Commit Graph

55 Commits

Author SHA1 Message Date
Adolf Belka
7c3540fa93 strongswan: Update to version 5.9.12
- Update from version 5.9.11 to 5.9.12
- Update of rootfile
- Changelog
    5.9.12
	Vulnerabilities
	    Fixed a vulnerability in charon-tkm (the TKM-backed version of the charon IKE
	     daemon) related to processing DH public values that can lead to a buffer
	     overflow and potentially remote code execution. This vulnerability has been
	     registered as CVE-2023-41913. Please refer to our blog for details.
	New Feature Additions
	    The new pki --ocsp command produces OCSP responses based on certificate status
	     information provided by implementations of the new ocsp_responder_t interface
	     (#1958).
	    Two sources are currently available, the openxpki plugin that directly
	     accesses the OpenXPKI database and the command's --index argument, which
	     reads certificate status information from OpenSSL-style index.txt files
	     (multiple CAs are supported concurrently).
	    The new cert-enroll script handles the initial enrollment of an X.509 host
	     certificate with a PKI server via the EST or SCEP protocols.
	    Run as a systemd timer or via a crontab entry, the script checks the
	     expiration date of the host certificate daily. When a given deadline is
	     reached, the host certificate is automatically renewed via EST or SCEP
	     re-enrollment based on the possession of the old private key and the
	     matching certificate.
	    Added a global option (charon.reject_trusted_end_entity) to prevent peers
	     from authenticating with certificates that are locally trusted, in
	     particular, our own local certificate, which safeguards against accidental
	     reuse of certificates on multiple peers. As the name suggests, all trusted
	     end-entity certificates are rejected if enabled, so peer certificates can't
	     be configured explicitly anymore (e.g. via remote.certs in swanctl.conf).
	    The --priv argument for charon-cmd allows the use of any type of private key
	     (previously, only RSA keys were supported).
	    The openssl plugin now supports the nameConstraints extension in X.509
	     certificates (#1990).
	    Support for nameConstraints of type iPAddress are now supported by the x509,
	     openssl and constraints plugins (#1991).
	    Support for encoding subjectAlternativeName extensions of type
	     uniformResourceIdentifier in X.509 certificates has been added via the uri:
	     prefix (e.g. for URNs, #1983).
	    Support for password-less PKCS#12 and PKCS#8 files has been added (#1955).
	Enhancements and Optimizations
	    Because of a relatively recent NIAP requirement (TD0527, Test 8b), loading of
	     certificates with ECDSA keys that explicitly encode the curve parameters is
	     rejected if possible. Explicit encoding is pretty rare to begin with and
	     e.g. wolfSSL already rejects such keys, by default. All crypto plugins that
	     support ECDSA enforce this by rejecting such public keys, except when using
	     older versions of OpenSSL (< 1.1.1h) or Botan (< 3.2.0) (#1949).
	    Make the NetworkManager plugin (charon-nm) actually use the XFRM interface it
	     creates since 5.9.10. This involves setting interface IDs on SAs and
	     policies, and installing routes via the interface. To avoid routing loops if
	     the remote traffic selectors include the VPN server, IKE and ESP packets are
	     marked to bypass the routing table that contains the routes via XFRM
	     interface (69e0c11).
	    If available, the plugin now also adopts the interface name configured in
	     connection.interface-name in a *.nmconnection file as name for the XFRM
	     interface instead of generating one randomly (e8f8d32).
	    The resolve plugin tries to maintain the order of DNS servers it installs via
	     resolvconf or resolv.conf (6440975, 8238ad4).
	    The kernel-libipsec plugin now always installs routes to remote networks even
	     if no address is found in the local traffic selectors, which allows
	     forwarding traffic from networks the VPN host is not part of (190d8cb).
	    Increased the default receive buffer size for Netlink sockets to 8 MiB
	     (doubled by the kernel to account for overhead) and simplified the
	     configuration (no need for a separate option to force overriding rmem_max).
	     It's now also set for event sockets, which previously could cause issues on
	     hosts with e.g. lots of route changes (#1757).
	    When issuing certificates, the subjectKeyIdentifier of the issuing
	     certificate, if available, is now copied as authorityKeyIdentifier, instead
	     of always generating a SHA-1 hash of the issuer's subjectPublicKey
	     (#1992, 6941dcb).
