Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

strongswan-5.9.3-1.3 RPM for armv7hl

From OpenSuSE Ports Tumbleweed for armv7hl

Name: strongswan Distribution: openSUSE Tumbleweed
Version: 5.9.3 Vendor: openSUSE
Release: 1.3 Build date: Thu Oct 21 11:33:45 2021
Group: Productivity/Networking/Security Build host: obs-arm-10
Size: 2342 Source RPM: strongswan-5.9.3-1.3.src.rpm
Packager: http://bugs.opensuse.org
Url: https://www.strongswan.org/
Summary: IPsec-based VPN solution
StrongSwan is an IPsec-based VPN solution for Linux.

* Implements both the IKEv1 and IKEv2 (RFC 4306) key exchange protocols
* Fully tested support of IPv6 IPsec tunnel and transport connections
* Dynamic IP address and interface update with IKEv2 MOBIKE (RFC 4555)
* Automatic insertion and deletion of IPsec-policy-based firewall rules
* Strong 128/192/256 bit AES or Camellia encryption, 3DES support
* NAT Traversal via UDP encapsulation and port floating (RFC 3947)
* Dead Peer Detection (DPD, RFC 3706) takes care of dangling tunnels
* Static virtual IP addresses and IKEv1 ModeConfig pull and push modes
* XAUTH server and client functionality on top of IKEv1 Main Mode authentication
* Virtual IP address pool managed by IKE daemon or SQL database
* Secure IKEv2 EAP user authentication (EAP-SIM, EAP-AKA, EAP-MSCHAPv2, etc.)
* Optional relaying of EAP messages to AAA server via EAP-RADIUS plugin
* Support of IKEv2 Multiple Authentication Exchanges (RFC 4739)
* Authentication based on X.509 certificates or preshared keys
* Generation of a default self-signed certificate during first strongSwan startup
* Retrieval and local caching of Certificate Revocation Lists via HTTP or LDAP
* Full support of the Online Certificate Status Protocol (OCSP, RCF 2560).
* CA management (OCSP and CRL URIs, default LDAP server)
* Powerful IPsec policies based on wildcards or intermediate CAs
* Group policies based on X.509 attribute certificates (RFC 3281)
* Storage of RSA private keys and certificates on a smartcard (PKCS #11 interface)
* Modular plugins for crypto algorithms and relational database interfaces
* Support of elliptic curve DH groups and ECDSA certificates (Suite B, RFC 4869)
* Optional built-in integrity and crypto tests for plugins and libraries
* Linux desktop integration via the strongSwan NetworkManager applet

This package triggers the installation of both, IKEv1 and IKEv2 daemons.

