SHA256
1
0
forked from jengelh/strongswan
OBS User unknown
2009-07-14 21:56:37 +00:00
committed by Git OBS Bridge
parent 47413c56c2
commit 380fc5b493
15 changed files with 601 additions and 430 deletions

View File

@@ -1,3 +1,77 @@
-------------------------------------------------------------------
Wed Jun 10 11:04:44 CEST 2009 - mt@suse.de
- Updated to strongSwan 4.3.2 release, that fixes two asn1 parser
DoS vulnerabilities and provides several new features, e.g.:
* The new gcrypt plugin provides symmetric cipher, hasher, RNG,
Diffie-Hellman and RSA crypto primitives using the LGPL licensed
GNU gcrypt library.
* libstrongswan features an integrated crypto selftest framework
for registered algorithms. The test-vector plugin provides a first
set of test vectors and allows pluto and charon to rely on tested
crypto algorithms.
* pluto can now use all libstrongswan plugins with the exception
of x509 and xcbc. Thanks to the openssl plugin, the ECP Diffie-
Hellman groups 19, 20, 21, 25, and 26 as well as ECDSA-256,
ECDSA-384, and ECDSA-521 authentication can be used with IKEv1.
* Applying their fuzzing tool, the Orange Labs vulnerability
research team found another two DoS vulnerabilities, one in the
rather old ASN.1 parser of Relative Distinguished Names (RDNs)
and a second one in the conversion of ASN.1 UTCTIME and
GENERALIZEDTIME strings to a time_t value.
* The nm plugin now passes DNS/NBNS server information to
NetworkManager, allowing a gateway administrator to set DNS/NBNS
configuration on clients dynamically.
* The nm plugin also accepts CA certificates for gateway
authentication. If a CA certificate is configured, strongSwan uses
the entered gateway address as its idenitity, requiring the gateways
certificate to contain the same as subjectAltName.
This allows a gateway administrator to deploy the same
certificates to Windows 7 and NetworkManager clients.
* The command ipsec purgeike deletes IKEv2 SAs that don't have a
CHILD SA.
The command ipsec down <conn>{n} deletes CHILD SA instance n of
connection <conn> whereas ipsec down <conn>{*} deletes all CHILD
SA instances.
The command ipsec down <conn>[n] deletes IKE SA instance n of
connection <conn> plus dependent CHILD SAs whereas ipsec down
<conn>[*] deletes all IKE SA instances of connection <conn>.
* Fixed a regression introduced in 4.3.0 where EAP authentication
calculated the AUTH payload incorrectly. Further, the EAP-MSCHAPv2
MSK key derivation has been updated to be compatible with the
Windows 7 Release Candidate.
* Refactored installation of triggering policies. Routed policies
are handled outside of IKE_SAs to keep them installed in any case.
A tunnel gets established only once, even if initiation is delayed
due network outages.
* Improved the handling of multiple acquire signals triggered by
the kernel.
* Fixed two DoS vulnerabilities in the charon daemon that were
discovered by fuzzing techniques:
1) Sending a malformed IKE_SA_INIT request leaved an incomplete
state which caused a null pointer dereference if a subsequent
CREATE_CHILD_SA request was sent.
2) Sending an IKE_AUTH request with either a missing TSi or TSr
payload caused a null pointer derefence because the checks for
TSi and TSr were interchanged.
The IKEv2 fuzzer used was developped by the Orange Labs
vulnerability research team. The tool was initially written
by Gabriel Campana and is now maintained by Laurent Butti.
* Added support for AES counter mode in ESP in IKEv2 using the
proposal keywords aes128ctr, aes192ctr and aes256ctr.
* Further progress in refactoring pluto: Use of the curl and ldap
plugins for fetching crls and OCSP. Use of the random plugin to
get keying material from /dev/random or /dev/urandom. Use of the
openssl plugin as an alternative to the aes, des, sha1, sha2, and
md5 plugins. The blowfish, twofish, and serpent encryption plugins
are now optional and are not enabled by default.
- Enabled new gcrypt plugin
- Adopted spec file and modprobe to syslog patch
- Removed obsolete getline glibc collision patch
- Added patch to avoid library version for plugins (rpmlint).
- Replaced update-dns-server patch with a --with-resolv-conf.
- Removed restart_on_update from spec file (see bnc#450390).
-------------------------------------------------------------------
Mon Jun 8 00:21:13 CEST 2009 - ro@suse.de