	    Explicitly request permission to display notifications on Android 13+
	     (ddf84c1), also enabled hardware acceleration for the Android-specific
	     OpenSSL build.
	Fixes
	    Fixed issues while reestablishing multiple CHILD_SAs (e.g. after a DPD
	     timeout) that could cause a reqid to get assigned to multiple CHILD_SAs with
	     unrelated traffic selectors (#1855).
	    Fixed an issue in watcher_t with handling errors on sockets (e.g. if the
	     receive buffer is full), which caused an infinite loop if poll() only
	     signaled POLLERR as event (#1757).
	    Fixed an issue in the IKE_SA_INIT tracking code that was added with 5.9.6,
	     which did not correctly untrack invalid messages with non-zero message IDs
	     or SPIs (0b47357).
	    Fixed a regression introduced with 5.9.8 when handling IKE redirects during
	     IKE_AUTH (595fa07).
	    Fixed adding the XFRMA_REPLAY_ESN_VAL attribute twice when updating SAs in
	     the kernel-netlink plugin, which prevented MOBIKE updates if a large
	     anti-replay window was used (#1967).
	    Fixed a race condition in the kernel-pfroute plugin when adding virtual IPs
	     if the TUN device is activated after the address was already added
	     internally, which caused the installed route not to go via TUN device in
	     order to force the virtual IP as source address (#1807).
	    Fixed an issue in libtls that could cause the wrong ECDH group to get
	     instantiated (b5e4bf4).
	    Fixed the encoding of the CHILD_SA_NOT_FOUND notify if a CHILD_SA is not
	     found during rekeying. It was previously empty, now contains the SPI and
	     sets the protocol to the values received in the REKEY_SA notify (849c2c9).
	    Fixed a possible issue with MOBIKE in the Android client on certain devices
	     (#1691).
	For Developers
	    The new ocsp_responder_t interface can be implemented to provide certificate
	     status information to the pki --ocsp command. Responders can be
	     (un-)registered via the ocsp_responders_t instance at lib->ocsp.
	    For the watcher_t component, WATCHER_EXCEPT has been removed as there is no
	     way to explicitly listen for errors on sockets and poll() actually can
	     return POLLERR for any FD and it might even be the only signaled event
	     (which caused an infinite loop previously). Now we simply notify the
	     registered callbacks. The error is then reported by e.g. recvfrom(), which
	     was already the case before if POLLERR was returned together with
	     e.g. POLLIN.
	    The reqids allocated for CHILD_SAs (including trap policies) via
	     kernel_interface_t::alloc_reqid() are now refcounted. When recreating a
	     CHILD_SA, a reference to the reqid can be requested via
	     child_sa_t::get_reqid_ref(). If another reference is required afterwards,
	     one can be acquired directly via kernel_interface_t::ref_reqid(). Each
	     reference has to be released via kernel_interface_t::release_reqid(), whose
	     interface was simplified.
	    The testing environment is now based on Debian 12 (bookworm), by default.
	     Also, when copying files to guests, the guest-specific files are now copied
	     after the default files, which allows overriding files per guest (fixes an
	     issue with winnetou's /etc/fstab and mounting the test results).
	Refer to the 5.9.12 milestone for a list of all closed issues and pull requests.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2023-11-22 14:50:25 +00:00
Peter Müller
4929efb7d8 strongSwan: Update to 5.9.8
Please refer to https://github.com/strongswan/strongswan/releases/tag/5.9.8
for the release announcement of this version.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2022-10-24 08:56:08 +00:00
Peter Müller
4943252194 strongSwan: Update to 5.9.7
Please refer to https://github.com/strongswan/strongswan/releases/tag/5.9.7
for the release notes of this version.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-18 07:57:03 +00:00
Peter Müller
9f42266a59 strongswan: Update rootfile
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-05-13 09:22:35 +00:00
Michael Tremer
2ff56df4e0 strongswan: Build sha3 plugin
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-04-01 14:40:39 +00:00
Peter Müller
b427793a58 strongSwan: update to 5.8.2
Please refer to https://wiki.strongswan.org/versions/75 for release notes.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Acked-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-03-21 16:27:22 +00:00
Michael Tremer
7b6d2972e3 strongswan: Update to 5.8.0
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-28 13:05:50 +01:00
Peter Müller
df5cc48dd6 update StrongSwan to 5.6.3
This also takes advantage of changed crypto plugins (see first
patch) and updates the rootfile.