Provides

Requires

License

GPL-2.0-or-later

Changelog

* Mon Sep 27 2021 Bjørn Lie <bjorn.lie@gmail.com>
  - Update to version 5.9.3:
    * Added AES-ECB, SHA-3 and SHAKE-256 support to the wolfssl
      plugin.
    * Added AES-CCM support to the openssl plugin (#353).
    * The x509 and the openssl plugins now consider the
      authorityKeyIdentifier, if available, before verifying
      signatures, which avoids unnecessary signature verifications
      after a CA key rollover if both CA certificates are loaded.
      The openssl plugin now does the same also for CRLs (the x509
      plugin already did).
    * The pkcs11 plugin better handles optional attributes like
      CKA_TRUSTED, which previously depended on a version check.
    * The NetworkManager backend (charon-nm) now supports using SANs
      as client identities, not only full DNs (#437).
    * charon-tkm now handles IKE encryption.
    * Send a MOBIKE update again if a a change in the NAT mappings is
      detected but the endpoints stay the same (e143a7d).
    * A deadlock in the HA plugin introduced with 5.9.2 has been
      fixed (#456).
    * DSCP values are now also set for NAT keepalives.
    * The ike_derived_keys() hook now receives more keys but in a
      different order (4e29d6f).
    * Converted most of the test case scenarios to the vici
      interface.
  - Replace libsoup-devel with pkgconfig(libsoup-2.4) BuildRequires,
    as this is what really checks for. Needed as libsoup-3.0 is
    released.
* Mon Sep 07 2020 Jan Engelhardt <jengelh@inai.de>
  - Update to release 5.9.0
    * Prefer AEAD algorithms for ESP; this puts AES-GCM in a default
      AEAD proposal in front of the previous default proposal.
    * If a connection fails after getting redirected, we now
      restart connecting to the original host, not the one
      redirected to.
    * For peers that don't send the EAP_ONLY_AUTHENTICATION notify
      but still expect to use EAP-only authentication, the
      charon.force_eap_only_authentication option can be enabled to
      force this type of authentication even on non-compliant
      peers.
    * IPv6 virtual IPs are now always enumerated, ignoring the
      charon.prefer_temporary_addrs setting, which should fix route
      installation if the latter is enabled.
* Tue Sep 01 2020 Jan Engelhardt <jengelh@inai.de>
  - Enable bypass-lan strongswan plugin
* Fri May 01 2020 Bjørn Lie <bjorn.lie@gmail.com>
  - Update to version 5.8.4:
    * In IKEv1 Quick Mode make sure that a proposal exists before
      determining lifetimes (fixes a crash due to a null-pointer
      dereference in 5.8.3).
    * OpenSSL currently doesn't support squeezing bytes out of a
      SHAKE128/256 XOF (support was added with 5.8.3) multiple times.
      Unfortunately, EVP_DigestFinalXOF() completely resets the
      context and later calls not simply fail, they cause a
      null-pointer dereference in libcrypto. c5c1898d73 fixes the
      crash at the cost of repeating initializing the whole state and
      allocating too much data for subsequent calls (hopefully, once
      the OpenSSL issue 7894 is resolved we can implement this more
      efficiently).
    * On 32-bit platforms, reading arbitrary 32-bit integers from
      config files (e.g. for charon.spi_min/max) has been fixed.
    * charon-nm now allows using fixed source ports.
  - Changes from version 5.8.3:
    * Updates for the NM plugin (and backend, which has to be updated
      to be compatible):
      + EAP-TLS authentication (#2097)
      + Certificate source (file, agent, smartcard) is selectable
      independently
      + Add support to configure local and remote identities (#2581)
      + Support configuring a custom server port (#625)
      + Show hint regarding password storage policy
      + Replaced the term "gateway" with "server"
      + Fixes build issues due to use of deprecated GLib
      macros/functions
      + Updated Glade file to GTK 3.2
    * The NM backend now supports reauthentication and redirection.
    * Previously used reqids are now reallocated, which works around
      an issue on FreeBSD where the kernel doesn't allow the daemon
      to use reqids > 16383 (#2315).
    * On Linux, throw type routes are installed in table 220 for
      passthrough policies. The kernel will then fall back on routes
      in routing tables with lower priorities for matching traffic.
      This way, they require less information (e.g. no interface or
      source IP) and can be installed earlier and are not affected by
      updates.
    * For IKEv1, the lifetimes of the actually selected transform are
      returned to the initiator, which is an issue if the peer uses
      different lifetimes for different transforms (#3329). We now
      also return the correct transform and proposal IDs (proposal ID
      was always 0, transform ID 1). IKE_SAs are now not
      re-established anymore (e.g. after several retransmits) if a
      deletion has been queued (#3335).
    * Added support for Ed448 keys and certificates via openssl
      plugin and pki tool.
    * Added support for SHA-3 and SHAKE128/256 in the openssl plugin.
    * The use of algorithm IDs from the private use range can now be
      enabled globally, to use them even if no strongSwan vendor ID
      was exchanged (05e373aeb0).
    * Fixed a compiler issue that may have caused invalid keyUsage
      extensions in certificates (#3249).
    * A lot of spelling fixes.
    * Fixed several reported issues.
  - Drop 0006-Resolve-multiple-definition-of-swanctl_dir.patch: Fixed
    upstream.
