Commit Graph

84 Commits

Author SHA1 Message Date
Michael Tremer
918ee4a4cf strongswan: Manually install all routes for non-routed VPNs
This is a regression from disabling charon.install_routes.

VPNs are routing fine as long as traffic is passing through
the firewall. Traps are not propertly used as long as these
routes are not present and therefore we won't trigger any
tunnels when traffic originates from the firewall.

Fixes: #12045
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-04-08 16:44:57 +01:00
Michael Tremer
8be516b3bc strongswan: Do not create any NAT rules when using VTI/GRE
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-02-04 18:38:24 +00:00
Michael Tremer
b7ddf23b72 strongswan: Update to 5.7.2
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-01-22 05:32:42 +00:00
Michael Tremer
1c053ccee2 strongswan: Update to 5.7.1
Fixes security vulnerabilities: CVE-2018-16151, CVE-2018-16152 and
CVE-2018-17540.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2018-10-29 11:10:58 +00:00
Peter Müller
eee037b890 update disclaimer in LFS files
Most of these files still used old dates and/or domain names for contact
mail addresses. This is now replaced by an up-to-date copyright line.

Just some housekeeping... :-)

Signed-off-by: Peter Müller <peter.mueller@link38.eu>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2018-09-10 19:20:36 +01:00
Peter Müller
6cedc16d90 update cryptography settings in StrongSwan LFS file
The RC2 plugin was never supported by the WebUI and is insecure,
so it became obsolete here. To support new ChaCha20/Poly1305, the
corresponding module needs to be enabled.

Signed-off-by: Peter Müller <peter.mueller@link38.eu>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2018-07-01 13:34:32 +01:00
Peter Müller
df5cc48dd6 update StrongSwan to 5.6.3
This also takes advantage of changed crypto plugins (see first
patch) and updates the rootfile.

Signed-off-by: Peter Müller <peter.mueller@link38.eu>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2018-07-01 12:36:11 +01:00
Michael Tremer
ea3b9a4f88 strongswan: Update to 5.6.2
Fixed a DoS vulnerability in the parser for PKCS#1 RSASSA-PSS
signatures that was caused by insufficient input validation.
One of the configurable parameters in algorithm identifier
structures for RSASSA-PSS signatures is the mask generation
function (MGF). Only MGF1 is currently specified for this purpose.
However, this in turn takes itself a parameter that specifies
the underlying hash function. strongSwan's parser did not
correctly handle the case of this parameter being absent,
causing an undefined data read.

This vulnerability has been registered as CVE-2018-6459.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2018-02-19 23:46:17 +00:00
Michael Tremer
87ad0c591b strongswan: Update to 5.6.1
Drop support for Padlock which is not in wide usage
any more and creates some rootfile trouble every time.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-11-29 12:39:04 +00:00
Michael Tremer
0c55ec5a49 strongswan: Update to 5.6.0
Fixes CVE-2017-11185:

Fixed a DoS vulnerability in the gmp plugin that was caused by insufficient input validation
when verifying RSA signatures, which requires decryption with the operation m^e mod n,
where m is the signature, and e and n are the exponent and modulus of the public key.
The value m is an integer between 0 and n-1, however, the gmp plugin did not verify this.
So if m equals n the calculation results in 0, in which case mpz_export() returns NULL.
This result wasn't handled properly causing a null-pointer dereference.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-08-23 20:03:21 +01:00
Michael Tremer
33848e1d24 strongswan: Update to 5.5.3
Has security fixes for CVE-2017-9022 and CVE-2017-9023.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-06-01 10:06:57 +01:00
Michael Tremer
dc7d6b204d make.sh: Cleanup of polluted environment
The build environment is using a number of variables which
occasionally conflicted with some other build systems.

This patch cleans that up by renaming some variables and
later unexporting them in the lfs files.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-05-18 12:02:03 +01:00
Michael Tremer
1ef80c4352 strongswan: Update to version 5.5.2
Introduces support for Curve25519 for IKE as defined by RFC8031.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-04-05 12:08:39 +01:00
Michael Tremer
d38ed86f8b strongswan: Disable IPv6 by default
IPFire 2 does not have IPv6 connectivity with exception of a
few systems for testing where IPsec connections become a little
bit unstable when trying to connect over IPv6.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-03-15 12:56:05 +00:00
Jonatan Schlag
713151aaa8 Strongswan: Remove unnecessary commands concern initscripts
It is not necessary to copy the init scripts and remove the symlinks for
runnlevel interaction.

Signed-off-by: Jonatan Schlag <jonatan.schlag@ipfire.org>
2017-03-06 17:25:10 +01:00
Michael Tremer
e2b19d984c strongswan: Update to 5.5.1
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2016-11-28 21:38:29 +00:00
Michael Tremer
8029c2a899 strongswan: Update to 5.5.0
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2016-09-22 14:47:47 +01:00
Michael Tremer
4d7f9a81ac strongswan: Update to 5.3.5
Also ships a fix for #853 upstream.

