre-release

Features

  • Add an SE050 driver and its tests (#335)
  • usbip: Add user presence check (#314, #321)
  • admin-app: Add config mechanism (#344)

Changed

Fixed

  • fido-authenticator: Reduce the maximum credential ID length for improved compatibility (fido-authenticator#37)
  • fido-authenticator: Multiple changes to improve compliance with the specification (overview: fido-authenticator#6)
  • Upgrade opcard to v1.2.0, fixing memory issues when using multiple RSA keys, potential data corruption, correct handling of non canonical curve25519 public keys and properly rejecting NFC requests (#376)
  • Correct maximum binary size for LPC55 and only enable PRINCE for the subregions used for the filesystem (#355)
  • lpc55: Move USB initialization to the end of the boot process to make sure that the device can respond to all requests, fixing a potential delay when connecting the device under Linux (#302)

v1.5.0-test.20231030

30 Oct 08:24
v1.5.0-test.20231030
ba8dbeb
Compare
Choose a tag to compare
v1.5.0-test.20231030 Pre-release
Pre-release

This update requires pynitrokey v0.4.35 or newer. You can install it with:

$ nitropy nk3 update --version v1.5.0-test.20231030

Changes

(since v1.5.0-test.20230704)

Features

  • Add an SE050 driver and its tests (#335)
  • usbip: Add user presence check (#314, #321)
  • admin-app: Add config mechanism (#344)

Changed

  • Use SE050 entropy to bootstrap the random number generator (#335)
  • secrets-app: Update to v0.13.0-rc.1
  • Improve stack usage of several components (#353)

Fixed

  • fido-authenticator: Reduce the maximum credential ID length for improved compatibility (fido-authenticator#37)
  • fido-authenticator: Multiple changes to improve compliance with the specification (overview: fido-authenticator#6)
  • Correct maximum binary size for LPC55 and only enable PRINCE for the subregions used for the filesystem (#355)

Functions

Stable

Unstable

v1.5.0-test.20230704

06 Jul 17:41
v1.5.0-test.20230704
f1ef5e5
Compare
Choose a tag to compare
v1.5.0-test.20230704 Pre-release
Pre-release

This update requires pynitrokey v0.4.35 or newer. Once binaries are available you can install it with:

$ nitropy nk3 update --version v1.5.0-test.20230704

Fixed:

  • Luks with systemd-cryptenroll now does not panic after a reboot #286
  • All secrets within the Secrets App can now be listed #300
  • Secrets App entries can not be removed without touch button press now
  • NFC interface is completely blocked now for applications not supporting it #301

This release adds a new application, Nitrokey Webcrypt, which is aimed at integrating hardware security key features into web applications. Check it out at:

Nitrokey is an open source hardware USB key for data encryption and two-factor authentication with FIDO. While FIDO is supported by web browsers, using Nitrokey as a secure key store for email and (arbitrary) data encryption requires native software. Therefore email encryption in webmail has not been possible with the Nitrokey until now. At the same time strong end-to-end encryption in web applications all share the same challenge: To store users’ private keys securely and conveniently. Therefore secure end-to-end encryption usually requires native software as well (e.g. instant messenger app) or – less secure – store the user keys password-encrypted on servers. Nitrokey aims to solve these issues by developing a way to use Nitrokey with web applications. To avoid the necessity of device drivers, browser add-on or separate software this project is going to utilize the FIDO (CTAP) protocol. As a result the solution will work with any modern browser (which all support WebAuthn), on any operating system even on Android. This will give any web application the option to store a users’ private keys locally on a Nitrokey they control.

Note: Nitrokey WebCrypt is under process of renaming to Nitrokey WebSmartCard.

Functions

Stable

Unstable

v1.5.0-test.20230613

14 Jun 09:19
v1.5.0-test.20230613
6fe0e24
Compare
Choose a tag to compare
v1.5.0-test.20230613 Pre-release
Pre-release

This update requires pynitrokey v0.4.35 or newer. You can install it with:

$ nitropy nk3 update --version v1.5.0-test.20230613

This release contains a bug fix in the unstable PIV application regarding P-256 signatures.

Functions

Stable

Unstable

v1.5.0-test.20230605

05 Jun 15:57
v1.5.0-test.20230605
ebe45bf
Compare
Choose a tag to compare
v1.5.0-test.20230605 Pre-release
Pre-release

This update requires pynitrokey v0.4.35 or newer. You can install it with:

$ nitropy nk3 update --version v1.5.0-test.20230605

Functions

Stable

Unstable

v1.5.0

31 May 15:38
v1.5.0
b230f92
Compare
Choose a tag to compare

This update requires pynitrokey v0.4.35 or newer. You can install it with:

$ nitropy nk3 update --version v1.5.0

Functions

Changes

Features

  • Upgrade the secrets function to version 0.11.0, adding support for static passwords, and KeepassXC integration (#278)

Changed

  • Upgrade the OpenPGP function to version 1.1.0, fixing minor specification compliance issues and an unlikely data corruption scenario

Fixed

  • Upgrade ctaphid-dispatch, fixing panics after cancelled operations