* Tue Mar 31 2020 Madhu Mohan Nelemane <mmnelemane@suse.com>
  - Fix to resolve multiple definitions for swanctl_dir (bsc#1164493)
    [+ 0006-Resolve-multiple-definition-of-swanctl_dir.patch ]
* Mon Feb 17 2020 Johannes Kastl <kastl@b1-systems.de>
  - move file %{_datadir}/dbus-1/system.d/nm-strongswan-service.conf
    to strongswan-nm subpackage, as it is needed for the
    NetworkManager plugin that uses strongswan-nm, not
    strongswan-ipsec
    This fixes the following error:
    ```
    Failed to initialize a plugin instance: Connection ":1.153" is not
    allowed to own the service "org.freedesktop.NetworkManager.strongswan"
    due to security policies in the configuration file
    ```
* Thu Jan 30 2020 Bjørn Lie <bjorn.lie@gmail.com>
  - Drop upstream fixed patches:
    * strongswan_modprobe_syslog.patch
    * strongswan_fipsfilter.patch
    * 0006-fix-compilation-error-by-adding-stdint.h.patch
* Sun Jan 26 2020 Jan Engelhardt <jengelh@inai.de>
  - Replace %__-type macro indirections. Update homepage URL to https.
* Mon Jan 06 2020 Bjørn Lie <bjorn.lie@gmail.com>
  - Update to version 5.8.2:
    * The systemd service units have changed their name.
      "strongswan" is now "strongswan-starter", and
      "strongswan-swanctl" is now "strongswan".
      After installation, you need to `systemctl disable` the old
      name and `systemctl enable`+start the new one.
    * Fix CVE-2018-17540, CVE-2018-16151 and CVE-2018-16152.
    * boo#1109845 and boo#1107874.
  - Please check included NEWS file for info on what other changes
    that have been done in versions 5.8.2, 5.8.1 5.8.0, 5.7.2, 5.7.1
    and 5.7.0.
  - Rebase strongswan_ipsec_service.patch.
  - Disable patches that need rebase or dropping:
    * strongswan_modprobe_syslog.patch
    * 0006-fix-compilation-error-by-adding-stdint.h.patch
  - Add conditional pkgconfig(libsystemd) BuildRequires: New
    dependency.
* Wed Jun 06 2018 bjorn.lie@gmail.com
  - Update to version 5.6.3 (CVE-2018-10811, boo#1093536,
    CVE-2018-5388, boo#1094462):
    * Fixed a DoS vulnerability in the IKEv2 key derivation if the
      openssl plugin is used in FIPS mode and HMAC-MD5 is negotiated
      as PRF. This vulnerability has been registered as
      CVE-2018-10811, boo#1093536.
    * Fixed a vulnerability in the stroke plugin, which did not check
      the received length before reading a message from the socket.
      Unless a group is configured, root privileges are required to
      access that socket, so in the default configuration this
      shouldn't be an issue. This vulnerability has been registered
      as CVE-2018-5388, boo#1094462.
    * CRLs that are not yet valid are now ignored to avoid problems
      in scenarios where expired certificates are removed from new
      CRLs and the clock on the host doing the revocation check is
      trailing behind that of the host issuing CRLs. Not doing this
      could result in accepting a revoked and expired certificate, if
      it's still valid according to the trailing clock but not
      contained anymore in not yet valid CRLs.
    * The issuer of fetched CRLs is now compared to the issuer of the
      checked certificate (#2608).
    * CRL validation results other than revocation (e.g. a skipped
      check because the CRL couldn't be fetched) are now stored also
      for intermediate CA certificates and not only for end-entity
      certificates, so a strict CRL policy can be enforced in such
      cases.
    * In compliance with RFC 4945, section 5.1.3.2, certificates used
      for IKE must now either not contain a keyUsage extension (like
      the ones generated by pki), or have at least one of the
      digitalSignature or nonRepudiation bits set.
    * New options for vici/swanctl allow forcing the local
      termination of an IKE_SA. This might be useful in situations
      where it's known the other end is not reachable anymore, or
      that it already removed the IKE_SA, so retransmitting a DELETE
      and waiting for a response would be pointless.
    * Waiting only a certain amount of time for a response (i.e.
      shorter than all retransmits would be) before destroying the
      IKE_SA is also possible by additionally specifying a timeout in
      the forced termination request.
    * When removing routes, the kernel-netlink plugin now checks if
      it tracks other routes for the same destination and replaces
      the installed route instead of just removing it. Same during
      installation, where existing routes previously weren't
      replaced. This should allow using traps with virtual IPs on
      Linux (#2162).
    * The dhcp plugin now only sends the client identifier DHCP
      option if the identity_lease setting is enabled (7b660944b6).
      It can also send identities of up to 255 bytes length, instead
      of the previous 64 bytes (30e886fe3b, 0e5b94d038). If a server
      address is configured, DHCP requests are now sent from port 67
      instead of 68 to avoid ICMP port unreachables (becf027cd9).
    * The handling of faulty INVALID_KE_PAYLOAD notifies (e.g. one
      containing a DH group that wasn't proposed) during
      CREATE_CHILD_SA exchanges has been improved (#2536).
    * Roam events are now completely ignored for IKEv1 SAs (there is
      no MOBIKE to handle such changes properly).
    * ChaCha20/Poly1305 is now correctly proposed without key length
      (#2614). For compatibility with older releases the
      chacha20poly1305compat keyword may be included in proposals to
      also propose the algorithm with a key length (c58434aeff).
    * Configuration of hardware offload of IPsec SAs is now more