Fixes #10998

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-19 14:09:10 +00:00
Michael Tremer
915c88931a strongswan: Update to 5.3.4
Fixes a security vulnerability in the EAP-MSCHAPv2 plugin
that is filed under CVE-2015-8023.

https://www.strongswan.org/blog/2015/11/16/strongswan-vulnerability-%28cve-2015-8023%29.html

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-11-19 12:52:31 +00:00
Michael Tremer
8235f17df5 strongswan: Update to 5.3.3
ChaCha is disabled since our kernel does not support it yet

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-10-03 19:17:01 +01:00
Michael Tremer
c3e1954331 strongswan: Update to 5.3.2
This release fixes a security issue filed under CVE-2015-4171.

https://www.strongswan.org/blog/2015/06/08/strongswan-vulnerability-(cve-2015-4171).html

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-06-12 17:15:51 +02:00
Michael Tremer
41ed4795fe strongswan: Update to 5.3.1
Fixed a denial-of-service and potential remote code execution vulnerability
triggered by IKEv1/IKEv2 messages that contain payloads for the respective
other IKE version. Such payload are treated specially since 5.2.2 but because
they were still identified by their original payload type they were used as
such in some places causing invalid function pointer dereferences.
The vulnerability has been registered as CVE-2015-3991.

https://www.strongswan.org/blog/2015/06/01/strongswan-vulnerability-%28cve-2015-3991%29.html

The increased buffer size has been fixed in bug #943 upstream
  https://wiki.strongswan.org/issues/943
2015-06-04 19:26:44 +02:00
Michael Tremer
ffe32bf7ae strongswan: Increase stroke buffer size to 8k 2015-04-27 20:58:45 +02:00
Michael Tremer
df5fbff531 strongswan: Update to 5.3.0
Enable support for CCM and CTR
2015-03-31 00:59:28 +02:00
Michael Tremer
dfea4f86c2 strongswan: Allow using AES-GCM in various configurations 2015-03-11 18:13:25 +01:00
Michael Tremer
8d289021d3 strongswan: Update solution for strongswan bug #816 2015-03-04 23:54:10 +01:00
Michael Tremer
dea158f2fc strongswan: Create configuration for better interoperability
Also import some upstream fixes for connection stability.
2015-02-11 15:15:47 +01:00
Michael Tremer
0cf8de0502 Revert "strongswan: Fix for CVE-2014-9221"
This reverts commit c1000c2cd4.

This commit has been merged from master to this branch, but
actually strongswan was already updated to version 5.2.2 which
does not need this fix any more.
2015-02-11 14:59:11 +01:00
Michael Tremer
de0ccf8f8c Merge branch 'master' into next
Conflicts:
	make.sh
2015-02-04 13:24:05 +01:00
Michael Tremer
e62b6718b9 strongswan: Update to 5.2.2 2015-01-12 13:04:47 +01:00
Michael Tremer
c1000c2cd4 strongswan: Fix for CVE-2014-9221 2015-01-12 13:03:16 +01:00
Michael Tremer
bb882aa1f9 strongswan: Update to 5.2.1 2014-10-26 21:00:08 +01:00
Michael Tremer
ec4e8d3fec strongswan: Update to version 5.2.0. 2014-07-09 22:15:43 +02:00
Michael Tremer
c007921b21 strongswan: Don't ship unity plugin any more.
Fixes #10569
2014-07-08 19:27:44 +02:00
Michael Tremer
8bc689164e strongswan: Update to 5.2.0rc1. 2014-07-05 20:08:28 +02:00
Michael Tremer
567fadff6a strongswan: Update to 5.2.0dr6. 2014-06-19 14:39:21 +02:00
Michael Tremer
d1b0815ff7 strongswan: Enable XAUTH noauth plugin.
See #10468.
2014-04-22 17:46:32 +02:00
Michael Tremer
fab1f85783 strongswan: Update to 5.1.3.
Fixes CVE-2014-2338.
2014-04-15 21:16:14 +02:00
Michael Tremer
fb5132aa57 strongswan: Update to 5.1.2.
http://www.strongswan.org/blog/2014/03/03/strongswan-5.1.2-released.html
2014-03-03 12:27:09 +01:00
Michael Tremer
bc05155ac0 strongswan: Update to 5.1.2rc1. 2014-02-18 15:16:08 +01:00
Michael Tremer
e360e50ac4 strongswan: Update to 5.1.2dr3. 2014-02-07 14:49:03 +01:00
Michael Tremer
0dff6b5b85 strongswan: Enable dhcp and farp plugin (#10467). 2014-01-29 15:01:57 +01:00
Arne Fitzenreiter
30f68903d3 Merge remote-tracking branch 'origin/next' into fifteen 2013-12-21 10:05:39 +01:00
Michael Tremer
cfb00625b8 strongswan: Disable rdrand plugin.
Disabled because of security concerns.
2013-12-12 21:15:24 +01:00
Arne Fitzenreiter
d0d3fe9d26 Merge remote-tracking branch 'origin/next' into fifteen
Conflicts:
	lfs/samba
	lfs/strongswan
2013-11-13 14:05:15 +01:00
Michael Tremer
c648458609 strongswan: Delay sending DPD packets after rekeying. 2013-11-13 00:25:27 +01:00
Michael Tremer
ec985733a5 strongswan: Update to 5.1.1. 2013-11-07 20:56:43 +01:00
Michael Tremer
6fb9681c24 strongswan: Update to 5.1.1rc1. 2013-10-28 21:00:03 +01:00
Michael Tremer
47a83092b5 Merge branch 'next' into fifteen 2013-10-27 13:12:12 +01:00
Michael Tremer
78e35c82dc strongswan: Update to 5.1.1dr4. 2013-10-22 15:01:24 +02:00