Signed-off-by: Peter Müller <peter.mueller@link38.eu>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2018-07-01 12:36:11 +01:00
Michael Tremer
14d0e151b6 Update strongswan rootfile
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-11-30 16:09:48 +00:00
Michael Tremer
87ad0c591b strongswan: Update to 5.6.1
Drop support for Padlock which is not in wide usage
any more and creates some rootfile trouble every time.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-11-29 12:39:04 +00:00
Arne Fitzenreiter
d57f8d886f strongswan: rootfile update
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2017-08-30 19:03:25 +02:00
Michael Tremer
1ef80c4352 strongswan: Update to version 5.5.2
Introduces support for Curve25519 for IKE as defined by RFC8031.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-04-05 12:08:39 +01:00
Arne Fitzenreiter
00d2007b04 strongswan: fix rootfile (padlock)
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2017-01-09 18:09:43 +01:00
Michael Tremer
e2b19d984c strongswan: Update to 5.5.1
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2016-11-28 21:38:29 +00:00
Michael Tremer
1c7a3c56ef Revert "strongswan 5.5.0: update for rootfile"
The padlock module is only built on i586

This reverts commit 2ac05ca54c.
2016-09-24 12:55:24 +01:00
Matthias Fischer
2ac05ca54c strongswan 5.5.0: update for rootfile
Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2016-09-24 12:25:46 +01:00
Michael Tremer
8029c2a899 strongswan: Update to 5.5.0
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2016-09-22 14:47:47 +01:00
Michael Tremer
8235f17df5 strongswan: Update to 5.3.3
ChaCha is disabled since our kernel does not support it yet

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-10-03 19:17:01 +01:00
Arne Fitzenreiter
0f3d0cec24 strongswan: rootfile update 2015-04-09 15:29:25 +02:00
Michael Tremer
df5fbff531 strongswan: Update to 5.3.0
Enable support for CCM and CTR
2015-03-31 00:59:28 +02:00
Michael Tremer
dfea4f86c2 strongswan: Allow using AES-GCM in various configurations 2015-03-11 18:13:25 +01:00
Michael Tremer
dc188082d5 Rootfile update. 2014-07-10 19:17:35 +02:00
Michael Tremer
ec4e8d3fec strongswan: Update to version 5.2.0. 2014-07-09 22:15:43 +02:00
Michael Tremer
c007921b21 strongswan: Don't ship unity plugin any more.
Fixes #10569
2014-07-08 19:27:44 +02:00
Michael Tremer
567fadff6a strongswan: Update to 5.2.0dr6. 2014-06-19 14:39:21 +02:00
Michael Tremer
d1b0815ff7 strongswan: Enable XAUTH noauth plugin.
See #10468.
2014-04-22 17:46:32 +02:00
Arne Fitzenreiter
4fbf276cae strongswan: rootfile update. 2014-04-16 06:52:01 +02:00
Arne Fitzenreiter
78f10eafe0 strongswan: no padlock on arm. 2014-02-26 09:37:12 +01:00
Michael Tremer
bc05155ac0 strongswan: Update to 5.1.2rc1. 2014-02-18 15:16:08 +01:00
Michael Tremer
0dff6b5b85 strongswan: Enable dhcp and farp plugin (#10467). 2014-01-29 15:01:57 +01:00
Arne Fitzenreiter
ea04338b4d rootfile fixes for arm. 2013-12-01 14:08:08 +01:00
Arne Fitzenreiter
504fc5af26 rootfile updates. 2013-11-21 13:50:03 +01:00
Arne Fitzenreiter
d0d3fe9d26 Merge remote-tracking branch 'origin/next' into fifteen
Conflicts:
	lfs/samba
	lfs/strongswan
2013-11-13 14:05:15 +01:00
Michael Tremer
ec985733a5 strongswan: Update to 5.1.1. 2013-11-07 20:56:43 +01:00
Michael Tremer
cc9a325708 strongswan: Rootfile update. 2013-10-24 19:41:17 +02:00
Michael Tremer
78e35c82dc strongswan: Update to 5.1.1dr4. 2013-10-22 15:01:24 +02:00
Michael Tremer
6b0a04c0f8 strongswan: Update to 5.1.0rc1. 2013-07-20 17:36:53 +02:00
Michael Tremer
5e9b7dd2c3 Merge branch 'next' of ssh://git.ipfire.org/pub/git/ipfire-2.x into strongswan-next 2013-07-16 22:00:14 +02:00
Michael Tremer
15be554282 strongswan: Enable EAP authentication algorithms. 2013-07-16 20:54:28 +02:00
Michael Tremer
3f7ae7b715 strongswan: Update to 5.1.0dr1. 2013-07-04 12:41:25 +02:00
Arne Fitzenreiter
d0abcb92d2 strongswan: rootfile update. 2013-02-02 11:56:41 +01:00
Michael Tremer
404c8e462b strongswan: Enable eap-radius plugin.
It has been requested by a couple of users to enable
this plugin.

http://forum.ipfire.org/index.php?topic=3333.0
http://wiki.strongswan.org/projects/strongswan/wiki/EapRadius
2012-12-10 17:15:48 +01:00
Arne Fitzenreiter
80dd5d2cf8 strongswan: fix rootfiles for arm build.
padlock module is only present on intel.
2012-08-14 14:28:07 -04:00
Michael Tremer
3090c39efd strongswan: Update to 5.0.0.
This update removes pluto which is replaced by charon.
2012-07-04 15:53:19 +02:00
Arne Fitzenreiter
a526de38bc strongswan: update to 4.6.3. 2012-05-05 23:25:07 +02:00
Arne Fitzenreiter
b21c471b73 strongswan: update to 4.6.2.
fixes #10037
2012-03-10 17:32:31 +01:00
Arne Fitzenreiter
42e0012dfd rootfile-update: strongswan, initskripts. 2011-08-24 20:26:57 +02:00
Arne Fitzenreiter
aee8d14139 strongswan: update to 4.5.3. 2011-08-24 09:17:34 +02:00
Arne Fitzenreiter
c8796dfba8 strongswan: update to 4.5.2. 2011-05-21 23:37:15 +02:00
Arne Fitzenreiter
89e7a0f529 Updated strongswan (4.5.0). 2010-11-03 21:55:44 +01:00