      flexible and allows a new setting (auto), which automatically
      uses it if the kernel and device both support it. If hw_offload
      is set to yes and offloading is not supported, the CHILD_SA
      installation now fails.
    * The kernel-pfkey plugin optionally installs routes via internal
      interface (one with an IP in the local traffic selector). On
      FreeBSD, enabling this selects the correct source IP when
      sending packets from the gateway itself (e811659323).
    * SHA-2 based PRFs are supported in PKCS#8 files as generated by
      OpenSSL 1.1 (#2574).
    * The pki --verify tool may load CA certificates and CRLs from
      directories.
    * The IKE daemon now also switches to port 4500 if the remote
      port is not 500 (e.g. because the remote maps the response to a
      different port, as might happen on Azure), as long as the local
      port is 500 (85bfab621d).
    * Fixed an issue with DNS servers passed to NetworkManager in
      charon-nm (ee8c25516a).
    * Logged traffic selectors now always contain the protocol if
      either protocol or port are set (a36d8097ed).
    * Only the inbound SA/policy will be updated as reaction to IP
      address changes for rekeyed CHILD_SAs that are kept around.
    * The parser for strongswan.conf/swanctl.conf now accepts =
      characters in values without having to put the value in quotes
      (e.g. for Base64 encoded shared secrets).
  - Rename strongswan-5.6.2-rpmlintrc to strongswan-rpmlintrc,
    changing the version string on every version update makes no
    sense.
* Tue Apr 17 2018 bjorn.lie@gmail.com
  - Update to version 5.6.2:
    * Fixed a DoS vulnerability in the parser for PKCS#1 RSASSA-PSS
      signatures that was caused by insufficient input validation.
      One of the configurable parameters in algorithm identifier
      structures for RSASSA-PSS signatures is the mask generation
      function (MGF). Only MGF1 is currently specified for this
      purpose. However, this in turn takes itself a parameter that
      specifies the underlying hash function. strongSwan's parser did
      not correctly handle the case of this parameter being absent,
      causing an undefined data read. This vulnerability has been
      registered as CVE-2018-6459.
    * When rekeying IKEv2 IKE_SAs the previously negotiated DH group
      will be reused, instead of using the first configured group,
      which avoids an additional exchange if the peer previously
      selected a different DH group via INVALID_KE_PAYLOAD notify.
      The same is also done when rekeying CHILD_SAs except for the
      first rekeying of the CHILD_SA that was created with the
      IKE_SA, where no DH group was negotiated yet. Also, the
      selected DH group is moved to the front in all sent proposals
      that contain it and all proposals that don't are moved to the
      back in order to convey the preference for this group to the
      peer.
    * Handling of MOBIKE task queuing has been improved. In
      particular, the response to an address update (with NAT-D
      payloads) is not ignored anymore if only an address list update
      or DPD is queued as that could prevent updating the UDP
      encapsulation in the kernel.
    * On Linux, roam events may optionally be triggered by changes to
      the routing rules, which can be useful if routing rules
      (instead of e.g. route metrics) are used to switch from one to
      another interface (i.e. from one to another routing table).
      Since routing rules are currently not evaluated when doing
      route lookups this is only useful if the kernel-based route
      lookup is used (4664992f7d).
    * The fallback drop policies installed to avoid traffic leaks
      when replacing addresses in installed policies are now replaced
      by temporary drop policies, which also prevent acquires because
      we currently delete and reinstall IPsec SAs to update their
      addresses (35ef1b032d).
    * Access X.509 certificates held in non-volatile storage of a TPM
      2.0 referenced via the NV index.
    * Adding the --keyid parameter to pki --print allows to print
      private keys or certificates stored in a smartcard or a TPM
      2.0.
    * Fixed proposal selection if a peer incorrectly sends DH groups
      in the ESP proposal during IKE_AUTH and also if a DH group is
      configured in the local ESP proposal and
      charon.prefer_configured_proposals is disabled (d058fd3c32).
    * The lookup for PSK secrets for IKEv1 has been improved for
      certain scenarios (see #2497 for details).
    * MSKs received via RADIUS are now padded to 64 bytes to avoid
      compatibility issues with EAP-MSCHAPv2 and PRFs that have a
      block size < 64 bytes (e.g. AES-XCBC-PRF-128, see 73cbce6013).
    * The tpm_extendpcr command line tool extends a digest into a TPM
      PCR.
    * Ported the NetworkManager backend from the deprecated
      libnm-glib to libnm.
    * The save-keys debugging/development plugin saves IKE and/or ESP
      keys to files compatible with Wireshark.
  - Following upstreams port, replace NetworkManager-devel with
    pkgconfig(libnm) BuildRequires.
  - Refresh patches with quilt.
  - Disable strongswan_fipsfilter.patch, needs rebase or dropping,
    the file it patches no longer exists in tarball.
* Fri Mar 16 2018 mmnelemane@suse.com
  - Removed unused requires and macro calls(bsc#1083261)

Files

/usr/share/doc/packages/strongswan
/usr/share/doc/packages/strongswan/README.SUSE


Generated by rpm2html 1.8.1

Fabrice Bellet, Mon Nov 29 00:00:07 2021